Quantum Key Distribution Using Decoy State Protocol
|
|
- Rhoda Booker
- 5 years ago
- Views:
Transcription
1 American J. of Engineering and Applied Sciences 2 (4): , 2009 ISSN Science Pblications Qantm Key Distribtion sing Decoy State Protocol,2 Sellami Ali, 2 Shhairi Sahardin and,2 M.R.B. Wahiddin Department of Comptational and Theoretical Sciences, Faclty of Science, International Islamic niversity Malaysia, Malaysia 2 Information Secrity Clster, Mimos Berhad, Technology Park Malaysia, Malaysia Abstract: Problem statement: Qantm key distribtion provides nconditional secrity garanteed by the fndamental laws of qantm physics. nfortnately, for real-life experimental set-ps, which mainly based on faint laser plses, the occasional prodction of mlti-photons and channel loss make it possible for sophisticated eavesdroppers to lanch varios sbtle eavesdropping attacks inclding the Photon Nmber Splitting (PNS) attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secre key generation rate of Qantm Key Distribtion (QKD). Approach: Objective of this stdy was experimental implementation of weak decoy + vacm states QKD for increasing the performance of QKD system. To show conceptally how simple it was to apply the weak decoy + vacm state idea to a commercial QKD system, we chosen ID-3000 commercial qantm key distribtion system manfactred by id qantiqe. To implement the weak decoy + vacm state protocol, we had to add some new optical and electronics components to id qantiqe and to attenate each signal to the intensity of either signal state or weak decoy or vacm state randomly. Reslts: In or implementation, the attenation will be done by placing a VOA (variable optical attenator) in Alice s side. Specifically, or QKD system reqired the polarizations of 2 plses from the same signal to be orthogonal. Therefore the VOA mst be polarization independent so as to attenate the two plses eqally. The VOA tilized in experiment to attenate signals dynamically was Intensity Modlator (IM). We had implemented weak + vacm protocol on a modified commercial QKD system over a 25 km of telecom fibers with an nconditionally secre key rate of per plse. Conclsion: By making simple modifications to a commercial qantm key distribtion system, we cold achieve mch better performance with sbstantially higher key generation rate and longer distance than QKD system withot decoy state. Key words: Qantm cryptography, qantm key distribtion, decoy state protocol and optical commnications INTRODCTION Qantm Key Distribtion (QKD) has drawn many attentions from scientists. Different from the classical cryptography, Qantm Key Distribtion (QKD) [-3] can help two remote parties to set p the secre key by noncloning theorem [4]. Frther, proofs for the nconditional secrity over noisy channel have been given [5-8]. nfortnately, in view of implementation, perfect devices are always very hard to bild. Therefore most p-to-date QKD systems sbstitte the desired perfect single photon sorces by heavily attenated coherent laser sorces. QKD can be performed with these laser sorces over more than 20 km of telecom fibers [9,0]. However, this sbstittion raises some severe secrity concern. The otpt of coherent laser sorce obeys Poisson distribtion. Ths the occasional prodction of mlti-photon signals is inevitable no matter how heavily people attenate the laser. Recall that the secrity of BB84 protocol [3] is garanteed by qantm no-cloning theorem, the prodction of mltiphoton signals is fatal for the secrity: The eavesdropper (normally denoted by Eve) can simply keep an identical copy of what Bob possesses by blocking all single-photon signals and splitting all mlti-photon signals. Most p-to-date QKD experiments have not taken this Photon-Nmber Splitting (PNS) attack into accont and ths are, in principle, insecre. Hwang [] proposed the decoy state method as an important weapon to combat those sophisticated attack: By preparing and testing the transmission properties of Corresponding Athor: Sellami Ali, Department of Comptational and Theoretical Sciences, Faclty of Science, International Islamic niversity Malaysia, Malaysia 694
2 some decoy states, Alice and Bob are in a mch better position to catch an eavesdropper. Hwang specifically proposed to se a decoy state with an average nmber of photon of order. Hwang s idea was highly innovative. Decoy plse QKD theory gives a rigoros bond of the characteristics of the single photon plses, which are the only sorce plses that contribte to the secre bit rate. In [2], combining the idea of secrity proofs sing the entanglement distillation approach in GP [0] with decoy method; they gave a formla for the key generation rate: { µ µ 2 µ 2 } R q Q f (E )H (E ) + Q [ H (e )] () Where: q = Depends on the protocol, the sbscript µ = The average photon nmber per signal in signal states Q µ = The gain of signal states E µ = The qantm bit error rate (QBER) of signal states Q = The gain of the single photon states in signal states e = The error rate of single photon states f(x) = The bi-directional error correction rate [3] H 2 (x) = Binary shannon information fnction H 2(x) = -x log 2(x) - ( - x) log 2( - x) (2) Or implementation is based on BB84 [3] protocol. Among