42 research outputs found
Reverse reconciliation protocols for quantum cryptography with continuous variables
We introduce new quantum key distribution protocols using quantum continuous
variables, that are secure against individual attacks for any transmission of
the optical line between Alice and Bob. In particular, it is not required that
this transmission is larger than 50 %. Though squeezing or entanglement may be
helpful, they are not required, and there is no need for quantum memories or
entanglement purification. These protocols can thus be implemented using
coherent states and homodyne detection, and they may be more efficient than
usual protocols using quantum discrete variables.Comment: 5 pages, no figur
Tight bound on coherent states quantum key distribution with heterodyne detection
We propose a new upper bound for the eavesdropper's information in the direct
and reverse reconciliated coherent states quantum key distribution protocols
with heterodyne detection. This bound is derived by maximizing the leaked
information over the symplectic group of transformations that spans every
physical Gaussian attack on individual pulses. We exhibit four different
attacks that reach this bound, which shows that this bound is tight. Finally,
we compare the secret key rate obtained with this new bound to the homodyne
rate.Comment: 8 pages, 3 figure
Experimental realization of Wheeler's delayed-choice GedankenExperiment
The quantum "mystery which cannot go away" (in Feynman's words) of
wave-particle duality is illustrated in a striking way by Wheeler's
delayed-choice GedankenExperiment. In this experiment, the configuration of a
two-path interferometer is chosen after a single-photon pulse has entered it :
either the interferometer is \textit{closed} (\textit{i.e.} the two paths are
recombined) and the interference is observed, or the interferometer remains
\textit{open} and the path followed by the photon is measured. We report an
almost ideal realization of that GedankenExperiment, where the light pulses are
true single photons, allowing unambiguous which-way measurements, and the
interferometer, which has two spatially separated paths, produces high
visibility interference. The choice between measuring either the 'open' or
'closed' configuration is made by a quantum random number generator, and is
space-like separated -- in the relativistic sense -- from the entering of the
photon into the interferometer. Measurements in the closed configuration show
interference with a visibility of 94%, while measurements in the open
configuration allow us to determine the followed path with an error probability
lower than 1%
Wheeler's delayed-choice thought experiment: Experimental realization and theoretical analysis
Wheeler has strikingly illustrated the wave-particle duality by the
delayed-choice thought experiment, in which the configuration of a 2-path
interferometer is chosen after a single-photon light-pulsed has entered it. We
present a quantitative theoretical analysis of an experimental realization of
Wheeler's proposal
Experimental implementation of non-Gaussian attacks on a continuous-variable quantum key distribution system
An intercept-resend attack on a continuous-variable quantum-key-distribution
protocol is investigated experimentally. By varying the interception fraction,
one can implement a family of attacks where the eavesdropper totally controls
the channel parameters. In general, such attacks add excess noise in the
channel, and may also result in non-Gaussian output distributions. We implement
and characterize the measurements needed to detect these attacks, and evaluate
experimentally the information rates available to the legitimate users and the
eavesdropper. The results are consistent with the optimality of Gaussian
attacks resulting from the security proofs.Comment: 4 pages, 5 figure
Field Test of Classical Symmetric Encryption with Continuous Variable Quantum Key Distribution
We report on the design and performance of a point-to-point classical
symmetric encryption link with fast key renewal provided by a Continuous
Variable Quantum Key Distribution (CVQKD) system. Our system was operational
and able to encrypt point-to-point communications during more than six months,
from the end of July 2010 until the beginning of February 2011. This field test
was the first demonstration of the reliability of a CVQKD system over a long
period of time in a server room environment. This strengthens the potential of
CVQKD for information technology security infrastructure deployments
Pulsed homodyne measurements of femtosecond squeezed pulses generated by single-pass parametric deamplification
A new scheme is described for pulsed squeezed light generation using
femtosecond pulses parametrically deamplified through a single pass in a thin
(0.1mm) potassium niobate KNbO3 crystal, with a significant deamplification of
about -3dB. The quantum noise of each individual pulse is registered in the
time domain using a single-shot homodyne detection operated with femtosecond
pulses and the best squeezed quadrature variance was measured to be 1.87 dB
below the shot noise level. Such a scheme provides the basic ressource for
time-resolved quantum communication protocols.Comment: Accepted for publication in Optics Letter
Quantum key distribution using gaussian-modulated coherent states
Quantum continuous variables are being explored as an alternative means to
implement quantum key distribution, which is usually based on single photon
counting. The former approach is potentially advantageous because it should
enable higher key distribution rates. Here we propose and experimentally
demonstrate a quantum key distribution protocol based on the transmission of
gaussian-modulated coherent states (consisting of laser pulses containing a few
hundred photons) and shot-noise-limited homodyne detection; squeezed or
entangled beams are not required. Complete secret key extraction is achieved
using a reverse reconciliation technique followed by privacy amplification. The
reverse reconciliation technique is in principle secure for any value of the
line transmission, against gaussian individual attacks based on entanglement
and quantum memories. Our table-top experiment yields a net key transmission
rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per
second for a line with losses of 3.1 dB. We anticipate that the scheme should
remain effective for lines with higher losses, particularly because the present
limitations are essentially technical, so that significant margin for
improvement is available on both the hardware and software.Comment: 8 pages, 4 figure