1,796 research outputs found

    Reconciliation of a Quantum-Distributed Gaussian Key

    Full text link
    Two parties, Alice and Bob, wish to distill a binary secret key out of a list of correlated variables that they share after running a quantum key distribution protocol based on continuous-spectrum quantum carriers. We present a novel construction that allows the legitimate parties to get equal bit strings out of correlated variables by using a classical channel, with as few leaked information as possible. This opens the way to securely correcting non-binary key elements. In particular, the construction is refined to the case of Gaussian variables as it applies directly to recent continuous-variable protocols for quantum key distribution.Comment: 8 pages, 4 figures. Submitted to the IEEE for possible publication. Revised version to improve its clarit

    Cloning and Cryptography with Quantum Continuous Variables

    Get PDF
    The cloning of quantum variables with continuous spectra is investigated. We define a Gaussian 1-to-2 cloning machine, which copies equally well two conjugate variables such as position and momentum or the two quadrature components of a light mode. The resulting cloning fidelity for coherent states, namely F=2/3F=2/3, is shown to be optimal. An asymmetric version of this Gaussian cloner is then used to assess the security of a continuous-variable quantum key distribution scheme that allows two remote parties to share a Gaussian key. The information versus disturbance tradeoff underlying this continuous quantum cryptographic scheme is then analyzed for the optimal individual attack. Methods to convert the resulting Gaussian keys into secret key bits are also studied. The extension of the Gaussian cloner to optimal NN-to-MM continuous cloners is then discussed, and it is shown how to implement these cloners for light modes, using a phase-insensitive optical amplifier and beam splitters. Finally, a phase-conjugated inputs (N,N)(N,N')-to-(M,M)(M,M') continuous cloner is defined, yielding MM clones and MM' anticlones from NN replicas of a coherent state and NN' replicas of its phase-conjugate (with MM=NNM'-M=N'-N). This novel kind of cloners is shown to outperform the standard NN-to-MM cloners in some situations.Comment: 8 pages, 3 figures, submitted to the special issue of the European Physical Journal D on "Quantum interference and cryptographic keys: novel physics and advancing technologies", proceedings of the conference QUICK 2001, Corsica, April 7-13 2001. Minor correction, references adde

    Security of Quantum Key Distribution with Coherent States and Homodyne Detection

    Full text link
    We assess the security of a quantum key distribution protocol relying on the transmission of Gaussian-modulated coherent states and homodyne detection. This protocol is shown to be equivalent to a squeezed state protocol based on a CSS code construction, and is thus provably secure against any eavesdropping strategy. We also briefly show how this protocol can be generalized in order to improve the net key rate.Comment: 7 page

    Secure Coherent-state Quantum Key Distribution Protocols with Efficient Reconciliation

    Full text link
    We study the equivalence between a realistic quantum key distribution protocol using coherent states and homodyne detection and a formal entanglement purification protocol. Maximally-entangled qubit pairs that one can extract in the formal protocol correspond to secret key bits in the realistic protocol. More specifically, we define a qubit encoding scheme that allows the formal protocol to produce more than one entangled qubit pair per coherent state, or equivalently for the realistic protocol, more than one secret key bit. The entanglement parameters are estimated using quantum tomography. We analyze the properties of the encoding scheme and investigate its application to the important case of the attenuation channel.Comment: REVTeX, 11 pages, 2 figure

    Experimental linear-optical implementation of a multifunctional optimal qubit cloner

    Full text link
    We present the first experimental implementation of a multifunctional device for the optimal cloning of one to two qubits. Previous implementations have always been designed to optimize the cloning procedure with respect to one single type of a priori information about the cloned state. In contrast, our "all-in-one" implementation is optimal for several prominent regimes such as universal cloning, phase-covariant cloning, and also the first ever realized mirror phase-covariant cloning, when the square of the expected value of Pauli's Z operator is known in advance. In all these regimes the experimental device yields clones with almost maximum achievable average fidelity (97.5% of theoretical limit). Our device has a wide range of possible applications in quantum information processing, especially in quantum communication. For instance, one can use it for incoherent and coherent attacks against a variety of cryptographic protocols, including the Bennett-Brassard 1984 protocol of quantum key distribution through the Pauli damping channels. It can be also applied as a state-dependent photon multiplier in practical quantum networks.Comment: 9 pages, 6 figures, accepted to Phys. Rev. A (Rapid Communications

    Sexual and marital trajectories and HIV infection among ever-married women in rural Malawi.

