WorldWideScience

Sample records for coherent-state quantum key

  1. Continuous Variable Quantum Key Distribution Using Polarized Coherent States

    Vidiella-Barranco, A.; Borelli, L. F. M.

    We discuss a continuous variables method of quantum key distribution employing strongly polarized coherent states of light. The key encoding is performed using the variables known as Stokes parameters, rather than the field quadratures. Their quantum counterpart, the Stokes operators Ŝi (i=1,2,3), constitute a set of non-commuting operators, being the precision of simultaneous measurements of a pair of them limited by an uncertainty-like relation. Alice transmits a conveniently modulated two-mode coherent state, and Bob randomly measures one of the Stokes parameters of the incoming beam. After performing reconciliation and privacy amplification procedures, it is possible to distill a secret common key. We also consider a non-ideal situation, in which coherent states with thermal noise, instead of pure coherent states, are used for encoding.

  2. Quantum cryptography using coherent states: Randomized encryption and key generation

    Corndorf, Eric

    objectives of key generation and direct data-encryption, a new quantum cryptographic principle is demonstrated wherein keyed coherent-state signal sets are employed. Taking advantage of the fundamental and irreducible quantum-measurement noise of coherent states, these schemes do not require the users to measure the influence of an attacker. Experimental key-generation and data encryption schemes based on these techniques, which are compatible with today's WDM fiber-optic telecommunications infrastructure, are implemented and analyzed.

  3. Security bound of continuous-variable quantum key distribution with noisy coherent states and channel

    Shen Yong; Yang Jian; Guo Hong

    2009-01-01

    Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analysed. Assuming that the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare-and-measurement scheme (P and M) and entanglement-based scheme (E-B) are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and, further, a lower bound to the secure key rate is derived.

  4. Security bound of continuous-variable quantum key distribution with noisy coherent states and channel

    Shen Yong; Yang Jian; Guo Hong, E-mail: hongguo@pku.edu.c [CREAM Group, State Key Laboratory of Advanced Optical Communication Systems and Networks (Peking University) and Institute of Quantum Electronics, School of Electronics Engineering and Computer Science, Peking University, Beijing 100871 (China)

    2009-12-14

    Security of a continuous-variable quantum key distribution protocol based on noisy coherent states and channel is analysed. Assuming that the noise of coherent states is induced by Fred, a neutral party relative to others, we prove that the prepare-and-measurement scheme (P and M) and entanglement-based scheme (E-B) are equivalent. Then, we show that this protocol is secure against Gaussian collective attacks even if the channel is lossy and noisy, and, further, a lower bound to the secure key rate is derived.

  5. Security proof of continuous-variable quantum key distribution using three coherent states

    Brádler, Kamil; Weedbrook, Christian

    2018-02-01

    We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss.

  6. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.

    Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B

    2014-09-15

    Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

  7. Quantum key distribution with a single photon from a squeezed coherent state

    Matsuoka, Masahiro; Hirano, Takuya

    2003-01-01

    Squeezing of the coherent state by optical parametric amplifier is shown to efficiently produce single-photon states with reduced multiphoton probabilities compared with the weak coherent light. It can be a better source for a longer-distance quantum key distribution and also for other quantum optical experiments. The necessary condition for a secure quantum key distribution given by Brassard et al. is analyzed as functions of the coherent-state amplitude and squeeze parameter. Similarly, the rate of the gained secure bits G after error correction and privacy amplification given by Luetkenhaus is calculated. Compared with the weak coherent light, it is found that G is about ten times larger and its high level continues on about two times longer distance. By improvement of the detector efficiency it is shown that the distance extends further. Measurement of the intensity correlation function and the relation to photon antibunching are discussed for the experimental verification of the single-photon generation

  8. High-dimensional quantum key distribution with the entangled single-photon-added coherent state

    Wang, Yang [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Bao, Wan-Su, E-mail: 2010thzz@sina.com [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Bao, Hai-Ze; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

    2017-04-25

    High-dimensional quantum key distribution (HD-QKD) can generate more secure bits for one detection event so that it can achieve long distance key distribution with a high secret key capacity. In this Letter, we present a decoy state HD-QKD scheme with the entangled single-photon-added coherent state (ESPACS) source. We present two tight formulas to estimate the single-photon fraction of postselected events and Eve's Holevo information and derive lower bounds on the secret key capacity and the secret key rate of our protocol. We also present finite-key analysis for our protocol by using the Chernoff bound. Our numerical results show that our protocol using one decoy state can perform better than that of previous HD-QKD protocol with the spontaneous parametric down conversion (SPDC) using two decoy states. Moreover, when considering finite resources, the advantage is more obvious. - Highlights: • Implement the single-photon-added coherent state source into the high-dimensional quantum key distribution. • Enhance both the secret key capacity and the secret key rate compared with previous schemes. • Show an excellent performance in view of statistical fluctuations.

  9. High-dimensional quantum key distribution with the entangled single-photon-added coherent state

    Wang, Yang; Bao, Wan-Su; Bao, Hai-Ze; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei

    2017-01-01

    High-dimensional quantum key distribution (HD-QKD) can generate more secure bits for one detection event so that it can achieve long distance key distribution with a high secret key capacity. In this Letter, we present a decoy state HD-QKD scheme with the entangled single-photon-added coherent state (ESPACS) source. We present two tight formulas to estimate the single-photon fraction of postselected events and Eve's Holevo information and derive lower bounds on the secret key capacity and the secret key rate of our protocol. We also present finite-key analysis for our protocol by using the Chernoff bound. Our numerical results show that our protocol using one decoy state can perform better than that of previous HD-QKD protocol with the spontaneous parametric down conversion (SPDC) using two decoy states. Moreover, when considering finite resources, the advantage is more obvious. - Highlights: • Implement the single-photon-added coherent state source into the high-dimensional quantum key distribution. • Enhance both the secret key capacity and the secret key rate compared with previous schemes. • Show an excellent performance in view of statistical fluctuations.

  10. Coherent states in quantum mechanics

    Rodrigues, R. de Lima; Fernandes Junior, Damasio; Batista, Sheyla Marques

    2001-12-01

    We present a review work on the coherent states is non-relativistic quantum mechanics analysing the quantum oscillators in the coherent states. The coherent states obtained via a displacement operator that act on the wave function of ground state of the oscillator and the connection with Quantum Optics which were implemented by Glauber have also been considered. A possible generalization to the construction of new coherent states it is point out. (author)

  11. Coherent states in quantum mechanics

    Rodrigues, R D L; Fernandes, D

    2001-01-01

    We present a review work on the coherent states is non-relativistic quantum mechanics analysing the quantum oscillators in the coherent states. The coherent states obtained via a displacement operator that act on the wave function of ground state of the oscillator and the connection with Quantum Optics which were implemented by Glauber have also been considered. A possible generalization to the construction of new coherent states it is point out.

  12. Improving the maximum transmission distance of continuous-variable quantum key distribution with noisy coherent states using a noiseless amplifier

    Wang, Tianyi; Yu, Song; Zhang, Yi-Chen; Gu, Wanyi; Guo, Hong

    2014-01-01

    By employing a nondeterministic noiseless linear amplifier, we propose to increase the maximum transmission distance of continuous-variable quantum key distribution with noisy coherent states. With the covariance matrix transformation, the expression of secret key rate under reverse reconciliation is derived against collective entangling cloner attacks. We show that the noiseless linear amplifier can compensate the detrimental effect of the preparation noise with an enhancement of the maximum transmission distance and the noise resistance. - Highlights: • Noiseless amplifier is applied in noisy coherent state quantum key distribution. • Negative effect of preparation noise is compensated by noiseless amplification. • Maximum transmission distance and noise resistance are both enhanced

  13. Coherent states in quantum physics

    Gazeau, Jean-Pierre

    2009-01-01

    This self-contained introduction discusses the evolution of the notion of coherent states, from the early works of Schrödinger to the most recent advances, including signal analysis. An integrated and modern approach to the utility of coherent states in many different branches of physics, it strikes a balance between mathematical and physical descriptions.Split into two parts, the first introduces readers to the most familiar coherent states, their origin, their construction, and their application and relevance to various selected domains of physics. Part II, mostly based on recent original results, is devoted to the question of quantization of various sets through coherent states, and shows the link to procedures in signal analysis. Title: Coherent States in Quantum Physics Print ISBN: 9783527407095 Author(s): Gazeau, Jean-Pierre eISBN: 9783527628292 Publisher: Wiley-VCH Dewey: 530.12 Publication Date: 23 Sep, 2009 Pages: 360 Category: Science, Science: Physics LCCN: Language: English Edition: N/A LCSH:

  14. Quantum key distribution using basis encoding of Gaussian-modulated coherent states

    Huang, Peng; Huang, Jingzheng; Zhang, Zheshen; Zeng, Guihua

    2018-04-01

    The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in practical secure quantum cryptography. However, its performance is restricted strongly by the channel excess noise and the reconciliation efficiency. In this paper, we present a quantum key distribution (QKD) protocol by encoding the secret keys on the random choices of two measurement bases: the conjugate quadratures X and P . The employed encoding method can dramatically weaken the effects of channel excess noise and reconciliation efficiency on the performance of the QKD protocol. Subsequently, the proposed scheme exhibits the capability to tolerate much higher excess noise and enables us to reach a much longer secure transmission distance even at lower reconciliation efficiency. The proposal can work alternatively to strengthen significantly the performance of the known Gaussian-modulated CVQKD protocol and serve as a multiplier for practical secure quantum cryptography with continuous variables.

  15. Proof-of-principle test of coherent-state continuous variable quantum key distribution through turbulent atmosphere (Conference Presentation)

    Derkach, Ivan D.; Peuntinger, Christian; Ruppert, László; Heim, Bettina; Gunthner, Kevin; Usenko, Vladyslav C.; Elser, Dominique; Marquardt, Christoph; Filip, Radim; Leuchs, Gerd

    2016-10-01

    Continuous-variable quantum key distribution is a practical application of quantum information theory that is aimed at generation of secret cryptographic key between two remote trusted parties and that uses multi-photon quantum states as carriers of key bits. Remote parties share the secret key via a quantum channel, that presumably is under control of of an eavesdropper, and which properties must be taken into account in the security analysis. Well-studied fiber-optical quantum channels commonly possess stable transmittance and low noise levels, while free-space channels represent a simpler, less demanding and more flexible alternative, but suffer from atmospheric effects such as turbulence that in particular causes a non-uniform transmittance distribution referred to as fading. Nonetheless free-space channels, providing an unobstructed line-of-sight, are more apt for short, mid-range and potentially long-range (using satellites) communication and will play an important role in the future development and implementation of QKD networks. It was previously theoretically shown that coherent-state CV QKD should be in principle possible to implement over a free-space fading channel, but strong transmittance fluctuations result in the significant modulation-dependent channel excess noise. In this regime the post-selection of highly transmitting sub-channels may be needed, which can even restore the security of the protocol in the strongly turbulent channels. We now report the first proof-of-principle experimental test of coherent state CV QKD protocol using different levels Gaussian modulation over a mid-range (1.6-kilometer long) free-space atmospheric quantum channel. The transmittance of the link was characterized using intensity measurements for the reference but channel estimation using the modulated coherent states was also studied. We consider security against Gaussian collective attacks, that were shown to be optimal against CV QKD protocols . We assumed a

  16. Quantum learning of coherent states

    Sentis, Gael [Universitat Autonoma de Barcelona, Fisica Teorica: Informacio i Fenomens Quantics, Barcelona (Spain); Guta, Madalin; Adesso, Gerardo [University of Nottingham, School of Mathematical Sciences, Nottingham (United Kingdom)

    2015-12-15

    We develop a quantum learning scheme for binary discrimination of coherent states of light. This is a problem of technological relevance for the reading of information stored in a digital memory. In our setting, a coherent light source is used to illuminate a memory cell and retrieve its encoded bit by determining the quantum state of the reflected signal. We consider a situation where the amplitude of the states produced by the source is not fully known, but instead this information is encoded in a large training set comprising many copies of the same coherent state. We show that an optimal global measurement, performed jointly over the signal and the training set, provides higher successful identification rates than any learning strategy based on first estimating the unknown amplitude by means of Gaussian measurements on the training set, followed by an adaptive discrimination procedure on the signal. By considering a simplified variant of the problem, we argue that this is the case even for non-Gaussian estimation measurements. Our results show that, even in absence of entanglement, collective quantum measurements yield an enhancement in the readout of classical information, which is particularly relevant in the operating regime of low-energy signals. (orig.)

  17. Quantum learning of coherent states

    Sentis, Gael; Guta, Madalin; Adesso, Gerardo

    2015-01-01

    We develop a quantum learning scheme for binary discrimination of coherent states of light. This is a problem of technological relevance for the reading of information stored in a digital memory. In our setting, a coherent light source is used to illuminate a memory cell and retrieve its encoded bit by determining the quantum state of the reflected signal. We consider a situation where the amplitude of the states produced by the source is not fully known, but instead this information is encoded in a large training set comprising many copies of the same coherent state. We show that an optimal global measurement, performed jointly over the signal and the training set, provides higher successful identification rates than any learning strategy based on first estimating the unknown amplitude by means of Gaussian measurements on the training set, followed by an adaptive discrimination procedure on the signal. By considering a simplified variant of the problem, we argue that this is the case even for non-Gaussian estimation measurements. Our results show that, even in absence of entanglement, collective quantum measurements yield an enhancement in the readout of classical information, which is particularly relevant in the operating regime of low-energy signals. (orig.)

  18. Quantum communication with coherent states of light

    Khan, Imran; Elser, Dominique; Dirmeier, Thomas; Marquardt, Christoph; Leuchs, Gerd

    2017-06-01

    Quantum communication offers long-term security especially, but not only, relevant to government and industrial users. It is worth noting that, for the first time in the history of cryptographic encoding, we are currently in the situation that secure communication can be based on the fundamental laws of physics (information theoretical security) rather than on algorithmic security relying on the complexity of algorithms, which is periodically endangered as standard computer technology advances. On a fundamental level, the security of quantum key distribution (QKD) relies on the non-orthogonality of the quantum states used. So even coherent states are well suited for this task, the quantum states that largely describe the light generated by laser systems. Depending on whether one uses detectors resolving single or multiple photon states or detectors measuring the field quadratures, one speaks of, respectively, a discrete- or a continuous-variable description. Continuous-variable QKD with coherent states uses a technology that is very similar to the one employed in classical coherent communication systems, the backbone of today's Internet connections. Here, we review recent developments in this field in two connected regimes: (i) improving QKD equipment by implementing front-end telecom devices and (ii) research into satellite QKD for bridging long distances by building upon existing optical satellite links. This article is part of the themed issue 'Quantum technology for the 21st century'.

  19. Quantum oscillators in the canonical coherent states

    Rodrigues, R. de Lima [Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil); Lima, A.F. de; Ferreira, K. de Araujo [Paraiba Univ., Campina Grande, PB (Brazil). Dept. de Fisica; Vaidya, A.N. [Universidade Federal, Rio de Janeiro, RJ (Brazil). Inst. de Fisica

    2001-11-01

    The main characteristics of the quantum oscillator coherent states including the two-particle Calogero interaction are investigated. We show that these Calogero coherent states are the eigenstates of the second-order differential annihilation operator which is deduced via Wigner-Heisenberg algebraic technique and correspond exactly to the pure uncharged-bosonic states. They posses the important properties of non-orthogonality and completeness. The minimum uncertainty relation for the Wigner oscillator coherent states are investigated. New sets of even and odd coherent states are point out. (author)

  20. Recurrent neural network approach to quantum signal: coherent state restoration for continuous-variable quantum key distribution

    Lu, Weizhao; Huang, Chunhui; Hou, Kun; Shi, Liting; Zhao, Huihui; Li, Zhengmei; Qiu, Jianfeng

    2018-05-01

    In continuous-variable quantum key distribution (CV-QKD), weak signal carrying information transmits from Alice to Bob; during this process it is easily influenced by unknown noise which reduces signal-to-noise ratio, and strongly impacts reliability and stability of the communication. Recurrent quantum neural network (RQNN) is an artificial neural network model which can perform stochastic filtering without any prior knowledge of the signal and noise. In this paper, a modified RQNN algorithm with expectation maximization algorithm is proposed to process the signal in CV-QKD, which follows the basic rule of quantum mechanics. After RQNN, noise power decreases about 15 dBm, coherent signal recognition rate of RQNN is 96%, quantum bit error rate (QBER) drops to 4%, which is 6.9% lower than original QBER, and channel capacity is notably enlarged.

  1. Coherent states in the quantum multiverse

    Robles-Perez, S.; Hassouni, Y.; Gonzalez-Diaz, P.F.

    2010-01-01

    In this Letter, we study the role of coherent states in the realm of quantum cosmology, both in a second-quantized single universe and in a third-quantized quantum multiverse. In particular, most emphasis will be paid to the quantum description of multiverses made of accelerated universes. We have shown that the quantum states involved at a quantum mechanical multiverse whose single universes are accelerated are given by squeezed states having no classical analogs.

  2. Coherent states in the quantum multiverse

    Robles-Perez, S., E-mail: salvarp@imaff.cfmac.csic.e [Colina de los Chopos, Centro de Fisica ' Miguel Catalan' , Instituto de Fisica Fundamental, Consejo Superior de Investigaciones Cientificas, Serrano 121, 28006 Madrid (Spain); Estacion Ecologica de Biocosmologia, Medellin (Spain); Hassouni, Y. [Laboratoire de Physique Theorique, Faculte des Sciences-Universite Sidi Med Ben Abdellah, Avenue Ibn Batouta B.P: 1014, Agdal Rabat (Morocco); Gonzalez-Diaz, P.F. [Colina de los Chopos, Centro de Fisica ' Miguel Catalan' , Instituto de Fisica Fundamental, Consejo Superior de Investigaciones Cientificas, Serrano 121, 28006 Madrid (Spain); Estacion Ecologica de Biocosmologia, Medellin (Spain)

    2010-01-11

    In this Letter, we study the role of coherent states in the realm of quantum cosmology, both in a second-quantized single universe and in a third-quantized quantum multiverse. In particular, most emphasis will be paid to the quantum description of multiverses made of accelerated universes. We have shown that the quantum states involved at a quantum mechanical multiverse whose single universes are accelerated are given by squeezed states having no classical analogs.

  3. Coherent states for quantum compact groups

    Jurco, B.; Stovicek, P.; CTU, Prague

    1996-01-01

    Coherent states are introduced and their properties are discussed for simple quantum compact groups A l , B l , C l and D l . The multiplicative form of the canonical element for the quantum double is used to introduce the holomorphic coordinates on a general quantum dressing orbit. The coherent state is interpreted as a holomorphic function on this orbit with values in the carrier Hilbert space of an irreducible representation of the corresponding quantized enveloping algebra. Using Gauss decomposition, the commutation relations for the holomorphic coordinates on the dressing orbit are derived explicitly and given in a compact R-matrix formulation (generalizing this way the q-deformed Grassmann and flag manifolds). The antiholomorphic realization of the irreducible representations of a compact quantum group (the analogue of the Borel-Weil construction) is described using the concept of coherent state. The relation between representation theory and non-commutative differential geometry is suggested. (orig.)

  4. Coherent states for quantum compact groups

    Jurco, B. [European Organization for Nuclear Research, Geneva (Switzerland). Theory Div.; Stovicek, P. [Ceske Vysoke Uceni Technicke, Prague (Czech Republic). Dept. of Mathematics]|[CTU, Prague (Czech Republic). Doppler Inst.

    1996-12-01

    Coherent states are introduced and their properties are discussed for simple quantum compact groups A{sub l}, B{sub l}, C{sub l} and D{sub l}. The multiplicative form of the canonical element for the quantum double is used to introduce the holomorphic coordinates on a general quantum dressing orbit. The coherent state is interpreted as a holomorphic function on this orbit with values in the carrier Hilbert space of an irreducible representation of the corresponding quantized enveloping algebra. Using Gauss decomposition, the commutation relations for the holomorphic coordinates on the dressing orbit are derived explicitly and given in a compact R-matrix formulation (generalizing this way the q-deformed Grassmann and flag manifolds). The antiholomorphic realization of the irreducible representations of a compact quantum group (the analogue of the Borel-Weil construction) is described using the concept of coherent state. The relation between representation theory and non-commutative differential geometry is suggested. (orig.)

  5. Coherent states for quantum compact groups

    Jurco, B

    1996-01-01

    Coherent states are introduced and their properties are discussed for all simple quantum compact groups. The multiplicative form of the canonical element for the quantum double is used to introduce the holomorphic coordinates on a general quantum dressing orbit and interpret the coherent state as a holomorphic function on this orbit with values in the carrier Hilbert space of an irreducible representation of the corresponding quantized enveloping algebra. Using Gauss decomposition, the commutation relations for the holomorphic coordinates on the dressing orbit are derived explicitly and given in a compact R--matrix formulation (generalizing this way the q--deformed Grassmann and flag manifolds). The antiholomorphic realization of the irreducible representations of a compact quantum group (the analogue of the Borel--Weil construction) are described using the concept of coherent state. The relation between representation theory and non--commutative differential geometry is suggested.}

  6. Spectral coherent-state quantum cryptography.

    Cincotti, Gabriella; Spiekman, Leo; Wada, Naoya; Kitayama, Ken-ichi

    2008-11-01

    A novel implementation of quantum-noise optical cryptography is proposed, which is based on a simplified architecture that allows long-haul, high-speed transmission in a fiber optical network. By using a single multiport encoder/decoder and 16 phase shifters, this new approach can provide the same confidentiality as other implementations of Yuen's encryption protocol, which use a larger number of phase or polarization coherent states. Data confidentiality and error probability for authorized and unauthorized receivers are carefully analyzed.

  7. Coherent states in quantum mechanics; Estados coerentes em mecanica quantica

    Rodrigues, R. de Lima [Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil)]. E-mail: rafaelr@cbpf.br; Fernandes Junior, Damasio; Batista, Sheyla Marques [Paraiba Univ., Campina Grande, PB (Brazil). Dept. de Engenharia Eletrica

    2001-12-01

    We present a review work on the coherent states is non-relativistic quantum mechanics analysing the quantum oscillators in the coherent states. The coherent states obtained via a displacement operator that act on the wave function of ground state of the oscillator and the connection with Quantum Optics which were implemented by Glauber have also been considered. A possible generalization to the construction of new coherent states it is point out. (author)

  8. Quantum State Engineering Via Coherent-State Superpositions

    Janszky, Jozsef; Adam, P.; Szabo, S.; Domokos, P.

    1996-01-01

    The quantum interference between the two parts of the optical Schrodinger-cat state makes possible to construct a wide class of quantum states via discrete superpositions of coherent states. Even a small number of coherent states can approximate the given quantum states at a high accuracy when the distance between the coherent states is optimized, e. g. nearly perfect Fock state can be constructed by discrete superpositions of n + 1 coherent states lying in the vicinity of the vacuum state.

  9. Security of quantum key distribution with a laser reference coherent state, resistant to loss in the communication channel

    Molotkov, S N; Potapova, T A

    2015-01-01

    The problem of quantum key distribution security in channels with large losses is still open. Quasi-single-photon sources of quantum states with losses in the quantum communication channel open up the possibility of attacking with unambiguous state discrimination (USD) measurements, resulting in a loss of privacy. In this letter, the problem is solved by counting the classic reference pulses. Conservation of the number of counts of intense coherent pulses makes it impossible to conduct USD measurements. Moreover, the losses in the communication channel are considered to be unknown in advance and are subject to change throughout the series parcels. Unlike other protocols, differential phase shift (Inoue et al 2002 Phys. Rev. Lett. 89 037902, Inoue et al 2003 Phys. Rev. A 68 022317, Takesue et al 2007 Nat. Photon. 1 343, Wen et al 2009 Phys. Rev. Lett. 103 170503) and coherent one way (Stucki et al 2005 Appl. Phys. Lett. 87 194108, Branciard et al 2005 Appl. Phys. Lett. 87 194108, Branciard et al 2008 New J. Phys. 10 013031, Stucki et al 2008 Opt. Express 17 13326), the simplicity of the protocol makes it possible to carry out a complete analysis of its security. (letter)

  10. Quantum nonlinear lattices and coherent state vectors

    Ellinas, Demosthenes; Johansson, M.; Christiansen, Peter Leth

    1999-01-01

    for the state vectors invokes the study of the Riemannian and symplectic geometry of the CSV manifolds as generalized phase spaces. Next, we investigate analytically and numerically the behavior of mean values and uncertainties of some physically interesting observables as well as the modifications...... (FP) model. Based on the respective dynamical symmetries of the models, a method is put forward which by use of the associated boson and spin coherent state vectors (CSV) and a factorization ansatz for the solution of the Schrodinger equation, leads to quasiclassical Hamiltonian equations of motion...... state vectors, and accounts for the quantum correlations of the lattice sites that develop during the time evolution of the systems. (C) 1999 Elsevier Science B.V. All rights reserved....

  11. Coherent states in quaternionic quantum mechanics

    Adler, Stephen L.; Millard, Andrew C.

    1997-05-01

    We develop Perelomov's coherent states formalism to include the case of a quaternionic Hilbert space. We find that, because of the closure requirement, an attempted quaternionic generalization of the special nilpotent or Weyl group reduces to the normal complex case. For the case of the compact group SU(2), however, coherent states can be formulated using the quaternionic half-integer spin matrices of Finkelstein, Jauch, and Speiser, giving a nontrivial quaternionic analog of coherent states.

  12. Coherent states in quaternionic quantum mechanics

    Adler, S.L.; Millard, A.C.

    1997-01-01

    We develop Perelomov close-quote s coherent states formalism to include the case of a quaternionic Hilbert space. We find that, because of the closure requirement, an attempted quaternionic generalization of the special nilpotent or Weyl group reduces to the normal complex case. For the case of the compact group SU(2), however, coherent states can be formulated using the quaternionic half-integer spin matrices of Finkelstein, Jauch, and Speiser, giving a nontrivial quaternionic analog of coherent states. copyright 1997 American Institute of Physics

  13. Entanglement diversion and quantum teleportation of entangled coherent states

    Cai Xin-Hua; Guo Jie-Rong; Nie Jian-Jun; Jia Jin-Ping

    2006-01-01

    The proposals on entanglement diversion and quantum teleportation of entangled coherent states are presented.In these proposals,the entanglement between two coherent states,|α〉and |-α〉,with the same amplitude but a phase difference of π is utilized as a quantum channel.The processes of the entanglement diversion and the teleportation are achieved by using the 5050 symmetric beam splitters,the phase shifters and the photodetectors with the help of classical information.

  14. Coherent states and parasupersymmetric quantum mechanics

    Debergh, Nathalie

    1992-01-01

    It is well known that Parafermi and Parabose statistics are natural extensions of the usual Fermi and Bose ones, enhancing trilinear (anti)commutation relations instead of bilinear ones. Due to this generalization, positive parameters appear: the so-called orders of paraquantization p (= 1, 2, 3, ...) and h sub 0 (= 1/2, 1, 3/2, ...), respectively, the first value leading in each case to the usual statistics. The superpostion of the parabosonic and parafermionic operators gives rise to parasupermultiplets for which mixed trilinear relations have already been studied leading to two (nonequivalent) sets: the relative Parabose and the relative Parafermi ones. For the specific values p = 1 = 2h sub 0, these sets reduce to the well known supersymmetry. Coherent states associated with this last model have been recently put in evidence through the annihilation operator point of view and the group theoretical approach or displacement operator context. We propose to realize the corresponding studies within the new context p = 2 = 2h sub 0, being then directly extended to any order of paraquantization.

  15. Signatures of discrete breathers in coherent state quantum dynamics

    Igumenshchev, Kirill; Ovchinnikov, Misha; Prezhdo, Oleg; Maniadis, Panagiotis

    2013-01-01

    In classical mechanics, discrete breathers (DBs) – a spatial time-periodic localization of energy – are predicted in a large variety of nonlinear systems. Motivated by a conceptual bridging of the DB phenomena in classical and quantum mechanical representations, we study their signatures in the dynamics of a quantum equivalent of a classical mechanical point in phase space – a coherent state. In contrast to the classical point that exhibits either delocalized or localized motion, the coherent state shows signatures of both localized and delocalized behavior. The transition from normal to local modes have different characteristics in quantum and classical perspectives. Here, we get an insight into the connection between classical and quantum perspectives by analyzing the decomposition of the coherent state into system's eigenstates, and analyzing the spacial distribution of the wave-function density within these eigenstates. We find that the delocalized and localized eigenvalue components of the coherent state are separated by a mixed region, where both kinds of behavior can be observed. Further analysis leads to the following observations. Considered as a function of coupling, energy eigenstates go through avoided crossings between tunneling and non-tunneling modes. The dominance of tunneling modes in the high nonlinearity region is compromised by the appearance of new types of modes – high order tunneling modes – that are similar to the tunneling modes but have attributes of non-tunneling modes. Certain types of excitations preferentially excite higher order tunneling modes, allowing one to study their properties. Since auto-correlation functions decrease quickly in highly nonlinear systems, short-time dynamics are sufficient for modeling quantum DBs. This work provides a foundation for implementing modern semi-classical methods to model quantum DBs, bridging classical and quantum mechanical signatures of DBs, and understanding spectroscopic experiments

  16. Generation of optical coherent state superpositions for quantum information processing

    Tipsmark, Anders

    2012-01-01

    I dette projektarbejde med titlen “Generation of optical coherent state superpositions for quantum information processing” har målet været at generere optiske kat-tilstande. Dette er en kvantemekanisk superpositions tilstand af to koherente tilstande med stor amplitude. Sådan en tilstand er...

  17. On coherent states for the simplest quantum groups

    Jurco, B. (Palackeho Univ., Olomouc (Czechoslovakia). Dept. of Optics)

    1991-01-01

    The coherent states for the simplest quantum groups (q-Heisenberg-Weyl, SU{sub q}(2) and the discrete series of representations of SU{sub q}(1, 1)) are introduced and their properties investigated. The corresponding analytic representations, path integrals, and q-deformation of Berezin's quantization on C, a sphere, and the Lobatchevsky plane are discussed. (orig.).

  18. On coherent states for the simplest quantum groups

    Jurco, B.

    1991-01-01

    The coherent states for the simplest quantum groups (q-Heisenberg-Weyl, SU q (2) and the discrete series of representations of SU q (1, 1)) are introduced and their properties investigated. The corresponding analytic representations, path integrals, and q-deformation of Berezin's quantization on C, a sphere, and the Lobatchevsky plane are discussed. (orig.)

  19. Extended SUSY quantum mechanics, intertwining operators and coherent states

    Bagarello, F.

    2008-01-01

    We propose an extension of supersymmetric quantum mechanics which produces a family of isospectral Hamiltonians. Our procedure slightly extends the idea of intertwining operators. Several examples of the construction are given. Further, we show how to build up vector coherent states of the Gazeau-Klauder type associated to our Hamiltonians

  20. Unconditional quantum cloning of coherent states with linear optics

    Leuchs, G.; Andersen, U.L.; Josse, V.

    2005-01-01

    Intense light pulses with non-classical properties are used to implement protocols for quantum communication. Most of the elements in the tool box needed to assemble the experimental set-ups for these protocols are readily described by Bogoliubov transformations corresponding to Gaussian transformations that map Gaussian states onto Gaussian states. One particularly interesting application is quantum cloning of a coherent state. A scheme for optimal Gaussian cloning of optical coherent states is proposed and experimentally demonstrated. Its optical realization is based entirely on simple linear optical elements and homodyne detection. The optimality of the presented scheme is only limited by detection inefficiencies. Experimentally we achieved a cloning fidelity of about 65%, which almost touches the optimal value of 2/3. (author)

  1. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.

    Pirandola, Stefano; Braunstein, Samuel L; Lloyd, Seth

    2008-11-14

    We provide a simple description of the most general collective Gaussian attack in continuous-variable quantum cryptography. In the scenario of such general attacks, we analyze the asymptotic secret-key rates which are achievable with coherent states, joint measurements of the quadratures and one-way classical communication.

  2. Geometric measure of pairwise quantum discord for superpositions of multipartite generalized coherent states

    Daoud, M.; Ahl Laamara, R.

    2012-01-01

    We give the explicit expressions of the pairwise quantum correlations present in superpositions of multipartite coherent states. A special attention is devoted to the evaluation of the geometric quantum discord. The dynamics of quantum correlations under a dephasing channel is analyzed. A comparison of geometric measure of quantum discord with that of concurrence shows that quantum discord in multipartite coherent states is more resilient to dissipative environments than is quantum entanglement. To illustrate our results, we consider some special superpositions of Weyl–Heisenberg, SU(2) and SU(1,1) coherent states which interpolate between Werner and Greenberger–Horne–Zeilinger states. -- Highlights: ► Pairwise quantum correlations multipartite coherent states. ► Explicit expression of geometric quantum discord. ► Entanglement sudden death and quantum discord robustness. ► Generalized coherent states interpolating between Werner and Greenberger–Horne–Zeilinger states

  3. Geometric measure of pairwise quantum discord for superpositions of multipartite generalized coherent states

    Daoud, M., E-mail: m_daoud@hotmail.com [Department of Physics, Faculty of Sciences, University Ibnou Zohr, Agadir (Morocco); Ahl Laamara, R., E-mail: ahllaamara@gmail.com [LPHE-Modeling and Simulation, Faculty of Sciences, University Mohammed V, Rabat (Morocco); Centre of Physics and Mathematics, CPM, CNESTEN, Rabat (Morocco)

    2012-07-16

    We give the explicit expressions of the pairwise quantum correlations present in superpositions of multipartite coherent states. A special attention is devoted to the evaluation of the geometric quantum discord. The dynamics of quantum correlations under a dephasing channel is analyzed. A comparison of geometric measure of quantum discord with that of concurrence shows that quantum discord in multipartite coherent states is more resilient to dissipative environments than is quantum entanglement. To illustrate our results, we consider some special superpositions of Weyl–Heisenberg, SU(2) and SU(1,1) coherent states which interpolate between Werner and Greenberger–Horne–Zeilinger states. -- Highlights: ► Pairwise quantum correlations multipartite coherent states. ► Explicit expression of geometric quantum discord. ► Entanglement sudden death and quantum discord robustness. ► Generalized coherent states interpolating between Werner and Greenberger–Horne–Zeilinger states.

  4. Security of continuous-variable quantum cryptography using coherent states: Decline of postselection advantage

    Namiki, Ryo; Hirano, Takuya

    2005-01-01

    We investigate the security of continuous-variable (CV) quantum key distribution (QKD) using coherent states in the presence of quadrature excess noise. We consider an eavesdropping attack that uses a linear amplifier and a beam splitter. This attack makes a link between the beam-splitting attack and the intercept-resend attack (classical teleportation attack). We also show how postselection loses its efficiency in a realistic channel

  5. Security improvement by using a modified coherent state for quantum cryptography

    Lu, Y.J.; Zhu, Luobei; Ou, Z.Y.

    2005-01-01

    Weak coherent states as a photon source for quantum cryptography have a limit in secure data rate and transmission distance because of the presence of multiphoton events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4-dB improvement in the secure data rate or a nearly twofold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible

  6. Quantum bit string commitment protocol using polarization of mesoscopic coherent states

    Mendonca, Fabio Alencar; Ramos, Rubens Viana

    2008-01-01

    In this work, we propose a quantum bit string commitment protocol using polarization of mesoscopic coherent states. The protocol is described and its security against brute force and quantum cloning machine attack is analyzed

  7. Quantum bit string commitment protocol using polarization of mesoscopic coherent states

    Mendonça, Fábio Alencar; Ramos, Rubens Viana

    2008-02-01

    In this work, we propose a quantum bit string commitment protocol using polarization of mesoscopic coherent states. The protocol is described and its security against brute force and quantum cloning machine attack is analyzed.

  8. Quantum dual signature scheme based on coherent states with entanglement swapping

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  9. Quantum dual signature scheme based on coherent states with entanglement swapping

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  10. Coherent states of quantum systems. [Hamiltonians, variable magnetic field, adiabatic approximation

    Trifonov, D A

    1975-01-01

    Time-evolution of coherent states and uncertainty relations for quantum systems are considered as well as the relation between the various types of coherent states. The most general form of the Hamiltonians that keep the uncertainty products at a minimum is found using the coherent states. The minimum uncertainty packets are shown to be coherent states of the type nonstationary-system coherent states. Two specific systems, namely that of a generalized N-dimensional oscillator and that of a charged particle moving in a variable magnetic field, are treated as examples. The adiabatic approximation to the uncertainty products for these systems is also discussed and the minimality is found to be retained with an exponential accuracy.