total N plses sent in experiment, N S plses are sed as signal states. Therefore the factor q is given by q = ½ N S /N. Q µ and E µ can be measred directly from experiments. In [2], they have proposed a practical protocol with Weak + Vacm states with average photon nmber 0 and v. sch a protocol is relatively simple to implement. The gain of the weak decoy state Qv and its error rate E µ cold also be reqired directly from experiments. Considering statistical flctations, the lower bonds of Q and the pper bond of e are given by [2] : 2 µ µ e v µ v µ v Q Q = Q 2 e Qµ e Y µ v v e µ 0µ E Q 0 o e µ µ Q (3) e Y e e = (4) In which: Q ν = Q ν Y0 = Y0 Y0 = Y0 + N Q ν ν N Y 0 0 N Y 0 0 In this stdy, we will present the experimental implementation of weak decoy + vacm states QKD sing commercial QKD systems are bi-directional. To show conceptally how simple it is to apply the weak decoy + vacm state idea to a commercial QKD system, we chose ID-3000 commercial qantm key distribtion system manfactred by id qantiqe. To implement the weak decoy + vacm state protocol, we have to add some new optical and electronics components to id qantiqe and have to attenate each signal to the intensity of either signal state or weak decoy or vacm state randomly. In or implementation, the attenation will be done by placing a VOA (variable optical attenator) in Alice s side. Specifically, or QKD system reqires the polarizations of the two plses from the same signal to be orthogonal. Therefore the VOA mst be polarization independent so as to attenate the two plses eqally. The VOA tilized in or experiment to attenate signals dynamically is Intensity Modlator (IM). MATERIAS AND METHODS Experimental setp: Existing commercial QKD systems are bi-directional. To show conceptally how simple it is to apply the decoy state idea to a commercial QKD system, we chose ID-3000 commercial Qantm Key Distribtion system manfactred by id qantiqe. The prototype of this QKD system is described in [8]. Here we describe it briefly: A frame of NP plses (in or experiment, NP = 624) is generated from Bob and sent to Alice. Within a frame, the time interval between signals is 200ns. The next frame will not be generated ntil the whole frame has retrned to Bob. The long delay line inside Jr. Alice promises that the incoming signal and retrning signal will not overlap in the channel between Bob and Jr. Alice so as to avoid Rayleigh scattering. This QKD system is called p and p atocompensating set-p, where the key is encoded in the 695
3 phase between two plses traveling from Bob to Alice and back (Fig.. A strong laser plse (@ 550 nm) emitted at Bob is separated at a first 50/50 Beam Splitter (BS), after having traveled throgh a short arm and a long arm, inclding a Phase Modlator (PMb) and a 50 ns Delay ine (D), respectively. All fibers and optical elements at Bob are polarization maintaining. The linear polarization is trned by 90 in the short arm, therefore the two plses exit Bob s stepp by the same port of the PBS. The plses travel down to Alice, are reflected on a Fraday mirror, attenated and come back orthogonally polarized. In trn, both plses now take the other path at Bob and arrive at the same time at BS where they interfere. Then, they are detected either in D, or after passing throgh the circlator (C ) in D2. Since the two plses take the same path, inside Bob in reversed other, this interferometer is ato-compensated. The implementation of weak + vacm protocol reqires amplitde modlation of three levels: µ, v and 0. Note that it wold be qite hard for high-speed amplitde modlators to prepare the real vacm state de to finite distinction ratio. However, if the gain of the vacm state is very close (like within a few standard deviations) to the dark cont rate, it wold be a good approximation. In or implementation, the attenation is done by placing a VOA (variable optical attenator) in Alice s side. Figre shows the schematic of the optical and electric layots in or system. The commercial QKD system by id Qantiqe consists of Bob and Jr. Alice. In or decoy state experiment, the actal (sender s) system is called Alice. It consists of Jr. Alice and for new optical and electronics components added by s. More concretely, for or decoy state protocol, we place the Decoy Intensity Modlator IM (denoted by DA in Fig. ) right in front of Jr. Alice. Its idle state is set to maximm transmittance. When the frame comes from Bob, the Decoy IM is in the idle state. After the first plse reaches copler C2, it will be detected by the classical detector and a synchronization signal will be otpt to trigger the Decoy generator. The Decoy Generator (DG in Fig. ), being triggered, Fig.: Experimental setp of weak + vacm state protocol 696 will hold a delay time td before otptting N P modlation voltages driving the Decoy IM to attenate the intensity of each the N P signals to be either that of signal state or decoy state dynamically, according to the Decoy profile. RESTS We performed nmerical simlation to find ot the optimal parameters. According to simlation reslts, we choose the intensities as µ = 0.55, v = Nmbers of plses sed as signal state, weak decoy state and vacm state are N µ = 0.635N, N v = 0.203N and N 0 = 0.62N respectively, where N = 05Mbit is the total nmber of plses sent by Alice in this experiment. After the transmission of all the N signals, Alice broadcasted to Bob the distribtion of decoy states as well as basis information. Bob then annonced which signals he had actally received in correct basis. We assme Alice and Bob annonced the measrement otcomes of all decoy states as well as a sbset of the signal states. From those experimental data, Alice and Bob then determined Q µ, Q v, E µ and E v, whose vales are now listed in Table. Note that or experiment is based on BB84 [0] protocol, S Nµ S ths q = ( / 2), where N µ is the nmber of plses N sed as signal state when Alice and Bob chose the same basis (Eq. ). DISCSSION Alice and Bob have to derive a lower bond on the key generation rate, R, by applying the theory of one decoy state protocol to their experimental data. To begin, we discss the theory of weak + vacm protocol. The weak + vacm protocol was first proposed and analyzed in [2]. In sch a protocol, only vacm and one decoy state are sed (in principle, more decoy states might increase key generation rate) with average photon nmbers 0 and v respectively. The transmittance/gain of the decoy state Q µ and its error rate E µ cold also be acqired directly from experiments. The experimental reslts are shown in Table. Note that the gain of vacm state is indeed very close to the dark cont rate, therefore the vacm state in or experiment is qite vacm. By taking statistical flctations into accont, we cold estimate the lower bond of Q and pper bond of e by plgging these experimental reslts into the Eq. 3 and 4 [2]. In or analysis of experimental data, we estimated e and Q very conservatively as within 0 standard deviations (i.e., a = 0), which promises a confidence interval for statistical flctations of
4 Table : Direct reslts from or experiment Para Vale Para Vale Para Vale Q µ E µ q 0.39 Qν Eν f (E) [3].22 Y Table 2: The lower bonds of Q, R and the pper bond of e.the vales are calclated from Eq. -4, taking statistical flctation into accont Para Vale Para Vale Q e R The experimental reslts listed in Table are the inpt for Eq. -4, whose otpt is a lower bond of the key generation rate, as shown in Table 2. Even with or very conservative estimation of e and Q, we got a lower bond for the key generation rate R = per plse, which means a final key length of abot = NR = 66 kbit. The finite size of data (05 M) gives a final secre key 66 kbits and introdces statistical flctations and therefore redces the key generation rate (per plse) below the fndamental limit of R perfect, which corresponds to infinite data size and infinite decoy state protocol. We remark that, as discssed in [2], here we consider only the flctations of the parameters, Q s and e s becase we believe they, being rather small nmbers, are the main sorce of statistical flctations. We do not consider, for example, the flctations in the nmber of different type of plses (vacm, single-photon) as sch flctations are negligible, in comparison. Notice that, even with or very conservative estimation for a confidence of , the lower bond of R is still roghly /4 of R perfect. This fact hints that it is not necessary, or rather, not economical, to se either very large data size or a lot of different decoy states. We performed nmerical simlation ranging µ from 0-, while no positive lower bond on R can be fond. This fact indicates that for or set-p, at a distance of 25 km, withot decoy states, we wold have been nable to prove the secrity of or protocol in an analogos manner. We provide the experimental demonstration of decoy state QKD over 25 km of Telecom fibers. Or reslt shows that, with rather simple modifications (by adding commercial variable optical attenators) to a commercial QKD system, decoy state QKD allows s to achieve mch better performance (in terms of sbstantially higher key generation rate and longer distance) than what is otherwise possible. Or experiment gives nconditional secrity against the most general attack allowed by qantm mechanics. 697 Moreover, it gives a rather high key generation rate. We expect that decoy state QKD will play a major role in ftre QKD systems in both fibers and open air. CONCSION Experimental weak + vacm decoy QKD system sing commercial QKD system has been demonstrated over a 25 km fiber with an nconditionally secre key rate of per plse. It is nconditionally secre against all types of attacks, inclding the PNS attack. We conclde that decoy plses improve the secrity and performance of weak plse QKD. However, sorces and detectors mst be calibrated accrately to avoid any artifacts that may compromise secrity. ACKNOWEDGMENT One of the researchers (AS) is gratefl to the Faclty of Science of IIM and Mimos Berhad for the facilities provided to him in the ndertakings of his PhD s degree programme. REFERENCES. Nielsen, M.A. and I.. Chang, Qantm Comptation and Qantm Information. Illstrated Edn., Cambridge niversity Press, K., ISBN: , pp: Gisin, N., G. Ribordy, W. Tittel and H. Zbinden, Qantm cryptography. Rev. Mod. Phys., 74: DOI: 0.03/RevModPhys Bennett, C.H. and G. Brassard, 984. Qantm cryptography: Pblic key distribtion and coin tossing. Proceeding of the IEEE International Conference on Compters, Systems and Signal Processing, (ICCSSP 84), Bangalore, IEEE, New York, pp: Wootters, W.K. and W.H. Zrek, 982. A single qantm cannot be cloned. Natre, 299: DOI: 0.038/299802a0 5. Shor, P.W. and J. Preskill, Simple proof of secrity of the BB84 qantm key distribtion protocol. Phys. Rev. ett., 85: DOI: 0.03/PhysRevett o, H.K. and H.F. Cha, 999. nconditional secrity of qantm key distribtion over arbitrarily long distances. Science, 283: DOI: 0.26/science Mayers, D., 200. nconditional secrity in qantm cryptography. J. ACM., 48:
