363 research outputs found

    Noisy pre-processing facilitating a photonic realisation of device-independent quantum key distribution

    Full text link
    Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i.e., the probability that the signals sent over the quantum channel are successfully received, must be above a certain threshold. We here propose a method to significantly relax this threshold, while maintaining provable device-independent security. This is achieved with a protocol that adds artificial noise, which cannot be known or controlled by an adversary, to the initial measurement data (the raw key). Focusing on a realistic photonic setup using a source based on spontaneous parametric down conversion, we give explicit bounds on the minimal required global detection efficiency.Comment: 5+16 pages, 4 figure

    Postprocessing for quantum random number generators: entropy evaluation and randomness extraction

    Full text link
    Quantum random-number generators (QRNGs) can offer a means to generate information-theoretically provable random numbers, in principle. In practice, unfortunately, the quantum randomness is inevitably mixed with classical randomness due to classical noises. To distill this quantum randomness, one needs to quantify the randomness of the source and apply a randomness extractor. Here, we propose a generic framework for evaluating quantum randomness of real-life QRNGs by min-entropy, and apply it to two different existing quantum random-number systems in the literature. Moreover, we provide a guideline of QRNG data postprocessing for which we implement two information-theoretically provable randomness extractors: Toeplitz-hashing extractor and Trevisan's extractor.Comment: 13 pages, 2 figure

    Improved DIQKD protocols with finite-size analysis

    Full text link
    The security of finite-length keys is essential for the implementation of device-independent quantum key distribution (DIQKD). Presently, there are several finite-size DIQKD security proofs, but they are mostly focused on standard DIQKD protocols and do not directly apply to the recent improved DIQKD protocols based on noisy preprocessing, random key measurements, and modified CHSH inequalities. Here, we provide a general finite-size security proof that can simultaneously encompass these approaches, using tighter finite-size bounds than previous analyses. In doing so, we develop a method to compute tight lower bounds on the asymptotic keyrate for any such DIQKD protocol with binary inputs and outputs. With this, we show that positive asymptotic keyrates are achievable up to depolarizing noise values of 9.33%9.33\%, exceeding all previously known noise thresholds. We also develop a modification to random-key-measurement protocols, using a pre-shared seed followed by a "seed recovery" step, which yields substantially higher net key generation rates by essentially removing the sifting factor. Some of our results may also improve the keyrates of device-independent randomness expansion.Comment: Improved threshold with more data points, discussion of conjecture in [SGP+21], correction regarding results of [MDR+19

    Symbolic Software for the Painleve Test of Nonlinear Ordinary and Partial Differential Equations

    Full text link
    The automation of the traditional Painleve test in Mathematica is discussed. The package PainleveTest.m allows for the testing of polynomial systems of ordinary and partial differential equations which may be parameterized by arbitrary functions (or constants). Except where limited by memory, there is no restriction on the number of independent or dependent variables. The package is quite robust in determining all the possible dominant behaviors of the Laurent series solutions of the differential equation. The omission of valid dominant behaviors is a common problem in many implementations of the Painleve test, and these omissions often lead to erroneous results. Finally, our package is compared with the other available implementations of the Painleve test.Comment: Published in the Journal of Nonlinear Mathematical Physics (http://www.sm.luth.se/math/JNMP/), vol. 13(1), pp. 90-110 (Feb. 2006). The software can be downloaded at either http://www.douglasbaldwin.com or http://www.mines.edu/fs_home/wherema

    Device-Independent Quantum Key Distribution

    Full text link
    Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorisation to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols like the one proposed by Bennett and Brassard provide information-theoretic security against such attacks, a much stronger form of security unreachable by classical means. However, quantum protocols realised so far are subject to a new class of attacks exploiting implementation defects in the physical devices involved, as demonstrated in numerous ingenious experiments. Following the pioneering work of Ekert proposing the use of entanglement to bound an adversary's information from Bell's theorem, we present here the experimental realisation of a complete quantum key distribution protocol immune to these vulnerabilities. We achieve this by combining theoretical developments on finite-statistics analysis, error correction, and privacy amplification, with an event-ready scheme enabling the rapid generation of high-fidelity entanglement between two trapped-ion qubits connected by an optical fibre link. The secrecy of our key is guaranteed device-independently: it is based on the validity of quantum theory, and certified by measurement statistics observed during the experiment. Our result shows that provably secure cryptography with real-world devices is possible, and paves the way for further quantum information applications based on the device-independence principle.Comment: 5+1 pages in main text and methods with 4 figures and 1 table; 37 pages of supplementary materia

    Nuclear Physics from Lattice QCD

    Full text link
    We review recent progress toward establishing lattice Quantum Chromodynamics as a predictive calculational framework for nuclear physics. A survey of the current techniques that are used to extract low-energy hadronic scattering amplitudes and interactions is followed by a review of recent two-body and few-body calculations by the NPLQCD collaboration and others. An outline of the nuclear physics that is expected to be accomplished with Lattice QCD in the next decade, along with estimates of the required computational resources, is presented.Comment: 56 pages, 39 pdf figures. Final published versio

    From:E to Z and back again: Reversible photoisomerisation of an isolated charge-tagged azobenzene

    Get PDF
    Substituted azobenzenes serve as chromophores and actuators in a wide range of molecular photoswitches. Here, tandem ion mobility spectrometry coupled with laser excitation is used to investigate the photoisomerisation of selected E and Z isomers of the charge-tagged azobenzene, methyl orange. Both isomers display a weak S1(nπ∗) photoisomerisation response in the blue part of the spectrum peaking at 440 nm and a more intense S2(ππ∗) photoisomerisation response in the near-UV with maxima at 370 and 310 nm for the E and Z isomers, respectively. The 60 nm separation between the S2(ππ∗) photo-response maxima for the two isomers allows them to be separately addressed in the gas phase and to be reversibly photoisomerised using different colours of light. This is an essential characteristic of an ideal photoswitch. The study demonstrates that a sequence of light pulses at different stages in an ion mobility spectrometer can be deployed to generate and probe isomers that cannot be electrosprayed directly from solution or produced through collisions in the ion source
    • …
    corecore