  11. Continuous-variable quantum teleportation of even and odd coherent states through varied gain channels

    Li Ying; Zhang Jing; Zhang Jun-Xiang; Zhang Tian-Cai

    2006-01-01

    This paper has investigated quantum teleportation of even and odd coherent states in terms of the EPR entanglement states for continuous variables. It discusses the relationship between the fidelity and the entanglement of EPR states, which is characterized by the degree of squeezing and the gain of classical channels. It shows that the quality of teleporting quantum states also depends on the characteristics of the states themselves. The properties of teleporting even and odd coherent states at different intensities are investigated. The difference of teleporting two such kinds of quantum states are analysed based on the quantum distance function.

  12. Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol

    Chen, I-C; Hwang Tzonelih; Li C-M

    2008-01-01

    On the basis of the modified four-coherent-state post-selection quantum key distribution protocol (Namiki and Hirano 2006 Preprint quant-ph/0608144v1), two 1-out-of-2 quantum oblivious transfer (QOT 2 1 ) protocols are proposed. The first proposed protocol (called the receiver-based QOT 2 1 protocol) requires the coherent states to be prepared by the receiver, whereas the second protocol (called the sender-based QOT 2 1 protocol) allows the coherent states to be generated by the sender. The main advantages of the proposed protocols are that (i) no quantum bit commitment schemes and the assumption of quantum memory are needed; (ii) less communication cost between participants is required, i.e. the receiver-based QOT 2 1 protocol requires only one quantum communication and one classical communication and the sender-based QOT 2 1 protocol requires only one quantum communication between participants during protocol execution; and (iii) the utilization of quantum states is very efficient, wherein the receiver-based and the sender-based QOT 2 1 protocols use only two coherent pulses and one coherent pulse respectively for sending the sender's two messages

  13. Bound states in quantum field theory and coherent states: A fresh look

    Misra, S.P.

    1986-09-01

    We consider here bound state equations in quantum field theory where the state explicitly includes radiation quanta as constituents with the number of such quanta not fixed. The fully interacting system is dealt with through equal time commutators/anticommutators of field operators. The multiparticle channel for the radiation field is approximated through coherent state representations. (author)

  14. Error Free Quantum Reading by Quasi Bell State of Entangled Coherent States

    Hirota, Osamu

    2017-12-01

    Nonclassical states of light field have been exploited to provide marvellous results in quantum information science. Usefulness of nonclassical states in quantum information science depends on whether a physical parameter as a signal is continuous or discrete. Here we present an investigation of the potential of quasi Bell states of entangled coherent states in quantum reading of the classical digital memory which was pioneered by Pirandola (Phys.Rev.Lett.,106,090504,2011). This is a typical example of discrimination for discrete quantum parameters. We show that the quasi Bell state gives the error free performance in the quantum reading that cannot be obtained by any classical state.

  15. Coherent states and classical limit of algebraic quantum models

    Scutaru, H.

    1983-01-01

    The algebraic models for collective motion in nuclear physics belong to a class of theories the basic observables of which generate selfadjoint representations of finite dimensional, real Lie algebras, or of the enveloping algebras of these Lie algebras. The simplest and most used for illustrations model of this kind is the Lipkin model, which is associated with the Lie algebra of the three dimensional rotations group, and which presents all characteristic features of an algebraic model. The Lipkin Hamiltonian is the image, of an element of the enveloping algebra of the algebra SO under a representation. In order to understand the structure of the algebraic models the author remarks that in both classical and quantum mechanics the dynamics is associated to a typical algebraic structure which we shall call a dynamical algebra. In this paper he shows how the constructions can be made in the case of the algebraic quantum systems. The construction of the symplectic manifold M can be made in this case using a quantum analog of the momentum map which he defines

  16. Practical somewhat-secure quantum somewhat-homomorphic encryption with coherent states

    Tan, Si-Hui; Ouyang, Yingkai; Rohde, Peter P.

    2018-04-01

    We present a scheme for implementing homomorphic encryption on coherent states encoded using phase-shift keys. The encryption operations require only rotations in phase space, which commute with computations in the code space performed via passive linear optics, and with generalized nonlinear phase operations that are polynomials of the photon-number operator in the code space. This encoding scheme can thus be applied to any computation with coherent-state inputs, and the computation proceeds via a combination of passive linear optics and generalized nonlinear phase operations. An example of such a computation is matrix multiplication, whereby a vector representing coherent-state amplitudes is multiplied by a matrix representing a linear optics network, yielding a new vector of coherent-state amplitudes. By finding an orthogonal partitioning of the support of our encoded states, we quantify the security of our scheme via the indistinguishability of the encrypted code words. While we focus on coherent-state encodings, we expect that this phase-key encoding technique could apply to any continuous-variable computation scheme where the phase-shift operator commutes with the computation.

  17. Pseudo-Hermitian coherent states under the generalized quantum condition with position-dependent mass

    Yahiaoui, S A; Bentaiba, M

    2012-01-01

    In the context of the factorization method, we investigate the pseudo-Hermitian coherent states and their Hermitian counterpart coherent states under the generalized quantum condition in the framework of a position-dependent mass. By considering a specific modification in the superpotential, suitable annihilation and creation operators are constructed in order to reproduce the Hermitian counterpart Hamiltonian in the factorized form. We show that by means of these ladder operators, we can construct a wide range of exactly solvable potentials as well as their accompanying coherent states. Alternatively, we explore the relationship between the pseudo-Hermitian Hamiltonian and its Hermitian counterparts, obtained from a similarity transformation, to construct the associated pseudo-Hermitian coherent states. These latter preserve the structure of Perelomov’s states and minimize the generalized position–momentum uncertainty principle. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Quantum physics with non-Hermitian operators’. (paper)

  18. Generating single-photon catalyzed coherent states with quantum-optical catalysis

    Xu, Xue-xiang, E-mail: xuxuexiang@jxnu.edu.cn [Center for Quantum Science and Technology, Jiangxi Normal University, Nanchang 330022 (China); Yuan, Hong-chun [College of Electrical and Optoelectronic Engineering, Changzhou Institute of Technology, Changzhou 213002 (China)

    2016-07-15

    We theoretically generate single-photon catalyzed coherent states (SPCCSs) by means of quantum-optical catalysis based on the beam splitter (BS) or the parametric amplifier (PA). These states are obtained in one of the BS (or PA) output channels if a coherent state and a single-photon Fock state are present in two input ports and a single photon is registered in the other output port. The success probabilities of the detection (also the normalization factors) are discussed, which is different for BS and PA catalysis. In addition, we prove that the generated states catalyzed by BS and PA devices are actually the same quantum states after analyzing photon number distribution of the SPCCSs. The quantum properties of the SPCCSs, such as sub-Poissonian distribution, anti-bunching effect, quadrature squeezing effect, and the negativity of the Wigner function are investigated in detail. The results show that the SPCCSs are non-Gaussian states with an abundance of nonclassicality. - Highlights: • We generate single-photon catalyzed coherent states with quantum-optical catalysis. • We prove the equivalent effects of the lossless beam splitter and the non-degenerate parametric amplifier. • Some nonclassical properties of the generated states are investigated in detail.

  19. Fault-tolerant linear optical quantum computing with small-amplitude coherent States.

    Lund, A P; Ralph, T C; Haselgrove, H L

    2008-01-25

    Quantum computing using two coherent states as a qubit basis is a proposed alternative architecture with lower overheads but has been questioned as a practical way of performing quantum computing due to the fragility of diagonal states with large coherent amplitudes. We show that using error correction only small amplitudes (alpha>1.2) are required for fault-tolerant quantum computing. We study fault tolerance under the effects of small amplitudes and loss using a Monte Carlo simulation. The first encoding level resources are orders of magnitude lower than the best single photon scheme.

  20. Optimally cloned binary coherent states

    Müller, C. R.; Leuchs, G.; Marquardt, Ch.; Andersen, U. L.

    2017-10-01

    Binary coherent state alphabets can be represented in a two-dimensional Hilbert space. We capitalize this formal connection between the otherwise distinct domains of qubits and continuous variable states to map binary phase-shift keyed coherent states onto the Bloch sphere and to derive their quantum-optimal clones. We analyze the Wigner function and the cumulants of the clones, and we conclude that optimal cloning of binary coherent states requires a nonlinearity above second order. We propose several practical and near-optimal cloning schemes and compare their cloning fidelity to the optimal cloner.

  1. Quantum mechanical noise in coherent-state and squeezed-state Michelson interferometers

    Assaf, Ohad; Ben-Aryeh, Yacob

    2002-01-01

    In the present study we extend and generalize previous results for coherent-state and squeezed-state Michelson interferometer quantum mechanical uncertainties (or fluctuations), which are commonly referred to as 'quantum noise'. The calculation of photon counting (PC) fluctuations in the squeezed-state interferometer is extended to fourth-order correlation functions used as the measured signal. We also generalize a 'unified model' for treating both PC and radiation pressure fluctuations in the coherent-state interferometer, by using mathematical methods which apply to Kerr-type interactions. The results are more general than those reported previously in two ways. First, we obtain exact expressions, which lead to previous results under certain approximations. Second, we deal with cases in which the responses of the two mirrors to radiation pressure are not equal

  2. The quantum potential and ''causal'' trajectories for stationary states and for coherent states

    Barut, A.O.; Bozic, M.

    1988-07-01

    We show for stationary states in a central potential that the quantum action S is only a part of the classical action W and derive an expression for the ''quantum potential'' U Q in terms of the other part. The association of momenta of some ''particles'' in the causal interpretation of quantum mechanics by p-vector=∇S and by dp-vector'/dt=-∇(V+U Q ) gives for stationary states very different orbits which have no relation to classical orbits but express some flow properties of the quantum mechanical current. For coherent states, on the other hand, p-vector and p-vector' as well as the quantum mechanical average p-vector and classical momenta, all four, lead to essentially the same trajectories except for different integration constants. The spinning particle is also considered. (author). 27 refs, 2 figs

  3. The Generalized Coherent State ansatz: Application to quantum electron-vibrational dynamics

    Borrelli, Raffaele, E-mail: raffaele.borrelli@unito.it [DISAFA, Università di Torino, I-10095 Grugliasco (Italy); Gelin, Maxim F. [Departement of Chemistry, Technische Universität München, D-85747 Garching (Germany)

    2016-12-20

    A new ansatz for molecular vibronic wave functions based on a superposition of time-dependent Generalized Coherent States is developed and analysed. The methodology is specifically tailored to describe the time evolution of the wave function of a system in which several interacting electronic states are coupled to a bath of harmonic oscillators. The equations of motion for the wave packet parameters are obtained by using the Dirac–Frenkel time-dependent variational principle. The methodology is used to describe the quantum dynamical behavior of a model polaron system and its scaling and convergence properties are discussed and compared with numerically exact results.

  4. Quantum Properties of the Superposition of Two Nearly Identical Coherent States

    Othman, Anas; Yevick, David

    2018-04-01

    In this paper, we examine the properties of the state obtained when two nearly identical coherent states are superimposed. We found that this state exhibits many nonclassical properties such as sub-Poissonian statistics, squeezing and a partially negative Wigner function. These and other properties indicate that such states, here termed near coherent states, are significantly closer to coherent states more than the generalized Schrördinger cat states. We finally provide an experimental procedure for generating the near coherent states.

  5. Semiclassical description of quantum rotator in terms of SU(2) coherent states

    Gitman, D M; Petrusevich, D A; Shelepin, A L

    2013-01-01

    We introduce coordinates of the rigid body (rotator) using mutual positions between body-fixed and space-fixed reference frames. Wave functions that depend on such coordinates can be treated as scalar functions of the group SU(2). Irreducible representations of the group SU(2) × SU(2) in the space of such functions describe their possible transformations under independent rotations of the both reference frames. We construct sets of the corresponding group SU(2) × SU(2) Perelomov coherent states (CS) with a fixed angular momentum j of the rotator as special orbits of the latter group. Minimization of different uncertainty relations is discussed. The classical limit corresponds to the limit j → ∞. Considering Hamiltonians of rotators with different characteristics, we study the time evolution of the constructed CS. In some cases, the CS time evolution is completely or partially reduced to their parameter time evolution. If these parameters are chosen as Euler angles, then they obey the Euler equations in the classical limit. Quantum corrections to the motion of the quantum rotator can be found from exact equations on the CS parameters. (paper)

  6. Continuous-variable quantum cloning of coherent states with phase-conjugate input modes using linear optics

    Chen, Haixia; Zhang, Jing

    2007-01-01

    We propose a scheme for continuous-variable quantum cloning of coherent states with phase-conjugate input modes using linear optics. The quantum cloning machine yields M identical optimal clones from N replicas of a coherent state and N replicas of its phase conjugate. This scheme can be straightforwardly implemented with the setups accessible at present since its optical implementation only employs simple linear optical elements and homodyne detection. Compared with the original scheme for continuous-variable quantum cloning with phase-conjugate input modes proposed by Cerf and Iblisdir [Phys. Rev. Lett. 87, 247903 (2001)], which utilized a nondegenerate optical parametric amplifier, our scheme loses the output of phase-conjugate clones and is regarded as irreversible quantum cloning

  7. Single-quadrature continuous-variable quantum key distribution

    Gehring, Tobias; Jacobsen, Christian Scheffmann; Andersen, Ulrik Lund

    2016-01-01

    Most continuous-variable quantum key distribution schemes are based on the Gaussian modulation of coherent states followed by continuous quadrature detection using homodyne detectors. In all previous schemes, the Gaussian modulation has been carried out in conjugate quadratures thus requiring two...... commercialization of continuous-variable quantum key distribution, provided that the low noise requirement can be achieved....

  8. Complexified coherent states and quantum evolution with non-Hermitian Hamiltonians

    Graefe, Eva-Maria; Schubert, Roman

    2012-01-01

    The complex geometry underlying the Schrödinger dynamics of coherent states for non-Hermitian Hamiltonians is investigated. In particular, two seemingly contradictory approaches are compared: (i) a complex WKB formalism, for which the centres of coherent states naturally evolve along complex trajectories, which leads to a class of complexified coherent states; (ii) the investigation of the dynamical equations for the real expectation values of position and momentum, for which an Ehrenfest theorem has been derived in a previous paper, yielding real but non-Hamiltonian classical dynamics on phase space for the real centres of coherent states. Both approaches become exact for quadratic Hamiltonians. The apparent contradiction is resolved building on an observation by Huber, Heller and Littlejohn, that complexified coherent states are equivalent if their centres lie on a specific complex Lagrangian manifold. A rich underlying complex symplectic geometry is unravelled. In particular, a natural complex structure is identified that defines a projection from complex to real phase space, mapping complexified coherent states to their real equivalents. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’. (paper)

  9. Coherent states of the driven Rydberg atom: Quantum-classical correspondence of periodically driven systems

    Vela-Arevalo, Luz V.; Fox, Ronald F.

    2005-01-01

    A methodology to calculate generalized coherent states for a periodically driven system is presented. We study wave packets constructed as a linear combination of suitable Floquet states of the three-dimensional Rydberg atom in a microwave field. The driven coherent states show classical space localization, spreading, and revivals and remain localized along the classical trajectory. The microwave strength and frequency have a great effect in the localization of Floquet states, since quasienergy avoided crossings produce delocalization of the Floquet states, showing that tuning of the parameters is very important. Using wavelet-based time-frequency analysis, the classical phase-space structure is determined, which allows us to show that the driven coherent state is located in a large regular region in which the z coordinate is in resonance with the external field. The expectation values of the wave packet show that the driven coherent state evolves along the classical trajectory

  10. Quantum key management

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  11. On coherent-state representations of quantum mechanics: Wave mechanics in phase space

    Møller, Klaus Braagaard; Jørgensen, Thomas Godsk; Torres-Vega, Gabino

    1997-01-01

    In this article we argue that the state-vector phase-space representation recently proposed by Torres-Vega and co-workers [introduced in J. Chem. Phys. 98, 3103 (1993)] coincides with the totality of coherent-state representations for the Heisenberg-Weyl group. This fact leads to ambiguities when...

  12. Continuous variable quantum key distribution with modulated entangled states

    Madsen, Lars S; Usenko, Vladyslav C.; Lassen, Mikael

    2012-01-01

    Quantum key distribution enables two remote parties to grow a shared key, which they can use for unconditionally secure communication over a certain distance. The maximal distance depends on the loss and the excess noise of the connecting quantum channel. Several quantum key distribution schemes...... based on coherent states and continuous variable measurements are resilient to high loss in the channel, but are strongly affected by small amounts of channel excess noise. Here we propose and experimentally address a continuous variable quantum key distribution protocol that uses modulated fragile...... entangled states of light to greatly enhance the robustness to channel noise. We experimentally demonstrate that the resulting quantum key distribution protocol can tolerate more noise than the benchmark set by the ideal continuous variable coherent state protocol. Our scheme represents a very promising...

  13. Coherent states for FLRW space-times in loop quantum gravity

    Magliaro, Elena; Perini, Claudio; Marciano, Antonino

    2011-01-01

    We construct a class of coherent spin-network states that capture properties of curved space-times of the Friedmann-Lamaitre-Robertson-Walker type on which they are peaked. The data coded by a coherent state are associated to a cellular decomposition of a spatial (t=const) section with a dual graph given by the complete five-vertex graph, though the construction can be easily generalized to other graphs. The labels of coherent states are complex SL(2,C) variables, one for each link of the graph, and are computed through a smearing process starting from a continuum extrinsic and intrinsic geometry of the canonical surface. The construction covers both Euclidean and Lorentzian signatures; in the Euclidean case and in the limit of flat space we reproduce the simplicial 4-simplex semiclassical states used in spin foams.

  14. Quantum teleportation of an arbitrary two-mode coherent state using only linear optics elements

    Ho Ngoc Phien; Nguyen Ba An

    2008-01-01

    We propose a linear optics scheme to teleport an arbitrary two-mode coherent state. The devices used are beam-splitters, phase-shifters and ideal photo-detectors capable of distinguishing between even and odd photon numbers. The scheme achieves faithful teleportation with a probability of 1/4. However, with additional use of an appropriate displacement operator, the teleported state can always be made near-faithful

  15. Quantum dense key distribution

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  16. Application of quantum key distribution for mutual identification - experimental realization

    Dusek, M.; Haderka, O.; Hendrych, M.

    1998-01-01

    A secure quantum identification system combining a classical identification procedure and quantum key distribution is proposed. Each identification sequence is always used just once and new sequences are 're fuelled' from a shared secret key transferred over a quantum channel. The question of authentication of information sent over a public channel is discussed. An apparatus using two unbalanced Mach-Zehnder interferometers has been built, and quantum key distribution and 'quantum identification' have been successfully tested through a single-mode optical fibre at 830 nm, employing low intensity coherent states (below 0,1 photons per pulse). (author)

  17. On coherent states

    Polubarinov, I.V.

    1975-01-01

    A definition of the coherent state representation is given in this paper. In the representation quantum theory equations take the form of classical field theory equations (with causality inherent to the latter) not only in simple cases (free field and interactions with an external current or field), but also in the general case of closed systems of interacting fields. And, conversely, a classical field theory can be transformed into a form of a quantum one

  18. A discrete phase-space calculus for quantum spins based on a reconstruction method using coherent states

    Weigert, S.

    1999-01-01

    To reconstruct a mixed or pure quantum state of a spin s is possible through coherent states: its density matrix is fixed by the probabilities to measure the value s along 4s(s+1) appropriately chosen directions in space. Thus, after inverting the experimental data, the statistical operator is parametrized entirely by expectation values. On this basis, a symbolic calculus for quantum spins is developed, the e xpectation-value representation . It resembles the Moyal representation for SU(2) but two important differences exist. On the one hand, the symbols take values on a discrete set of points in phase space only. On the other hand, no quasi-probabilities - that is, phase-space distributions with negative values - are encountered in this approach. (Author)

  19. Fast and secure key distribution using mesoscopic coherent states of light

    Barbosa, Geraldo A.

    2003-01-01

    This work shows how two parties A and B can securely share unlimited sequences of random bits at optical speeds. A and B possess true-random physical sources and exchange random bits by using a random sequence received to cipher the following one to be sent. A starting shared secret key is used and the method can be described as a one-time-pad unlimited extender. It is demonstrated that the minimum probability of error in signal determination by the eavesdropper can be set arbitrarily close to the pure guessing level. Being based on the M-ry encryption protocol this method also allows for optical amplification without security degradation, offering practical advantages over the Bennett-Brassard 1984 protocol for key distribution

  20. The coherent state on SUq(2) homogeneous space

    Aizawa, N; Chakrabarti, R

    2009-01-01

    The generalized coherent states for quantum groups introduced by Jurco and StovIcek are studied for the simplest example SU q (2) in full detail. It is shown that the normalized SU q (2) coherent states enjoy the property of completeness, and allow a resolution of the unity. This feature is expected to play a key role in the application of these coherent states in physical models. The homogeneous space of SU q (2), i.e. the q-sphere of Podles, is reproduced in complex coordinates by using the coherent states. Differential calculus in the complex form on the homogeneous space is developed. The high spin limit of the SU q (2) coherent states is also discussed.

  1. Generalized hypergeometric coherent states

    Appl, Thomas; Schiller, Diethard H

    2004-01-01

    We introduce a large class of holomorphic quantum states by choosing their normalization functions to be given by generalized hypergeometric functions. We call them generalized hypergeometric states in general, and generalized hypergeometric coherent states in particular, if they allow a resolution of unity. Depending on the domain of convergence of the generalized hypergeometric functions, we distinguish generalized hypergeometric states on the plane, the open unit disc and the unit circle. All states are eigenstates of suitably defined lowering operators. We then study their photon number statistics and phase properties as revealed by the Husimi and Pegg-Barnett phase distributions. On the basis of the generalized hypergeometric coherent states we introduce new analytic representations of arbitrary quantum states in Bargmann and Hardy spaces as well as generalized hypergeometric Husimi distributions and corresponding phase distributions

  2. Coherent states, quantum gravity, and the Born-Oppenheimer approximation. I. General considerations

    Stottmeister, Alexander; Thiemann, Thomas

    2016-01-01

    This article, as the first of three, aims at establishing the (time-dependent) Born-Oppenheimer approximation, in the sense of space adiabatic perturbation theory, for quantum systems constructed by techniques of the loop quantum gravity framework, especially the canonical formulation of the latter. The analysis presented here fits into a rather general framework and offers a solution to the problem of applying the usual Born-Oppenheimer ansatz for molecular (or structurally analogous) systems to more general quantum systems (e.g., spin-orbit models) by means of space adiabatic perturbation theory. The proposed solution is applied to a simple, finite dimensional model of interacting spin systems, which serves as a non-trivial, minimal model of the aforesaid problem. Furthermore, it is explained how the content of this article and its companion affect the possible extraction of quantum field theory on curved spacetime from loop quantum gravity (including matter fields).

  3. Quantum Coherent States and Path Integral Method to Stochastically Determine the Anisotropic Volume Expansion in Lithiated Silicon Nanowires

    Donald C. Boone

    2017-10-01

    Full Text Available This computational research study will analyze the multi-physics of lithium ion insertion into a silicon nanowire in an attempt to explain the electrochemical kinetics at the nanoscale and quantum level. The electron coherent states and a quantum field version of photon density waves will be the joining theories that will explain the electron-photon interaction within the lithium-silicon lattice structure. These two quantum particles will be responsible for the photon absorption rate of silicon atoms that are hypothesized to be the leading cause of breaking diatomic silicon covalent bonds that ultimately leads to volume expansion. It will be demonstrated through the combination of Maxwell stress tensor, optical amplification and path integrals that a stochastic analyze using a variety of Poisson distributions that the anisotropic expansion rates in the <110>, <111> and <112> orthogonal directions confirms the findings ascertained in previous works made by other research groups. The computational findings presented in this work are similar to those which were discovered experimentally using transmission electron microscopy (TEM and simulation models that used density functional theory (DFT and molecular dynamics (MD. The refractive index and electric susceptibility parameters of lithiated silicon are interwoven in the first principle theoretical equations and appears frequently throughout this research presentation, which should serve to demonstrate the importance of these parameters in the understanding of this component in lithium ion batteries.

  4. Decoherence of quantum excitation of even/odd coherent states in ...

    2The Laboratory of Quantum Information Processing, Yazd University, Yazd, Iran. ∗ .... approach to obtain the decoherence time (by evaluating the time-dependent .... Recall that, while Fokker–Planck equation deals with the evolution of the ...

  5. Quantum key distribution with entangled photon sources

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-01-01

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses

  6. Quantum key distribution via quantum encryption

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  7. Geometry-based approach to studying the semi-classical limit in quantum dynamics by the coherent states and quantum mechanics on the torus

    Faure, F.

    1993-01-01

    This thesis deals with problems linked to the study of the semi-classical limit in quantum dynamics. The first part presents a geometrical formulation which is tantamount to the time dependent variational principle. The classical dynamics is considered as an orthogonal projection of the quantum dynamics on the family of coherent states. The angle of projection provides an information on the validity of the approximation. This angle is studied in an illustrating example. In the second part, we study quantum mechanics on the torus as a phase space, and particularly degeneracies in the spectrum of Harper like models or kicked Harper like models which manifest chaotic dynamics. These models find direct applications in solid state physics, especially with the quantum Hall effect. In this study, we use the Chern index, which is a topological characterization of the localization of the eigenfunctions as some periodicity conditions are changed. The use of the Husimi distribution provides a phase space representation of the quantum states. We discuss the role played by separatrix-states, by the effects of quantum tunneling, and by a classically chaotic dynamics. (orig.)

  8. Efficiency of coherent-state quantum cryptography in the presence of loss: Influence of realistic error correction

    Heid, Matthias; Luetkenhaus, Norbert

    2006-01-01

    We investigate the performance of a continuous-variable quantum key distribution scheme in a practical setting. More specifically, we take a nonideal error reconciliation procedure into account. The quantum channel connecting the two honest parties is assumed to be lossy but noiseless. Secret key rates are given for the case that the measurement outcomes are postselected or a reverse reconciliation scheme is applied. The reverse reconciliation scheme loses its initial advantage in the practical setting. If one combines postselection with reverse reconciliation, however, much of this advantage can be recovered

  9. Quantum cryptography beyond quantum key distribution

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation,

  10. Optimally cloned binary coherent states

    Mueller, C. R.; Leuchs, G.; Marquardt, Ch

    2017-01-01

    their quantum-optimal clones. We analyze the Wigner function and the cumulants of the clones, and we conclude that optimal cloning of binary coherent states requires a nonlinearity above second order. We propose several practical and near-optimal cloning schemes and compare their cloning fidelity to the optimal...

  11. Spherical reconciliation for a continuous-variable quantum key distribution

    Lu Zhao; Shi Jian-Hong; Li Feng-Guang

    2017-01-01

    Information reconciliation is a significant step for a continuous-variable quantum key distribution (CV-QKD) system. We propose a reconciliation method that allows two authorized parties to extract a consistent and secure binary key in a CV-QKD protocol, which is based on Gaussian-modulated coherent states and homodyne detection. This method named spherical reconciliation is based on spherical quantization and non-binary low-density parity-check (LDPC) codes. With the suitable signal-to-noise ratio (SNR) and code rate of non-binary LDPC codes, spherical reconciliation algorithm has a high efficiency and can extend the transmission distance of CV-QKD. (paper)

  12. Secure quantum key distribution

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  13. Quantum key distribution using continuous-variable non-Gaussian states

    Borelli, L. F. M.; Aguiar, L. S.; Roversi, J. A.; Vidiella-Barranco, A.

    2016-02-01

    In this work, we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the photon added then subtracted coherent states (PASCS) in which one photon is added and subsequently one photon is subtracted from the field. We analyze the performance of our protocol, compared with a coherent state-based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack, and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.

  14. Key distillation in quantum cryptography

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  15. Integration of quantum key distribution and private classical communication through continuous variable

    Wang, Tianyi; Gong, Feng; Lu, Anjiang; Zhang, Damin; Zhang, Zhengping

    2017-12-01

    In this paper, we propose a scheme that integrates quantum key distribution and private classical communication via continuous variables. The integrated scheme employs both quadratures of a weak coherent state, with encrypted bits encoded on the signs and Gaussian random numbers encoded on the values of the quadratures. The integration enables quantum and classical data to share the same physical and logical channel. Simulation results based on practical system parameters demonstrate that both classical communication and quantum communication can be implemented over distance of tens of kilometers, thus providing a potential solution for simultaneous transmission of quantum communication and classical communication.

  16. Decoy State Quantum Key Distribution

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  17. Painlevé IV coherent states

    Bermudez, David; Contreras-Astorga, Alonso; Fernández C, David J.

    2014-01-01

    A simple way to find solutions of the Painlevé IV equation is by identifying Hamiltonian systems with third-order differential ladder operators. Some of these systems can be obtained by applying supersymmetric quantum mechanics (SUSY QM) to the harmonic oscillator. In this work, we will construct families of coherent states for such subset of SUSY partner Hamiltonians which are connected with the Painlevé IV equation. First, these coherent states are built up as eigenstates of the annihilation operator, then as displaced versions of the extremal states, both involving the related third-order ladder operators, and finally as extremal states which are also displaced but now using the so called linearized ladder operators. To each SUSY partner Hamiltonian corresponds two families of coherent states: one inside the infinite subspace associated with the isospectral part of the spectrum and another one in the finite subspace generated by the states created through the SUSY technique. - Highlights: • We use SUSY QM to obtain Hamiltonians with third-order differential ladder operators. • We show that these systems are related with the Painlevé IV equation. • We apply different definitions of coherent states to these Hamiltonians using the third-order ladder operators and some linearized ones. • We construct families of coherent states for such systems, which we called Painlevé IV coherent states

  18. Painlevé IV coherent states

    Bermudez, David, E-mail: david.bermudez@weizmann.ac.il [Department of Physics of Complex Systems, Weizmann Institute of Science, Rehovot 76100 (Israel); Departamento de Física, Cinvestav, A.P. 14-740, 07000 México D.F. (Mexico); Contreras-Astorga, Alonso, E-mail: aloncont@iun.edu [Department of Mathematics and Actuarial Science, Indiana University Northwest, 3400 Broadway, Gary IN 46408 (United States); Departamento de Física, Cinvestav, A.P. 14-740, 07000 México D.F. (Mexico); Fernández C, David J., E-mail: david@fis.cinvestav.mx [Departamento de Física, Cinvestav, A.P. 14-740, 07000 México D.F. (Mexico)

    2014-11-15

    A simple way to find solutions of the Painlevé IV equation is by identifying Hamiltonian systems with third-order differential ladder operators. Some of these systems can be obtained by applying supersymmetric quantum mechanics (SUSY QM) to the harmonic oscillator. In this work, we will construct families of coherent states for such subset of SUSY partner Hamiltonians which are connected with the Painlevé IV equation. First, these coherent states are built up as eigenstates of the annihilation operator, then as displaced versions of the extremal states, both involving the related third-order ladder operators, and finally as extremal states which are also displaced but now using the so called linearized ladder operators. To each SUSY partner Hamiltonian corresponds two families of coherent states: one inside the infinite subspace associated with the isospectral part of the spectrum and another one in the finite subspace generated by the states created through the SUSY technique. - Highlights: • We use SUSY QM to obtain Hamiltonians with third-order differential ladder operators. • We show that these systems are related with the Painlevé IV equation. • We apply different definitions of coherent states to these Hamiltonians using the third-order ladder operators and some linearized ones. • We construct families of coherent states for such systems, which we called Painlevé IV coherent states.

  19. Detector decoy quantum key distribution

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  20. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  1. Coherent states and covariant semi-spectral measures

    Scutaru, H.

    1976-01-01

    The close connection between Mackey's theory of imprimitivity systems and the so called generalized coherent states introduced by Perelomov is established. Coherent states give a covariant description of the ''localization'' of a quantum system in the phase space in a similar way as the imprimitivity systems give a covariant description of the localization of a quantum system in the configuration space. The observation that for any system of coherent states one can define a covariant semi-spectral measure made possible a rigurous formulation of this idea. A generalization of the notion of coherent states is given. Covariant semi-spectral measures associated with systems of coherent states are defined and characterized. Necessary and sufficient conditions for a unitary representation of a Lie group to be i) a subrepresentation of an induced one and ii) a representation with coherent states are given (author)

  2. Coherent states: a contemporary panorama Coherent states: a contemporary panorama

    Twareque Ali, S.; Antoine, Jean-Pierre; Bagarello, Fabio; Gazeau, Jean-Pierre

    2012-06-01

    Coherent states (CS) of the harmonic oscillator (also called canonical CS) were introduced in 1926 by Schrödinger in answer to a remark by Lorentz on the classical interpretation of the wave function. They were rediscovered in the early 1960s, first (somewhat implicitly) by Klauder in the context of a novel representation of quantum states, then by Glauber and Sudarshan for the description of coherence in lasers. Since then, CS have grown into an extremely rich domain that pervades almost every corner of physics and have also led to the development of several flourishing topics in mathematics. Along the way, a number of review articles have appeared in the literature, devoted to CS, notably the 1985 reprint volume of Klauder and Skagerstam [1], the 1990 review paper by Zhang et al [2], the 1993 Oak Ridge Conference [3] and the 1995 review paper by Ali et al [4]. Textbooks also have been published, among which one might mention the ground breaking text of Perelomov [5] focusing on the group-theoretical aspects, that of Ali et al [6]1 analyzing systematically the mathematical structure beyond the group-theoretical approach and also the relation to wavelet analysis, that of Dodonov and Man'ko [7] mostly devoted to quantum optics, that of Gazeau [8] more oriented towards the physical, probabilistic and quantization aspects, and finally the very recent one by Combescure and Robert [9]. In retrospect, one can see that the development of CS has gone through a two-phase transition. First, the (simultaneous) discovery in 1972 by Gilmore and Perelomov that CS were rooted in group theory, then the realization that CS can be defined in a purely algebraic way, as an eigenvalue problem or by a series expansion (Malkin and Man'ko 1969, Barut and Girardello 1971, Gazeau and Klauder 1999; references to the original articles may be found in the textbooks quoted above). Both facts resulted in an explosive expansion of the CS literature. We thought, therefore, that the time was ripe

  3. Quantum key distribution and cryptography

    Alleaume, R.

    2005-01-01

    Full text: Originally proposed by classical cryptographers, the ideas behind Quantum Key Distribution (QKD) have attracted considerable interest among the quantum optics community, which has significantly helped bring these ideas to reality. Experimental realizations have quickly evolved from early lab demonstrations to QKD systems that are now deployed in real conditions and targeting commercial applications. Although QKD can be theoretically proven to rely on 'unconditional security proofs' and should thus be able to provide security levels unachievable through computationally-based cryptographic techniques, the debate on the cryptographic applications of QKD remains somehow controversial. It seems that a consensus on that matter cannot be reached without a careful analysis of assumptions and definitions related to security models used in classical or in quantum cryptography. In this talk, we will try to present a comprehensive synthesis on this topic. We have initiated this work as a contribution to the European IP SECOQC project, confronting views and knowledge among experimental and theoretical quantum physicists, as well as classical cryptographers. (author)

  4. Quantitative measures of entanglement in pair-coherent states

    Agarwal, G S; Biswas, Asoka

    2005-01-01

    The pair-coherent states for a two-mode radiation field are known to belong to a family of states with non-Gaussian wavefunction. The nature of quantum entanglement between the two modes and some features of non-classicality are studied for such states. The existing criterion for inseparability are examined in the context of pair-coherent states

  5. Gaussian cloning of coherent states with known phases

    Alexanian, Moorad

    2006-01-01

    The fidelity for cloning coherent states is improved over that provided by optimal Gaussian and non-Gaussian cloners for the subset of coherent states that are prepared with known phases. Gaussian quantum cloning duplicates all coherent states with an optimal fidelity of 2/3. Non-Gaussian cloners give optimal single-clone fidelity for a symmetric 1-to-2 cloner of 0.6826. Coherent states that have known phases can be cloned with a fidelity of 4/5. The latter is realized by a combination of two beam splitters and a four-wave mixer operated in the nonlinear regime, all of which are realized by interaction Hamiltonians that are quadratic in the photon operators. Therefore, the known Gaussian devices for cloning coherent states are extended when cloning coherent states with known phases by considering a nonbalanced beam splitter at the input side of the amplifier

  6. Symmetric autocompensating quantum key distribution

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  7. On the dynamics of generalized coherent states

    Nikolov, B.A.; Trifonov, D.A.