5 8. Ekert, A.K., 99. Qantm cryptography based on Bell s theorem. Phys. Rev. ett., 67: DOI: 0.03/PhysRevett Gobby, C., Z.. Yan and A.J. Shields, Qantm key distribtion over 22 km of standard telecom fiber. Applied Phys. ett., 84: DOI: 0.063/ Mo, X. et al., Faraday-Michelson system for qantm cryptography. Optics ett., 30: DOI: 0.364/O Hwang, W.Y., Qantm key distribtion with high loss: Toward global secre commnication. Phys. Rev. ett., 9: DOI: 0.03/PhysRevett Ma, X., B. Qi, Y. Zhao and H.K. o, Practical decoy state for qantm key distribtion. March, Brassard, G. and. Salvail, 994. Advances in cryptology EROCRYPT 93. ectre Notes Compt. Sci., 765: ryptology/book/
Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber
Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/06068v2 2 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum
More informationSimulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber
Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/0601168 v2 12 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum
More informationModelling by Differential Equations from Properties of Phenomenon to its Investigation
Modelling by Differential Eqations from Properties of Phenomenon to its Investigation V. Kleiza and O. Prvinis Kanas University of Technology, Lithania Abstract The Panevezys camps of Kanas University
More informationA New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)
A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport
More informationLOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO
016 Sixth International Conference on Instrmentation & Measrement Compter Commnication and Control LOS Component-Based Eqal Gain Combining for Ricean Lins in plin Massive MIMO Dian-W Ye College of Information
More informationTechnical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty
Technical Note EN-FY160 Revision November 30, 016 ODiSI-B Sensor Strain Gage Factor Uncertainty Abstract Lna has pdated or strain sensor calibration tool to spport NIST-traceable measrements, to compte
More informationIntroduction to Quantum Information Processing
Introdction to Qantm Information Processing Lectre 5 Richard Cleve Overview of Lectre 5 Review of some introdctory material: qantm states, operations, and simple qantm circits Commnication tasks: one qbit
More informationQuantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto
Quantum Hacking Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto 1 Outline Introduction Quantum Key Distribution (QKD) Practical QKD Quantum Hacking Fake-state & Time-shifted
More informationStudy on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom
EPJ Web of Conferences 80, 0034 (08) EFM 07 Stdy on the implsive pressre of tank oscillating by force towards mltiple degrees of freedom Shigeyki Hibi,* The ational Defense Academy, Department of Mechanical
More informationOptimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance
Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for
More informationUNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL
8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a
More informationEXPERIMENTAL DEMONSTRATION OF QUANTUM KEY
EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTONS FOLLOWING THE PING- PONG CODING PROTOCOL Martin Ostermeyer, Nino Walenta University of Potsdam, Institute of Physics, Nonlinear
More informationBB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits
BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits (*) Yoshihiro NAMBU*, Takaaki HATANAKA, and Kazuo NAKAMURA (*) Corresponding author: E-mail address: y-nambu@ah.jp.nec.com
More informationPHASE STEERING AND FOCUSING BEHAVIOR OF ULTRASOUND IN CEMENTITIOUS MATERIALS
PHAS STRING AND FOCUSING BHAVIOR OF ULTRASOUND IN CMNTITIOUS MATRIALS Shi-Chang Wooh and Lawrence Azar Department of Civil and nvironmental ngineering Massachsetts Institte of Technology Cambridge, MA
More informationSecurity of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C
Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used
More informationJoint Transfer of Energy and Information in a Two-hop Relay Channel
Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical
More informationDesign and Analyses of some 1-D Chaotic Generators for Secure Data
SETIT 2009 5 th International Conference: Sciences of Electronic, Tenologies of Information and Telecommnications Mar 22-26, 2009 TUISIA Design and Analyses of some 1-D Chaotic Generators for Secre Data
More informationReplacement of Einstein s Relativity Theory with a New One: Why the Second Postulate is Superfluous?
