754 research outputs found

    Demystifying the Information Reconciliation Protocol Cascade

    Full text link
    Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and, although its efficiency is not optimal, it has become the de-facto standard for practical implementations of information reconciliation in quantum key distribution. The aim of this work is to analyze the performance of Cascade, to discuss its strengths, weaknesses and optimization possibilities, comparing with some of the modified versions that have been proposed in the literature. When looking at all design trade-offs, a new view emerges that allows to put forward a number of guidelines and propose near optimal parameters for the practical implementation of Cascade improving performance significantly in comparison with all previous proposals.Comment: 30 pages, 13 figures, 3 table

    Entanglement Distribution in Optical Networks

    Full text link
    The ability to generate entangled photon-pairs over a broad wavelength range opens the door to the simultaneous distribution of entanglement to multiple users in a network by using centralized sources and flexible wavelength-division multiplexing schemes. Here we show the design of a metropolitan optical network consisting of tree-type access networks whereby entangled photon-pairs are distributed to any pair of users, independent of their location. The network is constructed employing commercial off-the-shelf components and uses the existing infrastructure, which allows for moderate deployment costs. We further develop a channel plan and a network-architecture design to provide a direct optical path between any pair of users, thus allowing classical and one-way quantum communication as well as entanglement distribution. This allows the simultaneous operation of multiple quantum information technologies. Finally, we present a more flexible backbone architecture that pushes away the load limitations of the original network design by extending its reach, number of users and capabilities.Comment: 26 pages, 12 figure

    An SU(5)\otimesZ_{13} Grand Unification Model

    Full text link
    We propose an SU(5) grand unified model with an invisible axion and the unification of the three coupling constants which is in agreement with the values, at MZM_Z, of α\alpha, αs\alpha_s, and sin2θW\sin^2\theta_W. A discrete, anomalous, Z13Z_{13} symmetry implies that the Peccei-Quinn symmetry is an automatic symmetry of the classical Lagrangian protecting, at the same time, the invisible axion against possible semi-classical gravity effects. Although the unification scale is of the order of the Peccei-Quinn scale the proton is stabilized by the fact that in this model the standard model fields form the SU(5) multiplets completed by new exotic fields and, also, because it is protected by the Z13Z_{13} symmetry.Comment: 14 pages, more typos correcte

    Quantum Metropolitan Optical Network based on Wavelength Division Multiplexing

    Get PDF
    Quantum Key Distribution (QKD) is maturing quickly. However, the current approaches to its application in optical networks make it an expensive technology. QKD networks deployed to date are designed as a collection of point-to-point, dedicated QKD links where non-neighboring nodes communicate using the trusted repeater paradigm. We propose a novel optical network model in which QKD systems share the communication infrastructure by wavelength multiplexing their quantum and classical signals. The routing is done using optical components within a metropolitan area which allows for a dynamically any-to-any communication scheme. Moreover, it resembles a commercial telecom network, takes advantage of existing infrastructure and utilizes commercial components, allowing for an easy, cost-effective and reliable deployment.Comment: 23 pages, 8 figure

    Quantum key distribution based on selective post-processing in passive optical networks

    Get PDF
    One of the main obstacles to the widespread adoption of quantum cryptography has been the difficulty of integration into standard optical networks, largely due to the tremendous difference in power of classical signals compared with the single quantum used for quantum key distribution. This makes the technology expensive and hard to deploy. In this letter, we show an easy and straightforward integration method of quantum cryptography into optical access networks. In particular, we analyze how a quantum key distribution system can be seamlessly integrated in a standard access network based on the passive optical and time division multiplexing paradigms. The novelty of this proposal is based on the selective post-processing that allows for the distillation of secret keys avoiding the noise produced by other network users. Importantly, the proposal does not require the modification of the quantum or classical hardware specifications neither the use of any synchronization mechanism between the network and quantum cryptography devices

    Synchronization in a ring of pulsating oscillators with bidirectional couplings

    Full text link
    We study the dynamical behavior of an ensemble of oscillators interacting through short range bidirectional pulses. The geometry is 1D with periodic boundary conditions. Our interest is twofold. To explore the conditions required to reach fully synchronization and to invewstigate the time needed to get such state. We present both theoretical and numerical results.Comment: Revtex, 4 pages, 2 figures. To appear in Int. J. Bifurc. and Chao

    Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters

    Get PDF
    In this paper we explore how recent technologies can improve the security of optical networks. In particular, we study how to use quantum key distribution (QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secret-key distribution that relies only on the fundamental principles of quantum physics. Point-to-point QKD devices have reached a mature industrial state; however, these devices are severely limited in distance, since signals at the quantum level (e.g. single photons) are highly affected by the losses in the communication channel and intermediate devices. To overcome this limitation, intermediate nodes (i.e. repeaters) are used. Both, quantum-regime and trusted, classical, repeaters have been proposed in the QKD literature, but only the latter can be implemented in practice. As a novelty, we propose here a new QKD network model based on the use of not fully trusted intermediate nodes, referred as weakly trusted repeaters. This approach forces the attacker to simultaneously break several paths to get access to the exchanged key, thus improving significantly the security of the network. We formalize the model using network codes and provide real scenarios that allow users to exchange secure keys over metropolitan optical networks using only passive components. Moreover, the theoretical framework allows to extend these scenarios not only to accommodate more complex trust constraints, but also to consider robustness and resiliency constraints on the network.Comment: 11 pages, 13 figure
    corecore