7 research outputs found
Triplet-like correlation symmetry of continuous variable entangled states
We report on a continuous variable analogue of the triplet two-qubit Bell
states. We theoretically and experimentally demonstrate a remarkable similarity
of two-mode continuous variable entangled states with triplet Bell states with
respect to their correlation patterns. Borrowing from the two qubit language,
we call these correlations triplet-like.Comment: 7 pages, 5 figures. Comments are welcom
Entangled Quantum Key Distribution with a Biased Basis Choice
We investigate a quantum key distribution (QKD) scheme which utilizes a
biased basis choice in order to increase the efficiency of the scheme. The
optimal bias between the two measurement bases, a more refined error analysis,
and finite key size effects are all studied in order to assure the security of
the final key generated with the system. We then implement the scheme in a
local entangled QKD system that uses polarization entangled photon pairs to
securely distribute the key. A 50/50 non-polarizing beamsplitter with different
optical attenuators is used to simulate a variable beamsplitter in order to
allow us to study the operation of the system for different biases. Over 6
hours of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were
able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550
secure key bits per raw key bit for the unbiased case. This represents an
increase in the efficiency of the key generation rate by 79%.Comment: v2: Revised paper based on referee reports, Theory section was
revised (primarily regarding finite key effects), Results section almost
completely rewritten with more experimental data. 16 pages, 5 figures. v1: 14
pages, 6 figures, higher resolution figures will be available in the
published articl
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation
of the security assumptions made in usual quantum key distribution (QKD). As in
usual QKD, the security of DIQKD follows from the laws of quantum physics, but
contrary to usual QKD, it does not rely on any assumptions about the internal
working of the quantum devices used in the protocol. We present here in detail
the security proof for a DIQKD protocol introduced in [Phys. Rev. Lett. 98,
230501 (2008)]. This proof exploits the full structure of quantum theory (as
opposed to other proofs that exploit the no-signalling principle only), but
only holds again collective attacks, where the eavesdropper is assumed to act
on the quantum systems of the honest parties independently and identically at
each round of the protocol (although she can act coherently on her systems at
any time). The security of any DIQKD protocol necessarily relies on the
violation of a Bell inequality. We discuss the issue of loopholes in Bell
experiments in this context.Comment: 25 pages, 3 figure
Feasibility of free space quantum key distribution with coherent polarization states
We demonstrate for the first time the feasibility of free space quantum key
distribution with continuous variables under real atmospheric conditions. More
specifically, we transmit coherent polarization states over a 100m free space
channel on the roof of our institute's building. In our scheme, signal and
local oscillator are combined in a single spatial mode which auto-compensates
atmospheric fluctuations and results in an excellent interference. Furthermore,
the local oscillator acts as spatial and spectral filter thus allowing
unrestrained daylight operation.Comment: 12 pages, 8 figures, extensions in sections 2, 3.1, 3.2 and 4. This
is an author-created, un-copyedited version of an article accepted for
publication in New Journal of Physics (Special Issue on Quantum Cryptography:
Theory and Practice). IOP Publishing Ltd is not responsible for any errors or
omissions in this version of the manuscript or any version derived from i
Controlling passively-quenched single photon detectors by bright light
Single photon detectors based on passively-quenched avalanche photodiodes can
be temporarily blinded by relatively bright light, of intensity less than a
nanowatt. I describe a bright-light regime suitable for attacking a quantum key
distribution system containing such detectors. In this regime, all single
photon detectors in the receiver Bob are uniformly blinded by continuous
illumination coming from the eavesdropper Eve. When Eve needs a certain
detector in Bob to produce a click, she modifies polarization (or other
parameter used to encode quantum states) of the light she sends to Bob such
that the target detector stops receiving light while the other detector(s)
continue to be illuminated. The target detector regains single photon
sensitivity and, when Eve modifies the polarization again, produces a single
click. Thus, Eve has full control of Bob and can do a successful
intercept-resend attack. To check the feasibility of the attack, 3 different
models of passively-quenched detectors have been tested. In the experiment, I
have simulated the intensity diagrams the detectors would receive in a real
quantum key distribution system under attack. Control parameters and side
effects are considered. It appears that the attack could be practically
possible.Comment: Experimental results from a third detector model added. Minor
corrections and edits made. 11 pages, 10 figure
Detector decoy quantum key distribution
Photon number resolving detectors can enhance the performance of many
practical quantum cryptographic setups. In this paper, we employ a simple
method to estimate the statistics provided by such a photon number resolving
detector using only a threshold detector together with a variable attenuator.
This idea is similar in spirit to that of the decoy state technique, and is
specially suited for those scenarios where only a few parameters of the photon
number statistics of the incoming signals have to be estimated. As an
illustration of the potential applicability of the method in quantum
communication protocols, we use it to prove security of an entanglement based
quantum key distribution scheme with an untrusted source without the need of a
squash model and by solely using this extra idea. In this sense, this detector
decoy method can be seen as a different conceptual approach to adapt a single
photon security proof to its physical, full optical implementation. We show
that in this scenario the legitimate users can now even discard the double
click events from the raw key data without compromising the security of the
scheme, and we present simulations on the performance of the BB84 and the
6-state quantum key distribution protocols.Comment: 27 pages, 7 figure
The Security of Practical Quantum Key Distribution
Quantum key distribution (QKD) is the first quantum information task to reach
the level of mature technology, already fit for commercialization. It aims at
the creation of a secret key between authorized partners connected by a quantum
channel and a classical authenticated channel. The security of the key can in
principle be guaranteed without putting any restriction on the eavesdropper's
power.
The first two sections provide a concise up-to-date review of QKD, biased
toward the practical side. The rest of the paper presents the essential
theoretical tools that have been developed to assess the security of the main
experimental platforms (discrete variables, continuous variables and
distributed-phase-reference protocols).Comment: Identical to the published version, up to cosmetic editorial change