Sample records for shift quantum key

  1. Quantum displacement receiver for M-ary phase-shift-keyed coherent states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Izumi, Shuro; Takeoka, Masahiro; Fujiwara, Mikio

    2014-12-04

    We propose quantum receivers for 3- and 4-ary phase-shift-keyed (PSK) coherent state signals to overcome the standard quantum limit (SQL). Our receiver, consisting of a displacement operation and on-off detectors with or without feedforward, provides an error probability performance beyond the SQL. We show feedforward operations can tolerate the requirement for the detector specifications.

  2. 100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni; Takesue, Hiroki; Langrock, Carsten; Fejer, M. M.; Yamamoto, Yoshihisa

    2006-12-01

    We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 µm single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.

  3. Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution.

    PubMed

    Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2016-08-19

    A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.

  4. Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution

    PubMed Central

    Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654

  5. Quantum key distribution over a 72 dB channel loss using ultralow dark count superconducting single-photon detectors.

    PubMed

    Shibata, Hiroyuki; Honjo, Toshimori; Shimizu, Kaoru

    2014-09-01

    We report the first quantum key distribution (QKD) experiment over a 72 dB channel loss using superconducting nanowire single-photon detectors (SSPD, SNSPD) with the dark count rate (DCR) of 0.01 cps. The DCR of the SSPD, which is dominated by the blackbody radiation at room temperature, is blocked by introducing cold optical bandpass filter. We employ the differential phase shift QKD (DPS-QKD) scheme with a 1 GHz system clock rate. The quantum bit error rate (QBER) below 3% is achieved when the length of the dispersion shifted fiber (DSF) is 336 km (72 dB loss), which is low enough to generate secure keys.

  6. Field trial of differential-phase-shift quantum key distribution using polarization independent frequency up-conversion detectors.

    PubMed

    Honjo, T; Yamamoto, S; Yamamoto, T; Kamada, H; Nishida, Y; Tadanaga, O; Asobe, M; Inoue, K

    2007-11-26

    We report a field trial of differential phase shift quantum key distribution (QKD) using polarization independent frequency up-conversion detectors. A frequency up-conversion detector is a promising device for achieving a high key generation rate when combined with a high clock rate QKD system. However, its polarization dependence prevents it from being applied to practical QKD systems. In this paper, we employ a modified polarization diversity configuration to eliminate the polarization dependence. Applying this method, we performed a long-term stability test using a 17.6-km installed fiber. We successfully demonstrated stable operation for 6 hours and achieved a sifted key generation rate of 120 kbps and an average quantum bit error rate of 3.14 %. The sifted key generation rate was not the estimated value but the effective value, which means that the sifted key was continuously generated at a rate of 120 kbps for 6 hours.

  7. Reassigning the Structures of Natural Products Using NMR Chemical Shifts Computed with Quantum Mechanics: A Laboratory Exercise

    ERIC Educational Resources Information Center

    Palazzo, Teresa A.; Truong, Tiana T.; Wong, Shirley M. T.; Mack, Emma T.; Lodewyk, Michael W.; Harrison, Jason G.; Gamage, R. Alan; Siegel, Justin B.; Kurth, Mark J.; Tantillo, Dean J.

    2015-01-01

    An applied computational chemistry laboratory exercise is described in which students use modern quantum chemical calculations of chemical shifts to assign the structure of a recently isolated natural product. A pre/post assessment was used to measure student learning gains and verify that students demonstrated proficiency of key learning…

  8. A Hierarchical Modulation Coherent Communication Scheme for Simultaneous Four-State Continuous-Variable Quantum Key Distribution and Classical Communication

    NASA Astrophysics Data System (ADS)

    Yang, Can; Ma, Cheng; Hu, Linxi; He, Guangqiang

    2018-06-01

    We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of 10^{-3} bits/pulse to 10^{-1} bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about 10^{-7}. Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future.

  9. 2 GHz clock quantum key distribution over 260 km of standard telecom fiber.

    PubMed

    Wang, Shuang; Chen, Wei; Guo, Jun-Fu; Yin, Zhen-Qiang; Li, Hong-Wei; Zhou, Zheng; Guo, Guang-Can; Han, Zheng-Fu

    2012-03-15

    We report a demonstration of quantum key distribution (QKD) over a standard telecom fiber exceeding 50 dB in loss and 250 km in length. The differential phase shift QKD protocol was chosen and implemented with a 2 GHz system clock rate. By careful optimization of the 1 bit delayed Faraday-Michelson interferometer and the use of the superconducting single photon detector (SSPD), we achieved a quantum bit error rate below 2% when the fiber length was no more than 205 km, and of 3.45% for a 260 km fiber with 52.9 dB loss. We also improved the quantum efficiency of SSPD to obtain a high key rate for 50 km length.

  10. High performance frame synchronization for continuous variable quantum key distribution systems.

    PubMed

    Lin, Dakai; Huang, Peng; Huang, Duan; Wang, Chao; Peng, Jinye; Zeng, Guihua

    2015-08-24

    Considering a practical continuous variable quantum key distribution(CVQKD) system, synchronization is of significant importance as it is hardly possible to extract secret keys from unsynchronized strings. In this paper, we proposed a high performance frame synchronization method for CVQKD systems which is capable to operate under low signal-to-noise(SNR) ratios and is compatible with random phase shift induced by quantum channel. A practical implementation of this method with low complexity is presented and its performance is analysed. By adjusting the length of synchronization frame, this method can work well with large range of SNR values which paves the way for longer distance CVQKD.

  11. Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

    NASA Astrophysics Data System (ADS)

    Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan

    2014-10-01

    In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

  12. Faked state attacks on realistic round robin DPS quantum key distribution systems and countermeasure

    NASA Astrophysics Data System (ADS)

    Iwakoshi, T.

    2015-05-01

    In May 2014, a new quantum key distribution protocol named "Round Robin Differential-Phase-Shift Quantum Key Distribution (RR DPS QKD)" was proposed. It has a special feature that the key consumption via privacy amplification is a small constant because RR DPS QKD guarantees its security by information causality, not by information-disturbance trade-off. Therefore, the authors claimed that RR DPS QKD systems does not need to monitor the disturbance by an attacker in the quantum channel. However, this study shows that a modified Faked-State Attack (or so-called bright illumination attack) can hack a RR DPS QKD system almost perfectly if it is implemented with realistic detectors even information-causality guarantees the security of RR DPS QKD protocol. Therefore, this study also proposes a possible Measurement-Device-Independent RR DPS QKD system to avoid the modified Faked-State Attack.

  13. Establishing security of quantum key distribution without monitoring disturbance

    NASA Astrophysics Data System (ADS)

    Koashi, Masato

    2015-10-01

    In conventional quantum key distribution (QKD) protocols, the information leak to an eavesdropper is estimated through the basic principle of quantum mechanics dictated in the original version of Heisenberg's uncertainty principle. The amount of leaked information on a shared sifted key is bounded from above essentially by using information-disturbance trade-off relations, based on the amount of signal disturbance measured via randomly sampled or inserted probe signals. Here we discuss an entirely different avenue toward the private communication, which does not rely on the information disturbance trade-off relations and hence does not require a monitoring of signal disturbance. The independence of the amount of privacy amplification from that of disturbance tends to give it a high tolerance on the channel noises. The lifting of the burden of precise statistical estimation of disturbance leads to a favorable finite-key-size effect. A protocol based on the novel principle can be implemented by only using photon detectors and classical optics tools: a laser, a phase modulator, and an interferometer. The protocol resembles the differential-phase-shift QKD protocol in that both share a simple binary phase shift keying on a coherent train of weak pulses from a laser. The difference lies in the use of a variable-delay interferometer in the new protocol, which randomly changes the combination of pulse pairs to be superposed. This extra randomness has turned out to be enough to upper-bound the information extracted by the eavesdropper, regardless of how they have disturbed the quantum signal.

  14. A security proof of the round-robin differential phase shift quantum key distribution protocol based on the signal disturbance

    NASA Astrophysics Data System (ADS)

    Sasaki, Toshihiko; Koashi, Masato

    2017-06-01

    The round-robin differential phase shift (RRDPS) quantum key distribution (QKD) protocol is a unique QKD protocol whose security has not been understood through an information-disturbance trade-off relation, and a sufficient amount of privacy amplification was given independently of signal disturbance. Here, we discuss the security of the RRDPS protocol in the asymptotic regime when a good estimate of the bit error rate is available as a measure of signal disturbance. The uniqueness of the RRDPS protocol shows up as a peculiar form of information-disturbance trade-off curve. When the length of a block of pulses used for encoding and the signal disturbance are both small, it provides a significantly better key rate than that from the original security proof. On the other hand, when the block length is large, the use of the signal disturbance makes little improvement in the key rate. Our analysis will bridge a gap between the RRDPS protocol and the conventional QKD protocols.

  15. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method

    PubMed Central

    Liu, Li; Guo, Fen-Zhuo; Qin, Su-Juan; Wen, Qiao-Yan

    2017-01-01

    Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD systems. In this paper, we apply the passive decoy state method to the RRDPS QKD protocol. Not only can the more environment disturbance be tolerated, but in addition it can overcome side channel attacks on the sources. Importantly, we derive a new key generation rate formula for our RRDPS protocol using passive decoy states and enhance the key generation rate. We also compare the performance of our RRDPS QKD to that using the active decoy state method and the original RRDPS QKD without any decoy states. From numerical simulations, the performance improvement of the RRDPS QKD by our new method can be seen. PMID:28198808

  16. Running key mapping in a quantum stream cipher by the Yuen 2000 protocol

    NASA Astrophysics Data System (ADS)

    Shimizu, Tetsuya; Hirota, Osamu; Nagasako, Yuki

    2008-03-01

    A quantum stream cipher by Yuen 2000 protocol (so-called Y00 protocol or αη scheme) consisting of linear feedback shift register of short key is very attractive in implementing secure 40 Gbits/s optical data transmission, which is expected as a next-generation network. However, a basic model of the Y00 protocol with a very short key needs a careful design against fast correlation attacks as pointed out by Donnet This Brief Report clarifies an effectiveness of irregular mapping between running key and physical signals in the driver for selection of M -ary basis in the transmitter, and gives a design method. Consequently, quantum stream cipher by the Y00 protocol with our mapping has immunity against the proposed fast correlation attacks on a basic model of the Y00 protocol even if the key is very short.

  17. Implementation of a quantum metamaterial using superconducting qubits.

    PubMed

    Macha, Pascal; Oelsner, Gregor; Reiner, Jan-Michael; Marthaler, Michael; André, Stephan; Schön, Gerd; Hübner, Uwe; Meyer, Hans-Georg; Il'ichev, Evgeni; Ustinov, Alexey V

    2014-10-14

    The key issue for the implementation of a metamaterial is to demonstrate the existence of collective modes corresponding to coherent oscillations of the meta-atoms. Atoms of natural materials interact with electromagnetic fields as quantum two-level systems. Artificial quantum two-level systems can be made, for example, using superconducting nonlinear resonators cooled down to their ground state. Here we perform an experiment in which 20 of these quantum meta-atoms, so-called flux qubits, are embedded into a microwave resonator. We observe the dispersive shift of the resonator frequency imposed by the qubit metamaterial and the collective resonant coupling of eight qubits. The realized prototype represents a mesoscopic limit of naturally occurring spin ensembles and as such we demonstrate the AC-Zeeman shift of a resonant qubit ensemble. The studied system constitutes the implementation of a basic quantum metamaterial in the sense that many artificial atoms are coupled collectively to the quantized mode of a photon field.

  18. A new approach to entangling neutral atoms.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Jongmin; Martin, Michael J.; Jau, Yuan-Yu

    2016-11-01

    Our team has developed a new approach to entangling neutral atoms with a Rydberg-dressed interaction. Entangling neutral atoms is an essential key of quantum technologies such as quantum computation, many-body quantum simulation, and high-precision atomic sensors . The demonstrated Rydberg-dressed protocol involves adiabatically imposing a light shift on the ground state by coupling an excited Rydberg state with a tuned laser field. Using this technique, we have demonstrated a strong and tunable dipole - dipole interaction between two individually trapped atoms with energy shifts of order 1 MHz, which has been challenging to achieve in other protocols . During thismore » program, we experimentally demonstrated Bell-state entanglement and the isomorphism to the Jaynes - Cumming model of a Rydberg-dressed two-atom system. Our theoretical calculations of a CPHASE quantum logic gate and arbitrary Dicke state quantum control in this system encourage further work.« less

  19. Interface induced spin-orbit interaction in silicon quantum dots and prospects of scalability

    NASA Astrophysics Data System (ADS)

    Ferdous, Rifat; Wai, Kok; Veldhorst, Menno; Hwang, Jason; Yang, Henry; Klimeck, Gerhard; Dzurak, Andrew; Rahman, Rajib

    A scalable quantum computing architecture requires reproducibility over key qubit properties, like resonance frequency, coherence time etc. Randomness in these properties would necessitate individual knowledge of each qubit in a quantum computer. Spin qubits hosted in Silicon (Si) quantum dots (QD) is promising as a potential building block for a large-scale quantum computer, because of their longer coherence times. The Stark shift of the electron g-factor in these QDs has been used to selectively address multiple qubits. From atomistic tight-binding studies we investigated the effect of interface non-ideality on the Stark shift of the g-factor in a Si QD. We find that based on the location of a monoatomic step at the interface with respect to the dot center both the sign and magnitude of the Stark shift change. Thus the presence of interface steps in these devices will cause variability in electron g-factor and its Stark shift based on the location of the qubit. This behavior will also cause varying sensitivity to charge noise from one qubit to another, which will randomize the dephasing times T2*. This predicted device-to-device variability is experimentally observed recently in three qubits fabricated at a Si/Si02 interface, which validates the issues discussed.

  20. Round-robin differential-phase-shift quantum key distribution with heralded pair-coherent sources

    NASA Astrophysics Data System (ADS)

    Wang, Le; Zhao, Shengmei

    2017-04-01

    Round-robin differential-phase-shift (RRDPS) quantum key distribution (QKD) scheme provides an effective way to overcome the signal disturbance from the transmission process. However, most RRDPS-QKD schemes use weak coherent pulses (WCPs) as the replacement of the perfect single-photon source. Considering the heralded pair-coherent source (HPCS) can efficiently remove the shortcomings of WCPs, we propose a RRDPS-QKD scheme with HPCS in this paper. Both infinite-intensity decoy-state method and practical three-intensity decoy-state method are adopted to discuss the tight bound of the key rate of the proposed scheme. The results show that HPCS is a better candidate for the replacement of the perfect single-photon source, and both the key rate and the transmission distance are greatly increased in comparison with those results with WCPs when the length of the pulse trains is small. Simultaneously, the performance of the proposed scheme using three-intensity decoy states is close to that result using infinite-intensity decoy states when the length of pulse trains is small.

  1. Experimental study on discretely modulated continuous-variable quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shen Yong; Zou Hongxin; Chen Pingxing

    2010-08-15

    We present a discretely modulated continuous-variable quantum key distribution system in free space by using strong coherent states. The amplitude noise in the laser source is suppressed to the shot-noise limit by using a mode cleaner combined with a frequency shift technique. Also, it is proven that the phase noise in the source has no impact on the final secret key rate. In order to increase the encoding rate, we use broadband homodyne detectors and the no-switching protocol. In a realistic model, we establish a secret key rate of 46.8 kbits/s against collective attacks at an encoding rate of 10more » MHz for a 90% channel loss when the modulation variance is optimal.« less

  2. Relative phase shifts for metaplectic isotopies acting on mixed Gaussian states

    NASA Astrophysics Data System (ADS)

    de Gosson, Maurice A.; Nicacio, Fernando

    2018-05-01

    We address in this paper the notion of relative phase shift for mixed quantum systems. We study the Pancharatnam-Sjöqvist phase shift φ (t ) =ArgTr(U^ tρ ^ ) for metaplectic isotopies acting on Gaussian mixed states. We complete and generalize the previous results obtained by one of us, while giving rigorous proofs. The key actor in this study is the theory of the Conley-Zehnder index which is an intersection index related to the Maslov index.

  3. Multi-Excitonic Quantum Dot Molecules

    NASA Astrophysics Data System (ADS)

    Scheibner, M.; Stinaff, E. A.; Doty, M. F.; Ware, M. E.; Bracker, A. S.; Gammon, D.; Ponomarev, I. V.; Reinecke, T. L.; Korenev, V. L.

    2006-03-01

    With the ability to create coupled pairs of quantum dots, the next step towards the realization of semiconductor based quantum information processing devices can be taken. However, so far little knowledge has been gained on these artificial molecules. Our photoluminescence experiments on single InAs/GaAs quantum dot molecules provide the systematics of coupled quantum dots by delineating the spectroscopic features of several key charge configurations in such quantum systems, including X, X^+,X^2+, XX, XX^+ (with X being the neutral exciton). We extract general rules which determine the formation of molecular states of coupled quantum dots. These include the fact that quantum dot molecules provide the possibility to realize various spin configurations and to switch the electron hole exchange interaction on and off by shifting charges inside the molecule. This knowledge will be valuable in developing implementations for quantum information processing.

  4. Quantum memory receiver for superadditive communication using binary coherent states

    NASA Astrophysics Data System (ADS)

    Klimek, Aleksandra; Jachura, Michał; Wasilewski, Wojciech; Banaszek, Konrad

    2016-11-01

    We propose a simple architecture based on multimode quantum memories for collective readout of classical information keyed using a pair coherent states, exemplified by the well-known binary phase shift keying format. Such a configuration enables demonstration of the superadditivity effect in classical communication over quantum channels, where the transmission rate becomes enhanced through joint detection applied to multiple channel uses. The proposed scheme relies on the recently introduced idea to prepare Hadamard sequences of input symbols that are mapped by a linear optical transformation onto the pulse position modulation format [Guha, S. Phys. Rev. Lett. 2011, 106, 240502]. We analyze two versions of readout based on direct detection and an optional Dolinar receiver which implements the minimum-error measurement for individual detection of a binary coherent state alphabet.

  5. Quantum memory receiver for superadditive communication using binary coherent states.

    PubMed

    Klimek, Aleksandra; Jachura, Michał; Wasilewski, Wojciech; Banaszek, Konrad

    2016-11-12

    We propose a simple architecture based on multimode quantum memories for collective readout of classical information keyed using a pair coherent states, exemplified by the well-known binary phase shift keying format. Such a configuration enables demonstration of the superadditivity effect in classical communication over quantum channels, where the transmission rate becomes enhanced through joint detection applied to multiple channel uses. The proposed scheme relies on the recently introduced idea to prepare Hadamard sequences of input symbols that are mapped by a linear optical transformation onto the pulse position modulation format [Guha, S. Phys. Rev. Lett. 2011 , 106 , 240502]. We analyze two versions of readout based on direct detection and an optional Dolinar receiver which implements the minimum-error measurement for individual detection of a binary coherent state alphabet.

  6. Qubit-flip-induced cavity mode squeezing in the strong dispersive regime of the quantum Rabi model

    PubMed Central

    Joshi, Chaitanya; Irish, Elinor K.; Spiller, Timothy P.

    2017-01-01

    Squeezed states of light are a set of nonclassical states in which the quantum fluctuations of one quadrature component are reduced below the standard quantum limit. With less noise than the best stabilised laser sources, squeezed light is a key resource in the field of quantum technologies and has already improved sensing capabilities in areas ranging from gravitational wave detection to biomedical applications. In this work we propose a novel technique for generating squeezed states of a confined light field strongly coupled to a two-level system, or qubit, in the dispersive regime. Utilising the dispersive energy shift caused by the interaction, control of the qubit state produces a time-dependent change in the frequency of the light field. An appropriately timed sequence of sudden frequency changes reduces the quantum noise fluctuations in one quadrature of the field well below the standard quantum limit. The degree of squeezing and the time of generation are directly controlled by the number of frequency shifts applied. Even in the presence of realistic noise and imperfections, our protocol promises to be capable of generating a useful degree of squeezing with present experimental capabilities. PMID:28358025

  7. Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-Jing

    2012-06-01

    Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal particles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept-resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.

  8. Protein Structure Validation and Refinement Using Amide Proton Chemical Shifts Derived from Quantum Mechanics

    PubMed Central

    Christensen, Anders S.; Linnet, Troels E.; Borg, Mikael; Boomsma, Wouter; Lindorff-Larsen, Kresten; Hamelryck, Thomas; Jensen, Jan H.

    2013-01-01

    We present the ProCS method for the rapid and accurate prediction of protein backbone amide proton chemical shifts - sensitive probes of the geometry of key hydrogen bonds that determine protein structure. ProCS is parameterized against quantum mechanical (QM) calculations and reproduces high level QM results obtained for a small protein with an RMSD of 0.25 ppm (r = 0.94). ProCS is interfaced with the PHAISTOS protein simulation program and is used to infer statistical protein ensembles that reflect experimentally measured amide proton chemical shift values. Such chemical shift-based structural refinements, starting from high-resolution X-ray structures of Protein G, ubiquitin, and SMN Tudor Domain, result in average chemical shifts, hydrogen bond geometries, and trans-hydrogen bond (h3 JNC') spin-spin coupling constants that are in excellent agreement with experiment. We show that the structural sensitivity of the QM-based amide proton chemical shift predictions is needed to obtain this agreement. The ProCS method thus offers a powerful new tool for refining the structures of hydrogen bonding networks to high accuracy with many potential applications such as protein flexibility in ligand binding. PMID:24391900

  9. O+OH-->O(2)+H: A key reaction for interstellar chemistry. New theoretical results and comparison with experiment.

    PubMed

    Lique, F; Jorfi, M; Honvault, P; Halvick, P; Lin, S Y; Guo, H; Xie, D Q; Dagdigian, P J; Kłos, J; Alexander, M H

    2009-12-14

    We report extensive, fully quantum, time-independent (TID) calculations of cross sections at low collision energies and rate constants at low temperatures for the O+OH reaction, of key importance in the production of molecular oxygen in cold, dark, interstellar clouds and in the chemistry of the Earth's atmosphere. Our calculations are compared with TID calculations within the J-shifting approximation, with wave-packet calculations, and with quasiclassical trajectory calculations. The fully quantum TID calculations yield rate constants higher than those from the more approximate methods and are qualitatively consistent with a low-temperature extrapolation of earlier experimental values but not with the most recent experiments at the lowest temperatures.

  10. Measurements of the intrinsic quantum efficiency and absorption length of tetraphenyl butadiene thin films in the vacuum ultraviolet regime

    NASA Astrophysics Data System (ADS)

    Benson, Christopher; Gann, Gabriel Orebi; Gehman, Victor

    2018-04-01

    A key enabling technology for many liquid noble gas (LNG) detectors is the use of the common wavelength shifting medium tetraphenyl butadiene (TPB). TPB thin films are used to shift ultraviolet scintillation light into the visible spectrum for detection and event reconstruction. Understanding the wavelength shifting efficiency and optical properties of these films are critical aspects in detector performance and modeling and hence in the ultimate physics sensitivity of such experiments. This article presents the first measurements of the room-temperature microphysical quantum efficiency for vacuum-deposited TPB thin films - a result that is independent of the optics of the TPB or substrate. Also presented are measurements of the absorption length in the vacuum ultraviolet regime, the secondary re-emission efficiency, and more precise results for the "black-box" efficiency across a broader spectrum of wavelengths than previous results. The low-wavelength sensitivity, in particular, would allow construction of LNG scintillator detectors with lighter elements (Ne, He) to target light mass WIMPs.

  11. Gradient Echo Quantum Memory in Warm Atomic Vapor

    PubMed Central

    Pinel, Olivier; Hosseini, Mahdi; Sparkes, Ben M.; Everett, Jesse L.; Higginbottom, Daniel; Campbell, Geoff T.; Lam, Ping Koy; Buchler, Ben C.

    2013-01-01

    Gradient echo memory (GEM) is a protocol for storing optical quantum states of light in atomic ensembles. The primary motivation for such a technology is that quantum key distribution (QKD), which uses Heisenberg uncertainty to guarantee security of cryptographic keys, is limited in transmission distance. The development of a quantum repeater is a possible path to extend QKD range, but a repeater will need a quantum memory. In our experiments we use a gas of rubidium 87 vapor that is contained in a warm gas cell. This makes the scheme particularly simple. It is also a highly versatile scheme that enables in-memory refinement of the stored state, such as frequency shifting and bandwidth manipulation. The basis of the GEM protocol is to absorb the light into an ensemble of atoms that has been prepared in a magnetic field gradient. The reversal of this gradient leads to rephasing of the atomic polarization and thus recall of the stored optical state. We will outline how we prepare the atoms and this gradient and also describe some of the pitfalls that need to be avoided, in particular four-wave mixing, which can give rise to optical gain. PMID:24300586

  12. Gradient echo quantum memory in warm atomic vapor.

    PubMed

    Pinel, Olivier; Hosseini, Mahdi; Sparkes, Ben M; Everett, Jesse L; Higginbottom, Daniel; Campbell, Geoff T; Lam, Ping Koy; Buchler, Ben C

    2013-11-11

    Gradient echo memory (GEM) is a protocol for storing optical quantum states of light in atomic ensembles. The primary motivation for such a technology is that quantum key distribution (QKD), which uses Heisenberg uncertainty to guarantee security of cryptographic keys, is limited in transmission distance. The development of a quantum repeater is a possible path to extend QKD range, but a repeater will need a quantum memory. In our experiments we use a gas of rubidium 87 vapor that is contained in a warm gas cell. This makes the scheme particularly simple. It is also a highly versatile scheme that enables in-memory refinement of the stored state, such as frequency shifting and bandwidth manipulation. The basis of the GEM protocol is to absorb the light into an ensemble of atoms that has been prepared in a magnetic field gradient. The reversal of this gradient leads to rephasing of the atomic polarization and thus recall of the stored optical state. We will outline how we prepare the atoms and this gradient and also describe some of the pitfalls that need to be avoided, in particular four-wave mixing, which can give rise to optical gain.

  13. Apparent bandgap shift in the internal quantum efficiency for solar cells with back reflectors

    NASA Astrophysics Data System (ADS)

    Steiner, M. A.; Perl, E. E.; Geisz, J. F.; Friedman, D. J.; Jain, N.; Levi, D.; Horner, G.

    2017-04-01

    We demonstrate that in solar cells with highly reflective back mirrors, the measured internal quantum efficiency exhibits a shift in bandgap relative to the measured external quantum efficiency. The shift arises from the fact that the measured reflectance at the front surface includes a superposition of waves reflecting from the front and back surfaces. We quantify the magnitude of the apparent shift and discuss the errors that can result in determination of quantities such as the photocurrent. Because of this apparent shift, it is important the bandgap be determined from the external quantum efficiency.

  14. Apparent bandgap shift in the internal quantum efficiency for solar cells with back reflectors

    DOE PAGES

    Steiner, Myles A.; Perl, E. E.; Geisz, J. F.; ...

    2017-04-28

    Here, we demonstrate that in solar cells with highly reflective back mirrors, the measured internal quantum efficiency exhibits a shift in bandgap relative to the measured external quantum efficiency. The shift arises from the fact that the measured reflectance at the front surface includes a superposition of waves reflecting from the front and back surfaces. We quantify the magnitude of the apparent shift and discuss the errors that can result in determination of quantities such as the photocurrent. Because of this apparent shift, it is important that the bandgap be determined from the external quantum efficiency.

  15. Bit-rate transparent DPSK demodulation scheme based on injection locking FP-LD

    NASA Astrophysics Data System (ADS)

    Feng, Hanlin; Xiao, Shilin; Yi, Lilin; Zhou, Zhao; Yang, Pei; Shi, Jie

    2013-05-01

    We propose and demonstrate a bit-rate transparent differential phase shift-keying (DPSK) demodulation scheme based on injection locking multiple-quantum-well (MQW) strained InGaAsP FP-LD. By utilizing frequency deviation generated by phase modulation and unstable injection locking state with Fabry-Perot laser diode (FP-LD), DPSK to polarization shift-keying (PolSK) and PolSK to intensity modulation (IM) format conversions are realized. We analyze bit error rate (BER) performance of this demodulation scheme. Experimental results show that different longitude modes, bit rates and seeding power have influences on demodulation performance. We achieve error free DPSK signal demodulation under various bit rates of 10 Gbit/s, 5 Gbit/s, 2.5 Gbit/s and 1.25 Gbit/s with the same demodulation setting.

  16. Effects of quantum confinement and shape on band gap of core/shell quantum dots and nanowires

    NASA Astrophysics Data System (ADS)

    Gao, Faming

    2011-05-01

    A quantum confinement model for nanocrystals developed is extended to study for the optical gap shifts in core/shell quantum dots and nanowires. The chemical bond properties and gap shifts in the InP/ZnS, CdSe/CdS, CdSe/ZnS, and CdTe/ZnS core/shell quantum dots are calculated in detail. The calculated band gaps are in excellent agreement with experimental values. The effects of structural taping and twinning on quantum confinement of InP and Si nanowires are elucidated. It is found theoretically that a competition between the positive Kubo energy-gap shift and the negative surface energy shift plays the crucial role in the optical gaps of these nanosystems.

  17. All-optical XOR logic gate using intersubband transition in III-V quantum well materials.

    PubMed

    Feng, Jijun; Akimoto, Ryoichi; Gozu, Shin-ichiro; Mozume, Teruo

    2014-06-02

    A monolithically integrated all-optical exclusive-OR (XOR) logic gate is experimentally demonstrated based on a Michelson interferometer (MI) gating device in InGaAs/AlAsSb coupled double quantum wells (CDQWs). The MI arms can convert the pump data with return-to-zero ON-OFF keying (RZ OOK) to binary phase-shift keying (BPSK) format, then two BPSK signals can interfere with each other for realizing a desired logical operation. All-optical format conversion from the RZ OOK to BPSK is based on the cross-phase modulation to the transverse electric (TE) probe wave, which is caused by the intersubband transition excited by the transverse magnetic (TM) pump light. Bit error rate measurements show that error free operation for both BPSK format conversion and XOR logical operation can be achieved.

  18. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    NASA Astrophysics Data System (ADS)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  19. Enhanced autocompensating quantum cryptography system.

    PubMed

    Bethune, Donald S; Navarro, Martha; Risk, William P

    2002-03-20

    We have improved the hardware and software of our autocompensating system for quantum key distribution by replacing bulk optical components at the end stations with fiber-optic equivalents and implementing software that synchronizes end-station activities, communicates basis choices, corrects errors, and performs privacy amplification over a local area network. The all-fiber-optic arrangement provides stable, efficient, and high-contrast routing of the photons. The low-bit error rate leads to high error-correction efficiency and minimizes data sacrifice during privacy amplification. Characterization measurements made on a number of commercial avalanche photodiodes are presented that highlight the need for improved devices tailored specifically for quantum information applications. A scheme for frequency shifting the photons returning from Alice's station to allow them to be distinguished from backscattered noise photons is also described.

  20. Chip-based quantum key distribution

    NASA Astrophysics Data System (ADS)

    Sibson, P.; Erven, C.; Godfrey, M.; Miki, S.; Yamashita, T.; Fujiwara, M.; Sasaki, M.; Terai, H.; Tanner, M. G.; Natarajan, C. M.; Hadfield, R. H.; O'Brien, J. L.; Thompson, M. G.

    2017-02-01

    Improvement in secure transmission of information is an urgent need for governments, corporations and individuals. Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly grown from proof-of-concept to robust demonstrations and deployment of commercial systems. Despite these advances, QKD has not been widely adopted, and large-scale deployment will likely require chip-based devices for improved performance, miniaturization and enhanced functionality. Here we report low error rate, GHz clocked QKD operation of an indium phosphide transmitter chip and a silicon oxynitride receiver chip--monolithically integrated devices using components and manufacturing processes from the telecommunications industry. We use the reconfigurability of these devices to demonstrate three prominent QKD protocols--BB84, Coherent One Way and Differential Phase Shift--with performance comparable to state-of-the-art. These devices, when combined with integrated single photon detectors, pave the way for successfully integrating QKD into future telecommunications networks.

  1. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Steiner, Myles A.; Perl, E. E.; Geisz, J. F.

    Here, we demonstrate that in solar cells with highly reflective back mirrors, the measured internal quantum efficiency exhibits a shift in bandgap relative to the measured external quantum efficiency. The shift arises from the fact that the measured reflectance at the front surface includes a superposition of waves reflecting from the front and back surfaces. We quantify the magnitude of the apparent shift and discuss the errors that can result in determination of quantities such as the photocurrent. Because of this apparent shift, it is important that the bandgap be determined from the external quantum efficiency.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xu, Xin-Ping, E-mail: xuxp@mail.ihep.ac.cn; Ide, Yusuke

    In the literature, there are numerous studies of one-dimensional discrete-time quantum walks (DTQWs) using a moving shift operator. However, there is no exact solution for the limiting probability distributions of DTQWs on cycles using a general coin or swapping shift operator. In this paper, we derive exact solutions for the limiting probability distribution of quantum walks using a general coin and swapping shift operator on cycles for the first time. Based on the exact solutions, we show how to generate symmetric quantum walks and determine the condition under which a symmetric quantum walk appears. Our results suggest that choosing various coinmore » and initial state parameters can achieve a symmetric quantum walk. By defining a quantity to measure the variation of symmetry, deviation and mixing time of symmetric quantum walks are also investigated.« less

  4. Limitations on quantum key repeaters.

    PubMed

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  5. Space division multiplexing chip-to-chip quantum key distribution.

    PubMed

    Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2017-09-29

    Quantum cryptography is set to become a key technology for future secure communications. However, to get maximum benefit in communication networks, transmission links will need to be shared among several quantum keys for several independent users. Such links will enable switching in quantum network nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum keys are obtained, which are useful in crypto-systems and future quantum network.

  6. Nonadiabatic conditional geometric phase shift with NMR.

    PubMed

    Xiang-Bin, W; Keiji, M

    2001-08-27

    A conditional geometric phase shift gate, which is fault tolerant to certain types of errors due to its geometric nature, was realized recently via nuclear magnetic resonance (NMR) under adiabatic conditions. However, in quantum computation, everything must be completed within the decoherence time. The adiabatic condition makes any fast conditional Berry phase (cyclic adiabatic geometric phase) shift gate impossible. Here we show that by using a newly designed sequence of simple operations with an additional vertical magnetic field, the conditional geometric phase shift gate can be run nonadiabatically. Therefore geometric quantum computation can be done at the same rate as usual quantum computation.

  7. Quantum correlations of lights in macroscopic environments

    NASA Astrophysics Data System (ADS)

    Sua, Yong Meng

    This dissertation presents a detailed study in exploring quantum correlations of lights in macroscopic environments. We have explored quantum correlations of single photons, weak coherent states, and polarization-correlated/polarization-entangled photons in macroscopic environments. These included macroscopic mirrors, macroscopic photon number, spatially separated observers, noisy photons source and propagation medium with loss or disturbances. We proposed a measurement scheme for observing quantum correlations and entanglement in the spatial properties of two macroscopic mirrors using single photons spatial compass state. We explored the phase space distribution features of spatial compass states, such as chessboard pattern by using the Wigner function. The displacement and tilt correlations of the two mirrors were manifested through the propensities of the compass states. This technique can be used to extract Einstein-Podolsky-Rosen correlations (EPR) of the two mirrors. We then formulated the discrete-like property of the propensity P b(m,n), which can be used to explore environmental perturbed quantum jumps of the EPR correlations in phase space. With single photons spatial compass state, the variances in position and momentum are much smaller than standard quantum limit when using a Gaussian TEM 00 beam. We observed intrinsic quantum correlations of weak coherent states between two parties through balanced homodyne detection. Our scheme can be used as a supplement to decoy-state BB84 protocol and differential phase-shift QKD protocol. We prepared four types of bipartite correlations +/- cos2(theta1 +/- theta 2) that shared between two parties. We also demonstrated bits correlations between two parties separated by 10 km optical fiber. The bits information will be protected by the large quantum phase fluctuation of weak coherent states, adding another physical layer of security to these protocols for quantum key distribution. Using 10 m of highly nonlinear fiber (HNLF) at 77 K, we observed coincidence to accidental-coincidence ratio of 130+/-5 for correlated photon-pair and Two-Photon Interference visibility >98% entangled photon-pair. We also verified the non-local behavior of polarization-entangled photon pair by violating Clauser-Horne-Shimony-Holt Bell's inequality by more than 12 standard deviations. With the HNLF at 300 K (77 K), photon-pair production rate about factor 3(2) higher than a 300 m dispersion-shifted fiber is observed. Then, we studied quantum correlation and interference of photon-pairs; with one photon of the photon-pair experiencing multiple scattering in a random medium. We observed that depolarization noise photon in multiple scattering degrading the purity of photon-pair, and the existence of Raman noise photon in a photon-pair source will contribute to the depolarization affect. We found that quantum correlation of polarization-entangled photon-pair is better preserved than polarization-correlated photon-pair as one photon of the photon-pair scattered through a random medium. Our findings showed that high purity polarization-entangled photon-pair is better candidate for long distance quantum key distribution.

  8. 1.5- μm single photon counting using polarization-independent up-conversion detector

    NASA Astrophysics Data System (ADS)

    Takesue, Hiroki; Diamanti, Eleni; Langrock, Carsten; Fejer, M. M.; Yamamoto, Yoshihisa

    2006-12-01

    We report a 1.5- μm band polarization independent single photon detector based on frequency up-conversion in periodically poled lithium niobate (PPLN) waveguides. To overcome the polarization dependence of the PPLN waveguides, we employed a polarization diversity configuration composed of two up-conversion detectors connected with a polarization beam splitter. We experimentally confirmed polarization independent single photon counting using our detector. We undertook a proof-of-principle differential phase shift quantum key distribution experiment using the detector, and confirmed that the sifted key rate and error rate remained stable when the polarization state was changed during single photon transmission.

  9. Relativistic quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: molotkov@issp.ac.ru

    2011-03-15

    A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the protocol uses additional restrictions imposed by special relativity theory. Unlike all existing quantum key distribution protocols, this protocol ensures key secrecy for a not strictly one-photon source of quantum states and an arbitrary length of a quantum communication channel.

  10. Quantum limited performance of optical receivers

    NASA Astrophysics Data System (ADS)

    Farrell, Thomas C.

    2018-05-01

    While the fundamental performance limit for traditional radio frequency (RF) communications is often set by background noise on the channel, the fundamental limit for optical communications is set by the quantum nature of light. Both types of systems are based on electro-magnetic waves, differing only in carrier frequency. It is, in fact, the frequency that determines which of these limits dominates. We explore this in the first part of this paper. This leads to a difference in methods of analysis of the two different types of systems. While equations predicting the probability of bit error for RF systems are usually based on the signal to background noise ratio, similar equations for optical systems are often based on the physics of the quantum limit and are simply a function of the detected signal energy received per bit. These equations are derived in the second part of this paper for several frequently used modulation schemes: On-off keying (OOK), pulse position modulation (PPM), and binary differential phase shift keying (DPSK). While these equations ignore the effects of background noise and non-quantum internal noise sources in the detector and receiver electronics, they provide a useful bound for obtainable performance of optical communication systems. For example, these equations may be used in initial link budgets to assess the feasibility of system architectures, even before specific receiver designs are considered.

  11. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  12. The effective theory of shift-symmetric cosmologies

    NASA Astrophysics Data System (ADS)

    Finelli, Bernardo; Goon, Garrett; Pajer, Enrico; Santoni, Luca

    2018-05-01

    A shift symmetry is a ubiquitous ingredient in inflationary models, both in effective constructions and in UV-finite embeddings such as string theory. It has also been proposed to play a key role in certain Dark Energy and Dark Matter models. Despite the crucial role it plays in cosmology, the observable, model independent consequences of a shift symmetry are yet unknown. Here, assuming an exact shift symmetry, we derive these consequences for single-clock cosmologies within the framework of the Effective Field Theory of Inflation. We find an infinite set of relations among the otherwise arbitrary effective coefficients, which relate non-Gaussianity to their time dependence. For example, to leading order in derivatives, these relations reduce the infinitely many free functions in the theory to just a single one. Our Effective Theory of shift-symmetric cosmologies describes, among other systems, perfect and imperfect superfluids coupled to gravity and driven superfluids in the decoupling limit. Our results are the first step to determine observationally whether a shift symmetry is at play in the laws of nature and whether it is broken by quantum gravity effects.

  13. Lamb Shift in Nonrelativistic Quantum Electrodynamics.

    ERIC Educational Resources Information Center

    Grotch, Howard

    1981-01-01

    The bound electron self-energy or Lamb shift is calculated in nonrelativistic quantum electrodynamics. Retardation is retained and also an interaction previously dropped in other nonrelativistic approaches is kept. Results are finite without introducing a cutoff and lead to a Lamb shift in hydrogen of 1030.9 MHz. (Author/JN)

  14. Quantum exhaustive key search with simplified-DES as a case study.

    PubMed

    Almazrooie, Mishal; Samsudin, Azman; Abdullah, Rosni; Mutter, Kussay N

    2016-01-01

    To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover's algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text], the key can be recovered in [Formula: see text] computational steps.

  15. Quantum cryptography and applications in the optical fiber network

    NASA Astrophysics Data System (ADS)

    Luo, Yuhui

    2005-09-01

    Quantum cryptography, as part of quantum information and communications, can provide absolute security for information transmission because it is established on the fundamental laws of quantum theory, such as the principle of uncertainty, No-cloning theorem and quantum entanglement. In this thesis research, a novel scheme to implement quantum key distribution based on multiphoton entanglement with a new protocol is proposed. Its advantages are: a larger information capacity can be obtained with a longer transmission distance and the detection of multiple photons is easier than that of a single photon. The security and attacks pertaining to such a system are also studied. Next, a quantum key distribution over wavelength division multiplexed (WDM) optical fiber networks is realized. Quantum key distribution in networks is a long-standing problem for practical applications. Here we combine quantum cryptography and WDM to solve this problem because WDM technology is universally deployed in the current and next generation fiber networks. The ultimate target is to deploy quantum key distribution over commercial networks. The problems arising from the networks are also studied in this part. Then quantum key distribution in multi-access networks using wavelength routing technology is investigated in this research. For the first time, quantum cryptography for multiple individually targeted users has been successfully implemented in sharp contrast to that using the indiscriminating broadcasting structure. It overcomes the shortcoming that every user in the network can acquire the quantum key signals intended to be exchanged between only two users. Furthermore, a more efficient scheme of quantum key distribution is adopted, hence resulting in a higher key rate. Lastly, a quantum random number generator based on quantum optics has been experimentally demonstrated. This device is a key component for quantum key distribution as it can create truly random numbers, which is an essential requirement to perform quantum key distribution. This new generator is composed of a single optical fiber coupler with fiber pigtails, which can be easily used in optical fiber communications.

  16. Experimental demonstration of quantum digital signatures over 43 dB channel loss using differential phase shift quantum key distribution.

    PubMed

    Collins, Robert J; Amiri, Ryan; Fujiwara, Mikio; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Sasaki, Masahide; Andersson, Erika; Buller, Gerald S

    2017-06-12

    Ensuring the integrity and transferability of digital messages is an important challenge in modern communications. Although purely mathematical approaches exist, they usually rely on the computational complexity of certain functions, in which case there is no guarantee of long-term security. Alternatively, quantum digital signatures offer security guaranteed by the physical laws of quantum mechanics. Prior experimental demonstrations of quantum digital signatures in optical fiber have typically been limited to operation over short distances and/or operated in a laboratory environment. Here we report the experimental transmission of quantum digital signatures over channel losses of up to 42.8 ± 1.2 dB in a link comprised of 90 km of installed fiber with additional optical attenuation introduced to simulate longer distances. The channel loss of 42.8 ± 1.2 dB corresponds to an equivalent distance of 134.2 ± 3.8 km and this represents the longest effective distance and highest channel loss that quantum digital signatures have been shown to operate over to date. Our theoretical model indicates that this represents close to the maximum possible channel attenuation for this quantum digital signature protocol, defined as the loss for which the signal rate is comparable to the dark count rate of the detectors.

  17. Distinguishability of quantum states and shannon complexity in quantum cryptography

    NASA Astrophysics Data System (ADS)

    Arbekov, I. M.; Molotkov, S. N.

