954 research outputs found

    A balanced gated-mode photon detector for qubit discrimination in 1550 nm

    Get PDF
    A photon detector combining the two avalanche photon diodes (APD) has been demonstrated for qubit discrimination in 1550 nm. Spikes accompanied with the signals in gated-mode were canceled by balanced output from the two APDs. The spike cancellation enabled one to reduce the threshold in the discriminators, and thus the gate pulse voltage. The dark count probability and afterpulse probability were reduced to 7x10^-7 and 10^-4, respectively, without affecting the detection efficiency (11 %) at 178 K.Comment: 6 pages, 5 figures, submitted to Optics Letters on March 1

    Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

    Get PDF
    Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via polarization of the signals, or equivalent signals. It turns out that the most powerful tool at the disposition of an eavesdropper is the photon-number splitting attack. We show that this attack can be extended in the relevant parameter regime such as to preserve the Poissonian photon number distribution of the combination of the signal source and the lossy channel.Comment: 4 page

    Single photon continuous variable quantum key distribution based on energy-time uncertainty relation

    Full text link
    In previous quantum key distribution (QKD) protocols, information is encoded on either the discrete-variable of single-photon signal or continuous-variables of multi-photon signal. Here, we propose a new QKD protocol by encoding information on continuous-variables of a single photon. In this protocol, Alice randomly encodes her information on either the central frequency of a narrow-band single photon pulse or the time-delay of a broadband single photon pulse, while Bob randomly chooses to do either frequency measurement or time measurement. The security of this protocol rests on the energy-time uncertainty relation, which prevents Eve from simultaneously determining both frequency and time information with arbitrarily high resolution. In practice, this scheme may be more robust against various channel noises, such as polarization and phase fluctuations.Comment: 4 pages, 3 figure

    Experimental Test of Two-way Quantum Key Distribution in Presence of Controlled Noise

    Full text link
    We describe the experimental test of a quantum key distribution performed with a two-way protocol without using entanglement. An individual incoherent eavesdropping is simulated and induces a variable amount of noise on the communication channel. This allows a direct verification of the agreement between theory and practice.Comment: 4 pages, 3 figure

    Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors

    Full text link
    Quantum Key Distribution with the BB84 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can be covered by these methods are limited due to the loss in the quantum channel (e.g. loss in the optical fiber) and in the single-photon counters of the receivers. One can argue that the loss in the detectors cannot be changed by an eavesdropper in order to increase the covered distance. Here we show that the security analysis of this scenario is not as easy as is commonly assumed, since already two-photon processes allow eavesdropping strategies that outperform the known photon-number splitting attack. For this reason there is, so far, no satisfactory security analysis available in the framework of individual attacks.Comment: 11 pages, 6 figures; Abstract and introduction extended, Appendix added, references update

    Structural and Electrical Investigation of Cobalt-Doped NiOx/Perovskite Interface for Efficient Inverted Solar Cells

    Get PDF
    Inorganic hole-transporting materials (HTMs) for stable and cheap inverted perovskite-based solar cells are highly desired. In this context, NiOx, with low synthesis temperature, has been employed. However, the low conductivity and the large number of defects limit the boost of the efficiency. An approach to improve the conductivity is metal doping. In this work, we have synthesized cobalt-doped NiOx nanoparticles containing 0.75, 1, 1.25, 2.5, and 5 mol% cobalt (Co) ions to be used for the inverted planar perovskite solar cells. The best efficiency of the devices utilizing the low temperature-deposited Co-doped NiOx HTM obtained a champion photoconversion efficiency of 16.42%, with 0.75 mol% of doping. Interestingly, we demonstrated that the improvement is not from an increase of the conductivity of the NiOx film, but due to the improvement of the perovskite layer morphology. We observe that the Co-doping raises the interfacial recombination of the device but more importantly improves the perovskite morphology, enlarging grain size and reducing the density of bulk defects and the bulk recombination. In the case of 0.75 mol% of doping, the beneficial effects do not just compensate for the deleterious one but increase performance further. Therefore, 0.75 mol% Co doping results in a significant improvement in the performance of NiOx-based inverted planar perovskite solar cells, and represents a good compromise to synthesize, and deposit, the inorganic material at low temperature, without losing the performance, due to the strong impact on the structural properties of the perovskite. This work highlights the importance of the interface from two different points of view, electrical and structural, recognizing the role of a low doping Co concentration, as a key to improve the inverted perovskite-based solar cells’ performance

    Teleportation as a quantum computation

    Get PDF
    An explicit quantum circuit is given to implement quantum teleportation. This circuit makes teleportation straightforward to anyone who believes that quantum computation is a reasonable proposition. It could also be genuinely used inside a quantum computer if teleportation is needed to move quantum information around. An unusual feature of this circuit is that there are points in the computation at which the quantum information can be completely disrupted by a measurement (or some types of interaction with the environment) without ill effects: the same final result is obtained whether or not these measurements takes place.Comment: 3 pages, LaTeX2e, PhysComp 96 submissio

    Delayed commutation in quantum computer networks

    Full text link
    In the same way that classical computer networks connect and enhance the capabilities of classical computers, quantum networks can combine the advantages of quantum information and communications. We propose a non-classical network element, a delayed commutation switch, that can solve the problem of switching time in packet switching networks. With the help of some local ancillary qubits and superdense codes we can route the information after part of it has left the network node.Comment: 4 pages. 4 figures. Preliminar versio

    Basolateral and central amygdala differentially recruit and maintain dorsolateral striatum-dependent cocaine-seeking habits.

    Get PDF
    In the development of addiction, drug seeking becomes habitual and controlled by drug-associated cues, and the neural locus of control over behaviour shifts from the ventral to the dorsolateral striatum. The neural mechanisms underlying this functional transition from recreational drug use to drug-seeking habits are unknown. Here we combined functional disconnections and electrophysiological recordings of the amygdalo-striatal networks in rats trained to seek cocaine to demonstrate that functional shifts within the striatum are driven by transitions from the basolateral (BLA) to the central (CeN) amygdala. Thus, while the recruitment of dorsolateral striatum dopamine-dependent control over cocaine seeking is triggered by the BLA, its long-term maintenance depends instead on the CeN. These data demonstrate that limbic cortical areas both tune the function of cognitive territories of the striatum and thereby underpin maladaptive cocaine-seeking habits.This work was supported by the Fondation pour la Recherche Médicale (FRM), the United Kingdom Medical Research Council (MRC) Grant 9536855 to BJE, the AXA research fund to ABR, an INSERM Avenir and an Agence Nationale de la Recherche (ANR) grant ANR12 SAMA00201 to DB. Research was conducted within both the MRC/Wellcome Trust Behavioral and Clinical Neuroscience Institute of Cambridge and the Inserm team “Psychobiology of Compulsive Disorders”, University of Poitiers.This is the final version of the article. It was first available from NPG via http://dx.doi.org/10.1038/ncomms1008
    corecore