42 research outputs found

    Reverse reconciliation protocols for quantum cryptography with continuous variables

    Get PDF
    We introduce new quantum key distribution protocols using quantum continuous variables, that are secure against individual attacks for any transmission of the optical line between Alice and Bob. In particular, it is not required that this transmission is larger than 50 %. Though squeezing or entanglement may be helpful, they are not required, and there is no need for quantum memories or entanglement purification. These protocols can thus be implemented using coherent states and homodyne detection, and they may be more efficient than usual protocols using quantum discrete variables.Comment: 5 pages, no figur

    Tight bound on coherent states quantum key distribution with heterodyne detection

    Full text link
    We propose a new upper bound for the eavesdropper's information in the direct and reverse reconciliated coherent states quantum key distribution protocols with heterodyne detection. This bound is derived by maximizing the leaked information over the symplectic group of transformations that spans every physical Gaussian attack on individual pulses. We exhibit four different attacks that reach this bound, which shows that this bound is tight. Finally, we compare the secret key rate obtained with this new bound to the homodyne rate.Comment: 8 pages, 3 figure

    Experimental realization of Wheeler's delayed-choice GedankenExperiment

    Full text link
    The quantum "mystery which cannot go away" (in Feynman's words) of wave-particle duality is illustrated in a striking way by Wheeler's delayed-choice GedankenExperiment. In this experiment, the configuration of a two-path interferometer is chosen after a single-photon pulse has entered it : either the interferometer is \textit{closed} (\textit{i.e.} the two paths are recombined) and the interference is observed, or the interferometer remains \textit{open} and the path followed by the photon is measured. We report an almost ideal realization of that GedankenExperiment, where the light pulses are true single photons, allowing unambiguous which-way measurements, and the interferometer, which has two spatially separated paths, produces high visibility interference. The choice between measuring either the 'open' or 'closed' configuration is made by a quantum random number generator, and is space-like separated -- in the relativistic sense -- from the entering of the photon into the interferometer. Measurements in the closed configuration show interference with a visibility of 94%, while measurements in the open configuration allow us to determine the followed path with an error probability lower than 1%

    Wheeler's delayed-choice thought experiment: Experimental realization and theoretical analysis

    Full text link
    Wheeler has strikingly illustrated the wave-particle duality by the delayed-choice thought experiment, in which the configuration of a 2-path interferometer is chosen after a single-photon light-pulsed has entered it. We present a quantitative theoretical analysis of an experimental realization of Wheeler's proposal

    Experimental implementation of non-Gaussian attacks on a continuous-variable quantum key distribution system

    Get PDF
    An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.Comment: 4 pages, 5 figure

    Field Test of Classical Symmetric Encryption with Continuous Variable Quantum Key Distribution

    Full text link
    We report on the design and performance of a point-to-point classical symmetric encryption link with fast key renewal provided by a Continuous Variable Quantum Key Distribution (CVQKD) system. Our system was operational and able to encrypt point-to-point communications during more than six months, from the end of July 2010 until the beginning of February 2011. This field test was the first demonstration of the reliability of a CVQKD system over a long period of time in a server room environment. This strengthens the potential of CVQKD for information technology security infrastructure deployments

    Pulsed homodyne measurements of femtosecond squeezed pulses generated by single-pass parametric deamplification

    Full text link
    A new scheme is described for pulsed squeezed light generation using femtosecond pulses parametrically deamplified through a single pass in a thin (0.1mm) potassium niobate KNbO3 crystal, with a significant deamplification of about -3dB. The quantum noise of each individual pulse is registered in the time domain using a single-shot homodyne detection operated with femtosecond pulses and the best squeezed quadrature variance was measured to be 1.87 dB below the shot noise level. Such a scheme provides the basic ressource for time-resolved quantum communication protocols.Comment: Accepted for publication in Optics Letter

    Quantum key distribution using gaussian-modulated coherent states

    Full text link
    Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.Comment: 8 pages, 4 figure
    corecore