    2017-07-01

    The proof of the security of quantum key distribution is a rather complex problem. Security is defined in terms different from the requirements imposed on keys in classical cryptography. In quantum cryptography, the security of keys is expressed in terms of the closeness of the quantum state of an eavesdropper after key distribution to an ideal quantum state that is uncorrelated to the key of legitimate users. A metric of closeness between two quantum states is given by the trace metric. In classical cryptography, the security of keys is understood in terms of, say, the complexity of key search in the presence of side information. In quantum cryptography, side information for the eavesdropper is given by the whole volume of information on keys obtained from both quantum and classical channels. The fact that the mathematical apparatuses used in the proof of key security in classical and quantum cryptography are essentially different leads to misunderstanding and emotional discussions [1]. Therefore, one should be able to answer the question of how different cryptographic robustness criteria are related to each other. In the present study, it is shown that there is a direct relationship between the security criterion in quantum cryptography, which is based on the trace distance determining the distinguishability of quantum states, and the criterion in classical cryptography, which uses guesswork on the determination of a key in the presence of side information.

  18. Semiquantum key distribution with secure delegated quantum computation

    PubMed Central

    Li, Qin; Chan, Wai Hong; Zhang, Shengyu

    2016-01-01

    Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384

  19. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    PubMed Central

    Cao, Hao; Ma, Wenping

    2017-01-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610

  20. Examination of China’s performance and thematic evolution in quantum cryptography research using quantitative and computational techniques

    PubMed Central

    2018-01-01

    This study performed two phases of analysis to shed light on the performance and thematic evolution of China’s quantum cryptography (QC) research. First, large-scale research publication metadata derived from QC research published from 2001–2017 was used to examine the research performance of China relative to that of global peers using established quantitative and qualitative measures. Second, this study identified the thematic evolution of China’s QC research using co-word cluster network analysis, a computational science mapping technique. The results from the first phase indicate that over the past 17 years, China’s performance has evolved dramatically, placing it in a leading position. Among the most significant findings is the exponential rate at which all of China’s performance indicators (i.e., Publication Frequency, citation score, H-index) are growing. China’s H-index (a normalized indicator) has surpassed all other countries’ over the last several years. The second phase of analysis shows how China’s main research focus has shifted among several QC themes, including quantum-key-distribution, photon-optical communication, network protocols, and quantum entanglement with an emphasis on applied research. Several themes were observed across time periods (e.g., photons, quantum-key-distribution, secret-messages, quantum-optics, quantum-signatures); some themes disappeared over time (e.g., computer-networks, attack-strategies, bell-state, polarization-state), while others emerged more recently (e.g., quantum-entanglement, decoy-state, unitary-operation). Findings from the first phase of analysis provide empirical evidence that China has emerged as the global driving force in QC. Considering China is the premier driving force in global QC research, findings from the second phase of analysis provide an understanding of China’s QC research themes, which can provide clarity into how QC technologies might take shape. QC and science and technology policy researchers can also use these findings to trace previous research directions and plan future lines of research. PMID:29385151

  1. Examination of China's performance and thematic evolution in quantum cryptography research using quantitative and computational techniques.

    PubMed

    Olijnyk, Nicholas V

    2018-01-01

    This study performed two phases of analysis to shed light on the performance and thematic evolution of China's quantum cryptography (QC) research. First, large-scale research publication metadata derived from QC research published from 2001-2017 was used to examine the research performance of China relative to that of global peers using established quantitative and qualitative measures. Second, this study identified the thematic evolution of China's QC research using co-word cluster network analysis, a computational science mapping technique. The results from the first phase indicate that over the past 17 years, China's performance has evolved dramatically, placing it in a leading position. Among the most significant findings is the exponential rate at which all of China's performance indicators (i.e., Publication Frequency, citation score, H-index) are growing. China's H-index (a normalized indicator) has surpassed all other countries' over the last several years. The second phase of analysis shows how China's main research focus has shifted among several QC themes, including quantum-key-distribution, photon-optical communication, network protocols, and quantum entanglement with an emphasis on applied research. Several themes were observed across time periods (e.g., photons, quantum-key-distribution, secret-messages, quantum-optics, quantum-signatures); some themes disappeared over time (e.g., computer-networks, attack-strategies, bell-state, polarization-state), while others emerged more recently (e.g., quantum-entanglement, decoy-state, unitary-operation). Findings from the first phase of analysis provide empirical evidence that China has emerged as the global driving force in QC. Considering China is the premier driving force in global QC research, findings from the second phase of analysis provide an understanding of China's QC research themes, which can provide clarity into how QC technologies might take shape. QC and science and technology policy researchers can also use these findings to trace previous research directions and plan future lines of research.

  2. Equivalence principle for quantum systems: dephasing and phase shift of free-falling particles

    NASA Astrophysics Data System (ADS)

    Anastopoulos, C.; Hu, B. L.

    2018-02-01

    We ask the question of how the (weak) equivalence principle established in classical gravitational physics should be reformulated and interpreted for massive quantum objects that may also have internal degrees of freedom (dof). This inquiry is necessary because even elementary concepts like a classical trajectory are not well defined in quantum physics—trajectories originating from quantum histories become viable entities only under stringent decoherence conditions. From this investigation we posit two logically and operationally distinct statements of the equivalence principle for quantum systems. Version A: the probability distribution of position for a free-falling particle is the same as the probability distribution of a free particle, modulo a mass-independent shift of its mean. Version B: any two particles with the same velocity wave-function behave identically in free fall, irrespective of their masses. Both statements apply to all quantum states, including those without a classical correspondence, and also for composite particles with quantum internal dof. We also investigate the consequences of the interaction between internal and external dof induced by free fall. For a class of initial states, we find dephasing occurs for the translational dof, namely, the suppression of the off-diagonal terms of the density matrix, in the position basis. We also find a gravitational phase shift in the reduced density matrix of the internal dof that does not depend on the particle’s mass. For classical states, the phase shift has a natural classical interpretation in terms of gravitational red-shift and special relativistic time-dilation.

  3. Polar codes for achieving the classical capacity of a quantum channel

    NASA Astrophysics Data System (ADS)

    Guha, Saikat; Wilde, Mark

    2012-02-01

    We construct the first near-explicit, linear, polar codes that achieve the capacity for classical communication over quantum channels. The codes exploit the channel polarization phenomenon observed by Arikan for classical channels. Channel polarization is an effect in which one can synthesize a set of channels, by ``channel combining'' and ``channel splitting,'' in which a fraction of the synthesized channels is perfect for data transmission while the other fraction is completely useless for data transmission, with the good fraction equal to the capacity of the channel. Our main technical contributions are threefold. First, we demonstrate that the channel polarization effect occurs for channels with classical inputs and quantum outputs. We then construct linear polar codes based on this effect, and the encoding complexity is O(N log N), where N is the blocklength of the code. We also demonstrate that a quantum successive cancellation decoder works well, i.e., the word error rate decays exponentially with the blocklength of the code. For a quantum channel with binary pure-state outputs, such as a binary-phase-shift-keyed coherent-state optical communication alphabet, the symmetric Holevo information rate is in fact the ultimate channel capacity, which is achieved by our polar code.

  4. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  5. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  6. Large Exciton Energy Shifts by Reversible Surface Exchange in 2D II-VI Nanocrystals.

    PubMed

    Zhou, Yang; Wang, Fudong; Buhro, William E

    2015-12-09

    Reaction of n-octylamine-passivated {CdSe[n-octylamine](0.53±0.06)} quantum belts with anhydrous metal carboxylates M(oleate)2 (M = Cd, Zn) results in a rapid exchange of the L-type amine passivation for Z-type M(oleate)2 passivation. The cadmium-carboxylate derivative is determined to have the composition {CdSe[Cd(oleate)2](0.19±0.02)}. The morphologies and crystal structures of the quantum belts are largely unaffected by the exchange processes. Addition of n-octylamine or oleylamine to the M(oleate)2-passivated quantum belts removes M(oleate)2 and restores the L-type amine passivation. Analogous, reversible surface exchanges are also demonstrated for CdS quantum platelets. The absorption and emission spectra of the quantum belts and platelets are reversibly shifted to lower energy by M(oleate)2 passivation vs amine passivation. The largest shift of 140 meV is observed for the Cd(oleate)2-passivated CdSe quantum belts. These shifts are attributed entirely to changes in the strain states in the Zn(oleate)2-passivated nanocrystals, whereas changes in strain states and confinement dimensions contribute roughly equally to the shifts in the Cd(oleate)2-passivated nanocrystals. Addition of Cd(oleate)2, which electronically couples to the nanocrystal lattices, increases the effective thickness of the belts and platelets by approximately a half of a monolayer, thus increasing the confinement dimension.

  7. Bandgap Shifting of an Ultra-Thin InGaAs/InP Quantum Well Infrared Photodetector

    NASA Technical Reports Server (NTRS)

    Sengupta, D. K.; Gunapala, S. D.; Bandara, S. V.; Liu, J. K.; Luong, E.; Hong, W.; Mumolo, J.; Bae, Y.; Stillman, G. E.; Jackson, S. L.; hide

    1998-01-01

    We demonstrate that SiO(sub 2) cap annealing in the ultra-thin p-type InGaAs/InP quantum wells can be used to produce large blue shifts of the band edge. A substantial bandgap blue shift, as much a 292.5 meV at 900 degrees C have been measured and the value of the bandgap shift can be controlled by the anneal time.

  8. Security of a single-state semi-quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  9. From quantum physics to digital communication: Single sideband continuous phase modulation

    NASA Astrophysics Data System (ADS)

    Farès, Haïfa; Christian Glattli, D.; Louët, Yves; Palicot, Jacques; Moy, Christophe; Roulleau, Preden

    2018-01-01

    In the present paper, we propose a new frequency-shift keying continuous phase modulation (FSK-CPM) scheme having, by essence, the interesting feature of single-sideband (SSB) spectrum providing a very compact frequency occupation. First, the original principle, inspired from quantum physics (levitons), is presented. Besides, we address the problem of low-complexity coherent detection of this new waveform, based on orthonormal wave functions used to perform matched filtering for efficient demodulation. Consequently, this shows that the proposed modulation can operate using existing digital communication technology, since only well-known operations are performed (e.g., filtering, integration). This SSB property can be exploited to allow large bit rates transmissions at low carrier frequency without caring about image frequency degradation effects typical of ordinary double-sideband signals. xml:lang="fr"

  10. Wavelength Shifting in InP based Ultra-thin Quantum Well Infrared Photodetectors

    NASA Technical Reports Server (NTRS)

    Sengupta, D. K.; Gunapala, S. D.; Bandara, S. V.; Pool, F.; Liu, J. K.; McKelvy, M.

    1998-01-01

    We have demonstrated red-shifting of the wavelength response of a bound-to-continuum p-type ultra-thin InGaAs/Inp quantum well infrared photodetector after growth via rapid thermal annealing. Compared to the as-grown detector, the peak spectral response of the annealed detector was shifted to longer wavelength without any major degradation in responsivity characteristics.

  11. Performance of device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Zhu; Zhao, Qi; Ma, Xiongfeng

    2016-07-01

    Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .

  12. Changes to Quantum Cryptography

    NASA Astrophysics Data System (ADS)

    Sakai, Yasuyuki; Tanaka, Hidema

    Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the “unconditionally” secure infrastructure. We also have many cryptographic tools that are based on “modern cryptography” at the present time. They are being used in an effort to guarantee secure communication over open networks such as the Internet. Unfortunately, their ultimate efficacy is in doubt. Quantum key distribution systems are believed to be close to practical and commercial use. In this paper, we discuss what we should do to apply quantum cryptography to our communications. We also discuss how quantum key distribution can be combined with or used to replace cryptographic tools based on modern cryptography.

  13. Quantum key distribution without the wavefunction

    NASA Astrophysics Data System (ADS)

    Niestegge, Gerd

    A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and abstract access than commonly thought. The results include some generalizations of the Hilbert space version of quantum key distribution, but are based upon a general nonclassical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution; this is a purely algebraic property of the quantum logic and represents the transition probability between the outcomes of two consecutive quantum measurements.

  14. Effect of substrates and thickness on optical properties in atomic layer deposition grown ZnO thin films

    NASA Astrophysics Data System (ADS)

    Pal, Dipayan; Singhal, Jaya; Mathur, Aakash; Singh, Ajaib; Dutta, Surjendu; Zollner, Stefan; Chattopadhyay, Sudeshna

    2017-11-01

    Atomic Layer Deposition technique was used to grow high quality, very low roughness, crystalline, Zinc Oxide (ZnO) thin films on silicon (Si) and fused quartz (SiO2) substrates to study the optical properties. Spectroscopic ellipsometry results of ZnO/Si system, staggered type-II quantum well, demonstrate that there is a significant drop in the magnitudes of both the real and imaginary parts of complex dielectric constants and in near-band gap absorption along with a blue shift of the absorption edge with decreasing film thickness at and below ∼20 nm. Conversely, UV-vis absorption spectroscopy of ZnO/SiO2, thin type-I quantum well, consisting of a narrower-band gap semiconductor grown on a wider-band gap (insulator) substrate, shows the similar thickness dependent blue-shift of the absorption edge but with an increase in the magnitude of near-band gap absorption with decreasing film thickness. Thickness dependent blue shift, energy vs. 1/d2, in two different systems, ZnO/Si and ZnO/SiO2, show a difference in their slopes. The observed phenomena can be consistently explained by the corresponding exciton (or carrier/s) deconfinement and confinement effects at the ZnO/Si and ZnO/SiO2 interface respectively, where Tanguy-Elliott amplitude pre-factor plays the key role through the electron-hole overlap factor at the interface.

  15. Novel single photon sources for new generation of quantum communications

    DTIC Science & Technology

    2017-06-13

    be used as building blocks for quantum cryptography and quantum key distribution There were numerous important achievements for the projects in the...single photon sources that will be used as build- ing blocks for quantum cryptography and quantum key distribution There were numerous im- portant...and enable absolutely secured information transfer between distant nodes – key prerequisite for quantum cryptography . Experiment: the experimental

  16. Interfacial properties at the organic-metal interface probed using quantum well states

    NASA Astrophysics Data System (ADS)

    Lin, Meng-Kai; Nakayama, Yasuo; Wang, Chin-Yung; Hsu, Jer-Chia; Pan, Chih-Hao; Machida, Shin-ichi; Pi, Tun-Wen; Ishii, Hisao; Tang, S.-J.

    2012-10-01

    Using angle-resolved photoemission spectroscopy, we investigated the interfacial properties between the long-chain normal-alkane molecule n-CH3(CH2)42CH3 [tetratetracontane (TTC)] and uniform Ag films using the Ag quantum well states. The entire quantum well state energy band dispersions were observed to shift toward the Fermi level with increasing adsorption coverage of TTC up to 1 monolayer (ML). However, the energy shifts upon deposition of 1 ML of TTC are approximately inversely dependent on the Ag film thickness, indicating a quantum-size effect. In the framework of the pushback and image-force models, we applied the Bohr-Sommerfeld quantization rule with the modified Coulomb image potential for the phase shift at the TTC/Ag interface to extract the dielectric constant for 1 ML of TTC.

  17. Anomalous time delays and quantum weak measurements in optical micro-resonators

    PubMed Central

    Asano, M.; Bliokh, K. Y.; Bliokh, Y. P.; Kofman, A. G.; Ikuta, R.; Yamamoto, T.; Kivshar, Y. S.; Yang, L.; Imoto, N.; Özdemir, Ş.K.; Nori, F.

    2016-01-01

    Quantum weak measurements, wavepacket shifts and optical vortices are universal wave phenomena, which originate from fine interference of multiple plane waves. These effects have attracted considerable attention in both classical and quantum wave systems. Here we report on a phenomenon that brings together all the above topics in a simple one-dimensional scalar wave system. We consider inelastic scattering of Gaussian wave packets with parameters close to a zero of the complex scattering coefficient. We demonstrate that the scattered wave packets experience anomalously large time and frequency shifts in such near-zero scattering. These shifts reveal close analogies with the Goos–Hänchen beam shifts and quantum weak measurements of the momentum in a vortex wavefunction. We verify our general theory by an optical experiment using the near-zero transmission (near-critical coupling) of Gaussian pulses propagating through a nano-fibre with a side-coupled toroidal micro-resonator. Measurements demonstrate the amplification of the time delays from the typical inverse-resonator-linewidth scale to the pulse-duration scale. PMID:27841269

  18. Security Standards and Best Practice Considerations for Quantum Key Distribution (QKD)

    DTIC Science & Technology

    2012-03-01

    SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS...protection in the United States. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD...FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY

  19. Empirical Analysis of Optical Attenuator Performance in Quantum Key Distribution Systems Using a Particle Model

    DTIC Science & Technology

    2012-03-01

    EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING A...DISTRIBUTION IS UNLIMITED AFIT/GCS/ENG/12-01 EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING ...challenging as the complexity of actual implementation specifics are considered. Two components common to most quantum key distribution

  20. Security of Y-00 and Similar Quantum Cryptographic Protocols

    DTIC Science & Technology

    2004-11-16

    security of Y-00 type protocols is clarified. Key words: Quantum cryptography PACS: 03.67.Dd Anew approach to quantum cryptog- raphy called KCQ, ( keyed ...classical- noise key generation [2] or the well known BB84 quantum protocol [3]. A special case called αη (or Y-00 in Japan) has been experimentally in... quantum noise for typical op- erating parameters. It weakens both the data and key security , possibly information-theoretically and cer- tainly

  1. Optimally cloned binary coherent states

    NASA Astrophysics Data System (ADS)

    Müller, C. R.; Leuchs, G.; Marquardt, Ch.; Andersen, U. L.

    2017-10-01

    Binary coherent state alphabets can be represented in a two-dimensional Hilbert space. We capitalize this formal connection between the otherwise distinct domains of qubits and continuous variable states to map binary phase-shift keyed coherent states onto the Bloch sphere and to derive their quantum-optimal clones. We analyze the Wigner function and the cumulants of the clones, and we conclude that optimal cloning of binary coherent states requires a nonlinearity above second order. We propose several practical and near-optimal cloning schemes and compare their cloning fidelity to the optimal cloner.

  2. Room temperature high-fidelity holonomic single-qubit gate on a solid-state spin.

    PubMed

    Arroyo-Camejo, Silvia; Lazariev, Andrii; Hell, Stefan W; Balasubramanian, Gopalakrishnan

    2014-09-12

    At its most fundamental level, circuit-based quantum computation relies on the application of controlled phase shift operations on quantum registers. While these operations are generally compromised by noise and imperfections, quantum gates based on geometric phase shifts can provide intrinsically fault-tolerant quantum computing. Here we demonstrate the high-fidelity realization of a recently proposed fast (non-adiabatic) and universal (non-Abelian) holonomic single-qubit gate, using an individual solid-state spin qubit under ambient conditions. This fault-tolerant quantum gate provides an elegant means for achieving the fidelity threshold indispensable for implementing quantum error correction protocols. Since we employ a spin qubit associated with a nitrogen-vacancy colour centre in diamond, this system is based on integrable and scalable hardware exhibiting strong analogy to current silicon technology. This quantum gate realization is a promising step towards viable, fault-tolerant quantum computing under ambient conditions.

  3. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  4. High energy physics, past, present and future

    NASA Astrophysics Data System (ADS)

    Sugawara, Hirotaka

    2017-03-01

    At the beginning of last century we witnessed the emergence of new physics, quantum theory and gravitational theory, which gave us correct understanding of the world of atoms and deep insight into the structure of universe we live in. Towards the end of the century, string theory emerged as the most promising candidate to unify these two theories. In this talk, I would like to assert that the understanding of the origin of physical constants, ℏ (Planck constant) for quantum theory, and G (Newton’s gravitational constant) for gravitational theory within the framework of string theory is the key to understanding string theory. Then, I will shift to experimental high energy physics and discuss the necessity of world-wide collaboration in the area of superconducting technology which is essential in constructing the 100 TeV hadron collider.

  5. A Quantum Private Query Protocol for Enhancing both User and Database Privacy

    NASA Astrophysics Data System (ADS)

    Zhou, Yi-Hua; Bai, Xue-Wei; Li, Lei-Lei; Shi, Wei-Min; Yang, Yu-Guang

    2018-01-01

    In order to protect the privacy of query user and database, some QKD-based quantum private query (QPQ) protocols were proposed. Unfortunately some of them cannot resist internal attack from database perfectly; some others can ensure better user privacy but require a reduction of database privacy. In this paper, a novel two-way QPQ protocol is proposed to ensure the privacy of both sides of communication. In our protocol, user makes initial quantum states and derives the key bit by comparing initial quantum state and outcome state returned from database by ctrl or shift mode instead of announcing two non-orthogonal qubits as others which may leak part secret information. In this way, not only the privacy of database be ensured but also user privacy is strengthened. Furthermore, our protocol can also realize the security of loss-tolerance, cheat-sensitive, and resisting JM attack etc. Supported by National Natural Science Foundation of China under Grant Nos. U1636106, 61572053, 61472048, 61602019, 61502016; Beijing Natural Science Foundation under Grant Nos. 4152038, 4162005; Basic Research Fund of Beijing University of Technology (No. X4007999201501); The Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No. KM201510005016

  6. Charge-state dynamics in electrostatic force spectroscopy

    NASA Astrophysics Data System (ADS)

    Ondráček, Martin; Hapala, Prokop; Jelínek, Pavel

    2016-07-01

    We present a numerical model that allows us to study the response of an oscillating probe in electrostatic force spectroscopy to charge switching in quantum dots at various time scales. The model provides more insight into the behavior of frequency shift and dissipated energy under different scanning conditions when measuring a temporarily charged quantum dot on a surface. Namely, we analyze the dependence of the frequency shift, the dissipated energy, and their fluctuations on the resonance frequency of the tip and on the electron tunneling rates across the tip-quantum dot and quantum dot-sample junctions. We discuss two complementary approaches to simulating the charge dynamics, a stochastic and a deterministic one. In addition, we derive analytic formulas valid for small amplitudes, describing relations between the frequency shift, dissipated energy, and the characteristic rates driving the charging and discharging processes.

  7. A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory

    NASA Astrophysics Data System (ADS)

    Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu

    2014-07-01

    Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.

  8. Quantum key distribution network for multiple applications

    NASA Astrophysics Data System (ADS)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  9. Practical somewhat-secure quantum somewhat-homomorphic encryption with coherent states

    NASA Astrophysics Data System (ADS)

    Tan, Si-Hui; Ouyang, Yingkai; Rohde, Peter P.

    2018-04-01

    We present a scheme for implementing homomorphic encryption on coherent states encoded using phase-shift keys. The encryption operations require only rotations in phase space, which commute with computations in the code space performed via passive linear optics, and with generalized nonlinear phase operations that are polynomials of the photon-number operator in the code space. This encoding scheme can thus be applied to any computation with coherent-state inputs, and the computation proceeds via a combination of passive linear optics and generalized nonlinear phase operations. An example of such a computation is matrix multiplication, whereby a vector representing coherent-state amplitudes is multiplied by a matrix representing a linear optics network, yielding a new vector of coherent-state amplitudes. By finding an orthogonal partitioning of the support of our encoded states, we quantify the security of our scheme via the indistinguishability of the encrypted code words. While we focus on coherent-state encodings, we expect that this phase-key encoding technique could apply to any continuous-variable computation scheme where the phase-shift operator commutes with the computation.

  10. Recent progress of quantum communication in China (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Zhang, Qiang

    2016-04-01

    Quantum communication, based on the quantum physics, can provide information theoretical security. Building a global quantum network is one ultimate goal for the research of quantum information. Here, this talk will review the progress for quantum communication in China, including quantum key distribution over metropolitan area with untrustful relay, field test of quantum entanglement swapping over metropolitan network, the 2000 km quantum key distribution main trunk line, and satellite based quantum communication.

  11. Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

    NASA Astrophysics Data System (ADS)

    Naik, R. Lalu; Reddy, P. Chenna

    2015-12-01

    The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

  12. EDITORIAL: Focus on Quantum Cryptography: Theory and Practice FOCUS ON QUANTUM CRYPTOGRAPHY: THEORY AND PRACTICE

    NASA Astrophysics Data System (ADS)

    Lütkenhaus, N.; Shields, A. J.

    2009-04-01

    Quantum cryptography, and especially quantum key distribution (QKD), is steadily progressing to become a viable tool for cryptographic services. In recent years we have witnessed a dramatic increase in the secure bit rate of QKD, as well as its extension to ever longer fibre- and air-based links and the emergence of metro-scale trusted networks. In the foreseeable future even global-scale communications may be possible using quantum repeaters or Earth-satellite links. A handful of start-ups and some bigger companies are already active in the field. The launch of an initiative to form industrial standards for QKD, under the auspices of the European Telecommunication Standards Institute, described in the paper by Laenger and Lenhart in this Focus Issue, can be taken as a sign of the growing commercial interest. Recent progress has seen an increase in the secure bit rate of QKD links, by orders of magnitude, to over 1 Mb s-1. This has resulted mainly from an improvement in the detection technology. Here changes in the way conventional semiconductor detectors are gated, as well as the development of novel devices based on non-linear processes and superconducting materials, are leading the way. Additional challenges for QKD at GHz clock rates include the design of high speed electronics, remote synchronization and high rate random number generation. Substantial effort is being devoted to increasing the range of individual links, which is limited by attenuation and other losses in optical fibres and air links. An important advance in the past few years has been the introduction of protocols with the same scaling as an ideal single-photon set-up. The good news is that these schemes use standard optical devices, such as weak laser pulses. Thanks to these new protocols and improvements in the detection technology, the range of a single fibre link can exceed a few hundred km. Outstanding issues include proving the unconditional security of some of the schemes. Much of the work done to date relates to point-to-point links. Another recent advance has been the development of trusted networks for QKD. This is important for further increasing the range of the technology, and for overcoming denial-of-service attacks on an individual link. It is interesting to see that the optimization of QKD devices differs for point-to-point and network applications. Network operation is essential for widespread adoption of the technology, as it can dramatically reduce the deployment costs and allow connection flexibility. Also important is the multiplexing of the quantum signals with conventional network traffic. For the future, quantum repeaters should be developed for longer range links. On the theoretical side, different approaches to security proofs have recently started to converge, offering several paradigms of the same basic idea. Our improved theoretical understanding places more stringent demands on the QKD devices. We are aware by now that finite size effects in key generation arise not only from parameter estimation. It will not be possible to generate a key from just a few hundred received signals. It is a stimulating challenge for the theory of security proofs to develop lean proof strategies that work with finite signal block sizes. As QKD advances to a real-world cryptographic solution, side channel attacks must be carefully analysed. Theoretical security proofs for QKD schemes are so far based on physical models of these devices. It is in the nature of models that any real implementation will deviate from this model, creating a potential weakness for an eavesdropper to exploit. There are two solutions to this problem: the traditional path of refining the models to reduce the deviations, or the radically different approach of device-independent security proofs, in which none or only a few well controlled assumptions about the devices are made. Clearly, it is desirable to find security proofs that require only minimal or fairly general model descriptions and are based on observable tests during the run of QKD sessions. It is now 25 years since the first proposal for QKD was published and 20 since the first experimental realization. The intervening years have brought several technological and theoretical advances, which have driven new insights into the application of quantum theory to the wider field of information technology. We are looking forward to the new twists and turns this field will take in the next 25 years! Focus on Quantum Cryptography: Theory and Practice Contents Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space A Leverrier, E Karpov, P Grangier and N J Cerf Optical networking for quantum key distribution and quantum communications T E Chapuran, P Toliver, N A Peters, J Jackel, M S Goodman, R J Runser, S R McNown, N Dallmann, R J Hughes, K P McCabe, J E Nordholt, C G Peterson, K T Tyagi, L Mercer and H Dardy Proof-of-concept of real-world quantum key distribution with quantum frames I Lucio-Martinez, P Chan, X Mo, S Hosier and W Tittel Composability in quantum cryptography Jörn Müller-Quade and Renato Renner Distributed authentication for randomly compromised networks Travis R Beals, Kevin P Hynes and Barry C Sanders Feasibility of 300 km quantum key distribution with entangled states Thomas Scheidl, Rupert Ursin, Alessandro Fedrizzi, Sven Ramelow, Xiao-Song Ma, Thomas Herbst, Robert Prevedel, Lothar Ratschbacher, Johannes Kofler, Thomas Jennewein and Anton Zeilinger Decoy-state quantum key distribution with both source errors and statistical fluctuations Xiang-Bin Wang, Lin Yang, Cheng-Zhi Peng and Jian-Wei Pan High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres D Stucki, N Walenta, F Vannel, R T Thew, N Gisin, H Zbinden, S Gray, C R Towery and S Ten Topological optimization of quantum key distribution networks R Alléaume, F Roueff, E Diamanti and N Lütkenhaus The SECOQC quantum key distribution network in Vienna M Peev, C Pacher, R Alléaume, C Barreiro, J Bouda, W Boxleitner, T Debuisschert, E Diamanti, M Dianati, J F Dynes, S Fasel, S Fossier, M Fürst, J-D Gautier, O Gay, N Gisin, P Grangier, A Happe, Y Hasani, M Hentschel, H Hübel, G Humer, T Länger, M Legré, R Lieger, J Lodewyck, T Lorünser, N Lütkenhaus, A Marhold, T Matyus, O Maurhart, L Monat, S Nauerth, J-B Page, A Poppe, E Querasser, G Ribordy, S Robyr, L Salvail, A W Sharpe, A J Shields, D Stucki, M Suda, C Tamas, T Themel, R T Thew, Y Thoma, A Treiber, P Trinkler, R Tualle-Brouri, F Vannel, N Walenta, H Weier, H Weinfurter, I Wimberger, Z L Yuan, H Zbinden and A Zeilinger Stable quantum key distribution with active polarization control based on time-division multiplexing J Chen, G Wu, L Xu, X Gu, E Wu and H Zeng Controlling passively quenched single photon detectors by bright light Vadim Makarov Information leakage via side channels in freespace BB84 quantum cryptography Sebastian Nauerth, Martin Fürst, Tobias Schmitt-Manderbach, Henning Weier and Harald Weinfurter Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD Thomas Länger and Gaby Lenhart Entangled quantum key distribution with a biased basis choice Chris Erven, Xiongfeng Ma, Raymond Laflamme and Gregor Weihs Finite-key analysis for practical implementations of quantum key distribution Raymond Y Q Cai and Valerio Scarani Field test of a continuous-variable quantum key distribution prototype S Fossier, E Diamanti, T Debuisschert, A Villing, R Tualle-Brouri and P Grangier Physics and application of photon number resolving detectors based on superconducting parallel nanowires F Marsili, D Bitauld, A Gaggero, S Jahanmirinejad, R Leoni, F Mattioli and A Fiore Device-independent quantum key distribution secure against collective attacks Stefano Pironio, Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar and Valerio Scarani 1310 nm differential-phase-shift QKD system using superconducting single-photon detectors Lijun Ma, S Nam, Hai Xu, B Baek, Tiejun Chang, O Slattery, A Mink and Xiao Tang Practical gigahertz quantum key distribution based on avalanche photodiodes Z L Yuan, A R Dixon, J F Dynes, A W Sharpe and A J Shields Simple security proof of quantum key distribution based on complementarity M Koashi Feasibility of satellite quantum key distribution C Bonato, A Tomaello, V Da Deppo, G Naletto and P Villoresi Programmable instrumentation and gigahertz signaling for single-photon quantum communication systems Alan Mink, Joshua C Bienfang, Robert Carpenter, Lijun Ma, Barry Hershman, Alessandro Restelli and Xiao Tang Experimental polarization encoded quantum key distribution over optical fibres with real-time continuous birefringence compensation G B Xavier, N Walenta, G Vilela de Faria, G P Temporão, N Gisin, H Zbinden and J P von der Weid Feasibility of free space quantum key distribution with coherent polarization states D Elser, T Bartley, B Heim, Ch Wittmann, D Sych and G Leuchs A fully automated entanglement-based quantum cryptography system for telecom fiber networks Alexander Treiber, Andreas Poppe, Michael Hentschel, Daniele Ferrini, Thomas Lorünser, Edwin Querasser, Thomas Matyus, Hannes Hübel and Anton Zeilinger Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments N A Peters, P Toliver, T E Chapuran, R J Runser, S R McNown, C G Peterson, D Rosenberg, N Dallmann, R J Hughes, K P McCabe, J E Nordholt and K T Tyagi Clock synchronization by remote detection of correlated photon pairs Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Megabits secure key rate quantum key distribution Q Zhang, H Takesue, T Honjo, K Wen, T Hirohata, M Suyama, Y Takiguchi, H Kamada, Y Tokura, O Tadanaga, Y Nishida, M Asobe and Y Yamamoto Practical long-distance quantum key distribution system using decoy levels D Rosenberg, C G Peterson, J W Harrington, P R Rice, N Dallmann, K T Tyagi, K P McCabe, S Nam, B Baek, R H Hadfield, R J Hughes and J E Nordholt Detector decoy quantum key distribution Tobias Moroder, Marcos Curty and Norbert Lütkenhaus Daylight operation of a free space, entanglement-based quantum key distribution system Matthew P Peloso, Ilja Gerhardt, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Observation of 1.5 μm band entanglement using single photon detectors based on sinusoidally gated InGaAs/InP avalanche photodiodes Benjamin Miquel and Hiroki Takesue

  13. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.

    PubMed

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman

    2015-10-30

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  14. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    PubMed Central

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman

    2015-01-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components. PMID:26514280

  15. Quantum key distribution with an entangled light emitting diode

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dzurnak, B.; Stevenson, R. M.; Nilsson, J.

    Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurementsmore » also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.« less

  16. Quantum key distribution with an entangled light emitting diode

    NASA Astrophysics Data System (ADS)

    Dzurnak, B.; Stevenson, R. M.; Nilsson, J.; Dynes, J. F.; Yuan, Z. L.; Skiba-Szymanska, J.; Farrer, I.; Ritchie, D. A.; Shields, A. J.

    2015-12-01

    Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurements also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.

  17. Broadspectrum InGaAs/InP Quantum Well Infrared Photodetector via Quantum Well Intermixing

    NASA Technical Reports Server (NTRS)

    Sengupta, D.; Chang, Y. C.; Stillman, G.

    1998-01-01

    We have demonstrated red shifting and broadening of the wavelength response of a bound-to-continuum ultra-thin p-type InGaAs/InP quantum well infrared photodetector (QWIP) after growth via quantum well intermixing.

  18. Chemical Shifts of the Carbohydrate Binding Domain of Galectin-3 from Magic Angle Spinning NMR and Hybrid Quantum Mechanics/Molecular Mechanics Calculations.

    PubMed

    Kraus, Jodi; Gupta, Rupal; Yehl, Jenna; Lu, Manman; Case, David A; Gronenborn, Angela M; Akke, Mikael; Polenova, Tatyana

    2018-03-22

    Magic angle spinning NMR spectroscopy is uniquely suited to probe the structure and dynamics of insoluble proteins and protein assemblies at atomic resolution, with NMR chemical shifts containing rich information about biomolecular structure. Access to this information, however, is problematic, since accurate quantum mechanical calculation of chemical shifts in proteins remains challenging, particularly for 15 N H . Here we report on isotropic chemical shift predictions for the carbohydrate recognition domain of microcrystalline galectin-3, obtained from using hybrid quantum mechanics/molecular mechanics (QM/MM) calculations, implemented using an automated fragmentation approach, and using very high resolution (0.86 Å lactose-bound and 1.25 Å apo form) X-ray crystal structures. The resolution of the X-ray crystal structure used as an input into the AF-NMR program did not affect the accuracy of the chemical shift calculations to any significant extent. Excellent agreement between experimental and computed shifts is obtained for 13 C α , while larger scatter is observed for 15 N H chemical shifts, which are influenced to a greater extent by electrostatic interactions, hydrogen bonding, and solvation.

  19. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    NASA Astrophysics Data System (ADS)

    Chau, H. F.

    2002-12-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1(5)≈27.6%, thereby making it the most error resistant scheme known to date.

  20. Quantum phase gate based on electromagnetically induced transparency in optical cavities

    NASA Astrophysics Data System (ADS)

    Borges, Halyne S.; Villas-Bôas, Celso J.

    2016-11-01

    We theoretically investigate the implementation of a quantum controlled-phase gate in a system constituted by a single atom inside an optical cavity, based on the electromagnetically induced transparency effect. First we show that a probe pulse can experience a π phase shift due to the presence or absence of a classical control field. Considering the interplay of the cavity-EIT effect and the quantum memory process, we demonstrated a controlled-phase gate between two single photons. To this end, first one needs to store a (control) photon in the ground atomic states. In the following, a second (target) photon must impinge on the atom-cavity system. Depending on the atomic state, this second photon will be either transmitted or reflected, acquiring different phase shifts. This protocol can then be easily extended to multiphoton systems, i.e., keeping the control photon stored, it may induce phase shifts in several single photons, thus enabling the generation of multipartite entangled states. We explore the relevant parameter space in the atom-cavity system that allows the implementation of quantum controlled-phase gates using the recent technologies. In particular, we have found a lower bound for the cooperativity of the atom-cavity system which enables the implementation of phase shift on single photons. The induced shift on the phase of a photonic qubit and the controlled-phase gate between single photons, combined with optical devices, enable one to perform universal quantum computation.

  1. Measuring the complex admittance and tunneling rate of a germanium hut wire hole quantum dot

    NASA Astrophysics Data System (ADS)

    Li, Yan; Li, Shu-Xiao; Gao, Fei; Li, Hai-Ou; Xu, Gang; Wang, Ke; Liu, He; Cao, Gang; Xiao, Ming; Wang, Ting; Zhang, Jian-Jun; Guo, Guo-Ping

    2018-05-01

    We investigate the microwave reflectometry of an on-chip reflection line cavity coupled to a Ge hut wire hole quantum dot. The amplitude and phase responses of the cavity can be used to measure the complex admittance and evaluate the tunneling rate of the quantum dot, even in the region where transport signal through the quantum dot is too small to be measured by conventional direct transport means. The experimental observations are found to be in good agreement with a theoretical model of the hybrid system based on cavity frequency shift and linewidth shift. Our experimental results take the first step towards fast and sensitive readout of charge and spin states in Ge hut wire hole quantum dot.

  2. Organic molecule fluorescence as an experimental test-bed for quantum jumps in thermodynamics

    NASA Astrophysics Data System (ADS)

    Browne, Cormac; Farrow, Tristan; Dahlsten, Oscar C. O.; Taylor, Robert A.; Vlatko, Vedral

    2017-08-01

    We demonstrate with an experiment how molecules are a natural test bed for probing fundamental quantum thermodynamics. Single-molecule spectroscopy has undergone transformative change in the past decade with the advent of techniques permitting individual molecules to be distinguished and probed. We demonstrate that the quantum Jarzynski equality for heat is satisfied in this set-up by considering the time-resolved emission spectrum of organic molecules as arising from quantum jumps between states. This relates the heat dissipated into the environment to the free energy difference between the initial and final state. We demonstrate also how utilizing the quantum Jarzynski equality allows for the detection of energy shifts within a molecule, beyond the relative shift.

  3. Organic molecule fluorescence as an experimental test-bed for quantum jumps in thermodynamics.

    PubMed

    Browne, Cormac; Farrow, Tristan; Dahlsten, Oscar C O; Taylor, Robert A; Vlatko, Vedral

    2017-08-01

    We demonstrate with an experiment how molecules are a natural test bed for probing fundamental quantum thermodynamics. Single-molecule spectroscopy has undergone transformative change in the past decade with the advent of techniques permitting individual molecules to be distinguished and probed. We demonstrate that the quantum Jarzynski equality for heat is satisfied in this set-up by considering the time-resolved emission spectrum of organic molecules as arising from quantum jumps between states. This relates the heat dissipated into the environment to the free energy difference between the initial and final state. We demonstrate also how utilizing the quantum Jarzynski equality allows for the detection of energy shifts within a molecule, beyond the relative shift.

  4. Magnetic field effect on the energy levels of an exciton in a GaAs quantum dot: Application for excitonic lasers.

    PubMed

    Jahan, K Luhluh; Boda, A; Shankar, I V; Raju, Ch Narasimha; Chatterjee, Ashok

    2018-03-22

    The problem of an exciton trapped in a Gaussian quantum dot (QD) of GaAs is studied in both two and three dimensions in the presence of an external magnetic field using the Ritz variational method, the 1/N expansion method and the shifted 1/N expansion method. The ground state energy and the binding energy of the exciton are obtained as a function of the quantum dot size, confinement strength and the magnetic field and compared with those available in the literature. While the variational method gives the upper bound to the ground state energy, the 1/N expansion method gives the lower bound. The results obtained from the shifted 1/N expansion method are shown to match very well with those obtained from the exact diagonalization technique. The variation of the exciton size and the oscillator strength of the exciton are also studied as a function of the size of the quantum dot. The excited states of the exciton are computed using the shifted 1/N expansion method and it is suggested that a given number of stable excitonic bound states can be realized in a quantum dot by tuning the quantum dot parameters. This can open up the possibility of having quantum dot lasers using excitonic states.

  5. Conceptual Modeling of a Quantum Key Distribution Simulation Framework Using the Discrete Event System Specification

    DTIC Science & Technology

    2014-09-18

    and full/scale experimental verifications towards ground/ satellite quantum key distribution0 Oat Qhotonics 4235>9+7,=5;9!អ \\58^ Zin K. Dao Z. Miu T...Conceptual Modeling of a Quantum Key Distribution Simulation Framework Using the Discrete Event System Specification DISSERTATION Jeffrey D. Morris... QUANTUM KEY DISTRIBUTION SIMULATION FRAMEWORK USING THE DISCRETE EVENT SYSTEM SPECIFICATION DISSERTATION Presented to the Faculty Department of Systems

  6. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Threemore » protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.« less

  7. Continuous variable quantum key distribution with modulated entangled states.

    PubMed

    Madsen, Lars S; Usenko, Vladyslav C; Lassen, Mikael; Filip, Radim; Andersen, Ulrik L

    2012-01-01

    Quantum key distribution enables two remote parties to grow a shared key, which they can use for unconditionally secure communication over a certain distance. The maximal distance depends on the loss and the excess noise of the connecting quantum channel. Several quantum key distribution schemes based on coherent states and continuous variable measurements are resilient to high loss in the channel, but are strongly affected by small amounts of channel excess noise. Here we propose and experimentally address a continuous variable quantum key distribution protocol that uses modulated fragile entangled states of light to greatly enhance the robustness to channel noise. We experimentally demonstrate that the resulting quantum key distribution protocol can tolerate more noise than the benchmark set by the ideal continuous variable coherent state protocol. Our scheme represents a very promising avenue for extending the distance for which secure communication is possible.

  8. Counterfactual quantum cryptography.

    PubMed

    Noh, Tae-Gon

    2009-12-04

    Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed protocols can be implemented with current technologies and provide practical security advantages by eliminating the possibility that an eavesdropper can directly access the entire quantum system of each signal particle.

  9. New Quantum Key Distribution Scheme Based on Random Hybrid Quantum Channel with EPR Pairs and GHZ States

    NASA Astrophysics Data System (ADS)

    Yan, Xing-Yu; Gong, Li-Hua; Chen, Hua-Ying; Zhou, Nan-Run

    2018-05-01

    A theoretical quantum key distribution scheme based on random hybrid quantum channel with EPR pairs and GHZ states is devised. In this scheme, EPR pairs and tripartite GHZ states are exploited to set up random hybrid quantum channel. Only one photon in each entangled state is necessary to run forth and back in the channel. The security of the quantum key distribution scheme is guaranteed by more than one round of eavesdropping check procedures. It is of high capacity since one particle could carry more than two bits of information via quantum dense coding.

  10. Counterfactual Quantum Cryptography

    NASA Astrophysics Data System (ADS)

    Noh, Tae-Gon

    2009-12-01

    Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed protocols can be implemented with current technologies and provide practical security advantages by eliminating the possibility that an eavesdropper can directly access the entire quantum system of each signal particle.