    1981-01-01

    The exact and stable evolutions of generalized coherent states (GCS) for quantum system are considered by making use of the time- dependent integrals of motion method and of the Klauder approach to the relationship between quantum and classical mechanics. It is shown that one can construct for any quantum system overcomplete family of states, related to the unitary representations of the Lie group G by means of integral of motion generators, and the possibility of using this group as a dynamic symmetry group is pointed out. The relation of the GCS with quantum measurement theory is also established [ru

  8. Quantum key distribution using three basis states

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  9. Continuous Variable Quantum Communication and Computation

    Andersen, Ulrik Lund; Dong, Ruifang; Jezek, Miroslav

    2011-01-01

    We use squeezed states of light to implement a robust continuous variable quantum key distribution scheme and an optical Hadamard gate based on coherent state qubits.......We use squeezed states of light to implement a robust continuous variable quantum key distribution scheme and an optical Hadamard gate based on coherent state qubits....

  10. Coherent states and rational surfaces

    Brody, Dorje C; Graefe, Eva-Maria

    2010-01-01

    The state spaces of generalized coherent states associated with special unitary groups are shown to form rational curves and surfaces in the space of pure states. These curves and surfaces are generated by the various Veronese embeddings of the underlying state space into higher dimensional state spaces. This construction is applied to the parameterization of generalized coherent states, which is useful for practical calculations, and provides an elementary combinatorial approach to the geometry of the coherent state space. The results are extended to Hilbert spaces with indefinite inner products, leading to the introduction of a new kind of generalized coherent states.

  11. Coherent states associated to the Jacobi group

    Berceanu, S.

    2007-01-01

    .The coherent states (CS) offer a useful connection between classical and quantum mechanics. In several previous works we have constructed CS attached to the Jacobi group. It is well known that the Jacobi group appears in Quantum Mechanics, Geometric Quantization, Optics. The mathematicians have given the name 'Jacobi group' to the semidirect product of the Heisenberg-Weyl group and the symplectic group. The same group is known to physicists under other names, as the Schroedinger group. Also the name 'Weyl-symplectic' group is used for the same semi-direct product of the Heisenberg-Weyl group and the symplectic group. In this paper we review and discuss some properties of the coherent states associated to the Jacobi group. (author)

  12. Field test of a continuous-variable quantum key distribution prototype

    Fossier, S; Debuisschert, T; Diamanti, E; Villing, A; Tualle-Brouri, R; Grangier, P

    2009-01-01

    We have designed and realized a prototype that implements a continuous-variable quantum key distribution (QKD) protocol based on coherent states and reverse reconciliation. The system uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation. The security of the system is guaranteed against general coherent eavesdropping attacks. The performance of the prototype was tested over preinstalled optical fibres as part of a quantum cryptography network combining different QKD technologies. The stable and automatic operation of the prototype over 57 h yielded an average secret key distribution rate of 8 kbit s -1 over a 3 dB loss optical fibre, including the key extraction process and all quantum and classical communication. This system is therefore ideal for securing communications in metropolitan size networks with high-speed requirements.

  13. Coherent states on horospheric three-dimensional Lobachevsky space

    Kurochkin, Yu., E-mail: y.kurochkin@ifanbel.bas-net.by; Shoukavy, Dz., E-mail: shoukavy@ifanbel.bas-net.by [Institute of Physics, National Academy of Sciences of Belarus, 68 Nezalezhnasci Ave., Minsk 220072 (Belarus); Rybak, I., E-mail: Ivan.Rybak@astro.up.pt [Institute of Physics, National Academy of Sciences of Belarus, 68 Nezalezhnasci Ave., Minsk 220072 (Belarus); Instituto de Astrofísica e Ciências do Espaço, CAUP, Rua das Estrelas, 4150-762 Porto (Portugal); Faculdade de Ciências, Universidade do Porto, Rua do Campo Alegre 687, 4169-007 Porto (Portugal)

    2016-08-15

    In the paper it is shown that due to separation of variables in the Laplace-Beltrami operator (Hamiltonian of a free quantum particle) in horospheric and quasi-Cartesian coordinates of three dimensional Lobachevsky space, it is possible to introduce standard (“conventional” according to Perelomov [Generalized Coherent States and Their Applications (Springer-Verlag, 1986), p. 320]) coherent states. Some problems (oscillator on horosphere, charged particle in analogy of constant uniform magnetic field) where coherent states are suitable for treating were considered.

  14. Quantum key distribution without sending a quantum signal

    Ralph, T C; Walk, N

    2015-01-01

    Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. While this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is considered we show it is possible to distribute an unconditionally secure secret key without sending a quantum signal, instead harnessing the intrinsic entanglement between different regions of space–time. The protocol is practical in free space given horizon technology and might be testable in principle in the near term using microwave technology. (paper)

  15. Hacking on decoy-state quantum key distribution system with partial phase randomization

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  16. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  17. Quantum key distribution network for multiple applications

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  18. Synchronization in Quantum Key Distribution Systems

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  19. Subcarrier multiplexing optical quantum key distribution

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  20. Secure quantum key distribution using squeezed states

    Gottesman, Daniel; Preskill, John

    2001-01-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e r =1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel

  1. Finite key analysis in quantum cryptography

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  2. Implementation of continuous-variable quantum key distribution with discrete modulation

    Hirano, Takuya; Ichikawa, Tsubasa; Matsubara, Takuto; Ono, Motoharu; Oguri, Yusuke; Namiki, Ryo; Kasai, Kenta; Matsumoto, Ryutaroh; Tsurumaru, Toyohiro

    2017-06-01

    We have developed a continuous-variable quantum key distribution (CV-QKD) system that employs discrete quadrature-amplitude modulation and homodyne detection of coherent states of light. We experimentally demonstrated automated secure key generation with a rate of 50 kbps when a quantum channel is a 10 km optical fibre. The CV-QKD system utilises a four-state and post-selection protocol and generates a secure key against the entangling cloner attack. We used a pulsed light source of 1550 nm wavelength with a repetition rate of 10 MHz. A commercially available balanced receiver is used to realise shot-noise-limited pulsed homodyne detection. We used a non-binary LDPC code for error correction (reverse reconciliation) and the Toeplitz matrix multiplication for privacy amplification. A graphical processing unit card is used to accelerate the software-based post-processing.

  3. Extended analysis of the Trojan-horse attack in quantum key distribution

    Vinay, Scott E.; Kok, Pieter

    2018-04-01

    The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.

  4. China demonstrates intercontinental quantum key distribution

    Johnston, Hamish

    2017-11-01

    A quantum cryptography key has been shared between Beijing and Vienna using a satellite - allowing the presidents of the Chinese Academy of Sciences and Austrian Academy of Sciences to communicate via a secure video link.

  5. Renyi information gain on quantum key

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  6. Non-linear wave packet dynamics of coherent states

    In recent years, the non-linear quantum dynamics of these states have revealed some striking features. It was found that under the action of a Hamil- tonian which is a non-linear function of the photon operator(s) only, an initial coherent state loses its coherent structure quickly due to quantum dephasing induced by the non-.

  7. Classical motion and coherent states for Poeschl-Teller potentials

    Cruz y Cruz, S.; Kuru, S.; Negro, J.

    2008-01-01

    The trigonometric and hyperbolic Poeschl-Teller potentials are dealt with from the point of view of classical and quantum mechanics. We show that there is a natural correspondence between the algebraic structure of these two approaches for both kind of potentials. Then, the coherent states are constructed and the appropriate classical variables are compared with the expected values of their corresponding quantum operators

  8. Projective measurement onto arbitrary superposition of weak coherent state bases

    Izumi, Shuro; Takeoka, Masahiro; Wakui, Kentaro

    2018-01-01

    One of the peculiar features in quantum mechanics is that a superposition of macroscopically distinct states can exist. In optical system, this is highlighted by a superposition of coherent states (SCS), i.e. a superposition of classical states. Recently this highly nontrivial quantum state and i...

  9. Coherent states on Hilbert modules

    Ali, S Twareque; Bhattacharyya, T; Roy, S S

    2011-01-01

    We generalize the concept of coherent states, traditionally defined as special families of vectors on Hilbert spaces, to Hilbert modules. We show that Hilbert modules over C*-algebras are the natural settings for a generalization of coherent states defined on Hilbert spaces. We consider those Hilbert C*-modules which have a natural left action from another C*-algebra, say A. The coherent states are well defined in this case and they behave well with respect to the left action by A. Certain classical objects like the Cuntz algebra are related to specific examples of coherent states. Finally we show that coherent states on modules give rise to a completely positive definite kernel between two C*-algebras, in complete analogy to the Hilbert space situation. Related to this, there is a dilation result for positive operator-valued measures, in the sense of Naimark. A number of examples are worked out to illustrate the theory. Some possible physical applications are also mentioned.

  10. Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack

    Luis A. Lizama-Pérez

    2014-06-01

    Full Text Available Physical implementations of quantum key distribution (QKD protocols, like the Bennett-Brassard (BB84, are forced to use attenuated coherent quantum states, because the sources of single photon states are not functional yet for QKD applications. However, when using attenuated coherent states, the relatively high rate of multi-photonic pulses introduces vulnerabilities that can be exploited by the photon number splitting (PNS attack to brake the quantum key. Some QKD protocols have been developed to be resistant to the PNS attack, like the decoy method, but those define a single photonic gain in the quantum channel. To overcome this limitation, we have developed a new QKD protocol, called ack-QKD, which is resistant to the PNS attack. Even more, it uses attenuated quantum states, but defines two interleaved photonic quantum flows to detect the eavesdropper activity by means of the quantum photonic error gain (QPEG or the quantum bit error rate (QBER. The physical implementation of the ack-QKD is similar to the well-known BB84 protocol.

  11. K-dimensional trio coherent states

    Yi, Hyo Seok; Nguyen, Ba An; Kim, Jaewan

    2004-01-01

    We introduce a novel class of higher-order, three-mode states called K-dimensional trio coherent states. We study their mathematical properties and prove that they form a complete set in a truncated Fock space. We also study their physical content by explicitly showing that they exhibit nonclassical features such as oscillatory number distribution, sub-Poissonian statistics, Cauchy-Schwarz inequality violation and phase-space quantum interferences. Finally, we propose an experimental scheme to realize the state with K = 2 in the quantized vibronic motion of a trapped ion

  12. Coherent states versus De Broglie-Wavelets

    Barut, A.O.

    1993-08-01

    There are two types of nonspreading localized wave forms representing a stable, individual, indivisible, single quantum particle with interference properties endowed with classical (hidden) parameters, i.e. initial positions and velocity: coherent states and wavelets. The first is exactly known for oscillator, the second for free particles. Their relation and their construction is discussed from a new unified point of view. We then extend this contraction to the Coulomb problem, where with the introduction of a new time variable T, nonspreading states are obtained. (author). 10 refs

  13. Two-way QKD with single-photon-added coherent states

    Miranda, Mario; Mundarain, Douglas

    2017-12-01

    In this work we present a two-way quantum key distribution (QKD) scheme that uses single-photon-added coherent states and displacement operations. The first party randomly sends coherent states (CS) or single-photon-added coherent states (SPACS) to the second party. The latter sends back the same state it received. Both parties decide which kind of states they are receiving by detecting or not a photon on the received signal after displacement operations. The first party must determine whether its sent and received states are equal; otherwise, the case must be discarded. We are going to show that an eavesdropper provided with a beam splitter gets the same information in any of the non-discarded cases. The key can be obtained by assigning 0 to CS and 1 to SPACS in the non-discarded cases. This protocol guarantees keys' security in the presence of a beam splitter attack even for states with a high number of photons in the sent signal. It also works in a lossy quantum channel, becoming a good bet for improving long-distance QKD.

  14. Coherent states for quadratic Hamiltonians

    Contreras-Astorga, Alonso; Fernandez C, David J; Velazquez, Mercedes

    2011-01-01

    The coherent states for a set of quadratic Hamiltonians in the trap regime are constructed. A matrix technique which allows us to directly identify the creation and annihilation operators will be presented. Then, the coherent states as simultaneous eigenstates of the annihilation operators will be derived, and will be compared with those attained through the displacement operator method. The corresponding wavefunction will be found, and a general procedure for obtaining several mean values involving the canonical operators in these states will be described. The results will be illustrated through the asymmetric Penning trap.

  15. Secure key distribution by swapping quantum entanglement

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  16. General sets of coherent states and the Jaynes-Cummings model

    Daoud, M.; Hussin, V.

    2002-01-01

    General sets of coherent states are constructed for quantum systems admitting a nondegenerate infinite discrete energy spectrum. They are eigenstates of an annihilation operator and satisfy the usual properties of standard coherent states. The application of such a construction to the quantum optics Jaynes-Cummings model leads to a new understanding of the properties of this model. (author)

  17. Parallel Device-Independent Quantum Key Distribution

    Jain, Rahul; Miller, Carl A.; Shi, Yaoyun

    2017-01-01

    A prominent application of quantum cryptography is the distribution of cryptographic keys with unconditional security. Recently, such security was extended by Vazirani and Vidick (Physical Review Letters, 113, 140501, 2014) to the device-independent (DI) scenario, where the users do not need to trust the integrity of the underlying quantum devices. The protocols analyzed by them and by subsequent authors all require a sequential execution of N multiplayer games, where N is the security parame...

  18. Asymmetric Penning trap coherent states

    Contreras-Astorga, Alonso; Fernandez, David J.

    2010-01-01

    By using a matrix technique, which allows to identify directly the ladder operators, the coherent states of the asymmetric Penning trap are derived as eigenstates of the appropriate annihilation operators. They are compared with those obtained through the displacement operator method.

  19. Geometry of spin coherent states

    Chryssomalakos, C.; Guzmán-González, E.; Serrano-Ensástiga, E.

    2018-04-01

    Spin states of maximal projection along some direction in space are called (spin) coherent, and are, in many respects, the ‘most classical’ available. For any spin s, the spin coherent states form a 2-sphere in the projective Hilbert space \

  20. Fully Device-Independent Quantum Key Distribution

    Vazirani, Umesh; Vidick, Thomas

    2014-10-01

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  1. Metropolitan Quantum Key Distribution with Silicon Photonics

    Darius Bunandar

    2018-04-01

    Full Text Available Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss. Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  2. Metropolitan Quantum Key Distribution with Silicon Photonics

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  3. Fundamental quantitative security in quantum key generation

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  4. Quantum key distribution with two-segment quantum repeaters

    Kampermann, Hermann; Abruzzo, Silvestre; Bruss, Dagmar [Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2014-07-01

    Quantum repeaters represent one possible way to achieve long-distance quantum key distribution. One way of improving the repeater rate and decreasing the memory coherence time is the usage of multiplexing. Motivated by the experimental fact that long-range connections are practically demanding, we extend the analysis of the quantum repeater multiplexing protocol to the case of short-range connections. We derive formulas for the repeater rate and we show that short-range connections lead to most of the benefits of a full-range multiplexing protocol. A less demanding QKD-protocol without quantum memories was recently introduced by Lo et al. We generalize this measurement-device-independent quantum key Distribution protocol to the scenario where the repeater Station contains also heralded quantum memories. We assume either single-photon sources or weak coherent pulse sources plus decay states. We show that it is possible to significantly outperform the original proposal, even in presence of decoherence of the quantum memory. We give formulas in terms of device imperfections i.e., the quantum bit error rate and the repeater rate.

  5. Finite key analysis in quantum cryptography

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  6. Interactive simulations for quantum key distribution

    Kohnle, Antje; Rizzoli, Aluna

    2017-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels. (paper)

  7. Interactive simulations for quantum key distribution

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  8. Coherent one-way quantum key distribution

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  9. Secret key rates in quantum key distribution using Renyi entropies

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  10. Three state quantum key distribution for small keys

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  11. Quantum election scheme based on anonymous quantum key distribution

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  12. Short Review on Quantum Key Distribution Protocols.

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  13. The coordinate coherent states approach revisited

    Miao, Yan-Gang; Zhang, Shao-Jun

    2013-01-01

    We revisit the coordinate coherent states approach through two different quantization procedures in the quantum field theory on the noncommutative Minkowski plane. The first procedure, which is based on the normal commutation relation between an annihilation and creation operators, deduces that a point mass can be described by a Gaussian function instead of the usual Dirac delta function. However, we argue this specific quantization by adopting the canonical one (based on the canonical commutation relation between a field and its conjugate momentum) and show that a point mass should still be described by the Dirac delta function, which implies that the concept of point particles is still valid when we deal with the noncommutativity by following the coordinate coherent states approach. In order to investigate the dependence on quantization procedures, we apply the two quantization procedures to the Unruh effect and Hawking radiation and find that they give rise to significantly different results. Under the first quantization procedure, the Unruh temperature and Unruh spectrum are not deformed by noncommutativity, but the Hawking temperature is deformed by noncommutativity while the radiation specturm is untack. However, under the second quantization procedure, the Unruh temperature and Hawking temperature are untack but the both spectra are modified by an effective greybody (deformed) factor. - Highlights: ► Suggest a canonical quantization in the coordinate coherent states approach. ► Prove the validity of the concept of point particles. ► Apply the canonical quantization to the Unruh effect and Hawking radiation. ► Find no deformations in the Unruh temperature and Hawking temperature. ► Provide the modified spectra of the Unruh effect and Hawking radiation.

  14. Quantum key distribution on Hannover Campus

    Duhme, Joerg; Franz, Torsten; Werner, Reinhard F. [Leibniz Universitaet Hannover, Institut fuer Theoretische Physik, AG Quanteninformation (Germany); Haendchen, Vitus; Eberle, Tobias; Schnabel, Roman [Albert Einstein Institut, Quantum Interferometry (Germany)

    2012-07-01

    We report on the progress of the implementation of an entanglement-based quantum key distribution on Hannover campus using squeezed gaussian states (continuous variables). This poster focuses on the theoretical aspects of the project. Experimental data has been compared with the theoretical simulation of the experimental setup. We especially discuss effects of the homodyne detection and postprocessing in use on the measurement outcome.

  15. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction

    Leverrier, Anthony

    2017-05-01

    Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U (n ) (instead of the symmetric group Sn as in usual de Finetti theorems), and by introducing generalized S U (2 ,2 ) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.

  16. Action–angle variables, ladder operators and coherent states

    Campoamor-Stursberg, R.; Gadella, M.; Kuru, Ş.; Negro, J.

    2012-01-01

    This Letter is devoted to the building of coherent states from arguments based on classical action–angle variables. First, we show how these classical variables are associated to an algebraic structure in terms of Poisson brackets. In the quantum context these considerations are implemented by ladder type operators and a structure known as spectrum generating algebra. All this allows to generate coherent states and thereby the correspondence of classical–quantum properties by means of the aforementioned underlying structure. This approach is illustrated with the example of the one-dimensional Pöschl–Teller potential system. -- Highlights: ► We study the building of coherent states from classical action–angle variables arguments. ► The classical variables are associated to an algebraic structure in terms of Poisson brackets. ► In the quantum context these considerations are implemented by ladder type operators. ► All this allows to formulate coherent states and the correspondence of classical–quantum properties.

  17. Coherent states for polynomial su(2) algebra

    Sadiq, Muhammad; Inomata, Akira

    2007-01-01

    A class of generalized coherent states is constructed for a polynomial su(2) algebra in a group-free manner. As a special case, the coherent states for the cubic su(2) algebra are discussed. The states so constructed reduce to the usual SU(2) coherent states in the linear limit

  18. Hybrid entanglement concentration assisted with single coherent state

    Guo Rui; Zhou Lan; Sheng Yu-Bo; Gu Shi-Pu; Wang Xing-Fu

    2016-01-01

    Hybrid entangled state (HES) is a new type of entanglement, which combines the advantages of an entangled polarization state and an entangled coherent state. HES is widely discussed in the applications of quantum communication and computation. In this paper, we propose three entanglement concentration protocols (ECPs) for Bell-type HES, W-type HES, and cluster-type HES, respectively. After performing these ECPs, we can obtain the maximally entangled HES with some success probability. All the ECPs exploit the single coherent state to complete the concentration. These protocols are based on the linear optics, which are feasible in future experiments. (paper)

  19. Multiparty quantum key agreement with single particles

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  20. Decoy-state quantum key distribution with two-way classical postprocessing

    Ma Xiongfeng; Fung, C.-H.F.; Chen Kai; Lo, H.-K.; Dupuis, Frederic; Tamaki, Kiyoshi

    2006-01-01

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD) protocols when a coherent-state source is used. Previously, data postprocessing schemes based on one-way classical communications were considered for use with decoy states. In this paper, we develop two data postprocessing schemes for the decoy-state method using two-way classical communications. Our numerical simulation (using parameters from a specific QKD experiment as an example) results show that our scheme is able to extend the maximal secure distance from 142 km (using only one-way classical communications with decoy states) to 181 km. The second scheme is able to achieve a 10% greater key generation rate in the whole regime of distances. We conclude that decoy-state QKD with two-way classical postprocessing is of practical interest

  1. Quantum key distribution without alternative measurements

    Cabello, A

    2000-01-01

    Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described. The scheme exhibits the following features. (a) It does not require that Alice and Bob choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit. (b) It allows Alice and Bob to generate a key of arbitrary length using a single quantum system (three EPR pairs), instead of a long sequence of them. (c) Detecting Eve requires the comparison of fewer bits. (d) Entanglement is an essential ingredient. The scheme assumes reliable measurements of the Bell operator. (20 refs).

  2. Feasibility of satellite quantum key distribution

    Bonato, Cristian; Tomaello, Andrea; Da Deppo, Vania; Naletto, Giampiero; Villoresi, Paolo

    2009-01-01

    In this paper we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected e...

  3. Quantum hacking on quantum key distribution using homodyne detection

    Huang, Jing-Zheng; Kunz-Jacques, Sébastien; Jouguet, Paul; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2014-03-01

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  4. On the dynamics of generalized coherent states

    Nikolov, B.A.; Trifonov, D.A.

    1981-01-01

    Using the Klauder approach the stable evolution of generalized coherent states (GCS) for some groups (SU(2), SU(1.1) and U(N)) is considered and it is shown that one and the same classical solution z(t) can correctly characterize the quantum evolution for many different (in general nonequivalent) systems. As examples some concrete systems are treated in greater detail: it is obtained that the nonstationary systems of the singular oscillator, of the particle motion in a magnetic field and of the oscillator with a friction all have stable SU(1.1) GCS whose quantum evolution is determined by one and the same classical function z(t). The physical properties of the constructed SU(1.1)GCS are discussed and it is shown particularly that in the case of discrete series Dsub(k)sup((+)) they are those states for which the quantum mean value coincides with the statistical one for an oscillator in a thermostat [ru

  5. Security of practical quantum key distribution systems

    Jain, Nitin

    2015-02-24

    This thesis deals with practical security aspects of quantum key distribution (QKD) systems. At the heart of the theoretical model of any QKD system lies a quantum-mechanical security proof that guarantees perfect secrecy of messages - based on certain assumptions. However, in practice, deviations between the theoretical model and the physical implementation could be exploited by an attacker to break the security of the system. These deviations may arise from technical limitations and operational imperfections in the physical implementation and/or unrealistic assumptions and insufficient constraints in the theoretical model. In this thesis, we experimentally investigate in depth several such deviations. We demonstrate the resultant vulnerabilities via proof-of-principle attacks on a commercial QKD system from ID Quantique. We also propose countermeasures against the investigated loopholes to secure both existing and future QKD implementations.

  6. Extensible router for a quantum key distribution network

    Zhang Tao; Mo Xiaofan; Han Zhengfu; Guo Guangcan

    2008-01-01

    Building a quantum key distribution network is crucial for practical quantum cryptography. We present a scheme to build a star topology quantum key distribution network based on wavelength division multiplexing which, with current technology, can connect at least a hundred users. With the scheme, a 4-user demonstration network was built up and key exchanges were performed

  7. Continuous-variable quantum key distribution in uniform fast-fading channels

    Papanastasiou, Panagiotis; Weedbrook, Christian; Pirandola, Stefano

    2018-03-01

    We investigate the performance of several continuous-variable quantum key distribution protocols in the presence of uniform fading channels. These are lossy channels whose transmissivity changes according to a uniform probability distribution. We assume the worst-case scenario where an eavesdropper induces a fast-fading process, where she chooses the instantaneous transmissivity while the remote parties may only detect the mean statistical effect. We analyze coherent-state protocols in various configurations, including the one-way switching protocol in reverse reconciliation, the measurement-device-independent protocol in the symmetric configuration, and its extension to a three-party network. We show that, regardless of the advantage given to the eavesdropper (control of the fading), these protocols can still achieve high rates under realistic attacks, within reasonable values for the variance of the probability distribution associated with the fading process.

  8. Geometry of generalized coherent states

    Bacry, H.; Centre National de la Recherche Scientifique, 13 - Marseille; Grossmann, A.; Zak, J.

    1975-09-01

    Various attempts have been made to generalize the concept of coherent states (c.s.). One of them, due to Perelomov, seems to be very promising but no restrictive enough. The Perelomov c.s. are briefly reviewed. One shows how his definition gives rise to Radcliffe's c.s. Relationship between the usual and Radcliffe's c.s. can be investigated either from group contraction point of view (Arecchi et al.) or from a physical point of view (with the aid of the Poincare sphere of elliptic polarizations of electromagnetic plane waves). The question of finding complete subsets of c.s. is revisited and an attempt is made to restrict the Perelomov definition [fr

  9. Nuclear structure with coherent states

    Raduta, Apolodor Aristotel

    2015-01-01

    This book covers the essential features of a large variety of nuclear structure properties, both collective and microscopic in nature. Most of results are given in an analytical form thus giving deep insight into the relevant phenomena. Using coherent states as variational states, which allows a description in the classical phase space, or provides the generating function for a boson basis, is an efficient tool to account, in a realistic fashion, for many complex properties. A detailed comparison with all existing nuclear structure models provides readers with a proper framework and, at the same time, demonstrates the prospects for new developments. The topics addressed are very much of current concern in the field. The book will appeal to practicing researchers and, due to its self-contained account, can also be successfully read and used by new graduate students.

  10. QCD jets from coherent states

    Curci, G [European Organization for Nuclear Research, Geneva (Switzerland); Greco, M; Srivastava, Y [Istituto Nazionale di Fisica Nucleare, Frascati (Italy). Lab. Nazionale di Frascati

    1979-11-19

    A recently proposed approach to the problem of infrared and mass singularities in QCD based on the formalism of coherent states, is extended to discuss massless quark and gluon jets. The present results include all leading (ln delta) terms as well as finite terms in the energy loss epsilon, in addition to the usual ln epsilon associated with ln delta. The formulae agree with explicit perturbative calculations, whenever available. Explicit expressions for the total Ksub(T) distributions are given which take into account transverse-momentum conservation. Predictions are also made for the Q/sup 2/ dependence of the mean Ksub(T)/sup 2/ for quark and gluon jets. The jet ksub(T) distributions are extrapolated for low ksub(T) and shown to describe with good accuracy the data for eanti e..-->..qanti q..-->.. hadrons. Numerical predictions are also presented for the forthcoming PETRA, PEP and LEP machines.

  11. Privacy amplification for quantum key distribution

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  12. The utility of affine variables and affine coherent states

    Klauder, John R

    2012-01-01

    Affine coherent states are generated by affine kinematical variables much like canonical coherent states are generated by canonical kinematical variables. Although all classical and quantum formalisms normally entail canonical variables, it is shown that affine variables can serve equally well for many classical and quantum studies. This general purpose analysis provides tools to discuss two major applications: (1) the completely successful quantization of a nonrenormalizable scalar quantum field theory by affine techniques, in complete contrast to canonical techniques which only offer triviality; and (2) a formulation of the kinematical portion of quantum gravity that favors affine kinematical variables over canonical kinematical variables, and which generates a framework in which a favorable analysis of the constrained dynamical issues can take place. All this is possible because of the close connection between the affine and the canonical stories, while the few distinctions can be used to advantage when appropriate. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’. (review)

  13. The dependence of fidelity on the squeezing parameter in teleportation of the squeezed coherent states

    Zhang Jing-Tao; He Guang-Qiang; Ren Li-Jie; Zeng Gui-Hua

    2011-01-01

    This paper investigates an analytical expression of teleportation fidelity in the teleportation scheme of a single mode of electromagnetic field. The fidelity between the original squeezed coherent state and the teleported one is expressed in terms of the squeezing parameter r and the quantum channel parameter (two-mode squeezed state) p. The results of analysis show that the fidelity increases with the increase of the quantum channel parameter p, while the fidelity decreases with the increase of the squeezing parameter r of the squeezed state. Thus the coherent state (r = 0)is the best quantum signal for continuous variable quantum teleportation once the quantum channel is built.

  14. Space division multiplexing chip-to-chip quantum key distribution

    Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld

    2017-01-01

    nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum...

  15. Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction

    Zhao, Yijia; Zhang, Yichen; Xu, Bingjie; Yu, Song; Guo, Hong

    2018-04-01

    The method of improving the performance of continuous-variable quantum key distribution protocols by postselection has been recently proposed and verified. In continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocols, the measurement results are obtained from untrusted third party Charlie. There is still not an effective method of improving CV-MDI QKD by the postselection with untrusted measurement. We propose a method to improve the performance of coherent-state CV-MDI QKD protocol by virtual photon subtraction via non-Gaussian postselection. The non-Gaussian postselection of transmitted data is equivalent to an ideal photon subtraction on the two-mode squeezed vacuum state, which is favorable to enhance the performance of CV-MDI QKD. In CV-MDI QKD protocol with non-Gaussian postselection, two users select their own data independently. We demonstrate that the optimal performance of the renovated CV-MDI QKD protocol is obtained with the transmitted data only selected by Alice. By setting appropriate parameters of the virtual photon subtraction, the secret key rate and tolerable excess noise are both improved at long transmission distance. The method provides an effective optimization scheme for the application of CV-MDI QKD protocols.

  16. Quantum information theory with Gaussian systems

    Krueger, O.

    2006-04-06

    This thesis applies ideas and concepts from quantum information theory to systems of continuous-variables such as the quantum harmonic oscillator. The focus is on three topics: the cloning of coherent states, Gaussian quantum cellular automata and Gaussian private channels. Cloning was investigated both for finite-dimensional and for continuous-variable systems. We construct a private quantum channel for the sequential encryption of coherent states with a classical key, where the key elements have finite precision. For the case of independent one-mode input states, we explicitly estimate this precision, i.e. the number of key bits needed per input state, in terms of these parameters. (orig.)

  17. Quantum information theory with Gaussian systems

    Krueger, O.

    2006-01-01

    This thesis applies ideas and concepts from quantum information theory to systems of continuous-variables such as the quantum harmonic oscillator. The focus is on three topics: the cloning of coherent states, Gaussian quantum cellular automata and Gaussian private channels. Cloning was investigated both for finite-dimensional and for continuous-variable systems. We construct a private quantum channel for the sequential encryption of coherent states with a classical key, where the key elements have finite precision. For the case of independent one-mode input states, we explicitly estimate this precision, i.e. the number of key bits needed per input state, in terms of these parameters. (orig.)

  18. Coherent states in constrained systems

    Nakamura, M.; Kojima, K.

    2001-01-01

    When quantizing the constrained systems, there often arise the quantum corrections due to the non-commutativity in the re-ordering of constraint operators in the products of operators. In the bosonic second-class constraints, furthermore, the quantum corrections caused by the uncertainty principle should be taken into account. In order to treat these corrections simultaneously, the alternative projection technique of operators is proposed by introducing the available minimal uncertainty states of the constraint operators. Using this projection technique together with the projection operator method (POM), these two kinds of quantum corrections were investigated

  19. Generalized coherent states for the Coulomb problem in one dimension

    Nouri, S.

    2002-01-01

    A set of generalized coherent states for the one-dimensional Coulomb problem in coordinate representation is constructed. At first, we obtain a mapping for proper transformation of the one-dimensional Coulomb problem into a nonrotating four-dimensional isotropic harmonic oscillator in the hyperspherical space, and the generalized coherent states for the one-dimensional Coulomb problem is then obtained in exact closed form. This exactly soluble model can provide an adequate means for a quantum coherency description of the Coulomb problem in one dimension, sample for coherent aspects of the exciton model in one-dimension example in high-temperature superconductivity, semiconductors, and polymers. Also, it can be useful for investigating the coherent scattering of the Coulomb particles in one dimension

  20. The semiclassical coherent state propagator in the Weyl representation

    Braun, Carol; Li, Feifei; Garg, Anupam; Stone, Michael

    2015-01-01

    It is shown that the semiclassical coherent state propagator takes its simplest form when the quantum mechanical Hamiltonian is replaced by its Weyl symbol in defining the classical action, in that there is then no need for a Solari-Kochetov correction. It is also shown that such a correction exists if a symbol other than the Weyl symbol is chosen and that its form is different depending on the symbol chosen. The various forms of the propagator based on different symbols are shown to be equivalent provided the correspondingly correct Solari-Kochetov correction is included. All these results are shown for both particle and spin coherent state propagators. The global anomaly in the fluctuation determinant is further elucidated by a study of the connection between the discrete fluctuation determinant and the discrete Jacobi equation

  1. Coherent State Quantization and Moment Problem

    J. P. Gazeau

    2010-01-01

    Full Text Available Berezin-Klauder-Toeplitz (“anti-Wick” or “coherent state” quantization of the complex plane, viewed as the phase space of a particle moving on the line, is derived from the resolution of the unity provided by the standard (or gaussian coherent states. The construction of these states and their attractive properties are essentially based on the energy spectrum of the harmonic oscillator, that is on natural numbers. We follow in this work the same path by considering sequences of non-negative numbers and their associated “non-linear” coherent states. We illustrate our approach with the 2-d motion of a charged particle in a uniform magnetic field. By solving the involved Stieltjes moment problem we construct a family of coherent states for this model. We then proceed with the corresponding coherent state quantization and we show that this procedure takes into account the circle topology of the classical motion.

  2. Quantum tele-amplification with a continuous-variable superposition state

    Neergaard-Nielsen, Jonas S.; Eto, Yujiro; Lee, Chang-Woo

    2013-01-01

    -enhanced functions such as coherent-state quantum computing (CSQC), quantum metrology and a quantum repeater could be realized in the networks. Optical cat states are now routinely generated in laboratories. An important next challenge is to use them for implementing the aforementioned functions. Here, we......Optical coherent states are classical light fields with high purity, and are essential carriers of information in optical networks. If these states could be controlled in the quantum regime, allowing for their quantum superposition (referred to as a Schrödinger-cat state), then novel quantum...... demonstrate a basic CSQC protocol, where a cat state is used as an entanglement resource for teleporting a coherent state with an amplitude gain. We also show how this can be extended to a loss-tolerant quantum relay of multi-ary phase-shift keyed coherent states. These protocols could be useful in both...

  3. Coherent states approach to Penning trap

    Fernandez, David J; Velazquez, Mercedes

    2009-01-01

    By using a matrix technique, which allows us to identify directly the ladder operators, the Penning trap coherent states are derived as eigenstates of the appropriate annihilation operators. These states are compared with those obtained through the displacement operator. The associated wavefunctions and mean values for some relevant operators in these states are also evaluated. It turns out that the Penning trap coherent states minimize the Heisenberg uncertainty relation

  4. Analytic coherent states for generalized potentials

    Nieto, M.M.; Simmons, L.M. Jr.

    1978-01-01

    A prescription is given for finding coherent states in generalized potentials. By coherent states is meant states which in time follow the motion that a classical particle would. This prescription is based upon finding those natural classical variables which vary as the sine and the cosine of the classical ω/sub c/t. As an example, the symmetric Rosen--Morse potential is discussed in detail

  5. Coherent states, pseudodifferential analysis and arithmetic

    Unterberger, André

    2012-06-01

    Basic questions regarding families of coherent states include describing some constructions of such and the way they can be applied to operator theory or partial differential equations. In both questions, pseudodifferential analysis is important. Recent developments indicate that they can contribute to methods in arithmetic, especially modular form theory. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’.

  6. Quantum Key Distribution Using Four-Qubit W State

    Cai Haijing; Song Heshan

    2006-01-01

    A new theoretical quantum key distribution scheme based on entanglement swapping is proposed, where four-qubit symmetric W state functions as quantum channel. It is shown that two legitimate users can secretly share a series of key bits by using Bell-state measurements and classical communication.