International Jornal of Physics, 16, Vol. 4, No. 5, 14-145 Available online at http://pbs.sciepb.com/ijp/4/5/5 Science and Edcation Pblishing DOI:1.1691/ijp-4-5-5 Replacement of Einstein s Relativity Theory
More informationSimplified Identification Scheme for Structures on a Flexible Base
Simplified Identification Scheme for Strctres on a Flexible Base L.M. Star California State University, Long Beach G. Mylonais University of Patras, Greece J.P. Stewart University of California, Los Angeles
More informationThe spreading residue harmonic balance method for nonlinear vibration of an electrostatically actuated microbeam
J.L. Pan W.Y. Zh Nonlinear Sci. Lett. Vol.8 No. pp.- September The spreading reside harmonic balance method for nonlinear vibration of an electrostatically actated microbeam J. L. Pan W. Y. Zh * College
More informationQuantum Cryptography. Marshall Roth March 9, 2007
Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and
More informationTrustworthiness of detectors in quantum key distribution with untrusted detectors
Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationQuantum Cryptography
http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.
More informationDecoder Error Probability of MRD Codes
Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical
More informationAn Investigation into Estimating Type B Degrees of Freedom
An Investigation into Estimating Type B Degrees of H. Castrp President, Integrated Sciences Grop Jne, 00 Backgrond The degrees of freedom associated with an ncertainty estimate qantifies the amont of information
More informationRealization of B92 QKD protocol using id3100 Clavis 2 system
Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and
More informationDevelopment of Second Order Plus Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model
Development of Second Order Pls Time Delay (SOPTD) Model from Orthonormal Basis Filter (OBF) Model Lemma D. Tfa*, M. Ramasamy*, Sachin C. Patwardhan **, M. Shhaimi* *Chemical Engineering Department, Universiti
More informationExperimental realization of quantum cryptography communication in free space
Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao
More informationSimulation investigation of the Z-source NPC inverter
octoral school of energy- and geo-technology Janary 5 20, 2007. Kressaare, Estonia Simlation investigation of the Z-sorce NPC inverter Ryszard Strzelecki, Natalia Strzelecka Gdynia Maritime University,
More informationPractical Quantum Key Distribution
Leopold-Franzens-Universität Innsbruck Institut für Experimentalphysik Technikerstrasse 25 http://www.uibk.ac.at Practical Quantum Key Distribution Gregor Weihs Contents QKD Protocols Implementations of
More informationarxiv:quant-ph/ v4 14 May 2003
Phase-transition-like Behavior of Qantm Games arxiv:qant-ph/0111138v4 14 May 2003 Jiangfeng D Department of Modern Physics, University of Science and Technology of China, Hefei, 230027, People s Repblic
More informationEffects of Soil Spatial Variability on Bearing Capacity of Shallow Foundations
Geotechnical Safety and Risk V T. Schweckendiek et al. (Eds.) 2015 The athors and IOS Press. This article is pblished online with Open Access by IOS Press and distribted nder the terms of the Creative
More informationIntrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin
Intrinsic-Stabilization Uni-Directional Quantum Key Distribution Between Beijing and Tianjin Xiao-fan Mo 1, Bing Zhu 1, 2, Zheng-fu Han 1*, You-zhen Gui 1, Guang-can Guo 1 1 Key Lab of Quantum Information
More informationPerformance analysis of GTS allocation in Beacon Enabled IEEE
1 Performance analysis of GTS allocation in Beacon Enabled IEEE 8.15.4 Pangn Park, Carlo Fischione, Karl Henrik Johansson Abstract Time-critical applications for wireless sensor networks (WSNs) are an
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =
More informationPhase-merging enhanced harmonic generation free-electron laser
OPEN ACCESS Phase-merging enhanced harmonic generation free-electron laser To cite this article: Chao Feng et al 014 New J. Phys. 16 04301 View the article online for pdates and enhancements. Related content
More informationDecoder Error Probability of MRD Codes
Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical
More informationSareban: Evaluation of Three Common Algorithms for Structure Active Control
Engineering, Technology & Applied Science Research Vol. 7, No. 3, 2017, 1638-1646 1638 Evalation of Three Common Algorithms for Strctre Active Control Mohammad Sareban Department of Civil Engineering Shahrood
More informationFrequency Estimation, Multiple Stationary Nonsinusoidal Resonances With Trend 1
Freqency Estimation, Mltiple Stationary Nonsinsoidal Resonances With Trend 1 G. Larry Bretthorst Department of Chemistry, Washington University, St. Lois MO 6313 Abstract. In this paper, we address the
More informationPrediction of Transmission Distortion for Wireless Video Communication: Analysis
Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326
More informationSimulation and Modeling of Packet Loss on α-stable VoIP Traffic
Simlation and Modeling of Pacet Loss on α-stable VoIP Traffic HOMERO TORAL, 2, DENI TORRES, LEOPOLDO ESTRADA Department of Electrical Engineering Centro de Investigación y Estdios Avanzados del I.P.N -
More informationRESGen: Renewable Energy Scenario Generation Platform
1 RESGen: Renewable Energy Scenario Generation Platform Emil B. Iversen, Pierre Pinson, Senior Member, IEEE, and Igor Ardin Abstract Space-time scenarios of renewable power generation are increasingly
