280 research outputs found

    The effectiveness of quantum operations for eavesdropping on sealed messages

    Full text link
    A quantum protocol is described which enables a user to send sealed messages and that allows for the detection of active eavesdroppers. We examine a class of eavesdropping strategies, those that make use of quantum operations, and we determine the information gain versus disturbance caused by these strategies. We demonstrate this tradeoff with an example and we compare this protocol to quantum key distribution, quantum direct communication, and quantum seal protocols.Comment: 10 pages, 2 figures. Third Feynman Festival, 25 -- 29 August 2006, University of Maryland, College Park, Maryland, U.S.

    Quantum Key Distribution between N partners: optimal eavesdropping and Bell's inequalities

    Get PDF
    Quantum secret-sharing protocols involving N partners (NQSS) are key distribution protocols in which Alice encodes her key into N1N-1 qubits, in such a way that all the other partners must cooperate in order to retrieve the key. On these protocols, several eavesdropping scenarios are possible: some partners may want to reconstruct the key without the help of the other ones, and consequently collaborate with an Eve that eavesdrops on the other partners' channels. For each of these scenarios, we give the optimal individual attack that the Eve can perform. In case of such an optimal attack, the authorized partners have a higher information on the key than the unauthorized ones if and only if they can violate a Bell's inequality.Comment: 14 pages, 1 figur

    Finite key analysis for symmetric attacks in quantum key distribution

    Get PDF
    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e. below the order of 10^4, the finite key rate differs significantly from the asymptotic value for n approaching infinity. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.Comment: 9 pages, 5 figure

    Mutually unbiased binary observable sets on N qubits

    Full text link
    The Pauli operators (tensor products of Pauli matrices) provide a complete basis of operators on the Hilbert space of N qubits. We prove that the set of 4^N-1 Pauli operators may be partitioned into 2^N+1 distinct subsets, each consisting of 2^N-1 internally commuting observables. Furthermore, each such partitioning defines a unique choice of 2^N+1 mutually unbiased basis sets in the N-qubit Hilbert space. Examples for 2 and 3 qubit systems are discussed with emphasis on the nature and amount of entanglement that occurs within these basis sets.Comment: 5 pages, 5 figures. Replacement - expanded introduction and conclusions; added reference

    Quantum Cryptography using larger alphabets

    Get PDF
    Like all of quantum information theory, quantum cryptography is traditionally based on two level quantum systems. In this letter, a new protocol for quantum key distribution based on higher dimensional systems is presented. An experimental realization using an interferometric setup is also proposed. Analyzing this protocol from the practical side, one finds an increased key creation rate while keeping the initial laser pulse rate constant. Analyzing it for the case of intercept/resend eavesdropping strategy, an increased error rate is found compared to two dimensional systems, hence an advantage for the legitimate users to detect an eavesdropper.Comment: 12 pages, 2 (eps) figure

    Orthogonality of Biphoton Polarization States

    Full text link
    Orthogonality of two-photon polarization states belonging to a single frequency and spatial mode is demonstrated experimentally, in a generalization of the well-known anti-correlation 'dip' experiment.Comment: Submitted to Phys.Rev.Let

    On Preparing Entangled Pairs of Polarization Qubits in the Frequency Non-Degenerate Regime

    Full text link
    The problems associated with practical implementation of the scheme proposed for preparation of arbitrary states of polarization ququarts based on biphotons are discussed. The influence of frequency dispersion effects are considered, and the necessity of group velocities dispersion compensation in the frequency non-degenerate case even for continuous pumping is demonstrated. A method for this compensation is proposed and implemented experimentally. Physical restrictions on the quality of prepared two-photon states are revealed.Comment: 9 pages, 6 figure

    Investigaciones actuales en ligandos de receptores opiáceos

    Get PDF
    Relevant developments have been achieved in the last twenty years in the search for opioid agonists and antagonists with selectivity for each receptor subpopulation. Recently, new benzomorphan derivatives have been synthesized and compounds with substituted cyclopropylmethyl functionalities at N-l position showed high affinity and selectivity for K opioid receptor subpopulations. MPCB and CCB were selected as specific K agonists. The affinity ofCCB was two-fold the USO,488H one. Mixed peptide-heterocyclic compounds have been derived from these compounds and important informations on binding processes of K ligands have been obtained.En los últimos veinte años se ha llevado a cabo una intensa investigación sobre la búsqueda de agonistas y antagonistas selectivos de cada subtipo de receptores opiáceos. Recientemente, se han sintetizado nuevos derivados benzomorfánicos y compuestos con restos ciclopropilmetílicos sobre N-l que muestran alta afinidad y selectividad por los receptores K . Los compuestos MPCB y CCB se han seleccionado como agonistas específicos K. La afinidad de CCB es dos veces mayor que la del compuesto USO,488H. De estos compuestos se han derivado interesantes compuestos con estructura de peptidoheterocido y se han obtenido importantes informaciones sobre los procesos de binding a los receptores K
    corecore