  11. Theoretical Investigation of Tunable Goos-Hänchen Shifts in a Four-Level Quantum System

    NASA Astrophysics Data System (ADS)

    Jafarzadeh, Hossein; Payravi, Mohammad

    2018-05-01

    Goos-Hänchen (GH) shifts in the reflected and transmitted light have been discussed in a cavity with four-level quantum system. It is realized that the refraction index of intracavity medium can be negative by manipulating the external coherent laser fields. For the negative refraction index of intracavity medium, the GH shifts of reflected and transmitted light beams have been analyzed in a parametric condition. It is found that due to modulation of laser signals and relative phase between applied fields, large and tunable GH shifts in reflected and transmitted light beams can be obtained.

  12. Quantum Public Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2017-11-01

    Classical public key cryptosystems ( P K C), such as R S A, E I G a m a l, E C C, are no longer secure in quantum algorithms, and quantum cryptography has become a novel research topic. In this paper we present a quantum asymmetrical cryptosystem i.e. quantum public key cryptosystem ( Q P K C) based on the Bell states. In particular, in the proposed QPKC the public key are given by the first n particles of Bell states and generalized Pauli operations. The corresponding secret key are the last n particles of Bell states and the inverse of generalized Pauli operations. The proposed QPKC encrypts the message using a public key and decrypts the ciphertext using a private key. By H o l e v o ' s theorem, we proved the security of the secret key and messages during the QPKC.

  13. Secure Communication via Key Generation with Quantum Measurement Advantage in the Telecom Band

    DTIC Science & Technology

    2013-10-30

    II: Summary of Project In this basic research program we proposed to investigate the use of keyed communication in quantum noise as a key generation...implement quantum limited detection in our running-code OCDMA experiment to demonstrate (a) quantum measurement advantage creation between two users, (b...neither is adequate against known-plaintext attacks. This is a serious security problem facing the whole field of quantum cryptography in regard to both

  14. Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems.

    PubMed

    da Silva, Thiago Ferreira; Xavier, Guilherme B; Temporão, Guilherme P; von der Weid, Jean Pierre

    2012-08-13

    By employing real-time monitoring of single-photon avalanche photodiodes we demonstrate how two types of practical eavesdropping strategies, the after-gate and time-shift attacks, may be detected. Both attacks are identified with the detectors operating without any special modifications, making this proposal well suited for real-world applications. The monitoring system is based on accumulating statistics of the times between consecutive detection events, and extracting the afterpulse and overall efficiency of the detectors in real-time using mathematical models fit to the measured data. We are able to directly observe changes in the afterpulse probabilities generated from the after-gate and faint after-gate attacks, as well as different timing signatures in the time-shift attack. We also discuss the applicability of our scheme to other general blinding attacks.

  15. Doping dependent blue shift and linewidth broadening of intersubband absorption in non-polar m-plane AlGaN/GaN multiple quantum wells

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kotani, Teruhisa, E-mail: tkotani@iis.u-tokyo.ac.jp; Institute of Industrial Science, The University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo 153-8505; Advanced Technology Research Laboratories, Sharp Corporation, 2613-1 Ichinomoto-cho, Tenri, Nara 632-8567

    2015-09-14

    Blue shift and broadening of the absorption spectra of mid-infrared intersubband transition in non-polar m-plane AlGaN/GaN 10 quantum wells were observed with increasing doping density. As the doping density was increased from 6.6 × 10{sup 11} to 6.0 × 10{sup 12 }cm{sup −2} per a quantum well, the intersubband absorption peak energy shifted from 274.0 meV to 302.9 meV, and the full width at half maximum increased from 56.4 meV to 112.4 meV. Theoretical calculations reveal that the blue shift is due to many body effects, and the intersubband linewidth in doped AlGaN/GaN QW is mainly determined by scattering due to interface roughness, LO phonons, and ionized impurities.

  16. Quantum anomalous Bloch-Siegert shift in Weyl semimetal

    NASA Astrophysics Data System (ADS)

    Kumar, Upendra; Kumar, Vipin; Enamullah, Setlur, Girish S.

    2018-05-01

    A periodic exchange of energy between the light field and two level system is known as Rabi oscillations. The Bloch-Siegert shift (BSS) is a shift in Rabi oscillation resonance condition, when the driving field is sufficiently strong. There are new type of oscillations exhibit in Weyl semimetal at far from resonance, known as anomalous Rabi oscillation. In this work, we study the phenomenon of the Bloch-Siegert shift in Weyl semimetal at far from resonance called anomalous Bloch-Siegert shift (ABSS) by purely quantum mechanical treatment and describe it's anisotropic nature. A fully numerical solution of the Floquet-Bloch equations unequivocally establishes the presence of not only anomalous Rabi oscillations in these systems but also their massless character.

  17. Valley-orbit splitting in doped nanocrystalline silicon: k•p calculations

    NASA Astrophysics Data System (ADS)

    Belyakov, Vladimir A.; Burdov, Vladimir A.

    2007-07-01

    The valley-orbit splitting in silicon quantum dots with shallow donors has been theoretically studied. In particular, the chemical-shift calculation was carried out within the frames of k•p approximation for single- and many-donor cases. For both cases, the great value of the chemical shift has been obtained compared to its bulk value. Such increase of the chemical shift becomes possible due to the quantum confinement effect in a dot. It is shown for the single-donor case that the level splitting and chemical shift strongly depend on the dot radius and donor position inside the nanocrystal. In the many-donor case, the chemical shift is almost proportional to the number of donors.

  18. Subcarrier Wave Quantum Key Distribution in Telecommunication Network with Bitrate 800 kbit/s

    NASA Astrophysics Data System (ADS)

    Gleim, A. V.; Nazarov, Yu. V.; Egorov, V. I.; Smirnov, S. V.; Bannik, O. I.; Chistyakov, V. V.; Kynev, S. M.; Anisimov, A. A.; Kozlov, S. A.; Vasiliev, V. N.

    2015-09-01

    In the course of work on creating the first quantum communication network in Russia we demonstrated quantum key distribution in metropolitan optical network infrastructure. A single-pass subcarrier wave quantum cryptography scheme was used in the experiments. BB84 protocol with strong reference was chosen for performing key distribution. The registered sifted key rate in an optical cable with 1.5 dB loss was 800 Kbit/s. Signal visibility exceeded 98%, and quantum bit error rate value was 1%. The achieved result is a record for this type of systems.

  19. Capacitive Sensing of Glucose in Electrolytes Using Graphene Quantum Capacitance Varactors.

    PubMed

    Zhang, Yao; Ma, Rui; Zhen, Xue V; Kudva, Yogish C; Bühlmann, Philippe; Koester, Steven J

    2017-11-08

    A novel graphene-based variable capacitor (varactor) that senses glucose based on the quantum capacitance effect was successfully developed. The sensor utilizes a metal-oxide-graphene varactor device structure that is inherently compatible with passive wireless sensing, a key advantage for in vivo glucose sensing. The graphene varactors were functionalized with pyrene-1-boronic acid (PBA) by self-assembly driven by π-π interactions. Successful surface functionalization was confirmed by both Raman spectroscopy and capacitance-voltage characterization of the devices. Through glucose binding to the PBA, the glucose concentration in the buffer solutions modulates the level of electrostatic doping of the graphene surface to different degrees, which leads to capacitance changes and Dirac voltage shifts. These responses to the glucose concentration were shown to be reproducible and reversible over multiple measurement cycles, suggesting promise for eventual use in wireless glucose monitoring.

  20. Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.

    PubMed

    Nellore, Vishwa; Xi, Sam; Dwyer, Chris

    2015-12-22

    Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security.

  1. Combined multireference configuration interaction/ molecular dynamics approach for calculating solvatochromic shifts: application to the n(O) --> pi* electronic transition of formaldehyde.

    PubMed

    Xu, ZongRong; Matsika, Spiridoula

    2006-11-02

    A combined quantum mechanics/molecular mechanics method is described here for considering the solvatochromic shift of excited states in solution. The quantum mechanical solute is described using high level multireference configuration interaction methods (MRCI), while molecular dynamics is used for obtaining the structure of the solvent around the solute. The electrostatic effect of the solvent is included in the quantum description of the solute in an averaged way. This method is used to study solvent effects on the n(O) --> pi* electronic transition of formaldehyde in aqueous solution. The effects of solute polarization, basis sets, and dynamical correlation on the solvatochromic shift, and on dipole moments, have been investigated.

  2. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2015-05-27

    Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...2016 4. TITLE AND SUBTITLE Seaworthy Quantum Key Distribution Design and Validation (SEAKEY) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  3. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  4. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    PubMed Central

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. PMID:26823196

  5. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption.

    PubMed

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-29

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  6. Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Chen, Zhen-Yu; Ji, Sai; Wang, Hai-Bin; Zhang, Jun

    2017-10-01

    A multi-party semi-quantum key agreement (SQKA) protocol based on delegating quantum computation (DQC) model is proposed by taking Bell states as quantum resources. In the proposed protocol, the participants only need the ability of accessing quantum channel and preparing single photons {|0〉, |1〉, |+〉, |-〉}, while the complicated quantum operations, such as the unitary operations and Bell measurement, will be delegated to the remote quantum center. Compared with previous quantum key agreement protocols, this client-server model is more feasible in the early days of the emergence of quantum computers. In order to prevent the attacks from outside eavesdroppers, inner participants and quantum center, two single photon sequences are randomly inserted into Bell states: the first sequence is used to perform the quantum channel detection, while the second is applied to disorder the positions of message qubits, which guarantees the security of the protocol.

  7. Unconditional security of quantum key distribution over arbitrarily long distances

    PubMed

    Lo; Chau

    1999-03-26

    Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure. The proof is reduced from a noisy quantum scheme to a noiseless quantum scheme and then from a noiseless quantum scheme to a noiseless classical scheme, which can then be tackled by classical probability theory.

  8. Joint CPT and N resonance in compact atomic time standards

    NASA Astrophysics Data System (ADS)

    Crescimanno, Michael; Hohensee, Michael; Xiao, Yanhong; Phillips, David; Walsworth, Ron

    2008-05-01

    Currently development efforts towards small, low power atomic time standards use current-modulated VCSELs to generate phase-coherent optical sidebands that interrogate the hyperfine structure of alkali atoms such as rubidium. We describe and use a modified four-level quantum optics model to study the optimal operating regime of the joint CPT- and N-resonance clock. Resonant and non-resonant light shifts as well as modulation comb detuning effects play a key role in determining the optimal operating point of such clocks. We further show that our model is in good agreement with experimental tests performed using Rb-87 vapor cells.

  9. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-02-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem (Q P K C) based on the Bell states. By H o l e v o's theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack (C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  10. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  11. Quantum network with trusted and untrusted relays

    NASA Astrophysics Data System (ADS)

    Ma, Xiongfeng; Annabestani, Razieh; Fung, Chi-Hang Fred; Lo, Hoi-Kwong; Lütkenhaus, Norbert; PitkäNen, David; Razavi, Mohsen

    2012-02-01

    Quantum key distribution offers two distant users to establish a random secure key by exploiting properties of quantum mechanics, whose security has proven in theory. In practice, many lab and field demonstrations have been performed in the last 20 years. Nowadays, quantum network with quantum key distribution systems are tested around the world, such as in China, Europe, Japan and US. In this talk, I will give a brief introduction of recent development for quantum network. For the untrusted relay part, I will introduce the measurement-device-independent quantum key distribution scheme and a quantum relay with linear optics. The security of such scheme is proven without assumptions on the detection devices, where most of quantum hacking strategies are launched. This scheme can be realized with current technology. For the trusted relay part, I will introduce so-called delayed privacy amplification, with which no error correction and privacy amplification is necessarily to be performed between users and the relay. In this way, classical communications and computational power requirement on the relay site will be reduced.

  12. Practical Quantum Cryptography for Secure Free-Space Communications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.

    1999-02-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less

  13. FREE-SPACE QUANTUM CRYPTOGRAPHY IN DAYLIGHT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Buttler, W.T.

    2000-01-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less

  14. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  15. Quantum cryptography over underground optical fibers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Luther, G.G.; Morgan, G.L.

    1996-05-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generated shared, secret cryptographic key material using the transmission of quantum states of light whose security is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the key transmissions, nor evade detection, owing to Heisenberg`s uncertainty principle. In this paper the authors describe the theory of quantum cryptography, and the most recent results from their experimental system with which they are generating key material over 14-km of underground optical fiber. These results show that optical-fiber based quantum cryptography could allow secure,more » real-time key generation over ``open`` multi-km node-to-node optical fiber communications links between secure ``islands.``« less

  16. Trojan horse attacks on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Du, Yungang; Wu, Lingan

    2016-04-01

    There has been much interest in ;counterfactual quantum cryptography; (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes.

  17. Proceedings of the Quantum Computation for Physical Modeling Workshop 2004. Held in North Falmouth, MA on 12-15 September 2004

    DTIC Science & Technology

    2005-10-01

    late the difficulty of some basic 1-bit and n-bit quantum and classical operations in an simple unconstrained scenario. KEY WORDS: Time evolution... quantum circuit and design are presented for an optimized entangling probe attacking the BB84 Protocol of quantum key distribution (QKD) and yielding...unambiguous, at least some of the time. It follows that the BB84 (Bennett-Brassard 1984) proto- col of quantum key distribution has a vulnerability similar to

  18. Device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Hänggi, Esther

    2010-12-01

    In this thesis, we study two approaches to achieve device-independent quantum key distribution: in the first approach, the adversary can distribute any system to the honest parties that cannot be used to communicate between the three of them, i.e., it must be non-signalling. In the second approach, we limit the adversary to strategies which can be implemented using quantum physics. For both approaches, we show how device-independent quantum key distribution can be achieved when imposing an additional condition. In the non-signalling case this additional requirement is that communication is impossible between all pairwise subsystems of the honest parties, while, in the quantum case, we demand that measurements on different subsystems must commute. We give a generic security proof for device-independent quantum key distribution in these cases and apply it to an existing quantum key distribution protocol, thus proving its security even in this setting. We also show that, without any additional such restriction there always exists a successful joint attack by a non-signalling adversary.

  19. SeaQuaKE: Sea-Optimized Quantum Key Exchange

    DTIC Science & Technology

    2014-08-01

    which is led by Applied Communications Sciences under the ONR Free Space Optical Quantum Key Distribution Special Notice (13-SN-0004 under ONRBAA13...aerosol model scenarios. 15. SUBJECT TERMS Quantum communications, free - space optical communications 16. SECURITY CLASSIFICATION OF: 17...SeaQuaKE) project, which is led by Applied Communications Sciences under the ONR Free Space Optical Quantum Key Distribution Special Notice (13-SN

  20. Highly efficient multiple-layer CdS quantum dot sensitized III-V solar cells.

    PubMed

    Lin, Chien-Chung; Han, Hau-Vei; Chen, Hsin-Chu; Chen, Kuo-Ju; Tsai, Yu-Lin; Lin, Wein-Yi; Kuo, Hao-Chung; Yu, Peichen

    2014-02-01

    In this review, the concept of utilization of solar spectrum in order to increase the solar cell efficiency is discussed. Among the three mechanisms, down-shifting effect is investigated in detail. Organic dye, rare-earth minerals and quantum dots are three most popular down-shift materials. While the enhancement of solar cell efficiency was not clearly observed in the past, the advances in quantum dot fabrication have brought strong response out of the hybrid platform of a quantum dot solar cell. A multiple layer structure, including PDMS as the isolation layer, is proposed and demonstrated. With the help of pulse spray system, precise control can be achieved and the optimized concentration can be found.

  1. Excitonic fine-structure splitting in telecom-wavelength InAs/GaAs quantum dots: Statistical distribution and height-dependence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goldmann, Elias, E-mail: goldmann@itp.uni-bremen.de; Barthel, Stefan; Florian, Matthias

    The variation of the excitonic fine-structure splitting is studied for semiconductor quantum dots under the influence of a strain-reducing layer, utilized to shift the emission wavelength of the excitonic transition into the telecom-wavelength regime of 1.3–1.5 μm. By means of a sp{sup 3}s{sup *}-tight-binding model and configuration interaction, we calculate wavelength shifts and fine-structure splittings for various quantum dot geometries. We find the splittings remaining small and even decreasing with strain-reducing layer composition for quantum dots with large height. Combined with an observed increased emission efficiency, the applicability for generation of entanglement photons is persistent.

  2. Temporal steering and security of quantum key distribution with mutually unbiased bases against individual attacks

    NASA Astrophysics Data System (ADS)

    Bartkiewicz, Karol; Černoch, Antonín; Lemr, Karel; Miranowicz, Adam; Nori, Franco

    2016-06-01

    Temporal steering, which is a temporal analog of Einstein-Podolsky-Rosen steering, refers to temporal quantum correlations between the initial and final state of a quantum system. Our analysis of temporal steering inequalities in relation to the average quantum bit error rates reveals the interplay between temporal steering and quantum cloning, which guarantees the security of quantum key distribution based on mutually unbiased bases against individual attacks. The key distributions analyzed here include the Bennett-Brassard 1984 protocol and the six-state 1998 protocol by Bruss. Moreover, we define a temporal steerable weight, which enables us to identify a kind of monogamy of temporal correlation that is essential to quantum cryptography and useful for analyzing various scenarios of quantum causality.

  3. Quantum Effects of Electric Fields and Potentials on Electron Motion: An Introduction to Theoretical and Practical Aspects

    ERIC Educational Resources Information Center

    Matteucci, G.

    2007-01-01

    In the so-called electric Aharonov-Bohm effect, a quantum interference pattern shift is produced when electrons move in an electric field free region but, at the same time, in the presence of a time-dependent electric potential. Analogous fringe shifts are observed in interference experiments where electrons, travelling through an electrostatic…

  4. Stream of consciousness: Quantum and biochemical assumptions regarding psychopathology.

    PubMed

    Tonello, Lucio; Cocchi, Massimo; Gabrielli, Fabio; Tuszynski, Jack A

    2017-04-01

    The accepted paradigms of mainstream neuropsychiatry appear to be incompletely adequate and in various cases offer equivocal analyses. However, a growing number of new approaches are being proposed that suggest the emergence of paradigm shifts in this area. In particular, quantum theories of mind, brain and consciousness seem to offer a profound change to the current approaches. Unfortunately these quantum paradigms harbor at least two serious problems. First, they are simply models, theories, and assumptions, with no convincing experiments supporting their claims. Second, they deviate from contemporary mainstream views of psychiatric illness and do so in revolutionary ways. We suggest a possible way to integrate experimental neuroscience with quantum models in order to address outstanding issues in psychopathology. A key role is played by the phenomenon called the "stream of consciousness", which can be linked to the so-called "Gamma Synchrony" (GS), which is clearly demonstrated by EEG data. In our novel proposal, a unipolar depressed patient could be seen as a subject with an altered stream of consciousness. In particular, some clues suggest that depression is linked to an "increased power" stream of consciousness. It is additionally suggested that such an approach to depression might be extended to psychopathology in general with potential benefits to diagnostics and therapeutics in neuropsychiatry. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Deterministic MDI QKD with two secret bits per shared entangled pair

    NASA Astrophysics Data System (ADS)

    Zebboudj, Sofia; Omar, Mawloud

    2018-03-01

    Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.

  6. Injection current dependences of electroluminescence transition energy in InGaN/GaN multiple quantum wells light emitting diodes under pulsed current conditions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Feng; Ikeda, Masao, E-mail: mikeda2013@sinano.ac.cn; Liu, Jianping

    2015-07-21

    Injection current dependences of electroluminescence transition energy in blue InGaN/GaN multiple quantum wells light emitting diodes (LEDs) with different quantum barrier thicknesses under pulsed current conditions have been analyzed taking into account the related effects including deformation caused by lattice strain, quantum confined Stark effects due to polarization field partly screened by carriers, band gap renormalization, Stokes-like shift due to compositional fluctuations which are supposed to be random alloy fluctuations in the sub-nanometer scale, band filling effect (Burstein-Moss shift), and quantum levels in finite triangular wells. The bandgap renormalization and band filling effect occurring at high concentrations oppose one another,more » however, the renormalization effect dominates in the concentration range studied, since the band filling effect arising from the filling in the tail states in the valence band of quantum wells is much smaller than the case in the bulk materials. In order to correlate the carrier densities with current densities, the nonradiative recombination rates were deduced experimentally by curve-fitting to the external quantum efficiencies. The transition energies in LEDs both with 15 nm quantum barriers and 5 nm quantum barriers, calculated using full strengths of theoretical macroscopic polarization given by Barnardini and Fiorentini [Phys. Status Solidi B 216, 391 (1999)] are in excellent accordance with experimental results. The LED with 5 nm barriers has been shown to exhibit a higher transition energy and a smaller blue shift than those of LED with 15 nm barriers, which is mainly caused by the smaller internal polarization field in the quantum wells.« less

  7. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  8. Long-distance continuous-variable quantum key distribution by controlling excess noise

    NASA Astrophysics Data System (ADS)

    Huang, Duan; Huang, Peng; Lin, Dakai; Zeng, Guihua

    2016-01-01

    Quantum cryptography founded on the laws of physics could revolutionize the way in which communication information is protected. Significant progresses in long-distance quantum key distribution based on discrete variables have led to the secure quantum communication in real-world conditions being available. However, the alternative approach implemented with continuous variables has not yet reached the secure distance beyond 100 km. Here, we overcome the previous range limitation by controlling system excess noise and report such a long distance continuous-variable quantum key distribution experiment. Our result paves the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network.

  9. Long-distance continuous-variable quantum key distribution by controlling excess noise.

    PubMed

    Huang, Duan; Huang, Peng; Lin, Dakai; Zeng, Guihua

    2016-01-13

    Quantum cryptography founded on the laws of physics could revolutionize the way in which communication information is protected. Significant progresses in long-distance quantum key distribution based on discrete variables have led to the secure quantum communication in real-world conditions being available. However, the alternative approach implemented with continuous variables has not yet reached the secure distance beyond 100 km. Here, we overcome the previous range limitation by controlling system excess noise and report such a long distance continuous-variable quantum key distribution experiment. Our result paves the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network.

  10. Long-distance continuous-variable quantum key distribution by controlling excess noise

    PubMed Central

    Huang, Duan; Huang, Peng; Lin, Dakai; Zeng, Guihua

    2016-01-01

    Quantum cryptography founded on the laws of physics could revolutionize the way in which communication information is protected. Significant progresses in long-distance quantum key distribution based on discrete variables have led to the secure quantum communication in real-world conditions being available. However, the alternative approach implemented with continuous variables has not yet reached the secure distance beyond 100 km. Here, we overcome the previous range limitation by controlling system excess noise and report such a long distance continuous-variable quantum key distribution experiment. Our result paves the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network. PMID:26758727

  11. A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State

    NASA Technical Reports Server (NTRS)

    Guo, Guang-Can; Zhang, Xiao-Yu

    1996-01-01

    The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.

  12. Shifts due to quantum-mechanical interference from distant neighboring resonances for saturated fluorescence spectroscopy

    NASA Astrophysics Data System (ADS)

    Marsman, Alain; Horbatsch, Marko; Hessels, Eric A.

    2014-05-01

    Quantum-mechanical interference with distant neighboring resonances is found to cause shifts for precision saturated fluorescence spectroscopy of the atomic helium 23 S -to- 23 P transitions. The shifts are significant (larger than the experimental uncertainties for measurements of the intervals) despite the fact that the neighboring resonances are separated from the measured resonances by 1400 and 20 000 natural widths. The shifts depend strongly on experimental parameters such as the angular position of the fluorescence detector and the intensity and size of laser beams. These shifts must be considered for the ongoing program of determining the fine-structure constant from the helium 23 P fine structure. The work represents the first study of such interference shifts for saturated fluorescence spectroscopy and follows up on our previous study of similar shifts for laser spectroscopy. This work is supported by NSERC, CRC, ORF, CFI, NIST and SHARCNET.

  13. Tuning the Quantum Efficiency of Random Lasers - Intrinsic Stokes-Shift and Gain

    PubMed Central

    Lubatsch, Andreas; Frank, Regine

    2015-01-01

    We report the theoretical analysis for tuning the quantum efficiency of solid state random lasers. Vollhardt-Wölfle theory of photonic transport in disordered non-conserving and open random media, is coupled to lasing dynamics and solved positionally dependent. The interplay of non-linearity and homogeneous non-radiative frequency conversion by means of a Stokes-shift leads to a reduction of the quantum efficiency of the random laser. At the threshold a strong decrease of the spot-size in the stationary state is found due to the increase of non-radiative losses. The coherently emitted photon number per unit of modal surface is also strongly reduced. This result allows for the conclusion that Stokes-shifts are not sufficient to explain confined and extended mode regimes. PMID:26593237

  14. Tuning the Quantum Efficiency of Random Lasers - Intrinsic Stokes-Shift and Gain.

    PubMed

    Lubatsch, Andreas; Frank, Regine

    2015-11-23

    We report the theoretical analysis for tuning the quantum efficiency of solid state random lasers. Vollhardt-Wölfle theory of photonic transport in disordered non-conserving and open random media, is coupled to lasing dynamics and solved positionally dependent. The interplay of non-linearity and homogeneous non-radiative frequency conversion by means of a Stokes-shift leads to a reduction of the quantum efficiency of the random laser. At the threshold a strong decrease of the spot-size in the stationary state is found due to the increase of non-radiative losses. The coherently emitted photon number per unit of modal surface is also strongly reduced. This result allows for the conclusion that Stokes-shifts are not sufficient to explain confined and extended mode regimes.

  15. One Step Quantum Key Distribution Based on EPR Entanglement.

    PubMed

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-06-30

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.

  16. Secure communications using quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit ofmore » an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.« less

  17. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.

    PubMed

    Lucamarini, M; Yuan, Z L; Dynes, J F; Shields, A J

    2018-05-01

    Quantum key distribution (QKD) 1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre 3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration 4 . Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters 5-7 , is overcoming the fundamental rate-distance limit of QKD 8 . This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel 9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are 'twins' and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate-distance limit of QKD and greatly extending the range of secure quantum communications.

  18. Large conditional single-photon cross-phase modulation

    NASA Astrophysics Data System (ADS)

    Beck, Kristin; Hosseini, Mahdi; Duan, Yiheng; Vuletic, Vladan

    2016-05-01

    Deterministic optical quantum logic requires a nonlinear quantum process that alters the phase of a quantum optical state by π through interaction with only one photon. Here, we demonstrate a large conditional cross-phase modulation between a signal field, stored inside an atomic quantum memory, and a control photon that traverses a high-finesse optical cavity containing the atomic memory. This approach avoids fundamental limitations associated with multimode effects for traveling optical photons. We measure a conditional cross-phase shift of up to π / 3 between the retrieved signal and control photons, and confirm deterministic entanglement between the signal and control modes by extracting a positive concurrence. With a moderate improvement in cavity finesse, our system can reach a coherent phase shift of p at low loss, enabling deterministic and universal photonic quantum logic. Preprint: arXiv:1512.02166 [quant-ph

  19. Nongeometric conditional phase shift via adiabatic evolution of dark eigenstates: a new approach to quantum computation.

    PubMed

    Zheng, Shi-Biao

    2005-08-19

    We propose a new approach to quantum phase gates via the adiabatic evolution. The conditional phase shift is neither of dynamical nor geometric origin. It arises from the adiabatic evolution of the dark state itself. Taking advantage of the adiabatic passage, this kind of quantum logic gates is robust against moderate fluctuations of experimental parameters. In comparison with the geometric phase gates, it is unnecessary to drive the system to undergo a desired cyclic evolution to obtain a desired solid angle. Thus, the procedure is simplified, and the fidelity may be further improved since the errors in obtaining the required solid angle are avoided. We illustrate such a kind of quantum logic gates in the ion trap system. The idea can also be realized in other systems, opening a new perspective for quantum information processing.

  20. Quantum frequency conversion with ultra-broadband tuning in a Raman memory

    NASA Astrophysics Data System (ADS)

    Bustard, Philip J.; England, Duncan G.; Heshami, Khabat; Kupchak, Connor; Sussman, Benjamin J.

    2017-05-01

    Quantum frequency conversion is a powerful tool for the construction of hybrid quantum photonic technologies. Raman quantum memories are a promising method of conversion due to their broad bandwidths. Here we demonstrate frequency conversion of THz-bandwidth, fs-duration photons at the single-photon level using a Raman quantum memory based on the rotational levels of hydrogen molecules. We shift photons from 765 nm to wavelengths spanning from 673 to 590 nm—an absolute shift of up to 116 THz. We measure total conversion efficiencies of up to 10% and a maximum signal-to-noise ratio of 4.0(1):1, giving an expected conditional fidelity of 0.75, which exceeds the classical threshold of 2/3. Thermal noise could be eliminated by cooling with liquid nitrogen, giving noiseless conversion with wide tunability in the visible and infrared.

  1. Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lu Hua; Department of Mathematics and Physics, Hubei University of Technology, Wuhan 430068; Fung, Chi-Hang Fred

    2011-10-15

    In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob sends a qubit to Alice who then encodes a key bit onto the qubit and sends it back to Bob. After measuring the returned qubit, Bob can obtain Alice's key bit immediately, without basis reconciliation. Since an eavesdropper may attack the qubits traveling on either the Bob-Alice channel or the Alice-Bob channel, the security analysis of DQKD protocol with a two-way quantum channel is complicated and its unconditional security has been controversial. This paper presents a security proof of a single-photon four-state DQKD protocol against generalmore » attacks.« less

  2. Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol

    DTIC Science & Technology

    2011-06-01

    use in a quantum key system can be defined in two ways :  The number of messages passed between Alice and Bob  The...classical and quantum environment. Post- quantum cryptography , which is generally used to describe classical quantum -resilient protocols, includes...composed of a one- way quantum channel and a two - way classical channel. Owing to the physics of the channel, the quantum channel is subject to

  3. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  4. Proton chemical shift tensors determined by 3D ultrafast MAS double-quantum NMR spectroscopy

    NASA Astrophysics Data System (ADS)

    Zhang, Rongchun; Mroue, Kamal H.; Ramamoorthy, Ayyalusamy

    2015-10-01

    Proton NMR spectroscopy in the solid state has recently attracted much attention owing to the significant enhancement in spectral resolution afforded by the remarkable advances in ultrafast magic angle spinning (MAS) capabilities. In particular, proton chemical shift anisotropy (CSA) has become an important tool for obtaining specific insights into inter/intra-molecular hydrogen bonding. However, even at the highest currently feasible spinning frequencies (110-120 kHz), 1H MAS NMR spectra of rigid solids still suffer from poor resolution and severe peak overlap caused by the strong 1H-1H homonuclear dipolar couplings and narrow 1H chemical shift (CS) ranges, which render it difficult to determine the CSA of specific proton sites in the standard CSA/single-quantum (SQ) chemical shift correlation experiment. Herein, we propose a three-dimensional (3D) 1H double-quantum (DQ) chemical shift/CSA/SQ chemical shift correlation experiment to extract the CS tensors of proton sites whose signals are not well resolved along the single-quantum chemical shift dimension. As extracted from the 3D spectrum, the F1/F3 (DQ/SQ) projection provides valuable information about 1H-1H proximities, which might also reveal the hydrogen-bonding connectivities. In addition, the F2/F3 (CSA/SQ) correlation spectrum, which is similar to the regular 2D CSA/SQ correlation experiment, yields chemical shift anisotropic line shapes at different isotropic chemical shifts. More importantly, since the F2/F1 (CSA/DQ) spectrum correlates the CSA with the DQ signal induced by two neighboring proton sites, the CSA spectrum sliced at a specific DQ chemical shift position contains the CSA information of two neighboring spins indicated by the DQ chemical shift. If these two spins have different CS tensors, both tensors can be extracted by numerical fitting. We believe that this robust and elegant single-channel proton-based 3D experiment provides useful atomistic-level structural and dynamical information for a variety of solid systems that possess high proton density.

  5. Proton chemical shift tensors determined by 3D ultrafast MAS double-quantum NMR spectroscopy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Rongchun; Mroue, Kamal H.; Ramamoorthy, Ayyalusamy, E-mail: ramamoor@umich.edu

    2015-10-14

    Proton NMR spectroscopy in the solid state has recently attracted much attention owing to the significant enhancement in spectral resolution afforded by the remarkable advances in ultrafast magic angle spinning (MAS) capabilities. In particular, proton chemical shift anisotropy (CSA) has become an important tool for obtaining specific insights into inter/intra-molecular hydrogen bonding. However, even at the highest currently feasible spinning frequencies (110–120 kHz), {sup 1}H MAS NMR spectra of rigid solids still suffer from poor resolution and severe peak overlap caused by the strong {sup 1}H–{sup 1}H homonuclear dipolar couplings and narrow {sup 1}H chemical shift (CS) ranges, which rendermore » it difficult to determine the CSA of specific proton sites in the standard CSA/single-quantum (SQ) chemical shift correlation experiment. Herein, we propose a three-dimensional (3D) {sup 1}H double-quantum (DQ) chemical shift/CSA/SQ chemical shift correlation experiment to extract the CS tensors of proton sites whose signals are not well resolved along the single-quantum chemical shift dimension. As extracted from the 3D spectrum, the F1/F3 (DQ/SQ) projection provides valuable information about {sup 1}H–{sup 1}H proximities, which might also reveal the hydrogen-bonding connectivities. In addition, the F2/F3 (CSA/SQ) correlation spectrum, which is similar to the regular 2D CSA/SQ correlation experiment, yields chemical shift anisotropic line shapes at different isotropic chemical shifts. More importantly, since the F2/F1 (CSA/DQ) spectrum correlates the CSA with the DQ signal induced by two neighboring proton sites, the CSA spectrum sliced at a specific DQ chemical shift position contains the CSA information of two neighboring spins indicated by the DQ chemical shift. If these two spins have different CS tensors, both tensors can be extracted by numerical fitting. We believe that this robust and elegant single-channel proton-based 3D experiment provides useful atomistic-level structural and dynamical information for a variety of solid systems that possess high proton density.« less

  6. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  7. New insights into ETS-10 and titanate quantum wire: a comprehensive characterization.

    PubMed

    Jeong, Nak Cheon; Lee, Young Ju; Park, Jung-Hyun; Lim, Hyunjin; Shin, Chae-Ho; Cheong, Hyeonsik; Yoon, Kyung Byung

    2009-09-16

    The titanate quantum wires in ETS-10 crystals remain intact during ion exchange of the pristine cations (Na(+)(0.47) + K(+)(0.53)) with M(n+) ions (M(n+) = Na(+), K(+), Mg(2+), Ca(2+), Sr(2+), Ba(2+), Pb(2+), Cd(2+), Zn(2+)) and during reverse exchange of the newly exchanged cations with Na(+). The binding energies of O(1s) and Ti(2p) decrease as the electronegativity of the cation decreases, and they are inversely proportional to the negative partial charge of the framework oxygen [-delta(O(f))]. At least five different oxygen species were identified, and their binding energies (526.1-531.9 eV) indicate that the titanate-forming oxides are much more basic than those of aluminosilicate zeolites (530.2-533.3 eV), which explains the vulnerability of the quantum wire to acids and oxidants. The chemical shifts of the five NMR-spectroscopically nonequivalent Si sites, delta(I(A)), delta(I(B)), delta(II(A)), delta(II(B)), and delta(III), shift downfield as -delta(O(f)) increases, with slopes of 2.5, 18.6, 133.5, 216.3, and 93.8 ppm/[-delta(O(f))], respectively. The nonuniform responses of the chemical shifts to -delta(O(f)) arise from the phenomenon that the cations in the 12-membered-ring channels shift to the interiors of the cages surrounded by four seven-membered-ring windows. On the basis of the above, we assign delta(I(A)), delta(I(B)), delta(II(A)), and delta(II(B)) to the chemical shifts arising from Si(12,12), Si(12,7), Si(7,12), and Si(7,7) atoms, respectively. The frequency of the longitudinal stretching vibration of the titanate quantum wire increases linearly and the bandwidth decreases nonlinearly with increasing -delta(O(f)), indicating that the titanate quantum wire resembles a metallic carbon nanotube. As the degree of hydration increases, the vibrational frequency shifts linearly to higher frequencies while the bandwidth decreases. We identified another normal mode of vibration of the quantum wire, which vibrates in the region of 274-280 cm(-1). In the dehydrated state, the band-gap energy and the first absorption maximum shift to lower energies as -delta(O(f)) increases, indicating the oxide-to-titanium(IV) charge-transfer nature of the transitions.

  8. Stimulated emission in quantum well laser diodes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blood, P.

    1989-07-03

    We observe that stimulated emission from inhomogeneously pumped quantum well laser diodes is shifted down in energy compared with the subband transition energy. Measured spontaneous emission spectra show that this stimulated emission is due to band-to-band transitions shifted by renormalization at high injected carrier densities, and we suggest that this same mechanism explains reported observations of stimulated emission from inhomogeneously photopumped structures which previously have been interpreted as evidence for longitudinal optic (LO) phonon participation. We show that LO phonon participation cannot account for the photon energy of stimulated emission from conventional homogeneously pumped quantum well laser diodes.

  9. Device-independent secret-key-rate analysis for quantum repeaters

    NASA Astrophysics Data System (ADS)

    Holz, Timo; Kampermann, Hermann; Bruß, Dagmar

    2018-01-01

    The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We study secret key rates in the device-independent scenario for different quantum repeater setups and compare them to their device-dependent analogon. The quantum repeater setups under consideration are the original protocol by Briegel et al. [Phys. Rev. Lett. 81, 5932 (1998), 10.1103/PhysRevLett.81.5932] and the hybrid quantum repeater protocol by van Loock et al. [Phys. Rev. Lett. 96, 240501 (2006), 10.1103/PhysRevLett.96.240501]. For a given repeater scheme and a given QKD protocol, the secret key rate depends on a variety of parameters, such as the gate quality or the detector efficiency. We systematically analyze the impact of these parameters and suggest optimized strategies.

  10. First-principles calculations of Ti and O NMR chemical shift tensors in ferroelectric perovskites

    NASA Astrophysics Data System (ADS)

    Pechkis, Daniel; Walter, Eric; Krakauer, Henry

    2011-03-01

    Complementary chemical shift calculations were carried out with embedded clusters, using quantum chemistry methods, and with periodic boundary conditions, using the GIPAW approach within the Quantum Espresso package. Compared to oxygen chemical shifts, δ̂ (O), cluster calculations for δ̂ (Ti) were found to be more sensitive to size effects, termination, and choice of gaussian-type atomic basis set, while GIPAW results were found to be more sensitive to the pseudopotential construction. The two approaches complemented each other in optimizing these factors. We show that the two approaches yield comparable chemical shifts for suitably converged simulations, and results are compared with available experimental measurements. Supported by ONR.

  11. Ripplonic Lamb Shift for Electrons on Liquid Helium

    NASA Astrophysics Data System (ADS)

    Dykman, M. I.; Kono, K.; Konstantinov, D.; Lea, M. J.

    2017-12-01

    We study the shift of the energy levels of electrons on a helium surface due to the coupling to the quantum field of surface vibrations. As in quantum electrodynamics, the coupling is known, and it is known to lead to an ultraviolet divergence of the level shifts. We show that there are diverging terms of different nature and use the Bethe-type approach to show that they cancel each other, to leading order. This resolves the long-standing theoretical controversy and explains the existing experiments. The results allow us to study the temperature dependence of the level shift. The predictions are in good agreement with the experimental data, with no adjustable parameters.

  12. Prefixed-threshold real-time selection method in free-space quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Wenyuan; Xu, Feihu; Lo, Hoi-Kwong

    2018-03-01

    Free-space quantum key distribution allows two parties to share a random key with unconditional security, between ground stations, between mobile platforms, and even in satellite-ground quantum communications. Atmospheric turbulence causes fluctuations in transmittance, which further affect the quantum bit error rate and the secure key rate. Previous postselection methods to combat atmospheric turbulence require a threshold value determined after all quantum transmission. In contrast, here we propose a method where we predetermine the optimal threshold value even before quantum transmission. Therefore, the receiver can discard useless data immediately, thus greatly reducing data storage requirements and computing resources. Furthermore, our method can be applied to a variety of protocols, including, for example, not only single-photon BB84 but also asymptotic and finite-size decoy-state BB84, which can greatly increase its practicality.

  13. Development of multicomponent hybrid density functional theory with polarizable continuum model for the analysis of nuclear quantum effect and solvent effect on NMR chemical shift.

    PubMed

    Kanematsu, Yusuke; Tachikawa, Masanori

    2014-04-28

    We have developed the multicomponent hybrid density functional theory [MC_(HF+DFT)] method with polarizable continuum model (PCM) for the analysis of molecular properties including both nuclear quantum effect and solvent effect. The chemical shifts and H/D isotope shifts of the picolinic acid N-oxide (PANO) molecule in chloroform and acetonitrile solvents are applied by B3LYP electron exchange-correlation functional for our MC_(HF+DFT) method with PCM (MC_B3LYP/PCM). Our MC_B3LYP/PCM results for PANO are in reasonable agreement with the corresponding experimental chemical shifts and isotope shifts. We further investigated the applicability of our method for acetylacetone in several solvents.

  14. Shifts due to quantum-mechanical interference from distant neighboring resonances for saturated fluorescence spectroscopy of the 23S to 23P intervals of helium

    NASA Astrophysics Data System (ADS)

    Marsman, A.; Hessels, E. A.; Horbatsch, M.

    2014-04-01

    Quantum-mechanical interference with distant neighboring resonances is found to cause shifts for precision saturated fluorescence spectroscopy of the atomic helium 23S-to-23P transitions. The shifts are significant (larger than the experimental uncertainties for measurements of the intervals) despite the fact that the neighboring resonances are separated from the measured resonances by 1400 and 20000 natural widths. The shifts depend strongly on experimental parameters such as the angular position of the fluorescence detector, the intensity and size of laser beams, and the properties of the atomic beam. These shifts must be considered for the ongoing program of determining the fine-structure constant from the helium 23P fine structure.

  15. Continuous QKD and high speed data encryption

    NASA Astrophysics Data System (ADS)

    Zbinden, Hugo; Walenta, Nino; Guinnard, Olivier; Houlmann, Raphael; Wen, Charles Lim Ci; Korzh, Boris; Lunghi, Tommaso; Gisin, Nicolas; Burg, Andreas; Constantin, Jeremy; Legré, Matthieu; Trinkler, Patrick; Caselunghe, Dario; Kulesza, Natalia; Trolliet, Gregory; Vannel, Fabien; Junod, Pascal; Auberson, Olivier; Graf, Yoan; Curchod, Gilles; Habegger, Gilles; Messerli, Etienne; Portmann, Christopher; Henzen, Luca; Keller, Christoph; Pendl, Christian; Mühlberghuber, Michael; Roth, Christoph; Felber, Norbert; Gürkaynak, Frank; Schöni, Daniel; Muheim, Beat

    2013-10-01

    We present the results of a Swiss project dedicated to the development of high speed quantum key distribution and data encryption. The QKD engine features fully automated key exchange, hardware key distillation based on finite key security analysis, efficient authentication and wavelength division multiplexing of the quantum and the classical channel and one-time pas encryption. The encryption device allows authenticated symmetric key encryption (e.g AES) at rates of up to 100 Gb/s. A new quantum key can uploaded up to 1000 times second from the QKD engine.