More informationQuantum Cryptography and Security of Information Systems
Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty
More informationEvaluation of the Fiberglass-Reinforced Plastics Interfacial Behavior by using Ultrasonic Wave Propagation Method
17th World Conference on Nondestrctive Testing, 5-8 Oct 008, Shanghai, China Evalation of the Fiberglass-Reinforced Plastics Interfacial Behavior by sing Ultrasonic Wave Propagation Method Jnjie CHANG
More informationInternational Journal of Physical and Mathematical Sciences journal homepage:
64 International Jornal of Physical and Mathematical Sciences Vol 2, No 1 (2011) ISSN: 2010-1791 International Jornal of Physical and Mathematical Sciences jornal homepage: http://icoci.org/ijpms PRELIMINARY
More informationFOUNTAIN codes [3], [4] provide an efficient solution
Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn
More informationDesigning of Virtual Experiments for the Physics Class
Designing of Virtal Experiments for the Physics Class Marin Oprea, Cristina Miron Faclty of Physics, University of Bcharest, Bcharest-Magrele, Romania E-mail: opreamarin2007@yahoo.com Abstract Physics
More information1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on
. Tractable and Intractable Comptational Problems So far in the corse we have seen many problems that have polynomial-time soltions; that is, on a problem instance of size n, the rnning time T (n) = O(n
More informationFeedback of a Non-Truncated Erlang Queuing System with Balking and Retention of Reneged Customers
Applied and Comptational Mathematics 08; 7(): 40-49 http://www.sciencepblishinggrop.com/j/acm doi: 0.648/j.acm.08070. ISSN: 8-5605 (Print); ISSN: 8-56 (Online) Feedbac of a Non-Trncated Erlang Qeing System
More informationPREDICTABILITY OF SOLID STATE ZENER REFERENCES
PREDICTABILITY OF SOLID STATE ZENER REFERENCES David Deaver Flke Corporation PO Box 99 Everett, WA 986 45-446-6434 David.Deaver@Flke.com Abstract - With the advent of ISO/IEC 175 and the growth in laboratory
More informationBB84 and Noise Immune Quantum Key Distribution Protocols Simulation: An Approach Using Photonic Simulator
BB84 and Noise Immune Quantum Key Distribution Protocols Simulation: An Approach Using Photonic Simulator Abudhahir. Buhari, Zuriati. Ahmad Zukarnai, Shamala. K.Subramaniam, Hisham. Zainuddin, and Suhairi.
More informationFormules relatives aux probabilités qui dépendent de très grands nombers
Formles relatives ax probabilités qi dépendent de très grands nombers M. Poisson Comptes rends II (836) pp. 603-63 In the most important applications of the theory of probabilities, the chances of events
More informationDetection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations
Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum
More informationGround-Satellite QKD Through Free Space. Steven Taylor
Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution
More informationEXCITATION RATE COEFFICIENTS OF MOLYBDENUM ATOM AND IONS IN ASTROPHYSICAL PLASMA AS A FUNCTION OF ELECTRON TEMPERATURE
EXCITATION RATE COEFFICIENTS OF MOLYBDENUM ATOM AND IONS IN ASTROPHYSICAL PLASMA AS A FUNCTION OF ELECTRON TEMPERATURE A.N. Jadhav Department of Electronics, Yeshwant Mahavidyalaya, Ned. Affiliated to
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider
More informationControl of a Power Assisted Lifting Device
Proceedings of the RAAD 212 21th International Workshop on Robotics in Alpe-Adria-Danbe Region eptember 1-13, 212, Napoli, Italy Control of a Power Assisted Lifting Device Dimeas otios a, Kostompardis
More informationMathematical Analysis of Nipah Virus Infections Using Optimal Control Theory
Jornal of Applied Mathematics and Physics, 06, 4, 099- Pblished Online Jne 06 in SciRes. http://www.scirp.org/jornal/jamp http://dx.doi.org/0.436/jamp.06.464 Mathematical Analysis of Nipah Virs nfections
More informationSimulation of BB84 Quantum Key Distribution in depolarizing channel
Simulation of BB84 Quantum Key Distribution in depolarizing channel Hui Qiao, Xiao-yu Chen * College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China xychen@mail.zjgsu.edu.cn
More informationElements of Coordinate System Transformations
B Elements of Coordinate System Transformations Coordinate system transformation is a powerfl tool for solving many geometrical and kinematic problems that pertain to the design of gear ctting tools and
More informationReflections on a mismatched transmission line Reflections.doc (4/1/00) Introduction The transmission line equations are given by
Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introdction The transmission line eqations are given by, I z, t V z t l z t I z, t V z, t c z t (1) (2) Where, c is the per-nit-length
More informationSources of Non Stationarity in the Semivariogram
Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary
More informationThe Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks
The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,
More informationA New Approach to Direct Sequential Simulation that Accounts for the Proportional Effect: Direct Lognormal Simulation
A ew Approach to Direct eqential imlation that Acconts for the Proportional ffect: Direct ognormal imlation John Manchk, Oy eangthong and Clayton Detsch Department of Civil & nvironmental ngineering University
More informationClassify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.
Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports
More informationDiscussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli
1 Introdction Discssion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen Department of Economics, University of Copenhagen and CREATES,
More informationTed Pedersen. Southern Methodist University. large sample assumptions implicit in traditional goodness
Appears in the Proceedings of the Soth-Central SAS Users Grop Conference (SCSUG-96), Astin, TX, Oct 27-29, 1996 Fishing for Exactness Ted Pedersen Department of Compter Science & Engineering Sothern Methodist
More informationQuantum key distribution with 2-bit quantum codes
Quantum key distribution with -bit quantum codes Xiang-Bin Wang Imai Quantum Computation and Information project, ERATO, Japan Sci. and Tech. Corp. Daini Hongo White Bldg. 0, 5-8-3, Hongo, Bunkyo, Tokyo
More informationSection 7.4: Integration of Rational Functions by Partial Fractions
Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to
More information1 JAXA Special Pblication JAXA-SP-1-E Small-scale trblence affects flow fields arond a blff body and therefore it governs characteristics of cross-sec
First International Symposim on Fltter and its Application, 1 11 IEXPERIMENTAL STUDY ON TURBULENCE PARTIAL SIMULATION FOR BLUFF BODY Hiroshi Katschi +1 and Hitoshi Yamada + +1 Yokohama National University,
More informationSingle-photon quantum error rejection and correction with linear optics
Single-photon quantum error rejection and correction with linear optics Demetrios Kalamidas Institute for ltrafast Spectroscopy and Lasers, City College of the City niversity of New York, 138 Street &
More informationLecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2
BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE
More informationDeterministic secure communications using two-mode squeezed states
Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May
More informationDiscussion Papers Department of Economics University of Copenhagen
Discssion Papers Department of Economics University of Copenhagen No. 10-06 Discssion of The Forward Search: Theory and Data Analysis, by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen,
More informationStair Matrix and its Applications to Massive MIMO Uplink Data Detection
1 Stair Matrix and its Applications to Massive MIMO Uplink Data Detection Fan Jiang, Stdent Member, IEEE, Cheng Li, Senior Member, IEEE, Zijn Gong, Senior Member, IEEE, and Roy S, Stdent Member, IEEE Abstract
More informationFull Duplex in Massive MIMO Systems: Analysis and Feasibility
Fll Dplex in Massive MIMO Systems: Analysis and Feasibility Radwa Sltan Lingyang Song Karim G. Seddik andzhan Electrical and Compter Engineering Department University of oston TX USA School of Electrical
More informationA Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol
Appl Math Inf Sci 8, No 6, 769-773 (4) 769 Applied Mathematics & Information Sciences An International Journal http://dxdoiorg/785/amis/86 A Necessary Condition for the Security of Coherent- One-Way Quantum
More informationUncertainty Analysis of the Thunder Scientific Model 1200 Two-Pressure Humidity Generator
Uncertainty Analysis of the hnder cientific Model 100 wo-ressre Hmidity Generator 1.0 Introdction escribed here is the generated hmidity ncertainty analysis, following the Gidelines of NI and NL International
More informationPulses on a Struck String
8.03 at ESG Spplemental Notes Plses on a Strck String These notes investigate specific eamples of transverse motion on a stretched string in cases where the string is at some time ndisplaced, bt with a
More informationLewis number and curvature effects on sound generation by premixed flame annihilation
Center for Trblence Research Proceedings of the Smmer Program 2 28 Lewis nmber and crvatre effects on sond generation by premixed flame annihilation By M. Talei, M. J. Brear AND E. R. Hawkes A nmerical
More informationElectron Phase Slip in an Undulator with Dipole Field and BPM Errors
CS-T--14 October 3, Electron Phase Slip in an Undlator with Dipole Field and BPM Errors Pal Emma SAC ABSTRACT A statistical analysis of a corrected electron trajectory throgh a planar ndlator is sed to
More informationMulti-Voltage Floorplan Design with Optimal Voltage Assignment
