224,611 research outputs found
Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation
We analyze the security of the two-way continuous-variable quantum key
distribution protocol in reverse reconciliation against general two-mode
attacks, which represent all accessible attacks at fixed channel parameters.
Rather than against one specific attack model, the expression of secret key
rates of the two-way protocol are derived against all accessible attack models.
It is found that there is an optimal two-mode attack to minimize the
performance of the protocol in terms of both secret key rates and maximal
transmission distances. We identify the optimal two-mode attack, give the
specific attack model of the optimal two-mode attack and show the performance
of the two-way protocol against the optimal two-mode attack. Even under the
optimal two-mode attack, the performances of two-way protocol are still better
than the corresponding one-way protocol, which shows the advantage of making a
double use of the quantum channel and the potential of long-distance secure
communication using two-way protocol.Comment: 14 pages, 8 figure
Joint Estimation of the Time Delay and the Clock Drift and Offset Using UWB signals
We consider two transceivers, the first with perfect clock and the second
with imperfect clock. We investigate the joint estimation of the delay between
the transceivers and the offset and the drift of the imperfect clock. We
propose a protocol for the synchronization of the clocks. We derive some
empirical estimators for the delay, the offset and the drift, and compute the
Cramer-Rao lower bounds and the joint maximum likelihood estimator of the delay
and the drift. We study the impact of the protocol parameters and the
time-of-arrival estimation variance on the achieved performances. We validate
some theoretical results by simulation.Comment: Accepted and published in the IEEE ICC 2014 conferenc
Security of quantum key distribution with multiphoton components
Most qubit-based quantum key distribution (QKD) protocols extract the secure
key merely from single-photon component of the attenuated lasers. However, with
the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally
secure key can be extracted from the two-photon component by modifying the
classical post-processing procedure in the BB84 protocol. Employing the merits
of SARG04 QKD protocol and six-state preparation, one can extract secure key
from the components of single photon up to four photons. In this paper, we
provide the exact relations between the secure key rate and the bit error rate
in a six-state SARG04 protocol with single-photon, two-photon, three-photon,
and four-photon sources. By restricting the mutual information between the
phase error and bit error, we obtain a higher secure bit error rate threshold
of the multiphoton components than previous works. Besides, we compare the
performances of the six-state SARG04 with other prepare-and-measure QKD
protocols using decoy states.Comment: 24 pages 2 figure
Improving Link Reliability through Network Coding in Cooperative Cellular Networks
The paper proposes a XOR-based network coded cooperation protocol for the uplink transmission of relay assisted cellular networks and an algorithm for selection and assignment of the relay nodes. The performances of the cooperation protocol are expressed in terms of network decoder outage probability and Block Error Rate of the cooperating users. These performance indicators are analyzed theoretically and by computer simulations. The relay nodes assignment is based on the optimization, according to several criteria, of the graph that describes the cooperation cluster formed after an initial selection of the relay nodes. The graph optimization is performed using Genetic Algorithms adapted to the topology of the cooperation cluster and the optimization criteria considered
Advantages of the coherent state compared with squeeze state in unidimensional continuous variable quantum key distribution
In this work, a comparison study between unidimensional (UD) coherent-state
and UD squeeze-state protocols is performed in the continuous variable quantum
key distribution domain. First, the UD squeeze-state protocol is proposed and
the equivalence between the prepare-and-measure and entanglement-based schemes
of UD squeeze-state protocol is proved. Then, the security of the UD
squeeze-state protocol under collective attack in realistic conditions is
analyzed. Lastly, the performances of the two UD protocols are analyzed. Based
on the uniform expressions established in our study, the squeeze-state and
coherent-state protocols can be analyzed simultaneously. Our results show that
the UD squeeze-state protocols are quite different from the two-dimensional
protocols in that the UD squeeze-state protocols have a poorer performance
compared with UD coherent-state protocols, which is opposite in the case of
two-dimensional protocols.Comment: 12 pages, 8 figures
- …