  7. Special issue on coherent states: mathematical and physical aspects Special issue on coherent states: mathematical and physical aspects

    Twareque Ali, Syed; Antoine, Jean-Pierre; Bagarello, Fabio; Gazeau, Jean-Pierre

    2011-07-01

    This is a call for contributions to a special issue of Journal of Physics A: Mathematical and Theoretical dedicated to coherent states. The motivation behind this special issue is to gather in a single comprehensive volume the main aspects (past and present), latest developments, different viewpoints and directions being followed in this multidisciplinary field. Given the impressive development of the field in the past two decades, the topicality of such a volume can hardly be overemphasized. We strongly believe that such a special issue could become a particularly valuable reference for the broad scientific community working in mathematical and theoretical physics, as well as in signal processing and mathematics. Editorial policy The Guest Editors for this issue will be Syed Twareque Ali, Jean-Pierre Antoine, Fabio Bagarello and Jean-Pierre Gazeau. Potential topics include, but are not limited to, developments in the theory and applications of coherent states in: quantum optics, optomechanics, Bose-Einstein condensates quantum information, quantum measurement signal processing quantum gravity pseudo-Hermitian quantum mechanics supersymmetric quantum mechanics non-commutative quantum mechanics quantization theory harmonic and functional analysis operator theory Berezin-Toeplitz operators, PT-symmetric operators holomorphic representation theory, reproducing kernel spaces generalization of coherent states All contributions will be refereed and processed according to the usual procedure of the journal. Papers should report original and significant research that has not already been published. Guidelines for preparation of contributions The deadline for contributed papers will be 31 October 2011. This deadline will allow the special issue to appear before the end of May 2012 There is a nominal page limit of 15 printed pages per contribution (invited review papers can be longer). For papers exceeding this limit, the Guest Editors reserve the right to request a

  8. A probabilistic CNOT gate for coherent state qubits

    Oliveira, M.S.R.; Vasconcelos, H.M.; Silva, J.B.R.

    2013-01-01

    We propose a scheme for implementing a probabilistic controlled-NOT (CNOT) gate for coherent state qubits using only linear optics and a particular four-mode state. The proposed optical setup works, as a CNOT gate, near-faithful when |α| 2 ⩾25 and independent of the input state. The key element for realizing the proposed CNOT scheme is the entangled four-mode state.

  9. A probabilistic CNOT gate for coherent state qubits

    Oliveira, M.S.R.; Vasconcelos, H.M.; Silva, J.B.R., E-mail: joaobrs@ufc.br

    2013-11-22

    We propose a scheme for implementing a probabilistic controlled-NOT (CNOT) gate for coherent state qubits using only linear optics and a particular four-mode state. The proposed optical setup works, as a CNOT gate, near-faithful when |α|{sup 2}⩾25 and independent of the input state. The key element for realizing the proposed CNOT scheme is the entangled four-mode state.

  10. Feasibility of quantum key distribution through a dense wavelength division multiplexing network

    Qi Bing; Qian Li; Lo, Hoi-Kwong; Zhu Wen

    2010-01-01

    In this paper, we study the feasibility of conducting quantum key distribution (QKD) together with classical communication through the same optical fiber by employing dense-wavelength-division-multiplexing (DWDM) technology at telecom wavelength. The impact of classical channels on the quantum channel has been investigated for both QKD based on single-photon detection and QKD based on homodyne detection. Our studies show that the latter can tolerate a much higher level of contamination from classical channels than the former. This is because the local oscillator used in the homodyne detector acts as a 'mode selector', which can suppress noise photons effectively. We have performed simulations based on both the decoy BB84 QKD protocol and the Gaussian-modulated coherent state (GMCS) QKD protocol. While the former cannot tolerate even one classical channel (with a power of 0 dBm), the latter can be multiplexed with 38 classical channels (0 dBm power per channel) and still has a secure distance around 10 km. A preliminary experiment has been conducted based on a 100 MHz bandwidth homodyne detector.

  11. Four-State Continuous-Variable Quantum Key Distribution with Photon Subtraction

    Li, Fei; Wang, Yijun; Liao, Qin; Guo, Ying

    2018-06-01

    Four-state continuous-variable quantum key distribution (CVQKD) is one of the discretely modulated CVQKD which generates four nonorthogonal coherent states and exploits the sign of the measured quadrature of each state to encode information rather than uses the quadrature \\hat {x} or \\hat {p} itself. It has been proven that four-state CVQKD is more suitable than Gaussian modulated CVQKD in terms of transmission distance. In this paper, we propose an improved four-state CVQKD using an non-Gaussian operation, photon subtraction. A suitable photon-subtraction operation can be exploited to improve the maximal transmission of CVQKD in point-to-point quantum communication since it provides a method to enhance the performance of entanglement-based (EB) CVQKD. Photon subtraction not only can lengthen the maximal transmission distance by increasing the signal-to-noise rate but also can be easily implemented with existing technologies. Security analysis shows that the proposed scheme can lengthen the maximum transmission distance. Furthermore, by taking finite-size effect into account we obtain a tighter bound of the secure distance, which is more practical than that obtained in the asymptotic limit.

  12. Discrimination of optical coherent states using a photon number resolving detector

    Wittmann, C.; Andersen, Ulrik Lund; Leuchs, G.

    2010-01-01

    The discrimination of non-orthogonal quantum states with reduced or without errors is a fundamental task in quantum measurement theory. In this work, we investigate a quantum measurement strategy capable of discriminating two coherent states probabilistically with significantly smaller error...... probabilities than can be obtained using non-probabilistic state discrimination. We find that appropriate postselection of the measurement data of a photon number resolving detector can be used to discriminate two coherent states with small error probability. We compare our new receiver to an optimal...

  13. Experimental demonstration of subcarrier multiplexed quantum key distribution system.

    Mora, José; Ruiz-Alba, Antonio; Amaya, Waldimar; Martínez, Alfonso; García-Muñoz, Víctor; Calvo, David; Capmany, José

    2012-06-01

    We provide, to our knowledge, the first experimental demonstration of the feasibility of sending several parallel keys by exploiting the technique of subcarrier multiplexing (SCM) widely employed in microwave photonics. This approach brings several advantages such as high spectral efficiency compatible with the actual secure key rates, the sharing of the optical fainted pulse by all the quantum multiplexed channels reducing the system complexity, and the possibility of upgrading with wavelength division multiplexing in a two-tier scheme, to increase the number of parallel keys. Two independent quantum SCM channels featuring a sifted key rate of 10 Kb/s/channel over a link with quantum bit error rate <2% is reported.

  14. Quantum key distribution with an entangled light emitting diode

    Dzurnak, B.; Stevenson, R. M.; Nilsson, J.; Dynes, J. F.; Yuan, Z. L.; Skiba-Szymanska, J.; Shields, A. J. [Toshiba Research Europe Limited, 208 Science Park, Milton Road, Cambridge CB4 0GZ (United Kingdom); Farrer, I.; Ritchie, D. A. [Cavendish Laboratory, University of Cambridge, JJ Thomson Avenue, Cambridge CB3 0HE (United Kingdom)

    2015-12-28

    Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurements also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.

  15. Quantum key distribution over multicore fiber based on silicon photonics

    Ding, Yunhong; Bacco, Davide; Dalgaard, Kjeld

    on quantum physics. In order to exchange secure information between users, quantum key distribution (QKD), a branch of Quantum Communications (QCs), provides good prospects for ultimate security based on the laws of quantum mechanics [2–7]. Most of QKD systems are implemented in a point-to-point link using...... generations, to HD-entanglement distribution. Furthermore, MCFs are expected as a good candidate for overcoming the capacity limit of a current optical communication system, as example the record capacity of 661 Tbits/s was obtained last year with a 30-cores fiber [8]. Proof of concept experiment has already...... requirements in terms of key generation are needed. A solution may be represented by new technologies applied to quantum world. In particular multicore fiber (MCF) open a new scenario for quantum communications, from high-dimensional (HD) spatial entanglement generation, to HD QKD and multi-user key...

  16. Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation

    Liu, Wen-Jie; Chen, Zhen-Yu; Ji, Sai; Wang, Hai-Bin; Zhang, Jun

    2017-10-01

    A multi-party semi-quantum key agreement (SQKA) protocol based on delegating quantum computation (DQC) model is proposed by taking Bell states as quantum resources. In the proposed protocol, the participants only need the ability of accessing quantum channel and preparing single photons {|0〉, |1〉, |+〉, |-〉}, while the complicated quantum operations, such as the unitary operations and Bell measurement, will be delegated to the remote quantum center. Compared with previous quantum key agreement protocols, this client-server model is more feasible in the early days of the emergence of quantum computers. In order to prevent the attacks from outside eavesdroppers, inner participants and quantum center, two single photon sequences are randomly inserted into Bell states: the first sequence is used to perform the quantum channel detection, while the second is applied to disorder the positions of message qubits, which guarantees the security of the protocol.

  17. Dynamics of coherent states in regular and chaotic regimes of the non-integrable Dicke model

    Lerma-Hernández, S.; Chávez-Carlos, J.; Bastarrachea-Magnani, M. A.; López-del-Carpio, B.; Hirsch, J. G.

    2018-04-01

    The quantum dynamics of initial coherent states is studied in the Dicke model and correlated with the dynamics, regular or chaotic, of their classical limit. Analytical expressions for the survival probability, i.e. the probability of finding the system in its initial state at time t, are provided in the regular regions of the model. The results for regular regimes are compared with those of the chaotic ones. It is found that initial coherent states in regular regions have a much longer equilibration time than those located in chaotic regions. The properties of the distributions for the initial coherent states in the Hamiltonian eigenbasis are also studied. It is found that for regular states the components with no negligible contribution are organized in sequences of energy levels distributed according to Gaussian functions. In the case of chaotic coherent states, the energy components do not have a simple structure and the number of participating energy levels is larger than in the regular cases.

  18. Coherent states and related quantizations for unbounded motions

    Bagrov, V G; Gazeau, J-P; Gitman, D M; Levin, A D

    2012-01-01

    We discuss the construction of coherent states (CS) for systems with continuous spectra. First, we propose to adopt the Malkin–Manko approach, developed for systems with discrete spectra, to the case under consideration. Following this approach, we consider two examples, a free particle and a particle in a linear potential. Second, we generalize the approach of action-angle CS to systems with continuous spectra. In the first approach we start with a well-defined quantum formulation (canonical quantization) of a physical system and the construction of CS follows from such a quantization. In the second approach, the quantization procedure is inherent to the CS construction itself. (paper)

  19. Inequivalent coherent state representations in group field theory

    Kegeles, Alexander; Oriti, Daniele; Tomlin, Casey

    2018-06-01

    In this paper we propose an algebraic formulation of group field theory and consider non-Fock representations based on coherent states. We show that we can construct representations with an infinite number of degrees of freedom on compact manifolds. We also show that these representations break translation symmetry. Since such representations can be regarded as quantum gravitational systems with an infinite number of fundamental pre-geometric building blocks, they may be more suitable for the description of effective geometrical phases of the theory.

  20. The SUSY oscillator from local geometry: Dynamics and coherent states

    Thienel, H.P.

    1994-01-01

    The choice of a coordinate chart on an analytical R n (R a n ) provides a representation of the n-dimensional SUSY oscillator. The corresponding Hilbert space is Cartan's exterior algebra endowed with a suitable scalar product. The exterior derivative gives rise to the algebra of the n-dimensional SUSY oscillator. Its euclidean dynamics is an inherent consequence of the geometry imposed by the Lie derivative generating the dilations, i.e. evolution of the quantum system corresponds to parametrization of a sequence of charts by euclidean time. Coherent states emerge as a natural structure related to the Lie derivative generating the translations. (orig.)

  1. One Step Quantum Key Distribution Based on EPR Entanglement.

    Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao

    2016-06-30

    A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.

  2. Affine coherent states and Toeplitz operators

    Hutníková, Mária; Hutník, Ondrej

    2012-06-01

    We study a parameterized family of Toeplitz operators in the context of affine coherent states based on the Calderón reproducing formula (= resolution of unity on L_2( {R})) and the specific admissible wavelets (= affine coherent states in L_2( {R})) related to Laguerre functions. Symbols of such Calderón-Toeplitz operators as individual coordinates of the affine group (= upper half-plane with the hyperbolic geometry) are considered. In this case, a certain class of pseudo-differential operators, their properties and their operator algebras are investigated. As a result of this study, the Fredholm symbol algebras of the Calderón-Toeplitz operator algebras for these particular cases of symbols are described. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’.

  3. von Neumann's hypothesis concerning coherent states

    Zak, J

    2003-01-01

    An orthonormal basis of modified coherent states is constructed. Each member of the basis is an infinite sum of coherent states on a von Neumann lattice. A single state is assigned to each unit cell of area h (Planck constant) in the phase plane. The uncertainties of the coordinate x and the square of the momentum p 2 for these states are shown to be similar to those for the usual coherent states. Expansions in the newly established set are discussed and it is shown that any function in the kq-representation can be written as a sum of two fixed kq-functions. Approximate commuting operators for x and p 2 are defined on a lattice in phase plane according to von Neumann's prescription. (leeter to the editor)

  4. Authenticated multi-user quantum key distribution with single particles

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  5. Quantum mechanics - a key to understanding magnetism

    Van Vleck, J.H.

    1978-01-01

    A translation is presented of J.H. van Vleck's lecture read at the 1977 Nobel Prize avarding ceremony. The basic results obtained using quantum mechanics in solving the problems of magnetism and especially paramagnetism are chronologically arranged. (Z.J.)

  6. Hilbert W*-modules and coherent states

    Bhattacharyya, T; Roy, S Shyam

    2012-01-01

    Hilbert C*-module valued coherent states was introduced earlier by Ali, Bhattacharyya and Shyam Roy. We consider the case when the underlying C*-algebra is a W*-algebra. The construction is similar with a substantial gain. The associated reproducing kernel is now algebra valued, rather than taking values in the space of bounded linear operators between two C*-algebras. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’. (paper)

  7. Photon nonlinear mixing in subcarrier multiplexed quantum key distribution systems.

    Capmany, José

    2009-04-13

    We provide, for the first time to our knowledge, an analysis of the influence of nonlinear photon mixing on the end to end quantum bit error rate (QBER) performance of subcarrier multiplexed quantum key distribution systems. The results show that negligible impact is to be expected for modulation indexes in the range of 2%.

  8. Reply to 'Comment on 'Quantum dense key distribution''

    Degiovanni, I.P.; Berchera, I. Ruo; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2005-01-01

    In this Reply we propose a modified security proof of the quantum dense key distribution protocol, detecting also the eavesdropping attack proposed by Wojcik in his Comment [Wojcik, Phys. Rev. A 71, 016301 (2005)

  9. Toward Designing a Quantum Key Distribution Network Simulation Model

    Miralem Mehic; Peppino Fazio; Miroslav Voznak; Erik Chromy

    2016-01-01

    As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. In this paper, we described the design of simplified simulation environment of the quantum key distribution network with multiple links and nodes. In such simulation environment, we analyzed several ...

  10. Unconditional security of quantum key distribution and the uncertainty principle

    Koashi, Masato

    2006-01-01

    An approach to the unconditional security of quantum key distribution protocols is presented, which is based on the uncertainty principle. The approach applies to every case that has been treated via the argument by Shor and Preskill, but it is not necessary to find quantum error correcting codes. It can also treat the cases with uncharacterized apparatuses. The proof can be applied to cases where the secret key rate is larger than the distillable entanglement

  11. Semiquantum-key distribution using less than four quantum states

    Zou Xiangfu; Qiu Daowen; Li Lvzhou; Wu Lihua; Li Lvjun

    2009-01-01

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  12. Efficient quantum secure communication with a publicly known key

    Li Chunyan; Li Xihan; Deng Fuguo; Zhou Hongyu

    2008-01-01

    This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently. (general)

  13. Information cloning of harmonic oscillator coherent states

    We show that in the case of unknown harmonic oscillator coherent statesit is possible to achieve what we call perfect information cloning. By this we mean that it is still possible to make arbitrary number of copies of a state which has exactly the same information content as the original unknown coherent state. By making use ...

  14. Coherent states in the fermionic Fock space

    Oeckl, Robert

    2015-01-01

    We construct the coherent states in the sense of Gilmore and Perelomov for the fermionic Fock space. Our treatment is from the outset adapted to the infinite-dimensional case. The fermionic Fock space becomes in this way a reproducing kernel Hilbert space of continuous holomorphic functions. (paper)

  15. Generation of picosecond pulsed coherent state superpositions

    Dong, Ruifang; Tipsmark, Anders; Laghaout, Amine

    2014-01-01

    We present the generation of approximated coherent state superpositions-referred to as Schrodinger cat states-by the process of subtracting single photons from picosecond pulsed squeezed states of light. The squeezed vacuum states are produced by spontaneous parametric down-conversion (SPDC...... which exhibit non-Gaussian behavior. (C) 2014 Optical Society of America...

  16. Testing nonlocal realism with entangled coherent states

    Paternostro, Mauro; Jeong, Hyunseok

    2010-01-01

    We investigate the violation of nonlocal realism using entangled coherent states (ECSs) under nonlinear operations and homodyne measurements. We address recently proposed Leggett-type inequalities, including a class of optimized incompatibility inequalities proposed by Branciard et al. [Nature Phys. 4, 681 (2008)], and thoroughly assess the effects of detection inefficiency.

  17. Quantum key distribution session with 16-dimensional photonic states

    Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.

    2013-01-01

    The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033

  18. Security by quantum key distribution and IPSEC (SEQKEIP): feasibility

    Sfaxi, M.A.; Ghernaouti-Helie, S.; Ribordy, G; Gay, O.

    2005-01-01

    Full text: Classical cryptography algorithms are based on mathematical functions. The robustness of a given cryptosystem is based essentially on the secrecy of its (private) key and the difficulty with which the inverse of its one-way function(s) can be calculated. Unfortunately, there is no mathematical proof that will establish whether it is not possible to find the inverse of a given one-way function. On the contrary, quantum cryptography is a method for sharing secret keys, whose security can be formally demonstrated. It is based on the laws of physics. The possible applications of quantum cryptography are mainly linked to telecommunication services that require very high level of security. Quantum cryptography could be integrated in various existing concepts and protocols. One of the possible use of quantum cryptography is within IPSEC. The aim of this paper is to analyse the feasibility of using quantum cryptography in IPSEC and to present the estimated performances of this solution. (author)

  19. Pisot q-coherent states quantization of the harmonic oscillator

    Gazeau, J.P., E-mail: gazeau@apc.univ-paris7.fr [Laboratoire APC, Univ. Paris Diderot, Sorbonne Paris Cite, 75205 Paris (France); Olmo, M.A. del, E-mail: olmo@fta.uva.es [Departamento de Fisica Teorica and IMEVA, Universidad de Valladolid, E-47005, Valladolid (Spain)

    2013-03-15

    We revisit the quantized version of the harmonic oscillator obtained through a q-dependent family of coherent states. For each q, 0quantum oscillator: localization in the configuration and in the phase spaces, angle operator, probability distributions and related statistical features, time evolution and semi-classical phase space trajectories. - Highlights: Black-Right-Pointing-Pointer Quantized version of the harmonic oscillator (HO) through a q-family of coherent states. Black-Right-Pointing-Pointer For q,0quantum oscillator.

  20. The University of Canberra quantum key distribution testbed

    Ganeshkumar, G.; Edwards, P.J.; Cheung, W.N.; Barbopoulos, L.O.; Pham, H.; Hazel, J.C.

    1999-01-01

    Full text: We describe the design, operation and preliminary results obtained from a quantum key distribution (QKD) testbed constructed at the University of Canberra. Quantum cryptographic systems use shared secret keys exchanged in the form of sequences of polarisation coded or phase encoded single photons transmitted over an optical communications channel. Secrecy of this quantum key rests upon fundamental laws of quantum physics: measurements of linear or circular photon polarisation states introduce noise into the conjugate variable and so reveal eavesdropping. In its initial realisation reported here, pulsed light from a 650nm laser diode is attenuated by a factor of 10 6 , plane-polarised and then transmitted through a birefringent liquid crystal modulator (LCM) to a polarisation sensitive single photon receiver. This transmitted key sequence consists of a 1 kHz train of weak coherent 100ns wide light pulses, polarisation coded according to the BB84 protocol. Each pulse is randomly assigned one of four polarisation states (two orthogonal linear and two orthogonal circular) by computer PCA operated by the sender ('Alice'). This quaternary polarisation shift keyed photon stream is detected by the receiver ('Bob') whose computer (PCB) randomly chooses either a linear or a circular polarisation basis. Computer PCB is also used for final key selection, authentication, privacy amplification and eavesdropping. We briefly discuss the realisation of a mesoscopic single photon QKD source and the use of the testbed to simulate a global quantum key distribution system using earth satellites. Copyright (1999) Australian Optical Society

  1. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    Zhang Sheng; Wang Jian; Tang Chaojing; Zhang Quan

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function. (general)

  2. Randomness determines practical security of BB84 quantum key distribution

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  3. Trojan horse attacks on counterfactual quantum key distribution

    Yang, Xiuqing, E-mail: xqqyang@163.com [School of Science, Beijing Jiaotong University, Beijing 100044 (China); College of Science, Inner Mongolia University of Technology, 010051 Hohhot (China); Wei, Kejin; Ma, Haiqiang [School of Science, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Sun, Shihai, E-mail: shsun@nudt.edu.cn [Department of Physics, National University of Defense Technology, Changsha 410073 (China); Du, Yungang [College of Science, Inner Mongolia University of Technology, 010051 Hohhot (China); Wu, Lingan [Laboratory of Optical Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100080 (China)

    2016-04-22

    There has been much interest in “counterfactual quantum cryptography” (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes. - Highlights: • We find the attacks available for the two-way protocol become possible for the practical counterfactual systems. • It does not require the assumption that it works on the counterfactual systems only in a finite key scenario. • Compared to the other attack models, our scheme is relatively simple for an eavesdropper.

  4. Construction of the Barut–Girardello quasi coherent states for the Morse potential

    Popov, Dušan, E-mail: dusan_popov@yahoo.co.uk [“Politehnica” University of Timişoara, Department of Physical Foundations of Engineering, 2 Vasile Pârvan Blvd., 300223 Timisoara (Romania); Dong, Shi-Hai, E-mail: dongsh2@yahoo.com [Escuela Superior de Física y Matemáticas, Instituto Politécnico Nacional, Edificio 9, Unidad Profesional Adolfo López Mateos, México D. F. 07738 (Mexico); Pop, Nicolina, E-mail: popnico2000@yahoo.com [“Politehnica” University of Timişoara, Department of Physical Foundations of Engineering, 2 Vasile Pârvan Blvd., 300223 Timisoara (Romania); Sajfert, Vjekoslav, E-mail: sajfertv@open.telekom.rs [Technical Faculty “M. Pupin” Zrenjanin, University of Novi Sad, Djure Djakovica bb, 23000 Zrenjanin (Serbia); Şimon, Simona, E-mail: simon_cristina@hotmail.com [“Politehnica” University of Timişoara, Faculty of Communication Sciences, 2A Traian Lalescu St, 300223 Timişoara (Romania)

    2013-12-15

    The Morse oscillator (MO) potential occupies a privileged place among the anharmonic oscillator potentials due to its applications in quantum mechanics to diatomic or polyatomic molecules, spectroscopy and so on. For this potential some kinds of coherent states (especially of the Klauder–Perelomov and Gazeau–Klauder kinds) have been constructed previously. In this paper we construct the coherent states of the Barut–Girardello kind (BG-CSs) for the MO potential, which have received less attention in the scientific literature. We obtain these CSs and demonstrate that they fulfil all conditions required by the coherent state. The Mandel parameter for the pure BG-CSs and Husimi’s and P-quasi distribution functions (for the mixed-thermal states) are also presented. Finally, we show that all obtained results for the BG-CSs of MO tend, in the harmonic limit, to the corresponding results for the coherent states of the one dimensional harmonic oscillator (CSs for the HO-1D). -- Highlights: •Construct the coherent states of the Barut–Girardello kind (BG-CSs) for the MO potential. •They fulfil all the conditions needed to a coherent state. •Present the Mandel parameter and Husimi’s and P-quasi distribution functions. •All results tend to those for the one dimensional harmonic oscillator in its harmonic limit.

  5. Experimental aspects of deterministic secure quantum key distribution

    Walenta, Nino; Korn, Dietmar; Puhlmann, Dirk; Felbinger, Timo; Hoffmann, Holger; Ostermeyer, Martin [Universitaet Potsdam (Germany). Institut fuer Physik; Bostroem, Kim [Universitaet Muenster (Germany)

    2008-07-01

    Most common protocols for quantum key distribution (QKD) use non-deterministic algorithms to establish a shared key. But deterministic implementations can allow for higher net key transfer rates and eavesdropping detection rates. The Ping-Pong coding scheme by Bostroem and Felbinger[1] employs deterministic information encoding in entangled states with its characteristic quantum channel from Bob to Alice and back to Bob. Based on a table-top implementation of this protocol with polarization-entangled photons fundamental advantages as well as practical issues like transmission losses, photon storage and requirements for progress towards longer transmission distances are discussed and compared to non-deterministic protocols. Modifications of common protocols towards a deterministic quantum key distribution are addressed.

  6. Infinite-mode squeezed coherent states and non-equilibrium statistical mechanics (phase-space-picture approach)

    Yeh, L.

    1992-01-01

    The phase-space-picture approach to quantum non-equilibrium statistical mechanics via the characteristic function of infinite- mode squeezed coherent states is introduced. We use quantum Brownian motion as an example to show how this approach provides an interesting geometrical interpretation of quantum non-equilibrium phenomena

  7. Quantum key distribution for composite dimensional finite systems

    Shalaby, Mohamed; Kamal, Yasser

    2017-06-01

    The application of quantum mechanics contributes to the field of cryptography with very important advantage as it offers a mechanism for detecting the eavesdropper. The pioneering work of quantum key distribution uses mutually unbiased bases (MUBs) to prepare and measure qubits (or qudits). Weak mutually unbiased bases (WMUBs) have weaker properties than MUBs properties, however, unlike MUBs, a complete set of WMUBs can be constructed for systems with composite dimensions. In this paper, we study the use of weak mutually unbiased bases (WMUBs) in quantum key distribution for composite dimensional finite systems. We prove that the security analysis of using a complete set of WMUBs to prepare and measure the quantum states in the generalized BB84 protocol, gives better results than using the maximum number of MUBs that can be constructed, when they are analyzed against the intercept and resend attack.

  8. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    Kiktenko, Evgeniy O.

    2017-01-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  9. Generation of entangled coherent states for distant Bose-Einstein condensates via electromagnetically induced transparency

    Kuang, L.-M.; Chen Zengbing; Pan Jianwei

    2007-01-01

    We propose a method to generate entangled coherent states between two spatially separated atomic Bose-Einstein condensates (BECs) via the technique of electromagnetically induced transparency (EIT). Two strong coupling laser beams and two entangled probe laser beams are used to cause two distant BECs to be in EIT states and to generate an atom-photon entangled state between probe lasers and distant BECs. The two BECs are initially in unentangled product coherent states while the probe lasers are initially in an entangled state. Entangled states of two distant BECs can be created through the performance of projective measurements upon the two outgoing probe lasers under certain conditions. Concretely, we propose two protocols to show how to generate entangled coherent states of the two distant BECs. One is a single-photon scheme in which an entangled single-photon state is used as the quantum channel to generate entangled distant BECs. The other is a multiphoton scheme where an entangled coherent state of the probe lasers is used as the quantum channel. Additionally, we also obtain some atom-photon entangled states of particular interest such as entangled states between a pair of optical Bell states (or quasi-Bell-states) and a pair of atomic entangled coherent states (or quasi-Bell-states)

  10. Practical quantum key distribution with polarization-entangled photons

    Poppe, A.; Fedrizzi, A.; Boehm, H.; Ursin, R.; Loruenser, T.; Peev, M.; Maurhardt, O.; Suda, M.; Kurtsiefer, C.; Weinfurter, H.; Jennewein, T.; Zeilinger, A.

    2005-01-01

    Full text: We present an entangled-state quantum cryptography system that operated for the first time in a real-world application scenario. The full key generation protocol was performed in real-time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. A source for polarization-entangled photons delivered about 8200 entangled photon pairs per second. After transmission to the distant receivers, a mean value of 468 pairs per second remained for the generation of a raw key, which showed an average qubit error rate of 6.4 %. The raw key was sifted and subsequently processed by a classical protocol which included error correction and privacy amplification. The final secure key bit rate was about 76 bits per second. The generated quantum key was then handed over and used by a secure communication application. (author)

  11. De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography.

    Renner, R; Cirac, J I

    2009-03-20

    We show that the quantum de Finetti theorem holds for states on infinite-dimensional systems, provided they satisfy certain experimentally verifiable conditions. This result can be applied to prove the security of quantum key distribution based on weak coherent states or other continuous variable states against general attacks.

  12. Toward Designing a Quantum Key Distribution Network Simulation Model

    Miralem Mehic

    2016-01-01

    Full Text Available As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. In this paper, we described the design of simplified simulation environment of the quantum key distribution network with multiple links and nodes. In such simulation environment, we analyzed several routing protocols in terms of the number of sent routing packets, goodput and Packet Delivery Ratio of data traffic flow using NS-3 simulator.

  13. Robustness bounds and practical limitations of quantum key distribution

    Khalique, Aeysha

    2008-01-01

    Quantum information theory is a modern branch of theoretical physics. One of its main goals is to interpret concepts of quantum physics. This leads to a deeper understanding of quantum theory. The most common examples of practical applications of basic quantum theory are quantum computation and quantum cryptography. Quantum cryptography provides secure communication between legitimate users even in the presence of an adversary by making possible the distribution of a secret key. It then allows error correction and privacy amplification, which is elimination of adversary information, through classical communication. In this thesis two important aspects of quantum key distribution are covered, namely robustness bounds with respect to provable entanglement for ideal protocols and practical quantum key distribution using two-way classical communication. In part one of the thesis, ideal quantum key distribution protocols and their robustness in terms of provable entanglement are discussed. The robustness bounds are proved for most general coherent attacks. These bounds for provable entanglement are already known to be 25% for the four-state protocol and 33% for the six-state protocol. We anticipate to provide a region in which the legitimate users share entanglement. This region is large for the four-state protocol and is reduced to a smaller region for the six-state protocol because of additional constraint on it. We also investigate the information cost which the adversary has to pay in order to reach these bounds. In part two we adopt a more practical approach. We investigate the limitation on distance of secure communication because of practical restrictions. In particular we investigate the restrictions due to the lack of single photon sources, the lossy channel and faulty detectors. These practical limitations have already been observed using one-way classical communication between legitimate users. It has been observed that it is actually the dark count rate that

  14. Entanglement Generation with Deformed Barut-Girardello Coherent States as Input States in a Unitary Beam Splitter

    Berrada, K.; Benmoussa, A.; Hassouni, Y.

    2010-07-01

    Using linear entropy as a measure of entanglement, we investigate the entanglement generated via a beam splitter using deformed Barut-Girardello coherent states. We show that the degree of entanglement depends strongly on the q-deformation parameter and amplitude Z of the states. We compute the Mandel Q parameter to examine the quantum statistical properties of these coherent states and make a comparison with the Glauber coherent states. It is shown that these states are useful to describe the states of real and ideal lasers by a proper choice of their characterizing parameters, using an alteration of the Holstein-Primakoff realization. (author)

  15. Optimal attacks on qubit-based Quantum Key Recycling

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  16. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  17. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  18. Device-independent quantum key distribution secure against collective attacks

    Pironio, Stefano; Gisin, Nicolas; AcIn, Antonio; Brunner, Nicolas; Massar, Serge; Scarani, Valerio

    2009-01-01

    Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. In this paper, we present in detail the security proof for a DIQKD protocol introduced in AcIn et al (2008 Phys. Rev. Lett. 98 230501). This proof exploits the full structure of quantum theory (as opposed to other proofs that exploit only the no-signaling principle), but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol (although she can act coherently on her systems at any time). The security of any DIQKD protocol necessarily relies on the violation of a Bell inequality. We discuss the issue of loopholes in Bell experiments in this context.

  19. Memory-assisted measurement-device-independent quantum key distribution

    Panayi, Christiana; Razavi, Mohsen; Ma, Xiongfeng; Lütkenhaus, Norbert

    2014-04-01

    A protocol with the potential of beating the existing distance records for conventional quantum key distribution (QKD) systems is proposed. It borrows ideas from quantum repeaters by using memories in the middle of the link, and that of measurement-device-independent QKD, which only requires optical source equipment at the user's end. For certain memories with short access times, our scheme allows a higher repetition rate than that of quantum repeaters with single-mode memories, thereby requiring lower coherence times. By accounting for various sources of nonideality, such as memory decoherence, dark counts, misalignment errors, and background noise, as well as timing issues with memories, we develop a mathematical framework within which we can compare QKD systems with and without memories. In particular, we show that with the state-of-the-art technology for quantum memories, it is potentially possible to devise memory-assisted QKD systems that, at certain distances of practical interest, outperform current QKD implementations.

  20. Quantum key distribution using card, base station and trusted authority

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T.; Dallmann, Nicholas

    2017-06-14

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  1. Quantum key distribution using card, base station and trusted authority

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson; Peterson, Charles Glen; Rosenberg, Danna; McCabe, Kevin Peter; Tyagi, Kush T; Dallman, Nicholas

    2015-04-07

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or for other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.

  2. Quantum-key-distribution protocol with pseudorandom bases

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  3. Method for adding nodes to a quantum key distribution system

    Grice, Warren P

    2015-02-24

    An improved quantum key distribution (QKD) system and method are provided. The system and method introduce new clients at intermediate points along a quantum channel, where any two clients can establish a secret key without the need for a secret meeting between the clients. The new clients perform operations on photons as they pass through nodes in the quantum channel, and participate in a non-secret protocol that is amended to include the new clients. The system and method significantly increase the number of clients that can be supported by a conventional QKD system, with only a modest increase in cost. The system and method are compatible with a variety of QKD schemes, including polarization, time-bin, continuous variable and entanglement QKD.

  4. Authenticated Quantum Key Distribution with Collective Detection using Single Photons

    Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue

    2016-10-01

    We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.

  5. The ultimate security bounds of quantum key distribution protocols

    Nikolopoulos, G.M.; Alber, G.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols exploit quantum correlations in order to establish a secure key between two legitimate users. Recent work on QKD has revealed a remarkable link between quantum and secret correlations. In this talk we report on recent results concerning the ultimate upper security bounds of various QKD schemes (i.e., the maximal disturbance up to which the two legitimate users share quantum correlations) under the assumption of general coherent attacks. In particular, we derive an analytic expression for the ultimate upper security bound of QKD schemes that use two mutually unbiased bases. As long as the two legitimate users focus on the sifted key and treat each pair of data independently during the post processing, our results are valid for arbitrary dimensions of the information carriers. The bound we have derived is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is also discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions, however, such equivalence is generally no longer valid. (author)

  6. Two-way quantum key distribution at telecommunication wavelength

    Kumar, Rupesh; Lucamarini, Marco; Di Giuseppe, Giovanni; Natali, Riccardo; Mancini, Giorgio; Tombesi, Paolo

    2008-01-01

    We report on a quantum key distribution effected with a two-way deterministic protocol over a standard telecommunication fiber. Despite the common belief of a prohibitive loss rate for such a scheme, our results show its feasibility on distances of few tenths of kilometers

  7. Representations of coherent states in non-orthogonal bases

    Ali, S Twareque; Roknizadeh, R; Tavassoly, M K

    2004-01-01

    Starting with the canonical coherent states, we demonstrate that all the so-called nonlinear coherent states, used in the physical literature, as well as large classes of other generalized coherent states, can be obtained by changes of bases in the underlying Hilbert space. This observation leads to an interesting duality between pairs of generalized coherent states, bringing into play a Gelfand triple of (rigged) Hilbert spaces. Moreover, it is shown that in each dual pair of families of nonlinear coherent states, at least one family is related to a (generally) non-unitary projective representation of the Weyl-Heisenberg group, which can then be thought of as characterizing the dual pair

  8. Wigner function for the generalized excited pair coherent state

    Meng Xiangguo; Wang Jisuo; Liang Baolong; Li Hongqi

    2008-01-01

    This paper introduces the generalized excited pair coherent state (GEPCS). Using the entangled state |η> representation of Wigner operator, it obtains the Wigner function for the GEPCS. In the ρ-γ phase space, the variations of the Wigner function distributions with the parameters q, α, k and l are discussed. The tomogram of the GEPCS is calculated with the help of the Radon transform between the Wigner operator and the projection operator of the entangled state |η 1 , η 2 , τ 1 , τ 2 >. The entangled states |η> and η 1 , η 2 , τ 1 , τ 2 > provide two good representative space for studying the Wigner functions and tomograms of various two-mode correlated quantum states

  9. Representation of coherent states in many-boson theory

    Vakarchuk, I.A.

    1978-01-01

    Solution of the Bloch equation for the density matrix of the system of interacting Bose particles in the coherent states representation is obtained. The matrix of the thermodynamical potential functional is represented in the form of the functional series over the eigen-values of the annihilation operator and the coefficient functions are the matrix elements of cluster operators. A simple functional integration in the partition sum leads to the well-known quantum virial expansions and the standard perturbation theory series. Possibilities of application of the expressions obtained to the investigation of the lambda-transition in the liquid He 4 and the generalization to the case of the many-fermion system is discussed

  10. Upconversion-based receivers for quantum hacking-resistant quantum key distribution

    Jain, Nitin; Kanter, Gregory S.

