67 research outputs found
Quantum channel based on correlated twin laser beams
This work is the development and analysis of the recently proposed quantum
cryptographic protocol, based on the use of the two-mode coherently correlated
states. The protocol is supplied with the cyrptographic control procedures. The
channel error properties and stability against eavesdropping are examined.
State detection features are proposed.Comment: The Seventh International Conference on Quantum Communication,
Measurement and Computing,Glasgow 200
Unidimensional continuous-variable quantum key distribution
We propose the continuous-variable quantum key distribution protocol based on
the Gaussian modulation of a single quadrature of the coherent states of light,
which is aimed to provide simplified implementation compared to the
symmetrically modulated Gaussian coherent-state protocols. The protocol waives
the necessity in phase quadrature modulation and the corresponding channel
transmittance estimation. The security of the protocol against collective
attacks in a generally phase-sensitive Gaussian channels is analyzed and is
shown achievable upon certain conditions. Robustness of the protocol to channel
imperfections is compared to that of the symmetrical coherent-state protocol.
The simplified unidimensional protocol is shown possible at a reasonable
quantitative cost in terms of key rate and of tolerable channel excess noise.Comment: 7 pages, 5 figures, close to the published versio
Trusted Noise in Continuous-Variable Quantum Key Distribution: a Threat and a Defense
We address the role of the phase-insensitive trusted preparation and
detection noise in the security of a continuous-variable quantum key
distribution, considering the Gaussian protocols on the basis of coherent and
squeezed states and studying them in the conditions of Gaussian lossy and noisy
channels. The influence of such a noise on the security of Gaussian quantum
cryptography can be crucial, even despite the fact that a noise is trusted, due
to a strongly nonlinear behavior of the quantum entropies involved in the
security analysis. We recapitulate the known effect of the preparation noise in
both direct and reverse-reconciliation protocols, as well as the detection
noise in the reverse-reconciliation scenario. As a new result, we show the
negative role of the trusted detection noise in the direct-reconciliation
scheme. We also describe the role of the trusted preparation or detection noise
added at the reference side of the protocols in improving the robustness of the
protocols to the channel noise, confirming the positive effect for the
coherent-state reverse-reconciliation protocol. Finally, we address the
combined effect of trusted noise added both in the source and the detector.Comment: 25 pages, 9 figure
The Double Sphere Camera Model
Vision-based motion estimation and 3D reconstruction, which have numerous
applications (e.g., autonomous driving, navigation systems for airborne devices
and augmented reality) are receiving significant research attention. To
increase the accuracy and robustness, several researchers have recently
demonstrated the benefit of using large field-of-view cameras for such
applications. In this paper, we provide an extensive review of existing models
for large field-of-view cameras. For each model we provide projection and
unprojection functions and the subspace of points that result in valid
projection. Then, we propose the Double Sphere camera model that well fits with
large field-of-view lenses, is computationally inexpensive and has a
closed-form inverse. We evaluate the model using a calibration dataset with
several different lenses and compare the models using the metrics that are
relevant for Visual Odometry, i.e., reprojection error, as well as computation
time for projection and unprojection functions and their Jacobians. We also
provide qualitative results and discuss the performance of all models
- …