955 research outputs found

    Structural Phase Transitions in SrRh2As2

    Full text link
    SrRh2As2 exhibits structural phase transitions reminiscent to those of BaFe2As2, but crystallizes with three polymorphs derived from the tetragonal ThCr2Si2-type structure. The structure of \alpha-SrRh2As2 is monoclinic with a = 421.2(1) pm, b = 1105.6(2) pm, c = 843.0(1) pm and \beta = 95{\deg} and was refined as a partially pseudo meroedric twin in the space group P21/c with R1 = 0.0928. \beta-SrRh2As2 crystallizes with a modulated structure in the (3+1) dimensional superspace group Fmmm(10\gamma)\sigma 00 with the unit cell parameters a = 1114.4(3) pm, b = 574.4(2) pm and c = 611.5(2) pm and an incommensurable modulation vector q = (1, 0, 0.3311(4)). High temperature single crystal diffraction experiments confirm the tetragonal ThCr2Si2-type structure for \gamma-SrRh2As2 above 350{\deg}C. Electronic band structure calculations indicate that the structural distortion in alpha-SrRh2As2 is caused by strong Rh-Rh bonding interactions and has no magnetic origin as suggested for isotypic BaFe2As2.Comment: 16 pages, 10 Figure

    Three-intensity decoy state method for device independent quantum key distribution with basis dependent errors

    Full text link
    We study the measurement device independent quantum key distribution (MDIQKD) in practice with limited resource, when there are only 3 different states in implementing the decoy-state method and when there are basis dependent coding errors. We present general formulas for the decoy-state method for two-pulse sources with 3 different states, which can be applied to the recently proposed MDIQKD with imperfect single-photon source such as the coherent states or the heralded states from the parametric down conversion. We point out that the existing result for secure QKD with source coding errors does not always hold. We find that very accurate source coding is not necessary. In particular, we loosen the precision of existing result by several magnitude orders for secure QKD.Comment: Published version with Eq.(17) corrected. We emphasize that our major result (Eq.16) for the decoy-state part can be applied to generate a key rate very close to the ideal case of using infinite different coherent states, as was numerically demonstrated in Ref.[21]. Published in PRA, 2013, Ja

    Secure and efficient decoy-state quantum key distribution with inexact pulse intensities

    Full text link
    We present a general theorem for the efficient verification of the lower bound of single-photon transmittance. We show how to do decoy-state quantum key distribution efficiently with large random errors in the intensity control. In our protocol, the linear terms of fluctuation disappear and only the quadratic terms take effect. We then show the unconditional security of decoy-state method with whatever error pattern in intensities of decoy pulses and signal pulses provided that the intensity of each decoy pulse is less than μ\mu and the intensity of each signal pulse is larger than μ\mu'

    Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source

    Full text link
    The method of decoy-state quantum key distribution (QKD) requests different intensities of light pulses. Existing theory has assumed exact control of intensities. Here we propose a simple protocol which is secure and efficient even there are errors in intensity control. In our protocol, decoy pulses and signal pulses are generated from the same father pulses with a two-value attenuation. Given the upper bound of fluctuation of the father pulses, our protocol is secure provided that the two-value attenuation is done exactly. We propose to use unbalanced beam-splitters for a stable attenuation. Given that the intensity error is bounded by ±5\pm5%, with the same key rate, our method can achieve a secure distance only 1 km shorter than that of an ideal protocol with exactly controlled source

    Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse

    Full text link
    We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We show that we may place a projection onto suitably defined qubit spaces before the receiver, which makes the analysis as simple as qubit-based protocols. Unlike the single-photon-based qubits, the qubits identified in this scheme are almost surely detected by the receiver even after a lossy channel. This leads to the key generation rate that is proportional to the channel transmission rate for proper choices of experimental parameters.Comment: More detailed presentation and a bit modified security proo

    Entanglement of coherent states and decoherence

    Get PDF
    A possibility to produce entangled superpositions of strong coherent states is discussed. A recent proposal by Howell and Yazell [Phys. Rev. A 62, 012102 (2000)] of a device which entangles two strong coherent coherent states is critically examined. A serious flaw in their design is found. New modified scheme is proposed and it is shown that it really can generate non-classical states that can violate Bell inequality. Moreover, a profound analysis of the effect of losses and decoherence on the degree of entanglement is accomplished. It reveals the high sensitivity of the device to any disturbances and the fragility of generated states

    Hong-Ou-Mandel interferometer with cavities: theory

    Full text link
    We study the number of coincidences in a Hong-Ou-Mandel interferometer exit whose arms have been supplemented with the addition of one or two optical cavities. The fourth-order correlation function at the beam-splitter exit is calculated. In the regime where the cavity length are larger than the one-photon coherence length, photon coalescence and anti-coalescence interference is observed. Feynman's path diagrams for the indistinguishable processes that lead to quantum interference are presented. As application for the Hong-Ou-Mandel interferometer with two cavities, it is discussed the construction of an optical XOR gate