    2016-07-01

    We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  11. Long-distance quantum key distribution with imperfect devices

    Lo Piparo, Nicoló; Razavi, Mohsen

    2014-01-01

    Quantum key distribution over probabilistic quantum repeaters is addressed. We compare, under practical assumptions, two such schemes in terms of their secure key generation rate per memory, R QKD . The two schemes under investigation are the one proposed by Duan et al. in [Nat. 414, 413 (2001)] and that of Sangouard et al. proposed in [Phys. Rev. A 76, 050301 (2007)]. We consider various sources of imperfections in the latter protocol, such as a nonzero double-photon probability for the source, dark count per pulse, channel loss and inefficiencies in photodetectors and memories, to find the rate for different nesting levels. We determine the maximum value of the double-photon probability beyond which it is not possible to share a secret key anymore. We find the crossover distance for up to three nesting levels. We finally compare the two protocols

  12. Securing quantum key distribution systems using fewer states

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  13. Device calibration impacts security of quantum key distribution.

    Jain, Nitin; Wittmann, Christoffer; Lydersen, Lars; Wiechers, Carlos; Elser, Dominique; Marquardt, Christoph; Makarov, Vadim; Leuchs, Gerd

    2011-09-09

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  14. Key rate of quantum key distribution with hashed two-way classical communication

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  15. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  16. q-deformed charged fermion coherent states and SU(3) charged, Hyper-charged fermion coherent states

    Hao Sanru; Li Guanghua; Long Junyan

    1994-01-01

    By virtue of the algebra of the q-deformed fermion oscillators, the q-deformed charged fermion coherent states and SU(3) charged, hyper-charged fermion coherent states are discussed. The explicit forms of the two kinds of coherent states mentioned above are obtained by making use of the completeness of base vectors in the q-fermion Fock space. By comparing the q-deformed results with the ordinary results, it is found that the q-deformed charged fermion coherent states and SU(3) charged, hyper-charged fermion coherent states are automatically reduced to the ordinary charged fermion coherent states and SU(3) charged hyper-charged fermion coherent states if the deformed parameter q→1

  17. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.

    Lucamarini, M; Yuan, Z L; Dynes, J F; Shields, A J

    2018-05-01

    Quantum key distribution (QKD) 1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre 3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration 4 . Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters 5-7 , is overcoming the fundamental rate-distance limit of QKD 8 . This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel 9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are 'twins' and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate-distance limit of QKD and greatly extending the range of secure quantum communications.

  18. One-way quantum key distribution: Simple upper bound on the secret key rate

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  19. Tight finite-key analysis for quantum cryptography.

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-17

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

  20. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  1. Continuous-variable quantum key distribution with Gaussian source noise

    Shen Yujie; Peng Xiang; Yang Jian; Guo Hong

    2011-01-01

    Source noise affects the security of continuous-variable quantum key distribution (CV QKD) and is difficult to analyze. We propose a model to characterize Gaussian source noise through introducing a neutral party (Fred) who induces the noise with a general unitary transformation. Without knowing Fred's exact state, we derive the security bounds for both reverse and direct reconciliations and show that the bound for reverse reconciliation is tight.

  2. A System-Level Throughput Model for Quantum Key Distribution

    2015-09-17

    discrete logarithms in a finite field [35]. Arguably the most popular asymmetric encryption scheme is the RSA algorithm, published a year later in...Theory, vol. 22, no. 6, pp. 644-654, 1976. [36] G. Singh and S. Supriya, ’A Study of Encryption Algorithms ( RSA , DES, 3DES and AES) for Information...xv Dictionary QKD = Quantum Key Distribution OTP = One-Time Pad cryptographic algorithm DES = Data Encryption Standard 3DES

  3. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    2015-11-12

    polarization control and the CV state and the LO state are separated at a polarizing beam splitter . The CV state is delayed relative to the LO state, and... splitter or loss imperfections. We have identified a number of risks associated with implementing this design . The two most critical risks are: • The...Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY

  4. Entangled quantum key distribution with a biased basis choice

    Erven, Chris; Ma Xiongfeng; Laflamme, Raymond; Weihs, Gregor

    2009-01-01

    We investigate a quantum key distribution (QKD) scheme that utilizes a biased basis choice in order to increase the efficiency of the scheme. The optimal bias between the two measurement bases, a more refined error analysis and finite key size effects are all studied in order to assure the security of the final key generated with the system. We then implement the scheme in a local entangled QKD system that uses polarization entangled photon pairs to securely distribute the key. A 50/50 non-polarizing beamsplitter (BS) with different optical attenuators is used to simulate a variable BS in order to allow us to study the operation of the system for different biases. Over 6 h of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550 secure key bits per raw key bit for the unbiased case. This represents an increase in the efficiency of the key generation rate by 79%.

  5. Adaptive spatial filtering for daytime satellite quantum key distribution

    Gruneisen, Mark T.; Sickmiller, Brett A.; Flanagan, Michael B.; Black, James P.; Stoltenberg, Kurt E.; Duchane, Alexander W.

    2014-11-01

    The rate of secure key generation (SKG) in quantum key distribution (QKD) is adversely affected by optical noise and loss in the quantum channel. In a free-space atmospheric channel, the scattering of sunlight into the channel can lead to quantum bit error ratios (QBERs) sufficiently large to preclude SKG. Furthermore, atmospheric turbulence limits the degree to which spatial filtering can reduce sky noise without introducing signal losses. A system simulation quantifies the potential benefit of tracking and higher-order adaptive optics (AO) technologies to SKG rates in a daytime satellite engagement scenario. The simulations are performed assuming propagation from a low-Earth orbit (LEO) satellite to a terrestrial receiver that includes an AO system comprised of a Shack-Hartmann wave-front sensor (SHWFS) and a continuous-face-sheet deformable mirror (DM). The effects of atmospheric turbulence, tracking, and higher-order AO on the photon capture efficiency are simulated using statistical representations of turbulence and a time-domain waveoptics hardware emulator. Secure key generation rates are then calculated for the decoy state QKD protocol as a function of the receiver field of view (FOV) for various pointing angles. The results show that at FOVs smaller than previously considered, AO technologies can enhance SKG rates in daylight and even enable SKG where it would otherwise be prohibited as a consequence of either background optical noise or signal loss due to turbulence effects.

  6. Simple security proof of quantum key distribution based on complementarity

    Koashi, M

    2009-01-01

    We present an approach to the unconditional security of quantum key distribution protocols based on a complementarity argument. The approach is applicable to, but not limited to, every case that has been treated via the argument by Shor and Preskill based on entanglement distillation, with a benefit of decoupling of the error correction from the privacy amplification. It can also treat cases with uncharacterized apparatuses. We derive a secure key rate for the Bennett-Brassard-1984 protocol with an arbitrary source characterized only by a single parameter representing the basis dependence.

  7. Coherent states of systems with quadratic Hamiltonians

    Bagrov, V.G., E-mail: bagrov@phys.tsu.ru [Department of Physics, Tomsk State University, Tomsk (Russian Federation); Gitman, D.M., E-mail: gitman@if.usp.br [Tomsk State University, Tomsk (Russian Federation); Pereira, A.S., E-mail: albertoufcg@hotmail.com [Universidade de Sao Paulo (USP), Sao Paulo, SP (Brazil). Instituto de Fisica

    2015-06-15

    Different families of generalized coherent states (CS) for one-dimensional systems with general time-dependent quadratic Hamiltonian are constructed. In principle, all known CS of systems with quadratic Hamiltonian are members of these families. Some of the constructed generalized CS are close enough to the well-known due to Schroedinger and Glauber CS of a harmonic oscillator; we call them simply CS. However, even among these CS, there exist different families of complete sets of CS. These families differ by values of standard deviations at the initial time instant. According to the values of these initial standard deviations, one can identify some of the families with semiclassical CS. We discuss properties of the constructed CS, in particular, completeness relations, minimization of uncertainty relations and so on. As a unknown application of the general construction, we consider different CS of an oscillator with a time dependent frequency. (author)

  8. Coherent states of systems with quadratic Hamiltonians

    Bagrov, V.G.; Gitman, D.M.; Pereira, A.S.

    2015-01-01

    Different families of generalized coherent states (CS) for one-dimensional systems with general time-dependent quadratic Hamiltonian are constructed. In principle, all known CS of systems with quadratic Hamiltonian are members of these families. Some of the constructed generalized CS are close enough to the well-known due to Schroedinger and Glauber CS of a harmonic oscillator; we call them simply CS. However, even among these CS, there exist different families of complete sets of CS. These families differ by values of standard deviations at the initial time instant. According to the values of these initial standard deviations, one can identify some of the families with semiclassical CS. We discuss properties of the constructed CS, in particular, completeness relations, minimization of uncertainty relations and so on. As a unknown application of the general construction, we consider different CS of an oscillator with a time dependent frequency. (author)

  9. Fuzzy spheres from inequivalent coherent states quantizations

    Gazeau, Jean Pierre; Huguet, Eric; Lachieze-Rey, Marc; Renaud, Jacques

    2007-01-01

    The existence of a family of coherent states (CS) solving the identity in a Hilbert space allows, under certain conditions, to quantize functions defined on the measure space of CS parameters. The application of this procedure to the 2-sphere provides a family of inequivalent CS quantizations based on the spin spherical harmonics (the CS quantization from usual spherical harmonics appears to give a trivial issue for the Cartesian coordinates). We compare these CS quantizations to the usual (Madore) construction of the fuzzy sphere. Due to these differences, our procedure yields new types of fuzzy spheres. Moreover, the general applicability of CS quantization suggests similar constructions of fuzzy versions of a large variety of sets

  10. Experimental demonstration of a Hadamard gate for coherent state qubits

    Tipsmark, Anders; Laghaout, Amine; Andersen, Ulrik L. [Department of Physics, Technical University of Denmark, Fysikvej, DK-2800 Kgs. Lyngby (Denmark); Dong, Ruifang [Quantum Frequency Standards Division, National Time Service Center (NTSC), Chinese Academy of Sciences, 710600 Lintong, Shaanxi (China); Department of Physics, Technical University of Denmark, Fysikvej, DK-2800 Kgs. Lyngby (Denmark); Marek, Petr [Department of Optics, Palacky University, 17. listopadu 12, CZ-77146 Olomouc (Czech Republic); Jezek, Miroslav [Department of Optics, Palacky University, 17. listopadu 12, CZ-77146 Olomouc (Czech Republic); Department of Physics, Technical University of Denmark, Fysikvej, DK-2800 Kgs. Lyngby (Denmark)

    2011-11-15

    We discuss and make an experimental test of a probabilistic Hadamard gate for coherent state qubits. The scheme is based on linear optical components, nonclassical resources, and the joint projective action of a photon counter and a homodyne detector. We experimentally characterize the gate for the coherent states of the computational basis by full tomographic reconstruction of the transformed output states. Based on the parameters of the experiment, we simulate the fidelity for all coherent state qubits on the Bloch sphere.

  11. Experimental demonstration of a Hadamard gate for coherent state qubits

    Tipsmark, Anders; Dong, Ruifang; Laghaout, Amine

    2011-01-01

    We discuss and make an experimental test of a probabilistic Hadamard gate for coherent state qubits. The scheme is based on linear optical components, nonclassical resources, and the joint projective action of a photon counter and a homodyne detector. We experimentally characterize the gate for t...... for the coherent states of the computational basis by full tomographic reconstruction of the transformed output states. Based on the parameters of the experiment, we simulate the fidelity for all coherent state qubits on the Bloch sphere....

  12. Long distance free-space quantum key distribution

    Schmitt-Manderbach, T.

    2007-01-01

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional ''decoy'' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250 bit

  13. Long distance free-space quantum key distribution

    Schmitt-Manderbach, T.

    2007-10-16

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional 'decoy' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250

  14. Attacking quantum key distribution with single-photon two-qubit quantum logic

    Shapiro, Jeffrey H.; Wong, Franco N. C.

    2006-01-01

    The Fuchs-Peres-Brandt (FPB) probe realizes the most powerful individual attack on Bennett-Brassard 1984 quantum key distribution (BB84 QKD) by means of a single controlled-NOT (CNOT) gate. This paper describes a complete physical simulation of the FPB-probe attack on polarization-based BB84 QKD using a deterministic CNOT constructed from single-photon two-qubit quantum logic. Adding polarization-preserving quantum nondemolition measurements of photon number to this configuration converts the physical simulation into a true deterministic realization of the FPB attack

  15. Symmetric discrete coherent states for n-qubits

    Muñoz, C; Klimov, A B; Sánchez-Soto, L L

    2012-01-01

    We put forward a method of constructing discrete coherent states for n qubits. After establishing appropriate displacement operators, the coherent states appear as displaced versions of a fiducial vector that is fixed by imposing a number of natural symmetry requirements on its Q-function. Using these coherent states, we establish a partial order in the discrete phase space, which allows us to picture some n-qubit states as apparent distributions. We also analyze correlations in terms of sums of squared Q-functions. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’. (paper)

  16. Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack

    Nikolopoulos, Georgios M.

    2018-01-01

    We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.

  17. Multi-client quantum key distribution using wavelength division multiplexing

    Grice, Warren P.; Bennink, Ryan S.; Earl, Dennis Duncan; Evans, Philip G.; Humble, Travis S.; Pooser, Raphael C.; Schaake, Jason; Williams, Brian P.

    2011-01-01

    Quantum Key Distribution (QKD) exploits the rules of quantum mechanics to generate and securely distribute a random sequence of bits to two spatially separated clients. Typically a QKD system can support only a single pair of clients at a time, and so a separate quantum link is required for every pair of users. We overcome this limitation with the design and characterization of a multi-client entangled-photon QKD system with the capacity for up to 100 clients simultaneously. The time-bin entangled QKD system includes a broadband down-conversion source with two unique features that enable the multi-user capability. First, the photons are emitted across a very large portion of the telecom spectrum. Second, and more importantly, the photons are strongly correlated in their energy degree of freedom. Using standard wavelength division multiplexing (WDM) hardware, the photons can be routed to different parties on a quantum communication network, while the strong spectral correlations ensure that each client is linked only to the client receiving the conjugate wavelength. In this way, a single down-conversion source can support dozens of channels simultaneously--and to the extent that the WDM hardware can send different spectral channels to different clients, the system can support multiple client pairings. We will describe the design and characterization of the down-conversion source, as well as the client stations, which must be tunable across the emission spectrum.

  18. Memory-assisted measurement-device-independent quantum key distribution

    Panayi, Christiana; Razavi, Mohsen; Ma, Xiongfeng; Lütkenhaus, Norbert

    2014-01-01

    A protocol with the potential of beating the existing distance records for conventional quantum key distribution (QKD) systems is proposed. It borrows ideas from quantum repeaters by using memories in the middle of the link, and that of measurement-device-independent QKD, which only requires optical source equipment at the user's end. For certain memories with short access times, our scheme allows a higher repetition rate than that of quantum repeaters with single-mode memories, thereby requiring lower coherence times. By accounting for various sources of nonideality, such as memory decoherence, dark counts, misalignment errors, and background noise, as well as timing issues with memories, we develop a mathematical framework within which we can compare QKD systems with and without memories. In particular, we show that with the state-of-the-art technology for quantum memories, it is potentially possible to devise memory-assisted QKD systems that, at certain distances of practical interest, outperform current QKD implementations. (paper)

  19. Tomographic Approach in Three-Orthogonal-Basis Quantum Key Distribution

    Liang Wen-Ye; Yin Zhen-Qiang; Chen Hua; Li Hong-Wei; Chen Wei; Han Zheng-Fu; Wen Hao

    2015-01-01

    At present, there is an increasing awareness of some three-orthogonal-basis quantum key distribution protocols, such as, the reference-frame-independent (RFI) protocol and the six-state protocol. For secure key rate estimations of these protocols, there are two methods: one is the conventional approach, and another is the tomographic approach. However, a comparison between these two methods has not been given yet. In this work, with the general model of rotation channel, we estimate the key rate using conventional and tomographic methods respectively. Results show that conventional estimation approach in RFI protocol is equivalent to tomographic approach only in the case of that one of three orthogonal bases is always aligned. In other cases, tomographic approach performs much better than the respective conventional approaches of the RFI protocol and the six-state protocol. Furthermore, based on the experimental data, we illustrate the deep connections between tomography and conventional RFI approach representations. (paper)

  20. Trojan-horse attacks on quantum-key-distribution systems

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  1. Differential-phase-shift quantum key distribution using coherent light

    Inoue, K.; Waks, E.; Yamamoto, Y.

    2003-01-01

    Differential-phase-shift quantum key distribution based on two nonorthogonal states is described. A weak coherent pulse train is sent from Alice to Bob, in which the phase of each pulse is randomly modulated by {0,π}. Bob measures the differential phase by a one-bit delay circuit. The system has a simple configuration without the need for an interferometer and a bright reference pulse in Alice's site, unlike the conventional QKD system based on two nonorthogonal states, and has an advantage of improved communication efficiency. The principle of the operation is successfully demonstrated in experiments

  2. Continuous Variable Quantum Key Distribution with a Noisy Laser

    Jacobsen, Christian Scheffmann; Gehring, Tobias; Andersen, Ulrik Lund

    2015-01-01

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement...... a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances...

  3. Quantum cryptography with an ideal local relay

    Spedalieri, Gaetana; Ottaviani, Carlo; Braunstein, Samuel L.

    2015-01-01

    We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection. We study the ideal case where Alice's channel is lossless, i.e., the relay ...

  4. Coherent eavesdropping attacks in tomographic quantum cryptography: Nonequivalence of quantum and classical key distillation

    Kaszlikowski, Dagomir; Lim, J.Y.; Englert, Berthold-Georg; Kwek, L.C.

    2005-01-01

    The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. We show that - for protocols that use quantum channels of any dimension and completely characterize them by state tomography - the noise threshold for classical advantage distillation of a specific kind is substantially lower than the threshold for quantum entanglement distillation if the eavesdropper can perform powerful coherent attacks. In marked contrast, earlier investigations had shown that the thresholds are identical for incoherent attacks on the same classical distillation scheme. It remains an open question whether other schemes for classical advantage distillation have higher thresholds for coherent eavesdropping attacks

  5. Statistical Aspects of Coherent States of the Higgs Algebra

    Shreecharan, T.; Kumar, M. Naveen

    2018-04-01

    We construct and study various aspects of coherent states of a polynomial angular momentum algebra. The coherent states are constructed using a new unitary representation of the nonlinear algebra. The new representation involves a parameter γ that shifts the eigenvalues of the diagonal operator J 0.

  6. Symmetric structures of coherent states in superfluid helium-4

    Ahmad, M.

    1981-02-01

    Coherent States in superfluid helium-4 are discussed and symmetric structures are assigned to these states. Discrete and continuous series functions are exhibited for such states. Coherent State structure has been assigned to oscillating condensed bosons and their inter-relations and their effects on the superfluid system are analysed. (author)

  7. Coherent states of general time-dependent harmonic oscillator

    Abstract. By introducing an invariant operator, we obtain exact wave functions for a general time-dependent quadratic harmonic oscillator. The coherent states, both in x- and p-spaces, are calculated. We confirm that the uncertainty product in coherent state is always larger than Η/2 and is equal to the minimum of the ...

  8. Clifford coherent state transforms on spheres

    Dang, Pei; Mourão, José; Nunes, João P.; Qian, Tao

    2018-01-01

    We introduce a one-parameter family of transforms, U(m)t,t > 0, from the Hilbert space of Clifford algebra valued square integrable functions on the m-dimensional sphere, L2(Sm , dσm) ⊗Cm+1, to the Hilbert spaces, ML2(R m + 1 ∖ { 0 } , dμt) , of solutions of the Euclidean Dirac equation on R m + 1 ∖ { 0 } which are square integrable with respect to appropriate measures, dμt. We prove that these transforms are unitary isomorphisms of the Hilbert spaces and are extensions of the Segal-Bargman coherent state transform, U(1) :L2(S1 , dσ1) ⟶ HL2(C ∖ { 0 } , dμ) , to higher dimensional spheres in the context of Clifford analysis. In Clifford analysis it is natural to replace the analytic continuation from Sm to SCm as in (Hall, 1994; Stenzel, 1999; Hall and Mitchell, 2002) by the Cauchy-Kowalewski extension from Sm to R m + 1 ∖ { 0 } . One then obtains a unitary isomorphism from an L2-Hilbert space to a Hilbert space of solutions of the Dirac equation, that is to a Hilbert space of monogenic functions.

  9. Noncommutative Geometry of the Moyal Plane: Translation Isometries, Connes' Distance on Coherent States, Pythagoras Equality

    Martinetti, Pierre; Tomassini, Luca

    2013-10-01

    We study the metric aspect of the Moyal plane from Connes' noncommutative geometry point of view. First, we compute Connes' spectral distance associated with the natural isometric action of on the algebra of the Moyal plane . We show that the distance between any state of and any of its translated states is precisely the amplitude of the translation. As a consequence, we obtain the spectral distance between coherent states of the quantum harmonic oscillator as the Euclidean distance on the plane. We investigate the classical limit, showing that the set of coherent states equipped with Connes' spectral distance tends towards the Euclidean plane as the parameter of deformation goes to zero. The extension of these results to the action of the symplectic group is also discussed, with particular emphasis on the orbits of coherent states under rotations. Second, we compute the spectral distance in the double Moyal plane, intended as the product of (the minimal unitization of) by . We show that on the set of states obtained by translation of an arbitrary state of , this distance is given by the Pythagoras theorem. On the way, we prove some Pythagoras inequalities for the product of arbitrary unital and non-degenerate spectral triples. Applied to the Doplicher- Fredenhagen-Roberts model of quantum spacetime [DFR], these two theorems show that Connes' spectral distance and the DFR quantum length coincide on the set of states of optimal localization.

  10. Completeness for coherent states in a magnetic–solenoid field

    Bagrov, V G; Gavrilov, S P; Gitman, D M; Górska, K

    2012-01-01

    This paper completes our study of coherent states in the so-called magnetic–solenoid field (a collinear combination of a constant uniform magnetic field and Aharonov–Bohm solenoid field) presented in Bagrov et al (2010 J. Phys. A: Math. Theor. 43 354016, 2011 J. Phys. A: Math. Theor. 44 055301). Here, we succeeded in proving nontrivial completeness relations for non-relativistic and relativistic coherent states in such a field. In addition, we solve here the relevant Stieltjes moment problem and present a comparative analysis of our coherent states and the well-known, in the case of pure uniform magnetic field, Malkin–Man’ko coherent states. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’. (paper)

  11. Experimental multiplexing of quantum key distribution with classical optical communication

    Wang, Liu-Jun; Chen, Luo-Kan; Ju, Lei; Xu, Mu-Lan; Zhao, Yong; Chen, Kai; Chen, Zeng-Bing; Chen, Teng-Yun; Pan, Jian-Wei

    2015-01-01

    We demonstrate the realization of quantum key distribution (QKD) when combined with classical optical communication, and synchronous signals within a single optical fiber. In the experiment, the classical communication sources use Fabry-Pérot (FP) lasers, which are implemented extensively in optical access networks. To perform QKD, multistage band-stop filtering techniques are developed, and a wavelength-division multiplexing scheme is designed for the multi-longitudinal-mode FP lasers. We have managed to maintain sufficient isolation among the quantum channel, the synchronous channel and the classical channels to guarantee good QKD performance. Finally, the quantum bit error rate remains below a level of 2% across the entire practical application range. The proposed multiplexing scheme can ensure low classical light loss, and enables QKD over fiber lengths of up to 45 km simultaneously when the fibers are populated with bidirectional FP laser communications. Our demonstration paves the way for application of QKD to current optical access networks, where FP lasers are widely used by the end users

  12. Simultaneous classical communication and quantum key distribution using continuous variables*

    Qi, Bing

    2016-10-01

    Presently, classical optical communication systems employing strong laser pulses and quantum key distribution (QKD) systems working at single-photon levels are very different communication modalities. Dedicated devices are commonly required to implement QKD. In this paper, we propose a scheme which allows classical communication and QKD to be implemented simultaneously using the same communication infrastructure. More specially, we propose a coherent communication scheme where both the bits for classical communication and the Gaussian distributed random numbers for QKD are encoded on the same weak coherent pulse and decoded by the same coherent receiver. Simulation results based on practical system parameters show that both deterministic classical communication with a bit error rate of 10-9 and secure key distribution could be achieved over tens of kilometers of single-mode fibers. It is conceivable that in the future coherent optical communication network, QKD will be operated in the background of classical communication at a minimal cost.

  13. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  14. A cost-effective measurement-device-independent quantum key distribution system for quantum networks

    Valivarthi, Raju; Zhou, Qiang; John, Caleb; Marsili, Francesco; Verma, Varun B.; Shaw, Matthew D.; Nam, Sae Woo; Oblak, Daniel; Tittel, Wolfgang

    2017-12-01

    We experimentally realize a measurement-device-independent quantum key distribution (MDI-QKD) system. It is based on cost-effective and commercially available hardware such as distributed feedback lasers and field-programmable gate arrays that enable time-bin qubit preparation and time-tagging, and active feedback systems that allow for compensation of time-varying properties of photons after transmission through deployed fiber. We examine the performance of our system, and conclude that its design does not compromise performance. Our demonstration paves the way for MDI-QKD-based quantum networks in star-type topology that extend over more than 100 km distance.

  15. On phase-space representations of quantum mechanics using

    space representations of quantum mechanics using Glauber coherent states. DIÓGENES CAMPOS. Research Article Volume 87 Issue 2 August ... Keywords. Phase-space quantum mechanics, coherent states, Husimi function, Wigner function ...

  16. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  17. Phase Properties of Photon-Added Coherent States for Nonharmonic Oscillators in a Nonlinear Kerr Medium

    Jahanbakhsh, F.; Honarasa, G.

    2018-04-01

    The potential of nonharmonic systems has several applications in the field of quantum physics. The photon-added coherent states for annharmonic oscillators in a nonlinear Kerr medium can be used to describe some quantum systems. In this paper, the phase properties of these states including number-phase Wigner distribution function, Pegg-Barnett phase distribution function, number-phase squeezing and number-phase entropic uncertainty relations are investigated. It is found that these states can be considered as the nonclassical states.

  18. Generation of concatenated Greenberger-Horne-Zeilinger-type entangled coherent state based on linear optics

    Guo, Rui; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo

    2017-03-01

    The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new type of multipartite entangled state, which has potential application in future quantum information. In this paper, we propose a protocol of constructing arbitrary C-GHZ entangled state approximatively. Different from previous protocols, each logic qubit is encoded in the coherent state. This protocol is based on the linear optics, which is feasible in experimental technology. This protocol may be useful in quantum information based on the C-GHZ state.

  19. Quantum quincunx in cavity quantum electrodynamics

    Sanders, Barry C.; Bartlett, Stephen D.; Tregenna, Ben; Knight, Peter L.

    2003-01-01

    We introduce the quantum quincunx, which physically demonstrates the quantum walk and is analogous to Galton's quincunx for demonstrating the random walk by employing gravity to draw pellets through pegs on a board, thereby yielding a binomial distribution of final peg locations. In contradistinction to the theoretical studies of quantum walks over orthogonal lattice states, we introduce quantum walks over nonorthogonal lattice states (specifically, coherent states on a circle) to demonstrate that the key features of a quantum walk are observable albeit for strict parameter ranges. A quantum quincunx may be realized with current cavity quantum electrodynamics capabilities, and precise control over decoherence in such experiments allows a remarkable decrease in the position noise, or spread, with increasing decoherence

  20. The SECOQC quantum key distribution network in Vienna

    Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J. F.; Fasel, S.; Fossier, S.; Fürst, M.; Gautier, J.-D.; Gay, O.; Gisin, N.; Grangier, P.; Happe, A.; Hasani, Y.; Hentschel, M.; Hübel, H.; Humer, G.; Länger, T.; Legré, M.; Lieger, R.; Lodewyck, J.; Lorünser, T.; Lütkenhaus, N.; Marhold, A.; Matyus, T.; Maurhart, O.; Monat, L.; Nauerth, S.; Page, J.-B.; Poppe, A.; Querasser, E.; Ribordy, G.; Robyr, S.; Salvail, L.; Sharpe, A. W.; Shields, A. J.; Stucki, D.; Suda, M.; Tamas, C.; Themel, T.; Thew, R. T.; Thoma, Y.; Treiber, A.; Trinkler, P.; Tualle-Brouri, R.; Vannel, F.; Walenta, N.; Weier, H.; Weinfurter, H.; Wimberger, I.; Yuan, Z. L.; Zbinden, H.; Zeilinger, A.

    2009-07-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARCAustrian Research Centers GmbH—ARC is now operating under the new name AIT Austrian Institute of Technology GmbH following a restructuring initiative.), an entangled photons system by the University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Université Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent—the SECOQC node module, which enables the authentic

  1. The SECOQC quantum key distribution network in Vienna

    Peev, M; Pacher, C; Boxleitner, W; Happe, A; Hasani, Y; Alleaume, R; Diamanti, E; Barreiro, C; Fasel, S; Gautier, J-D; Gisin, N; Bouda, J; Debuisschert, T; Fossier, S; Dianati, M; Dynes, J F; Fuerst, M; Gay, O; Grangier, P; Hentschel, M

    2009-01-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARC ), an entangled photons system by University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Universite Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent-the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network

  2. Driving a mechanical resonator into coherent states via random measurements

    Garcia, Ll; Wu, L-A; Chhajlany, R W; Li, Y

    2013-01-01

    We propose dynamical schemes to engineer coherent states of a mechanical resonator (MR) coupled to an ancillary, superconducting flux qubit. The flux qubit, when repeatedly projected on to its ground state, drives the MR into a coherent state in probabilistic, albeit heralded fashion. Assuming no operations on the state of the MR during the protocol, coherent states are successfully generated only up to a certain value of the displacement parameter. This restriction can be overcome at the cost of a one-time operation on the initial state of the MR. We discuss the possibility of experimental realization of the presented schemes. (paper)

  3. Wigner function and tomogram of the pair coherent state

    Meng, Xiang-Guo; Wang, Ji-Suo; Fan, Hong-Yi

    2007-01-01

    Using the entangled state representation of Wigner operator and the technique of integration within an ordered product (IWOP) of operators, the Wigner function of the pair coherent state is derived. The variations of the Wigner function with the parameters α and q in the ρ-γ phase space are discussed. The physical meaning of the Wigner function for the pair coherent state is given by virtue of its marginal distributions. The tomogram of the pair coherent state is calculated with the help of the Radon transform between the Wigner operator and the projection operator of the entangled state |η 1 ,η 2 ,τ 1 ,τ 2 >

  4. Quantum key distribution with an unknown and untrusted source

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  5. Proof-of-concept of real-world quantum key distribution with quantum frames

    Lucio-Martinez, I; Mo, X; Tittel, W; Chan, P; Hosier, S

    2009-01-01

    We propose a fibre-based quantum key distribution system, which employs polarization qubits encoded into faint laser pulses. As a novel feature, it allows sending of classical framing information via sequences of strong laser pulses that precede the quantum data. This allows synchronization, sender and receiver identification and compensation of time-varying birefringence in the communication channel. In addition, this method also provides a platform to communicate implementation specific information such as encoding and protocol in view of future optical quantum networks. We demonstrate in a long-term (37 h) proof-of-principle study that polarization information encoded in the classical control frames can indeed be used to stabilize unwanted qubit transformation in the quantum channel. All optical elements in our setup can be operated at Gbps rates, which is a first requirement for a future system delivering secret keys at Mbps. In order to remove another bottleneck towards a high rate system, we investigate forward error correction based on low-density parity-check codes.

  6. One-sided measurement-device-independent quantum key distribution

    Cao, Wen-Fei; Zhen, Yi-Zheng; Zheng, Yu-Lin; Li, Li; Chen, Zeng-Bing; Liu, Nai-Le; Chen, Kai

    2018-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol was proposed to remove all the detector side channel attacks, while its security relies on the trusted encoding systems. Here we propose a one-sided MDI-QKD (1SMDI-QKD) protocol, which enjoys detection loophole-free advantage, and at the same time weakens the state preparation assumption in MDI-QKD. The 1SMDI-QKD can be regarded as a modified MDI-QKD, in which Bob's encoding system is trusted, while Alice's is uncharacterized. For the practical implementation, we also provide a scheme by utilizing coherent light source with an analytical two decoy state estimation method. Simulation with realistic experimental parameters shows that the protocol has a promising performance, and thus can be applied to practical QKD applications.

  7. Wigner functions and tomograms of the photon-depleted even and odd coherent states

    Wang Jisuo; Meng Xiangguo

    2008-01-01

    Using the coherent state representation of Wigner operator and the technique of integration within an ordered product (IWOP) of operators, this paper derives the Wigner functions for the photon-depleted even and odd coherent states (PDEOCSs). Moreover, in terms of the Wigner functions with respect to the complex parameter α the nonclassical properties of the PDEOCSs are discussed. The results show that the nonclassicality for the state |β, m) o (or |β, m) e ) is more pronounced when m is even (or odd). According to the marginal distributions of the Wigner functions, the physical meaning of the Wigner functions is given. Further, the tomograms of the PDEOCSs are calculated with the aid of newly introduced intermediate coordinate-momentum representation in quantum optics

  8. Coherent states of an electron in a quantized electromagnetic wave

    Bagrov, V.G.; Bukhbinder, I.L.; Gitman, D.M.; Lavrov, P.M.

    1977-01-01

    Coherent states for interacting electrons and photons in a plane elecmagnetic wave are found. Trajectories of the electron and the characteristics of the electromagnetic field are investigated. Limiting transition to the given external field is studied

  9. Negativity of Two-Qubit System Through Spin Coherent States

    Berrada, K.; El Baz, M.; Hassouni, Y.; Eleuch, H.

    2009-12-01

    Using the negativity, we express and analyze the entanglement of two-qubit nonorthogonal pure states through the spin coherent states. We formulate this measure in terms of the amplitudes of coherent states and we give the conditions for the minimal and the maximal entanglement. We generalize this formalism to the case of a class of mixed states and show that the negativity is also a function of probabilities. (author)

  10. Pair q-coherent states and their antibunching effects

    Wang Zhongqing; Li Junhong; An Guanglei; Chongqing Univ. of Posts and Telecommunications, Chongqing

    2005-01-01

    Using the properties of the q-deformed boson creation and annihilation operators and their inverse operators, two kind of q-deformed pair coherent states are introduced. Antibunching effects and correlation properties between two modes in the states are investigated. It is shown that q-deformed pair coherent states exhibit antibunching effects and the photons of the two modes are correlated. These nonclassical effects are influenced by the parameter q. These effects increase when |lnq| increases. (authors)

  11. First-Order Polynomial Heisenberg Algebras and Coherent States

    Castillo-Celeita, M; Fernández C, D J

    2016-01-01

    The polynomial Heisenberg algebras (PHA) are deformations of the Heisenberg- Weyl algebra characterizing the underlying symmetry of the supersymmetric partners of the Harmonic oscillator. When looking for the simplest system ruled by PHA, however, we end up with the harmonic oscillator. In this paper we are going to realize the first-order PHA through the harmonic oscillator. The associated coherent states will be also constructed, which turn out to be the well known even and odd coherent states. (paper)

  12. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    Guo, Ying; Shi, Ronghua [School of Information Science and Engineering, Central South University, Changsha 410083 (China); Zeng, Guihua [Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030 (China)], E-mail: sdguoying@gmail.com, E-mail: rhshi@mail.edu.com, E-mail: ghzeng@sjtu.edu.cn

    2010-04-15

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  13. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    Guo, Ying; Shi, Ronghua; Zeng, Guihua

    2010-01-01

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  14. Security of a single-state semi-quantum key distribution protocol

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  15. Coherent states of the real symplectic group in a complex analytic parametrization. I. Unitary-operator coherent states

    Quesne, C.

