631 research outputs found
Eavesdropping without quantum memory
In quantum cryptography the optimal eavesdropping strategy requires that the
eavesdropper uses quantum memories in order to optimize her information. What
happens if the eavesdropper has no quantum memory? It is shown that the best
strategy is actually to adopt the simple intercept/resend strategy.Comment: 9 pages LaTeX, 3 figure
Quantum Cryptography using larger alphabets
Like all of quantum information theory, quantum cryptography is traditionally
based on two level quantum systems. In this letter, a new protocol for quantum
key distribution based on higher dimensional systems is presented. An
experimental realization using an interferometric setup is also proposed.
Analyzing this protocol from the practical side, one finds an increased key
creation rate while keeping the initial laser pulse rate constant. Analyzing it
for the case of intercept/resend eavesdropping strategy, an increased error
rate is found compared to two dimensional systems, hence an advantage for the
legitimate users to detect an eavesdropper.Comment: 12 pages, 2 (eps) figure
Stochastic rainfall-runoff forecasting: parameter estimation, multi-step prediction, and evaluation of overflow risk
Quantum Forbidden-Interval Theorems for Stochastic Resonance
We extend the classical forbidden-interval theorems for a
stochastic-resonance noise benefit in a nonlinear system to a quantum-optical
communication model and a continuous-variable quantum key distribution model.
Each quantum forbidden-interval theorem gives a necessary and sufficient
condition that determines whether stochastic resonance occurs in quantum
communication of classical messages. The quantum theorems apply to any quantum
noise source that has finite variance or that comes from the family of
infinite-variance alpha-stable probability densities. Simulations show the
noise benefits for the basic quantum communication model and the
continuous-variable quantum key distribution model.Comment: 13 pages, 2 figure
Quantum Distribution of Gaussian Keys with Squeezed States
A continuous key distribution scheme is proposed that relies on a pair of
canonically conjugate quantum variables. It allows two remote parties to share
a secret Gaussian key by encoding it into one of the two quadrature components
of a single-mode electromagnetic field. The resulting quantum cryptographic
information vs disturbance tradeoff is investigated for an individual attack
based on the optimal continuous cloning machine. It is shown that the
information gained by the eavesdropper then simply equals the information lost
by the receiver.Comment: 5 pages, RevTe
Energy Spectrum Evolution of a Diffuse Field in Elastic Body Caused by Weak Nonlinearity
We study the evolution of diffuse elastodynamic spectral energy density under
the influence of weak nonlinearity. It is shown that the rate of change of this
quantity is given by a convolution of the linear energy at two frequencies.
Quantitative estimates are given for sample aluminum and fused silica blocks of
experimental interest.Comment: 9 pages, 3 figures; revised for better presentatio
Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers
Continuous-variable quantum key distribution protocols, based on Gaussian
modulation of the quadratures of coherent states, have been implemented in
recent experiments. A present limitation of such systems is the finite
efficiency of the detectors, which can in principle be compensated for by the
use of classical optical preamplifiers. Here we study this possibility in
detail, by deriving the modified secret key generation rates when an optical
parametric amplifier is placed at the output of the quantum channel. After
presenting a general set of security proofs, we show that the use of
preamplifiers does compensate for all the imperfections of the detectors when
the amplifier is optimal in terms of gain and noise. Imperfect amplifiers can
also enhance the system performance, under conditions which are generally
satisfied in practice.Comment: 11 pages, 7 figures, submitted to J. Phys. B (special issue on Few
Atoms Optics
Black Hole--Scalar Field Interactions in Spherical Symmetry
We examine the interactions of a black hole with a massless scalar field
using a coordinate system which extends ingoing Eddington-Finkelstein
coordinates to dynamic spherically symmetric-spacetimes. We avoid problems with
the singularity by excising the region of the black hole interior to the
apparent horizon. We use a second-order finite difference scheme to solve the
equations. The resulting program is stable and convergent and will run forever
without problems. We are able to observe quasi-normal ringing and power-law
tails as well an interesting nonlinear feature.Comment: 16 pages, 26 figures, RevTex, to appear in Phys. Rev.
On Preparing Entangled Pairs of Polarization Qubits in the Frequency Non-Degenerate Regime
The problems associated with practical implementation of the scheme proposed
for preparation of arbitrary states of polarization ququarts based on biphotons
are discussed. The influence of frequency dispersion effects are considered,
and the necessity of group velocities dispersion compensation in the frequency
non-degenerate case even for continuous pumping is demonstrated. A method for
this compensation is proposed and implemented experimentally. Physical
restrictions on the quality of prepared two-photon states are revealed.Comment: 9 pages, 6 figure
Spectroscopy by frequency entangled photon pairs
Quantum spectroscopy was performed using the frequency-entangled broadband
photon pairs generated by spontaneous parametric down-conversion. An absorptive
sample was placed in front of the idler photon detector, and the frequency of
signal photons was resolved by a diffraction grating. The absorption spectrum
of the sample was measured by counting the coincidences, and the result is in
agreement with the one measured by a conventional spectrophotometer with a
classical light source.Comment: 11 pages, 5 figures, to be published in Phys. Lett.
- …
