336 research outputs found
Distributing entanglement and single photons through an intra-city, free-space quantum channel
We have distributed entangled photons directly through the atmosphere to a
receiver station 7.8 km away over the city of Vienna, Austria at night.
Detection of one photon from our entangled pairs constitutes a triggered single
photon source from the sender. With no direct time-stable connection, the two
stations found coincidence counts in the detection events by calculating the
cross-correlation of locally-recorded time stamps shared over a public internet
channel. For this experiment, our quantum channel was maintained for a total of
40 minutes during which time a coincidence lock found approximately 60000
coincident detection events. The polarization correlations in those events
yielded a Bell parameter, S=2.27/pm0.019, which violates the CHSH-Bell
inequality by 14 standard deviations. This result is promising for
entanglement-based free-space quantum communication in high-density urban
areas. It is also encouraging for optical quantum communication between ground
stations and satellites since the length of our free-space link exceeds the
atmospheric equivalent.Comment: 8 pages including 1 figure and 2 tables. The first two authors
contributed equally to this wor
Feasibility of free space quantum key distribution with coherent polarization states
We demonstrate for the first time the feasibility of free space quantum key
distribution with continuous variables under real atmospheric conditions. More
specifically, we transmit coherent polarization states over a 100m free space
channel on the roof of our institute's building. In our scheme, signal and
local oscillator are combined in a single spatial mode which auto-compensates
atmospheric fluctuations and results in an excellent interference. Furthermore,
the local oscillator acts as spatial and spectral filter thus allowing
unrestrained daylight operation.Comment: 12 pages, 8 figures, extensions in sections 2, 3.1, 3.2 and 4. This
is an author-created, un-copyedited version of an article accepted for
publication in New Journal of Physics (Special Issue on Quantum Cryptography:
Theory and Practice). IOP Publishing Ltd is not responsible for any errors or
omissions in this version of the manuscript or any version derived from i
Quantum Eavesdropping without Interception: An Attack Exploiting the Dead Time of Single Photon Detectors
The security of quantum key distribution (QKD) can easily be obscured if the
eavesdropper can utilize technical imperfections of the actual implementation.
Here we describe and experimentally demonstrate a very simple but highly
effective attack which even does not need to intercept the quantum channel at
all. Only by exploiting the dead time effect of single photon detectors the
eavesdropper is able to gain (asymptotically) full information about the
generated keys without being detected by state-of-the-art QKD protocols. In our
experiment, the eavesdropper inferred up to 98.8% of the key correctly, without
increasing the bit error rate between Alice and Bob significantly. Yet, we find
an evenly simple and effective countermeasure to inhibit this and similar
attacks
Comparative chromosome painting discloses homologous Segments in distantly related mammals
Comparative chromosome painting, termed ZOO-FISH, using DNA libraries from flow
sorted human chromosomes 1,16,17 and X, and mouse chromosome 11 discloses the
presence of syntenic groups in distantly related mammalian Orders ranging from
primates (Homo sapiens), rodents (Mus musculus), even-toed ungulates (Muntiacus
muntjak vaginalis and Muntiacus reevesi) and whales (Balaenoptera physalus). These
mammalian Orders have evolved separately for 55-80 million years (Myr). We conclude
that ZOO-FISH can be used to generate comparative chromosome maps of a large
number of mammalian species
Nitrogen and sulphur management: challenges for organic sources in temperate agricultural systems
A current global trend towards intensification or specialization of agricultural enterprises has been accompanied by increasing public awareness of associated environmental consequences. Air and water pollution from losses of nutrients, such as nitrogen (N) and sulphur (S), are a major concern. Governments have initiated extensive regulatory frameworks, including various land use policies, in an attempt to control or reduce the losses. This paper presents an overview of critical input and loss processes affecting N and S for temperate climates, and provides some background to the discussion in subsequent papers evaluating specific farming systems. Management effects on potential gaseous and leaching losses, the lack of synchrony between supply of nutrients and plant demand, and options for optimizing the efficiency of N and S use are reviewed. Integration of inorganic and organic fertilizer inputs and the equitable re-distribution of nutrients from manure are discussed. The paper concludes by highlighting a need for innovative research that is also targeted to practical approaches for reducing N and S losses, and improving the overall synchrony between supply and demand
The impact of farming on river banks on water quality of the rivers
A study was carried out in a strip of a river in the dry and rainy
seasons to assess the effect of farming along river banks on the
quality of water in rivers. The results showed that there was an
increase in the concentration of nitrate in the water downstream in
both the rainy and dry seasons. In both rainy and dry seasons, the
total nitrogen in the soil was highest (p<0.01) in the middle
section. Significant seasonal differences (p<0.01) were observed for
phosphate in water, being higher in the dry season. In the soil, the
concentration of phosphate showed significant sectional differences
(p<0.01) in the rainy season with the highest concentration observed
in the lower section (1.74±0.01mg/l) and the least in the upper
section (1.02±0.01g/l). However, in the dry season, the highest
concentration was obtained in the middle section (1.69±0.01mg/l)
and the least in the upper section (1.15±0.02 mg/l). The results
suggest that the farms along the riverbanks have an impact on the water
quality of the water in the river. It is therefore recommended that
there should be close monitoring of the activities of the farms on
riverbanks to minimise their impacts on the natural ecosystems that
they interact with. Frequent monitoring of the water quality in the
rivers relative to the farming estates should be done
Controlling a superconducting nanowire single-photon detector using tailored bright illumination
We experimentally demonstrate that a superconducting nanowire single-photon
detector is deterministically controllable by bright illumination. We found
that bright light can temporarily make a large fraction of the nanowire length
normally-conductive, can extend deadtime after a normal photon detection, and
can cause a hotspot formation during the deadtime with a highly nonlinear
sensitivity. In result, although based on different physics, the
superconducting detector turns out to be controllable by virtually the same
techniques as avalanche photodiode detectors. As demonstrated earlier, when
such detectors are used in a quantum key distribution system, this allows an
eavesdropper to launch a detector control attack to capture the full secret key
without being revealed by to many errors in the key.Comment: Expanded discussions, updated references. 9 pages, 8 figure
Free-Space distribution of entanglement and single photons over 144 km
Quantum Entanglement is the essence of quantum physics and inspires
fundamental questions about the principles of nature. Moreover it is also the
basis for emerging technologies of quantum information processing such as
quantum cryptography, quantum teleportation and quantum computation. Bell's
discovery, that correlations measured on entangled quantum systems are at
variance with a local realistic picture led to a flurry of experiments
confirming the quantum predictions. However, it is still experimentally
undecided whether quantum entanglement can survive global distances, as
predicted by quantum theory. Here we report the violation of the
Clauser-Horne-Shimony-Holt (CHSH) inequality measured by two observers
separated by 144 km between the Canary Islands of La Palma and Tenerife via an
optical free-space link using the Optical Ground Station (OGS) of the European
Space Agency (ESA). Furthermore we used the entangled pairs to generate a
quantum cryptographic key under experimental conditions and constraints
characteristic for a Space-to-ground experiment. The distance in our experiment
exceeds all previous free-space experiments by more than one order of magnitude
and exploits the limit for ground-based free-space communication; significantly
longer distances can only be reached using air- or space-based platforms. The
range achieved thereby demonstrates the feasibility of quantum communication in
space, involving satellites or the International Space Station (ISS).Comment: 10 pages including 2 figures and 1 table, Corrected typo
Quantum key distribution with hacking countermeasures and long term field trial
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered
- …