    1986-01-01

    In the present series of papers, the coherent states of Sp(2d,R), corresponding to the positive discrete series irreducible representations 1 +n/2> encountered in physical applications, are analyzed in detail with special emphasis on those of Sp(4,R) and Sp(6,R). The present paper discusses the unitary-operator coherent states, as defined by Klauder, Perelomov, and Gilmore. These states are parametrized by the points of the coset space Sp(2d,R)/H, where H is the stability group of the Sp(2d,R) irreducible representation lowest weight state, chosen as the reference state, and depends upon the relative values of lambda 1 ,...,lambda/sub d/, subject to the conditions lambda 1 > or =lambda 2 > or = x x x > or =lambda/sub d/> or =0. A parametrization of Sp(2d,R)/H corresponding to a factorization of the latter into a product of coset spaces Sp(2d,R)/U(d) and U(d)/H is chosen. The overlap of two coherent states is calculated, the action of the Sp(2d,R) generators on the coherent states is determined, and the explicit form of the unity resolution relation satisfied by the coherent states in the representation space of the irreducible representation is obtained. The Hilbert space of analytic functions arising from the coherent state representation is studied in detail. Finally, some applications of the formalism developed in the present paper are outlined

  16. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  17. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  18. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  19. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  20. Long-term performance of the SwissQuantum quantum key distribution network in a field environment

    Stucki, D; Gisin, N; Thew, R; Legré, M; Clausen, B; Monat, L; Page, J-B; Ribordy, G; Rochas, A; Robyr, S; Trinkler, P; Buntschu, F; Perroud, D; Felber, N; Henzen, L; Junod, P; Monbaron, P; Ventura, S; Litzistorf, G; Tavares, J

    2011-01-01

    In this paper, we report on the performance of the SwissQuantum quantum key distribution (QKD) network. The network was installed in the Geneva metropolitan area and ran for more than one-and-a-half years, from the end of March 2009 to the beginning of January 2011. The main goal of this experiment was to test the reliability of the quantum layer over a long period of time in a production environment. A key management layer has been developed to manage the key between the three nodes of the network. This QKD-secure network was utilized by end-users through an application layer. (paper)

  1. Influence of experimental parameters inherent to optical fibers on Quantum Key Distribution, the protocol BB84

    L. Bouchoucha

    2018-03-01

    Full Text Available In this work, we represent the principle of quantum cryptography (QC that is based on fundamental laws of quantum physics. QC or Quantum Key Distribution (QKD uses various protocols to exchange a secret key between two communicating parties. This research paper focuses and examines the quantum key distribution by using the protocol BB84 in the case of encoding on the single-photon polarization and shows the influence of optical components parameters on the quantum key distribution. We also introduce Quantum Bit Error Rate (QBER to better interpret our results and show its relationship with the intrusion of the eavesdropper called Eve on the optical channel to exploit these vulnerabilities.

  2. Coherent states with classical motion: from an analytic method complementary to group theory

    Nieto, M.M.

    1982-01-01

    From the motivation of Schroedinger, that of finding states which follow the motion which a classical particle would have in a given potential, we discuss generalizations of the coherent states of the harmonic oscillator. We focus on a method which is the analytic complement to the group theory point of view. It uses a minimum uncertainty formalism as its basis. We discuss the properties and time evolution of these states, always keeping in mind the desire to find quantum states which follow the classical motion

  3. Special deformed exponential functions leading to more consistent Klauder's coherent states

    El Baz, M.; Hassouni, Y.

    2001-08-01

    We give a general approach for the construction of deformed oscillators. These ones could be seen as describing deformed bosons. Basing on new definitions of certain quantum series, we demonstrate that they are nothing but the ordinary exponential functions in the limit when the deformation parameters goes to one. We also prove that these series converge to a complex function, in a given convergence radius that we calculate. Klauder's Coherent States are explicitly found through these functions that we design by deformed exponential functions. (author)

  4. Path integrals and coherent states of SU(2) and SU(1,1)

    Inomata, Akira; Kuratsuji, Hiroshi

    1992-01-01

    The authors examine several topical subjects, commencing with a general introduction to path integrals in quantum mechanics and the group theoretical backgrounds for path integrals. Applications of harmonic analysis, polar coordinate formulation, various techniques and path integrals on SU(2) and SU(1, 1) are discussed. Soluble examples presented include particle-flux system, a pulsed oscillator, magnetic monopole, the Coulomb problem in curved space and others.The second part deals with the SU(2) coherent states and their applications. Construction and generalization of the SU(2) coherent sta

  5. Discrimination of binary coherent states using a homodyne detector and a photon number resolving detector

    Wittmann, Christoffer; Andersen, Ulrik Lund; Takeoka, Masahiro

    2010-01-01

    We investigate quantum measurement strategies capable of discriminating two coherent states probabilistically with significantly smaller error probabilities than can be obtained using nonprobabilistic state discrimination. We apply a postselection strategy to the measurement data of a homodyne...... detector as well as a photon number resolving detector in order to lower the error probability. We compare the two different receivers with an optimal intermediate measurement scheme where the error rate is minimized for a fixed rate of inconclusive results. The photon number resolving (PNR) receiver...

  6. Integrals of the motion, Green functions, and coherent states of dynamical systems

    Dodonov, V.V.; Malkin, I.A.; Man'ko, V.I.

    1975-01-01

    The connection between the integrals of the motion of a quantum system and its Green function is established. The Green function is shown to be the eigenfunction of the integrals of the motion which describe initial points of the system trajectory in the phase space of average coordinates and moments. The explicit expressions for the Green functions of the N-dimensional system with the Hamiltonians which is the most general quadratic form of coordinates and momenta with time-dependent coefficients is obtained in coordinate, momentum, and coherent states representations. The Green functions of the nonstationary singular oscillator and of the stationary Schroedinger equation are also obtained. (author)

  7. Quantum key distribution with finite resources: calculating the min-entropy

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Abruzzo, Silvestre; Bruss, Dagmar [Heinrich-Heine-Universitaet, Duesseldorf (Germany)

    2010-07-01

    The min-entropy is an important quantity in quantum key distribution. Recently, a connection between the min- entropy and the minimal-error discrimination problem was found. We use this connection to evaluate the min-entropy for different quantum key distribution setups.

  8. Vector coherent state representations and their inner products

    Rowe, D J

    2012-01-01

    Several advances have extended the power and versatility of coherent state theory to the extent that it has become a vital tool in the representation theory of Lie groups and their Lie algebras. Representative applications are reviewed and some new developments are introduced. The examples given are chosen to illustrate special features of the scalar and vector coherent state constructions and how they work in practical situations. Comparisons are made with Mackey's theory of induced representations. For simplicity, we focus on square integrable (discrete series) unitary representations although many of the techniques apply more generally, with minor adjustment. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’. (review)

  9. Entangled Coherent States Generation in two Superconducting LC Circuits

    Chen Meiyu; Zhang Weimin

    2008-01-01

    We proposed a novel pure electronic (solid state) device consisting of two superconducting LC circuits coupled to a superconducting flux qubit. The entangled coherent states of the two LC modes is generated through the measurement of the flux qubit states. The interaction of the flux qubit and two LC circuits is controlled by the external microwave control lines. The geometrical structure of the LC circuits is adjustable and makes a strong coupling between them achievable. This entangled coherent state generator can be realized by using the conventional microelectronic fabrication techniques which increases the feasibility of the experiment.

  10. Painlevé IV Hamiltonian systems and coherent states

    Bermudez, D; Contreras-Astorga, A; Fernández C, D J

    2015-01-01

    Schrödinger Hamiltonians with third-order differential ladder operators are linked to the Painlevé IV equation. Some of these appear from applying SUSY QM to the harmonic oscillator. Departing from them, we will build coherent states as eigenstates of the annihilation operator, then as displaced versions of the extremal states, both involving the third-order ladder operators, and finally as displaced extremal states using linearized ladder operators. To each Hamiltonian corresponds two families of coherent states for fixed ladder operators: one in the infinite dimension subspace associated with the oscillator spectrum and another in the finite dimension one generated by the eigenstates created by SUSY QM. (paper)

  11. Even and odd combinations of nonlinear coherent states

    De los Santos-Sanchez, O; Recamier, J

    2011-01-01

    In this work we present some statistical properties of even and odd combinations of nonlinear coherent states associated with two nonlinear potentials; one supporting a finite number of bound states and the other supporting an infinite number of bound states, within the framework of an f-deformed algebra. We calculate their normalized variance and the temporal evolution of their dispersion relations using nonlinear coherent states defined as (a) eigensates of the deformed annihilation operator and (b) those states created by the application of a deformed displacement operator upon the ground state of the oscillator.

  12. Superdense Coding with GHZ and Quantum Key Distribution with W in the ZX-calculus

    Anne Hillebrand

    2012-10-01

    Full Text Available Quantum entanglement is a key resource in many quantum protocols, such as quantum teleportation and quantum cryptography. Yet entanglement makes protocols presented in Dirac notation difficult to verify. This is why Coecke and Duncan have introduced a diagrammatic language for quantum protocols, called the ZX-calculus. This diagrammatic notation is both intuitive and formally rigorous. It is a simple, graphical, high level language that emphasises the composition of systems and naturally captures the essentials of quantum mechanics. In the author's MSc thesis it has been shown for over 25 quantum protocols that the ZX-calculus provides a relatively easy and more intuitive presentation. Moreover, the author embarked on the task to apply categorical quantum mechanics on quantum security; earlier works did not touch anything but Bennett and Brassard's quantum key distribution protocol, BB84. Superdense coding with the Greenberger-Horne-Zeilinger state and quantum key distribution with the W-state are presented in the ZX-calculus in this paper.

  13. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    Molotkov, S. N.

    2008-01-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ∼ 20%) and dark count probability (p dark ∼ 10 -7 )

  14. A continuous variable quantum deterministic key distribution based on two-mode squeezed states

    Gong, Li-Hua; Song, Han-Chong; Liu, Ye; Zhou, Nan-Run; He, Chao-Sheng

    2014-01-01

    The distribution of deterministic keys is of significance in personal communications, but the existing continuous variable quantum key distribution protocols can only generate random keys. By exploiting the entanglement properties of two-mode squeezed states, a continuous variable quantum deterministic key distribution (CVQDKD) scheme is presented for handing over the pre-determined key to the intended receiver. The security of the CVQDKD scheme is analyzed in detail from the perspective of information theory. It shows that the scheme can securely and effectively transfer pre-determined keys under ideal conditions. The proposed scheme can resist both the entanglement and beam splitter attacks under a relatively high channel transmission efficiency. (paper)

  15. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  16. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    2016-10-12

    count rate of Bob’s detectors. In this detector-limited regime , it is advantageous to increase M to encode as much information as possible in each...High- rate field demonstration of large-alphabet quantum key distribution Catherine Lee,1, 2 Darius Bunandar,1 Zheshen Zhang,1 Gregory R. Steinbrecher...October 12, 2016) 2 Quantum key distribution (QKD) enables secure symmetric key exchange for information-theoretically secure com- munication via one-time

  17. Two-party quantum key agreement protocols under collective noise channel

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  18. Determining influence of four-wave mixing effect on quantum key distribution

    Vavulin, D N; Egorov, V I; Gleim, A V; Chivilikhin, S A

    2014-01-01

    We consider the possibility of multiplexing the classical and quantum signals in a quantum cryptography system with optical fiber used as a transmission medium. If the quantum signal is located at a frequency close to the frequency of classical signals, a set of nonlinear effects such as FWM (four-wave mixing) and Raman scattering is observed. The impact of four-wave mixing (FWM) effect on error level is described and analyzed in this work in case of large frequency diversity between classical and quantum signals. It is shown that the influence of FWM is negligible for convenient quantum key distribution

  19. Coherent states for oscillators of non-conventional statistics

    Dao Vong Duc; Nguyen Ba An

    1998-12-01

    In this work we consider systematically the concept of coherent states for oscillators of non-conventional statistics - parabose oscillator, infinite statistics oscillator and generalised q-deformed oscillator. The expressions for the quadrature variances and particle number distribution are derived and displayed graphically. The obtained results show drastic changes when going from one statistics to another. (author)

  20. Reconsidering harmonic and anharmonic coherent states: Partial differential equations approach

    Toutounji, Mohamad, E-mail: Mtoutounji@uaeu.ac.ae

    2015-02-15

    This article presents a new approach to dealing with time dependent quantities such as autocorrelation function of harmonic and anharmonic systems using coherent states and partial differential equations. The approach that is normally used to evaluate dynamical quantities involves formidable operator algebra. That operator algebra becomes insurmountable when employing Morse oscillator coherent states. This problem becomes even more complicated in case of Morse oscillator as it tends to exhibit divergent dynamics. This approach employs linear partial differential equations, some of which may be solved exactly and analytically, thereby avoiding the cumbersome noncommutative algebra required to manipulate coherent states of Morse oscillator. Additionally, the arising integrals while using the herein presented method feature stability and high numerical efficiency. The correctness, applicability, and utility of the above approach are tested by reproducing the partition and optical autocorrelation function of the harmonic oscillator. A closed-form expression for the equilibrium canonical partition function of the Morse oscillator is derived using its coherent states and partial differential equations. Also, a nonequilibrium autocorrelation function expression for weak electron–phonon coupling in condensed systems is derived for displaced Morse oscillator in electronic state. Finally, the utility of the method is demonstrated through further simplifying the Morse oscillator partition function or autocorrelation function expressions reported by other researchers in unevaluated form of second-order derivative exponential. Comparison with exact dynamics shows identical results.

  1. Coherent states for certain time-dependent systems

    Pedrosa, I.A.

    1989-01-01

    Hartley and Ray have constructed and studied coherent states for the time-dependent oscillator. Here we show how to construct states for more general time-dependent systems. We also show that these states are equivalent to the well-known squeezed states. (author) [pt

  2. Semi-classical behavior of Poschl-Teller coherent states

    Bergeron, H.; Gazeau, J.P.; Siegl, Petr; Youssef, A.

    2010-01-01

    Roč. 92, č. 6 (2010), s. 60003 ISSN 0295-5075 R&D Projects: GA MŠk LC06002 Institutional research plan: CEZ:AV0Z10480505 Institutional support: RVO:61389005 Keywords : coherent states * Pöschl-Teller potential * quantization Subject RIV: BE - Theoretical Physics Impact factor: 2.753, year: 2010

  3. Teleportation of Unknown Superpositions of Collective Atomic Coherent States

    ZHENG ShiBiao

    2001-01-01

    We propose a scheme to teleport an unknown superposition of two atomic coherent states with different phases. Our scheme is based on resonant and dispersive atom-field interaction. Our scheme provides a possibility of teleporting macroscopic superposition states of many atoms first time.``

  4. Reproducing Kernels and Coherent States on Julia Sets

    Thirulogasanthar, K., E-mail: santhar@cs.concordia.ca; Krzyzak, A. [Concordia University, Department of Computer Science and Software Engineering (Canada)], E-mail: krzyzak@cs.concordia.ca; Honnouvo, G. [Concordia University, Department of Mathematics and Statistics (Canada)], E-mail: g_honnouvo@yahoo.fr

    2007-11-15

    We construct classes of coherent states on domains arising from dynamical systems. An orthonormal family of vectors associated to the generating transformation of a Julia set is found as a family of square integrable vectors, and, thereby, reproducing kernels and reproducing kernel Hilbert spaces are associated to Julia sets. We also present analogous results on domains arising from iterated function systems.

  5. Reproducing Kernels and Coherent States on Julia Sets

    Thirulogasanthar, K.; Krzyzak, A.; Honnouvo, G.

    2007-01-01

    We construct classes of coherent states on domains arising from dynamical systems. An orthonormal family of vectors associated to the generating transformation of a Julia set is found as a family of square integrable vectors, and, thereby, reproducing kernels and reproducing kernel Hilbert spaces are associated to Julia sets. We also present analogous results on domains arising from iterated function systems

  6. New construction of coherent states for generalized harmonic oscillators

    El Baz, M.; Hassouni, Y.; Madouri, F.

    2001-08-01

    A dynamical algebra A q , englobing many of the deformed harmonic oscillator algebras is introduced. One of its special cases is extensively developed. A general method for constructing coherent states related to any algebra of the type A q is discussed. The construction following this method is carried out for the special case. (author)

  7. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  8. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. PMID:26823196

  9. Preservation of a lower bound of quantum secret key rate in the presence of decoherence

    Datta, Shounak, E-mail: shounak.datta@bose.res.in; Goswami, Suchetana, E-mail: suchetana.goswami@bose.res.in; Pramanik, Tanumoy, E-mail: tanu.pram99@bose.res.in; Majumdar, A.S., E-mail: archan@bose.res.in

    2017-03-11

    It is well known that the interaction of quantum systems with the environment reduces the inherent quantum correlations. Under special circumstances the effect of decoherence can be reversed, for example, the interaction modelled by an amplitude damping channel can boost the teleportation fidelity from the classical to the quantum region for a bipartite quantum state. Here, we first show that this phenomenon fails to preserve the quantum secret key rate derived under individual attack. We further show that the technique of weak measurement can be used to slow down the process of decoherence, thereby helping to preserve the quantum secret key rate when one or both systems are interacting with the environment via an amplitude damping channel. Most interestingly, in certain cases weak measurement with post-selection where one considers both success and failure of the technique is shown to be more useful than without it when both systems interact with the environment. - Highlights: • In general, decoherence has negative effect on the steerability and quantum secret key rate of a bipartite state. • Quantum key rate can be preserved against the effect of decoherence using the technique of weak measurement. • The technique of weak measurements includes a weak measurement and its reversal. • For some strength of weak measurement and environmental interaction, the average secret key rate is improved.

  10. Preservation of a lower bound of quantum secret key rate in the presence of decoherence

    Datta, Shounak; Goswami, Suchetana; Pramanik, Tanumoy; Majumdar, A.S.

    2017-01-01

    It is well known that the interaction of quantum systems with the environment reduces the inherent quantum correlations. Under special circumstances the effect of decoherence can be reversed, for example, the interaction modelled by an amplitude damping channel can boost the teleportation fidelity from the classical to the quantum region for a bipartite quantum state. Here, we first show that this phenomenon fails to preserve the quantum secret key rate derived under individual attack. We further show that the technique of weak measurement can be used to slow down the process of decoherence, thereby helping to preserve the quantum secret key rate when one or both systems are interacting with the environment via an amplitude damping channel. Most interestingly, in certain cases weak measurement with post-selection where one considers both success and failure of the technique is shown to be more useful than without it when both systems interact with the environment. - Highlights: • In general, decoherence has negative effect on the steerability and quantum secret key rate of a bipartite state. • Quantum key rate can be preserved against the effect of decoherence using the technique of weak measurement. • The technique of weak measurements includes a weak measurement and its reversal. • For some strength of weak measurement and environmental interaction, the average secret key rate is improved.

  11. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  12. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  13. Two-party quantum key agreement based on four-particle GHZ states

    He, Ye-Feng; Ma, Wen-Ping

    2016-04-01

    Based on four-particle GHZ states, the double CNOT operation and the delayed measurement technique, a two-party quantum key agreement (QKA) protocols is proposed. The double CNOT operation makes each four-particle GHZ state collapse into two independent quantum states without any entanglement. Furthermore, one party can directly know the two quantum states and the other party can be aware of the two quantum states by using the corresponding measurement. According to the initial states of the two quantum states, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Then the protocol achieves the fair establishment of a shared key. The security analysis shows that the new protocol can resist against participant attacks, the Trojan horse attacks and other outsider attacks. Furthermore, the new protocol also has no information leakage problem and has high qubit efficiency.

  14. Demonstration Of The Violation Of Bell Inequality In Quantum Key Distribution

    Dermez, R.

    2010-01-01

    Today, the data privacy has become very important. Quantum Key Distribution (QKD) system is developed in this area. QKD, coding technique with single-use method of encoding used keys (information and messages) security guarantees. The system is based on Quantum Mechanics (The Certainty Principle). However, in some cases for quantum communication, QKD are limited. In determining this limit Bell Inequality (CHSH Inequality, 1969) is used. Bell inequality shows a violation of Quantum Key Distribution. In this study, using the program of Matematica 6, QKD through bilateral quantum system (system with two qubits) has been investigating the leak case and the violations. We showed leakage and violations in these figures via the calculations results in Matematica program.

  15. Quantum cryptography to satellites for global secure key distribution

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  16. I, Quantum Robot: Quantum Mind control on a Quantum Computer

    Zizzi, Paola

    2008-01-01

    The logic which describes quantum robots is not orthodox quantum logic, but a deductive calculus which reproduces the quantum tasks (computational processes, and actions) taking into account quantum superposition and quantum entanglement. A way toward the realization of intelligent quantum robots is to adopt a quantum metalanguage to control quantum robots. A physical implementation of a quantum metalanguage might be the use of coherent states in brain signals.

  17. Cartesian coupled coherent states simulations: Ne(n)Br2 dissociation as a test case.

    Reed, Stewart K; González-Martínez, Maykel L; Rubayo-Soneira, Jesús; Shalashilin, Dmitrii V

    2011-02-07

    In this article, we describe coupled coherent states (CCS) simulations of vibrational predissociation of weakly bounded complexes. The CCS method is implemented in the Cartesian frame in a manner that is similar to classical molecular dynamics. The calculated lifetimes of the vibrationally excited Ne-Br(2)(ν) complexes agree with experiment and previous calculations. Although the CCS method is, in principle, a fully quantum approach, in practice it typically becomes a semiclassical technique at long times. This is especially true following dissociation events. Consequently, it is very difficult to converge the quantum calculations of the final Br(2) vibrational distributions after predissociation and of the autocorrelation functions. However, the main advantage of the method is that it can be applied with relative ease to determine the lifetimes of larger complexes and, in order to demonstrate this, preliminary results for tetra- and penta-atomic clusters are reported.

  18. Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts

    Alagic, Gorjan; Russell, Alexander

    2017-01-01

    Recent results of Kaplan et al., building on work by Kuwakado and Morii, have shown that a wide variety of classically-secure symmetric-key cryptosystems can be completely broken by quantum chosen-plaintext attacks (qCPA). In such an attack, the quantum adversary has the ability to query the cryp...

  19. Temporal steering and security of quantum key distribution with mutually unbiased bases against individual attacks

    Bartkiewicz, K.; Černoch, Antonín; Lemr, K.; Miranowicz, A.; Nori, F.

    2016-01-01

    Roč. 93, č. 6 (2016), 1-7, č. článku 062345. ISSN 2469-9926 R&D Projects: GA ČR GAP205/12/0382 Institutional support: RVO:68378271 Keywords : quantum key distribution * Einstein-Podolsky-Rosen steering * temporal quantum correlations Subject RIV: BH - Optics, Masers, Lasers Impact factor: 2.925, year: 2016

  20. Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks

    Corndorf, Eric; Liang Chuang; Kanter, Gregory S.; Kumar, Prem; Yuen, Horace P.

    2005-01-01

    We demonstrate high-rate randomized data-encryption through optical fibers using the inherent quantum-measurement noise of coherent states of light. Specifically, we demonstrate 650 Mbit/s data encryption through a 10 Gbit/s data-bearing, in-line amplified 200-km-long line. In our protocol, legitimate users (who share a short secret key) communicate using an M-ry signal set while an attacker (who does not share the secret key) is forced to contend with the fundamental and irreducible quantum-measurement noise of coherent states. Implementations of our protocol using both polarization-encoded signal sets as well as polarization-insensitive phase-keyed signal sets are experimentally and theoretically evaluated. Different from the performance criteria for the cryptographic objective of key generation (quantum key-generation), one possible set of performance criteria for the cryptographic objective of data encryption is established and carefully considered

  1. Proceedings of quantum field theory, quantum mechanics, and quantum optics

    Dodonov, V.V.; Man; ko, V.I.

    1991-01-01

    This book contains papers presented at the XVIII International Colloquium on Group Theoretical Methods in Physics held in Moscow on June 4-9, 1990. Topics covered include; applications of algebraic methods in quantum field theory, quantum mechanics, quantum optics, spectrum generating groups, quantum algebras, symmetries of equations, quantum physics, coherent states, group representations and space groups

  2. Higher-dimensional orbital-angular-momentum-based quantum key distribution with mutually unbiased bases

    Mafu, M

    2013-09-01

    Full Text Available We present an experimental study of higher-dimensional quantum key distribution protocols based on mutually unbiased bases, implemented by means of photons carrying orbital angular momentum. We perform (d + 1) mutually unbiased measurements in a...

  3. Comment on ''Semiquantum-key distribution using less than four quantum states''

    Boyer, Michel; Mor, Tal

    2011-01-01

    For several decades it was believed that information-secure key distribution requires both the sender and receiver to have the ability to generate and/or manipulate quantum states. Earlier, we showed that quantum key distribution in which one party is classical is possible [Boyer, Kenigsberg, and Mor, Phys. Rev. Lett. 99, 140501 (2007)]. A surprising and very nice extension of that result was suggested by Zou, Qiu, Li, Wu, and Li [Phys. Rev. A 79, 052312 (2009)]. Their paper suggests that it is sufficient for the originator of the states (the person holding the quantum technology) to generate just one state. The resulting semiquantum key distribution, which we call here 'quantum key distribution with classical Alice' is indeed completely robust against eavesdropping. However, their proof (that no eavesdropper can get information without being possibly detected) is faulty. We provide here a fully detailed and direct proof of their very important result.

  4. Secure multi-party communication with quantum key distribution managed by trusted authority

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  5. Secure multi-party communication with quantum key distribution managed by trusted authority

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  6. Nonlinear dynamics of semiclassical coherent states in periodic potentials

    Carles, Rémi; Sparber, Christof

    2012-01-01

    We consider nonlinear Schrödinger equations with either local or nonlocal nonlinearities. In addition, we include periodic potentials as used, for example, in matter wave experiments in optical lattices. By considering the corresponding semiclassical scaling regime, we construct asymptotic solutions, which are concentrated both in space and in frequency around the effective semiclassical phase-space flow induced by Bloch’s spectral problem. The dynamics of these generalized coherent states is governed by a nonlinear Schrödinger model with effective mass. In the case of nonlocal nonlinearities, we establish a novel averaging-type result in the critical case. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’. (paper)

  7. Robust shot-noise measurement for continuous-variable quantum key distribution

    Kunz-Jacques, Sébastien; Jouguet, Paul

    2015-02-01

    We study a practical method to measure the shot noise in real time in continuous-variable quantum key distribution systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e., noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  8. Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources

    Al–Safi, S W; Wilmott, C M

    2015-01-01

    It has been established that the security of quantum key distribution protocols can be severely compromised were one to permit an eavesdropper to possess a very limited knowledge of the random sources used between the communicating parties. While such knowledge should always be expected in realistic experimental conditions, the result itself opened a new line of research to fully account for real-world weak randomness threats to quantum cryptography. Here we expand of this novel idea by describing a key distribution scheme that is provably secure against general attacks by a post-quantum adversary. We then discuss possible security consequences for such schemes under the assumption of weak randomness. (paper)

  9. High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits

    Ding, Yunhong; Bacco, Davide; Dalgaard, Kjeld

    2017-01-01

    is intrinsically limited to 1 bit/photon. Here we propose and experimentally demonstrate, for the first time, a high-dimensional quantum key distribution protocol based on space division multiplexing in multicore fiber using silicon photonic integrated lightwave circuits. We successfully realized three mutually......-dimensional quantum states, and enables breaking the information efficiency limit of traditional quantum key distribution protocols. In addition, the silicon photonic circuits used in our work integrate variable optical attenuators, highly efficient multicore fiber couplers, and Mach-Zehnder interferometers, enabling...

  10. Coherent-state representation for the QCD ground state

    Celenza, L.S.; Ji, C.; Shakin, C.M.

    1987-01-01

    We make use of the temporal gauge to construct a coherent state which is meant to describe the gluon condensate in the QCD vacuum under the assumption that the condensate is in a zero-momentum mode. The state so constructed is a color singlet and will yield finite, nonperturbative vacuum expectation values such as . (This matrix element is found to have a value of about 0.012 GeV 4 in QCD sum-rule studies.)

  11. Wigner Function of Thermo-Invariant Coherent State

    Xue-Fen, Xu; Shi-Qun, Zhu

    2008-01-01

    By using the thermal Winger operator of thermo-field dynamics in the coherent thermal state |ξ) representation and the technique of integration within an ordered product of operators, the Wigner function of the thermo-invariant coherent state |z,ℵ> is derived. The nonclassical properties of state |z,ℵ> is discussed based on the negativity of the Wigner function. (general)

  12. Generalized Spin Coherent States: Construction and Some Physical Properties

    Berrada, K.; El Baz, M.; Hassouni, Y.

    2009-12-01

    A generalized deformation of the su(2) algebra and a scheme for constructing associated spin coherent states is developed. The problem of resolving the unity operator in terms of these states is addressed and solved for some particular cases. The construction is carried using a deformation of Holstein-Primakoff realization of the su(2) algebra. The physical properties of these states is studied through the calculation of Mandel's parameter. (author)

  13. Theory and practice of dressed coherent states in circuit QED

    Wilhelm, Frank [Theoretical Physics, Saarland University, Campus E 2.6, 66123 Saarbruecken (Germany); Govia, Luke C.G. [Theoretical Physics, Saarland University, Campus E 2.6, 66123 Saarbruecken (Germany); Department of Physics, McGill University, Montreal (Canada)

    2016-07-01

    In the dispersive regime of qubit-cavity coupling, classical cavity drive populates the cavity, but leaves the qubit state unaffected. However, the dispersive Hamiltonian is derived after both a frame transformation and an approximation. Therefore, to connect to external experimental devices, the inverse frame transformation from the dispersive frame back to the lab frame is necessary. We show that in the lab frame the system is best described by an entangled state known as the dressed coherent state, and thus even in the dispersive regime, entanglement is generated between the qubit and the cavity. Also, we show that further qubit evolution depends on both the amplitude and phase of the dressed coherent state. This provides a limitation to readout in the dispersive regime. We show that only in the limit of infinite measurement time is this protocol QND, as the formation of a dressed coherent state in the qubit-cavity system applies an effective rotation to the qubit state. We show how this rotation can be corrected by a unitary operation, leading to improved qubit initialization by measurement and unitary feedback.

  14. Security of quantum key distributions with entangled qudits

    Durt, Thomas; Kaszlikowski, Dagomir; Chen, Jing-Ling; Kwek, L. C.

    2004-03-01

    We consider a generalization of Ekert's entanglement-based quantum cryptographic protocol where qubits are replaced by N - or d -dimensional systems (qudits). In order to study its robustness against optimal incoherent attacks, we derive the information gained by a potential eavesdropper during a cloning-based individual attack. In doing so, we generalize Cerf’s formalism for cloning machines and establish the form of the most general cloning machine that respects all the symmetries of the problem. We obtain an upper bound on the error rate that guarantees the confidentiality of qudit generalizations of the Ekert’s protocol for qubits.

  15. Investigating and Improving Student Understanding of Key Ideas in Quantum Mechanics throughout Instruction

    Emigh, Paul Jeffrey

    This dissertation describes research on student understanding of quantum mechanics across multiple levels of instruction. The primary focus has been to identify patterns in student reasoning related to key concepts in quantum mechanics. The specific topics include quantum measurements, time dependence, vector spaces, and angular momentum. The research has spanned a variety of different quantum courses intended for introductory physics students, upper-division physics majors, and graduate students in physics. The results of this research have been used to develop a set of curriculum, Tutorials in Physics: Quantum Mechanics, for addressing the most persistent student difficulties. We document both the development of this curriculum and how it has impacted and improved student understanding of quantum mechanics.

  16. Quantum Encryption Minimising Key Leakage under Known Plaintext Attacks

    Pedersen, Thomas Brochmann

    2006-01-01

    , or interactive encryption schemes, where the interaction does not need to occur online. In our model we show that the amount of key leaked under a known plaintext attack can be made arbitrarily small even in non-interactive encryption schemes. We also give an encryption scheme where eavesdropping can be detected....... In this encryption scheme the entire key can be safely recycled when no eavesdropping is detected....

  17. Two-party quantum key agreement protocol with four-particle entangled states

    He, Yefeng; Ma, Wenping

    2016-09-01

    Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  18. Quantum-locked key distribution at nearly the classical capacity rate.

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  19. Noise suppression in an atomic system under the action of a field in a squeezed coherent state

    Gelman, A. I.; Mironov, V. A.

    2010-01-01

    The interaction of a quantized electromagnetic field in a squeezed coherent state with a three-level Λ-atom is studied numerically by the quantum Monte Carlo method and analytically by the Heisenberg-Langevin method in the regime of electromagnetically induced transparency (EIT). The possibility of noise suppression in the atomic system through the quantum properties of squeezed light is considered in detail; the characteristics of the atomic system responsible for the relaxation processes and noise in the EIT band have been found. Further applications of the Monte Carlo method and the developed numerical code to the study of more complex systems are discussed.

  20. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Kern, Oliver

    2009-05-25

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  1. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Kern, Oliver

    2009-01-01

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  2. Adiabatic pipelining: a key to ternary computing with quantum dots

    Pečar, P.; Ramšak, A.; Zimic, N.; Mraz, M.; Lebar Bajec, I.

    2008-12-01

    The quantum-dot cellular automaton (QCA), a processing platform based on interacting quantum dots, was introduced by Lent in the mid-1990s. What followed was an exhilarating period with the development of the line, the functionally complete set of logic functions, as well as more complex processing structures, however all in the realm of binary logic. Regardless of these achievements, it has to be acknowledged that the use of binary logic is in computing systems mainly the end result of the technological limitations, which the designers had to cope with in the early days of their design. The first advancement of QCAs to multi-valued (ternary) processing was performed by Lebar Bajec et al, with the argument that processing platforms of the future should not disregard the clear advantages of multi-valued logic. Some of the elementary ternary QCAs, necessary for the construction of more complex processing entities, however, lead to a remarkable increase in size when compared to their binary counterparts. This somewhat negates the advantages gained by entering the ternary computing domain. As it turned out, even the binary QCA had its initial hiccups, which have been solved by the introduction of adiabatic switching and the application of adiabatic pipeline approaches. We present here a study that introduces adiabatic switching into the ternary QCA and employs the adiabatic pipeline approach to successfully solve the issues of elementary ternary QCAs. What is more, the ternary QCAs presented here are sizewise comparable to binary QCAs. This in our view might serve towards their faster adoption.

  3. Adiabatic pipelining: a key to ternary computing with quantum dots

    Pecar, P; Zimic, N; Mraz, M; Lebar Bajec, I; Ramsak, A

    2008-01-01

    The quantum-dot cellular automaton (QCA), a processing platform based on interacting quantum dots, was introduced by Lent in the mid-1990s. What followed was an exhilarating period with the development of the line, the functionally complete set of logic functions, as well as more complex processing structures, however all in the realm of binary logic. Regardless of these achievements, it has to be acknowledged that the use of binary logic is in computing systems mainly the end result of the technological limitations, which the designers had to cope with in the early days of their design. The first advancement of QCAs to multi-valued (ternary) processing was performed by Lebar Bajec et al, with the argument that processing platforms of the future should not disregard the clear advantages of multi-valued logic. Some of the elementary ternary QCAs, necessary for the construction of more complex processing entities, however, lead to a remarkable increase in size when compared to their binary counterparts. This somewhat negates the advantages gained by entering the ternary computing domain. As it turned out, even the binary QCA had its initial hiccups, which have been solved by the introduction of adiabatic switching and the application of adiabatic pipeline approaches. We present here a study that introduces adiabatic switching into the ternary QCA and employs the adiabatic pipeline approach to successfully solve the issues of elementary ternary QCAs. What is more, the ternary QCAs presented here are sizewise comparable to binary QCAs. This in our view might serve towards their faster adoption.

  4. Adiabatic pipelining: a key to ternary computing with quantum dots.

    Pečar, P; Ramšak, A; Zimic, N; Mraz, M; Lebar Bajec, I

    2008-12-10

    The quantum-dot cellular automaton (QCA), a processing platform based on interacting quantum dots, was introduced by Lent in the mid-1990s. What followed was an exhilarating period with the development of the line, the functionally complete set of logic functions, as well as more complex processing structures, however all in the realm of binary logic. Regardless of these achievements, it has to be acknowledged that the use of binary logic is in computing systems mainly the end result of the technological limitations, which the designers had to cope with in the early days of their design. The first advancement of QCAs to multi-valued (ternary) processing was performed by Lebar Bajec et al, with the argument that processing platforms of the future should not disregard the clear advantages of multi-valued logic. Some of the elementary ternary QCAs, necessary for the construction of more complex processing entities, however, lead to a remarkable increase in size when compared to their binary counterparts. This somewhat negates the advantages gained by entering the ternary computing domain. As it turned out, even the binary QCA had its initial hiccups, which have been solved by the introduction of adiabatic switching and the application of adiabatic pipeline approaches. We present here a study that introduces adiabatic switching into the ternary QCA and employs the adiabatic pipeline approach to successfully solve the issues of elementary ternary QCAs. What is more, the ternary QCAs presented here are sizewise comparable to binary QCAs. This in our view might serve towards their faster adoption.

  5. The study of entanglement and teleportation of the harmonic oscillator bipartite coherent states

    A Rabeie and

    2015-01-01

    Full Text Available In this paper, we reproduce the harmonic oscillator bipartite coherent states with imperfect cloning of coherent states. We show that if these entangled coherent states are embedded in a vacuum environment, their entanglement is degraded but not totally lost . Also, the optimal fidelity of these states is worked out for investigating their teleportation

  6. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  7. Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

    Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan

    2014-10-01

    In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

  8. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

    2016-11-15

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  9. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  10. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    Molotkov, S. N.

