224,611 research outputs found

    Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    Full text link
    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making a double use of the quantum channel and the potential of long-distance secure communication using two-way protocol.Comment: 14 pages, 8 figure

    Joint Estimation of the Time Delay and the Clock Drift and Offset Using UWB signals

    Full text link
    We consider two transceivers, the first with perfect clock and the second with imperfect clock. We investigate the joint estimation of the delay between the transceivers and the offset and the drift of the imperfect clock. We propose a protocol for the synchronization of the clocks. We derive some empirical estimators for the delay, the offset and the drift, and compute the Cramer-Rao lower bounds and the joint maximum likelihood estimator of the delay and the drift. We study the impact of the protocol parameters and the time-of-arrival estimation variance on the achieved performances. We validate some theoretical results by simulation.Comment: Accepted and published in the IEEE ICC 2014 conferenc

    Security of quantum key distribution with multiphoton components

    Full text link
    Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three-photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works. Besides, we compare the performances of the six-state SARG04 with other prepare-and-measure QKD protocols using decoy states.Comment: 24 pages 2 figure

    Improving Link Reliability through Network Coding in Cooperative Cellular Networks

    Get PDF
    The paper proposes a XOR-based network coded cooperation protocol for the uplink transmission of relay assisted cellular networks and an algorithm for selection and assignment of the relay nodes. The performances of the cooperation protocol are expressed in terms of network decoder outage probability and Block Error Rate of the cooperating users. These performance indicators are analyzed theoretically and by computer simulations. The relay nodes assignment is based on the optimization, according to several criteria, of the graph that describes the cooperation cluster formed after an initial selection of the relay nodes. The graph optimization is performed using Genetic Algorithms adapted to the topology of the cooperation cluster and the optimization criteria considered

    Advantages of the coherent state compared with squeeze state in unidimensional continuous variable quantum key distribution

    Full text link
    In this work, a comparison study between unidimensional (UD) coherent-state and UD squeeze-state protocols is performed in the continuous variable quantum key distribution domain. First, the UD squeeze-state protocol is proposed and the equivalence between the prepare-and-measure and entanglement-based schemes of UD squeeze-state protocol is proved. Then, the security of the UD squeeze-state protocol under collective attack in realistic conditions is analyzed. Lastly, the performances of the two UD protocols are analyzed. Based on the uniform expressions established in our study, the squeeze-state and coherent-state protocols can be analyzed simultaneously. Our results show that the UD squeeze-state protocols are quite different from the two-dimensional protocols in that the UD squeeze-state protocols have a poorer performance compared with UD coherent-state protocols, which is opposite in the case of two-dimensional protocols.Comment: 12 pages, 8 figures
    corecore