  16. Counterfactual quantum key distribution with high efficiency

    NASA Astrophysics Data System (ADS)

    Sun, Ying; Wen, Qiao-Yan

    2010-11-01

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  17. Counterfactual quantum key distribution with high efficiency

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sun Ying; Beijing Electronic Science and Technology Institute, Beijing 100070; Wen Qiaoyan

    2010-11-15

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  18. Quantum Cryptography for Secure Communications to Low-Earth Orbit Satellites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1999-06-03

    This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) project at Los Alamos National Laboratory (LANL). Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the quantum transmissions, nor evade detection. Key material is built up using the transmission of a single-photon per bit. We have developed an experimental quantum cryptography system based on the transmissionmore » of non-orthogonal single-photon polarization states to generate shared key material over line-of-sight optical links. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on in orbit.« less

  19. Inkjet printed fluorescent nanorod layers exhibit superior optical performance over quantum dots

    NASA Astrophysics Data System (ADS)

    Halivni, Shira; Shemesh, Shay; Waiskopf, Nir; Vinetsky, Yelena; Magdassi, Shlomo; Banin, Uri

    2015-11-01

    Semiconductor nanocrystals exhibit unique fluorescence properties which are tunable in size, shape and composition. The high quantum yield and enhanced stability have led to their use in biomedical imaging and flat panel displays. Here, semiconductor nanorod based inkjet inks are presented, overcoming limitations of the commonly reported quantum dots in printing applications. Fluorescent seeded nanorods were found to be outstanding candidates for fluorescent inks, due to their low particle-particle interactions and negligible self-absorption. This is manifested by insignificant emission shifts upon printing, even in highly concentrated printed layers and by maintenance of a high fluorescence quantum yield, unlike quantum dots which exhibit fluorescence wavelength shifts and quenching effects. This behavior results from the reduced absorption/emission overlap, accompanied by low energy transfer efficiencies between the nanorods as supported by steady state and time resolved fluorescence measurements. The new seeded nanorod inks enable patterning of thin fluorescent layers, for demanding light emission applications such as signage and displays.Semiconductor nanocrystals exhibit unique fluorescence properties which are tunable in size, shape and composition. The high quantum yield and enhanced stability have led to their use in biomedical imaging and flat panel displays. Here, semiconductor nanorod based inkjet inks are presented, overcoming limitations of the commonly reported quantum dots in printing applications. Fluorescent seeded nanorods were found to be outstanding candidates for fluorescent inks, due to their low particle-particle interactions and negligible self-absorption. This is manifested by insignificant emission shifts upon printing, even in highly concentrated printed layers and by maintenance of a high fluorescence quantum yield, unlike quantum dots which exhibit fluorescence wavelength shifts and quenching effects. This behavior results from the reduced absorption/emission overlap, accompanied by low energy transfer efficiencies between the nanorods as supported by steady state and time resolved fluorescence measurements. The new seeded nanorod inks enable patterning of thin fluorescent layers, for demanding light emission applications such as signage and displays. Electronic supplementary information (ESI) available. See DOI: 10.1039/c5nr06248a

  20. Experimental quantum cryptography with qutrits

    NASA Astrophysics Data System (ADS)

    Gröblacher, Simon; Jennewein, Thomas; Vaziri, Alipasha; Weihs, Gregor; Zeilinger, Anton

    2006-05-01

    We produce two identical keys using, for the first time, entangled trinary quantum systems (qutrits) for quantum key distribution. The advantage of qutrits over the normally used binary quantum systems is an increased coding density and a higher security margin. The qutrits are encoded into the orbital angular momentum of photons, namely Laguerre Gaussian modes with azimuthal index l + 1, 0 and -1, respectively. The orbital angular momentum is controlled with phase holograms. In an Ekert-type protocol the violation of a three-dimensional Bell inequality verifies the security of the generated keys. A key is obtained with a qutrit error rate of approximately 10%.

  1. One Step Quantum Key Distribution Based on EPR Entanglement

    PubMed Central

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-01-01

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper’s attack would introduce at least an error rate of 46.875%. Compared with the “Ping-pong” protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step. PMID:27357865

  2. Strain-Induced Spin-Resonance Shifts in Silicon Devices

    NASA Astrophysics Data System (ADS)

    Pla, J. J.; Bienfait, A.; Pica, G.; Mansir, J.; Mohiyaddin, F. A.; Zeng, Z.; Niquet, Y. M.; Morello, A.; Schenkel, T.; Morton, J. J. L.; Bertet, P.

    2018-04-01

    In spin-based quantum-information-processing devices, the presence of control and detection circuitry can change the local environment of a spin by introducing strain and electric fields, altering its resonant frequencies. These resonance shifts can be large compared to intrinsic spin linewidths, and it is therefore important to study, understand, and model such effects in order to better predict device performance. We investigate a sample of bismuth donor spins implanted in a silicon chip, on top of which a superconducting aluminum microresonator is fabricated. The on-chip resonator provides two functions: it produces local strain in the silicon due to the larger thermal contraction of the aluminum, and it enables sensitive electron spin-resonance spectroscopy of donors close to the surface that experience this strain. Through finite-element strain simulations, we are able to reconstruct key features of our experiments, including the electron spin-resonance spectra. Our results are consistent with a recently observed mechanism for producing shifts of the hyperfine interaction for donors in silicon, which is linear with the hydrostatic component of an applied strain.

  3. Experimental demonstration of subcarrier multiplexed quantum key distribution system.

    PubMed

    Mora, José; Ruiz-Alba, Antonio; Amaya, Waldimar; Martínez, Alfonso; García-Muñoz, Víctor; Calvo, David; Capmany, José

    2012-06-01

    We provide, to our knowledge, the first experimental demonstration of the feasibility of sending several parallel keys by exploiting the technique of subcarrier multiplexing (SCM) widely employed in microwave photonics. This approach brings several advantages such as high spectral efficiency compatible with the actual secure key rates, the sharing of the optical fainted pulse by all the quantum multiplexed channels reducing the system complexity, and the possibility of upgrading with wavelength division multiplexing in a two-tier scheme, to increase the number of parallel keys. Two independent quantum SCM channels featuring a sifted key rate of 10 Kb/s/channel over a link with quantum bit error rate <2% is reported.

  4. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  5. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  6. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  7. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  8. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  9. Influence of quantum diffraction and shielding on electron-ion collision in two-component semiclassical plasmas

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hong, Woo-Pyo; Jung, Young-Dae, E-mail: ydjung@hanyang.ac.kr; Department of Applied Physics and Department of Bionanotechnology, Hanyang University, Ansan, Kyunggi-Do 426-791

    2015-01-15

    The influence of quantum diffraction and shielding on the electron-ion collision process is investigated in two-component semiclassical plasmas. The eikonal method and micropotential taking into account the quantum diffraction and shielding are used to obtain the eikonal scattering phase shift and the eikonal collision cross section as functions of the collision energy, density parameter, Debye length, electron de Broglie wavelength, and the impact parameter. The result shows that the quantum diffraction and shielding effects suppress the eikonal scattering phase shift as well as the differential eikonal collision cross section, especially, in small-impact parameter regions. It is also shown that themore » quantum shielding effect on the eikonal collision cross section is more important in low-collision energies. In addition, it is found that the eikonal collision cross section increases with an increase in the density parameter. The variations of the eikonal cross section due to the quantum diffraction and shielding effects are also discussed.« less

  10. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2016-03-10

    Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing 2 | P a g e Approved for public release; distribution is...we have continued work calculating the key rates achievable parametrically with receiver performance. In addition, we describe the initial designs

  11. Large conditional single-photon cross-phase modulation

    PubMed Central

    Hosseini, Mahdi; Duan, Yiheng; Vuletić, Vladan

    2016-01-01

    Deterministic optical quantum logic requires a nonlinear quantum process that alters the phase of a quantum optical state by π through interaction with only one photon. Here, we demonstrate a large conditional cross-phase modulation between a signal field, stored inside an atomic quantum memory, and a control photon that traverses a high-finesse optical cavity containing the atomic memory. This approach avoids fundamental limitations associated with multimode effects for traveling optical photons. We measure a conditional cross-phase shift of π/6 (and up to π/3 by postselection on photons that remain in the system longer than average) between the retrieved signal and control photons, and confirm deterministic entanglement between the signal and control modes by extracting a positive concurrence. By upgrading to a state-of-the-art cavity, our system can reach a coherent phase shift of π at low loss, enabling deterministic and universal photonic quantum logic. PMID:27519798

  12. Provably secure and high-rate quantum key distribution with time-bin qudits

    DOE PAGES

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; ...

    2017-11-24

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less

  13. Provably secure and high-rate quantum key distribution with time-bin qudits

    PubMed Central

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2017-01-01

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system. PMID:29202028

  14. Provably secure and high-rate quantum key distribution with time-bin qudits.

    PubMed

    Islam, Nurul T; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J

    2017-11-01

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.

  15. Provably secure and high-rate quantum key distribution with time-bin qudits

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less

  16. Frequency shifts in gravitational resonance spectroscopy

    DOE PAGES

    Baeßler, S.; Nesvizhevsky, V. V.; Pignol, G.; ...

    2015-02-25

    Quantum states of ultracold neutrons in a gravitational field are characterized through gravitational resonance spectroscopy. This paper discusses systematic effects that appear in the spectroscopic measurements. The discussed frequency shifts-which we call the Stern-Gerlach shift, interference shift, and spectator-state shift-appear in conceivable measurement schemes and have general importance. Lastly, these shifts have to be taken into account in precision experiments.

  17. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N.

    2008-07-15

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determinedmore » for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency ({eta} {approx} 20%) and dark count probability (p{sub dark} {approx} 10{sup -7})« less

  18. Information security: from classical to quantum

    NASA Astrophysics Data System (ADS)

    Barnett, Stephen M.; Brougham, Thomas

    2012-09-01

    Quantum cryptography was designed to provide a new approach to the problem of distributing keys for private-key cryptography. The principal idea is that security can be ensured by exploiting the laws of quantum physics and, in particular, by the fact that any attempt to measure a quantum state will change it uncontrollably. This change can be detected by the legitimate users of the communication channel and so reveal to them the presence of an eavesdropper. In this paper I explain (briefly) how quantum key distribution works and some of the progress that has been made towards making this a viable technology. With the principles of quantum communication and quantum key distribution firmly established, it is perhaps time to consider how efficient it can be made. It is interesting to ask, in particular, how many bits of information might reasonably be encoded securely on each photon. The use of photons entangled in their time of arrival might make it possible to achieve data rates in excess of 10 bits per photon.

  19. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    NASA Astrophysics Data System (ADS)

    Molotkov, S. N.

    2008-07-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper’s capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ≈ 20%) and dark count probability ( p dark ˜ 10-7).

  20. Quantum cryptography as a retrodiction problem.

    PubMed

    Werner, A H; Franz, T; Werner, R F

    2009-11-27

    We propose a quantum key distribution protocol based on a quantum retrodiction protocol, known as the Mean King problem. The protocol uses a two way quantum channel. We show security against coherent attacks in a transmission-error free scenario, even if Eve is allowed to attack both transmissions. This establishes a connection between retrodiction and key distribution.

  1. Maintenance-free operation of WDM quantum key distribution system through a field fiber over 30 days

    NASA Astrophysics Data System (ADS)

    Yoshino, Ken-ichiro; Ochi, Takao; Fujiwara, Mikio; Sasaki, Masahide; Tajima, Akio

    2013-12-01

    Maintenance-free wavelength-division-multiplexing quantum key distribution for 30 days was achieved through a 22-km field fiber. Using polarization-independent interferometers and stabilization techniques, we attained a quantum bit error rate as low as 1.70% and a key rate as high as 229.8 kbps, making the record of total secure key of 595.6 Gbits accumulated over an uninterrupted operation period.

  2. Multiparty Quantum Secret Sharing of Key Using Practical Faint Laser Pulses

    NASA Astrophysics Data System (ADS)

    Zhang, Zhan-Jun; Man, Zhong-Xiao

    2005-07-01

    Based on a bidirectional quantum key distribution protocol [Phys. Rev. A 70 (2004) 012311], we propose a (m-1,m-1)-threshold scheme of m (m >= 3)-party quantum secret sharing of key by using practical faint laser pulses. In our scheme, if all the m-1 sharers collaborate, they can obtain the joint secret key from the message sender. Our scheme is more feasible according to the present-day technology.

  3. Continuous wave operation of quantum cascade lasers with frequency-shifted feedback

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lyakh, A., E-mail: arkadiy.lyakh@ucf.edu; NanoScience Technology Center, University of Central Florida, 12424 Research Pkwy, Orlando, FL 32826; College of Optics and Photonics, University of Central Florida, 304 Scorpius St, Orlando, FL 32826

    2016-01-15

    Operation of continuous wave quantum cascade lasers with a frequency-shifted feedback provided by an acousto-optic modulator is reported. Measured linewidth of 1.7 cm{sup −1} for these devices, under CW operating conditions, was in a good agreement with predictions of a model based on frequency-shifted feedback seeded by spontaneous emission. Linewidth broadening was observed for short sweep times, consistent with sound wave grating period variation across the illuminated area on the acousto-optic modulator. Standoff detection capability of the AOM-based QCL setup was demonstrated for several solid materials.

  4. Analysis and investigation of temperature and hydrostatic pressure effects on optical characteristics of multiple quantum well slow light devices.

    PubMed

    Abdolhosseini, Saeed; Kohandani, Reza; Kaatuzian, Hassan

    2017-09-10

    This paper represents the influences of temperature and hydrostatic pressure variations on GaAs/AlGaAs multiple quantum well slow light systems based on coherence population oscillations. An analytical model in non-integer dimension space is used to study the considerable effects of these parameters on optical properties of the slow light apparatus. Exciton oscillator strength and fractional dimension constants have special roles on the analytical model in fractional dimension. Hence, the impacts of hydrostatic pressure and temperature on exciton oscillator strength and fractional dimension quantity are investigated theoretically in this paper. Based on the achieved results, temperature and hydrostatic pressure play key roles on optical parameters of the slow light systems, such as the slow down factor and central energy of the device. It is found that the slope and value of the refractive index real part change with alterations of temperature and hydrostatic pressure in the range of 5-40 deg of Kelvin and 1 bar to 2 kbar, respectively. Thus, the peak value of the slow down factor can be adjusted by altering these parameters. Moreover, the central energy of the device shifts when the hydrostatic pressure is applied to the slow light device or temperature is varied. In comparison with previous reported experimental results, our simulations follow them successfully. It is shown that the maximum value of the slow down factor is estimated close to 5.5×10 4 with a fine adjustment of temperature and hydrostatic pressure. Meanwhile, the central energy shift of the slow light device rises up to 27 meV, which provides an appropriate basis for different optical devices in which multiple quantum well slow light is one of their essential subsections. This multiple quantum well slow light device has potential applications for use as a tunable optical buffer and pressure/temperature sensors.

  5. Biological sensing and control of emission dynamics of quantum dot bioconjugates using arrays of long metallic nanorods.

    PubMed

    Sadeghi, Seyed M; Gutha, Rithvik R; Wing, Waylin J; Sharp, Christina; Capps, Lucas; Mao, Chuanbin

    2017-01-01

    We study biological sensing using plasmonic and photonic-plasmonic resonances of arrays of ultralong metallic nanorods and analyze the impact of these resonances on emission dynamics of quantum dot bioconjugates. We demonstrate that the LSPRs and plasmonic lattice modes of such array can be used to detect a single self-assembled monolayer of alkanethiol at the visible (550 nm) and near infrared (770 nm) range with well resolved shifts. We study adsorption of streptavidin-quantum dot conjugates to this monolayer, demonstrating that formation of nearly two dimensional arrays of quantum dots with limited emission blinking can lead to extra well-defined wavelength shifts in these modes. Using spectrally-resolved lifetime measurements we study the emission dynamics of such quantum dot bioconjugates within their monodispersed size distribution. We show that, despite their close vicinity to the nanorods, the rate of energy transfer from these quantum dots to nanorods is rather weak, while the plasmon field enhancement can be strong. Our results reveal that the nanorods present a strongly wavelength or size-dependent non-radiative decay channel to the quantum dot bioconjugates.

  6. Tomographic quantum cryptography: equivalence of quantum and classical key distillation.

    PubMed

    Bruss, Dagmar; Christandl, Matthias; Ekert, Artur; Englert, Berthold-Georg; Kaszlikowski, Dagomir; Macchiavello, Chiara

    2003-08-29

    The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.

  7. Quantum cryptography with entangled photons

    PubMed

    Jennewein; Simon; Weihs; Weinfurter; Zeilinger

    2000-05-15

    By realizing a quantum cryptography system based on polarization entangled photon pairs we establish highly secure keys, because a single photon source is approximated and the inherent randomness of quantum measurements is exploited. We implement a novel key distribution scheme using Wigner's inequality to test the security of the quantum channel, and, alternatively, realize a variant of the BB84 protocol. Our system has two completely independent users separated by 360 m, and generates raw keys at rates of 400-800 bits/s with bit error rates around 3%.

  8. Experimental demonstration of counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Ren, M.; Wu, G.; Wu, E.; Zeng, H.

    2011-04-01

    Counterfactual quantum key distribution provides natural advantage against the eavesdropping on the actual signal particles. It can prevent the photon-number-splitting attack when a weak coherent light source is used for the practical implementation. We experimentally realized the counterfactual quantum key distribution in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility of 97.4%. According to the security analysis, the system was robust against the photon-number-splitting attack. The article is published in the original.

  9. Channel analysis for single photon underwater free space quantum key distribution.

    PubMed

    Shi, Peng; Zhao, Shi-Cheng; Gu, Yong-Jian; Li, Wen-Dong

    2015-03-01

    We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate, and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.

  10. Experimental quantum data locking

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Cao, Zhu; Wu, Cheng; Fukuda, Daiji; You, Lixing; Zhong, Jiaqiang; Numata, Takayuki; Chen, Sijing; Zhang, Weijun; Shi, Sheng-Cai; Lu, Chao-Yang; Wang, Zhen; Ma, Xiongfeng; Fan, Jingyun; Zhang, Qiang; Pan, Jian-Wei

    2016-08-01

    Classical correlation can be locked via quantum means: quantum data locking. With a short secret key, one can lock an exponentially large amount of information in order to make it inaccessible to unauthorized users without the key. Quantum data locking presents a resource-efficient alternative to one-time pad encryption which requires a key no shorter than the message. We report experimental demonstrations of a quantum data locking scheme originally proposed by D. P. DiVincenzo et al. [Phys. Rev. Lett. 92, 067902 (2004), 10.1103/PhysRevLett.92.067902] and a loss-tolerant scheme developed by O. Fawzi et al. [J. ACM 60, 44 (2013), 10.1145/2518131]. We observe that the unlocked amount of information is larger than the key size in both experiments, exhibiting strong violation of the incremental proportionality property of classical information theory. As an application example, we show the successful transmission of a photo over a lossy channel with quantum data (un)locking and error correction.

  11. Fundamental rate-loss tradeoff for optical quantum key distribution.

    PubMed

    Takeoka, Masahiro; Guha, Saikat; Wilde, Mark M

    2014-10-24

    Since 1984, various optical quantum key distribution (QKD) protocols have been proposed and examined. In all of them, the rate of secret key generation decays exponentially with distance. A natural and fundamental question is then whether there are yet-to-be discovered optical QKD protocols (without quantum repeaters) that could circumvent this rate-distance tradeoff. This paper provides a major step towards answering this question. Here we show that the secret key agreement capacity of a lossy and noisy optical channel assisted by unlimited two-way public classical communication is limited by an upper bound that is solely a function of the channel loss, regardless of how much optical power the protocol may use. Our result has major implications for understanding the secret key agreement capacity of optical channels-a long-standing open problem in optical quantum information theory-and strongly suggests a real need for quantum repeaters to perform QKD at high rates over long distances.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baeßler, S.; Nesvizhevsky, V. V.; Pignol, G.

    Quantum states of ultracold neutrons in a gravitational field are characterized through gravitational resonance spectroscopy. This paper discusses systematic effects that appear in the spectroscopic measurements. The discussed frequency shifts-which we call the Stern-Gerlach shift, interference shift, and spectator-state shift-appear in conceivable measurement schemes and have general importance. Lastly, these shifts have to be taken into account in precision experiments.

  13. Research on Quantum Algorithms at the Institute for Quantum Information and Matter

    DTIC Science & Technology

    2016-05-29

    local quantum computation with applications to position-based cryptography , New Journal of Physics, (09 2011): 0. doi: 10.1088/1367-2630/13/9/093036... cryptography , such as the ability to turn private-key encryption into public-key encryption. While ad hoc obfuscators exist, theoretical progress has mainly...to device-independent quantum cryptography , to quantifying entanglement, and to the classification of quantum phases of matter. Exact synthesis

  14. Photoluminescence Spectra From The Direct Energy Gap of a-SiQDs

    NASA Astrophysics Data System (ADS)

    Abdul-Ameer, Nidhal M.; Abdulrida, Moafak C.; Abdul-Hakeem, Shatha M.

    2018-05-01

    A theoretical model for radiative recombination in amorphous silicon quantum dots (a-SiQDs) was developed. In this model, for the first time, the coexistence of both spatial and quantum confinements were considered. Also, it is found that the photoluminescence exhibits significant size dependence in the range (1-4) nm of the quantum dots. a-SiQDs show visible light emission peak energies and high radiative quantum efficiency at room temperature,in contrast to bulk a-Si structures. The quantum efficiency is sensitive to any change in defect density (the volume nonradiative centers density and/or the surface nonradiative centers density) but, with small dots sizes, the quantum efficiency is insensitive to such defects. Our analysis shows that the photoluminescence intensity increases or decreases by the effect of radiative quantum efficiency. By controlling the size of a-SiQDs, we note that the energy of emission can be tuned. The blue shift is attributed to quantum confinement effect. Meanwhile, the spatial confinement effect is clearly observed in red shift in emission spectra. we found a good agreement with the experimental published data. Therefore, we assert that a-SiQDs material is a promising candidate for visible, tunable, and high performance devices of light emitting.

  15. Controlled synthesis of AlN/GaN multiple quantum well nanowire structures and their optical properties.

    PubMed

    Qian, Fang; Brewster, Megan; Lim, Sung K; Ling, Yichuan; Greene, Christopher; Laboutin, Oleg; Johnson, Jerry W; Gradečak, Silvija; Cao, Yu; Li, Yat

    2012-06-13

    We report the controlled synthesis of AlN/GaN multi-quantum well (MQW) radial nanowire heterostructures by metal-organic chemical vapor deposition. The structure consists of a single-crystal GaN nanowire core and an epitaxially grown (AlN/GaN)(m) (m = 3, 13) MQW shell. Optical excitation of individual MQW nanowires yielded strong, blue-shifted photoluminescence in the range 340-360 nm, with respect to the GaN near band-edge emission at 368.8 nm. Cathodoluminescence analysis on the cross-sectional MQW nanowire samples showed that the blue-shifted ultraviolet luminescence originated from the GaN quantum wells, while the defect-associated yellow luminescence was emitted from the GaN core. Computational simulation provided a quantitative analysis of the mini-band energies in the AlN/GaN superlattices and suggested the observed blue-shifted emission corresponds to the interband transitions between the second subbands of GaN, as a result of quantum confinement and strain effect in these AlN/GaN MQW nanowire structures.

  16. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less

  17. Optimized decoy state QKD for underwater free space communication

    NASA Astrophysics Data System (ADS)

    Lopes, Minal; Sarwade, Nisha

    Quantum cryptography (QC) is envisioned as a solution for global key distribution through fiber optic, free space and underwater optical communication due to its unconditional security. In view of this, this paper investigates underwater free space quantum key distribution (QKD) model for enhanced transmission distance, secret key rates and security. It is reported that secure underwater free space QKD is feasible in the clearest ocean water with the sifted key rates up to 207kbps. This paper extends this work by testing performance of optimized decoy state QKD protocol with underwater free space communication model. The attenuation of photons, quantum bit error rate and the sifted key generation rate of underwater quantum communication is obtained with vector radiative transfer theory and Monte Carlo method. It is observed from the simulations that optimized decoy state QKD evidently enhances the underwater secret key transmission distance as well as secret key rates.

  18. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  19. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  20. On the complexity of search for keys in quantum cryptography

    NASA Astrophysics Data System (ADS)

    Molotkov, S. N.

    2016-03-01

    The trace distance is used as a security criterion in proofs of security of keys in quantum cryptography. Some authors doubted that this criterion can be reduced to criteria used in classical cryptography. The following question has been answered in this work. Let a quantum cryptography system provide an ɛ-secure key such that ½‖ρ XE - ρ U ⊗ ρ E ‖1 < ɛ, which will be repeatedly used in classical encryption algorithms. To what extent does the ɛ-secure key reduce the number of search steps (guesswork) as compared to the use of ideal keys? A direct relation has been demonstrated between the complexity of the complete consideration of keys, which is one of the main security criteria in classical systems, and the trace distance used in quantum cryptography. Bounds for the minimum and maximum numbers of search steps for the determination of the actual key have been presented.

  1. Quantum-chaotic cryptography

    NASA Astrophysics Data System (ADS)

    de Oliveira, G. L.; Ramos, R. V.

    2018-03-01

    In this work, it is presented an optical scheme for quantum key distribution employing two synchronized optoelectronic oscillators (OEO) working in the chaotic regime. The produced key depends on the chaotic dynamic, and the synchronization between Alice's and Bob's OEOs uses quantum states. An attack on the synchronization signals will disturb the synchronization of the chaotic systems increasing the error rate in the final key.

  2. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  3. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution.

    PubMed

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-10-14

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate.

  4. Optical π phase shift created with a single-photon pulse.

    PubMed

    Tiarks, Daniel; Schmidt, Steffen; Rempe, Gerhard; Dürr, Stephan

    2016-04-01

    A deterministic photon-photon quantum logic gate is a long-standing goal. Building such a gate becomes possible if a light pulse containing only one photon imprints a phase shift of π onto another light field. We experimentally demonstrate the generation of such a π phase shift with a single-photon pulse. A first light pulse containing less than one photon on average is stored in an atomic gas. Rydberg blockade combined with electromagnetically induced transparency creates a phase shift for a second light pulse, which propagates through the medium. We measure the π phase shift of the second pulse when we postselect the data upon the detection of a retrieved photon from the first pulse. This demonstrates a crucial step toward a photon-photon gate and offers a variety of applications in the field of quantum information processing.

  5. Robust quantum data locking from phase modulation

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Wilde, Mark M.; Lloyd, Seth

    2014-08-01

    Quantum data locking is a uniquely quantum phenomenon that allows a relatively short key of constant size to (un)lock an arbitrarily long message encoded in a quantum state, in such a way that an eavesdropper who measures the state but does not know the key has essentially no information about the message. The application of quantum data locking in cryptography would allow one to overcome the limitations of the one-time pad encryption, which requires the key to have the same length as the message. However, it is known that the strength of quantum data locking is also its Achilles heel, as the leakage of a few bits of the key or the message may in principle allow the eavesdropper to unlock a disproportionate amount of information. In this paper we show that there exist quantum data locking schemes that can be made robust against information leakage by increasing the length of the key by a proportionate amount. This implies that a constant size key can still lock an arbitrarily long message as long as a fraction of it remains secret to the eavesdropper. Moreover, we greatly simplify the structure of the protocol by proving that phase modulation suffices to generate strong locking schemes, paving the way to optical experimental realizations. Also, we show that successful data locking protocols can be constructed using random code words, which very well could be helpful in discovering random codes for data locking over noisy quantum channels.

  6. Covalent functionalized black phosphorus quantum dots

    NASA Astrophysics Data System (ADS)

    Scotognella, Francesco; Kriegel, Ilka; Sassolini, Simone

    2018-01-01

    Black phosphorus (BP) nanostructures enable a new strategy to tune the electronic and optical properties of this atomically thin material. In this paper we show, via density functional theory calculations, the possibility to modify the optical properties of BP quantum dots via covalent functionalization. The quantum dot selected in this study has chemical formula P24H12 and has been covalent functionalized with one or more benzene rings or anthracene. The effect of functionalization is highlighted in the absorption spectra, where a red shift of the absorption is noticeable. The shift can be ascribed to an electron delocalization in the black phosphorus/organic molecule nanostructure.

  7. Quantum cost optimized design of 4-bit reversible universal shift register using reduced number of logic gate

    NASA Astrophysics Data System (ADS)

    Maity, H.; Biswas, A.; Bhattacharjee, A. K.; Pal, A.

    In this paper, we have proposed the design of quantum cost (QC) optimized 4-bit reversible universal shift register (RUSR) using reduced number of reversible logic gates. The proposed design is very useful in quantum computing due to its low QC, less no. of reversible logic gate and less delay. The QC, no. of gates, garbage outputs (GOs) are respectively 64, 8 and 16 for proposed work. The improvement of proposed work is also presented. The QC is 5.88% to 70.9% improved, no. of gate is 60% to 83.33% improved with compared to latest reported result.

  8. Two-party quantum key agreement protocols under collective noise channel

    NASA Astrophysics Data System (ADS)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  9. Practical issues in quantum-key-distribution postprocessing

    NASA Astrophysics Data System (ADS)

    Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.

    2010-01-01

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  10. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  11. Quantum interference in laser spectroscopy of highly charged lithiumlike ions

    NASA Astrophysics Data System (ADS)

    Amaro, Pedro; Loureiro, Ulisses; Safari, Laleh; Fratini, Filippo; Indelicato, Paul; Stöhlker, Thomas; Santos, José Paulo

    2018-02-01

    We investigate the quantum interference induced shifts between energetically close states in highly charged ions, with the energy structure being observed by laser spectroscopy. In this work, we focus on hyperfine states of lithiumlike heavy-Z isotopes and quantify how much quantum interference changes the observed transition frequencies. The process of photon excitation and subsequent photon decay for the transition 2 s →2 p →2 s is implemented with fully relativistic and full-multipole frameworks, which are relevant for such relativistic atomic systems. We consider the isotopes 79+207Pb and 80+209Bi due to experimental interest, as well as other examples of isotopes with lower Z , namely 56+141Pr and 64+165Ho. We conclude that quantum interference can induce shifts up to 11% of the linewidth in the measurable resonances of the considered isotopes, if interference between resonances is neglected. The inclusion of relativity decreases the cross section by 35%, mainly due to the complete retardation form of the electric dipole multipole. However, the contribution of the next higher multipoles (e.g., magnetic quadrupole) to the cross section is negligible. This makes the contribution of relativity and higher-order multipoles to the quantum interference induced shifts a minor effect, even for heavy-Z elements.

  12. Coherently-enabled environmental control of optics and energy transfer pathways of hybrid quantum dot-metallic nanoparticle systems.

    PubMed

    Hatef, Ali; Sadeghi, Seyed M; Fortin-Deschênes, Simon; Boulais, Etienne; Meunier, Michel

    2013-03-11

    It is well-known that optical properties of semiconductor quantum dots can be controlled using optical cavities or near fields of localized surface plasmon resonances (LSPRs) of metallic nanoparticles. In this paper we study the optics, energy transfer pathways, and exciton states of quantum dots when they are influenced by the near fields associated with plasmonic meta-resonances. Such resonances are formed via coherent coupling of excitons and LSPRs when the quantum dots are close to metallic nanorods and driven by a laser beam. Our results suggest an unprecedented sensitivity to the refractive index of the environment, causing significant spectral changes in the Förster resonance energy transfer from the quantum dots to the nanorods and in exciton transition energies. We demonstrate that when a quantum dot-metallic nanorod system is close to its plasmonic meta-resonance, we can adjust the refractive index to: (i) control the frequency range where the energy transfer from the quantum dot to the metallic nanorod is inhibited, (ii) manipulate the exciton transition energy shift of the quantum dot, and (iii) disengage the quantum dot from the metallic nanoparticle and laser field. Our results show that near meta-resonances the spectral forms of energy transfer and exciton energy shifts are strongly correlated to each other.

  13. An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution

    DTIC Science & Technology

    2012-02-01

    offers another alternative for exchanging a symmetric key without compromising security. Quantum cryptography is the use of quantum mechanics to... quantum money), and, more significantly for our purposes here, a method for the transmission of two or three messages in such a way that reading...well as two channels. A quantum channel is used to communicate qubits (photons), and it is assumed that only active eavesdropping may take place on

  14. Why Do Silver Trimers Intercalated in DNA Exhibit Unique Nonlinear Properties That Are Promising for Applications?

    PubMed

    Bonačić-Koutecký, Vlasta; Perić, Martina; Sanader, Željka

    2018-05-17

    Our investigation of one-photon absorption (OPA) and nonlinear optical (NLO) properties such as two-photon absorption (TPA) of silver trimer intercalated in DNA based on TDDFT approach allowed us to propose a mechanism responsible for large TPA cross sections of such NLO-phores. We present a concept that illustrates the key role of quantum cluster as well as of nucleotide bases from the immediate neighborhood. For this purpose, different surroundings consisting of guanine-cytosine and adenine-thymine such as (GCGC) and (ATAT) have been investigated that are exhibiting substantially different values of TPA cross sections. This has been confirmed by extending the immediate surroundings as well as using the two-layer quantum mechanics/molecular mechanics (QM/MM) approach. We focus on the cationic closed-shell system and illustrate that the neutral open-shell system shifts OPA spectra into the NIR regime, which is suitable for applications. Thus, in this contribution, we propose novel NLO-phores inducing large TPA cross sections, opening the route for multiphoton imaging.

  15. Nonperturbative Quantum Physics from Low-Order Perturbation Theory.

    PubMed

    Mera, Héctor; Pedersen, Thomas G; Nikolić, Branislav K

    2015-10-02

    The Stark effect in hydrogen and the cubic anharmonic oscillator furnish examples of quantum systems where the perturbation results in a certain ionization probability by tunneling processes. Accordingly, the perturbed ground-state energy is shifted and broadened, thus acquiring an imaginary part which is considered to be a paradigm of nonperturbative behavior. Here we demonstrate how the low order coefficients of a divergent perturbation series can be used to obtain excellent approximations to both real and imaginary parts of the perturbed ground state eigenenergy. The key is to use analytic continuation functions with a built-in singularity structure within the complex plane of the coupling constant, which is tailored by means of Bender-Wu dispersion relations. In the examples discussed the analytic continuation functions are Gauss hypergeometric functions, which take as input fourth order perturbation theory and return excellent approximations to the complex perturbed eigenvalue. These functions are Borel consistent and dramatically outperform widely used Padé and Borel-Padé approaches, even for rather large values of the coupling constant.

  16. Dispersion dynamics of quantum cascade lasers

    DOE PAGES

    Burghoff, David; Yang, Yang; Reno, John L.; ...

    2016-12-20

    A key parameter underlying the efficacy of any nonlinear optical process is group velocity dispersion. In quantum cascade lasers (QCLs), there have been several recent demonstrations of devices exploiting nonlinearities in both the mid-infrared and the terahertz. Though the gain of QCLs has been well studied, the dispersion has been much less investigated, and several questions remain about its dynamics and precise origin. In this work, we use time-domain spectroscopy to investigate the dispersion of broadband terahertz QCLs, and demonstrate that contributions from both the material and the intersubband transitions are relevant. We show that in contrast to the lasermore » gain—which is clamped to a fixed value above lasing threshold—the dispersion changes with bias even above threshold, which is a consequence of shifting intersubband populations. In conclusion, we also examine the role of higher-order dispersion in QCLs and discuss the ramifications of our result for devices utilizing nonlinear effects, such as frequency combs.« less

  17. Simultaneous multichannel wavelength multicasting and XOR logic gate multicasting for three DPSK signals based on four-wave mixing in quantum-dot semiconductor optical amplifier.

    PubMed

    Qin, Jun; Lu, Guo-Wei; Sakamoto, Takahide; Akahane, Kouichi; Yamamoto, Naokatsu; Wang, Danshi; Wang, Cheng; Wang, Hongxiang; Zhang, Min; Kawanishi, Tetsuya; Ji, Yuefeng

    2014-12-01

    In this paper, we experimentally demonstrate simultaneous multichannel wavelength multicasting (MWM) and exclusive-OR logic gate multicasting (XOR-LGM) for three 10Gbps non-return-to-zero differential phase-shift-keying (NRZ-DPSK) signals in quantum-dot semiconductor optical amplifier (QD-SOA) by exploiting the four-wave mixing (FWM) process. No additional pump is needed in the scheme. Through the interaction of the input three 10Gbps DPSK signal lights in QD-SOA, each channel is successfully multicasted to three wavelengths (1-to-3 for each), totally 3-to-9 MWM, and at the same time, three-output XOR-LGM is obtained at three different wavelengths. All the new generated channels are with a power penalty less than 1.2dB at a BER of 10(-9). Degenerate and non-degenerate FWM components are fully used in the experiment for data and logic multicasting.

  18. Consistent description of quantum Brownian motors operating at strong friction.

    PubMed

    Machura, L; Kostur, M; Hänggi, P; Talkner, P; Luczka, J

    2004-09-01

    A quantum Smoluchowski equation is put forward that consistently describes thermal quantum states. In particular, it notably does not induce a violation of the second law of thermodynamics. This so modified kinetic equation is applied to study analytically directed quantum transport at strong friction in arbitrarily shaped ratchet potentials that are driven by nonthermal two-state noise. Depending on the mutual interplay of quantum tunneling and quantum reflection these quantum corrections can induce both, a sizable enhancement or a suppression of transport. Moreover, the threshold for current reversals becomes markedly shifted due to such quantum fluctuations.

  19. Quantum cryptography for secure free-space communications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1999-03-01

    The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up usingmore » the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.« less

  20. Direct and reverse secret-key capacities of a quantum channel.

    PubMed

    Pirandola, Stefano; García-Patrón, Raul; Braunstein, Samuel L; Lloyd, Seth

    2009-02-06

    We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication (direct reconciliation) or a single feedback classical communication (reverse reconciliation). In particular, the reverse secret-key capacity can be positive for antidegradable channels, where no forward strategy is known to be secure. This property is explicitly shown in the continuous variable framework by considering arbitrary one-mode Gaussian channels.

  1. Temperature and pressure effects on GFP mutants: explaining spectral changes by molecular dynamics simulations and TD-DFT calculations.

    PubMed

    Jacchetti, Emanuela; Gabellieri, Edi; Cioni, Patrizia; Bizzarri, Ranieri; Nifosì, Riccardo

    2016-05-14

    By combining spectroscopic measurements under high pressure with molecular dynamics simulations and quantum mechanics calculations we investigate how sub-angstrom structural perturbations are able to tune protein function. We monitored the variations in fluorescence output of two green fluorescent protein mutants (termed Mut2 and Mut2Y, the latter containing the key T203Y mutation) subjected to pressures up to 600 MPa, at various temperatures in the 280-320 K range. By performing 150 ns molecular dynamics simulations of the protein structures at various pressures, we evidenced subtle changes in conformation and dynamics around the light-absorbing chromophore. Such changes explain the measured spectral tuning in the case of the sizable 120 cm(-1) red-shift observed for pressurized Mut2Y, but absent in Mut2. Previous work [Barstow et al., Proc. Natl. Acad. Sci. U. S. A., 2008, 105, 13362] on pressure effects on GFP also involved a T203Y mutant. On the basis of cryocooling X-ray crystallography, the pressure-induced fluorescence blue shift at low temperature (77 K) was attributed to key changes in relative conformation of the chromophore and Tyr203 phenol ring. At room temperature, however, a red shift was observed at high pressure, analogous to the one we observe in Mut2Y. Our investigation of structural variations in compressed Mut2Y also explains their result, bridging the gap between low-temperature and room-temperature high-pressure effects.

  2. Quantum-locked key distribution at nearly the classical capacity rate.

    PubMed

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  3. Quantum secret sharing with identity authentication based on Bell states

    NASA Astrophysics Data System (ADS)

    Abulkasim, Hussein; Hamad, Safwat; Khalifa, Amal; El Bahnasy, Khalid

    Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.

  4. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

    PubMed Central

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-01-01

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate. PMID:26463580

  5. A quantum proxy group signature scheme based on an entangled five-qubit state

    NASA Astrophysics Data System (ADS)

    Wang, Meiling; Ma, Wenping; Wang, Lili; Yin, Xunru

    2015-09-01

    A quantum proxy group signature (QPGS) scheme based on controlled teleportation is presented, by using the entangled five-qubit quantum state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security of the scheme is guaranteed by the entanglement correlations of the entangled five-qubit state, the secret keys based on the quantum key distribution (QKD) and the one-time pad algorithm, all of which have been proven to be unconditionally secure and the signature anonymity.

  6. Efficient multiparty quantum key agreement with collective detection.

    PubMed

    Huang, Wei; Su, Qi; Liu, Bin; He, Yuan-Hang; Fan, Fan; Xu, Bing-Jie

    2017-11-10

    As a burgeoning branch of quantum cryptography, quantum key agreement is a kind of key establishing processes where the security and fairness of the established common key should be guaranteed simultaneously. However, the difficulty on designing a qualified quantum key agreement protocol increases significantly with the increase of the number of the involved participants. Thus far, only few of the existing multiparty quantum key agreement (MQKA) protocols can really achieve security and fairness. Nevertheless, these qualified MQKA protocols are either too inefficient or too impractical. In this paper, an MQKA protocol is proposed with single photons in travelling mode. Since only one eavesdropping detection is needed in the proposed protocol, the qubit efficiency and measurement efficiency of it are higher than those of the existing ones in theory. Compared with the protocols which make use of the entangled states or multi-particle measurements, the proposed protocol is more feasible with the current technologies. Security and fairness analysis shows that the proposed protocol is not only immune to the attacks from external eavesdroppers, but also free from the attacks from internal betrayers.

  7. Quantum key distribution using gaussian-modulated coherent states

    NASA Astrophysics Data System (ADS)

    Grosshans, Frédéric; Van Assche, Gilles; Wenger, Jérôme; Brouri, Rosa; Cerf, Nicolas J.; Grangier, Philippe

    2003-01-01

    Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

  8. Fundamental rate-loss trade-off for the quantum internet

    NASA Astrophysics Data System (ADS)

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-11-01

    The quantum internet holds promise for achieving quantum communication--such as quantum teleportation and quantum key distribution (QKD)--freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result--putting a practical but general limitation on the quantum internet--enables us to grasp the potential of the future quantum internet.

  9. Fundamental rate-loss trade-off for the quantum internet

    PubMed Central

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-01-01

    The quantum internet holds promise for achieving quantum communication—such as quantum teleportation and quantum key distribution (QKD)—freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka–Guha–Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result—putting a practical but general limitation on the quantum internet—enables us to grasp the potential of the future quantum internet. PMID:27886172

  10. Fundamental rate-loss trade-off for the quantum internet.

    PubMed

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-11-25

    The quantum internet holds promise for achieving quantum communication-such as quantum teleportation and quantum key distribution (QKD)-freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result-putting a practical but general limitation on the quantum internet-enables us to grasp the potential of the future quantum internet.

  11. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy.

    PubMed

    Christandl, Matthias; Ferrara, Roberto

    2017-12-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005)PRLTAO0031-900710.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.

  12. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  13. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    NASA Astrophysics Data System (ADS)

    Christandl, Matthias; Ferrara, Roberto

    2017-12-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005), 10.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.

  14. Quantum cryptographic system with reduced data loss

    DOEpatents

    Lo, H.K.; Chau, H.F.

    1998-03-24

    A secure method for distributing a random cryptographic key with reduced data loss is disclosed. Traditional quantum key distribution systems employ similar probabilities for the different communication modes and thus reject at least half of the transmitted data. The invention substantially reduces the amount of discarded data (those that are encoded and decoded in different communication modes e.g. using different operators) in quantum key distribution without compromising security by using significantly different probabilities for the different communication modes. Data is separated into various sets according to the actual operators used in the encoding and decoding process and the error rate for each set is determined individually. The invention increases the key distribution rate of the BB84 key distribution scheme proposed by Bennett and Brassard in 1984. Using the invention, the key distribution rate increases with the number of quantum signals transmitted and can be doubled asymptotically. 23 figs.

  15. Quantum cryptographic system with reduced data loss

    DOEpatents

    Lo, Hoi-Kwong; Chau, Hoi Fung

    1998-01-01

    A secure method for distributing a random cryptographic key with reduced data loss. Traditional quantum key distribution systems employ similar probabilities for the different communication modes and thus reject at least half of the transmitted data. The invention substantially reduces the amount of discarded data (those that are encoded and decoded in different communication modes e.g. using different operators) in quantum key distribution without compromising security by using significantly different probabilities for the different communication modes. Data is separated into various sets according to the actual operators used in the encoding and decoding process and the error rate for each set is determined individually. The invention increases the key distribution rate of the BB84 key distribution scheme proposed by Bennett and Brassard in 1984. Using the invention, the key distribution rate increases with the number of quantum signals transmitted and can be doubled asymptotically.