Mlti-Voltage Floorplan Design with Optimal Voltage Assignment ABSTRACT Qian Zaichen Department of CSE The Chinese University of Hong Kong Shatin,N.T., Hong Kong zcqian@cse.chk.ed.hk In this paper, we stdy
More informationOptimal search: a practical interpretation of information-driven sensor management
Optimal search: a practical interpretation of information-driven sensor management Fotios Katsilieris, Yvo Boers and Hans Driessen Thales Nederland B.V. Hengelo, the Netherlands Email: {Fotios.Katsilieris,
More informationLinear and Nonlinear Model Predictive Control of Quadruple Tank Process
Linear and Nonlinear Model Predictive Control of Qadrple Tank Process P.Srinivasarao Research scholar Dr.M.G.R.University Chennai, India P.Sbbaiah, PhD. Prof of Dhanalaxmi college of Engineering Thambaram
More informationSetting The K Value And Polarization Mode Of The Delta Undulator
LCLS-TN-4- Setting The Vale And Polarization Mode Of The Delta Undlator Zachary Wolf, Heinz-Dieter Nhn SLAC September 4, 04 Abstract This note provides the details for setting the longitdinal positions
More informationMEASUREMENT OF TURBULENCE STATISTICS USING HOT WIRE ANEMOMETRY
MEASUREMENT OF TURBULENCE STATISTICS USING HOT WIRE ANEMOMETRY Mrgan Thangadrai +, Atl Kmar Son *, Mritynjay Singh +, Sbhendra *, Vinoth Kmar ++, Ram Pyare Singh +, Pradip K Chatterjee + + Thermal Engineering,
More informationarxiv:quant-ph/ v1 21 Apr 2004
Distribution of time-bin entangled qubits over 5 km of optical fiber I. Marcikic, H. de Riedmatten, W. Tittel, H. Zbinden, M. Legré and N. Gisin Group of Applied Physics-Optique, University of Geneva,
More informationPossible holographic universe, graviton rest mass, mass gap and dark energy
JJJPL report 0423-2 (2015); vixra:1508.0292 (2015). Possible holographic niverse, graviton rest mass, mass gap and dark energy Jae-Kwang Hwang JJJ Physics Laboratory, 1077 Beech Tree Lane, Brentwood, TN
More informationUncertainties of measurement
Uncertainties of measrement Laboratory tas A temperatre sensor is connected as a voltage divider according to the schematic diagram on Fig.. The temperatre sensor is a thermistor type B5764K [] with nominal
More informationWorkshop on Understanding and Evaluating Radioanalytical Measurement Uncertainty November 2007
1833-3 Workshop on Understanding and Evalating Radioanalytical Measrement Uncertainty 5-16 November 007 Applied Statistics: Basic statistical terms and concepts Sabrina BARBIZZI APAT - Agenzia per la Protezione
More informationExperimental Study of an Impinging Round Jet
Marie Crie ay Final Report : Experimental dy of an Impinging Rond Jet BOURDETTE Vincent Ph.D stdent at the Rovira i Virgili University (URV), Mechanical Engineering Department. Work carried ot dring a
More informationNonparametric Identification and Robust H Controller Synthesis for a Rotational/Translational Actuator
Proceedings of the 6 IEEE International Conference on Control Applications Mnich, Germany, October 4-6, 6 WeB16 Nonparametric Identification and Robst H Controller Synthesis for a Rotational/Translational
More informationActive Flux Schemes for Advection Diffusion
AIAA Aviation - Jne, Dallas, TX nd AIAA Comptational Flid Dynamics Conference AIAA - Active Fl Schemes for Advection Diffsion Hiroaki Nishikawa National Institte of Aerospace, Hampton, VA 3, USA Downloaded
More informationA probabilistic quantum key transfer protocol
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationApplying Fuzzy Set Approach into Achieving Quality Improvement for Qualitative Quality Response
Proceedings of the 007 WSES International Conference on Compter Engineering and pplications, Gold Coast, stralia, Janary 17-19, 007 5 pplying Fzzy Set pproach into chieving Qality Improvement for Qalitative
More informationStep-Size Bounds Analysis of the Generalized Multidelay Adaptive Filter
WCE 007 Jly - 4 007 London UK Step-Size onds Analysis of the Generalized Mltidelay Adaptive Filter Jnghsi Lee and Hs Chang Hang Abstract In this paper we analyze the bonds of the fixed common step-size
More informationIntersubband Transitions in InAs/AlSb Quantum Wells
Mat. Res. Soc. Symp. Proc. Vol. 7 3 Materials Research Society M9..1 Intersbband Transitions in InAs/AlSb Qantm Wells J. Li, 1) K. Koloolov, 1) C. Z. Ning, 1) D. C. Larraber, ) G. A. Khodaparast, ) J.
More information