954 research outputs found
A balanced gated-mode photon detector for qubit discrimination in 1550 nm
A photon detector combining the two avalanche photon diodes (APD) has been
demonstrated for qubit discrimination in 1550 nm. Spikes accompanied with the
signals in gated-mode were canceled by balanced output from the two APDs. The
spike cancellation enabled one to reduce the threshold in the discriminators,
and thus the gate pulse voltage. The dark count probability and afterpulse
probability were reduced to 7x10^-7 and 10^-4, respectively, without affecting
the detection efficiency (11 %) at 178 K.Comment: 6 pages, 5 figures, submitted to Optics Letters on March 1
Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack
Quantum key distribution can be performed with practical signal sources such
as weak coherent pulses. One example of such a scheme is the Bennett-Brassard
protocol that can be implemented via polarization of the signals, or equivalent
signals. It turns out that the most powerful tool at the disposition of an
eavesdropper is the photon-number splitting attack. We show that this attack
can be extended in the relevant parameter regime such as to preserve the
Poissonian photon number distribution of the combination of the signal source
and the lossy channel.Comment: 4 page
Single photon continuous variable quantum key distribution based on energy-time uncertainty relation
In previous quantum key distribution (QKD) protocols, information is encoded
on either the discrete-variable of single-photon signal or continuous-variables
of multi-photon signal. Here, we propose a new QKD protocol by encoding
information on continuous-variables of a single photon. In this protocol, Alice
randomly encodes her information on either the central frequency of a
narrow-band single photon pulse or the time-delay of a broadband single photon
pulse, while Bob randomly chooses to do either frequency measurement or time
measurement. The security of this protocol rests on the energy-time uncertainty
relation, which prevents Eve from simultaneously determining both frequency and
time information with arbitrarily high resolution. In practice, this scheme may
be more robust against various channel noises, such as polarization and phase
fluctuations.Comment: 4 pages, 3 figure
Experimental Test of Two-way Quantum Key Distribution in Presence of Controlled Noise
We describe the experimental test of a quantum key distribution performed
with a two-way protocol without using entanglement. An individual incoherent
eavesdropping is simulated and induces a variable amount of noise on the
communication channel. This allows a direct verification of the agreement
between theory and practice.Comment: 4 pages, 3 figure
Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors
Quantum Key Distribution with the BB84 protocol has been shown to be
unconditionally secure even using weak coherent pulses instead of single-photon
signals. The distances that can be covered by these methods are limited due to
the loss in the quantum channel (e.g. loss in the optical fiber) and in the
single-photon counters of the receivers. One can argue that the loss in the
detectors cannot be changed by an eavesdropper in order to increase the covered
distance. Here we show that the security analysis of this scenario is not as
easy as is commonly assumed, since already two-photon processes allow
eavesdropping strategies that outperform the known photon-number splitting
attack. For this reason there is, so far, no satisfactory security analysis
available in the framework of individual attacks.Comment: 11 pages, 6 figures; Abstract and introduction extended, Appendix
added, references update
Structural and Electrical Investigation of Cobalt-Doped NiOx/Perovskite Interface for Efficient Inverted Solar Cells
Inorganic hole-transporting materials (HTMs) for stable and cheap inverted
perovskite-based solar cells are highly desired. In this context, NiOx, with low synthesis temperature,
has been employed. However, the low conductivity and the large number of defects limit the boost
of the efficiency. An approach to improve the conductivity is metal doping. In this work, we have
synthesized cobalt-doped NiOx nanoparticles containing 0.75, 1, 1.25, 2.5, and 5 mol% cobalt (Co) ions
to be used for the inverted planar perovskite solar cells. The best efficiency of the devices utilizing the
low temperature-deposited Co-doped NiOx HTM obtained a champion photoconversion efficiency
of 16.42%, with 0.75 mol% of doping. Interestingly, we demonstrated that the improvement is not
from an increase of the conductivity of the NiOx film, but due to the improvement of the perovskite
layer morphology. We observe that the Co-doping raises the interfacial recombination of the device
but more importantly improves the perovskite morphology, enlarging grain size and reducing the
density of bulk defects and the bulk recombination. In the case of 0.75 mol% of doping, the beneficial
effects do not just compensate for the deleterious one but increase performance further. Therefore,
0.75 mol% Co doping results in a significant improvement in the performance of NiOx-based inverted
planar perovskite solar cells, and represents a good compromise to synthesize, and deposit, the
inorganic material at low temperature, without losing the performance, due to the strong impact
on the structural properties of the perovskite. This work highlights the importance of the interface
from two different points of view, electrical and structural, recognizing the role of a low doping Co
concentration, as a key to improve the inverted perovskite-based solar cells’ performance
Teleportation as a quantum computation
An explicit quantum circuit is given to implement quantum teleportation. This
circuit makes teleportation straightforward to anyone who believes that quantum
computation is a reasonable proposition. It could also be genuinely used inside
a quantum computer if teleportation is needed to move quantum information
around. An unusual feature of this circuit is that there are points in the
computation at which the quantum information can be completely disrupted by a
measurement (or some types of interaction with the environment) without ill
effects: the same final result is obtained whether or not these measurements
takes place.Comment: 3 pages, LaTeX2e, PhysComp 96 submissio
Delayed commutation in quantum computer networks
In the same way that classical computer networks connect and enhance the
capabilities of classical computers, quantum networks can combine the
advantages of quantum information and communications. We propose a
non-classical network element, a delayed commutation switch, that can solve the
problem of switching time in packet switching networks. With the help of some
local ancillary qubits and superdense codes we can route the information after
part of it has left the network node.Comment: 4 pages. 4 figures. Preliminar versio
Basolateral and central amygdala differentially recruit and maintain dorsolateral striatum-dependent cocaine-seeking habits.
In the development of addiction, drug seeking becomes habitual and controlled by drug-associated cues, and the neural locus of control over behaviour shifts from the ventral to the dorsolateral striatum. The neural mechanisms underlying this functional transition from recreational drug use to drug-seeking habits are unknown. Here we combined functional disconnections and electrophysiological recordings of the amygdalo-striatal networks in rats trained to seek cocaine to demonstrate that functional shifts within the striatum are driven by transitions from the basolateral (BLA) to the central (CeN) amygdala. Thus, while the recruitment of dorsolateral striatum dopamine-dependent control over cocaine seeking is triggered by the BLA, its long-term maintenance depends instead on the CeN. These data demonstrate that limbic cortical areas both tune the function of cognitive territories of the striatum and thereby underpin maladaptive cocaine-seeking habits.This work was supported by the Fondation pour la Recherche Médicale (FRM), the United Kingdom Medical Research Council (MRC) Grant 9536855 to BJE, the AXA research fund to ABR, an INSERM Avenir and an Agence Nationale de la Recherche (ANR) grant ANR12 SAMA00201 to DB. Research was conducted within both the MRC/Wellcome Trust Behavioral and Clinical Neuroscience Institute of Cambridge and the Inserm team “Psychobiology of Compulsive Disorders”, University of Poitiers.This is the final version of the article. It was first available from NPG via http://dx.doi.org/10.1038/ncomms1008
- …
