67 research outputs found

    Quantum channel based on correlated twin laser beams

    Full text link
    This work is the development and analysis of the recently proposed quantum cryptographic protocol, based on the use of the two-mode coherently correlated states. The protocol is supplied with the cyrptographic control procedures. The channel error properties and stability against eavesdropping are examined. State detection features are proposed.Comment: The Seventh International Conference on Quantum Communication, Measurement and Computing,Glasgow 200

    Unidimensional continuous-variable quantum key distribution

    Full text link
    We propose the continuous-variable quantum key distribution protocol based on the Gaussian modulation of a single quadrature of the coherent states of light, which is aimed to provide simplified implementation compared to the symmetrically modulated Gaussian coherent-state protocols. The protocol waives the necessity in phase quadrature modulation and the corresponding channel transmittance estimation. The security of the protocol against collective attacks in a generally phase-sensitive Gaussian channels is analyzed and is shown achievable upon certain conditions. Robustness of the protocol to channel imperfections is compared to that of the symmetrical coherent-state protocol. The simplified unidimensional protocol is shown possible at a reasonable quantitative cost in terms of key rate and of tolerable channel excess noise.Comment: 7 pages, 5 figures, close to the published versio

    Trusted Noise in Continuous-Variable Quantum Key Distribution: a Threat and a Defense

    Full text link
    We address the role of the phase-insensitive trusted preparation and detection noise in the security of a continuous-variable quantum key distribution, considering the Gaussian protocols on the basis of coherent and squeezed states and studying them in the conditions of Gaussian lossy and noisy channels. The influence of such a noise on the security of Gaussian quantum cryptography can be crucial, even despite the fact that a noise is trusted, due to a strongly nonlinear behavior of the quantum entropies involved in the security analysis. We recapitulate the known effect of the preparation noise in both direct and reverse-reconciliation protocols, as well as the detection noise in the reverse-reconciliation scenario. As a new result, we show the negative role of the trusted detection noise in the direct-reconciliation scheme. We also describe the role of the trusted preparation or detection noise added at the reference side of the protocols in improving the robustness of the protocols to the channel noise, confirming the positive effect for the coherent-state reverse-reconciliation protocol. Finally, we address the combined effect of trusted noise added both in the source and the detector.Comment: 25 pages, 9 figure

    The Double Sphere Camera Model

    Full text link
    Vision-based motion estimation and 3D reconstruction, which have numerous applications (e.g., autonomous driving, navigation systems for airborne devices and augmented reality) are receiving significant research attention. To increase the accuracy and robustness, several researchers have recently demonstrated the benefit of using large field-of-view cameras for such applications. In this paper, we provide an extensive review of existing models for large field-of-view cameras. For each model we provide projection and unprojection functions and the subspace of points that result in valid projection. Then, we propose the Double Sphere camera model that well fits with large field-of-view lenses, is computationally inexpensive and has a closed-form inverse. We evaluate the model using a calibration dataset with several different lenses and compare the models using the metrics that are relevant for Visual Odometry, i.e., reprojection error, as well as computation time for projection and unprojection functions and their Jacobians. We also provide qualitative results and discuss the performance of all models
    • …
    corecore