    2016-01-01

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  11. Multi-user quantum key distribution based on Bell states with mutual authentication

    Lin Song; Huang Chuan; Liu Xiaofen

    2013-01-01

    A new multi-user quantum key distribution protocol with mutual authentication is proposed on a star network. Here, two arbitrary users are able to perform key distribution with the assistance of a semi-trusted center. Bell states are used as information carriers and transmitted in a quantum channel between the center and one user. A keyed hash function is utilized to ensure the identities of three parties. Finally, the security of this protocol with respect to various kinds of attacks is discussed. (paper)

  12. Time–energy high-dimensional one-side device-independent quantum key distribution

    Bao Hai-Ze; Bao Wan-Su; Wang Yang; Chen Rui-Ke; Ma Hong-Xin; Zhou Chun; Li Hong-Wei

    2017-01-01

    Compared with full device-independent quantum key distribution (DI-QKD), one-side device-independent QKD (1sDI-QKD) needs fewer requirements, which is much easier to meet. In this paper, by applying recently developed novel time–energy entropic uncertainty relations, we present a time–energy high-dimensional one-side device-independent quantum key distribution (HD-QKD) and provide the security proof against coherent attacks. Besides, we connect the security with the quantum steering. By numerical simulation, we obtain the secret key rate for Alice’s different detection efficiencies. The results show that our protocol can performance much better than the original 1sDI-QKD. Furthermore, we clarify the relation among the secret key rate, Alice’s detection efficiency, and the dispersion coefficient. Finally, we simply analyze its performance in the optical fiber channel. (paper)

  13. No-signaling quantum key distribution: solution by linear programming

    Hwang, Won-Young; Bae, Joonwoo; Killoran, Nathan

    2015-02-01

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csiszár-Körner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  14. Device-independent secret-key-rate analysis for quantum repeaters

    Holz, Timo; Kampermann, Hermann; Bruß, Dagmar

    2018-01-01

    The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We study secret key rates in the device-independent scenario for different quantum repeater setups and compare them to their device-dependent analogon. The quantum repeater setups under consideration are the original protocol by Briegel et al. [Phys. Rev. Lett. 81, 5932 (1998), 10.1103/PhysRevLett.81.5932] and the hybrid quantum repeater protocol by van Loock et al. [Phys. Rev. Lett. 96, 240501 (2006), 10.1103/PhysRevLett.96.240501]. For a given repeater scheme and a given QKD protocol, the secret key rate depends on a variety of parameters, such as the gate quality or the detector efficiency. We systematically analyze the impact of these parameters and suggest optimized strategies.

  15. Daylight operation of a free space, entanglement-based quantum key distribution system

    Peloso, Matthew P; Gerhardt, Ilja; Ho, Caleb; Lamas-Linares, AntIa; Kurtsiefer, Christian [Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 (Singapore)], E-mail: christian.kurtsiefer@gmail.com

    2009-04-15

    Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from the background light. Here, we present a lean entanglement-based QKD system overcoming that limitation. By implementing spectral, spatial and temporal filtering techniques, we establish a secure key continuously over several days under varying light and weather conditions.

  16. 2016 CIRM conference : Coherent States and their Applications : A Contemporary Panorama

    Bagarello, Fabio; Gazeau, Jean-Pierre

    2018-01-01

    Coherent states (CS) were originally introduced in 1926 by Schrödinger and rediscovered in the early 1960s in the context of laser physics. Since then, they have evolved into an extremely rich domain that pervades virtually every corner of physics, and have also given rise to a range of research topics in mathematics. The purpose of the 2016 CIRM conference was to bring together leading experts in the field with scientists interested in related topics, to jointly investigate their applications in physics, their various mathematical properties, and their generalizations in many directions. Instead of traditional proceedings, this book presents sixteen longer review-type contributions, which are the outcome of a collaborative effort by many conference participants, subsequently reviewed by independent experts. The book aptly illustrates the diversity of CS aspects, from purely mathematical topics to physical applications, including quantum gravity.

  17. Generation of coherent states of photon-added type via pathway of eigenfunctions

    Gorska, K; Penson, K A; Duchamp, G H E

    2010-01-01

    We obtain and investigate the regular eigenfunctions of simple differential operators x r d r+1 /dx r+1 , r = 1, 2, ..., with the eigenvalues equal to 1. With the help of these eigenfunctions, we construct a non-unitary analogue of a boson displacement operator which will be acting on the vacuum. In this way, we generate collective quantum states of the Fock space which are normalized and equipped with the resolution of unity with the positive weight functions that we obtain explicitly. These states are thus coherent states in the sense of Klauder. They span the truncated Fock space without first r lowest-lying basis states: |0), |1), ..., |r - 1). These states are squeezed, sub-Poissonian in nature and reminiscent of photon-added states in Agarwal and Tara (1991 Phys. Rev. A 43 492).

  18. New SUSYQM coherent states for Pöschl-Teller potentials: a detailed mathematical analysis

    Bergeron, H.; Siegl, P.; Youssef, A.

    2012-06-01

    In a recent short note (Bergeron et al 2010 Europhys. Lett. 92 60003), we have presented the good properties of a new family of semi-classical states for Pöschl-Teller potentials. These states are built from a supersymmetric quantum mechanics (SUSYQM) approach and the parameters of these ‘coherent’ states are points in the classical phase space. In this paper, we develop all the mathematical aspects that have been left out of the previous paper (proof of the resolution of unity, detailed calculations of the quantized version of classical observables and mathematical study of the resulting operators: problems of domains, self-adjointness or self-adjoint extensions). Some additional questions such as asymptotic behavior are also studied. Moreover, the framework is extended to a larger class of Pöschl-Teller potentials. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’.

  19. Memory-assisted quantum key distribution resilient against multiple-excitation effects

    Lo Piparo, Nicolò; Sinclair, Neil; Razavi, Mohsen

    2018-01-01

    Memory-assisted measurement-device-independent quantum key distribution (MA-MDI-QKD) has recently been proposed as a technique to improve the rate-versus-distance behavior of QKD systems by using existing, or nearly-achievable, quantum technologies. The promise is that MA-MDI-QKD would require less demanding quantum memories than the ones needed for probabilistic quantum repeaters. Nevertheless, early investigations suggest that, in order to beat the conventional memory-less QKD schemes, the quantum memories used in the MA-MDI-QKD protocols must have high bandwidth-storage products and short interaction times. Among different types of quantum memories, ensemble-based memories offer some of the required specifications, but they typically suffer from multiple excitation effects. To avoid the latter issue, in this paper, we propose two new variants of MA-MDI-QKD both relying on single-photon sources for entangling purposes. One is based on known techniques for entanglement distribution in quantum repeaters. This scheme turns out to offer no advantage even if one uses ideal single-photon sources. By finding the root cause of the problem, we then propose another setup, which can outperform single memory-less setups even if we allow for some imperfections in our single-photon sources. For such a scheme, we compare the key rate for different types of ensemble-based memories and show that certain classes of atomic ensembles can improve the rate-versus-distance behavior.

  20. Probabilistic cloning of coherent states without a phase reference

    Müller, Christian R.; Wittmann, Christoffer; Marek, Petr

    2012-01-01

    We present a probabilistic cloning scheme operating independently of any phase reference. The scheme is based solely on a phase-randomized displacement and photon counting, omitting the need for nonclassical resources and nonlinear materials. In an experimental implementation, we employ the scheme...... to clone coherent states from a phase covariant alphabet and demonstrate that the cloner is capable of outperforming the hitherto best-performing deterministic scheme. An analysis of the covariances between the output states shows that uncorrelated clones can be approached asymptotically...

  1. Deformed exterior algebra, quons and their coherent states

    El Baz, M.; Hassouni, Y.

    2002-08-01

    We review the notion of the deformation of the exterior wedge product. This allows us to construct the deformation of the algebra of exterior forms over a vector space and also over an arbitrary manifold. We relate this approach to the generalized statistics and we study quons, as a particular case of these generalized statistics. We also give their statistical properties. A large part of the work is devoted to the problem of constructing coherent states for the deformed oscillators. We give a review of all the approaches existing in the literature concerning this point and enforce it with many examples. (author)

  2. Faithful test of nonlocal realism with entangled coherent states

    Lee, Chang-Woo; Jeong, Hyunseok; Paternostro, Mauro

    2011-01-01

    We investigate the violation of Leggett's inequality for nonlocal realism using entangled coherent states and various types of local measurements. We prove mathematically the relation between the violation of the Clauser-Horne-Shimony-Holt form of Bell's inequality and Leggett's one when tested by the same resources. For Leggett inequalities, we generalize the nonlocal realistic bound to systems in Hilbert spaces larger than bidimensional ones and introduce an optimization technique that allows one to achieve larger degrees of violation by adjusting the local measurement settings. Our work describes the steps that should be performed to produce a self-consistent generalization of Leggett's original arguments to continuous-variable states.

  3. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    Ma Hong-Xin; Bao Wan-Su; Li Hong-Wei; Chou Chun

    2016-01-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. (paper)

  4. Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

    Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun

    2016-08-01

    We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

  5. Adaptive estimation of a time-varying phase with coherent states: Smoothing can give an unbounded improvement over filtering

    Laverick, Kiarn T.; Wiseman, Howard M.; Dinani, Hossein T.; Berry, Dominic W.

    2018-04-01

    The problem of measuring a time-varying phase, even when the statistics of the variation is known, is considerably harder than that of measuring a constant phase. In particular, the usual bounds on accuracy, such as the 1 /(4 n ¯) standard quantum limit with coherent states, do not apply. Here, by restricting to coherent states, we are able to analytically obtain the achievable accuracy, the equivalent of the standard quantum limit, for a wide class of phase variation. In particular, we consider the case where the phase has Gaussian statistics and a power-law spectrum equal to κp -1/|ω| p for large ω , for some p >1 . For coherent states with mean photon flux N , we give the quantum Cramér-Rao bound on the mean-square phase error as [psin(π /p ) ] -1(4N /κ ) -(p -1 )/p . Next, we consider whether the bound can be achieved by an adaptive homodyne measurement in the limit N /κ ≫1 , which allows the photocurrent to be linearized. Applying the optimal filtering for the resultant linear Gaussian system, we find the same scaling with N , but with a prefactor larger by a factor of p . By contrast, if we employ optimal smoothing we can exactly obtain the quantum Cramér-Rao bound. That is, contrary to previously considered (p =2 ) cases of phase estimation, here the improvement offered by smoothing over filtering is not limited to a factor of 2 but rather can be unbounded by a factor of p . We also study numerically the performance of these estimators for an adaptive measurement in the limit where N /κ is not large and find a more complicated picture.

  6. Two-party quantum key agreement with five-particle entangled states

    He, Ye-Feng; Ma, Wen-Ping

    A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  7. Practical private database queries based on a quantum-key-distribution protocol

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-01-01

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  8. Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial QKD systems in commercial fiber networks

    Jacak, Monika; Jacak, Janusz; Jóźwiak, Piotr; Jóźwiak, Ireneusz

    2016-06-01

    The overview of the current status of quantum cryptography is given in regard to quantum key distribution (QKD) protocols, implemented both on nonentangled and entangled flying qubits. Two commercial R&D platforms of QKD systems are described (the Clavis II platform by idQuantique implemented on nonentangled photons and the EPR S405 Quelle platform by AIT based on entangled photons) and tested for feasibility of their usage in commercial TELECOM fiber metropolitan networks. The comparison of systems efficiency, stability and resistivity against noise and hacker attacks is given with some suggestion toward system improvement, along with assessment of two models of QKD.

  9. Analysis of Faraday Mirror in Auto-Compensating Quantum Key Distribution

    Wei Ke-Jin; Ma Hai-Qiang; Li Rui-Xue; Zhu Wu; Liu Hong-Wei; Zhang Yong; Jiao Rong-Zhen

    2015-01-01

    The ‘plug and play’ quantum key distribution system is the most stable and the earliest commercial system in the quantum communication field. Jones matrix and Jones calculus are widely used in the analysis of this system and the improved version, which is called the auto-compensating quantum key distribution system. Unfortunately, existing analysis has two drawbacks: only the auto-compensating process is analyzed and existing systems do not fully consider laser phase affected by a Faraday mirror (FM). In this work, we present a detailed analysis of the output of light pulse transmitting in a plug and play quantum key distribution system that contains only an FM, by Jones calculus. A similar analysis is made to a home-made auto-compensating system which contains two FMs to compensate for environmental effects. More importantly, we show that theoretical and experimental results are different in the plug and play interferometric setup due to the fact that a conventional Jones matrix of FM neglected an additional phase π on alternative polarization direction. To resolve the above problem, we give a new Jones matrix of an FM according to the coordinate rotation. This new Jones matrix not only resolves the above contradiction in the plug and play interferometric setup, but also is suitable for the previous analyses about auto-compensating quantum key distribution. (paper)

  10. The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD)

    Tysowski, Piotr K.; Ling, Xinhua; Lütkenhaus, Norbert; Mosca, Michele

    2018-04-01

    Quantum key distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an enterprise IT environment. Significant challenges exist in building a practical key management service (KMS) for use in a metropolitan network. QKD is generally a point-to-point technique only and is subject to steep performance constraints. The integration of QKD into enterprise-level computing has been researched, to enable quantum-safe communication. A novel method for constructing a KMS is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site. A key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users. The KMS operates within a layered architectural style that is able to interoperate with various underlying QKD implementations. Variable levels of security for the host population are enforced through a policy engine. A network layer provides key generation across a network of nodes connected by quantum links. Scheduling and routing functionality allows quantum key material to be relayed across trusted nodes. Optimizations are performed to match the real-time host demand for key material with the capacity afforded by the infrastructure. The result is a flexible and scalable architecture that is suitable for enterprise use and independent of any specific QKD technology.

  11. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  12. Phase-remapping attack in practical quantum-key-distribution systems

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  13. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  14. Effect of dielectric medium on the nonclassical properties of nonlinear sphere coherent states

    E Amooghorban

    2014-04-01

    Full Text Available In order to investigate the effect of a medium with dissipation and dispersion and also the curvature of the physical space on the properties of the incident quantum states, we use the quantization of electromagnetic field based on phenomenological approach to obtain input-output relations between radiations on both sides of dielectric slab. By using these relations the fidelity, the Wigner function, and also the quantum correlation of the outgoing state through dielectric slab are obtained for a situation in which the rightward incident state is a nonlinear coherent state on a sphere and the leftward incident state is a vacuum state. Here, the incident states are considered monochromatic and the modeling of the medium is given by the Lorentz' model. Accordingly, we study nonclassical properties of the output states such as the quantum entanglement. It will be observed that the nonclassical properties of the outgoing states depend strongly on the optical property of the medium and also on the curvature of the physical state.

  15. Multi-party Measurement-Device-Independent Quantum Key Distribution Based on Cluster States

    Liu, Chuanqi; Zhu, Changhua; Ma, Shuquan; Pei, Changxing

    2018-03-01

    We propose a novel multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on cluster states. A four-photon analyzer which can distinguish all the 16 cluster states serves as the measurement device for four-party MDI-QKD. Any two out of four participants can build secure keys after the analyzers obtains successful outputs and the two participants perform post-processing. We derive a security analysis for the protocol, and analyze the key rates under different values of polarization misalignment. The results show that four-party MDI-QKD is feasible over 280 km in the optical fiber channel when the key rate is about 10- 6 with the polarization misalignment parameter 0.015. Moreover, our work takes an important step toward a quantum communication network.

  16. Improved two-way six-state protocol for quantum key distribution

    Shaari, J.S., E-mail: jesni_shamsul@yahoo.com [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia); Bahari, Asma' Ahmad [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia)

    2012-10-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  17. Improved two-way six-state protocol for quantum key distribution

    Shaari, J.S.; Bahari, Asma' Ahmad

    2012-01-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  18. Security of a practical semi-device-independent quantum key distribution protocol against collective attacks

    Wang Yang; Bao Wan-Su; Li Hong-Wei; Zhou Chun; Li Yuan

    2014-01-01

    Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribution (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices. The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a one-way prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. (general)

  19. Kochen-Specker theorem as a precondition for secure quantum key distribution

    Nagata, Koji

    2005-01-01

    We show that (1) the violation of the Ekert 1991 inequality is a sufficient condition for certification of the Kochen-Specker (KS) theorem, and (2) the violation of the Bennett-Brassard-Mermin 1992 (BBM92) inequality is, also, a sufficient condition for certification of the KS theorem. Therefore the success in each quantum key distribution protocol reveals the nonclassical feature of quantum theory, in the sense that the KS realism is violated. Further, it turned out that the Ekert inequality and the BBM inequality are depictured by distillable entanglement witness inequalities. Here, we connect the success in these two key distribution processes into the no-hidden-variables theorem and into witness on distillable entanglement. We also discuss the explicit difference between the KS realism and Bell's local realism in the Hilbert space formalism of quantum theory

  20. Security bound of two-basis quantum-key-distribution protocols using qudits

    Nikolopoulos, Georgios M.; Alber, Gernot

    2005-01-01

    We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid

  1. Security of differential-phase-shift quantum key distribution against individual attacks

    Waks, Edo; Takesue, Hiroki; Yamamoto, Yoshihisa

    2006-01-01

    We derive a proof of security for the differential-phase-shift quantum key distribution protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful

  2. Intrinsically stable phase-modulated polarization encoding system for quantum key distribution

    Liu Xiaobao [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China); Liao Changjun [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China)], E-mail: chliao@scnu.edu.cn; Mi Jinglong; Wang Jindong; Liu Songhao [Laboratory of Photonic Information Technology, School for Information and Optoelectronic Science and Engineering, South China Normal University, Guangzhou 510006 (China)

    2008-12-22

    We demonstrate experimentally an intrinsically stable polarization coding and decoding system composed of optical-fiber Sagnac interferometers with integrated phase modulators for quantum key distribution. An interference visibility of 98.35% can be kept longtime during the experiment without any efforts of active compensation for coding all four desired polarization states.

  3. Independent attacks in imperfect settings: A case for a two-way quantum key distribution scheme

    Shaari, J.S.; Bahari, Iskandar

    2010-01-01

    We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.

  4. Quantification of the Impact of Photon Distinguishability on Measurement-Device- Independent Quantum Key Distribution

    Garrett K. Simon

    2018-04-01

    Full Text Available Measurement-Device-Independent Quantum Key Distribution (MDI-QKD is a two-photon protocol devised to eliminate eavesdropping attacks that interrogate or control the detector in realized quantum key distribution systems. In MDI-QKD, the measurements are carried out by an untrusted third party, and the measurement results are announced openly. Knowledge or control of the measurement results gives the third party no information about the secret key. Error-free implementation of the MDI-QKD protocol requires the crypto-communicating parties, Alice and Bob, to independently prepare and transmit single photons that are physically indistinguishable, with the possible exception of their polarization states. In this paper, we apply the formalism of quantum optics and Monte Carlo simulations to quantify the impact of small errors in wavelength, bandwidth, polarization and timing between Alice’s photons and Bob’s photons on the MDI-QKD quantum bit error rate (QBER. Using published single-photon source characteristics from two-photon interference experiments as a test case, our simulations predict that the finite tolerances of these sources contribute ( 4.04 ± 20 / N sifted % to the QBER in an MDI-QKD implementation generating an N sifted -bit sifted key.

  5. Comment on ``Semiquantum-key distribution using less than four quantum states''

    Boyer, Michel; Mor, Tal

    2011-04-01

    For several decades it was believed that information-secure key distribution requires both the sender and receiver to have the ability to generate and/or manipulate quantum states. Earlier, we showed that quantum key distribution in which one party is classical is possible [Boyer, Kenigsberg, and Mor, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.99.140501 99, 140501 (2007)]. A surprising and very nice extension of that result was suggested by Zou, Qiu, Li, Wu, and Li [Phys. Rev. APLRAAN1050-294710.1103/PhysRevA.79.052312 79, 052312 (2009)]. Their paper suggests that it is sufficient for the originator of the states (the person holding the quantum technology) to generate just one state. The resulting semiquantum key distribution, which we call here “quantum key distribution with classical Alice” is indeed completely robust against eavesdropping. However, their proof (that no eavesdropper can get information without being possibly detected) is faulty. We provide here a fully detailed and direct proof of their very important result.

  6. A generalized Collins formula derived by virtue of the displacement-squeezing related squeezed coherent state representation

    Chuan-Mei, Xie; Shao-Long, Wan; Hong-Yi, Fan

    2010-01-01

    Based on the displacement-squeezing related squeezed coherent state representation |z) g and using the technique of integration within an ordered product of operators, this paper finds a generalized Fresnel operator, whose matrix element in the coordinate representation leads to a generalized Collins formula (Huygens–Fresnel integration transformation describing optical diffraction). The generalized Fresnel operator is derived by a quantum mechanical mapping from z to sz - rz * in the |z) g representation, while |z) g in phase space is graphically denoted by an ellipse. (classical areas of phenomenology)

  7. Optimal multicopy asymmetric Gaussian cloning of coherent states

    Fiurášek, Jaromír; Cerf, Nicolas J.

    2007-05-01

    We investigate the asymmetric Gaussian cloning of coherent states which produces M copies from N input replicas in such a way that the fidelity of each copy may be different. We show that the optimal asymmetric Gaussian cloning can be performed with a single phase-insensitive amplifier and an array of beam splitters. We obtain a simple analytical expression characterizing the set of optimal asymmetric Gaussian cloning machines and prove the optimality of these cloners using the formalism of Gaussian completely positive maps and semidefinite programming techniques. We also present an alternative implementation of the asymmetric cloning machine where the phase-insensitive amplifier is replaced with a beam splitter, heterodyne detector, and feedforward.

  8. Optimal multicopy asymmetric Gaussian cloning of coherent states

    Fiurasek, Jaromir; Cerf, Nicolas J.

    2007-01-01

    We investigate the asymmetric Gaussian cloning of coherent states which produces M copies from N input replicas in such a way that the fidelity of each copy may be different. We show that the optimal asymmetric Gaussian cloning can be performed with a single phase-insensitive amplifier and an array of beam splitters. We obtain a simple analytical expression characterizing the set of optimal asymmetric Gaussian cloning machines and prove the optimality of these cloners using the formalism of Gaussian completely positive maps and semidefinite programming techniques. We also present an alternative implementation of the asymmetric cloning machine where the phase-insensitive amplifier is replaced with a beam splitter, heterodyne detector, and feedforward

  9. “Stringy” coherent states inspired by generalized uncertainty principle

    Ghosh, Subir; Roy, Pinaki

    2012-05-01

    Coherent States with Fractional Revival property, that explicitly satisfy the Generalized Uncertainty Principle (GUP), have been constructed in the context of Generalized Harmonic Oscillator. The existence of such states is essential in motivating the GUP based phenomenological results present in the literature which otherwise would be of purely academic interest. The effective phase space is Non-Canonical (or Non-Commutative in popular terminology). Our results have a smooth commutative limit, equivalent to Heisenberg Uncertainty Principle. The Fractional Revival time analysis yields an independent bound on the GUP parameter. Using this and similar bounds obtained here, we derive the largest possible value of the (GUP induced) minimum length scale. Mandel parameter analysis shows that the statistics is Sub-Poissonian. Correspondence Principle is deformed in an interesting way. Our computational scheme is very simple as it requires only first order corrected energy values and undeformed basis states.

  10. “Stringy” coherent states inspired by generalized uncertainty principle

    Ghosh, Subir; Roy, Pinaki

    2012-01-01

    Coherent States with Fractional Revival property, that explicitly satisfy the Generalized Uncertainty Principle (GUP), have been constructed in the context of Generalized Harmonic Oscillator. The existence of such states is essential in motivating the GUP based phenomenological results present in the literature which otherwise would be of purely academic interest. The effective phase space is Non-Canonical (or Non-Commutative in popular terminology). Our results have a smooth commutative limit, equivalent to Heisenberg Uncertainty Principle. The Fractional Revival time analysis yields an independent bound on the GUP parameter. Using this and similar bounds obtained here, we derive the largest possible value of the (GUP induced) minimum length scale. Mandel parameter analysis shows that the statistics is Sub-Poissonian. Correspondence Principle is deformed in an interesting way. Our computational scheme is very simple as it requires only first order corrected energy values and undeformed basis states.

  11. Entanglement-distillation attack on continuous-variable quantum key distribution in a turbulent atmospheric channel

    Guo, Ying; Xie, Cailang; Liao, Qin; Zhao, Wei; Zeng, Guihua; Huang, Duan

    2017-08-01

    The survival of Gaussian quantum states in a turbulent atmospheric channel is of crucial importance in free-space continuous-variable (CV) quantum key distribution (QKD), in which the transmission coefficient will fluctuate in time, thus resulting in non-Gaussian quantum states. Different from quantum hacking of the imperfections of practical devices, here we propose a different type of attack by exploiting the security loopholes that occur in a real lossy channel. Under a turbulent atmospheric environment, the Gaussian states are inevitably afflicted by decoherence, which would cause a degradation of the transmitted entanglement. Therefore, an eavesdropper can perform an intercept-resend attack by applying an entanglement-distillation operation on the transmitted non-Gaussian mixed states, which allows the eavesdropper to bias the estimation of the parameters and renders the final keys shared between the legitimate parties insecure. Our proposal highlights the practical CV QKD vulnerabilities with free-space quantum channels, including the satellite-to-earth links, ground-to-ground links, and a link from moving objects to ground stations.

  12. Study on the security of discrete-variable quantum key distribution over non-Markovian channels

    Huang Peng; Zhu Jun; He Guangqiang; Zeng Guihua

    2012-01-01

    The dynamic of the secret key rate of the discrete-variable quantum key distribution (QKD) protocol over the non-Markovian quantum channel is investigated. In particular, we calculate the secret key rate for the six-state protocol over non-Markovian depolarizing channels with coloured noise and Markovian depolarizing channels with Gaussian white noise, respectively. We find that the secure secret key rate for the non-Markovian depolarizing channel will be larger than the Markovian one under the same conditions even when their upper bounds of tolerable quantum bit error rate are equal. This indicates that this coloured noise in the non-Markovian depolarizing channel can enhance the security of communication. Moreover, we show that the secret key rate fluctuates near the secure point when the coupling strength of the system with the environment is high. The results demonstrate that the non-Markovian effects of the transmission channel can have a positive impact on the security of discrete-variable QKD. (paper)

  13. Quantum Key Distribution with High Order Fibonacci-like Orbital Angular Momentum States

    Pan, Ziwen; Cai, Jiarui; Wang, Chuan

    2017-08-01

    The coding space in quantum communication could be expanded to high-dimensional space by using orbital angular momentum (OAM) states of photons, as both the capacity of the channel and security are enhanced. Here we present a novel approach to realize high-capacity quantum key distribution (QKD) by exploiting OAM states. The innovation of the proposed approach relies on a unique type of entangled-photon source which produces entangled photons with OAM randomly distributed among high order Fiboncci-like numbers and a new physical mechanism for efficiently sharing keys. This combination of entanglement with mathematical properties of high order Fibonacci sequences provides the QKD protocol immunity to photon-number-splitting attacks and allows secure generation of long keys from few photons. Unlike other protocols, reference frame alignment and active modulation of production and detection bases are unnecessary.

  14. High performance reconciliation for continuous-variable quantum key distribution with LDPC code

    Lin, Dakai; Huang, Duan; Huang, Peng; Peng, Jinye; Zeng, Guihua

    2015-03-01

    Reconciliation is a significant procedure in a continuous-variable quantum key distribution (CV-QKD) system. It is employed to extract secure secret key from the resulted string through quantum channel between two users. However, the efficiency and the speed of previous reconciliation algorithms are low. These problems limit the secure communication distance and the secure key rate of CV-QKD systems. In this paper, we proposed a high-speed reconciliation algorithm through employing a well-structured decoding scheme based on low density parity-check (LDPC) code. The complexity of the proposed algorithm is reduced obviously. By using a graphics processing unit (GPU) device, our method may reach a reconciliation speed of 25 Mb/s for a CV-QKD system, which is currently the highest level and paves the way to high-speed CV-QKD.

  15. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  16. The SU(1, 1) Perelomov number coherent states and the non-degenerate parametric amplifier

    Ojeda-Guillén, D., E-mail: dojedag@ipn.mx; Granados, V. D. [Escuela Superior de Física y Matemáticas, Instituto Politécnico Nacional, Ed. 9, Unidad Profesional Adolfo López Mateos, C.P. 07738 México D. F. (Mexico); Mota, R. D. [Escuela Superior de Ingeniería Mecánica y Eléctrica, Unidad Culhuacán, Instituto Politécnico Nacional, Av. Santa Ana No. 1000, Col. San Francisco Culhuacán, Delegación Coyoacán, C.P. 04430, México D. F. (Mexico)

    2014-04-15

    We construct the Perelomov number coherent states for an arbitrary su(1, 1) group operation and study some of their properties. We introduce three operators which act on Perelomov number coherent states and close the su(1, 1) Lie algebra. By using the tilting transformation we apply our results to obtain the energy spectrum and eigenfunctions of the non-degenerate parametric amplifier. We show that these eigenfunctions are the Perelomov number coherent states of the two-dimensional harmonic oscillator.

  17. A group property for the coherent state representation of fermionic squeezing operators

    Fan, Hong-yi; Li, Chao

    2004-06-01

    For the two-mode fermionic squeezing operators we find that their coherent state projection operator representation make up a loyal representation, which is homomorphic to an SO(4) group, though the fermionic coherent states are not mutual orthogonal. Thus the result of successively operating with many fermionic squeezing operators on a state can be equivalent to a single operation. The fermionic squeezing operators are mappings of orthogonal transformations in Grassmann number pseudo-classical space in the fermionic coherent state representation.

  18. A group property for the coherent state representation of fermionic squeezing operators

    Fan Hongyi; Li Chao

    2004-01-01

    For the two-mode fermionic squeezing operators we find that their coherent state projection operator representation make up a loyal representation, which is homomorphic to an SO(4) group, though the fermionic coherent states are not mutual orthogonal. Thus the result of successively operating with many fermionic squeezing operators on a state can be equivalent to a single operation. The fermionic squeezing operators are mappings of orthogonal transformations in Grassmann number pseudo-classical space in the fermionic coherent state representation

  19. Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks

    Patel, K. A.; Dynes, J. F.; Lucamarini, M.; Choi, I.; Sharpe, A. W.; Yuan, Z. L.; Shields, A. J.; Penty, R. V.

    2014-01-01

    We demonstrate quantum key distribution (QKD) with bidirectional 10 Gb/s classical data channels in a single fiber using dense wavelength division multiplexing. Record secure key rates of 2.38 Mbps and fiber distances up to 70 km are achieved. Data channels are simultaneously monitored for error-free operation. The robustness of QKD is further demonstrated with a secure key rate of 445 kbps over 25 km, obtained in the presence of data lasers launching conventional 0 dBm power. We discuss the fundamental limit for the QKD performance in the multiplexing environment

  20. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    Gehring, Tobias; Haendchen, Vitus; Duhme, Joerg

    2015-01-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State......-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our...... with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components....

  1. Silicon photonic transceiver circuit for high-speed polarization-based discrete variable quantum key distribution.

    Cai, Hong; Long, Christopher M; DeRose, Christopher T; Boynton, Nicholas; Urayama, Junji; Camacho, Ryan; Pomerene, Andrew; Starbuck, Andrew L; Trotter, Douglas C; Davids, Paul S; Lentine, Anthony L

    2017-05-29

    We demonstrate a silicon photonic transceiver circuit for high-speed discrete variable quantum key distribution that employs a common structure for transmit and receive functions. The device is intended for use in polarization-based quantum cryptographic protocols, such as BB84. Our characterization indicates that the circuit can generate the four BB84 states (TE/TM/45°/135° linear polarizations) with >30 dB polarization extinction ratios and gigabit per second modulation speed, and is capable of decoding any polarization bases differing by 90° with high extinction ratios.

  2. Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing

    Myhr, Geir Ove

    2010-01-01

    Just like we can divide the set of bipartite quantum states into separable states and entangled states, we can divide it into states with and without a symmetric extension. The states with a symmetric extension - which includes all the separable states - behave classically in many ways, while the states without a symmetric extension - which are all entangled - have the potential to exhibit quantum effects. The set of states with a symmetric extension is closed under local quantum operations assisted by one-way classical communication (1-LOCC) just like the set of separable states is closed under local operations assisted by two-way classical communication (LOCC). Because of this, states with a symmetric extension often play the same role in a one-way communication setting as the separable states play in a two-way communication setting. We show that any state with a symmetric extension can be decomposed into a convex combination of states that have a pure symmetric extension. A necessary condition for a state to have a pure symmetric extension is that the spectra of the local and global density matrices are equal. This condition is also sufficient for two qubits, but not for any larger systems. We present a conjectured necessary and sufficient condition for two-qubit states with a symmetric extension. Proofs are provided for some classes of states: rank-two states, states on the symmetric subspace, Bell-diagonal states and states that are invariant under S x S, where S is a phase gate. We also show how the symmetric extension problem for multi-qubit Bell-diagonal states can be simplified and the simplified problem implemented as a semidefinite program. Quantum key distribution protocols such as the six-state protocol and the BB84 protocol effectively gives Alice and Bob Bell-diagonal states that they measure in the standard basis to obtain a raw key which they may then process further to obtain a secret error-free key. When the raw key has a high error rate, the

  3. Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing

    Myhr, Geir Ove

    2010-11-08

    Just like we can divide the set of bipartite quantum states into separable states and entangled states, we can divide it into states with and without a symmetric extension. The states with a symmetric extension - which includes all the separable states - behave classically in many ways, while the states without a symmetric extension - which are all entangled - have the potential to exhibit quantum effects. The set of states with a symmetric extension is closed under local quantum operations assisted by one-way classical communication (1-LOCC) just like the set of separable states is closed under local operations assisted by two-way classical communication (LOCC). Because of this, states with a symmetric extension often play the same role in a one-way communication setting as the separable states play in a two-way communication setting. We show that any state with a symmetric extension can be decomposed into a convex combination of states that have a pure symmetric extension. A necessary condition for a state to have a pure symmetric extension is that the spectra of the local and global density matrices are equal. This condition is also sufficient for two qubits, but not for any larger systems. We present a conjectured necessary and sufficient condition for two-qubit states with a symmetric extension. Proofs are provided for some classes of states: rank-two states, states on the symmetric subspace, Bell-diagonal states and states that are invariant under S x S, where S is a phase gate. We also show how the symmetric extension problem for multi-qubit Bell-diagonal states can be simplified and the simplified problem implemented as a semidefinite program. Quantum key distribution protocols such as the six-state protocol and the BB84 protocol effectively gives Alice and Bob Bell-diagonal states that they measure in the standard basis to obtain a raw key which they may then process further to obtain a secret error-free key. When the raw key has a high error rate, the

  4. Coherent states for a polynomial su(1, 1) algebra and a conditionally solvable system

    Sadiq, Muhammad; Inomata, Akira; Junker, Georg

    2009-01-01

    In a previous paper (2007 J. Phys. A: Math. Theor. 40 11105), we constructed a class of coherent states for a polynomially deformed su(2) algebra. In this paper, we first prepare the discrete representations of the nonlinearly deformed su(1, 1) algebra. Then we extend the previous procedure to construct a discrete class of coherent states for a polynomial su(1, 1) algebra which contains the Barut-Girardello set and the Perelomov set of the SU(1, 1) coherent states as special cases. We also construct coherent states for the cubic algebra related to the conditionally solvable radial oscillator problem.

  5. Generalized coherent states related to the associated Bessel functions and Morse potential

    Mojaveri, B; Amiri Faseghandis, S

    2014-01-01

    Using the associated Bessel functions, a shape-invariant Lie algebra spanned by ladder operators plus the identity operator, is realized. The Hilbert space of the associated Bessel functions, representing the Lie algebra, are established and two kinds of generalized coherent states as an appropriate superposition of these functions are constructed. By implying appropriate similarity transformation on the constructed coherent states, the generalized coherent states for the Morse potential are obtained. By considering some statistical characteristics, it is revealed that the constructed coherent states indeed possess nonclassical features, such as squeezing and sub-Poissonian statistics. (paper)

  6. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

    Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas

    2015-11-01

    Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.