  16. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kiktenko, Evgeniy O.; Trushechkin, Anton S.; Lim, Charles Ci Wen

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration ofmore » results of unsuccessful belief-propagation decodings.« less

  17. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    DOE PAGES

    Kiktenko, Evgeniy O.; Trushechkin, Anton S.; Lim, Charles Ci Wen; ...

    2017-10-27

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration ofmore » results of unsuccessful belief-propagation decodings.« less

  18. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Kiktenko, E. O.; Trushechkin, A. S.; Lim, C. C. W.; Kurochkin, Y. V.; Fedorov, A. K.

    2017-10-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. The proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  19. Influence of in doping in GaN barriers on luminescence properties of InGaN/GaN multiple quantum well LEDs

    NASA Astrophysics Data System (ADS)

    Wang, Xiaowei; Yang, Jing; Zhao, Degang; Jiang, Desheng; Liu, Zongshun; Liu, Wei; Liang, Feng; Liu, Shuangtao; Xing, Yao; Wang, Wenjie; Li, Mo

    2018-02-01

    Room-temperature photoluminescence (RT PL) spectra of InGaN/GaN multiple quantum well (MQW) structures grown by metalorganic chemical vapor deposition (MOCVD) was investigated. It is found that with increasing In content in GaN barriers, the FWHM and emission intensity decreases, and the emission wavelength is first red shift and then blue shift. The shrinkage of FWHM and emission wavelength blue shift can be attributed to the reduction of piezoelectric field, and the lower height of potential barrier will make carrier confinement weaker and ground state level lower, which resulting in emission intensity decreasing and wavelength red shift. In addition, doping the barrier with In will induce more inhomogeneous and deeper localized states in InGaN QWs, which also contribute to a red shift of PL emission wavelength.

  20. Secret-key-assisted private classical communication capacity over quantum channels

    NASA Astrophysics Data System (ADS)

    Hsieh, Min-Hsiu; Luo, Zhicheng; Brun, Todd

    2008-10-01

    We prove a regularized formula for the secret-key-assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak (e-print arXiv:quant-ph/0512015) on entanglement-assisted quantum communication capacity . This formula provides a family protocol, the private father protocol, under the resource inequality framework that includes private classical communication without secret-key assistance as a child protocol.

  1. Fully device-independent quantum key distribution.

    PubMed

    Vazirani, Umesh; Vidick, Thomas

    2014-10-03

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  2. Fully Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Vazirani, Umesh; Vidick, Thomas

    2014-10-01

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  3. Relative Configuration of Natural Products Using NMR Chemical Shifts

    USDA-ARS?s Scientific Manuscript database

    By comparing calculated with experimental NMR chemical shifts, we were able to determine the relative configurations of three monoterpene diastereomers produced by the walkingstick Anisomorpha buprestoides. The combined RMSDs of both 1H and 13C quantum chemically calculated shifts were able to predi...

  4. SeaQuaKE: Sea-optimized Quantum Key Exchange

    DTIC Science & Technology

    2014-06-01

    is led by Applied Communications Sciences under the ONR Free Space Optical Quantum Key Distribution Special Notice (13-SN-0004 under ONRBAA13-001...In addition, we discuss our initial progress towards the free - space quantum channel model and planning for the experimental validation effort. 15...SUBJECT TERMS Quantum communications, free - space optical communications 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as

  5. Satellite-Relayed Intercontinental Quantum Network.

    PubMed

    Liao, Sheng-Kai; Cai, Wen-Qi; Handsteiner, Johannes; Liu, Bo; Yin, Juan; Zhang, Liang; Rauch, Dominik; Fink, Matthias; Ren, Ji-Gang; Liu, Wei-Yue; Li, Yang; Shen, Qi; Cao, Yuan; Li, Feng-Zhi; Wang, Jian-Feng; Huang, Yong-Mei; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Li, Li; Liu, Nai-Le; Koidl, Franz; Wang, Peiyuan; Chen, Yu-Ao; Wang, Xiang-Bin; Steindorfer, Michael; Kirchner, Georg; Lu, Chao-Yang; Shu, Rong; Ursin, Rupert; Scheidl, Thomas; Peng, Cheng-Zhi; Wang, Jian-Yu; Zeilinger, Anton; Pan, Jian-Wei

    2018-01-19

    We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ∼kHz rate per passage of the satellite Micius over a ground station. The satellite thus establishes a secure key between itself and, say, Xinglong, and another key between itself and, say, Graz. Then, upon request from the ground command, Micius acts as a trusted relay. It performs bitwise exclusive or operations between the two keys and relays the result to one of the ground stations. That way, a secret key is created between China and Europe at locations separated by 7600 km on Earth. These keys are then used for intercontinental quantum-secured communication. This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China. Also, a video conference was performed between the Austrian Academy of Sciences and the Chinese Academy of Sciences, which also included a 280 km optical ground connection between Xinglong and Beijing. Our work clearly confirms the Micius satellite as a robust platform for quantum key distribution with different ground stations on Earth, and points towards an efficient solution for an ultralong-distance global quantum network.

  6. Satellite-Relayed Intercontinental Quantum Network

    NASA Astrophysics Data System (ADS)

    Liao, Sheng-Kai; Cai, Wen-Qi; Handsteiner, Johannes; Liu, Bo; Yin, Juan; Zhang, Liang; Rauch, Dominik; Fink, Matthias; Ren, Ji-Gang; Liu, Wei-Yue; Li, Yang; Shen, Qi; Cao, Yuan; Li, Feng-Zhi; Wang, Jian-Feng; Huang, Yong-Mei; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Li, Li; Liu, Nai-Le; Koidl, Franz; Wang, Peiyuan; Chen, Yu-Ao; Wang, Xiang-Bin; Steindorfer, Michael; Kirchner, Georg; Lu, Chao-Yang; Shu, Rong; Ursin, Rupert; Scheidl, Thomas; Peng, Cheng-Zhi; Wang, Jian-Yu; Zeilinger, Anton; Pan, Jian-Wei

    2018-01-01

    We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ˜kHz rate per passage of the satellite Micius over a ground station. The satellite thus establishes a secure key between itself and, say, Xinglong, and another key between itself and, say, Graz. Then, upon request from the ground command, Micius acts as a trusted relay. It performs bitwise exclusive or operations between the two keys and relays the result to one of the ground stations. That way, a secret key is created between China and Europe at locations separated by 7600 km on Earth. These keys are then used for intercontinental quantum-secured communication. This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China. Also, a video conference was performed between the Austrian Academy of Sciences and the Chinese Academy of Sciences, which also included a 280 km optical ground connection between Xinglong and Beijing. Our work clearly confirms the Micius satellite as a robust platform for quantum key distribution with different ground stations on Earth, and points towards an efficient solution for an ultralong-distance global quantum network.

  7. Sensitivity of ab Initio vs Empirical Methods in Computing Structural Effects on NMR Chemical Shifts for the Example of Peptides.

    PubMed

    Sumowski, Chris Vanessa; Hanni, Matti; Schweizer, Sabine; Ochsenfeld, Christian

    2014-01-14

    The structural sensitivity of NMR chemical shifts as computed by quantum chemical methods is compared to a variety of empirical approaches for the example of a prototypical peptide, the 38-residue kaliotoxin KTX comprising 573 atoms. Despite the simplicity of empirical chemical shift prediction programs, the agreement with experimental results is rather good, underlining their usefulness. However, we show in our present work that they are highly insensitive to structural changes, which renders their use for validating predicted structures questionable. In contrast, quantum chemical methods show the expected high sensitivity to structural and electronic changes. This appears to be independent of the quantum chemical approach or the inclusion of solvent effects. For the latter, explicit solvent simulations with increasing number of snapshots were performed for two conformers of an eight amino acid sequence. In conclusion, the empirical approaches neither provide the expected magnitude nor the patterns of NMR chemical shifts determined by the clearly more costly ab initio methods upon structural changes. This restricts the use of empirical prediction programs in studies where peptide and protein structures are utilized for the NMR chemical shift evaluation such as in NMR refinement processes, structural model verifications, or calculations of NMR nuclear spin relaxation rates.

  8. Topics in quantum cryptography, quantum error correction, and channel simulation

    NASA Astrophysics Data System (ADS)

    Luo, Zhicheng

    In this thesis, we mainly investigate four different topics: efficiently implementable codes for quantum key expansion [51], quantum error-correcting codes based on privacy amplification [48], private classical capacity of quantum channels [44], and classical channel simulation with quantum side information [49, 50]. For the first topic, we propose an efficiently implementable quantum key expansion protocol, capable of increasing the size of a pre-shared secret key by a constant factor. Previously, the Shor-Preskill proof [64] of the security of the Bennett-Brassard 1984 (BB84) [6] quantum key distribution protocol relied on the theoretical existence of good classical error-correcting codes with the "dual-containing" property. But the explicit and efficiently decodable construction of such codes is unknown. We show that we can lift the dual-containing constraint by employing the non-dual-containing codes with excellent performance and efficient decoding algorithms. For the second topic, we propose a construction of Calderbank-Shor-Steane (CSS) [19, 68] quantum error-correcting codes, which are originally based on pairs of mutually dual-containing classical codes, by combining a classical code with a two-universal hash function. We show, using the results of Renner and Koenig [57], that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. For the third topic, we prove a regularized formula for the secret key assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity. This formula provides a new family protocol, the private father protocol, under the resource inequality framework that includes the private classical communication without the assisted secret keys as a child protocol. For the fourth topic, we study and solve the problem of classical channel simulation with quantum side information at the receiver. Our main theorem has two important corollaries: rate-distortion theory with quantum side information and common randomness distillation. Simple proofs of achievability of classical multi-terminal source coding problems can be made via a unified approach using the channel simulation theorem as building blocks. The fully quantum generalization of the problem is also conjectured with outer and inner bounds on the achievable rate pairs.

  9. Electroluminescence from ZnCuInS/ZnS quantum dots/poly(9-vinylcarbazole) multilayer films with different thicknesses of quantum dot layer

    NASA Astrophysics Data System (ADS)

    Dong, Xiaofei; Xu, Jianping; Shi, Shaobo; Zhang, Xiaosong; Li, Lan; Yin, Shougen

    2017-05-01

    We report tunable electroluminescence (EL) from solution-processed ZnCuInS/ZnS (ZCIS/ZnS) quantum dots (QDs)/poly(9-vinlycarbazole) multilayer films. The EL spectra exhibit a red shift as the QD layer thickness increases. By analyzing the dependence of the applied voltage and the ZCIS/ZnS QD layer thickness on the EL spectra, the origin of the red shift is associated with the increased trap density of QDs that induces the injected electrons to be trapped in the deep donor level. The current conduction mechanism based on the current density-voltage curves at different voltage regions was discussed.

  10. Electromagnetically induced transparency in a multilayered spherical quantum dot with hydrogenic impurity

    NASA Astrophysics Data System (ADS)

    Pavlović, Vladan; Šušnjar, Marko; Petrović, Katarina; Stevanović, Ljiljana

    2018-04-01

    In this paper the effects of size, hydrostatic pressure and temperature on electromagnetically induced transparency, as well as on absorption and the dispersion properties of multilayered spherical quantum dot with hydrogenic impurity are theoretically investigated. Energy eigenvalues and wavefunctions of quantum systems in three-level and four-level configurations are calculated using the shooting method, while optical properties are obtained using the density matrix formalism and master equations. It is shown that peaks of the optical properties experience a blue-shift with increasing hydrostatic pressure and red-shift with increasing temperature. The changes of optical properties as a consequence of changes in barrier wells widths are non-monotonic, and these changes are discussed in detail.

  11. Determination of shift in energy of band edges and band gap of ZnSe spherical quantum dot

    NASA Astrophysics Data System (ADS)

    Siboh, Dutem; Kalita, Pradip Kumar; Sarma, Jayanta Kumar; Nath, Nayan Mani

    2018-04-01

    We have determined the quantum confinement induced shifts in energy of band edges and band gap with respect to size of ZnSe spherical quantum dot employing an effective confinement potential model developed in our earlier communication "arXiv:1705.10343". We have also performed phenomenological analysis of our theoretical results in comparison with available experimental data and observe a very good agreement in this regard. Phenomenological success achieved in this regard confirms validity of the confining potential model as well as signifies the capability and applicability of the ansatz for the effective confining potential to have reasonable information in the study of real nano-structured spherical systems.

  12. Novel latch for adiabatic quantum-flux-parametron logic

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Takeuchi, Naoki, E-mail: takeuchi-naoki-kx@ynu.jp; Yamanashi, Yuki; Yoshikawa, Nobuyuki

    2014-03-14

    We herein propose the quantum-flux-latch (QFL) as a novel latch for adiabatic quantum-flux-parametron (AQFP) logic. A QFL is very compact and compatible with AQFP logic gates and can be read out in one clock cycle. Simulation results revealed that the QFL operates at 5 GHz with wide parameter margins of more than ±22%. The calculated energy dissipation was only ∼0.1 aJ/bit, which yields a small energy delay product of 20 aJ·ps. We also designed shift registers using QFLs to demonstrate more complex circuits with QFLs. Finally, we experimentally demonstrated correct operations of the QFL and a 1-bit shift register (a D flip-flop)

  13. Photovoltaic driven multiple quantum well optical modulator

    NASA Technical Reports Server (NTRS)

    Maserjian, Joseph (Inventor)

    1990-01-01

    Multiple quantum well (MQW) structures (12) are utilized to provide real-time, reliable, high-performance, optically-addressed spatial-light modulators (SLM) (10). The optically-addressed SLM comprises a vertical stack of quantum well layers (12a) within the penetration depth of an optical write signal 18, a plurality of space charge barriers (12b) having predetermined tunneling times by control of doping and thickness. The material comprising the quantum well layers has a lower bandgap than that of the space charge barrier layers. The write signal modulates a read signal (20). The modulation sensitivity of the device is high and no external voltage source is required. In a preferred embodiment, the SLM having interleaved doped semiconductor layers for driving the MQW photovoltaically is characterized by the use of a shift analogous to the Moss-Burnstein shift caused by the filling of two-dimensional states in the multiple quantum wells, thus allowing high modulation sensitivity in very narrow wells. Arrays (30) may be formed with a plurality of the modulators.

  14. Quantum key distribution using basis encoding of Gaussian-modulated coherent states

    NASA Astrophysics Data System (ADS)

    Huang, Peng; Huang, Jingzheng; Zhang, Zheshen; Zeng, Guihua

    2018-04-01

    The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in practical secure quantum cryptography. However, its performance is restricted strongly by the channel excess noise and the reconciliation efficiency. In this paper, we present a quantum key distribution (QKD) protocol by encoding the secret keys on the random choices of two measurement bases: the conjugate quadratures X and P . The employed encoding method can dramatically weaken the effects of channel excess noise and reconciliation efficiency on the performance of the QKD protocol. Subsequently, the proposed scheme exhibits the capability to tolerate much higher excess noise and enables us to reach a much longer secure transmission distance even at lower reconciliation efficiency. The proposal can work alternatively to strengthen significantly the performance of the known Gaussian-modulated CVQKD protocol and serve as a multiplier for practical secure quantum cryptography with continuous variables.

  15. High-rate measurement-device-independent quantum cryptography

    NASA Astrophysics Data System (ADS)

    Pirandola, Stefano; Ottaviani, Carlo; Spedalieri, Gaetana; Weedbrook, Christian; Braunstein, Samuel L.; Lloyd, Seth; Gehring, Tobias; Jacobsen, Christian S.; Andersen, Ulrik L.

    2015-06-01

    Quantum cryptography achieves a formidable task—the remote distribution of secret keys by exploiting the fundamental laws of physics. Quantum cryptography is now headed towards solving the practical problem of constructing scalable and secure quantum networks. A significant step in this direction has been the introduction of measurement-device independence, where the secret key between two parties is established by the measurement of an untrusted relay. Unfortunately, although qubit-implemented protocols can reach long distances, their key rates are typically very low, unsuitable for the demands of a metropolitan network. Here we show, theoretically and experimentally, that a solution can come from the use of continuous-variable systems. We design a coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved. Our protocol could be employed to build high-rate quantum networks where devices securely connect to nearby access points or proxy servers.

  16. Continuous high speed coherent one-way quantum key distribution.

    PubMed

    Stucki, Damien; Barreiro, Claudio; Fasel, Sylvain; Gautier, Jean-Daniel; Gay, Olivier; Gisin, Nicolas; Thew, Rob; Thoma, Yann; Trinkler, Patrick; Vannel, Fabien; Zbinden, Hugo

    2009-08-03

    Quantum key distribution (QKD) is the first commercial quantum technology operating at the level of single quanta and is a leading light for quantum-enabled photonic technologies. However, controlling these quantum optical systems in real world environments presents significant challenges. For the first time, we have brought together three key concepts for future QKD systems: a simple high-speed protocol; high performance detection; and integration both, at the component level and for standard fibre network connectivity. The QKD system is capable of continuous and autonomous operation, generating secret keys in real time. Laboratory and field tests were performed and comparisons made with robust InGaAs avalanche photodiodes and superconducting detectors. We report the first real world implementation of a fully functional QKD system over a 43 dB-loss (150 km) transmission line in the Swisscom fibre optic network where we obtained average real-time distribution rates over 3 hours of 2.5 bps.

  17. Misinterpretation of statistical distance in security of quantum key distribution shown by simulation

    NASA Astrophysics Data System (ADS)

    Iwakoshi, Takehisa; Hirota, Osamu

    2014-10-01

    This study will test an interpretation in quantum key distribution (QKD) that trace distance between the distributed quantum state and the ideal mixed state is a maximum failure probability of the protocol. Around 2004, this interpretation was proposed and standardized to satisfy both of the key uniformity in the context of universal composability and operational meaning of the failure probability of the key extraction. However, this proposal has not been verified concretely yet for many years while H. P. Yuen and O. Hirota have thrown doubt on this interpretation since 2009. To ascertain this interpretation, a physical random number generator was employed to evaluate key uniformity in QKD. In this way, we calculated statistical distance which correspond to trace distance in quantum theory after a quantum measurement is done, then we compared it with the failure probability whether universal composability was obtained. As a result, the degree of statistical distance of the probability distribution of the physical random numbers and the ideal uniformity was very large. It is also explained why trace distance is not suitable to guarantee the security in QKD from the view point of quantum binary decision theory.

  18. A photon-photon quantum gate based on a single atom in an optical resonator.

    PubMed

    Hacker, Bastian; Welte, Stephan; Rempe, Gerhard; Ritter, Stephan

    2016-08-11

    That two photons pass each other undisturbed in free space is ideal for the faithful transmission of information, but prohibits an interaction between the photons. Such an interaction is, however, required for a plethora of applications in optical quantum information processing. The long-standing challenge here is to realize a deterministic photon-photon gate, that is, a mutually controlled logic operation on the quantum states of the photons. This requires an interaction so strong that each of the two photons can shift the other's phase by π radians. For polarization qubits, this amounts to the conditional flipping of one photon's polarization to an orthogonal state. So far, only probabilistic gates based on linear optics and photon detectors have been realized, because "no known or foreseen material has an optical nonlinearity strong enough to implement this conditional phase shift''. Meanwhile, tremendous progress in the development of quantum-nonlinear systems has opened up new possibilities for single-photon experiments. Platforms range from Rydberg blockade in atomic ensembles to single-atom cavity quantum electrodynamics. Applications such as single-photon switches and transistors, two-photon gateways, nondestructive photon detectors, photon routers and nonlinear phase shifters have been demonstrated, but none of them with the ideal information carriers: optical qubits in discriminable modes. Here we use the strong light-matter coupling provided by a single atom in a high-finesse optical resonator to realize the Duan-Kimble protocol of a universal controlled phase flip (π phase shift) photon-photon quantum gate. We achieve an average gate fidelity of (76.2 ± 3.6) per cent and specifically demonstrate the capability of conditional polarization flipping as well as entanglement generation between independent input photons. This photon-photon quantum gate is a universal quantum logic element, and therefore could perform most existing two-photon operations. The demonstrated feasibility of deterministic protocols for the optical processing of quantum information could lead to new applications in which photons are essential, especially long-distance quantum communication and scalable quantum computing.

  19. Security of Distributed-Phase-Reference Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Moroder, Tobias; Curty, Marcos; Lim, Charles Ci Wen; Thinh, Le Phuc; Zbinden, Hugo; Gisin, Nicolas

    2012-12-01

    Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof of these schemes in a realistic setting has been elusive. We solve this long-standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result, we provide lower bounds on the key generation rate of a variant of the coherent-one-way quantum key distribution protocol. In contrast to standard predictions, it appears to scale quadratically with the system transmittance.

  20. Experimental realization of equiangular three-state quantum key distribution

    PubMed Central

    Schiavon, Matteo; Vallone, Giuseppe; Villoresi, Paolo

    2016-01-01

    Quantum key distribution using three states in equiangular configuration combines a security threshold comparable with the one of the Bennett-Brassard 1984 protocol and a quantum bit error rate (QBER) estimation that does not need to reveal part of the key. We implement an entanglement-based version of the Renes 2004 protocol, using only passive optic elements in a linear scheme for the positive-operator valued measure (POVM), generating an asymptotic secure key rate of more than 10 kbit/s, with a mean QBER of 1.6%. We then demonstrate its security in the case of finite key and evaluate the key rate for both collective and general attacks. PMID:27465643

  1. Theory of single-photon detectors employing smart strategies of detection

    NASA Astrophysics Data System (ADS)

    Silva, João Batista Rosa; Ramos, Rubens Viana

    2005-11-01

    Single-photon detectors have become more important with the advent of set-ups for optical communication using single-photon pulses, mainly quantum key distribution. The performance of quantum key distribution systems depends strongly on the performance of single-photon detectors. In this paper, aiming to overcome the afterpulsing that limits strongly the maximal transmission rate of quantum key distribution systems, three smart strategies for single-photon detection are discussed using analytical and numerical procedures. The three strategies are: hold-off time conditioned to avalanche presence, termed the Norwegian strategy, using one avalanche photodiode, using two raffled avalanche photodiodes and using two switched avalanche photodiodes. Finally we give examples using these strategies in a quantum key distribution set-up.

  2. Metropolitan Quantum Key Distribution with Silicon Photonics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalablemore » resource for future formation of metropolitan quantum-secure communications networks.« less

  3. Metropolitan Quantum Key Distribution with Silicon Photonics

    DOE PAGES

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; ...

    2018-04-06

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalablemore » resource for future formation of metropolitan quantum-secure communications networks.« less

  4. Eavesdropping on counterfactual quantum key distribution with finite resources

    NASA Astrophysics Data System (ADS)

    Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng

    2014-08-01

    A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.

  5. Metropolitan Quantum Key Distribution with Silicon Photonics

    NASA Astrophysics Data System (ADS)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  6. Addressable single-spin control in multiple quantum dots coupled in series

    NASA Astrophysics Data System (ADS)

    Nakajima, Takashi

    2015-03-01

    Electron spin in semiconductor quantum dots (QDs) is promising building block of quantum computers for its controllability and potential scalability. Recent experiments on GaAs QDs have demonstrated necessary ingredients of universal quantum gate operations: single-spin rotations by electron spin resonance (ESR) which is virtually free from the effect of nuclear spin fluctuation, and pulsed control of two-spin entanglement. The scalability of this architecture, however, has remained to be demonstrated in the real world. In this talk, we will present our recent results on implementing single-spin-based qubits in triple, quadruple, and quintuple QDs based on a series coupled architecture defined by gate electrodes. Deterministic initialization of individual spin states and spin-state readout were performed by the pulse operation of detuning between two neighboring QDs. The spin state was coherently manipulated by ESR, where each spin in different QDs is addressed by the shift of the resonance frequency due to the inhomogeneous magnetic field induced by the micro magnet deposited on top of the QDs. Control of two-spin entanglement was also demonstrated. We will discuss key issues for implementing quantum algorithms based on three or more qubits, including the effect of a nuclear spin bath, single-shot readout fidelity, and tuning of multiple qubit devices. Our approaches to these issues will be also presented. This research is supported by Funding Program for World-Leading Innovative R&D on Science and Technology (FIRST) from JSPS, IARPA project ``Multi-Qubit Coherent Operations'' through Copenhagen University, and Grant-in-Aid for Scientific Research from JSPS.

  7. Quantum mechanical calculation of electric fields and vibrational Stark shifts at active site of human aldose reductase

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, Xianwei; State Key Laboratory of Precision Spectroscopy, Institute of Theoretical and Computational Science, East China Normal University, Shanghai 200062; Zhang, John Z. H.

    2015-11-14

    Recent advance in biophysics has made it possible to directly measure site-specific electric field at internal sites of proteins using molecular probes with C = O or C≡N groups in the context of vibrational Stark effect. These measurements directly probe changes of electric field at specific protein sites due to, e.g., mutation and are very useful in protein design. Computational simulation of the Stark effect based on force fields such as AMBER and OPLS, while providing good insight, shows large errors in comparison to experimental measurement due to inherent difficulties associated with point charge based representation of force fields. Inmore » this study, quantum mechanical calculation of protein’s internal electrostatic properties and vibrational Stark shifts was carried out by using electrostatically embedded generalized molecular fractionation with conjugate caps method. Quantum calculated change of mutation-induced electric field and vibrational Stark shift is reported at the internal probing site of enzyme human aldose reductase. The quantum result is in much better agreement with experimental data than those predicted by force fields, underscoring the deficiency of traditional point charge models describing intra-protein electrostatic properties.« less

  8. Implementing Diffie-Hellman key exchange using quantum EPR pairs

    NASA Astrophysics Data System (ADS)

    Mandal, Sayonnha; Parakh, Abhishek

    2015-05-01

    This paper implements the concepts of perfect forward secrecy and the Diffie-Hellman key exchange using EPR pairs to establish and share a secret key between two non-authenticated parties and transfer messages between them without the risk of compromise. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. This makes BB84-based quantum cryptography protocol unsuitable for network computing environments. Diffie-Hellman does not require the two parties to be mutually authenticated to each other, yet it can provide a basis for a number of authenticated protocols, most notably the concept of perfect forward secrecy. The work proposed in this paper provides a new direction in utilizing quantum EPR pairs in quantum key exchange. Although, classical cryptography boasts of efficient and robust protocols like the Diffie-Hellman key exchange, in the current times, with the advent of quantum computing they are very much vulnerable to eavesdropping and cryptanalytic attacks. Using quantum cryptographic principles, however, these classical encryption algorithms show more promise and a more robust and secure structure for applications. The unique properties of quantum EPR pairs also, on the other hand, go a long way in removing attacks like eavesdropping by their inherent nature of one particle of the pair losing its state if a measurement occurs on the other. The concept of perfect forward secrecy is revisited in this paper to attribute tighter security to the proposed protocol.

  9. Silicon Solar Cell Efficiency Improvement Employing the Photoluminescent, Down-Shifting Effects of Carbon and CdTe Quantum Dots (Open Access Publisher’s Version)

    DTIC Science & Technology

    2016-03-21

    ORIGINAL PAPER Silicon solar cell efficiency improvement employing the photoluminescent, down-shifting effects of carbon and CdTe quantum dots Elias...smaller influence on solar cell performance, they are con- sidered to be a more attractive option due to their afford- ability and minimal impact in the...Photovoltaics Solar cells Introduction There is a generalized trend to demonstrate higher solar cell efficiency with more affordable devices to promote

  10. Upconversion-based receivers for quantum hacking-resistant quantum key distribution

    NASA Astrophysics Data System (ADS)

    Jain, Nitin; Kanter, Gregory S.

    2016-07-01

    We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  11. Quantum key distribution protocol based on contextuality monogamy

    NASA Astrophysics Data System (ADS)

    Singh, Jaskaran; Bharti, Kishor; Arvind

    2017-06-01

    The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.

  12. Quantum communication and information processing

    NASA Astrophysics Data System (ADS)

    Beals, Travis Roland

    Quantum computers enable dramatically more efficient algorithms for solving certain classes of computational problems, but, in doing so, they create new problems. In particular, Shor's Algorithm allows for efficient cryptanalysis of many public-key cryptosystems. As public key cryptography is a critical component of present-day electronic commerce, it is crucial that a working, secure replacement be found. Quantum key distribution (QKD), first developed by C.H. Bennett and G. Brassard, offers a partial solution, but many challenges remain, both in terms of hardware limitations and in designing cryptographic protocols for a viable large-scale quantum communication infrastructure. In Part I, I investigate optical lattice-based approaches to quantum information processing. I look at details of a proposal for an optical lattice-based quantum computer, which could potentially be used for both quantum communications and for more sophisticated quantum information processing. In Part III, I propose a method for converting and storing photonic quantum bits in the internal state of periodically-spaced neutral atoms by generating and manipulating a photonic band gap and associated defect states. In Part II, I present a cryptographic protocol which allows for the extension of present-day QKD networks over much longer distances without the development of new hardware. I also present a second, related protocol which effectively solves the authentication problem faced by a large QKD network, thus making QKD a viable, information-theoretic secure replacement for public key cryptosystems.

  13. Ultra fast quantum key distribution over a 97 km installed telecom fiber with wavelength division multiplexing clock synchronization.

    PubMed

    Tanaka, Akihiro; Fujiwara, Mikio; Nam, Sae W; Nambu, Yoshihiro; Takahashi, Seigo; Maeda, Wakako; Yoshino, Ken-ichiro; Miki, Shigehito; Baek, Burm; Wang, Zhen; Tajima, Akio; Sasaki, Masahide; Tomita, Akihisa

    2008-07-21

    We demonstrated ultra fast BB84 quantum key distribution (QKD) transmission at 625 MHz clock rate through a 97 km field-installed fiber using practical clock synchronization based on wavelength-division multiplexing (WDM). We succeeded in over-one-hour stable key generation at a high sifted key rate of 2.4 kbps and a low quantum bit error rate (QBER) of 2.9%. The asymptotic secure key rate was estimated to be 0.78- 0.82 kbps from the transmission data with the decoy method of average photon numbers 0, 0.15, and 0.4 photons/pulse.

  14. Multiple quantum filtered 23Na NMR in the Langendorff perfused mouse heart: Ratio of triple/double quantum filtered signals correlates with [Na]i

    PubMed Central

    Eykyn, Thomas R.; Aksentijević, Dunja; Aughton, Karen L.; Southworth, Richard; Fuller, William; Shattock, Michael J.

    2015-01-01

    We investigate the potential of multiple quantum filtered (MQF) 23Na NMR to probe intracellular [Na]i in the Langendorff perfused mouse heart. In the presence of Tm(DOTP) shift reagent the triple quantum filtered (TQF) signal originated largely from the intracellular sodium pool with a 32 ± 6% contribution of the total TQF signal arising from extracellular sodium, whilst the rank 2 double-quantum filtered signal (DQF), acquired with a 54.7° flip-angle pulse, originated exclusively from the extracellular sodium pool. Given the different cellular origins of the 23Na MQF signals we propose that the TQF/DQF ratio can be used as a semi-quantitative measure of [Na]i in the mouse heart. We demonstrate a good correlation of this ratio with [Na]i measured with shift reagent at baseline and under conditions of elevated [Na]i. We compare the measurements of [Na]i using both shift reagent and TQF/DQF ratio in a cohort of wild type mouse hearts and in a transgenic PLM3SA mouse expressing a non-phosphorylatable form of phospholemman, showing a modest but measurable elevation of baseline [Na]i. MQF filtered 23Na NMR is a potentially useful tool for studying normal and pathophysiological changes in [Na]i, particularly in transgenic mouse models with altered Na regulation. PMID:26196304

  15. Parameter regimes for a single sequential quantum repeater

    NASA Astrophysics Data System (ADS)

    Rozpędek, F.; Goodenough, K.; Ribeiro, J.; Kalb, N.; Caprara Vivoli, V.; Reiserer, A.; Hanson, R.; Wehner, S.; Elkouss, D.

    2018-07-01

    Quantum key distribution allows for the generation of a secret key between distant parties connected by a quantum channel such as optical fibre or free space. Unfortunately, the rate of generation of a secret key by direct transmission is fundamentally limited by the distance. This limit can be overcome by the implementation of so-called quantum repeaters. Here, we assess the performance of a specific but very natural setup called a single sequential repeater for quantum key distribution. We offer a fine-grained assessment of the repeater by introducing a series of benchmarks. The benchmarks, which should be surpassed to claim a working repeater, are based on finite-energy considerations, thermal noise and the losses in the setup. In order to boost the performance of the studied repeaters we introduce two methods. The first one corresponds to the concept of a cut-off, which reduces the effect of decoherence during the storage of a quantum state by introducing a maximum storage time. Secondly, we supplement the standard classical post-processing with an advantage distillation procedure. Using these methods, we find realistic parameters for which it is possible to achieve rates greater than each of the benchmarks, guiding the way towards implementing quantum repeaters.

  16. Multi-user quantum key distribution with entangled photons from an AlGaAs chip

    NASA Astrophysics Data System (ADS)

    Autebert, C.; Trapateau, J.; Orieux, A.; Lemaître, A.; Gomez-Carbonell, C.; Diamanti, E.; Zaquine, I.; Ducci, S.

    2016-12-01

    In view of real-world applications of quantum information technologies, the combination of miniature quantum resources with existing fibre networks is a crucial issue. Among such resources, on-chip entangled photon sources play a central role for applications spanning quantum communications, computing and metrology. Here, we use a semiconductor source of entangled photons operating at room temperature in conjunction with standard telecom components to demonstrate multi-user quantum key distribution, a core protocol for securing communications in quantum networks. The source consists of an AlGaAs chip-emitting polarisation entangled photon pairs over a large bandwidth in the main telecom band around 1550 nm without the use of any off-chip compensation or interferometric scheme; the photon pairs are directly launched into a dense wavelength division multiplexer (DWDM) and secret keys are distributed between several pairs of users communicating through different channels. We achieve a visibility measured after the DWDM of 87% and show long-distance key distribution using a 50-km standard telecom fibre link between two network users. These results illustrate a promising route to practical, resource-efficient implementations adapted to quantum network infrastructures.

  17. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  18. Oscillator strength and quantum-confined Stark effect of excitons in a thin PbS quantum disk

    NASA Astrophysics Data System (ADS)

    Oukerroum, A.; El-Yadri, M.; El Aouami, A.; Feddi, E.; Dujardin, F.; Duque, C. A.; Sadoqi, M.; Long, G.

    2018-01-01

    In this paper, we report a study of the effect of a lateral electric field on a quantum-confined exciton in a thin PbS quantum disk. Our approach was performed in the framework of the effective mass theory and adiabatic approximation. The ground state energy and the stark shift were determined by using a variational method with an adequate trial wavefunction, by investigating a 2D oscillator strength under simultaneous consideration of the geometrical confinement and the electric field strength. Our results showed a strong dependence of the exciton binding and the Stark shift on the disk dimensions in both axial and longitudinal directions. On the other hand, our results also showed that the Stark shift’s dependence on the electric field is not purely quadratic but the linear contribution is also important and cannot be neglected, especially when the confinement gets weaker.

  19. Electronic Structure and Properties of Deformed Carbon Nanotubes

    NASA Technical Reports Server (NTRS)

    Yang, Liu; Arnold, Jim (Technical Monitor)

    2001-01-01

    A theoretical framework based on Huckel tight-binding model has been formulated to analyze the electronic structure of carbon nanotubes under uniform deformation. The model successfully quantifies the dispersion relation, density of states and bandgap change of nanotubes under uniform stretching, compression, torsion and bending. Our analysis shows that the shifting of the Fermi point away from the Brillouin zone vertices is the key reason for these changes. As a result of this shifting, the electronic structure of deformed carbon nanotubes varies dramatically depending on their chirality and deformation mode. Treating the Fermi point as a function of strain and tube chirality, the analytical solution preserves the concise form of undeformed carbon nanotubes. It predicts the shifting, merging and splitting of the Van Hove singularities in the density of states and the zigzag pattern of bandgap change under strains. Four orbital tight-binding simulations of carbon nanotubes under uniform stretching, compression, torsion and bending have been performed to verify the analytical solution. Extension to more complex systems are being performed to relate this analytical solution to the spectroscopic characterization, device performance and proposed quantum structures induced by the deformation. The limitations of this model will also be discussed.

  20. Optimal attacks on qubit-based Quantum Key Recycling

    NASA Astrophysics Data System (ADS)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  1. Fast and simple high-capacity quantum cryptography with error detection

    PubMed Central

    Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A.

    2017-01-01

    Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth. PMID:28406240

  2. Fast and simple high-capacity quantum cryptography with error detection.

    PubMed

    Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A

    2017-04-13

    Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.

  3. Fast and simple high-capacity quantum cryptography with error detection

    NASA Astrophysics Data System (ADS)

    Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A.

    2017-04-01

    Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.

  4. Bias voltage dependence of the electron spin depolarization in quantum wires in the quantum Hall regime detected by the resistively detected NMR

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chida, K.; Yamauchi, Y.; Arakawa, T.

    2013-12-04

    We performed the resistively-detected nuclear magnetic resonance (RDNMR) to study the electron spin polarization in the non-equilibrium quantum Hall regime. By measuring the Knight shift, we derive source-drain bias voltage dependence of the electron spin polarization in quantum wires. The electron spin polarization shows minimum value around the threshold voltage of the dynamic nuclear polarization.

  5. The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD)

    NASA Astrophysics Data System (ADS)

    Tysowski, Piotr K.; Ling, Xinhua; Lütkenhaus, Norbert; Mosca, Michele

    2018-04-01

    Quantum key distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an enterprise IT environment. Significant challenges exist in building a practical key management service (KMS) for use in a metropolitan network. QKD is generally a point-to-point technique only and is subject to steep performance constraints. The integration of QKD into enterprise-level computing has been researched, to enable quantum-safe communication. A novel method for constructing a KMS is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site. A key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users. The KMS operates within a layered architectural style that is able to interoperate with various underlying QKD implementations. Variable levels of security for the host population are enforced through a policy engine. A network layer provides key generation across a network of nodes connected by quantum links. Scheduling and routing functionality allows quantum key material to be relayed across trusted nodes. Optimizations are performed to match the real-time host demand for key material with the capacity afforded by the infrastructure. The result is a flexible and scalable architecture that is suitable for enterprise use and independent of any specific QKD technology.

  6. Concentration and size dependence of peak wavelength shift on quantum dots in colloidal suspension

    NASA Astrophysics Data System (ADS)

    Rinehart, Benjamin S.; Cao, Caroline G. L.

    2016-08-01

    Quantum dots (QDs) are semiconductor nanocrystals that have significant advantages over organic fluorophores, including their extremely narrow Gaussian emission bands and broad absorption bands. Thus, QDs have a wide range of potential applications, such as in quantum computing, photovoltaic cells, biological sensing, and electronics. For these applications, aliasing provides a detrimental effect on signal identification efficiency. This can be avoided through characterization of the QD fluorescence signals. Characterization of the emissivity of CdTe QDs as a function of concentration (1 to 10 mg/ml aqueous) was conducted on 12 commercially available CdTe QDs (emission peaks 550 to 730 nm). The samples were excited by a 50-mW 405-nm laser with emission collected via a free-space CCD spectrometer. All QDs showed a redshift effect as concentration increased. On average, the CdTe QDs exhibited a maximum shift of +35.6 nm at 10 mg/ml and a minimum shift of +27.24 nm at 1 mg/ml, indicating a concentration dependence for shift magnitude. The concentration-dependent redshift function can be used to predict emission response as QD concentration is changed in a complex system.

  7. Energy-constrained two-way assisted private and quantum capacities of quantum channels

    NASA Astrophysics Data System (ADS)

    Davis, Noah; Shirokov, Maksim E.; Wilde, Mark M.

    2018-06-01

    With the rapid growth of quantum technologies, knowing the fundamental characteristics of quantum systems and protocols is essential for their effective implementation. A particular communication setting that has received increased focus is related to quantum key distribution and distributed quantum computation. In this setting, a quantum channel connects a sender to a receiver, and their goal is to distill either a secret key or entanglement, along with the help of arbitrary local operations and classical communication (LOCC). In this work, we establish a general theory of energy-constrained, LOCC-assisted private and quantum capacities of quantum channels, which are the maximum rates at which an LOCC-assisted quantum channel can reliably establish a secret key or entanglement, respectively, subject to an energy constraint on the channel input states. We prove that the energy-constrained squashed entanglement of a channel is an upper bound on these capacities. We also explicitly prove that a thermal state maximizes a relaxation of the squashed entanglement of all phase-insensitive, single-mode input bosonic Gaussian channels, generalizing results from prior work. After doing so, we prove that a variation of the method introduced by Goodenough et al. [New J. Phys. 18, 063005 (2016), 10.1088/1367-2630/18/6/063005] leads to improved upper bounds on the energy-constrained secret-key-agreement capacity of a bosonic thermal channel. We then consider a multipartite setting and prove that two known multipartite generalizations of the squashed entanglement are in fact equal. We finally show that the energy-constrained, multipartite squashed entanglement plays a role in bounding the energy-constrained LOCC-assisted private and quantum capacity regions of quantum broadcast channels.

  8. Energy transfer in aggregated CuInS2/ZnS core-shell quantum dots deposited as solid films

    NASA Astrophysics Data System (ADS)

    Gardelis, S.; Fakis, M.; Droseros, N.; Georgiadou, D.; Travlos, A.; Nassiopoulou, A. G.

    2017-01-01

    We report on the morphology and optical properties of CuInS2/ZnS core-shell quantum dots in solid films by means of AFM, SEM, HRTEM, steady state and time-resolved photoluminescence (PL) spectroscopy. The amount of aggregation of the CuInS2/ZnS QDs was controlled by changing the preparation conditions of the films. A red-shift of the PL spectrum of CuInS2/ZnS core-shell quantum dots, deposited as solid films on silicon substrates, is observed upon increasing the amount of aggregation. The presence of larger aggregates was found to lead to a larger PL red-shift. Besides, as the degree of aggregation increased, the PL decay became slower. We attribute the observed PL red-shift to energy transfer from the smaller to the larger dots within the aggregates, with the emission being realized via a long decay recombination mechanism (100-200 ns), the origin of which is discussed.

  9. Theoretical analysis of geometry and NMR isotope shift in hydrogen-bonding center of photoactive yellow protein by combination of multicomponent quantum mechanics and ONIOM scheme

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kanematsu, Yusuke; Tachikawa, Masanori

    2014-11-14

    Multicomponent quantum mechanical (MC-QM) calculation has been extended with ONIOM (our own N-layered integrated molecular orbital + molecular mechanics) scheme [ONIOM(MC-QM:MM)] to take account of both the nuclear quantum effect and the surrounding environment effect. The authors have demonstrated the first implementation and application of ONIOM(MC-QM:MM) method for the analysis of the geometry and the isotope shift in hydrogen-bonding center of photoactive yellow protein. ONIOM(MC-QM:MM) calculation for a model with deprotonated Arg52 reproduced the elongation of O–H bond of Glu46 observed by neutron diffraction crystallography. Among the unique isotope shifts in different conditions, the model with protonated Arg52 with solventmore » effect reasonably provided the best agreement with the corresponding experimental values from liquid NMR measurement. Our results implied the availability of ONIOM(MC-QM:MM) to distinguish the local environment around hydrogen bonds in a biomolecule.« less

  10. Influence of the dynamic Stark effect on long-term frequency stability of a self-oscillating magnetometer with laser-pumped alkali atoms

    NASA Astrophysics Data System (ADS)

    Baranov, A. A.; Ermak, S. V.; Kulachenkov, N. K.; Petrenko, M. V.; Sagitov, E. A.; Semenov, V. V.

    2017-11-01

    This paper presents the results of investigation Stark shift effect influence on the long-term stability of a dual scheme of quantum magnetometers. Such scheme allows suppressing Stark shift components when a certain pumping light polarization is applied. As a result, long-term stability of a quantum sensor increases. However, when low-frequency (LF) and microwave fields are attached to a single vapor cell a coherence circulation in hyperfine structure of alkali atoms takes place. Physical origin of this effect is associated with the so called “dressed” atom theory, when atom is “dressed” by LF field. It yields in multiphoton absorption and resonance frequency shift. First estimates for this shift based on density matrix evolution formalism are provided in the paper.

