686 research outputs found
Reconciliation of a Quantum-Distributed Gaussian Key
Two parties, Alice and Bob, wish to distill a binary secret key out of a list
of correlated variables that they share after running a quantum key
distribution protocol based on continuous-spectrum quantum carriers. We present
a novel construction that allows the legitimate parties to get equal bit
strings out of correlated variables by using a classical channel, with as few
leaked information as possible. This opens the way to securely correcting
non-binary key elements. In particular, the construction is refined to the case
of Gaussian variables as it applies directly to recent continuous-variable
protocols for quantum key distribution.Comment: 8 pages, 4 figures. Submitted to the IEEE for possible publication.
Revised version to improve its clarit
Cloning and Cryptography with Quantum Continuous Variables
The cloning of quantum variables with continuous spectra is investigated. We
define a Gaussian 1-to-2 cloning machine, which copies equally well two
conjugate variables such as position and momentum or the two quadrature
components of a light mode. The resulting cloning fidelity for coherent states,
namely , is shown to be optimal. An asymmetric version of this Gaussian
cloner is then used to assess the security of a continuous-variable quantum key
distribution scheme that allows two remote parties to share a Gaussian key. The
information versus disturbance tradeoff underlying this continuous quantum
cryptographic scheme is then analyzed for the optimal individual attack.
Methods to convert the resulting Gaussian keys into secret key bits are also
studied. The extension of the Gaussian cloner to optimal -to- continuous
cloners is then discussed, and it is shown how to implement these cloners for
light modes, using a phase-insensitive optical amplifier and beam splitters.
Finally, a phase-conjugated inputs -to- continuous cloner is
defined, yielding clones and anticlones from replicas of a
coherent state and replicas of its phase-conjugate (with ).
This novel kind of cloners is shown to outperform the standard -to-
cloners in some situations.Comment: 8 pages, 3 figures, submitted to the special issue of the European
Physical Journal D on "Quantum interference and cryptographic keys: novel
physics and advancing technologies", proceedings of the conference QUICK
2001, Corsica, April 7-13 2001. Minor correction, references adde
Security of Quantum Key Distribution with Coherent States and Homodyne Detection
We assess the security of a quantum key distribution protocol relying on the
transmission of Gaussian-modulated coherent states and homodyne detection. This
protocol is shown to be equivalent to a squeezed state protocol based on a CSS
code construction, and is thus provably secure against any eavesdropping
strategy. We also briefly show how this protocol can be generalized in order to
improve the net key rate.Comment: 7 page
Experimental linear-optical implementation of a multifunctional optimal qubit cloner
We present the first experimental implementation of a multifunctional device
for the optimal cloning of one to two qubits. Previous implementations have
always been designed to optimize the cloning procedure with respect to one
single type of a priori information about the cloned state. In contrast, our
"all-in-one" implementation is optimal for several prominent regimes such as
universal cloning, phase-covariant cloning, and also the first ever realized
mirror phase-covariant cloning, when the square of the expected value of
Pauli's Z operator is known in advance. In all these regimes the experimental
device yields clones with almost maximum achievable average fidelity (97.5% of
theoretical limit). Our device has a wide range of possible applications in
quantum information processing, especially in quantum communication. For
instance, one can use it for incoherent and coherent attacks against a variety
of cryptographic protocols, including the Bennett-Brassard 1984 protocol of
quantum key distribution through the Pauli damping channels. It can be also
applied as a state-dependent photon multiplier in practical quantum networks.Comment: 9 pages, 6 figures, accepted to Phys. Rev. A (Rapid Communications
Secure Coherent-state Quantum Key Distribution Protocols with Efficient Reconciliation
We study the equivalence between a realistic quantum key distribution
protocol using coherent states and homodyne detection and a formal entanglement
purification protocol. Maximally-entangled qubit pairs that one can extract in
the formal protocol correspond to secret key bits in the realistic protocol.
More specifically, we define a qubit encoding scheme that allows the formal
protocol to produce more than one entangled qubit pair per coherent state, or
equivalently for the realistic protocol, more than one secret key bit. The
entanglement parameters are estimated using quantum tomography. We analyze the
properties of the encoding scheme and investigate its application to the
important case of the attenuation channel.Comment: REVTeX, 11 pages, 2 figure
Subjects with medial and lateral tibiofemoral articular cartilage defects do not alter compartmental loading during walking
Background Healthy cartilage is essential for optimal joint function. Although, articular cartilage defects are highly prevalent in the active population and hamper joint function, the effect of articular cartilage defects on knee loading is not yet documented. Therefore, the present study compared knee contact forces and pressures between patients with tibiofemoral cartilage defects and healthy controls. Potentially this provides additional insights in movement adaptations and the role of altered loading in the progression from defect towards OA. Methods Experimental gait data collected in 15 patients with isolated cartilage defects (8 medial involvement, 7 lateral-involvement) and 19 healthy asymptomatic controls was processed using a musculoskeletal model to calculate contact forces and pressures. Differences between two patient groups and controls were evaluated using Kruskal-Wallis tests and individually compared using Mann-Whitney-U tests (alpha <0.05). Findings The patients with lateral involvement walked significantly slower compared to the healthy controls. No movement adaptations to decrease the loading on the injured condyle were observed. Additionally, the location of loading was not significantly affected. Interpretation The current results suggest that isolated cartilage defects do not induce significant changes in the knee joint loading distribution. Consequently, the involved condyle will capture a physiological loading magnitude that should however be distributed over the cartilage surrounding the defect. This may cause local degenerative changes in the cartilage and in combination with inflammatory responses, might play a key role in the progression from articular cartilage defect to a more severe OA phenotype
The Measure of the Orthogonal Polynomials Related to Fibonacci Chains: The Periodic Case
The spectral measure for the two families of orthogonal polynomial systems
related to periodic chains with N-particle elementary unit and nearest
neighbour harmonic interaction is computed using two different methods. The
interest is in the orthogonal polynomials related to Fibonacci chains in the
periodic approximation. The relation of the measure to appropriately defined
Green's functions is established.Comment: 19 pages, TeX, 3 scanned figures, uuencoded file, original figures on
request, some misprints corrected, tbp: J. Phys.
Quantum Distribution of Gaussian Keys with Squeezed States
A continuous key distribution scheme is proposed that relies on a pair of
canonically conjugate quantum variables. It allows two remote parties to share
a secret Gaussian key by encoding it into one of the two quadrature components
of a single-mode electromagnetic field. The resulting quantum cryptographic
information vs disturbance tradeoff is investigated for an individual attack
based on the optimal continuous cloning machine. It is shown that the
information gained by the eavesdropper then simply equals the information lost
by the receiver.Comment: 5 pages, RevTe
- …