    General theory of decoy-state quantum cryptography with source errors

    Full text link
    The existing theory of decoy-state quantum cryptography assumes the exact control of each states from Alice's source. Such exact control is impossible in practice. We develop the theory of decoy-state method so that it is unconditionally secure even there are state errors of sources, if the range of a few parameters in the states are known. This theory simplifies the practical implementation of the decoy-state quantum key distribution because the unconditional security can be achieved with a slightly shortened final key, even though the small errors of pulses are not corrected.Comment: Our results can be used securely for any source of diagonal states, including the Plug-&-Play protocol with whatever error pattern, if we know the ranges of errors of a few parameter

    Experimental Long-Distance Decoy-State Quantum Key Distribution Based On Polarization Encoding

    Full text link
    We demonstrate the decoy-state quantum key distribution (QKD) with one-way quantum communication in polarization space over 102km. Further, we simplify the experimental setup and use only one detector to implement the one-way decoy-state QKD over 75km, with the advantage to overcome the security loopholes due to the efficiency mismatch of detectors. Our experimental implementation can really offer the unconditionally secure final keys. We use 3 different intensities of 0, 0.2 and 0.6 for the pulses of source in our experiment. In order to eliminate the influences of polarization mode dispersion in the long-distance single-mode optical fiber, an automatic polarization compensation system is utilized to implement the active compensation.Comment: 4 pages,3 figure

    Calibration and measurement uncertainties of a continuous-flow cloud condensation nuclei counter (DMT-CCNC): CCN activation of ammonium sulfate and sodium chloride aerosol particles in theory and experiment

    Get PDF
    International audienceExperimental and theoretical uncertainties in the measurement of cloud condensation nuclei (CCN) with a continuous-flow thermal-gradient CCN counter from Droplet Measurement Technologies (DMT-CCNC) have been assessed by model calculations and calibration experiments with ammonium sulfate and sodium chloride aerosol particles in the diameter range of 20?220 nm. Experiments have been performed in the laboratory and during field measurement campaigns, extending over a period of more than one year and covering a wide range of operating conditions (650?1020 hPa ambient pressure, 0.5?1.0 L min?1 aerosol flow rate, 20?30°C inlet temperature, 4?34 K m?1 temperature gradient). For each set of conditions, the effective water vapor supersaturation (Seff) in the CCNC was determined from the measured CCN activation spectra and Köhler model calculations. High measurement precision was achieved under stable laboratory conditions, where relative variations of Seff in the CCNC were generally less than ±2%. During field measurements, however, the relative variability increased up to ±5?7%, which can be mostly attributed to variations of the CCNC column top temperature with ambient temperature. To assess the accuracy of the Köhler models used to calculate Seff, we have performed a comprehensive comparison and uncertainty analysis of the various Köhler models and thermodynamic parameterizations commonly used in CCN studies. For the relevant supersaturation range (0.05?2%), the relative deviations between different modeling approaches were as high as 25% for (NH4)2SO4 and 16% for NaCl. The deviations were mostly caused by the different parameterizations for the activity of water in aqueous solutions of (NH4)2SO4 and NaCl (activity parameterization, osmotic coefficient, and van't Hoff factor models). The uncertainties related to the model parameterizations of water activity clearly exceeded the CCNC measurement precision. Relative deviations caused by different ways of calculating or approximating solution density and surface tension did not exceed 3% for (NH4)2SO4 and 1.5% for NaCl. Nevertheless, they did exceed the CCNC measurement precision under well-defined operating conditions and should not be neglected in studies aimed at high accuracy. To ensure comparability of results, we suggest that CCN studies should always report exactly which Köhler model equations and parameterizations of solution properties were used. Substantial differences between the CCNC calibration results obtained with (NH4)2SO4 and NaCl aerosols under equal experimental conditions (relative deviations of Seff up to ~10%) indicate inconsistencies between widely used activity parameterizations derived from electrodynamic balance (EDB) single particle experiments (Tang and Munkelwitz, 1994; Tang, 1996) and hygroscopicity tandem differential mobility analyzer (HTDMA) aerosol experiments (Kreidenweis et al., 2005). Therefore, we see a need for further evaluation and experimental confirmation of preferred data sets and parameterizations for the activity of water in dilute aqueous (NH4)2SO4 and NaCl solutions. The experimental results were also used to test the CCNC flow model of Lance et al.~(2006), which describes the dependence of Seff on temperature, pressure, and flow rate in the CCN counter. This model could be applied after subtraction of a near-constant temperature offset and derivation of an instrument-specific thermal resistance parameter (RT?1.8 K W?1). At Seff>0.1% the relative deviations between the flow model and experimental results were mostly less than 5%, when the same Köhler model approach was used. At Seff?.1%, however, the deviations exceeded 20%, which can be attributed to non-idealities which also caused the near-constant temperature offset. Therefore, we suggest that the CCNC flow model can be used to extrapolate calibration results, but should generally be complemented by calibration experiments performed under the relevant operating conditions ? during field campaigns as well as in laboratory studies
    corecore