  11. Progress on Ultra-Dense Quantum Communication Using Integrated Photonic Architecture

    DTIC Science & Technology

    2013-01-01

    entanglement based quantum key distribution . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Extended dispersive-optics QKD (DO-QKD) protocol...2 2.3 Analysis of non-local correlations of entangled photon pairs for arbitrary dis- persion...Section 3). 2 Protocol Development 2.1 Achieving multiple secure bits per coincidence in time-energy entanglement based quantum key distribution High

  12. Satellite-to-ground quantum key distribution.

    PubMed

    Liao, Sheng-Kai; Cai, Wen-Qi; Liu, Wei-Yue; Zhang, Liang; Li, Yang; Ren, Ji-Gang; Yin, Juan; Shen, Qi; Cao, Yuan; Li, Zheng-Ping; Li, Feng-Zhi; Chen, Xia-Wei; Sun, Li-Hua; Jia, Jian-Jun; Wu, Jin-Cai; Jiang, Xiao-Jun; Wang, Jian-Feng; Huang, Yong-Mei; Wang, Qiang; Zhou, Yi-Lin; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Zhang, Qiang; Chen, Yu-Ao; Liu, Nai-Le; Wang, Xiang-Bin; Zhu, Zhen-Cai; Lu, Chao-Yang; Shu, Rong; Peng, Cheng-Zhi; Wang, Jian-Yu; Pan, Jian-Wei

    2017-09-07

    Quantum key distribution (QKD) uses individual light quanta in quantum superposition states to guarantee unconditional communication security between distant parties. However, the distance over which QKD is achievable has been limited to a few hundred kilometres, owing to the channel loss that occurs when using optical fibres or terrestrial free space that exponentially reduces the photon transmission rate. Satellite-based QKD has the potential to help to establish a global-scale quantum network, owing to the negligible photon loss and decoherence experienced in empty space. Here we report the development and launch of a low-Earth-orbit satellite for implementing decoy-state QKD-a form of QKD that uses weak coherent pulses at high channel loss and is secure because photon-number-splitting eavesdropping can be detected. We achieve a kilohertz key rate from the satellite to the ground over a distance of up to 1,200 kilometres. This key rate is around 20 orders of magnitudes greater than that expected using an optical fibre of the same length. The establishment of a reliable and efficient space-to-ground link for quantum-state transmission paves the way to global-scale quantum networks.

  13. Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Corndorf, Eric; Liang Chuang; Kanter, Gregory S.

    2005-06-15

    We demonstrate high-rate randomized data-encryption through optical fibers using the inherent quantum-measurement noise of coherent states of light. Specifically, we demonstrate 650 Mbit/s data encryption through a 10 Gbit/s data-bearing, in-line amplified 200-km-long line. In our protocol, legitimate users (who share a short secret key) communicate using an M-ry signal set while an attacker (who does not share the secret key) is forced to contend with the fundamental and irreducible quantum-measurement noise of coherent states. Implementations of our protocol using both polarization-encoded signal sets as well as polarization-insensitive phase-keyed signal sets are experimentally and theoretically evaluated. Different from the performancemore » criteria for the cryptographic objective of key generation (quantum key-generation), one possible set of performance criteria for the cryptographic objective of data encryption is established and carefully considered.« less

  14. Preservation of a lower bound of quantum secret key rate in the presence of decoherence

    NASA Astrophysics Data System (ADS)

    Datta, Shounak; Goswami, Suchetana; Pramanik, Tanumoy; Majumdar, A. S.

    2017-03-01

    It is well known that the interaction of quantum systems with the environment reduces the inherent quantum correlations. Under special circumstances the effect of decoherence can be reversed, for example, the interaction modelled by an amplitude damping channel can boost the teleportation fidelity from the classical to the quantum region for a bipartite quantum state. Here, we first show that this phenomenon fails to preserve the quantum secret key rate derived under individual attack. We further show that the technique of weak measurement can be used to slow down the process of decoherence, thereby helping to preserve the quantum secret key rate when one or both systems are interacting with the environment via an amplitude damping channel. Most interestingly, in certain cases weak measurement with post-selection where one considers both success and failure of the technique is shown to be more useful than without it when both systems interact with the environment.

  15. Device-independent security of quantum cryptography against collective attacks.

    PubMed

    Acín, Antonio; Brunner, Nicolas; Gisin, Nicolas; Massar, Serge; Pironio, Stefano; Scarani, Valerio

    2007-06-08

    We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.

  16. Quantum key distribution session with 16-dimensional photonic states.

    PubMed

    Etcheverry, S; Cañas, G; Gómez, E S; Nogueira, W A T; Saavedra, C; Xavier, G B; Lima, G

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  17. Quantum key distribution session with 16-dimensional photonic states

    NASA Astrophysics Data System (ADS)

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-07-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.

  18. Quantum key distribution session with 16-dimensional photonic states

    PubMed Central

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033

  19. An Introduction to Quantum Communications Networks; Or, how shall we communicate in the quantum era?

    NASA Astrophysics Data System (ADS)

    Razavi, Mohsen

    2018-05-01

    This book fills a gap between experts and non-experts in the field by providing readers with the basic tools to understand the latest developments in quantum communications and its future directions. With the fast pace of developments in quantum technologies, it is more necessary than ever to make the new generation of students in science/engineering familiar with the key ideas behind such disruptive systems. This book describes key applications for quantum networks; local, metropolitan, and global networks; and the industrial outlook for the field.

  20. Robust shot-noise measurement for continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Kunz-Jacques, Sébastien; Jouguet, Paul

    2015-02-01

    We study a practical method to measure the shot noise in real time in continuous-variable quantum key distribution systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e., noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  1. Quantum-key-distribution protocol with pseudorandom bases

    NASA Astrophysics Data System (ADS)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  2. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Ma, Xiang-Chun; Sun, Shi-Hai; Jiang, Mu-Sheng; Gui, Ming; Liang, Lin-Mei

    2014-04-01

    Measurement-device-independent quantum key distribution (MDI-QKD), leaving the detection procedure to the third partner and thus being immune to all detector side-channel attacks, is very promising for the construction of high-security quantum information networks. We propose a scheme to implement MDI-QKD, but with continuous variables instead of discrete ones, i.e., with the source of Gaussian-modulated coherent states, based on the principle of continuous-variable entanglement swapping. This protocol not only can be implemented with current telecom components but also has high key rates compared to its discrete counterpart; thus it will be highly compatible with quantum networks.

  3. Practical challenges in quantum key distribution

    DOE PAGES

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...

    2016-11-08

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  4. Practical challenges in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  5. Nanophotonic rare-earth quantum memory with optically controlled retrieval

    NASA Astrophysics Data System (ADS)

    Zhong, Tian; Kindem, Jonathan M.; Bartholomew, John G.; Rochman, Jake; Craiciu, Ioana; Miyazono, Evan; Bettinelli, Marco; Cavalli, Enrico; Verma, Varun; Nam, Sae Woo; Marsili, Francesco; Shaw, Matthew D.; Beyer, Andrew D.; Faraon, Andrei

    2017-09-01

    Optical quantum memories are essential elements in quantum networks for long-distance distribution of quantum entanglement. Scalable development of quantum network nodes requires on-chip qubit storage functionality with control of the readout time. We demonstrate a high-fidelity nanophotonic quantum memory based on a mesoscopic neodymium ensemble coupled to a photonic crystal cavity. The nanocavity enables >95% spin polarization for efficient initialization of the atomic frequency comb memory and time bin-selective readout through an enhanced optical Stark shift of the comb frequencies. Our solid-state memory is integrable with other chip-scale photon source and detector devices for multiplexed quantum and classical information processing at the network nodes.

  6. Present and future free-space quantum key distribution

    NASA Astrophysics Data System (ADS)

    Nordholt, Jane E.; Hughes, Richard J.; Morgan, George L.; Peterson, C. Glen; Wipf, Christopher C.

    2002-04-01

    Free-space quantum key distribution (QKD), more popularly know as quantum cryptography, uses single-photon free-space optical communications to distribute the secret keys required for secure communications. At Los Alamos National Laboratory we have demonstrated a fully automated system that is capable of operations at any time of day over a horizontal range of several kilometers. This has proven the technology is capable of operation from a spacecraft to the ground, opening up the possibility of QKD between any group of users anywhere on Earth. This system, the prototyping of a new system for use on a spacecraft, and the techniques required for world-wide quantum key distribution will be described. The operational parameters and performance of a system designed to operate between low earth orbit (LEO) and the ground will also be discussed.

  7. Two-party quantum key agreement with five-particle entangled states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  8. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Hong-Wei; Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004; Wang, Shuang

    2011-12-15

    It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost ofmore » only increasing the quantum bit error rate from 1.3 to 1.4%.« less

  9. Tensor network states in time-bin quantum optics

    NASA Astrophysics Data System (ADS)

    Lubasch, Michael; Valido, Antonio A.; Renema, Jelmer J.; Kolthammer, W. Steven; Jaksch, Dieter; Kim, M. S.; Walmsley, Ian; García-Patrón, Raúl

    2018-06-01

    The current shift in the quantum optics community towards experiments with many modes and photons necessitates new classical simulation techniques that efficiently encode many-body quantum correlations and go beyond the usual phase-space formulation. To address this pressing demand we formulate linear quantum optics in the language of tensor network states. We extensively analyze the quantum and classical correlations of time-bin interference in a single fiber loop. We then generalize our results to more complex time-bin quantum setups and identify different classes of architectures for high-complexity and low-overhead boson sampling experiments.

  10. Robust multiparty quantum secret key sharing over two collective-noise channels

    NASA Astrophysics Data System (ADS)

    Zhang, Zhan-jun

    2006-02-01

    Based on a polarization-based quantum key distribution protocol over a collective-noise channel [Phys. Rev. Lett. 92 (2004) 017901], a robust (n,n)-threshold scheme of multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) is proposed. In this scheme the sharer entirety can establish a joint key with the message sender only if all the sharers collaborate together. Since Bell singlets are enough for use and only single-photon polarization needs to be identified, this scheme is feasible according to the present-day technique.

  11. Rigidifying fluorescent linkers by metal-organic framework formation for fluorescence blue shift and quantum yield enhancement.

    PubMed

    Wei, Zhangwen; Gu, Zhi-Yuan; Arvapally, Ravi K; Chen, Ying-Pin; McDougald, Roy N; Ivy, Joshua F; Yakovenko, Andrey A; Feng, Dawei; Omary, Mohammad A; Zhou, Hong-Cai

    2014-06-11

    We demonstrate that rigidifying the structure of fluorescent linkers by structurally constraining them in metal-organic frameworks (MOFs) to control their conformation effectively tunes the fluorescence energy and enhances the quantum yield. Thus, a new tetraphenylethylene-based zirconium MOF exhibits a deep-blue fluorescent emission at 470 nm with a unity quantum yield (99.9 ± 0.5%) under Ar, representing ca. 3600 cm(-1) blue shift and doubled radiative decay efficiency vs the linker precursor. An anomalous increase in the fluorescence lifetime and relative intensity takes place upon heating the solid MOF from cryogenic to ambient temperatures. The origin of these unusual photoluminescence properties is attributed to twisted linker conformation, intramolecular hindrance, and framework rigidity.

  12. Quantum size and magnesium composition effects on the optical absorption in the MgxZn(1-x)O/ZnO quantum well

    NASA Astrophysics Data System (ADS)

    Dakhlaoui, Hassen ben Bechir; Mouna, Nefzi

    2018-02-01

    In this work, we investigated the effects of polarizations and structural parameters on the optical absorption coefficient (OAC) and the intersubband transition between the three lowest energy levels E1,E2 , and E3 in the MgxZn(1-x)O/ZnO single quantum well. The energy of the electron in each level and its respective wavefunction are calculated by the numerical solution of Schrödinger and Poisson equations self-consistently using an effective mass approximation. Our findings exhibit that the intersubband transitions, ΔE12 and ΔE13 , can be altered and controlled by varying the quantum well width and the magnesium composition, x. Moreover, our results suggest that the optical absorption coefficients, α12 and α13 , can be modulated principally by adjusting the quantum well width, especially the optical absorption coefficient (α12), which presents a red shift by raising the quantum well thickness. Contrary to α12 , the optical absorption coefficient, α13 , can present either a red or a blue shift by increasing the quantum well width. The process responsible for this behavior, which can be suitable for optoelectronic device applications, is discussed here in detail.

  13. Coherent attacking continuous-variable quantum key distribution with entanglement in the middle

    NASA Astrophysics Data System (ADS)

    Zhang, Zhaoyuan; Shi, Ronghua; Zeng, Guihua; Guo, Ying

    2018-06-01

    We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.

  14. Reaching quantum limits for phase-shift detection with semiclassical states

    NASA Astrophysics Data System (ADS)

    Luis, Alfredo

    2004-01-01

    We present two measuring strategies reaching the Heisenberg limit for phase-shift measurements using semiclassical coherent states exclusively. We examine their performance by assuming practical experimental conditions such as losses and nonideal detectors.

  15. Multi-rate DPSK optical transceivers for free-space applications

    NASA Astrophysics Data System (ADS)

    Caplan, D. O.; Carney, J. J.; Fitzgerald, J. J.; Gaschits, I.; Kaminsky, R.; Lund, G.; Hamilton, S. A.; Magliocco, R. J.; Murphy, R. J.; Rao, H. G.; Spellmeyer, N. W.; Wang, J. P.

    2014-03-01

    We describe a flexible high-sensitivity laser communication transceiver design that can significantly benefit performance and cost of NASA's satellite-based Laser Communications Relay Demonstration. Optical communications using differential phase shift keying, widely deployed for use in long-haul fiber-optic networks, is well known for its superior sensitivity and link performance over on-off keying, while maintaining a relatively straightforward design. However, unlike fiber-optic links, free-space applications often require operation over a wide dynamic range of power due to variations in link distance and channel conditions, which can include rapid kHz-class fading when operating through the turbulent atmosphere. Here we discuss the implementation of a robust, near-quantum-limited multi-rate DPSK transceiver, co-located transmitter and receiver subsystems that can operate efficiently over the highly-variable free-space channel. Key performance features will be presented on the master oscillator power amplifier (MOPA) based TX, including a wavelength-stabilized master laser, high-extinction-ratio burst-mode modulator, and 0.5 W single polarization power amplifier, as well as low-noise optically preamplified DSPK receiver and built-in test capabilities.

  16. The influence of bio-conjugation on photoluminescence of CdSe/ZnS quantum dots

    NASA Astrophysics Data System (ADS)

    Torchynska, Tetyana V.; Vorobiev, Yuri V.; Makhniy, Victor P.; Horley, Paul P.

    2014-11-01

    We report a considerable blue shift in the luminescence spectra of CdSe/ZnS quantum dots conjugated to anti-interleukin-10 antibodies. This phenomenon can be explained theoretically by accounting for bio-conjugation as a process causing electrostatic interaction between a quantum dot and an antibody, which reduces effective volume of the dot core. To solve the Schrödinger equation for an exciton confined in the quantum dot, we use mirror boundary conditions that were successfully tested for different geometries of quantum wells.

  17. Coherence properties and quantum state transportation in an optical conveyor belt.

    PubMed

    Kuhr, S; Alt, W; Schrader, D; Dotsenko, I; Miroshnychenko, Y; Rosenfeld, W; Khudaverdyan, M; Gomer, V; Rauschenbeutel, A; Meschede, D

    2003-11-21

    We have prepared and detected quantum coherences of trapped cesium atoms with long dephasing times. Controlled transport by an "optical conveyor belt" over macroscopic distances preserves the atomic coherence with slight reduction of coherence time. The limiting dephasing effects are experimentally identified, and we present an analytical model of the reversible and irreversible dephasing mechanisms. Our experimental methods are applicable at the single-atom level. Coherent quantum bit operations along with quantum state transport open the route towards a "quantum shift register" of individual neutral atoms.

  18. Study of the Quantum Channel between Earth and Space for Satellite Quantum Communications

    NASA Astrophysics Data System (ADS)

    Bonato, Cristian; Tomaello, Andrea; da Deppo, Vania; Naletto, Giapiero; Villoresi, Paolo

    In this work there are studied the conditions for the effective quantum communications between a terminal on Earth and the other onboard of an orbiter. The quantum key distribution between a LEO satellite and a ground station is studied in particular. The effect of the propagation over long distances as well as the background during day or night is modeled, compared and discussed in the context of key generation and exchange.

  19. Photon nonlinear mixing in subcarrier multiplexed quantum key distribution systems.

    PubMed

    Capmany, José

    2009-04-13

    We provide, for the first time to our knowledge, an analysis of the influence of nonlinear photon mixing on the end to end quantum bit error rate (QBER) performance of subcarrier multiplexed quantum key distribution systems. The results show that negligible impact is to be expected for modulation indexes in the range of 2%.

  20. Investigating and Improving Student Understanding of Key Ideas in Quantum Mechanics throughout Instruction

    NASA Astrophysics Data System (ADS)

    Emigh, Paul Jeffrey

    This dissertation describes research on student understanding of quantum mechanics across multiple levels of instruction. The primary focus has been to identify patterns in student reasoning related to key concepts in quantum mechanics. The specific topics include quantum measurements, time dependence, vector spaces, and angular momentum. The research has spanned a variety of different quantum courses intended for introductory physics students, upper-division physics majors, and graduate students in physics. The results of this research have been used to develop a set of curriculum, Tutorials in Physics: Quantum Mechanics, for addressing the most persistent student difficulties. We document both the development of this curriculum and how it has impacted and improved student understanding of quantum mechanics.

  1. Quantum key distribution in a multi-user network at gigahertz clock rates

    NASA Astrophysics Data System (ADS)

    Fernandez, Veronica; Gordon, Karen J.; Collins, Robert J.; Townsend, Paul D.; Cova, Sergio D.; Rech, Ivan; Buller, Gerald S.

    2005-07-01

    In recent years quantum information research has lead to the discovery of a number of remarkable new paradigms for information processing and communication. These developments include quantum cryptography schemes that offer unconditionally secure information transport guaranteed by quantum-mechanical laws. Such potentially disruptive security technologies could be of high strategic and economic value in the future. Two major issues confronting researchers in this field are the transmission range (typically <100km) and the key exchange rate, which can be as low as a few bits per second at long optical fiber distances. This paper describes further research of an approach to significantly enhance the key exchange rate in an optical fiber system at distances in the range of 1-20km. We will present results on a number of application scenarios, including point-to-point links and multi-user networks. Quantum key distribution systems have been developed, which use standard telecommunications optical fiber, and which are capable of operating at clock rates of up to 2GHz. They implement a polarization-encoded version of the B92 protocol and employ vertical-cavity surface-emitting lasers with emission wavelengths of 850 nm as weak coherent light sources, as well as silicon single-photon avalanche diodes as the single photon detectors. The point-to-point quantum key distribution system exhibited a quantum bit error rate of 1.4%, and an estimated net bit rate greater than 100,000 bits-1 for a 4.2 km transmission range.

  2. Security of quantum key distribution with iterative sifting

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Lo, Hoi-Kwong; Mizutani, Akihiro; Kato, Go; Lim, Charles Ci Wen; Azuma, Koji; Curty, Marcos

    2018-01-01

    Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma’s inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.

  3. The impact of disorder on charge transport in three dimensional quantum dot resonant tunneling structures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Puthen-Veettil, B., E-mail: b.puthen-veettil@unsw.edu.au; Patterson, R.; König, D.

    Efficient iso-entropic energy filtering of electronic waves can be realized through nanostructures with three dimensional confinement, such as quantum dot resonant tunneling structures. Large-area deployment of such structures is useful for energy selective contacts but such configuration is susceptible to structural disorders. In this work, the transport properties of quantum-dot-based wide-area resonant tunneling structures, subject to realistic disorder mechanisms, are studied. Positional variations of the quantum dots are shown to reduce the resonant transmission peaks while size variations in the device are shown to reduce as well as broaden the peaks. Increased quantum dot size distribution also results in amore » peak shift to lower energy which is attributed to large dots dominating transmission. A decrease in barrier thickness reduces the relative peak height while the overall transmission increases dramatically due to lower “series resistance.” While any shift away from ideality can be intuitively expected to reduce the resonance peak, quantification allows better understanding of the tolerances required for fabricating structures based on resonant tunneling phenomena/.« less

  4. Electric and magnetic field modulated energy dispersion, conductivity and optical response in double quantum wire with spin-orbit interactions

    NASA Astrophysics Data System (ADS)

    Karaaslan, Y.; Gisi, B.; Sakiroglu, S.; Kasapoglu, E.; Sari, H.; Sokmen, I.

    2018-02-01

    We study the influence of electric field on the electronic energy band structure, zero-temperature ballistic conductivity and optical properties of double quantum wire. System described by double-well anharmonic confinement potential is exposed to a perpendicular magnetic field and Rashba and Dresselhaus spin-orbit interactions. Numerical results show up that the combined effects of internal and external agents cause the formation of crossing, anticrossing, camel-back/anomaly structures and the lateral, downward/upward shifts in the energy dispersion. The anomalies in the energy subbands give rise to the oscillation patterns in the ballistic conductance, and the energy shifts bring about the shift in the peak positions of optical absorption coefficients and refractive index changes.

  5. On the bathochromic shift of the absorption by astaxanthin in crustacyanin: a quantum chemical study

    NASA Astrophysics Data System (ADS)

    Durbeej, Bo; Eriksson, Leif A.

    2003-06-01

    The structural origin of the bathochromic shift assumed by the electronic absorption spectrum of protein-bound astaxanthin, the carotenoid that upon binding to crustacyanin is responsible for the blue colouration of lobster shell, is investigated by means of quantum chemical methods. The calculations suggest that the bathochromic shift is largely due to one of the astaxanthin C4 keto groups being hydrogen-bonded to a histidine residue of the surrounding protein, and that the effect of this histidine is directly dependent on its protonation state. Out of the different methodologies (CIS, TD-DFT, and ZINDO/S) employed to calculate wavelengths of maximum absorption, the best agreement with experimental data is obtained using the semiempirical ZINDO/S method.

  6. The Effect of Quantum-Mechanical Interference on Precise Measurements of the n = 2 Triplet P Fine Structure of Helium

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marsman, A.; Horbatsch, M.; Hessels, E. A., E-mail: hessels@yorku.ca

    2015-09-15

    For many decades, improvements in both theory and experiment of the fine structure of the n = 2 triplet P levels of helium have allowed for an increasingly precise determination of the fine-structure constant. Recently, it has been observed that quantum-mechanical interference between neighboring resonances can cause significant shifts, even if such neighboring resonances are separated by thousands of natural widths. The shifts depend in detail on the experimental method used for the measurement, as well as the specific experimental parameters employed. Here, we review how these shifts apply for the most precise measurements of the helium 2{sup 3}P fine-structuremore » intervals.« less

  7. China demonstrates intercontinental quantum key distribution

    NASA Astrophysics Data System (ADS)

    Johnston, Hamish

    2017-11-01

    A quantum cryptography key has been shared between Beijing and Vienna using a satellite - allowing the presidents of the Chinese Academy of Sciences and Austrian Academy of Sciences to communicate via a secure video link.

  8. Upper bounds on secret-key agreement over lossy thermal bosonic channels

    NASA Astrophysics Data System (ADS)

    Kaur, Eneet; Wilde, Mark M.

    2017-12-01

    Upper bounds on the secret-key-agreement capacity of a quantum channel serve as a way to assess the performance of practical quantum-key-distribution protocols conducted over that channel. In particular, if a protocol employs a quantum repeater, achieving secret-key rates exceeding these upper bounds is evidence of having a working quantum repeater. In this paper, we extend a recent advance [Liuzzo-Scorpo et al., Phys. Rev. Lett. 119, 120503 (2017), 10.1103/PhysRevLett.119.120503] in the theory of the teleportation simulation of single-mode phase-insensitive Gaussian channels such that it now applies to the relative entropy of entanglement measure. As a consequence of this extension, we find tighter upper bounds on the nonasymptotic secret-key-agreement capacity of the lossy thermal bosonic channel than were previously known. The lossy thermal bosonic channel serves as a more realistic model of communication than the pure-loss bosonic channel, because it can model the effects of eavesdropper tampering and imperfect detectors. An implication of our result is that the previously known upper bounds on the secret-key-agreement capacity of the thermal channel are too pessimistic for the practical finite-size regime in which the channel is used a finite number of times, and so it should now be somewhat easier to witness a working quantum repeater when using secret-key-agreement capacity upper bounds as a benchmark.

  9. Modeling a space-based quantum link that includes an adaptive optics system

    NASA Astrophysics Data System (ADS)

    Duchane, Alexander W.; Hodson, Douglas D.; Mailloux, Logan O.

    2017-10-01

    Quantum Key Distribution uses optical pulses to generate shared random bit strings between two locations. If a high percentage of the optical pulses are comprised of single photons, then the statistical nature of light and information theory can be used to generate secure shared random bit strings which can then be converted to keys for encryption systems. When these keys are incorporated along with symmetric encryption techniques such as a one-time pad, then this method of key generation and encryption is resistant to future advances in quantum computing which will significantly degrade the effectiveness of current asymmetric key sharing techniques. This research first reviews the transition of Quantum Key Distribution free-space experiments from the laboratory environment to field experiments, and finally, ongoing space experiments. Next, a propagation model for an optical pulse from low-earth orbit to ground and the effects of turbulence on the transmitted optical pulse is described. An Adaptive Optics system is modeled to correct for the aberrations caused by the atmosphere. The long-term point spread function of the completed low-earth orbit to ground optical system is explored in the results section. Finally, the impact of this optical system and its point spread function on an overall quantum key distribution system as well as the future work necessary to show this impact is described.

  10. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    NASA Astrophysics Data System (ADS)

    Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun

    2016-08-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

  11. Polarization-basis tracking scheme for quantum key distribution using revealed sifted key bits.

    PubMed

    Ding, Yu-Yang; Chen, Wei; Chen, Hua; Wang, Chao; Li, Ya-Ping; Wang, Shuang; Yin, Zhen-Qiang; Guo, Guang-Can; Han, Zheng-Fu

    2017-03-15

    The calibration of the polarization basis between the transmitter and receiver is an important task in quantum key distribution. A continuously working polarization-basis tracking scheme (PBTS) will effectively promote the efficiency of the system and reduce the potential security risk when switching between the transmission and calibration modes. Here, we proposed a single-photon level continuously working PBTS using only sifted key bits revealed during an error correction procedure, without introducing additional reference light or interrupting the transmission of quantum signals. We applied the scheme to a polarization-encoding BB84 QKD system in a 50 km fiber channel, and obtained an average quantum bit error rate (QBER) of 2.32% and a standard derivation of 0.87% during 24 h of continuous operation. The stable and relatively low QBER validates the effectiveness of the scheme.

  12. Interface formation during silica encapsulation of colloidal CdSe/CdS quantum dots observed by in situ Raman spectroscopy

    NASA Astrophysics Data System (ADS)

    Biermann, Amelie; Aubert, Tangi; Baumeister, Philipp; Drijvers, Emile; Hens, Zeger; Maultzsch, Janina

    2017-04-01

    We investigate the encapsulation of CdSe/CdS quantum dots (QDs) in a silica shell by in situ Raman spectroscopy and find a distinct shift of the CdS Raman signal during the first hours of the synthesis. This shift does not depend on the final silica shell thickness but on the properties of the initial core-shell QD. We find a correlation between the Raman shift rate and the speed of the silica formation and attribute this to the changing configuration of the outermost layers of the QD shell, where an interface to the newly formed silica is created. This dependence of Raman shift rate on the speed of silica formation process will give rise to many possible studies concerning the growth mechanism in the water-in-oil microemulsion, rendering in situ Raman a valuable instrument in monitoring this type of reaction.

  13. Measurement-device-independent entanglement-based quantum key distribution

    NASA Astrophysics Data System (ADS)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Liu, Hongwei; Yin, Zhenqiang; Li, Zuohan; Lian, Shibin; Du, Yungang; Wu, Lingan

    2016-05-01

    We present a quantum key distribution protocol in a model in which the legitimate users gather statistics as in the measurement-device-independent entanglement witness to certify the sources and the measurement devices. We show that the task of measurement-device-independent quantum communication can be accomplished based on monogamy of entanglement, and it is fairly loss tolerate including source and detector flaws. We derive a tight bound for collective attacks on the Holevo information between the authorized parties and the eavesdropper. Then with this bound, the final secret key rate with the source flaws can be obtained. The results show that long-distance quantum cryptography over 144 km can be made secure using only standard threshold detectors.

  14. High-speed continuous-variable quantum key distribution without sending a local oscillator.

    PubMed

    Huang, Duan; Huang, Peng; Lin, Dakai; Wang, Chao; Zeng, Guihua

    2015-08-15

    We report a 100-MHz continuous-variable quantum key distribution (CV-QKD) experiment over a 25-km fiber channel without sending a local oscillator (LO). We use a "locally" generated LO and implement with a 1-GHz shot-noise-limited homodyne detector to achieve high-speed quantum measurement, and we propose a secure phase compensation scheme to maintain a low level of excess noise. These make high-bit-rate CV-QKD significantly simpler for larger transmission distances compared with previous schemes in which both LO and quantum signals are transmitted through the insecure quantum channel.

  15. Effect of core quantum-dot size on power-conversion-efficiency for silicon solar-cells implementing energy-down-shift using CdSe/ZnS core/shell quantum dots.

    PubMed

    Baek, Seung-Wook; Shim, Jae-Hyoung; Seung, Hyun-Min; Lee, Gon-Sub; Hong, Jin-Pyo; Lee, Kwang-Sup; Park, Jea-Gun

    2014-11-07

    Silicon solar cells mainly absorb visible light, although the sun emits ultraviolet (UV), visible, and infrared light. Because the surface reflectance of a textured surface with SiNX film on a silicon solar cell in the UV wavelength region (250-450 nm) is higher than ∼27%, silicon solar-cells cannot effectively convert UV light into photo-voltaic power. We implemented the concept of energy-down-shift using CdSe/ZnS core/shell quantum-dots (QDs) on p-type silicon solar-cells to absorb more UV light. CdSe/ZnS core/shell QDs demonstrated clear evidence of energy-down-shift, which absorbed UV light and emitted green-light photoluminescence signals at a wavelength of 542 nm. The implementation of 0.2 wt% (8.8 nm QDs layer) green-light emitting CdSe/ZnS core/shell QDs reduced the surface reflectance of the textured surface with SiNX film on a silicon solar-cell from 27% to 15% and enhanced the external quantum efficiency (EQE) of silicon solar-cells to around 30% in the UV wavelength region, thereby enhancing the power conversion efficiency (PCE) for p-type silicon solar-cells by 5.5%.

  16. Recall Performance for Content-Addressable Memory Using Adiabatic Quantum Optimization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Imam, Neena; Humble, Travis S.; McCaskey, Alex

    A content-addressable memory (CAM) stores key-value associations such that the key is recalled by providing its associated value. While CAM recall is traditionally performed using recurrent neural network models, we show how to solve this problem using adiabatic quantum optimization. Our approach maps the recurrent neural network to a commercially available quantum processing unit by taking advantage of the common underlying Ising spin model. We then assess the accuracy of the quantum processor to store key-value associations by quantifying recall performance against an ensemble of problem sets. We observe that different learning rules from the neural network community influence recallmore » accuracy but performance appears to be limited by potential noise in the processor. The strong connection established between quantum processors and neural network problems supports the growing intersection of these two ideas.« less

  17. Quantum key distribution for composite dimensional finite systems

    NASA Astrophysics Data System (ADS)

    Shalaby, Mohamed; Kamal, Yasser

    2017-06-01

    The application of quantum mechanics contributes to the field of cryptography with very important advantage as it offers a mechanism for detecting the eavesdropper. The pioneering work of quantum key distribution uses mutually unbiased bases (MUBs) to prepare and measure qubits (or qudits). Weak mutually unbiased bases (WMUBs) have weaker properties than MUBs properties, however, unlike MUBs, a complete set of WMUBs can be constructed for systems with composite dimensions. In this paper, we study the use of weak mutually unbiased bases (WMUBs) in quantum key distribution for composite dimensional finite systems. We prove that the security analysis of using a complete set of WMUBs to prepare and measure the quantum states in the generalized BB84 protocol, gives better results than using the maximum number of MUBs that can be constructed, when they are analyzed against the intercept and resend attack.

  18. Plug-and-play measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Choi, Yujun; Kwon, Osung; Woo, Minki; Oh, Kyunghwan; Han, Sang-Wook; Kim, Yong-Su; Moon, Sung

    2016-03-01

    Quantum key distribution (QKD) guarantees unconditional communication security based on the laws of quantum physics. However, practical QKD suffers from a number of quantum hackings due to the device imperfections. From the security standpoint, measurement-device-independent quantum key distribution (MDI-QKD) is in the limelight since it eliminates all the possible loopholes in detection. Due to active control units for mode matching between the photons from remote parties, however, the implementation of MDI-QKD is highly impractical. In this paper, we propose a method to resolve the mode matching problem while minimizing the use of active control units. By introducing the plug-and-play (P&P) concept into MDI-QKD, the indistinguishability in spectral and polarization modes between photons can naturally be guaranteed. We show the feasibility of P&P MDI-QKD with a proof-of-principle experiment.

  19. Quantum key distribution over an installed multimode optical fiber local area network.

    PubMed

    Namekata, Naoto; Mori, Shigehiko; Inoue, Shuichiro

    2005-12-12

    We have investigated the possibility of a multimode fiber link for a quantum channel. Transmission of light in an extremely underfilled mode distribution promises a single-mode-like behavior in the multimode fiber. To demonstrate the performance of the fiber link we performed quantum key distribution, on the basis of the BB84 four-state protocol, over 550 m of an installed multimode optical fiber local area network, and the quantum-bit-error rate of 1.09 percent was achieved.

  20. Multi-party Quantum Key Agreement without Entanglement

    NASA Astrophysics Data System (ADS)

    Cai, Bin-Bin; Guo, Gong-De; Lin, Song

    2017-04-01

    A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.

  1. High-efficiency reconciliation for continuous variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bai, Zengliang; Yang, Shenshen; Li, Yongmin

    2017-04-01

    Quantum key distribution (QKD) is the most mature application of quantum information technology. Information reconciliation is a crucial step in QKD and significantly affects the final secret key rates shared between two legitimate parties. We analyze and compare various construction methods of low-density parity-check (LDPC) codes and design high-performance irregular LDPC codes with a block length of 106. Starting from these good codes and exploiting the slice reconciliation technique based on multilevel coding and multistage decoding, we realize high-efficiency Gaussian key reconciliation with efficiency higher than 95% for signal-to-noise ratios above 1. Our demonstrated method can be readily applied in continuous variable QKD.

  2. Quantum computing on encrypted data

    NASA Astrophysics Data System (ADS)

    Fisher, K. A. G.; Broadbent, A.; Shalm, L. K.; Yan, Z.; Lavoie, J.; Prevedel, R.; Jennewein, T.; Resch, K. J.

    2014-01-01

    The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.

  3. Quantum computing on encrypted data.

    PubMed

    Fisher, K A G; Broadbent, A; Shalm, L K; Yan, Z; Lavoie, J; Prevedel, R; Jennewein, T; Resch, K J

    2014-01-01

    The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.

  4. Fundamental limits of repeaterless quantum communications

    PubMed Central

    Pirandola, Stefano; Laurenza, Riccardo; Ottaviani, Carlo; Banchi, Leonardo

    2017-01-01

    Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. Here, by constructing an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed ‘teleportation stretching', we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we exactly determine the fundamental rate-loss tradeoff affecting any protocol of quantum key distribution. Our findings set the limits of point-to-point quantum communications and provide precise and general benchmarks for quantum repeaters. PMID:28443624

  5. Fundamental limits of repeaterless quantum communications.

    PubMed

    Pirandola, Stefano; Laurenza, Riccardo; Ottaviani, Carlo; Banchi, Leonardo

    2017-04-26

    Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. Here, by constructing an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed 'teleportation stretching', we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we exactly determine the fundamental rate-loss tradeoff affecting any protocol of quantum key distribution. Our findings set the limits of point-to-point quantum communications and provide precise and general benchmarks for quantum repeaters.

  6. Monogamy relations of quantum entanglement for partially coherently superposed states

    NASA Astrophysics Data System (ADS)

    Shi, Xian

    2017-12-01

    Not Available Project partially supported by the National Key Research and Development Program of China (Grant No. 2016YFB1000902), the National Natural Science Foundation of China (Grant Nos. 61232015, 61472412, and 61621003), the Beijing Science and Technology Project (2016), Tsinghua-Tencent-AMSS-Joint Project (2016), and the Key Laboratory of Mathematics Mechanization Project: Quantum Computing and Quantum Information Processing.

  7. Aggregating quantum repeaters for the quantum internet

    NASA Astrophysics Data System (ADS)

    Azuma, Koji; Kato, Go

    2017-09-01

    The quantum internet holds promise for accomplishing quantum teleportation and unconditionally secure communication freely between arbitrary clients all over the globe, as well as the simulation of quantum many-body systems. For such a quantum internet protocol, a general fundamental upper bound on the obtainable entanglement or secret key has been derived [K. Azuma, A. Mizutani, and H.-K. Lo, Nat. Commun. 7, 13523 (2016), 10.1038/ncomms13523]. Here we consider its converse problem. In particular, we present a universal protocol constructible from any given quantum network, which is based on running quantum repeater schemes in parallel over the network. For arbitrary lossy optical channel networks, our protocol has no scaling gap with the upper bound, even based on existing quantum repeater schemes. In an asymptotic limit, our protocol works as an optimal entanglement or secret-key distribution over any quantum network composed of practical channels such as erasure channels, dephasing channels, bosonic quantum amplifier channels, and lossy optical channels.

  8. Anharmonic quantum contribution to vibrational dephasing.

    PubMed

    Barik, Debashis; Ray, Deb Shankar

    2004-07-22

    Based on a quantum Langevin equation and its corresponding Hamiltonian within a c-number formalism we calculate the vibrational dephasing rate of a cubic oscillator. It is shown that leading order quantum correction due to anharmonicity of the potential makes a significant contribution to the rate and the frequency shift. We compare our theoretical estimates with those obtained from experiments for small diatomics N(2), O(2), and CO.

  9. Quantum-classical boundary for precision optical phase estimation

    NASA Astrophysics Data System (ADS)

    Birchall, Patrick M.; O'Brien, Jeremy L.; Matthews, Jonathan C. F.; Cable, Hugo

    2017-12-01

    Understanding the fundamental limits on the precision to which an optical phase can be estimated is of key interest for many investigative techniques utilized across science and technology. We study the estimation of a fixed optical phase shift due to a sample which has an associated optical loss, and compare phase estimation strategies using classical and nonclassical probe states. These comparisons are based on the attainable (quantum) Fisher information calculated per number of photons absorbed or scattered by the sample throughout the sensing process. We find that for a given number of incident photons upon the unknown phase, nonclassical techniques in principle provide less than a 20 % reduction in root-mean-square error (RMSE) in comparison with ideal classical techniques in multipass optical setups. Using classical techniques in a different optical setup that we analyze, which incorporates additional stages of interference during the sensing process, the achievable reduction in RMSE afforded by nonclassical techniques falls to only ≃4 % . We explain how these conclusions change when nonclassical techniques are compared to classical probe states in nonideal multipass optical setups, with additional photon losses due to the measurement apparatus.

  10. Zero-internal fields in nonpolar InGaN/GaN multi-quantum wells grown by the multi-buffer layer technique.

    PubMed

    Song, Hooyoung; Kim, Jin Soak; Kim, Eun Kyu; Seo, Yong Gon; Hwang, Sung-Min

    2010-04-02

    The potential of nonpolar a-plane InGaN/GaN multi-quantum wells (MQWs), which are free from a strong piezoelectric field, was demonstrated. An a-GaN template grown on an r-plane sapphire substrate by the multi-buffer layer technique showed high structural quality with an omega full width at half maximum value along the c-axis of 418 arcsec obtained from high-resolution x-ray diffraction analysis. From barrier analysis by deep level transient spectroscopy, it appeared that a-plane InGaN/GaN MQWs can solve the efficiency droop problem as they have a lower electron capture barrier than the c-plane sample. The peak shift of the temperature-dependent photoluminescence signal for the nonpolar InGaN/GaN MQWs was well fitted by Varshni's empirical equation with zero-internal fields. A high photoluminescence efficiency of 0.27 from this sample also showed that nonpolar MQWs can be the key factor to solve the efficiency limitation in conventional c-plane GaN based light emitting diodes.

  11. Quantum information is physical

    NASA Astrophysics Data System (ADS)

    DiVincenzo, D. P.; Loss, D.

    1998-03-01

    We discuss a few current developments in the use of quantum mechanically coherent systems for information processing. In each of these developments, Rolf Landauer has played a crucial role in nudging us, and other workers in the field, into asking the right questions, some of which we have been lucky enough to answer. A general overview of the key ideas of quantum error correction is given. We discuss how quantum entanglement is the key to protecting quantum states from decoherence in a manner which, in a theoretical sense, is as effective as the protection of digital data from bit noise. We also discuss five general criteria which must be satisfied to implement a quantum computer in the laboratory, and we illustrate the application of these criteria by discussing our ideas for creating a quantum computer out of the spin states of coupled quantum dots.

  12. The localized quantum vacuum field

    NASA Astrophysics Data System (ADS)

    Dragoman, D.

    2008-03-01

    A model for the localized quantum vacuum is proposed in which the zero-point energy (ZPE) of the quantum electromagnetic field originates in energy- and momentum-conserving transitions of material systems from their ground state to an unstable state with negative energy. These transitions are accompanied by emissions and re-absorptions of real photons, which generate a localized quantum vacuum in the neighborhood of material systems. The model could help resolve the cosmological paradox associated with the ZPE of electromagnetic fields, while reclaiming quantum effects associated with quantum vacuum such as the Casimir effect and the Lamb shift. It also offers a new insight into the Zitterbewegung of material particles.

  13. Simple 2.5 GHz time-bin quantum key distribution

    NASA Astrophysics Data System (ADS)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.

  14. Reply to 'Comment on 'Quantum dense key distribution''

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Berchera, I. Ruo; Castelletto, S.

    2005-01-01

    In this Reply we propose a modified security proof of the quantum dense key distribution protocol, detecting also the eavesdropping attack proposed by Wojcik in his Comment [Wojcik, Phys. Rev. A 71, 016301 (2005)].

  15. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    NASA Astrophysics Data System (ADS)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  16. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation.

    PubMed

    Leverrier, Anthony; Grangier, Philippe

    2009-05-08

    We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.

  17. Security of a semi-quantum protocol where reflections contribute to the secret key

    NASA Astrophysics Data System (ADS)

    Krawec, Walter O.

    2016-05-01

    In this paper, we provide a proof of unconditional security for a semi-quantum key distribution protocol introduced in a previous work. This particular protocol demonstrated the possibility of using X basis states to contribute to the raw key of the two users (as opposed to using only direct measurement results) even though a semi-quantum participant cannot directly manipulate such states. In this work, we provide a complete proof of security by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we are able to find an error threshold value such that for all error rates less than this threshold, it is guaranteed that A and B may distill a secure secret key; for error rates larger than this threshold, A and B should abort. We demonstrate that this error threshold compares favorably to several fully quantum protocols. We also comment on some interesting observations about the behavior of this protocol under certain noise scenarios.

  18. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources.

    PubMed

    Chen, RuiKe; Bao, WanSu; Zhou, Chun; Li, Hongwei; Wang, Yang; Bao, HaiZe

    2016-03-21

    In recent years, a large quantity of work have been done to narrow the gap between theory and practice in quantum key distribution (QKD). However, most of them are focus on two-party protocols. Very recently, Yao Fu et al proposed a measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol and proved its security in the limit of infinitely long keys. As a step towards practical application for MDI-QCC, we design a biased decoy-state measurement-device-independent quantum cryptographic conferencing protocol and analyze the performance of the protocol in both the finite-key and infinite-key regime. From numerical simulations, we show that our decoy-state analysis is tighter than Yao Fu et al. That is, we can achieve the nonzero asymptotic secret key rate in long distance with approximate to 200km and we also demonstrate that with a finite size of data (say 1011 to 1013 signals) it is possible to perform secure MDI-QCC over reasonable distances.

