362 research outputs found
Recommended from our members
Proposal for Slepian-States-Based DV- and CV-QKD Schemes Suitable for Implementation in Integrated Photonics Platforms
Quantum key distribution (QKD) leverages underlying principles of quantum mechanics to realize distribution of keys with verifiable security. Despite appealing features of QKD, there are some fundamental and technical challenges that need to be solved prior to its widespread applications. First, QKD secret-key rate (SKR) is fundamentally limited by channel loss, as dictated by the rate-loss tradeoff. Quantum repeaters would be an ultimate solution to overcome this problem; however, they are well beyond the reach. The second challenge lies in the scalability and cost. Future's QKD systems must be suitable for mass production with low cost, reliable realignment-free operations, and small power consumption. To solve for these problems in a simultaneous manner, we propose to encode information in the orthogonal Slepian sequences' bases. Such an approach is highly robust against turbulence effects in free-space optical links and dispersion effects/fiber non-linearities in fiber-optics channels, thereby improving QKD distance. Moreover, exploiting multidimensional encoding space enables high spectral efficiency QKD so that the SKR can be significantly improved. Critically, generation, processing, and detection of Slepian states can be reliably implemented in an integrated quantum photonics platform, based on both reflective and transmissive waveguide Bragg gratings (WBGs). Proposed reflective/transmissive WBG-based Slepian states are applicable to both discrete variable and continuous variable QKD systems.Multidisciplinary University Research Initiatives Office of Naval Research [N00014-13-1-0627]; National Science FoundationOpen access journalThis item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at [email protected]
Recommended from our members
On the Discretized Gaussian Modulation (DGM)- Based Continuous Variable-QKD
To overcome the low reconciliation efficiency problem of Gaussian modulation (GM)-basedcontinuous variable (CV)-quantum key distribution (QKD), in this paper, we propose to use discretized GM (DGM)-based-CV-QKD. The proposed CV-QKD scheme has complexity and reconciliation efficiency similar to that of discrete modulation (DM)-based-CV-QKD and at the same time solves for the problem of the nonexistence of strict security proofs for the DM-CV-QKD under the collective attacks. We demonstrate that the 32-points-based DGM CV-QKD can closely approach the theoretical SKR-limit in medium and high channel losses regimes. On the other hand, the 64-points-based DGM CV-QKD scheme closely approaches the SKR-limit for all channel losses.ONR MURI program [N00014-13-1-0627]Open access journalThis item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at [email protected]
Recommended from our members
Optimized-Eight-State CV-QKD Protocol Outperforming Gaussian Modulation Based Protocols
In this paper, an optimized-eight-state CV-QKD protocol is proposed significantly outperforming previously introduced discrete modulation (DM) protocols as well as the corresponding Gaussian modulation (GM)-based CV-QKD protocols for practical reconciliation efficiencies values in terms of both secret-key rate (SKR) and achievable distance. The proposed CV-QKD protocol also outperforms, in terms of SKR, the corresponding high-cost single-photon DV-QKD scheme, employing an array of multiplexed single-photon detectors, for several orders of magnitude. We also describe a generalized RF-assisted CV-QKD scheme with heterodyne detection applicable to arbitrary DM scheme, insensitive to the laser phase noise and frequency offset fluctuations.Multidisciplinary University Research Initiative (MURI) Office of Naval Research (ONR) [N00014-13-1-0627]Open access journalThis item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at [email protected]
Recommended from our members
On the Probabilistic Shaping and Geometric Shaping in Optical Communication Systems
We introduce and compare typical shaping schemes suitable for optical communications. The geometrically shaped-quadrature amplitude modulation (GS-QAM) formats are characterized by the non-equidistant spacing of constellation points, transmitted uniformly, and applied to improve system capacity. On the other hand, the well-known constant composition distribution matcher (CCDM) is applied for the generation of probabilistically shaped QAM (PS-QAM) formats. Mutual information (MI) is used as a metric to analyze the performances of regular/GS/PS-MQAM formats. In a linear amplified spontaneous emission noise limited region, it can be proved by the numerical simulation that MI performances of the GS-8/16QAM are always better than regular 8/16QAM and PS-8/16QAM; the largest shaping gains can be separately reached by PS-32QAM and GS-32QAM. We continue with the experimental demonstration on the 16QAM-based transmission system, and find that GS-16QAM generally has the best MI performance. We also find that the modulation-dependent nonlinear noises of the GS-8/16/32QAM are comparable to that of the regular 8/16/32QAM and generally lower than PS-8/16/32QAM. By using the enhanced Gaussian noise model, we observe that the GS-8/16QAM formats have better performances than regular 8/16QAM and PS-8/16QAM over multi-span transmission. Meanwhile, PS-32QAM formats provide superior performance over a relatively long transmission distance.MURI Program, Office of Naval Research (ONR) [N00014-13-1-0627]Open access journal.This item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at [email protected]
Joint Probabilistic-Nyquist Pulse Shaping for an LDPC-Coded 8-PAM Signal in DWDM Data Center Communications
M-ary pulse-amplitude modulation (PAM) meets the requirements of data center communication because of its simplicity, but coarse entropy granularity cannot meet the dynamic bandwidth demands, and there is a large capacity gap between uniform formats and the Shannon limit. The dense wavelength division multiplexing (DWDM) system is widely used to increase the channel capacity, but low spectral efficiency of the intensity modulation/direct detection (IM/DD) solution restricts the throughput of the modern DWDM data center networks. Probabilistic shaping distribution is a good candidate to offer us a fine entropy granularity and efficiently reduce the gap to the Shannon limit, and Nyquist pulse shaping is widely used to increase the spectral efficiency. We aim toward the joint usage of probabilistic shaping and Nyquist pulse shaping with low-density parity-check (LDPC) coding to improve the bit error rate (BER) performance of 8-PAM signal transmission. We optimized the code rate of the LDPC code and compared different Nyquist pulse shaping parameters using simulations and experiments. We achieved a 0.43 dB gain using Nyquist pulse shaping, and a 1.1 dB gain using probabilistic shaping, while the joint use of probabilistic shaping and Nyquist pulse shaping achieved a 1.27 dB gain, which offers an excellent improvement without upgrading the transceivers.Open access journalThis item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at [email protected]
Secret key distillation across a quantum wiretap channel under restricted eavesdropping
The theory of quantum cryptography aims to guarantee unconditional
information-theoretic security against an omnipotent eavesdropper. In many
practical scenarios, however, the assumption of an all-powerful adversary is
excessive and can be relaxed considerably. In this paper we study secret key
distillation across a lossy and noisy quantum wiretap channel between Alice and
Bob, with a separately parameterized realistically lossy quantum channel to the
eavesdropper Eve. We show that under such restricted eavesdropping, the key
rates achievable can exceed the secret key distillation capacity against an
unrestricted eavesdropper in the quantum wiretap channel. Further, we show
upper bounds on the key rates based on the relative entropy of entanglement.
This simple restricted eavesdropping model is widely applicable, e.g., to
free-space quantum optical communication, where realistic collection of light
by Eve is limited by the finite size of her optical aperture. Future work will
include calculating bounds on the amount of light Eve can collect under various
realistic scenarios.Comment: 14 pages, 19 figures. We welcome comments and suggestion
- …