631 research outputs found

    Eavesdropping without quantum memory

    Full text link
    In quantum cryptography the optimal eavesdropping strategy requires that the eavesdropper uses quantum memories in order to optimize her information. What happens if the eavesdropper has no quantum memory? It is shown that the best strategy is actually to adopt the simple intercept/resend strategy.Comment: 9 pages LaTeX, 3 figure

    Quantum Cryptography using larger alphabets

    Get PDF
    Like all of quantum information theory, quantum cryptography is traditionally based on two level quantum systems. In this letter, a new protocol for quantum key distribution based on higher dimensional systems is presented. An experimental realization using an interferometric setup is also proposed. Analyzing this protocol from the practical side, one finds an increased key creation rate while keeping the initial laser pulse rate constant. Analyzing it for the case of intercept/resend eavesdropping strategy, an increased error rate is found compared to two dimensional systems, hence an advantage for the legitimate users to detect an eavesdropper.Comment: 12 pages, 2 (eps) figure

    Quantum Forbidden-Interval Theorems for Stochastic Resonance

    Get PDF
    We extend the classical forbidden-interval theorems for a stochastic-resonance noise benefit in a nonlinear system to a quantum-optical communication model and a continuous-variable quantum key distribution model. Each quantum forbidden-interval theorem gives a necessary and sufficient condition that determines whether stochastic resonance occurs in quantum communication of classical messages. The quantum theorems apply to any quantum noise source that has finite variance or that comes from the family of infinite-variance alpha-stable probability densities. Simulations show the noise benefits for the basic quantum communication model and the continuous-variable quantum key distribution model.Comment: 13 pages, 2 figure

    Quantum Distribution of Gaussian Keys with Squeezed States

    Full text link
    A continuous key distribution scheme is proposed that relies on a pair of canonically conjugate quantum variables. It allows two remote parties to share a secret Gaussian key by encoding it into one of the two quadrature components of a single-mode electromagnetic field. The resulting quantum cryptographic information vs disturbance tradeoff is investigated for an individual attack based on the optimal continuous cloning machine. It is shown that the information gained by the eavesdropper then simply equals the information lost by the receiver.Comment: 5 pages, RevTe

    Energy Spectrum Evolution of a Diffuse Field in Elastic Body Caused by Weak Nonlinearity

    Full text link
    We study the evolution of diffuse elastodynamic spectral energy density under the influence of weak nonlinearity. It is shown that the rate of change of this quantity is given by a convolution of the linear energy at two frequencies. Quantitative estimates are given for sample aluminum and fused silica blocks of experimental interest.Comment: 9 pages, 3 figures; revised for better presentatio

    Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers

    Full text link
    Continuous-variable quantum key distribution protocols, based on Gaussian modulation of the quadratures of coherent states, have been implemented in recent experiments. A present limitation of such systems is the finite efficiency of the detectors, which can in principle be compensated for by the use of classical optical preamplifiers. Here we study this possibility in detail, by deriving the modified secret key generation rates when an optical parametric amplifier is placed at the output of the quantum channel. After presenting a general set of security proofs, we show that the use of preamplifiers does compensate for all the imperfections of the detectors when the amplifier is optimal in terms of gain and noise. Imperfect amplifiers can also enhance the system performance, under conditions which are generally satisfied in practice.Comment: 11 pages, 7 figures, submitted to J. Phys. B (special issue on Few Atoms Optics

    Black Hole--Scalar Field Interactions in Spherical Symmetry

    Get PDF
    We examine the interactions of a black hole with a massless scalar field using a coordinate system which extends ingoing Eddington-Finkelstein coordinates to dynamic spherically symmetric-spacetimes. We avoid problems with the singularity by excising the region of the black hole interior to the apparent horizon. We use a second-order finite difference scheme to solve the equations. The resulting program is stable and convergent and will run forever without problems. We are able to observe quasi-normal ringing and power-law tails as well an interesting nonlinear feature.Comment: 16 pages, 26 figures, RevTex, to appear in Phys. Rev.

    On Preparing Entangled Pairs of Polarization Qubits in the Frequency Non-Degenerate Regime

    Full text link
    The problems associated with practical implementation of the scheme proposed for preparation of arbitrary states of polarization ququarts based on biphotons are discussed. The influence of frequency dispersion effects are considered, and the necessity of group velocities dispersion compensation in the frequency non-degenerate case even for continuous pumping is demonstrated. A method for this compensation is proposed and implemented experimentally. Physical restrictions on the quality of prepared two-photon states are revealed.Comment: 9 pages, 6 figure

    Spectroscopy by frequency entangled photon pairs

    Full text link
    Quantum spectroscopy was performed using the frequency-entangled broadband photon pairs generated by spontaneous parametric down-conversion. An absorptive sample was placed in front of the idler photon detector, and the frequency of signal photons was resolved by a diffraction grating. The absorption spectrum of the sample was measured by counting the coincidences, and the result is in agreement with the one measured by a conventional spectrophotometer with a classical light source.Comment: 11 pages, 5 figures, to be published in Phys. Lett.
    corecore