  19. Entanglement-distillation attack on continuous-variable quantum key distribution in a turbulent atmospheric channel

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Xie, Cailang; Liao, Qin; Zhao, Wei; Zeng, Guihua; Huang, Duan

    2017-08-01

    The survival of Gaussian quantum states in a turbulent atmospheric channel is of crucial importance in free-space continuous-variable (CV) quantum key distribution (QKD), in which the transmission coefficient will fluctuate in time, thus resulting in non-Gaussian quantum states. Different from quantum hacking of the imperfections of practical devices, here we propose a different type of attack by exploiting the security loopholes that occur in a real lossy channel. Under a turbulent atmospheric environment, the Gaussian states are inevitably afflicted by decoherence, which would cause a degradation of the transmitted entanglement. Therefore, an eavesdropper can perform an intercept-resend attack by applying an entanglement-distillation operation on the transmitted non-Gaussian mixed states, which allows the eavesdropper to bias the estimation of the parameters and renders the final keys shared between the legitimate parties insecure. Our proposal highlights the practical CV QKD vulnerabilities with free-space quantum channels, including the satellite-to-earth links, ground-to-ground links, and a link from moving objects to ground stations.

  20. Analysis of counterfactual quantum key distribution using error-correcting theory

    NASA Astrophysics Data System (ADS)

    Li, Yan-Bing

    2014-10-01

    Counterfactual quantum key distribution is an interesting direction in quantum cryptography and has been realized by some researchers. However, it has been pointed that its insecure in information theory when it is used over a high lossy channel. In this paper, we retry its security from a error-correcting theory point of view. The analysis indicates that the security flaw comes from the reason that the error rate in the users' raw key pair is as high as that under the Eve's attack when the loss rate exceeds 50 %.

  1. Simple proof of security of the BB84 quantum key distribution protocol

    PubMed

    Shor; Preskill

    2000-07-10

    We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based protocol uses Calderbank-Shor-Steane codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.

  2. Security of coherent-state quantum cryptography in the presence of Gaussian noise

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heid, Matthias; Luetkenhaus, Norbert

    2007-08-15

    We investigate the security against collective attacks of a continuous variable quantum key distribution scheme in the asymptotic key limit for a realistic setting. The quantum channel connecting the two honest parties is assumed to be lossy and imposes Gaussian noise on the observed quadrature distributions. Secret key rates are given for direct and reverse reconciliation schemes including post-selection in the collective attack scenario. The effect of a nonideal error correction and two-way communication in the classical post-processing step is also taken into account.

  3. Numerical approach for unstructured quantum key distribution

    PubMed Central

    Coles, Patrick J.; Metodiev, Eric M.; Lütkenhaus, Norbert

    2016-01-01

    Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates is difficult to estimate. Furthermore, it is an interesting question whether (intentionally) asymmetric protocols could outperform symmetric ones. Here we develop a robust numerical approach for calculating the key rate for arbitrary discrete-variable QKD protocols. Ultimately this will allow researchers to study ‘unstructured' protocols, that is, those that lack symmetry. Our approach relies on transforming the key rate calculation to the dual optimization problem, which markedly reduces the number of parameters and hence the calculation time. We illustrate our method by investigating some unstructured protocols for which the key rate was previously unknown. PMID:27198739

  4. Coherence Preservation of a Single Neutral Atom Qubit Transferred between Magic-Intensity Optical Traps.

    PubMed

    Yang, Jiaheng; He, Xiaodong; Guo, Ruijun; Xu, Peng; Wang, Kunpeng; Sheng, Cheng; Liu, Min; Wang, Jin; Derevianko, Andrei; Zhan, Mingsheng

    2016-09-16

    We demonstrate that the coherence of a single mobile atomic qubit can be well preserved during a transfer process among different optical dipole traps (ODTs). This is a prerequisite step in realizing a large-scale neutral atom quantum information processing platform. A qubit encoded in the hyperfine manifold of an ^{87}Rb atom is dynamically extracted from the static quantum register by an auxiliary moving ODT and reinserted into the static ODT. Previous experiments were limited by decoherences induced by the differential light shifts of qubit states. Here, we apply a magic-intensity trapping technique which mitigates the detrimental effects of light shifts and substantially enhances the coherence time to 225±21  ms. The experimentally demonstrated magic trapping technique relies on the previously neglected hyperpolarizability contribution to the light shifts, which makes the light shift dependence on the trapping laser intensity parabolic. Because of the parabolic dependence, at a certain "magic" intensity, the first order sensitivity to trapping light-intensity variations over ODT volume is eliminated. We experimentally demonstrate the utility of this approach and measure hyperpolarizability for the first time. Our results pave the way for constructing scalable quantum-computing architectures with single atoms trapped in an array of magic ODTs.

  5. A heteronuclear zero quantum coherence Nz-exchange experiment that resolves resonance overlap and its application to measure the rates of heme binding to the IsdC protein.

    PubMed

    Robson, Scott A; Peterson, Robert; Bouchard, Louis-S; Villareal, Valerie A; Clubb, Robert T

    2010-07-21

    Chemical exchange phenomena in NMR spectra can be quantitatively interpreted to measure the rates of ligand binding, as well as conformational and chemical rearrangements. In macromolecules, processes that occur slowly on the chemical shift time scale are frequently studied using 2D heteronuclear ZZ or N(z)-exchange spectroscopy. However, to successfully apply this method, peaks arising from each exchanging species must have unique chemical shifts in both dimensions, a condition that is often not satisfied in protein-ligand binding equilibria for (15)N nuclei. To overcome the problem of (15)N chemical shift degeneracy we developed a heteronuclear zero-quantum (and double-quantum) coherence N(z)-exchange experiment that resolves (15)N chemical shift degeneracy in the indirect dimension. We demonstrate the utility of this new experiment by measuring the heme binding kinetics of the IsdC protein from Staphylococcus aureus. Because of peak overlap, we could not reliably analyze binding kinetics using conventional methods. However, our new experiment resulted in six well-resolved systems that yielded interpretable data. We measured a relatively slow k(off) rate of heme from IsdC (<10 s(-1)), which we interpret as necessary so heme loaded IsdC has time to encounter downstream binding partners to which it passes the heme. The utility of using this new exchange experiment can be easily expanded to (13)C nuclei. We expect our heteronuclear zero-quantum coherence N(z)-exchange experiment will expand the usefulness of exchange spectroscopy to slow chemical exchange events that involve ligand binding.

  6. Optical signatures of coupled quantum dots.

    PubMed

    Stinaff, E A; Scheibner, M; Bracker, A S; Ponomarev, I V; Korenev, V L; Ware, M E; Doty, M F; Reinecke, T L; Gammon, D

    2006-02-03

    An asymmetric pair of coupled InAs quantum dots is tuned into resonance by applying an electric field so that a single hole forms a coherent molecular wave function. The optical spectrum shows a rich pattern of level anticrossings and crossings that can be understood as a superposition of charge and spin configurations of the two dots. Coulomb interactions shift the molecular resonance of the optically excited state (charged exciton) with respect to the ground state (single charge), enabling light-induced coupling of the quantum dots. This result demonstrates the possibility of optically coupling quantum dots for application in quantum information processing.

  7. Optical Signatures of Coupled Quantum Dots

    NASA Astrophysics Data System (ADS)

    Stinaff, E. A.; Scheibner, M.; Bracker, A. S.; Ponomarev, I. V.; Korenev, V. L.; Ware, M. E.; Doty, M. F.; Reinecke, T. L.; Gammon, D.

    2006-02-01

    An asymmetric pair of coupled InAs quantum dots is tuned into resonance by applying an electric field so that a single hole forms a coherent molecular wave function. The optical spectrum shows a rich pattern of level anticrossings and crossings that can be understood as a superposition of charge and spin configurations of the two dots. Coulomb interactions shift the molecular resonance of the optically excited state (charged exciton) with respect to the ground state (single charge), enabling light-induced coupling of the quantum dots. This result demonstrates the possibility of optically coupling quantum dots for application in quantum information processing.

  8. Observation of quasiperiodic dynamics in a one-dimensional quantum walk of single photons in space

    NASA Astrophysics Data System (ADS)

    Xue, Peng; Qin, Hao; Tang, Bao; Sanders, Barry C.

    2014-05-01

    We realize the quasi-periodic dynamics of a quantum walker over 2.5 quasi-periods by realizing the walker as a single photon passing through a quantum-walk optical-interferometer network. We introduce fully controllable polarization-independent phase shifters in each optical path to realize arbitrary site-dependent phase shifts, and employ large clear-aperture beam displacers, while maintaining high-visibility interference, to enable 10 quantum-walk steps to be reached. By varying the half-wave-plate setting, we control the quantum-coin bias thereby observing a transition from quasi-periodic dynamics to ballistic diffusion.

  9. Approximation method for a spherical bound system in the quantum plasma

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mehramiz, A.; Sobhanian, S.; Mahmoodi, J.

    2010-08-15

    A system of quantum hydrodynamic equations has been used for investigating the dielectric tensor and dispersion equation of a semiconductor as a quantum magnetized plasma. Dispersion relations and their modifications due to quantum effects are derived for both longitudinal and transverse waves. The number of states and energy levels are analytically estimated for a spherical bound system embedded in a semiconductor quantum plasma. The results show that longitudinal waves decay rapidly and do not interact with the spherical bound system. The energy shifts caused by the spin-orbit interaction and the Zeeman effect are calculated.

  10. Frequency and bandwidth conversion of single photons in a room-temperature diamond quantum memory

    PubMed Central

    Fisher, Kent A. G.; England, Duncan G.; MacLean, Jean-Philippe W.; Bustard, Philip J.; Resch, Kevin J.; Sussman, Benjamin J.

    2016-01-01

    The spectral manipulation of photons is essential for linking components in a quantum network. Large frequency shifts are needed for conversion between optical and telecommunication frequencies, while smaller shifts are useful for frequency-multiplexing quantum systems, in the same way that wavelength division multiplexing is used in classical communications. Here we demonstrate frequency and bandwidth conversion of single photons in a room-temperature diamond quantum memory. Heralded 723.5 nm photons, with 4.1 nm bandwidth, are stored as optical phonons in the diamond via a Raman transition. Upon retrieval from the diamond memory, the spectral shape of the photons is determined by a tunable read pulse through the reverse Raman transition. We report central frequency tunability over 4.2 times the input bandwidth, and bandwidth modulation between 0.5 and 1.9 times the input bandwidth. Our results demonstrate the potential for diamond, and Raman memories in general, as an integrated platform for photon storage and spectral conversion. PMID:27045988

  11. Manipulating Nonlinear Emission and Cooperative Effect of CdSe/ZnS Quantum Dots by Coupling to a Silver Nanorod Complex Cavity

    PubMed Central

    Nan, Fan; Cheng, Zi-Qiang; Wang, Ya-Lan; Zhang, Qing; Zhou, Li; Yang, Zhong-Jian; Zhong, Yu-Ting; Liang, Shan; Xiong, Qihua; Wang, Qu-Quan

    2014-01-01

    Colloidal semiconductor quantum dots have three-dimensional confined excitons with large optical oscillator strength and gain. The surface plasmons of metallic nanostructures offer an efficient tool to enhance exciton-exciton coupling and excitation energy transfer at appropriate geometric arrangement. Here, we report plasmon-mediated cooperative emissions of approximately one monolayer of ensemble CdSe/ZnS quantum dots coupled with silver nanorod complex cavities at room temperature. Power-dependent spectral shifting, narrowing, modulation, and amplification are demonstrated by adjusting longitudinal surface plasmon resonance of silver nanorods, reflectivity and phase shift of silver nanostructured film, and mode spacing of the complex cavity. The underlying physical mechanism of the nonlinear excitation energy transfer and nonlinear emissions are further investigated and discussed by using time-resolved photoluminescence and finite-difference time-domain numerical simulations. Our results suggest effective strategies to design active plasmonic complex cavities for cooperative emission nanodevices based on semiconductor quantum dots. PMID:24787617

  12. Frequency and bandwidth conversion of single photons in a room-temperature diamond quantum memory.

    PubMed

    Fisher, Kent A G; England, Duncan G; MacLean, Jean-Philippe W; Bustard, Philip J; Resch, Kevin J; Sussman, Benjamin J

    2016-04-05

    The spectral manipulation of photons is essential for linking components in a quantum network. Large frequency shifts are needed for conversion between optical and telecommunication frequencies, while smaller shifts are useful for frequency-multiplexing quantum systems, in the same way that wavelength division multiplexing is used in classical communications. Here we demonstrate frequency and bandwidth conversion of single photons in a room-temperature diamond quantum memory. Heralded 723.5 nm photons, with 4.1 nm bandwidth, are stored as optical phonons in the diamond via a Raman transition. Upon retrieval from the diamond memory, the spectral shape of the photons is determined by a tunable read pulse through the reverse Raman transition. We report central frequency tunability over 4.2 times the input bandwidth, and bandwidth modulation between 0.5 and 1.9 times the input bandwidth. Our results demonstrate the potential for diamond, and Raman memories in general, as an integrated platform for photon storage and spectral conversion.

  13. CdS quantum dots in a novel glass with a very low activation energy and its variation of diffusivity with temperature

    NASA Astrophysics Data System (ADS)

    Nagpal, Swati

    2011-07-01

    CdS quantum dots of different average sizes in the range 2 to 3.8 nm were grown by diffusion-limited growth process in indigenously made silicate glass. The absorption spectra showed a strong quantum confinement effect with a blue shift of the order of 500 meV depending on the average size. Critical radius of quantum dots was found to be 1.8 nm. The size dispersion decreased from 15.2 to 12.5% with a 20% increase in the particle size. The activation energy for diffusion was found to be very low i.e. 193 kJ mol-1 and the diffusion coefficient increased by 60% for 10 K rise in temperature. The PL emission spectra showed the presence of only deep traps around 600 nm with a red shift of 200 nm. No shallow traps or band edge emission was observed. The PL peak position changed from 560 to 640 nm with a 35 K increase in annealing temperature.

  14. Magnetosonic waves interactions in a spin-1/2 degenerate quantum plasma

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Sheng-Chang, E-mail: lsc1128lsc@126.com; Han, Jiu-Ning

    2014-03-15

    We investigate the magnetosonic waves and their interactions in a spin-1/2 degenerate quantum plasma. With the help of the extended Poincaré-Lighthill-Kuo perturbation method, we derive two Korteweg-de Vries-Burgers equations to describe the magnetosonic waves. The parameter region where exists magnetosonic waves and the phase diagram of the compressive and rarefactive solitary waves with different plasma parameters are shown. We further explore the effects of quantum diffraction, quantum statistics, and electron spin magnetization on the head-on collisions of magnetosonic solitary waves. We obtain the collision-induced phase shifts (trajectory changes) analytically. Both for the compressive and rarefactive solitary waves, it is foundmore » that the collisions only lead to negative phase shifts. Our present study should be useful to understand the collective phenomena related to the magnetosonic wave collisions in degenerate plasmas like those in the outer shell of massive white dwarfs as well as to the potential applications of plasmas.« less

  15. Redshift and blueshift of GaNAs/GaAs multiple quantum wells induced by rapid thermal annealing

    NASA Astrophysics Data System (ADS)

    Sun, Yijun; Cheng, Zhiyuan; Zhou, Qiang; Sun, Ying; Sun, Jiabao; Liu, Yanhua; Wang, Meifang; Cao, Zhen; Ye, Zhi; Xu, Mingsheng; Ding, Yong; Chen, Peng; Heuken, Michael; Egawa, Takashi

    2018-02-01

    The effects of rapid thermal annealing (RTA) on the optical properties of GaNAs/GaAs multiple quantum wells (MQWs) grown by chemical beam epitaxy (CBE) are studied by photoluminescence (PL) at 77 K. The results show that the optical quality of the MQWs improves significantly after RTA. With increasing RTA temperature, PL peak energy of the MQWs redshifts below 1023 K, while it blueshifts above 1023 K. Two competitive processes which occur simultaneously during RTA result in redshift at low temperature and blueshift at high temperature. It is also found that PL peak energy shift can be explained neither by nitrogen diffusion out of quantum wells nor by nitrogen reorganization inside quantum wells. PL peak energy shift can be quantitatively explained by a modified recombination coupling model in which redshift nonradiative recombination and blueshift nonradiative recombination coexist. The results obtained have significant implication on the growth and RTA of GaNAs material for high performance optoelectronic device application.

  16. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic objectives of key generation and direct data-encryption, a new quantum cryptographic principle is demonstrated wherein keyed coherent-state signal sets are employed. Taking advantage of the fundamental and irreducible quantum-measurement noise of coherent states, these schemes do not require the users to measure the influence of an attacker. Experimental key-generation and data encryption schemes based on these techniques, which are compatible with today's WDM fiber-optic telecommunications infrastructure, are implemented and analyzed.

  17. Adaptive real time selection for quantum key distribution in lossy and turbulent free-space channels

    NASA Astrophysics Data System (ADS)

    Vallone, Giuseppe; Marangon, Davide G.; Canale, Matteo; Savorgnan, Ilaria; Bacco, Davide; Barbieri, Mauro; Calimani, Simon; Barbieri, Cesare; Laurenti, Nicola; Villoresi, Paolo

    2015-04-01

    The unconditional security in the creation of cryptographic keys obtained by quantum key distribution (QKD) protocols will induce a quantum leap in free-space communication privacy in the same way that we are beginning to realize secure optical fiber connections. However, free-space channels, in particular those with long links and the presence of atmospheric turbulence, are affected by losses, fluctuating transmissivity, and background light that impair the conditions for secure QKD. Here we introduce a method to contrast the atmospheric turbulence in QKD experiments. Our adaptive real time selection (ARTS) technique at the receiver is based on the selection of the intervals with higher channel transmissivity. We demonstrate, using data from the Canary Island 143-km free-space link, that conditions with unacceptable average quantum bit error rate which would prevent the generation of a secure key can be used once parsed according to the instantaneous scintillation using the ARTS technique.

  18. Practical private database queries based on a quantum-key-distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less

  19. Secret information reconciliation based on punctured low-density parity-check codes for continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Jiang, Xue-Qin; Huang, Peng; Huang, Duan; Lin, Dakai; Zeng, Guihua

    2017-02-01

    Achieving information theoretic security with practical complexity is of great interest to continuous-variable quantum key distribution in the postprocessing procedure. In this paper, we propose a reconciliation scheme based on the punctured low-density parity-check (LDPC) codes. Compared to the well-known multidimensional reconciliation scheme, the present scheme has lower time complexity. Especially when the chosen punctured LDPC code achieves the Shannon capacity, the proposed reconciliation scheme can remove the information that has been leaked to an eavesdropper in the quantum transmission phase. Therefore, there is no information leaked to the eavesdropper after the reconciliation stage. This indicates that the privacy amplification algorithm of the postprocessing procedure is no more needed after the reconciliation process. These features lead to a higher secret key rate, optimal performance, and availability for the involved quantum key distribution scheme.

  20. Quantum Cryptography Based on the Deutsch-Jozsa Algorithm

    NASA Astrophysics Data System (ADS)

    Nagata, Koji; Nakamura, Tadao; Farouk, Ahmed

    2017-09-01

    Recently, secure quantum key distribution based on Deutsch's algorithm using the Bell state is reported (Nagata and Nakamura, Int. J. Theor. Phys. doi: 10.1007/s10773-017-3352-4, 2017). Our aim is of extending the result to a multipartite system. In this paper, we propose a highly speedy key distribution protocol. We present sequre quantum key distribution based on a special Deutsch-Jozsa algorithm using Greenberger-Horne-Zeilinger states. Bob has promised to use a function f which is of one of two kinds; either the value of f( x) is constant for all values of x, or else the value of f( x) is balanced, that is, equal to 1 for exactly half of the possible x, and 0 for the other half. Here, we introduce an additional condition to the function when it is balanced. Our quantum key distribution overcomes a classical counterpart by a factor O(2 N ).

  1. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.

    PubMed

    Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B

    2014-09-15

    Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

  2. Quantum Watermarking Scheme Based on INEQR

    NASA Astrophysics Data System (ADS)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  3. Quantum key distribution without detector vulnerabilities using optically seeded lasers

    NASA Astrophysics Data System (ADS)

    Comandar, L. C.; Lucamarini, M.; Fröhlich, B.; Dynes, J. F.; Sharpe, A. W.; Tam, S. W.-B.; Yuan, Z. L.; Penty, R. V.; Shields, A. J.

    2016-05-01

    Security in quantum cryptography is continuously challenged by inventive attacks targeting the real components of a cryptographic set-up, and duly restored by new countermeasures to foil them. Owing to their high sensitivity and complex design, detectors are the most frequently attacked components. It was recently shown that two-photon interference from independent light sources can be used to remove any vulnerability from detectors. This new form of detection-safe quantum key distribution (QKD), termed measurement-device-independent (MDI), has been experimentally demonstrated but with modest key rates. Here, we introduce a new pulsed laser seeding technique to obtain high-visibility interference from gain-switched lasers and thereby perform MDI-QKD with unprecedented key rates in excess of 1 megabit per second in the finite-size regime. This represents a two to six orders of magnitude improvement over existing implementations and supports the new scheme as a practical resource for secure quantum communications.

  4. Performance analysis of quantum access network using code division multiple access model

    NASA Astrophysics Data System (ADS)

    Hu, Linxi; Yang, Can; He, Guangqiang

    2017-06-01

    Not Available Project supported by the National Natural Science Foundation of China (Grant Nos. 61475099 and 61102053), the Program of State Key Laboratory of Quantum Optics and Quantum Optics Devices (Grant No. KF201405), the Open Fund of IPOC (BUPT) (Grant No. IPOC2015B004), and the Program of State Key Laboratory of Information Security (Grant No. 2016-MS-05).

  5. Quantum and classical noise in practical quantum-cryptography systems based on polarization-entangled photons

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Castelletto, S.; Degiovanni, I.P.; Rastello, M.L.

    2003-02-01

    Quantum-cryptography key distribution (QCKD) experiments have been recently reported using polarization-entangled photons. However, in any practical realization, quantum systems suffer from either unwanted or induced interactions with the environment and the quantum measurement system, showing up as quantum and, ultimately, statistical noise. In this paper, we investigate how an ideal polarization entanglement in spontaneous parametric down-conversion (SPDC) suffers quantum noise in its practical implementation as a secure quantum system, yielding errors in the transmitted bit sequence. Since all SPDC-based QCKD schemes rely on the measurement of coincidence to assert the bit transmission between the two parties, we bundle up themore » overall quantum and statistical noise in an exhaustive model to calculate the accidental coincidences. This model predicts the quantum-bit error rate and the sifted key and allows comparisons between different security criteria of the hitherto proposed QCKD protocols, resulting in an objective assessment of performances and advantages of different systems.« less

  6. Single molecule quantum-confined Stark effect measurements of semiconductor nanoparticles at room temperature

    NASA Astrophysics Data System (ADS)

    Park, Kyoung Won; Deutsch, Zvicka; Li, J. Jack; Oron, Dan; Weiss, Shimon

    2013-02-01

    We investigate the quantum confined Stark effect (QCSE) of various nanoparticles (NPs) on the single molecule level at room temperature. We tested 8 different NPs with different geometry, material composition and electronic structure, and measured their QCSE by single molecule spectroscopy. This study reveals that suppressing the Coulomb interaction force between electron and hole by asymmetric type-II interface is critical for an enhanced QCSE. For example, ZnSe-CdS and CdSe(Te)-CdS-CdZnSe asymmetric nanorods (type-II) display respectively twice and more than three times larger QCSE than that of simple type-I nanorods (CdSe). In addition, wavelength blue-shift of QCSE and roughly linear Δλ-F (emission wavelength shift vs. the applied electric field) relation are observed for the type-II nanorods. Experimental results (Δλ-F or ΔE-F) are successfully reproduced by self-consistent quantum mechanical calculation. Intensity reduction in blue-shifted spectrum is also accounted for. Both calculations and experiments suggest that the magnitude of the QCSE is predominantly determined by the degree of initial charge separation in these structures.

  7. Measurement-device-independent quantum key distribution.

    PubMed

    Lo, Hoi-Kwong; Curty, Marcos; Qi, Bing

    2012-03-30

    How to remove detector side channel attacks has been a notoriously hard problem in quantum cryptography. Here, we propose a simple solution to this problem--measurement-device-independent quantum key distribution (QKD). It not only removes all detector side channels, but also doubles the secure distance with conventional lasers. Our proposal can be implemented with standard optical components with low detection efficiency and highly lossy channels. In contrast to the previous solution of full device independent QKD, the realization of our idea does not require detectors of near unity detection efficiency in combination with a qubit amplifier (based on teleportation) or a quantum nondemolition measurement of the number of photons in a pulse. Furthermore, its key generation rate is many orders of magnitude higher than that based on full device independent QKD. The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors.

  8. Measurement-device-independent quantum communication with an untrusted source

    NASA Astrophysics Data System (ADS)

    Xu, Feihu

    2015-07-01

    Measurement-device-independent quantum key distribution (MDI-QKD) can provide enhanced security compared to traditional QKD, and it constitutes an important framework for a quantum network with an untrusted network server. Still, a key assumption in MDI-QKD is that the sources are trusted. We propose here a MDI quantum network with a single untrusted source. We have derived a complete proof of the unconditional security of MDI-QKD with an untrusted source. Using simulations, we have considered various real-life imperfections in its implementation, and the simulation results show that MDI-QKD with an untrusted source provides a key generation rate that is close to the rate of initial MDI-QKD in the asymptotic setting. Our work proves the feasibility of the realization of a quantum network. The network users need only low-cost modulation devices, and they can share both an expensive detector and a complicated laser provided by an untrusted network server.

  9. Mass defect effects in atomic clocks

    NASA Astrophysics Data System (ADS)

    Yudin, Valeriy; Taichenachev, Alexey

    2018-03-01

    We consider some implications of the mass defect on the frequency of atomic transitions. We have found that some well-known frequency shifts (the gravitational shift and motion-induced shifts such as quadratic Doppler and micromotion shifts) can be interpreted as consequences of the mass defect in quantum atomic physics, i.e. without the need for the concept of time dilation used in special and general relativity theories. Moreover, we show that the inclusion of the mass defect leads to previously unknown shifts for clocks based on trapped ions.

  10. Faraday-Michelson system for quantum cryptography.

    PubMed

    Mo, Xiao-Fan; Zhu, Bing; Han, Zheng-Fu; Gui, You-Zhen; Guo, Guang-Can

    2005-10-01

    Quantum key distribution provides unconditional security for communication. Unfortunately, current experimental schemes are not suitable for long-distance fiber transmission because of phase drift or Rayleigh backscattering. In this Letter we present a unidirectional intrinsically stable scheme that is based on Michelson-Faraday interferometers, in which ordinary mirrors are replaced with 90 degree Faraday mirrors. With the scheme, a demonstration setup was built and excellent stability of interference fringe visibility was achieved over a fiber length of 175 km. Through a 125 km long commercial communication fiber cable between Beijing and Tianjin, the key exchange was performed with a quantum bit-error rate of less than 6%, which is to our knowledge the longest reported quantum key distribution experiment under field conditions.

  11. Method for adding nodes to a quantum key distribution system

    DOEpatents

    Grice, Warren P

    2015-02-24

    An improved quantum key distribution (QKD) system and method are provided. The system and method introduce new clients at intermediate points along a quantum channel, where any two clients can establish a secret key without the need for a secret meeting between the clients. The new clients perform operations on photons as they pass through nodes in the quantum channel, and participate in a non-secret protocol that is amended to include the new clients. The system and method significantly increase the number of clients that can be supported by a conventional QKD system, with only a modest increase in cost. The system and method are compatible with a variety of QKD schemes, including polarization, time-bin, continuous variable and entanglement QKD.

  12. Fast Entanglement Establishment via Local Dynamics for Quantum Repeater Networks

    NASA Astrophysics Data System (ADS)

    Gyongyosi, Laszlo; Imre, Sandor

    Quantum entanglement is a necessity for future quantum communication networks, quantum internet, and long-distance quantum key distribution. The current approaches of entanglement distribution require high-delay entanglement transmission, entanglement swapping to extend the range of entanglement, high-cost entanglement purification, and long-lived quantum memories. We introduce a fundamental protocol for establishing entanglement in quantum communication networks. The proposed scheme does not require entanglement transmission between the nodes, high-cost entanglement swapping, entanglement purification, or long-lived quantum memories. The protocol reliably establishes a maximally entangled system between the remote nodes via dynamics generated by local Hamiltonians. The method eliminates the main drawbacks of current schemes allowing fast entanglement establishment with a minimized delay. Our solution provides a fundamental method for future long-distance quantum key distribution, quantum repeater networks, quantum internet, and quantum-networking protocols. This work was partially supported by the GOP-1.1.1-11-2012-0092 project sponsored by the EU and European Structural Fund, by the Hungarian Scientific Research Fund - OTKA K-112125, and by the COST Action MP1006.

  13. Quantum cryptography: a view from classical cryptography

    NASA Astrophysics Data System (ADS)

    Buchmann, Johannes; Braun, Johannes; Demirel, Denise; Geihs, Matthias

    2017-06-01

    Much of digital data requires long-term protection of confidentiality, for example, medical health records. Cryptography provides such protection. However, currently used cryptographic techniques such as Diffe-Hellman key exchange may not provide long-term security. Such techniques rely on certain computational assumptions, such as the hardness of the discrete logarithm problem that may turn out to be incorrect. On the other hand, quantum cryptography---in particular quantum random number generation and quantum key distribution---offers information theoretic protection. In this paper, we explore the challenge of providing long-term confidentiality and we argue that a combination of quantum cryptography and classical cryptography can provide such protection.

  14. Integration of quantum key distribution and private classical communication through continuous variable

    NASA Astrophysics Data System (ADS)

    Wang, Tianyi; Gong, Feng; Lu, Anjiang; Zhang, Damin; Zhang, Zhengping

    2017-12-01

    In this paper, we propose a scheme that integrates quantum key distribution and private classical communication via continuous variables. The integrated scheme employs both quadratures of a weak coherent state, with encrypted bits encoded on the signs and Gaussian random numbers encoded on the values of the quadratures. The integration enables quantum and classical data to share the same physical and logical channel. Simulation results based on practical system parameters demonstrate that both classical communication and quantum communication can be implemented over distance of tens of kilometers, thus providing a potential solution for simultaneous transmission of quantum communication and classical communication.

  15. Securing quantum key distribution systems using fewer states

    NASA Astrophysics Data System (ADS)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  16. Fundamental quantitative security in quantum key generation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yuen, Horace P.

    2010-12-15

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographicmore » context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.« less

  17. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com

    2016-11-15

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  18. Quantum Secure Group Communication.

    PubMed

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  19. Defense frontier analysis of quantum cryptographic systems.

    PubMed

    Slutsky, B; Rao, R; Sun, P C; Tancevski, L; Fainman, S

    1998-05-10

    When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92.

  20. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    NASA Astrophysics Data System (ADS)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  1. Simulating of the measurement-device independent quantum key distribution with phase randomized general sources

    PubMed Central

    Wang, Qin; Wang, Xiang-Bin

    2014-01-01

    We present a model on the simulation of the measurement-device independent quantum key distribution (MDI-QKD) with phase randomized general sources. It can be used to predict experimental observations of a MDI-QKD with linear channel loss, simulating corresponding values for the gains, the error rates in different basis, and also the final key rates. Our model can be applicable to the MDI-QKDs with arbitrary probabilistic mixture of different photon states or using any coding schemes. Therefore, it is useful in characterizing and evaluating the performance of the MDI-QKD protocol, making it a valuable tool in studying the quantum key distributions. PMID:24728000

  2. Insecurity of Detector-Device-Independent Quantum Key Distribution.

    PubMed

    Sajeed, Shihan; Huang, Anqi; Sun, Shihai; Xu, Feihu; Makarov, Vadim; Curty, Marcos

    2016-12-16

    Detector-device-independent quantum key distribution (DDI-QKD) held the promise of being robust to detector side channels, a major security loophole in quantum key distribution (QKD) implementations. In contrast to what has been claimed, however, we demonstrate that the security of DDI-QKD is not based on postselected entanglement, and we introduce various eavesdropping strategies that show that DDI-QKD is in fact insecure against detector side-channel attacks as well as against other attacks that exploit devices' imperfections of the receiver. Our attacks are valid even when the QKD apparatuses are built by the legitimate users of the system themselves, and thus, free of malicious modifications, which is a key assumption in DDI-QKD.

  3. Quantum control and measurement of atomic spins in polarization spectroscopy

    NASA Astrophysics Data System (ADS)

    Deutsch, Ivan H.; Jessen, Poul S.

    2010-03-01

    Quantum control and measurement are two sides of the same coin. To affect a dynamical map, well-designed time-dependent control fields must be applied to the system of interest. To read out the quantum state, information about the system must be transferred to a probe field. We study a particular example of this dual action in the context of quantum control and measurement of atomic spins through the light-shift interaction with an off-resonant optical probe. By introducing an irreducible tensor decomposition, we identify the coupling of the Stokes vector of the light field with moments of the atomic spin state. This shows how polarization spectroscopy can be used for continuous weak measurement of atomic observables that evolve as a function of time. Simultaneously, the state-dependent light shift induced by the probe field can drive nonlinear dynamics of the spin, and can be used to generate arbitrary unitary transformations on the atoms. We revisit the derivation of the master equation in order to give a unified description of spin dynamics in the presence of both nonlinear dynamics and photon scattering. Based on this formalism, we review applications to quantum control, including the design of state-to-state mappings, and quantum-state reconstruction via continuous weak measurement on a dynamically controlled ensemble.

  4. Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)

    NASA Astrophysics Data System (ADS)

    Škorić, Boris; de Vries, Manon

    Perfect encryption of quantum states using the Quantum One-Time Pad (QOTP) requires two classical key bits per qubit. Almost-perfect encryption, with information-theoretic security, requires only slightly more than 1. We slightly improve lower bounds on the key length. We show that key length n+2log1ɛ suffices to encrypt n qubits in such a way that the cipherstate’s L1-distance from uniformity is upperbounded by ɛ. For a stricter security definition involving the ∞-norm, we prove sufficient key length n+logn+2log1ɛ+1+1nlog1δ+logln21-ɛ, where δ is a small probability of failure. Our proof uses Pauli operators, whereas previous results on the ∞-norm needed Haar measure sampling. We show how to QOTP-encrypt classical plaintext in a nontrivial way: we encode a plaintext bit as the vector ±(1,1,1)/3 on the Bloch sphere. Applying the Pauli encryption operators results in eight possible cipherstates which are equally spread out on the Bloch sphere. This encoding, especially when combined with the half-keylength option of QOTP, has advantages over 4-state and 6-state encoding in applications such as Quantum Key Recycling (QKR) and Unclonable Encryption (UE). We propose a key recycling scheme that is more efficient and can tolerate more noise than a recent scheme by Fehr and Salvail. For 8-state QOTP encryption with pseudorandom keys, we do a statistical analysis of the cipherstate eigenvalues. We present numerics up to nine qubits.

  5. Private database queries based on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Jia-Li; Guo, Fen-Zhuo; Gao, Fei; Liu, Bin; Wen, Qiao-Yan

    2013-08-01

    Based on the fundamental concept of quantum counterfactuality, we propose a protocol to achieve quantum private database queries, which is a theoretical study of how counterfactuality can be employed beyond counterfactual quantum key distribution (QKD). By adding crucial detecting apparatus to the device of QKD, the privacy of both the distrustful user and the database owner can be guaranteed. Furthermore, the proposed private-database-query protocol makes full use of the low efficiency in the counterfactual QKD, and by adjusting the relevant parameters, the protocol obtains excellent flexibility and extensibility.

  6. On a two-pass scheme without a faraday mirror for free-space relativistic quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kravtsov, K. S.; Radchenko, I. V.; Korol'kov, A. V.

    2013-05-15

    The stability of destructive interference independent of the input polarization and the state of a quantum communication channel in fiber optic systems used in quantum cryptography plays a principal role in providing the security of communicated keys. A novel optical scheme is proposed that can be used both in relativistic quantum cryptography for communicating keys in open space and for communicating them over fiber optic lines. The scheme ensures stability of destructive interference and admits simple automatic balancing of a fiber interferometer.

  7. Some conservative estimates in quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N.

    2006-08-15

    Relationship is established between the security of the BB84 quantum key distribution protocol and the forward and converse coding theorems for quantum communication channels. The upper bound Q{sub c} {approx} 11% on the bit error rate compatible with secure key distribution is determined by solving the transcendental equation H(Q{sub c})=C-bar({rho})/2, where {rho} is the density matrix of the input ensemble, C-bar({rho}) is the classical capacity of a noiseless quantum channel, and H(Q) is the capacity of a classical binary symmetric channel with error rate Q.

  8. Multi-party Measurement-Device-Independent Quantum Key Distribution Based on Cluster States

    NASA Astrophysics Data System (ADS)

    Liu, Chuanqi; Zhu, Changhua; Ma, Shuquan; Pei, Changxing

    2018-03-01

    We propose a novel multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on cluster states. A four-photon analyzer which can distinguish all the 16 cluster states serves as the measurement device for four-party MDI-QKD. Any two out of four participants can build secure keys after the analyzers obtains successful outputs and the two participants perform post-processing. We derive a security analysis for the protocol, and analyze the key rates under different values of polarization misalignment. The results show that four-party MDI-QKD is feasible over 280 km in the optical fiber channel when the key rate is about 10- 6 with the polarization misalignment parameter 0.015. Moreover, our work takes an important step toward a quantum communication network.

  9. Quantum non demolition measurement of cyclotron excitations in a Penning trap

    NASA Technical Reports Server (NTRS)

    Marzoli, Irene; Tombesi, Paolo

    1993-01-01

    The quantum non-demolition measurement of the cyclotron excitations of an electron confined in a Penning trap could be obtained by measuring the resonance frequency of the axial motion, which is coupled to the cyclotron motion through the relativistic shift of the electron mass.

  10. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  11. Quantum-enhanced spectroscopy with entangled multiphoton states

    NASA Astrophysics Data System (ADS)

    Dinani, Hossein T.; Gupta, Manish K.; Dowling, Jonathan P.; Berry, Dominic W.

    2016-06-01

    Traditionally, spectroscopy is performed by examining the position of absorption lines. However, at frequencies near the transition frequency, additional information can be obtained from the phase shift. In this work we consider the information about the transition frequency obtained from both the absorption and the phase shift, as quantified by the Fisher information in an interferometric measurement. We examine the use of multiple single-photon states, NOON states, and numerically optimized states that are entangled and have multiple photons. We find the optimized states that improve over the standard quantum limit set by independent single photons for some atom number densities.

  12. Quantum Dots and Their Multimodal Applications: A Review

    PubMed Central

    Bera, Debasis; Qian, Lei; Tseng, Teng-Kuan; Holloway, Paul H.

    2010-01-01

    Semiconducting quantum dots, whose particle sizes are in the nanometer range, have very unusual properties. The quantum dots have band gaps that depend in a complicated fashion upon a number of factors, described in the article. Processing-structure-properties-performance relationships are reviewed for compound semiconducting quantum dots. Various methods for synthesizing these quantum dots are discussed, as well as their resulting properties. Quantum states and confinement of their excitons may shift their optical absorption and emission energies. Such effects are important for tuning their luminescence stimulated by photons (photoluminescence) or electric field (electroluminescence). In this article, decoupling of quantum effects on excitation and emission are described, along with the use of quantum dots as sensitizers in phosphors. In addition, we reviewed the multimodal applications of quantum dots, including in electroluminescence device, solar cell and biological imaging.

  13. Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Horoshko, D B

    2007-12-31

    The quantum key distribution protocol BB84 combined with the repetition protocol for error correction is analysed from the point of view of its security against individual eavesdropping relying on quantum memory. It is shown that the mere knowledge of the error-correcting protocol changes the optimal attack and provides the eavesdropper with additional information on the distributed key. (fifth seminar in memory of d.n. klyshko)

  14. Single-photon superradiance and cooperative Lamb shift in an optoelectronic device (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Sirtori, Carlo

    2017-02-01

    Superradiance is one of the many fascinating phenomena predicted by quantum electrodynamics that have first been experimentally demonstrated in atomic systems and more recently in condensed matter systems like quantum dots, superconducting q-bits, cyclotron transitions and plasma oscillations in quantum wells (QWs). It occurs when a dense collection of N identical two-level emitters are phased via the exchange of photons, giving rise to enhanced light-matter interaction, hence to a faster emission rate. Of great interest is the regime where the ensemble interacts with one photon only and therefore all of the atoms, but one, are in the ground state. In this case the quantum superposition of all possible configurations produces a symmetric state that decays radiatively with a rate N times larger than that of the individual oscillators. This phenomenon, called single photon superradiance, results from the exchange of real photons among the N emitters. Yet, to single photon superradiance is also associated another collective effect that renormalizes the emission frequency, known as cooperative Lamb shift. In this work, we show that single photon superradiance and cooperative Lamb shift can be engineered in a semiconductor device by coupling spatially separated plasma resonances arising from the collective motion of confined electrons in QWs. These resonances hold a giant dipole along the growth direction z and have no mutual Coulomb coupling. They thus behave as a collection of macro-atoms on different positions along the z axis. Our device is therefore a test bench to simulate the low excitation regime of quantum electrodynamics.

  15. Scheme for efficient extraction of low-frequency signal beyond the quantum limit by frequency-shift detection.

    PubMed

    Yang, R G; Zhang, J; Zhai, Z H; Zhai, S Q; Liu, K; Gao, J R

    2015-08-10

    Low-frequency (Hz~kHz) squeezing is very important in many schemes of quantum precision measurement. But it is more difficult than that at megahertz-frequency because of the introduction of laser low-frequency technical noise. In this paper, we propose a scheme to obtain a low-frequency signal beyond the quantum limit from the frequency comb in a non-degenerate frequency and degenerate polarization optical parametric amplifier (NOPA) operating below threshold with type I phase matching by frequency-shift detection. Low-frequency squeezing immune to laser technical noise is obtained by a detection system with a local beam of two-frequency intense laser. Furthermore, the low-frequency squeezing can be used for phase measurement in Mach-Zehnder interferometer, and the signal-to-noise ratio (SNR) can be enhanced greatly.

  16. Quantum Field Theory in (0 + 1) Dimensions

    ERIC Educational Resources Information Center

    Boozer, A. D.

    2007-01-01

    We show that many of the key ideas of quantum field theory can be illustrated simply and straightforwardly by using toy models in (0 + 1) dimensions. Because quantum field theory in (0 + 1) dimensions is equivalent to quantum mechanics, these models allow us to use techniques from quantum mechanics to gain insight into quantum field theory. In…

  17. Daylight operation of a free space, entanglement-based quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Peloso, Matthew P.; Gerhardt, Ilja; Ho, Caleb; Lamas-Linares, Antía; Kurtsiefer, Christian

    2009-04-01

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from the background light. Here, we present a lean entanglement-based QKD system overcoming that limitation. By implementing spectral, spatial and temporal filtering techniques, we establish a secure key continuously over several days under varying light and weather conditions.

  18. Key rate for calibration robust entanglement based BB84 quantum key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gittsovich, O.; Moroder, T.

    2014-12-04

    We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed.

  19. Bound entangled states with a private key and their classical counterpart.

    PubMed

    Ozols, Maris; Smith, Graeme; Smolin, John A

    2014-03-21

    Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.

  20. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    NASA Astrophysics Data System (ADS)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  1. Quantum simulator review

    NASA Astrophysics Data System (ADS)

    Bednar, Earl; Drager, Steven L.