    Get PDF
    OBJECTIVE: To explore how sexual and marital trajectories are associated with HIV infection among ever-married women in rural Malawi. METHODS: Retrospective survey data and HIV biomarker data for 926 ever-married women interviewed in the Malawi Diffusion and Ideational Change Project were used. The associations between HIV infection and four key life course transitions considered individually (age at sexual debut, premarital sexual activity, entry into marriage and marital disruption by divorce or death) were examined. These transitions were then sequenced to construct trajectories that represent the variety of patterns in the data. The association between different trajectories and HIV prevalence was examined, controlling for potentially confounding factors such as age and region. RESULTS: Although each life course transition taken in isolation may be associated with HIV infection, their combined effect appeared to be conditional on the sequence in which they occurred. Although early sexual debut, not marrying one's first sexual partner and having a disrupted marriage each increased the likelihood of HIV infection, their risk was not additive. Women who both delayed sexual debut and did not marry their first partner are, once married, more likely to experience marital disruption and to be HIV-positive. Women who marry their first partner but who have sex at a young age, however, are also at considerable risk. CONCLUSIONS: These findings identify the potential of a life course perspective for understanding why some women become infected with HIV and others do not, as well as the differentials in HIV prevalence that originate from the sequence of sexual and marital transitions in one's life. The analysis suggests, however, the need for further data collection to permit a better examination of the mechanisms that account for variations in life course trajectories and thus in lifetime probabilities of HIV infection

    QKD in Standard Optical Telecommunications Networks

    Get PDF
    To perform Quantum Key Distribution, the mastering of the extremely weak signals carried by the quantum channel is required. Transporting these signals without disturbance is customarily done by isolating the quantum channel from any noise sources using a dedicated physical channel. However, to really profit from this technology, a full integration with conventional network technologies would be highly desirable. Trying to use single photon signals with others that carry an average power many orders of magnitude bigger while sharing as much infrastructure with a conventional network as possible brings obvious problems. The purpose of the present paper is to report our efforts in researching the limits of the integration of QKD in modern optical networks scenarios. We have built a full metropolitan area network testbed comprising a backbone and an access network. The emphasis is put in using as much as possible the same industrial grade technology that is actually used in already installed networks, in order to understand the throughput, limits and cost of deploying QKD in a real network

    Continuous variable private quantum channel

    Full text link
    In this paper we introduce the concept of quantum private channel within the continuous variables framework (CVPQC) and investigate its properties. In terms of CVPQC we naturally define a "maximally" mixed state in phase space together with its explicit construction and show that for increasing number of encryption operations (which sets the length of a shared key between Alice and Bob) the encrypted state is arbitrarily close to the maximally mixed state in the sense of the Hilbert-Schmidt distance. We bring the exact solution for the distance dependence and give also a rough estimate of the necessary number of bits of the shared secret key (i.e. how much classical resources are needed for an approximate encryption of a generally unknown continuous-variable state). The definition of the CVPQC is analyzed from the Holevo bound point of view which determines an upper bound of information about an incoming state an eavesdropper is able to get from his optimal measurement.Comment: upper bound on information Eve can get was revised and substantially lowered (chapter IV), part of chapter III rewritten, several typos correcte

    Quantum key distribution using gaussian-modulated coherent states

    Full text link
    Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.Comment: 8 pages, 4 figure
    corecore