  7. High-capacity quantum key distribution via hyperentangled degrees of freedom

    Simon, David S; Sergienko, Alexander V

    2014-01-01

    Quantum key distribution (QKD) has long been a promising area for the application of quantum effects in solving real-world problems. However, two major obstacles have stood in the way of its widespread application: low secure key generation rates and short achievable operating distances. In this paper, a new physical mechanism for dealing with the first of these problems is proposed: the interplay between different degrees of freedom in a hyperentangled system (parametric down-conversion) is used to increase the Hilbert space dimension available for key generation while maintaining security. Polarization-based Bell tests provide security checking, while orbital angular momentum (OAM) and total angular momentum (TAM) provide a higher key generation rate. Whether to measure TAM or OAM is decided randomly in each trial. The concurrent noncommutativity of TAM with OAM and polarization provides the physical basis for quantum security. TAM measurements link polarization to OAM, so that if the legitimate participants measure OAM while the eavesdropper measures TAM (or vice-versa), then polarization entanglement is lost, revealing the eavesdropper. In contrast to other OAM-based QKD methods, complex active switching between OAM bases is not required; instead, passive switching by beam splitters combined with much simpler active switching between polarization bases makes implementation at high OAM more practical. (paper)

  8. Practical round-robin differential-phase-shift quantum key distribution

    Zhang, Zhen; Yuan, Xiao; Cao, Zhu; Ma, Xiongfeng

    2017-01-01

    The security of quantum key distribution (QKD) relies on the Heisenberg uncertainty principle, with which legitimate users are able to estimate information leakage by monitoring the disturbance of the transmitted quantum signals. Normally, the disturbance is reflected as bit flip errors in the sifted key; thus, privacy amplification, which removes any leaked information from the key, generally depends on the bit error rate. Recently, a round-robin differential-phase-shift QKD protocol for which privacy amplification does not rely on the bit error rate (Sasaki et al 2014 Nature 509 475) was proposed. The amount of leaked information can be bounded by the sender during the state-preparation stage and hence, is independent of the behavior of the unreliable quantum channel. In our work, we apply the tagging technique to the protocol and present a tight bound on the key rate and employ a decoy-state method. The effects of background noise and misalignment are taken into account under practical conditions. Our simulation results show that the protocol can tolerate channel error rates close to 50% within a typical experiment setting. That is, there is a negligible restriction on the error rate in practice. (paper)

  9. Quantum key distribution with several intercept-resend attacks via a depolarizing channel

    Dehmani, Mustapha; Errahmani, Mohamed; Ez-Zahraouy, Hamid; Benyoussef, Abdelilah

    2012-01-01

    The disturbance effect of a depolarizing channel on the security of the quantum key distribution of the four-state BB84 protocol, with multiple sequential intercept-resend attacks of many eavesdroppers, has been studied. The quantum bit error rate and the mutual information are computed for an arbitrary number N of eavesdroppers. It is found that the quantum error rate decreases with increasing the depolarizing parameter p characterizing the noise of the channel. For p tr of p below which the information is secure and otherwise the information is not secure. The value of p tr decreases with increasing the number of attacks. In contrast, for p ⩾ 0.165, the information is not secure independently of the number of eavesdroppers. Phase diagrams corresponding to the secure—unsecure information are also established. (paper)

  10. Quantum Key Distribution Based on a Weak-Coupling Cavity QED Regime

    Li Chun-Yan; Li Yan-Song

    2011-01-01

    We present a quantum key distribution scheme using a weak-coupling cavity QED regime based on quantum dense coding. Hybrid entanglement states of photons and electrons are used to distribute information. We just need to transmit photons without storing them in the scheme. The electron confined in a quantum dot, which is embedded in a microcavity, is held by one of the legitimate users throughout the whole communication process. Only the polarization of a single photon and spin of electron measurements are applied in this protocol, which are easier to perform than collective-Bell state measurements. Linear optical apparatus, such as a special polarizing beam splitter in a circular basis and single photon operations, make it more flexible to realize under current technology. Its efficiency will approach 100% in the ideal case. The security of the scheme is also discussed. (general)

  11. High speed and adaptable error correction for megabit/s rate quantum key distribution.

    Dixon, A R; Sato, H

    2014-12-02

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.

  12. Fast implementation of length-adaptive privacy amplification in quantum key distribution

    Zhang Chun-Mei; Li Mo; Huang Jing-Zheng; Li Hong-Wei; Li Fang-Yi; Wang Chuan; Yin Zhen-Qiang; Chen Wei; Han Zhen-Fu; Treeviriyanupab Patcharapong; Sripimanwat Keattisak

    2014-01-01

    Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. “Length-adaptive” indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems. (general)

  13. Prospects and applications near ferroelectric quantum phase transitions: a key issues review

    Chandra, P.; Lonzarich, G. G.; Rowley, S. E.; Scott, J. F.

    2017-11-01

    The emergence of complex and fascinating states of quantum matter in the neighborhood of zero temperature phase transitions suggests that such quantum phenomena should be studied in a variety of settings. Advanced technologies of the future may be fabricated from materials where the cooperative behavior of charge, spin and current can be manipulated at cryogenic temperatures. The progagating lattice dynamics of displacive ferroelectrics make them appealing for the study of quantum critical phenomena that is characterized by both space- and time-dependent quantities. In this key issues article we aim to provide a self-contained overview of ferroelectrics near quantum phase transitions. Unlike most magnetic cases, the ferroelectric quantum critical point can be tuned experimentally to reside at, above or below its upper critical dimension; this feature allows for detailed interplay between experiment and theory using both scaling and self-consistent field models. Empirically the sensitivity of the ferroelectric T c’s to external and to chemical pressure gives practical access to a broad range of temperature behavior over several hundreds of Kelvin. Additional degrees of freedom like charge and spin can be added and characterized systematically. Satellite memories, electrocaloric cooling and low-loss phased-array radar are among possible applications of low-temperature ferroelectrics. We end with open questions for future research that include textured polarization states and unusual forms of superconductivity that remain to be understood theoretically.

  14. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  15. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.

    Miroshnichenko, G P; Kozubov, A V; Gaidash, A A; Gleim, A V; Horoshko, D B

    2018-04-30

    We consider a subcarrier wave quantum key distribution (QKD) system, where quantum encoding is carried out at weak sidebands generated around a coherent optical beam as a result of electro-optical phase modulation. We study security of two protocols, B92 and BB84, against one of the most powerful attacks for this class of systems, the collective beam-splitting attack. Our analysis includes the case of high modulation index, where the sidebands are essentially multimode. We demonstrate numerically and experimentally that a subcarrier wave QKD system with realistic parameters is capable of distributing cryptographic keys over large distances in presence of collective attacks. We also show that BB84 protocol modification with discrimination of only one state in each basis performs not worse than the original BB84 protocol in this class of QKD systems, thus significantly simplifying the development of cryptographic networks using the considered QKD technique.

  16. Unconstrained Capacities of Quantum Key Distribution and Entanglement Distillation for Pure-Loss Bosonic Broadcast Channels.

    Takeoka, Masahiro; Seshadreesan, Kaushik P; Wilde, Mark M

    2017-10-13

    We consider quantum key distribution (QKD) and entanglement distribution using a single-sender multiple-receiver pure-loss bosonic broadcast channel. We determine the unconstrained capacity region for the distillation of bipartite entanglement and secret key between the sender and each receiver, whenever they are allowed arbitrary public classical communication. A practical implication of our result is that the capacity region demonstrated drastically improves upon rates achievable using a naive time-sharing strategy, which has been employed in previously demonstrated network QKD systems. We show a simple example of a broadcast QKD protocol overcoming the limit of the point-to-point strategy. Our result is thus an important step toward opening a new framework of network channel-based quantum communication technology.

  17. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    Bacco, Davide; Christensen, Jesper Bjerge; Usuga Castaneda, Mario A.

    2016-01-01

    10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak......Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last...... coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable....

  18. Shor-Preskill-type security proof for quantum key distribution without public announcement of bases

    Hwang, Won-Young; Wang Xiangbin; Matsumoto, Keiji; Kim, Jaewan; Lee, Hai-Woong

    2003-01-01

    We give a Shor-Preskill-type security proof to quantum key distribution without public announcement of bases [W.Y. Hwang et al., Phys. Lett. A 244, 489 (1998)]. First, we modify the Lo-Chau protocol once more so that it finally reduces to the quantum key distribution without public announcement of bases. Then we show how we can estimate the error rate in the code bits based on that in the checked bits in the proposed protocol, which is the central point of the proof. We discuss the problem of imperfect sources and that of large deviation in the error rate distributions. We discuss when the bases sequence must be discarded

  19. Unconstrained Capacities of Quantum Key Distribution and Entanglement Distillation for Pure-Loss Bosonic Broadcast Channels

    Takeoka, Masahiro; Seshadreesan, Kaushik P.; Wilde, Mark M.

    2017-10-01

    We consider quantum key distribution (QKD) and entanglement distribution using a single-sender multiple-receiver pure-loss bosonic broadcast channel. We determine the unconstrained capacity region for the distillation of bipartite entanglement and secret key between the sender and each receiver, whenever they are allowed arbitrary public classical communication. A practical implication of our result is that the capacity region demonstrated drastically improves upon rates achievable using a naive time-sharing strategy, which has been employed in previously demonstrated network QKD systems. We show a simple example of a broadcast QKD protocol overcoming the limit of the point-to-point strategy. Our result is thus an important step toward opening a new framework of network channel-based quantum communication technology.

  20. Weak randomness in device independent quantum key distribution and the advantage of using high dimensional entanglement

    Huber, Marcus; Pawlowski, Marcin

    2013-01-01

    We show that in device independent quantum key distribution protocols the privacy of randomness is of crucial importance. For sublinear test sample sizes even the slightest guessing probability by an eavesdropper will completely compromise security. We show that a combined attack exploiting test sample and measurement choices compromises the security even with a linear size test sample and otherwise device independent security considerations. We explicitly derive the sample size needed to ret...

  1. Detector dead-time effects and paralyzability in high-speed quantum key distribution

    Rogers, Daniel J; Bienfang, Joshua C; Nakassis, Anastase; Xu Hai; Clark, Charles W

    2007-01-01

    Recent advances in quantum key distribution (QKD) have given rise to systems that operate at transmission periods significantly shorter than the dead times of their component single-photon detectors. As systems continue to increase in transmission rate, security concerns associated with detector dead times can limit the production rate of sifted bits. We present a model of high-speed QKD in this limit that identifies an optimum transmission rate for a system with given link loss and detector response characteristics

  2. Cross correlations of quantum key distribution based on single-photon sources

    Dong Shuangli; Wang Xiaobo; Zhang Guofeng; Sun Jianhu; Zhang Fang; Xiao Liantuan; Jia Suotang

    2009-01-01

    We theoretically analyze the second-order correlation function in a quantum key distribution system with real single-photon sources. Based on single-event photon statistics, the influence of the modification caused by an eavesdropper's intervention and the effects of background signals on the cross correlations between authorized partners are presented. On this basis, we have shown a secure range of correlation against the intercept-resend attacks.

  3. Experimental investigation of quantum key distribution with position and momentum of photon pairs

    Almeida, M.P.; Walborn, S.P.; Souto Ribeiro, P.H.

    2005-01-01

    We investigate the utility of Einstein-Podolsky-Rosen correlations of the position and momentum of photon pairs from parametric down-conversion in the implementation of a secure quantum key distribution protocol. We show that security is guaranteed by the entanglement between down-converted pairs, and can be checked by either direct comparison of Alice and Bob's measurement results or evaluation of an inequality of the sort proposed by Mancini et al. [Phys. Rev. Lett. 88, 120401 (2002)

  4. Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations

    Reid, M. D.

    2000-12-01

    Correlations of the type discussed by EPR in their original 1935 paradox for continuous variables exist for the quadrature phase amplitudes of two spatially separated fields. These correlations were first experimentally reported in 1992. We propose to use such EPR beams in quantum cryptography, to transmit with high efficiency messages in such a way that the receiver and sender may later determine whether eavesdropping has occurred. The merit of the new proposal is in the possibility of transmitting a reasonably secure yet predetermined key. This would allow relay of a cryptographic key over long distances in the presence of lossy channels.

  5. Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution

    Bonior, Jason D [ORNL; Evans, Philip G [ORNL; Sheets, Gregory S [ORNL; Jones, John P [ORNL; Flynn, Toby H [ORNL; O' Neil, Lori Ross [Pacific Northwest National Laboratory (PNNL); Hutton, William [Pacific Northwest National Laboratory (PNNL); Pratt, Richard [Pacific Northwest National Laboratory (PNNL); Carroll, Thomas E. [Pacific Northwest National Laboratory (PNNL)

    2017-01-01

    Secure time transfer is critical for many timesensitive applications. the Global Positioning System (GPS) which is often used for this purpose has been shown to be susceptible to spoofing attacks. Quantum Key Distribution offers a way to securely generate encryption keys at two locations. Through careful use of this information it is possible to create a system that is more resistant to spoofing attacks. In this paper we describe our work to create a testbed which utilizes QKD and traditional RF links. This testbed will be used for the development of more secure and spoofing resistant time distribution protocols.

  6. A FPGA-based identity authority method in quantum key distribution system

    Cui Ke; Luo Chunli; Zhang Hongfei; Lin Shengzhao; Jin Ge; Wang Jian

    2012-01-01

    In this article, an identity authority method realized in hardware is developed which is used in quantum key distribution (QKD) systems. This method is based on LFSR-Teoplitz hashing matrix. Its benefits relay on its easy implementation in hardware and high secure coefficient. It can gain very high security by means of splitting part of the final key generated from QKD systems as the seed where it is required in the identity authority method. We propose an specific flow of the identity authority method according to the problems and features of the hardware. The proposed method can satisfy many kinds of QKD systems. (authors)

  7. 2D-Zernike Polynomials and Coherent State Quantization of the Unit Disc

    Thirulogasanthar, K., E-mail: santhar@gmail.com [Concordia University, Department of Comuter Science and Software Engineering (Canada); Saad, Nasser, E-mail: nsaad@upei.ca [University of Prince Edward Island, Department of mathematics and Statistics (Canada); Honnouvo, G., E-mail: g-honnouvo@yahoo.fr [McGill University, Department of Mathematics and Statistics (Canada)

    2015-12-15

    Using the orthonormality of the 2D-Zernike polynomials, reproducing kernels, reproducing kernel Hilbert spaces, and ensuring coherent states attained. With the aid of the so-obtained coherent states, the complex unit disc is quantized. Associated upper symbols, lower symbols and related generalized Berezin transforms also obtained. A number of necessary summation formulas for the 2D-Zernike polynomials proved.

  8. Maths-type q-deformed coherent states for q>1

    Quesne, C.; Penson, K.A.; Tkachuk, V.M.

    2003-01-01

    Maths-type q-deformed coherent states with q>1 allow a resolution of unity in the form of an ordinary integral. They are sub-Poissonian and squeezed. They may be associated with a harmonic oscillator with minimal uncertainties in both position and momentum and are intelligent coherent states for the corresponding deformed Heisenberg algebra

  9. Coherent states field theory in supramolecular polymer physics

    Fredrickson, Glenn H.; Delaney, Kris T.

    2018-05-01

    In 1970, Edwards and Freed presented an elegant representation of interacting branched polymers that resembles the coherent states (CS) formulation of second-quantized field theory. This CS polymer field theory has been largely overlooked during the intervening period in favor of more conventional "auxiliary field" (AF) interacting polymer representations that form the basis of modern self-consistent field theory (SCFT) and field-theoretic simulation approaches. Here we argue that the CS representation provides a simpler and computationally more efficient framework than the AF approach for broad classes of reversibly bonding polymers encountered in supramolecular polymer science. The CS formalism is reviewed, initially for a simple homopolymer solution, and then extended to supramolecular polymers capable of forming reversible linkages and networks. In the context of the Edwards model of a non-reacting homopolymer solution and one and two-component models of telechelic reacting polymers, we discuss the structure of CS mean-field theory, including the equivalence to SCFT, and show how weak-amplitude expansions (random phase approximations) can be readily developed without explicit enumeration of all reaction products in a mixture. We further illustrate how to analyze CS field theories beyond SCFT at the level of Gaussian field fluctuations and provide a perspective on direct numerical simulations using a recently developed complex Langevin technique.

  10. Multi-party quantum key agreement protocol secure against collusion attacks

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  11. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    Chau, H.F.

    2002-01-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1√(5)≅27.6%, thereby making it the most error resistant scheme known to date

  12. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

    Sajeed, Shihan; Radchenko, Igor; Kaiser, Sarah; Bourgoin, Jean-Philippe; Pappa, Anna; Monat, Laurent; Legré, Matthieu; Makarov, Vadim

    2015-03-01

    The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acín-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD we model both a strong attack using technology possible in principle and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed, the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.

  13. Distillation of secret-key from a class of compound memoryless quantum sources

    Boche, H., E-mail: boche@tum.de; Janßen, G., E-mail: gisbert.janssen@tum.de [Lehrstuhl für Theoretische Informationstechnik, Technische Universität München, 80290 München (Germany)

    2016-08-15

    We consider secret-key distillation from tripartite compound classical-quantum-quantum (cqq) sources with free forward public communication under strong security criterion. We design protocols which are universally reliable and secure in this scenario. These are shown to achieve asymptotically optimal rates as long as a certain regularity condition is fulfilled by the set of its generating density matrices. We derive a multi-letter formula which describes the optimal forward secret-key capacity for all compound cqq sources being regular in this sense. We also determine the forward secret-key distillation capacity for situations where the legitimate sending party has perfect knowledge of his/her marginal state deriving from the source statistics. In this case regularity conditions can be dropped. Our results show that the capacities with and without the mentioned kind of state knowledge are equal as long as the source is generated by a regular set of density matrices. We demonstrate that regularity of cqq sources is not only a technical but also an operational issue. For this reason, we give an example of a source which has zero secret-key distillation capacity without sender knowledge, while achieving positive rates is possible if sender marginal knowledge is provided.

  14. A practical two-way system of quantum key distribution with untrusted source

    Chen Ming-Juan; Liu Xiang

    2011-01-01

    The most severe problem of a two-way 'plug-and-play' (p and p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an “untrusted source . This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered. (general)

  15. Practical long-distance quantum key distribution system using decoy levels

    Rosenberg, D; Peterson, C G; Harrington, J W; Rice, P R; Dallmann, N; Tyagi, K T; McCabe, K P; Hughes, R J; Nordholt, J E; Nam, S; Baek, B; Hadfield, R H

    2009-01-01

    Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here, we report results obtained using a fully automated, robust QKD system based on the Bennett Brassard 1984 (BB84) protocol with low-noise superconducting nanowire single-photon detectors (SNSPDs) and decoy levels to produce a secret key with unconditional security over a record 140.6 km of optical fibre, an increase of more than a factor of five compared with the previous record for unconditionally secure key generation in a practical QKD system.

  16. Passive measurement-device-independent quantum key distribution with orbital angular momentum and pulse position modulation

    Wang, Lian; Zhou, Yuan-yuan; Zhou, Xue-jun; Chen, Xiao

    2018-03-01

    Based on the orbital angular momentum and pulse position modulation, we present a novel passive measurement-device-independent quantum key distribution (MDI-QKD) scheme with the two-mode source. Combining with the tight bounds of the yield and error rate of single-photon pairs given in our paper, we conduct performance analysis on the scheme with heralded single-photon source. The numerical simulations show that the performance of our scheme is significantly superior to the traditional MDI-QKD in the error rate, key generation rate and secure transmission distance, since the application of orbital angular momentum and pulse position modulation can exclude the basis-dependent flaw and increase the information content for each single photon. Moreover, the performance is improved with the rise of the frame length. Therefore, our scheme, without intensity modulation, avoids the source side channels and enhances the key generation rate. It has greatly utility value in the MDI-QKD setups.

  17. Multi-party quantum key agreement with five-qubit brown states

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  18. New SUSYQM coherent states for Pöschl–Teller potentials: a detailed mathematical analysis

    Bergeron, H; Siegl, P; Youssef, A

    2012-01-01

    In a recent short note (Bergeron et al 2010 Europhys. Lett. 92 60003), we have presented the good properties of a new family of semi-classical states for Pöschl–Teller potentials. These states are built from a supersymmetric quantum mechanics (SUSYQM) approach and the parameters of these ‘coherent’ states are points in the classical phase space. In this paper, we develop all the mathematical aspects that have been left out of the previous paper (proof of the resolution of unity, detailed calculations of the quantized version of classical observables and mathematical study of the resulting operators: problems of domains, self-adjointness or self-adjoint extensions). Some additional questions such as asymptotic behavior are also studied. Moreover, the framework is extended to a larger class of Pöschl–Teller potentials. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Coherent states: mathematical and physical aspects’. (paper)

  19. Momentum projection and relativistic boost of solitons: Coherent states and projection

    Luebeck, E.G.; Birse, M.C.; Henley, E.M.; Wilets, L.

    1986-01-01

    We present a method for calculating center-of-mass corrections to hadron properties in soliton models and we apply the method to the soliton bag model. A coherent state is used to provide a quantum wave function corresponding to the mean-field approximation. This state is projected onto a zero-momentum eigenstate. States of nonzero momentum can be constructed from this with a Lorentz boost operator. Hence center-of-mass corrections can be made in a properly relativistic way. The energy of the projected zero-momentum state is the hadron mass with spurious center-of-mass energy removed. We apply a variational principle to our projected state and use three ''virial theorems'' to test our approximate solution. We also study projection of general one-mode states. Projection reduces the nucleon energy by up to 25%. Variation after projection gives a further reduction of less than 20%. Somewhat larger reductions in the energy are found for meson states

  20. Semi-device-independent security of one-way quantum key distribution

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ''device-independent.'' Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are noncharacterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses, and random-access codes.

  1. Three-dimensional quantum key distribution in the presence of several eavesdroppers

    Daoud, M; Ez-zahraouy, H

    2011-01-01

    Quantum key distribution based on encoding in three-dimensional systems in the presence of several eavesdroppers is proposed. This extends the BB84 protocol in the presence of many eavesdroppers where two-level quantum systems (qubits) are replaced by three-level systems (qutrits). We discuss the scenarios involving two, three and four complementary bases. We derive the explicit form of Alice and Bob mutual information and the information gained by each eavesdropper. In particular, we show that, in the presence of only one eavesdropper, the protocol involving four bases is safer than the other ones. However, for two eavesdroppers, the security is strongly dependent on the attack probabilities. The effect of a large number of eavesdroppers is also investigated.

  2. Three-dimensional quantum key distribution in the presence of several eavesdroppers

    Daoud, M [Max Planck Institute for the Physics of Complex Systems, Dresden (Germany); Ez-zahraouy, H, E-mail: daoud@pks.mpg.de, E-mail: ezahamid@fsr.ac.m [LMPHE (URAC), Faculty of Sciences, University Mohammed V-Agdal, Rabat (Morocco)

    2011-10-15

    Quantum key distribution based on encoding in three-dimensional systems in the presence of several eavesdroppers is proposed. This extends the BB84 protocol in the presence of many eavesdroppers where two-level quantum systems (qubits) are replaced by three-level systems (qutrits). We discuss the scenarios involving two, three and four complementary bases. We derive the explicit form of Alice and Bob mutual information and the information gained by each eavesdropper. In particular, we show that, in the presence of only one eavesdropper, the protocol involving four bases is safer than the other ones. However, for two eavesdroppers, the security is strongly dependent on the attack probabilities. The effect of a large number of eavesdroppers is also investigated.

  3. Countermeasure against probabilistic blinding attack in practical quantum key distribution systems

    Qian Yong-Jun; Li Hong-Wei; He De-Yong; Yin Zhen-Qiang; Zhang Chun-Mei; Chen Wei; Wang Shuang; Han Zheng-Fu

    2015-01-01

    In a practical quantum key distribution (QKD) system, imperfect equipment, especially the single-photon detector, can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate (QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. (paper)

  4. Practical security analysis of continuous-variable quantum key distribution with jitter in clock synchronization

    Xie, Cailang; Guo, Ying; Liao, Qin; Zhao, Wei; Huang, Duan; Zhang, Ling; Zeng, Guihua

    2018-03-01

    How to narrow the gap of security between theory and practice has been a notoriously urgent problem in quantum cryptography. Here, we analyze and provide experimental evidence of the clock jitter effect on the practical continuous-variable quantum key distribution (CV-QKD) system. The clock jitter is a random noise which exists permanently in the clock synchronization in the practical CV-QKD system, it may compromise the system security because of its impact on data sampling and parameters estimation. In particular, the practical security of CV-QKD with different clock jitter against collective attack is analyzed theoretically based on different repetition frequencies, the numerical simulations indicate that the clock jitter has more impact on a high-speed scenario. Furthermore, a simplified experiment is designed to investigate the influence of the clock jitter.

  5. Fast optical source for quantum key distribution based on semiconductor optical amplifiers.

    Jofre, M; Gardelein, A; Anzolin, G; Amaya, W; Capmany, J; Ursin, R; Peñate, L; Lopez, D; San Juan, J L; Carrasco, J A; Garcia, F; Torcal-Milla, F J; Sanchez-Brea, L M; Bernabeu, E; Perdigues, J M; Jennewein, T; Torres, J P; Mitchell, M W; Pruneri, V

    2011-02-28

    A novel integrated optical source capable of emitting faint pulses with different polarization states and with different intensity levels at 100 MHz has been developed. The source relies on a single laser diode followed by four semiconductor optical amplifiers and thin film polarizers, connected through a fiber network. The use of a single laser ensures high level of indistinguishability in time and spectrum of the pulses for the four different polarizations and three different levels of intensity. The applicability of the source is demonstrated in the lab through a free space quantum key distribution experiment which makes use of the decoy state BB84 protocol. We achieved a lower bound secure key rate of the order of 3.64 Mbps and a quantum bit error ratio as low as 1.14×10⁻² while the lower bound secure key rate became 187 bps for an equivalent attenuation of 35 dB. To our knowledge, this is the fastest polarization encoded QKD system which has been reported so far. The performance, reduced size, low power consumption and the fact that the components used can be space qualified make the source particularly suitable for secure satellite communication.

  6. Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator

    Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Zeng, Guihua

    2018-01-01

    We propose a pilot-multiplexed continuous-variable quantum key distribution (CVQKD) scheme based on a local local oscillator (LLO). Our scheme utilizes time-multiplexing and polarization-multiplexing techniques to dramatically isolate the quantum signal from the pilot, employs two heterodyne detectors to separately detect the signal and the pilot, and adopts a phase compensation method to almost eliminate the multifrequency phase jitter. In order to analyze the performance of our scheme, a general LLO noise model is constructed. Besides the phase noise and the modulation noise, the photon-leakage noise from the reference path and the quantization noise due to the analog-to-digital converter (ADC) are also considered, which are first analyzed in the LLO regime. Under such general noise model, our scheme has a higher key rate and longer secure distance compared with the preexisting LLO schemes. Moreover, we also conduct an experiment to verify our pilot-multiplexed scheme. Results show that it maintains a low level of the phase noise and is expected to obtain a 554-Kbps secure key rate within a 15-km distance under the finite-size effect.

  7. Higher-order nonclassical effects generated by multiple-photon annihilation-then-creation and creation-then-annihilation coherent states

    Yuan Hong-Chun; Xiao Jin; Xiong Chao; Zhu Xi-Fang; Xu Xue-Xiang

    2016-01-01

    We explore two observable nonclassical properties of quantum states generated by repeatedly operating annihilation-then-creation (AC) and creation-then-annihilation (CA) on the coherent state, respectively, such as higher-order sub-Poissonian statistics and higher-order squeezing-enhanced effect. The corresponding analytical expressions are derived in detail depending on m . By numerically comparing those quantum properties, it is found that these states above have very different nonclassical properties and nonclassicality is exhibited more strongly after AC operation than after CA operation. (paper)

  8. Controlled ultrafast transfer and stability degree of generalized coherent states of a kicked two-level ion

    Chen, Hao; Kong, Chao; Hai, Wenhua

    2018-06-01

    We investigate quantum dynamics of a two-level ion trapped in the Lamb-Dicke regime of a δ -kicked optical lattice, based on the exact generalized coherent states rotated by a π / 2 pulse of Ramsey type experiment. The spatiotemporal evolutions of the spin-motion entangled states in different parameter regions are illustrated, and the parameter regions of different degrees of quantum stability described by the quantum fidelity are found. Time evolutions of the probability for the ion being in different pseudospin states reveal that the ultrafast entanglement generation and population transfers of the system can be analytically controlled by managing the laser pulses. The probability in an initially disentangled state shows periodic collapses (entanglement) and revivals (de-entanglement). Reduction of the stability degree results in enlarging the period of de-entanglement, while the instability and potential chaos will cause the sustained entanglement. The results could be justified experimentally in the existing setups and may be useful in engineering quantum dynamics for quantum information processing.

  9. Practical purification scheme for decohered coherent-state superpositions via partial homodyne detection

    Suzuki, Shigenari; Takeoka, Masahiro; Sasaki, Masahide; Andersen, Ulrik L.; Kannari, Fumihiko

    2006-01-01

    We present a simple protocol to purify a coherent-state superposition that has undergone a linear lossy channel. The scheme constitutes only a single beam splitter and a homodyne detector, and thus is experimentally feasible. In practice, a superposition of coherent states is transformed into a classical mixture of coherent states by linear loss, which is usually the dominant decoherence mechanism in optical systems. We also address the possibility of producing a larger amplitude superposition state from decohered states, and show that in most cases the decoherence of the states are amplified along with the amplitude

  10. Semi-device-independent security of one-way quantum key distribution

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being 'device-independent'. Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are non-characterized, but t...

  11. Transceivers and receivers for quantum key distribution and methods pertaining thereto

    DeRose, Christopher; Sarovar, Mohan; Soh, Daniel B.S.; Lentine, Anthony; Davids, Paul; Camacho, Ryan

    2018-02-27

    Various technologies for performing continuous-variable (CV) and discrete-variable (DV) quantum key distribution (QKD) with integrated electro-optical circuits are described herein. An integrated DV-QKD system uses Mach-Zehnder modulators to modulate a polarization of photons at a transmitter and select a photon polarization measurement basis at a receiver. An integrated CV-QKD system uses wavelength division multiplexing to send and receive amplitude-modulated and phase-modulated optical signals with a local oscillator signal while maintaining phase coherence between the modulated signals and the local oscillator signal.

  12. Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution

    Yichen Zhang

    2015-06-01

    Full Text Available We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an untrusted source and an entanglement swapping protocol with an untrusted relay. Simulation results show that the noiseless linear amplifiers can improve the performance of these two protocols, in terms of maximal transmission distances, when we consider small amounts of entanglement, as typical in realistic setups.

  13. Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol

    Zhang Quan; Tang Chaojing

    2002-01-01

    It is generally accepted that quantum key distribution (QKD) could supply legitimate users with unconditional security during their communication. Quite a lot of satisfactory efforts have been achieved on experimentations with quantum cryptography. However, when the eavesdropper has extra-powerful computational ability, has access to a quantum computer, for example, and can carry into execution any eavesdropping measurement that is allowed by the laws of physics, the security against such attacks has not been widely studied and rigorously proved for most QKD protocols. Quite recently, Shor and Preskill proved concisely the unconditional security of the Bennett-Brassard 1984 (BB84) protocol. Their method is highly valued for its clarity of concept and concision of form. In order to take advantage of the Shor-Preskill technique in their proof of the unconditional security of the BB84 QKD protocol, we introduced in this paper a transformation that can translate the Bennett 1992 (B92) protocol into the BB84 protocol. By proving that the transformation leaks no more information to the eavesdropper, we proved the unconditional security of the B92 protocol. We also settled the problem proposed by Lo about how to prove the unconditional security of the B92 protocol with the Shor-Preskill method

  14. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  15. Setting best practice criteria for self-differencing avalanche photodiodes in quantum key distribution

    Koehler-Sidki, Alexander; Dynes, James F.; Lucamarini, Marco; Roberts, George L.; Sharpe, Andrew W.; Savory, Seb J.; Yuan, Zhiliang; Shields, Andrew J.

    2017-10-01

    In recent years, the security of avalanche photodiodes as single photon detectors for quantum key distribution has been subjected to much scrutiny. The most prominent example of this surrounds the vulnerability of such devices to blinding under strong illumination. We focus on self-differencing avalanche photodiodes, single photon detectors that have demonstrated count rates exceeding 1 GCounts/s resulting in secure key rates over 1 MBit/s. These detectors use a passive electronic circuit to cancel any periodic signals thereby enhancing detection sensitivity. However this intrinsic feature can be exploited by adversaries to gain control of the devices using illumination of a moderate intensity. Through careful experimental examinations, we define here a set of criteria for these detectors to avoid such attacks.

  16. A New Quantum Key Distribution Scheme Based on Frequency and Time Coding

    Chang-Hua, Zhu; Chang-Xing, Pei; Dong-Xiao, Quan; Jing-Liang, Gao; Nan, Chen; Yun-Hui, Yi

    2010-01-01

    A new scheme of quantum key distribution (QKD) using frequency and time coding is proposed, in which the security is based on the frequency-time uncertainty relation. In this scheme, the binary information sequence is encoded randomly on either the central frequency or the time delay of the optical pulse at the sender. The central frequency of the single photon pulse is set as ω 1 for bit 0 and set as ω 2 for bit 1 when frequency coding is selected. However, the single photon pulse is not delayed for bit 0 and is delayed in τ for 1 when time coding is selected. At the receiver, either the frequency or the time delay of the pulse is measured randomly, and the final key is obtained after basis comparison, data reconciliation and privacy amplification. With the proposed method, the effect of the noise in the fiber channel and environment on the QKD system can be reduced effectively

  17. Development of authentication code for multi-access optical code division multiplexing based quantum key distribution

    Taiwo, Ambali; Alnassar, Ghusoon; Bakar, M. H. Abu; Khir, M. F. Abdul; Mahdi, Mohd Adzir; Mokhtar, M.

    2018-05-01

    One-weight authentication code for multi-user quantum key distribution (QKD) is proposed. The code is developed for Optical Code Division Multiplexing (OCDMA) based QKD network. A unique address assigned to individual user, coupled with degrading probability of predicting the source of the qubit transmitted in the channel offer excellent secure mechanism against any form of channel attack on OCDMA based QKD network. Flexibility in design as well as ease of modifying the number of users are equally exceptional quality presented by the code in contrast to Optical Orthogonal Code (OOC) earlier implemented for the same purpose. The code was successfully applied to eight simultaneous users at effective key rate of 32 bps over 27 km transmission distance.

  18. Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution

    Zhang, Xueying; Zhang, Yichen; Zhao, Yijia; Wang, Xiangyu; Yu, Song; Guo, Hong

    2017-10-01

    We study the impact of the finite-size effect on the continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, mainly considering the finite-size effect on the parameter estimation procedure. The central-limit theorem and maximum likelihood estimation theorem are used to estimate the parameters. We also analyze the relationship between the number of exchanged signals and the optimal modulation variance in the protocol. It is proved that when Charlie's position is close to Bob, the CV-MDI QKD protocol has the farthest transmission distance in the finite-size scenario. Finally, we discuss the impact of finite-size effects related to the practical detection in the CV-MDI QKD protocol. The overall results indicate that the finite-size effect has a great influence on the secret-key rate of the CV-MDI QKD protocol and should not be ignored.

  19. Enhancing the performance of the measurement-device-independent quantum key distribution with heralded pair-coherent sources

    Zhu, Feng; Zhang, Chun-Hui; Liu, Ai-Ping [Institute of Signal Processing Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003 (China); Key Lab of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing 210003 (China); Wang, Qin, E-mail: qinw@njupt.edu.cn [Institute of Signal Processing Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003 (China); Key Lab of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing 210003 (China); Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026 (China)

    2016-04-01

    In this paper, we propose to implement the heralded pair-coherent source into the measurement-device-independent quantum key distribution. By comparing its performance with other existing schemes, we demonstrate that our new scheme can overcome many shortcomings existing in current schemes, and show excellent behavior in the quantum key distribution. Moreover, even when taking the statistical fluctuation into account, we can still obtain quite high key generation rate at very long transmission distance by using our new scheme. - Highlights: • Implement the heralded pair-coherent source into the measurement-device-independent quantum key distribution. • Overcome many shortcomings existing in current schemes and show excellent behavior. • Obtain quite high key generation rate even when taking statistical fluctuation into account.

  20. Coherent states of non-relativistic electron in the magnetic-solenoid field

    Bagrov, V G; Gavrilov, S P; Filho, D P Meira; Gitman, D M

    2010-01-01

    In the present work we construct coherent states in the magnetic-solenoid field, which is a superposition of the Aharonov-Bohm field and a collinear uniform magnetic field. In the problem under consideration there are two kinds of coherent states, those which correspond to classical trajectories which embrace the solenoid and those which do not. The constructed coherent states reproduce exactly classical trajectories, maintain their form under the time evolution and form a complete set of functions, which can be useful in semiclassical calculations. In the absence of the solenoid field these states are reduced to the well known in the case of uniform magnetic field Malkin-Man'ko coherent states.