    2007-04-01

    Quantum information processing's objective is to utilize revolutionary computing capability based on harnessing the paradigm shift offered by quantum computing to solve classically hard and computationally challenging problems. Some of our computationally challenging problems of interest include: the capability for rapid image processing, rapid optimization of logistics, protecting information, secure distributed simulation, and massively parallel computation. Currently, one important problem with quantum information processing is that the implementation of quantum computers is difficult to realize due to poor scalability and great presence of errors. Therefore, we have supported the development of Quantum eXpress and QuIDD Pro, two quantum computer simulators running on classical computers for the development and testing of new quantum algorithms and processes. This paper examines the different methods used by these two quantum computing simulators. It reviews both simulators, highlighting each simulators background, interface, and special features. It also demonstrates the implementation of current quantum algorithms on each simulator. It concludes with summary comments on both simulators.

  2. Quantum fluctuations of a fullerene cage modulate its internal magnetic environment.

    PubMed

    Kawatsu, Tsutomu; Tachikawa, Masanori

    2018-01-17

    To investigate the effect of quantum fluctuations on the magnetic environment inside a C 60 fullerene cage, we have calculated the nuclear magnetic shielding constant of protons in H 2 @C 60 and HD@C 60 systems by on-the-fly ab initio path integral simulation, including both thermal and nuclear quantum effects. The most dominant upfield from an isolated hydrogen molecule occurs due to the diamagnetic current of the C 60 cage, which is partly cancelled by the paramagnetic current, where the paramagnetic contribution is enlarged by the zero-point vibrational fluctuation of the C 60 carbon backbone structure via a widely distributed HOMO-LUMO gap. This quantum modulation mechanism of the nuclear magnetic shielding constant is newly proposed. Because this quantum effect is independent of the difference between H 2 and HD, the H 2 /HD isotope shift occurs in spite of the C 60 cage. The nuclear magnetic constants computed for H 2 @C 60 and HD@C 60 are 32.047 and 32.081 ppm, respectively, which are in reasonable agreement with the corresponding values of 32.19 and 32.23 ppm estimated from the experimental values of the chemical shifts.

  3. Long-wavelength shift and enhanced room temperature photoluminescence efficiency in GaAsSb/InGaAs/GaAs-based heterostructures emitting in the spectral range of 1.0–1.2 μm due to increased charge carrier's localization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kryzhkov, D. I., E-mail: krizh@ipmras.ru; Yablonsky, A. N.; Morozov, S. V.

    2014-11-28

    In this work, a study of the photoluminescence (PL) temperature dependence in quantum well GaAs/GaAsSb and double quantum well InGaAs/GaAsSb/GaAs heterostructures grown by metalorganic chemical vapor deposition with different parameters of GaAsSb and InGaAs layers has been performed. It has been demonstrated that in double quantum well InGaAs/GaAsSb/GaAs heterostructures, a significant shift of the PL peak to a longer-wavelength region (up to 1.2 μm) and a considerable reduction in the PL thermal quenching in comparison with GaAs/GaAsSb structures can be obtained due to better localization of charge carriers in the double quantum well. For InGaAs/GaAsSb/GaAs heterostructures, an additional channel of radiativemore » recombination with participation of the excited energy states in the quantum well, competing with the main ground-state radiative transition, has been revealed.« less

  4. Experimental Satellite Quantum Communications

    NASA Astrophysics Data System (ADS)

    Vallone, Giuseppe; Bacco, Davide; Dequal, Daniele; Gaiarin, Simone; Luceri, Vincenza; Bianco, Giuseppe; Villoresi, Paolo

    2015-07-01

    Quantum communication (QC), namely, the faithful transmission of generic quantum states, is a key ingredient of quantum information science. Here we demonstrate QC with polarization encoding from space to ground by exploiting satellite corner cube retroreflectors as quantum transmitters in orbit and the Matera Laser Ranging Observatory of the Italian Space Agency in Matera, Italy, as a quantum receiver. The quantum bit error ratio (QBER) has been kept steadily low to a level suitable for several quantum information protocols, as the violation of Bell inequalities or quantum key distribution (QKD). Indeed, by taking data from different satellites, we demonstrate an average value of QBER =4.6 % for a total link duration of 85 s. The mean photon number per pulse μsat leaving the satellites was estimated to be of the order of one. In addition, we propose a fully operational satellite QKD system by exploiting our communication scheme with orbiting retroreflectors equipped with a modulator, a very compact payload. Our scheme paves the way toward the implementation of a QC worldwide network leveraging existing receivers.

  5. Optically induced excitonic electroabsorption in a periodically delta-doped InGaAs/GaAs multiple quantum well structure

    NASA Technical Reports Server (NTRS)

    Larsson, A.; Maserjian, J.

    1991-01-01

    Large optically induced Stark shifts have been observed in a periodically delta-doped InGaAs/GaAs multiple quantum well structure. With an excitation intensity of 10 mW/sq cm, an absolute quantum well absorption change of 7000/cm was measured with a corresponding differential absorption change as high as 80 percent. The associated maximum change in the quantum well refractive index is 0.04. This material is promising for device development for all-optical computing and signal processing.

  6. Nanodiamonds with photostable, sub-gigahertz linewidth quantum emitters

    NASA Astrophysics Data System (ADS)

    Tran, Toan Trong; Kianinia, Mehran; Bray, Kerem; Kim, Sejeong; Xu, Zai-Quan; Gentle, Angus; Sontheimer, Bernd; Bradac, Carlo; Aharonovich, Igor

    2017-11-01

    Single-photon emitters with narrow linewidths are highly sought after for applications in quantum information processing and quantum communications. In this letter, we report on a bright, highly polarized near infrared single photon emitter embedded in diamond nanocrystals with a narrow, sub-GHz optical linewidth at 10 K. The observed zero-phonon line at ˜780 nm is optically stable under low power excitation and blue shifts as the excitation power increases. Our results highlight the prospect for using new near infrared color centers in nanodiamonds for quantum applications.

  7. Pre-Service Physics Teachers' Comprehension of Quantum Mechanical Concepts

    ERIC Educational Resources Information Center

    Didis, Nilufer; Eryilmaz, Ali; Erkoc, Sakir

    2010-01-01

    When quantum theory caused a paradigm shift in physics, it introduced difficulties in both learning and teaching of physics. Because of its abstract, counter-intuitive and mathematical structure, students have difficulty in learning this theory, and instructors have difficulty in teaching the concepts of the theory. This case study investigates…

  8. Quantum hacking on quantum key distribution using homodyne detection

    NASA Astrophysics Data System (ADS)

    Huang, Jing-Zheng; Kunz-Jacques, Sébastien; Jouguet, Paul; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2014-03-01

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  9. Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

    PubMed

    Gerhardt, Ilja; Liu, Qin; Lamas-Linares, Antía; Skaar, Johannes; Kurtsiefer, Christian; Makarov, Vadim

    2011-06-14

    Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire 'secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

  10. Authenticated Quantum Key Distribution with Collective Detection using Single Photons

    NASA Astrophysics Data System (ADS)

    Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue

    2016-10-01

    We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.

  11. Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network

    NASA Astrophysics Data System (ADS)

    Tang, Yan-Lin; Yin, Hua-Lei; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Huang, Ming-Qi; Zhang, Wei-Jun; Chen, Si-Jing; Zhang, Lu; You, Li-Xing; Wang, Zhen; Liu, Yang; Lu, Chao-Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Chen, Teng-Yun; Pan, Jian-Wei

    2016-01-01

    Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD) network in a star topology over a 200-square-kilometer metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate 10 times larger than previous results. Our results demonstrate that the MDIQKD network, combining the best of both worlds—security and practicality, constitutes an appealing solution to secure metropolitan communications.

  12. Hacking commercial quantum cryptography systems by tailored bright illumination

    NASA Astrophysics Data System (ADS)

    Lydersen, Lars; Wiechers, Carlos; Wittmann, Christoffer; Elser, Dominique; Skaar, Johannes; Makarov, Vadim

    2010-10-01

    The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD systems can be fully remote-controlled using specially tailored bright illumination. This makes it possible to tracelessly acquire the full secret key; we propose an eavesdropping apparatus built from off-the-shelf components. The loophole is likely to be present in most QKD systems using avalanche photodiodes to detect single photons. We believe that our findings are crucial for strengthening the security of practical QKD, by identifying and patching technological deficiencies.

  13. Building a model of the blue cone pigment based on the wild type rhodopsin structure with QM/MM methods.

    PubMed

    Frähmcke, Jan S; Wanko, Marius; Elstner, Marcus

    2012-03-15

    Understanding the mechanism of color tuning of the retinal chromophore by its host protein became one of the key issues in the research on rhodopsins. While early mutation studies addressed its genetic origin, recent studies advanced to investigate its structural origin, based on X-ray crystallographic structures. For the human cone pigments, no crystal structures have been produced, and homology models were employed to elucidate the origin of its blue-shifted absorption. In this theoretical study, we take a different route to establish a structural model for human blue. Starting from the well-resolved structure of bovine rhodopsin, we derive multiple mutant models by stepwise mutation and equilibration using molecular dynamics simulations in a hybrid quantum mechanics/molecular mechanics framework. Our 30fold mutant reproduces the experimental UV-vis absorption shift of 0.45 eV and provides new insights about both structural and genetic factors that affect the excitation energy. Electrostatic effects of individual amino acids and collaborative structural effects are analyzed using semiempirical (OM2/MRCI) and ab initio (SORCI) multireference approaches. © 2012 American Chemical Society

  14. Quantum tagging for tags containing secret classical data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kent, Adrian

    Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finitemore » key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.« less

  15. Post-processing procedure for industrial quantum key distribution systems

    NASA Astrophysics Data System (ADS)

    Kiktenko, Evgeny; Trushechkin, Anton; Kurochkin, Yury; Fedorov, Aleksey

    2016-08-01

    We present algorithmic solutions aimed on post-processing procedure for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of classical public communication channel is also considered.

  16. Experimental Implementation of a Quantum Optical State Comparison Amplifier

    NASA Astrophysics Data System (ADS)

    Donaldson, Ross J.; Collins, Robert J.; Eleftheriadou, Electra; Barnett, Stephen M.; Jeffers, John; Buller, Gerald S.

    2015-03-01

    We present an experimental demonstration of a practical nondeterministic quantum optical amplification scheme that employs two mature technologies, state comparison and photon subtraction, to achieve amplification of known sets of coherent states with high fidelity. The amplifier uses coherent states as a resource rather than single photons, which allows for a relatively simple light source, such as a diode laser, providing an increased rate of amplification. The amplifier is not restricted to low amplitude states. With respect to the two key parameters, fidelity and the amplified state production rate, we demonstrate significant improvements over previous experimental implementations, without the requirement of complex photonic components. Such a system may form the basis of trusted quantum repeaters in nonentanglement-based quantum communications systems with known phase alphabets, such as quantum key distribution or quantum digital signatures.

  17. Active polarisation control of a quantum cascade laser using tuneable birefringence in waveguides.

    PubMed

    Dhirhe, D; Slight, T J; Holmes, B M; Ironside, C N

    2013-10-07

    We discuss the design, modelling, fabrication and characterisation of an integrated tuneable birefringent waveguide for quantum cascade lasers. We have fabricated quantum cascade lasers operating at wavelengths around 4450 nm that include polarisation mode converters and a differential phase shift section. We employed below laser threshold electroluminescence to investigate the single pass operation of the integrated device. We use a theory based on the electro-optic properties of birefringence in quantum cascade laser waveguides combined with a Jones matrix based description to gain an understanding of the electroluminescence results. With the quantum cascade lasers operating above threshold we demonstrated polarisation control of the output.

  18. Extended analysis of the Trojan-horse attack in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Vinay, Scott E.; Kok, Pieter

    2018-04-01

    The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.

  19. Experimental Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-01

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  20. Measurement-Device-Independent Quantum Key Distribution over 200 km

    NASA Astrophysics Data System (ADS)

    Tang, Yan-Lin; Yin, Hua-Lei; Chen, Si-Jing; Liu, Yang; Zhang, Wei-Jun; Jiang, Xiao; Zhang, Lu; Wang, Jian; You, Li-Xing; Guan, Jian-Yu; Yang, Dong-Xu; Wang, Zhen; Liang, Hao; Zhang, Zhen; Zhou, Nan; Ma, Xiongfeng; Chen, Teng-Yun; Zhang, Qiang; Pan, Jian-Wei

    2014-11-01

    Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1 bit /s . Here, by developing a 75 MHz clock rate fully automatic and highly stable system and superconducting nanowire single-photon detectors with detection efficiencies of more than 40%, we extend the secure transmission distance of MDIQKD to 200 km and achieve a secure key rate 3 orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.

  1. Experimental measurement-device-independent quantum key distribution.

    PubMed

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-27

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  2. Calculation of key reduction for B92 QKD protocol

    NASA Astrophysics Data System (ADS)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  3. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  4. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  5. Hacking on decoy-state quantum key distribution system with partial phase randomization

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  6. All about Eve: Secret Sharing using Quantum Effects

    NASA Technical Reports Server (NTRS)

    Jackson, Deborah J.

    2005-01-01

    This document discusses the nature of light (including classical light and photons), encryption, quantum key distribution (QKD), light polarization and beamsplitters and their application to information communication. A quantum of light represents the smallest possible subdivision of radiant energy (light) and is called a photon. The QKD key generation sequence is outlined including the receiver broadcasting the initial signal indicating reception availability, timing pulses from the sender to provide reference for gated detection of photons, the sender generating photons through random polarization while the receiver detects photons with random polarization and communicating via data link to mutually establish random keys. The QKD network vision includes inter-SATCOM, point-to-point Gnd Fiber and SATCOM-fiber nodes. QKD offers an unconditionally secure method of exchanging encryption keys. Ongoing research will focus on how to increase the key generation rate.

  7. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    PubMed

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  8. Entropy uncertainty relations and stability of phase-temporal quantum cryptography with finite-length transmitted strings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com

    2012-12-15

    Any key-generation session contains a finite number of quantum-state messages, and it is there-fore important to understand the fundamental restrictions imposed on the minimal length of a string required to obtain a secret key with a specified length. The entropy uncertainty relations for smooth min and max entropies considerably simplify and shorten the proof of security. A proof of security of quantum key distribution with phase-temporal encryption is presented. This protocol provides the maximum critical error compared to other protocols up to which secure key distribution is guaranteed. In addition, unlike other basic protocols (of the BB84 type), which aremore » vulnerable with respect to an attack by 'blinding' of avalanche photodetectors, this protocol is stable with respect to such an attack and guarantees key security.« less

  9. The effects of a geometrical size, external electric fields and impurity on the optical gain of a quantum dot laser with a semi-parabolic spherical well potential

    NASA Astrophysics Data System (ADS)

    Owji, Erfan; Keshavarz, Alireza; Mokhtari, Hosein

    2017-03-01

    In this paper, a GaAs / Alx Ga1-x As quantum dot laser with a semi-parabolic spherical well potential is assumed. By using Runge-Kutta method the eigenenergies and the eigenstates of valence and conduct bands are obtained. The effects of geometrical sizes, external electric fields and hydrogen impurity on the different electronic transitions of the optical gain are studied. The results show that the optical gain peak increases and red-shifts, by increasing the width of well or barrier, while more increasing of the width causes blue-shift and decreases it. The hydrogen impurity decreases the optical gain peak and blue-shifts it. Also, the increasing of the external electric fields cause to increase the peak of the optical gain, and (blue) red shift it. Finally, the optical gain for 1s-1s and 2s-1s transitions is prominent, while it is so weak for other transitions.

  10. Graphene Quantum Dot Layers with Energy-Down-Shift Effect on Crystalline-Silicon Solar Cells.

    PubMed

    Lee, Kyung D; Park, Myung J; Kim, Do-Yeon; Kim, Soo M; Kang, Byungjun; Kim, Seongtak; Kim, Hyunho; Lee, Hae-Seok; Kang, Yoonmook; Yoon, Sam S; Hong, Byung H; Kim, Donghwan

    2015-09-02

    Graphene quantum dot (GQD) layers were deposited as an energy-down-shift layer on crystalline-silicon solar cell surfaces by kinetic spraying of GQD suspensions. A supersonic air jet was used to accelerate the GQDs onto the surfaces. Here, we report the coating results on a silicon substrate and the GQDs' application as an energy-down-shift layer in crystalline-silicon solar cells, which enhanced the power conversion efficiency (PCE). GQD layers deposited at nozzle scan speeds of 40, 30, 20, and 10 mm/s were evaluated after they were used to fabricate crystalline-silicon solar cells; the results indicate that GQDs play an important role in increasing the optical absorptivity of the cells. The short-circuit current density was enhanced by about 2.94% (0.9 mA/cm(2)) at 30 mm/s. Compared to a reference device without a GQD energy-down-shift layer, the PCE of p-type silicon solar cells was improved by 2.7% (0.4 percentage points).

  11. Security of a discretely signaled continuous variable quantum key distribution protocol for high rate systems.

    PubMed

    Zhang, Zheshen; Voss, Paul L

    2009-07-06

    We propose a continuous variable based quantum key distribution protocol that makes use of discretely signaled coherent light and reverse error reconciliation. We present a rigorous security proof against collective attacks with realistic lossy, noisy quantum channels, imperfect detector efficiency, and detector electronic noise. This protocol is promising for convenient, high-speed operation at link distances up to 50 km with the use of post-selection.

  12. Diamond-based single-photon emitters

    NASA Astrophysics Data System (ADS)

    Aharonovich, I.; Castelletto, S.; Simpson, D. A.; Su, C.-H.; Greentree, A. D.; Prawer, S.

    2011-07-01

    The exploitation of emerging quantum technologies requires efficient fabrication of key building blocks. Sources of single photons are extremely important across many applications as they can serve as vectors for quantum information—thereby allowing long-range (perhaps even global-scale) quantum states to be made and manipulated for tasks such as quantum communication or distributed quantum computation. At the single-emitter level, quantum sources also afford new possibilities in terms of nanoscopy and bio-marking. Color centers in diamond are prominent candidates to generate and manipulate quantum states of light, as they are a photostable solid-state source of single photons at room temperature. In this review, we discuss the state of the art of diamond-based single-photon emitters and highlight their fabrication methodologies. We present the experimental techniques used to characterize the quantum emitters and discuss their photophysical properties. We outline a number of applications including quantum key distribution, bio-marking and sub-diffraction imaging, where diamond-based single emitters are playing a crucial role. We conclude with a discussion of the main challenges and perspectives for employing diamond emitters in quantum information processing.

  13. Programmable multi-node quantum network design and simulation

    NASA Astrophysics Data System (ADS)

    Dasari, Venkat R.; Sadlier, Ronald J.; Prout, Ryan; Williams, Brian P.; Humble, Travis S.

    2016-05-01

    Software-defined networking offers a device-agnostic programmable framework to encode new network functions. Externally centralized control plane intelligence allows programmers to write network applications and to build functional network designs. OpenFlow is a key protocol widely adopted to build programmable networks because of its programmability, flexibility and ability to interconnect heterogeneous network devices. We simulate the functional topology of a multi-node quantum network that uses programmable network principles to manage quantum metadata for protocols such as teleportation, superdense coding, and quantum key distribution. We first show how the OpenFlow protocol can manage the quantum metadata needed to control the quantum channel. We then use numerical simulation to demonstrate robust programmability of a quantum switch via the OpenFlow network controller while executing an application of superdense coding. We describe the software framework implemented to carry out these simulations and we discuss near-term efforts to realize these applications.

  14. Squeezed-state quantum key distribution with a Rindler observer

    NASA Astrophysics Data System (ADS)

    Zhou, Jian; Shi, Ronghua; Guo, Ying

    2018-03-01

    Lengthening the maximum transmission distance of quantum key distribution plays a vital role in quantum information processing. In this paper, we propose a directional squeezed-state protocol with signals detected by a Rindler observer in the relativistic quantum field framework. We derive an analytical solution to the transmission problem of squeezed states from the inertial sender to the accelerated receiver. The variance of the involved signal mode is closer to optimality than that of the coherent-state-based protocol. Simulation results show that the proposed protocol has better performance than the coherent-state counterpart especially in terms of the maximal transmission distance.

  15. The Pursuit of Quantum Gravity

    NASA Astrophysics Data System (ADS)

    Dewitt-Morette, Cecile

    2012-03-01

    Why is it so difficult to make a Quantum Theory of Gravitation? What is the key idea of quantum physics? What is the key idea of Einstein theory of gravitation? I have selected three (simple) problems that can be solved and are relevant to these issues: 1. The nonanalyticity of semi classical approximations (or the sex life of the male moth) 2. The Pin Group (or the implication of the quantum phase in particle physics) 3. Spacetime is Space x Time (or the deflection of light by the Sun) Conclusion: La joie de l'ame est dans l'action Lyautey (or astronomical observations)

  16. Uncertainty relations with quantum memory for the Wehrl entropy

    NASA Astrophysics Data System (ADS)

    De Palma, Giacomo

    2018-03-01

    We prove two new fundamental uncertainty relations with quantum memory for the Wehrl entropy. The first relation applies to the bipartite memory scenario. It determines the minimum conditional Wehrl entropy among all the quantum states with a given conditional von Neumann entropy and proves that this minimum is asymptotically achieved by a suitable sequence of quantum Gaussian states. The second relation applies to the tripartite memory scenario. It determines the minimum of the sum of the Wehrl entropy of a quantum state conditioned on the first memory quantum system with the Wehrl entropy of the same state conditioned on the second memory quantum system and proves that also this minimum is asymptotically achieved by a suitable sequence of quantum Gaussian states. The Wehrl entropy of a quantum state is the Shannon differential entropy of the outcome of a heterodyne measurement performed on the state. The heterodyne measurement is one of the main measurements in quantum optics and lies at the basis of one of the most promising protocols for quantum key distribution. These fundamental entropic uncertainty relations will be a valuable tool in quantum information and will, for example, find application in security proofs of quantum key distribution protocols in the asymptotic regime and in entanglement witnessing in quantum optics.

  17. Temperature-Dependent Energy Gap Shift and Thermally Activated Transition in Multilayer CdTe/ZnTe Quantum Dots.

    PubMed

    Man, Minh Tan; Lee, Hong Seok

    2015-10-01

    We investigated the influence of growth conditions on carrier dynamics in multilayer CdTe/ZnTe quantum dots (QDs) by monitoring the temperature dependence of the photoluminescence emission energy. The results were analyzed using the empirical Varshni and O'Donnell relations for temperature variation of the energy gap shift. Best fit values showed that the thermally activated transition between two different states occurs due to band low-temperature quenching with values separated by 5.0-6.5 meV. The addition of stack periods in multilayer CdTe/ZnTe QDs plays an important role in the energy gap shift, where the exciton binding energy is enhanced, and, conversely, the exciton-phonon coupling strength is suppressed with an average energy of 19.3-19.8 meV.

  18. Single-ion quantum lock-in amplifier.

    PubMed

    Kotler, Shlomi; Akerman, Nitzan; Glickman, Yinnon; Keselman, Anna; Ozeri, Roee

    2011-05-05

    Quantum metrology uses tools from quantum information science to improve measurement signal-to-noise ratios. The challenge is to increase sensitivity while reducing susceptibility to noise, tasks that are often in conflict. Lock-in measurement is a detection scheme designed to overcome this difficulty by spectrally separating signal from noise. Here we report on the implementation of a quantum analogue to the classical lock-in amplifier. All the lock-in operations--modulation, detection and mixing--are performed through the application of non-commuting quantum operators to the electronic spin state of a single, trapped Sr(+) ion. We significantly increase its sensitivity to external fields while extending phase coherence by three orders of magnitude, to more than one second. Using this technique, we measure frequency shifts with a sensitivity of 0.42 Hz Hz(-1/2) (corresponding to a magnetic field measurement sensitivity of 15 pT Hz(-1/2)), obtaining an uncertainty of less than 10 mHz (350 fT) after 3,720 seconds of averaging. These sensitivities are limited by quantum projection noise and improve on other single-spin probe technologies by two orders of magnitude. Our reported sensitivity is sufficient for the measurement of parity non-conservation, as well as the detection of the magnetic field of a single electronic spin one micrometre from an ion detector with nanometre resolution. As a first application, we perform light shift spectroscopy of a narrow optical quadrupole transition. Finally, we emphasize that the quantum lock-in technique is generic and can potentially enhance the sensitivity of any quantum sensor. ©2011 Macmillan Publishers Limited. All rights reserved

  19. Coulomb coupling effects in the gigahertz complex admittance of a quantum R–L circuit

    NASA Astrophysics Data System (ADS)

    Song, L.; Yin, J. Z.; Chen, S. W.

    2018-05-01

    We report on the gigahertz admittance measurements of a quantum conductor, i.e. a quantum R–L circuit, to probe the intrinsic dynamic of the conductor. The magnetic field dependence of the admittance phase provides us with an effective way to study the role of Coulomb interaction between counterpropagating edge channels. In addition, there is a small jump in the admittance phase when the transmitted modes are changed. This is because the gate voltage leads to a static potential shift of the quantum channel, then a quantum capacitance related to the density of states of the edge channels are influenced. Our study has made new discoveries of the dynamic transport in a quantum conductor, finding evidence for the deviations from quantum chiral transport associated with Coulomb interactions.

  20. Quantum key distribution over 120 km using ultrahigh purity single-photon source and superconducting single-photon detectors.

    PubMed

    Takemoto, Kazuya; Nambu, Yoshihiro; Miyazawa, Toshiyuki; Sakuma, Yoshiki; Yamamoto, Tsuyoshi; Yorozu, Shinichi; Arakawa, Yasuhiko

    2015-09-25

    Advances in single-photon sources (SPSs) and single-photon detectors (SPDs) promise unique applications in the field of quantum information technology. In this paper, we report long-distance quantum key distribution (QKD) by using state-of-the-art devices: a quantum-dot SPS (QD SPS) emitting a photon in the telecom band of 1.5 μm and a superconducting nanowire SPD (SNSPD). At the distance of 100 km, we obtained the maximal secure key rate of 27.6 bps without using decoy states, which is at least threefold larger than the rate obtained in the previously reported 50-km-long QKD experiment. We also succeeded in transmitting secure keys at the rate of 0.307 bps over 120 km. This is the longest QKD distance yet reported by using known true SPSs. The ultralow multiphoton emissions of our SPS and ultralow dark count of the SNSPD contributed to this result. The experimental results demonstrate the potential applicability of QD SPSs to practical telecom QKD networks.

  1. Superlinear threshold detectors in quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lydersen, Lars; Maroey, Oystein; Skaar, Johannes

    2011-09-15

    We introduce the concept of a superlinear threshold detector, a detector that has a higher probability to detect multiple photons if it receives them simultaneously rather than at separate times. Highly superlinear threshold detectors in quantum key distribution systems allow eavesdropping the full secret key without being revealed. Here, we generalize the detector control attack, and analyze how it performs against quantum key distribution systems with moderately superlinear detectors. We quantify the superlinearity in superconducting single-photon detectors based on earlier published data, and gated avalanche photodiode detectors based on our own measurements. The analysis shows that quantum key distribution systemsmore » using detector(s) of either type can be vulnerable to eavesdropping. The avalanche photodiode detector becomes superlinear toward the end of the gate. For systems expecting substantial loss, or for systems not monitoring loss, this would allow eavesdropping using trigger pulses containing less than 120 photons per pulse. Such an attack would be virtually impossible to catch with an optical power meter at the receiver entrance.« less

  2. Revisiting the quantum Szilard engine with fully quantum considerations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Hai; School of Information and Electronics Engineering, Shandong Institute of Business and Technology, Yantai 264000; Zou, Jian, E-mail: zoujian@bit.edu.cn

    2012-12-15

    By considering level shifting during the insertion process we revisit the quantum Szilard engine (QSZE) with fully quantum consideration. We derive the general expressions of the heat absorbed from thermal bath and the total work done to the environment by the system in a cycle with two different cyclic strategies. We find that only the quantum information contributes to the absorbed heat, and the classical information acts like a feedback controller and has no direct effect on the absorbed heat. This is the first demonstration of the different effects of quantum information and classical information for extracting heat from themore » bath in the QSZE. Moreover, when the well width L{yields}{infinity} or the temperature of the bath T{yields}{infinity} the QSZE reduces to the classical Szilard engine (CSZE), and the total work satisfies the relation W{sub tot}=k{sub B}Tln2 as obtained by Sang Wook Kim et al. [S.W. Kim, T. Sagawa, S. De Liberato, M. Ueda, Phys. Rev. Lett. 106 (2011) 070401] for one particle case. - Highlights: Black-Right-Pointing-Pointer For the first time analyze the QSZE by considering energy level shifts. Black-Right-Pointing-Pointer Find different roles played by classical and quantum information in the QSZE. Black-Right-Pointing-Pointer The amount of work extracted depends on the cyclic strategies of the QSZE. Black-Right-Pointing-Pointer Verify that the QSZE will reduce to the CSZE in the classical limits.« less

  3. Protein structure refinement using a quantum mechanics-based chemical shielding predictor.

    PubMed

    Bratholm, Lars A; Jensen, Jan H

    2017-03-01

    The accurate prediction of protein chemical shifts using a quantum mechanics (QM)-based method has been the subject of intense research for more than 20 years but so far empirical methods for chemical shift prediction have proven more accurate. In this paper we show that a QM-based predictor of a protein backbone and CB chemical shifts (ProCS15, PeerJ , 2016, 3, e1344) is of comparable accuracy to empirical chemical shift predictors after chemical shift-based structural refinement that removes small structural errors. We present a method by which quantum chemistry based predictions of isotropic chemical shielding values (ProCS15) can be used to refine protein structures using Markov Chain Monte Carlo (MCMC) simulations, relating the chemical shielding values to the experimental chemical shifts probabilistically. Two kinds of MCMC structural refinement simulations were performed using force field geometry optimized X-ray structures as starting points: simulated annealing of the starting structure and constant temperature MCMC simulation followed by simulated annealing of a representative ensemble structure. Annealing of the CHARMM structure changes the CA-RMSD by an average of 0.4 Å but lowers the chemical shift RMSD by 1.0 and 0.7 ppm for CA and N. Conformational averaging has a relatively small effect (0.1-0.2 ppm) on the overall agreement with carbon chemical shifts but lowers the error for nitrogen chemical shifts by 0.4 ppm. If an amino acid specific offset is included the ProCS15 predicted chemical shifts have RMSD values relative to experiments that are comparable to popular empirical chemical shift predictors. The annealed representative ensemble structures differ in CA-RMSD relative to the initial structures by an average of 2.0 Å, with >2.0 Å difference for six proteins. In four of the cases, the largest structural differences arise in structurally flexible regions of the protein as determined by NMR, and in the remaining two cases, the large structural change may be due to force field deficiencies. The overall accuracy of the empirical methods are slightly improved by annealing the CHARMM structure with ProCS15, which may suggest that the minor structural changes introduced by ProCS15-based annealing improves the accuracy of the protein structures. Having established that QM-based chemical shift prediction can deliver the same accuracy as empirical shift predictors we hope this can help increase the accuracy of related approaches such as QM/MM or linear scaling approaches or interpreting protein structural dynamics from QM-derived chemical shift.

  4. Making the decoy-state measurement-device-independent quantum key distribution practically useful

    NASA Astrophysics Data System (ADS)

    Zhou, Yi-Heng; Yu, Zong-Wen; Wang, Xiang-Bin

    2016-04-01

    The relatively low key rate seems to be the major barrier to its practical use for the decoy-state measurement-device-independent quantum key distribution (MDI-QKD). We present a four-intensity protocol for the decoy-state MDI-QKD that hugely raises the key rate, especially in the case in which the total data size is not large. Also, calculations show that our method makes it possible for secure private communication with fresh keys generated from MDI-QKD with a delay time of only a few seconds.

  5. Observability of localized magnetoplasmons in quantum dots: Scrutinizing the eligibility of far-infrared, Raman, and electron-energy-loss spectroscopies

    NASA Astrophysics Data System (ADS)

    Kushwaha, Manvir S.

    2016-03-01

    We investigate a one-component, quasi-zero dimensional, quantum plasma exposed to a parabolic potential and an applied magnetic field in the symmetric gauge. If the size of such a system as can be realized in the semiconducting quantum dots is on the order of the de-Broglie wavelength, the electronic and optical properties become highly tunable. Then the quantum size effects challenge the observation of many-particle phenomena such as the magneto-optical absorption, Raman intensity, and electron energy-loss spectrum. An exact analytical solution of the problem leads us to infer that these many-particle phenomena are, in fact, dictated by the generalized Kohn's theorem (GKT) in the long-wavelength limit. Maneuvering the confinement and/or the magnetic field furnishes the resonance energies capable of being explored with the FIR, Raman, and/or electron-energy-loss spectroscopy. This implies that either of these probes is competent in observing the localized magnetoplasmons in the system. As an application of the rigorous analytical diagnosis of the system, we have presented various pertinent single-particle, such as Fock-Darwin spectrum, Fermi energy, zigzag excitation spectrum, and magneto-optical transitions, and the many-particle phenomena, such as magneto-optical absorption, Raman intensity, and electron energy-loss probability. In the latter, the energy position of the resonance peaks is observed to be independent of the electron-electron interactions and hence of the number of electrons in the quantum dot in compliance with the GKT. It is found that both confinement potential and magnetic field play a decisive role in influencing the aforementioned many-particle phenomena. Specifically, increasing (decreasing) the strength of the confining potential is found to be analogous to shrinking (expanding) the size of the quantum dots and results into a blue (red) shift in the respective spectra. Intensifying the magnetic field has two-fold effects in the resonance spectra associated with all three spectroscopies considered here: the lower resonance peak observes a red shift, whereas the higher one experiences a blue shift. This is a unique and intriguing behavior observed in the quantum dots with complete confinement. A deeper insight into the physics of the quantum dots is paving the way for their implementation in such diverse fields as quantum computing and medical imaging.

  6. Quantum key distillation from Gaussian states by Gaussian operations.

    PubMed

    Navascués, M; Bae, J; Cirac, J I; Lewestein, M; Sanpera, A; Acín, A

    2005-01-14

    We study the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill a secret key secure against any attack from sufficiently entangled Gaussian states with nonpositive partial transposition. Moreover, all such states allow for key distillation, when Eve is assumed to perform finite-size coherent attacks before the reconciliation process.

  7. Relating quantum privacy and quantum coherence: an operational approach.

    PubMed

    Devetak, I; Winter, A

    2004-08-20

    Given many realizations of a state or a channel as a resource, two parties can generate a secret key as well as entanglement. We describe protocols to perform the secret key distillation (as it turns out, with optimal rate). Then we show how to achieve optimal entanglement generation rates by "coherent" implementation of a class of secret key agreement protocols, proving the long-conjectured "hashing inequality."

  8. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  9. Generating the Local Oscillator "Locally" in Continuous-Variable Quantum Key Distribution Based on Coherent Detection

    NASA Astrophysics Data System (ADS)

    Qi, Bing; Lougovski, Pavel; Pooser, Raphael; Grice, Warren; Bobrek, Miljko

    2015-10-01

    Continuous-variable quantum key distribution (CV-QKD) protocols based on coherent detection have been studied extensively in both theory and experiment. In all the existing implementations of CV-QKD, both the quantum signal and the local oscillator (LO) are generated from the same laser and propagate through the insecure quantum channel. This arrangement may open security loopholes and limit the potential applications of CV-QKD. In this paper, we propose and demonstrate a pilot-aided feedforward data recovery scheme that enables reliable coherent detection using a "locally" generated LO. Using two independent commercial laser sources and a spool of 25-km optical fiber, we construct a coherent communication system. The variance of the phase noise introduced by the proposed scheme is measured to be 0.04 (rad2 ), which is small enough to enable secure key distribution. This technology also opens the door for other quantum communication protocols, such as the recently proposed measurement-device-independent CV-QKD, where independent light sources are employed by different users.

  10. Combined Monte Carlo and quantum mechanics study of the solvatochromism of phenol in water. The origin of the blue shift of the lowest pi-pi* transition.

    PubMed

    Barreto, Rafael C; Coutinho, Kaline; Georg, Herbert C; Canuto, Sylvio

    2009-03-07

    A combined and sequential use of Monte Carlo simulations and quantum mechanical calculations is made to analyze the spectral shift of the lowest pi-pi* transition of phenol in water. The solute polarization is included using electrostatic embedded calculations at the MP2/aug-cc-pVDZ level giving a dipole moment of 2.25 D, corresponding to an increase of 76% compared to the calculated gas-phase value. Using statistically uncorrelated configurations sampled from the MC simulation, first-principle size-extensive calculations are performed to obtain the solvatochromic shift. Analysis is then made of the origin of the blue shift. Results both at the optimized geometry and in room-temperature liquid water show that hydrogen bonds of water with phenol promote a red shift when phenol is the proton-donor and a blue shift when phenol is the proton-acceptor. In the case of the optimized clusters the calculated shifts are in very good agreement with results obtained from mass-selected free jet expansion experiments. In the liquid case the contribution of the solute-solvent hydrogen bonds partially cancels and the total shift obtained is dominated by the contribution of the outer solvent water molecules. Our best result, including both inner and outer water molecules, is 570 +/- 35 cm(-1), in very good agreement with the small experimental shift of 460 cm(-1) for the absorption maximum.

  11. Unconditional security of entanglement-based continuous-variable quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Kogias, Ioannis; Xiang, Yu; He, Qiongyi; Adesso, Gerardo

    2017-01-01

    The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-independent approach to quantum key distribution. We demonstrate theoretically the feasibility of our scheme, which can be implemented by Gaussian states and homodyne measurements, with no need for ideal single-photon sources or quantum memories. Our results contribute to validating quantum secret sharing as a viable primitive for quantum technologies.

  12. Conceptual designs of onboard transceivers for ground-to-satellite quantum cryptography

    NASA Astrophysics Data System (ADS)

    Toyoshima, Morio; Shoji, Yozo; Takayama, Yoshihisa; Kunimori, Hiroo; Takeoka, Masahiro; Fujiwara, Mikio; Sasaki, Masahide

    2009-05-01

    A free-space quantum key distribution system is being developed by the National Institute of Information and Communications Technology (NICT) in Koganei, Japan. Quantum cryptography is a new technique for transmitting information where the security is guaranteed by the laws of physics. In such systems, a single photon is used for the quantum information. However, since the transmission distance in optical fibers is limited by the absorption of photons by the fiber, the maximum demonstrated range has been limited to about 100 km. Free-space quantum cryptography between an optical ground station and a satellite is a possible solution to extend the distance for a quantum network beyond the limits of optical fibers. At NICT, a laser communication demonstration between the NICT optical ground station and a low earth orbit satellite was successfully conducted in 2006. The use of free-space quantum key distribution for such space communication links is considered an important future application. This paper presents conceptual designs for the onboard transceivers for satellite quantum cryptography

  13. Optical quantum memory based on electromagnetically induced transparency

    PubMed Central

    Ma, Lijun; Slattery, Oliver

    2017-01-01

    Electromagnetically induced transparency (EIT) is a promising approach to implement quantum memory in quantum communication and quantum computing applications. In this paper, following a brief overview of the main approaches to quantum memory, we provide details of the physical principle and theory of quantum memory based specifically on EIT. We discuss the key technologies for implementing quantum memory based on EIT and review important milestones, from the first experimental demonstration to current applications in quantum information systems. PMID:28828172

  14. Optical quantum memory based on electromagnetically induced transparency.

    PubMed

    Ma, Lijun; Slattery, Oliver; Tang, Xiao

    2017-04-01

    Electromagnetically induced transparency (EIT) is a promising approach to implement quantum memory in quantum communication and quantum computing applications. In this paper, following a brief overview of the main approaches to quantum memory, we provide details of the physical principle and theory of quantum memory based specifically on EIT. We discuss the key technologies for implementing quantum memory based on EIT and review important milestones, from the first experimental demonstration to current applications in quantum information systems.

  15. The quantum defect: Early history and recent developments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rau, A.R.; Inokuti, M.

    1997-03-01

    The notion of the quantum defect is important in atomic and molecular spectroscopy and also in unifying spectroscopy with collision theory. In the latter context, the quantum defect may be viewed as an ancestor of the phase shift. However, the origin of the term {open_quotes}quantum defect{close_quotes} does not seem to be explained in standard textbooks. It occurred in a 1921 paper by Schr{umlt o}dinger, preceding quantum mechanics, yet giving the correct meaning as an index of the short-range interactions with the core of an atom. We present the early history of the quantum-defect idea, and sketch its recent developments. {copyright}more » {ital 1997 American Association of Physics Teachers.}« less

  16. Synthesis and Properties of Water-Soluble Blue-Emitting Mn-Alloyed CdTe Quantum Dots

    NASA Astrophysics Data System (ADS)

    Tynkevych, Olena; Karavan, Volodymyr; Vorona, Igor; Filonenko, Svitlana; Khalavka, Yuriy

    2018-05-01

    In this work, we prepared CdTe quantum dots, and series of Cd1-xMnxTe-alloyed quantum dots with narrow size distribution by an ion-exchange reaction in water solution. We found that the photoluminescence peaks are shifted to higher energies with the increasing Mn2+ content. So far, this is the first report of blue-emitting CdTe-based quantum dots. By means of cyclic voltammetry, we detected features of electrochemical activity of manganese energy levels formed inside the Cd1-xMnxTe-alloyed quantum dot band gap. This allowed us to estimate their energy position. We also demonstrate paramagnetic behavior for Cd1-xMnxTe-alloyed quantum dots which confirmed the successful ion-exchange reaction.

  17. Side-channel-free quantum key distribution.

    PubMed

    Braunstein, Samuel L; Pirandola, Stefano

    2012-03-30

    Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.

  18. Effects of electric field and light polarization on the electromagnetically induced transparency in an impurity doped quantum ring

    NASA Astrophysics Data System (ADS)

    Bejan, D.; Stan, C.; Niculescu, E. C.

    2018-01-01

    We theoretically investigated the effects of the impurity position, in-plane electric field, intensity and polarization of the probe and control lasers on the electromagnetically induced transparency (EIT) in GaAs/GaAlAs disc shaped quantum ring. Our study reveals that, depending on the impurity position, the quantum system presents two specific configurations for the EIT occurrence even in the absence of the external electric field, i.e. ladder-configuration or V-configuration, and changes the configuration from ladder to V for specific electric field values. The polarization of the probe and control lasers plays a crucial role in obtaining a good transparency. The electric field controls the red-shift (blue-shift) of the transparency window and modifies its width. The system exhibits birefringence for the probe light in a limited interval of electric field values.

  19. Casimir-Polder shifts on quantum levitation states

    NASA Astrophysics Data System (ADS)

    Crépin, P.-P.; Dufour, G.; Guérout, R.; Lambrecht, A.; Reynaud, S.

    2017-03-01

    An ultracold atom above a horizontal mirror experiences quantum reflection from the attractive Casimir-Polder interaction, which holds it against gravity and leads to quantum levitation states. We analyze this system by using a Liouville transformation of the Schrödinger equation and a Langer coordinate adapted to problems with a classical turning point. Reflection on the Casimir-Polder attractive well is replaced by reflection on a repulsive wall, and the problem is then viewed as an ultracold atom trapped inside a cavity with gravity and Casimir-Polder potentials acting, respectively, as top and bottom mirrors. We calculate numerically Casimir-Polder shifts of the energies of the cavity resonances and propose an approximate treatment which is precise enough to discuss spectroscopy experiments aimed at tests of the weak-equivalence principle on antihydrogen. We also discuss the lifetimes by calculating complex energies associated with cavity resonances.

  20. Comparative optical study of epitaxial InGaAs quantum rods grown with As{sub 2} and As{sub 4} sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nedzinskas, Ramūnas; Čechavičius, Bronislovas; Kavaliauskas, Julius

    2013-12-04

    Photoreflectance and photoluminescence (PL) spectroscopies are used to examine the optical properties and electronic structure of InGaAs quantum rods (QRs), embedded within InGaAs quantum well (QW). The nanostructures studied were grown by molecular beam epitaxy using As{sub 2} or As{sub 4} sources. The impact of As source on spectral features associated with interband optical transitions in the QRs and the surrounding QW are demonstrated. A red shift of the QR- and a blue shift of the QW-related optical transitions, along with a significant increase in PL intensity, have been observed if an As{sub 4} source is used. The changes inmore » optical properties are attributed mainly to carrier confinement effects caused by variation of In content contrast between the QR material and the surrounding well.« less

Top