86 research outputs found

    Balance on many scales

    Get PDF
    Bruggeman, F.J. [Promotor]Kort, R. [Promotor]Heerden, J.H. van [Copromotor

    Practical long-distance quantum key distribution system using decoy levels

    Get PDF
    Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully automated, robust QKD system based on the Bennett Brassard 1984 protocol (BB84) with low-noise superconducting nanowire single-photon detectors (SNSPDs) and decoy levels. Secret key is produced with unconditional security over a record 144.3 km of optical fibre, an increase of more than a factor of five compared to the previous record for unconditionally secure key generation in a practical QKD system.Comment: 9 page

    Daylight quantum key distribution over 1.6 km

    Get PDF
    Quantum key distribution (QKD) has been demonstrated over a point-to-point 1.6\sim1.6-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for publication consideratio

    The Subak in Diaspora: Balinese Farmers and the Subak in South Sulawesi

    Get PDF
    The subak has a long history as an irrigators’ institution on Bali. It has also spread across Indonesia along with Balinese farmers who were resettled by colonial and post-colonial governments or who have migrated spontaneously since colonial times. While subaks have been much researched in Bali itself, little is known about subaks outside Bali. Luwu District in South Sulawesi is one of the areas where thousands of Balinese families settled in the last four decades. Based on research in this transmigration area, this paper analyzes the emergence and development of the subak in relation to the development of irrigation infrastructure of a state-built irrigation system. A comparison between two Balinese settlements in the same system shows that differences in infrastructural and managerial conditions and arrangements between parts of the irrigation system were major determinants of the institutional space allowed for the subak and ways in which the subaks developed

    Free-Space distribution of entanglement and single photons over 144 km

    Get PDF
    Quantum Entanglement is the essence of quantum physics and inspires fundamental questions about the principles of nature. Moreover it is also the basis for emerging technologies of quantum information processing such as quantum cryptography, quantum teleportation and quantum computation. Bell's discovery, that correlations measured on entangled quantum systems are at variance with a local realistic picture led to a flurry of experiments confirming the quantum predictions. However, it is still experimentally undecided whether quantum entanglement can survive global distances, as predicted by quantum theory. Here we report the violation of the Clauser-Horne-Shimony-Holt (CHSH) inequality measured by two observers separated by 144 km between the Canary Islands of La Palma and Tenerife via an optical free-space link using the Optical Ground Station (OGS) of the European Space Agency (ESA). Furthermore we used the entangled pairs to generate a quantum cryptographic key under experimental conditions and constraints characteristic for a Space-to-ground experiment. The distance in our experiment exceeds all previous free-space experiments by more than one order of magnitude and exploits the limit for ground-based free-space communication; significantly longer distances can only be reached using air- or space-based platforms. The range achieved thereby demonstrates the feasibility of quantum communication in space, involving satellites or the International Space Station (ISS).Comment: 10 pages including 2 figures and 1 table, Corrected typo

    Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs

    Get PDF
    Secure computation protocols enable mutually distrusting parties to compute a function of their private inputs while revealing nothing but the output. Protocols with {\em full security} (also known as {\em guaranteed output delivery}) in particular protect against denial-of-service attacks, guaranteeing that honest parties receive a correct output. This feature can be realized in the presence of an honest majority, and significant research effort has gone toward attaining full security with good asymptotic and concrete efficiency. We present an efficient protocol for {\em any constant} number of parties nn, with {\em full security} against t<n/2t<n/2 corrupted parties, that makes a black-box use of a pseudorandom generator. Our protocol evaluates an arithmetic circuit CC over a finite ring RR (either a finite field or R=Z2kR=\Z_{2^k}) with communication complexity of 3t2t+1S+o(S)\frac{3t}{2t+1}S + o(S) RR-elements per party, where SS is the number of multiplication gates in CC (namely, <1.5<1.5 elements per party per gate). This matches the best known protocols for the semi-honest model up to the sublinear additive term. For a small number of parties nn, this improves over a recent protocol of Goyal {\em et al.} (Crypto 2020) by a constant factor for circuits over large fields, and by at least an Ω(logn)\Omega(\log n) factor for Boolean circuits or circuits over rings. Our protocol provides new methods for applying the sublinear-communication distributed zero-knowledge proofs of Boneh {\em et al.}~(Crypto 2019) for compiling semi-honest protocols into fully secure ones, in the more challenging case of t>1t>1 corrupted parties. Our protocol relies on {\em replicated secret sharing} to minimize communication and simplify the mechanism for achieving full security. This results in computational cost that scales exponentially with nn. Our main fully secure protocol builds on a new intermediate honest-majority protocol for verifying the correctness of multiplication triples by making a {\em general} use of distributed zero-knowledge proofs. While this intermediate protocol only achieves the weaker notion of {\em security with abort}, it applies to any linear secret-sharing scheme and provides a conceptually simpler, more general, and more efficient alternative to previous protocols from the literature. In particular, it can be combined with the Fiat-Shamir heuristic to simultaneously achieve logarithmic communication complexity and constant round complexity

    Correlations, Causes and the Logic of Obscuration: Donor Shaping of Dominant Narratives in Indonesia's Irrigation Development

    Get PDF
    This article analyses policy trends in Indonesian irrigation, particularly during the last five decades, from the perspective of dominant narratives, as authored, suggested and pushed by international donors. It argues that international donors' adherence to ‘deferred maintenance’ as the core element of irrigation policy problem framing does not match with farmers' and the irrigation agency staff perceptions and practices. The logic of obscuration and the discursive manoeuvers that maintain it are analysed. The article concludes that there is space for more profound conceptual contestation and for alternative actions pathways even within the ‘dominant paradigm’ to address management problems more effectively
    corecore