Security and implementation of differential phase shift quantum key distribution systems

Size: px
Start display at page:

Download "Security and implementation of differential phase shift quantum key distribution systems"

Transcription

1 Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006

2 Classical cryptography cryptography = κρυπτός + γράφω = write secretly Ancient Greece Scytale Alice World War II Enigma Unconditional security One time pad Today computational security e.g. computational difficulty of factoring large integers Bob cryptogram Eve message M key K cryptogram S = M K cryptogram S key K message M = S K

3 Quantum cryptography Public channel Quantum channel Information Error Quantum cryptography relies on fundamental laws of quantum mechanics to solve the key distribution problem Quantum Key Distribution (QKD) Information is encoded in quantum bits (qubits) vector in a two dimensional Hilbert space: ψ = α 0 + β 1 Photons are ideal qubits for QKD because they can be transmitted over long distances in optical fibers

4 Limitations in quantum cryptography First proposal of using the quantum properties of light by Bennett and Brassard in 1984 BB84 QKD protocol First demonstration of a quantum cryptography system in 1992, information was transmitted over 32 cm of free space Performance of current fiber-optic QKD systems is mainly limited by two factors: Vulnerability of QKD protocols to powerful eavesdropping attacks, when classical light from a laser is used instead of non-classical light from a single-photon source Single-photon detectors communication rate remains very low, communication distance is limited to a few tens of kilometers Challenge Invent ways of extending the distance and increasing the speed of QKD systems

5 Outline The BB84 quantum key distribution protocol Differential phase shift quantum key distribution (DPS-QKD) The up-conversion single-photon detector Implementation of a 1 GHz DPS-QKD system Implementation of a 10 GHz DPS-QKD system Conclusion Future directions

6 The BB84 QKD protocol Alice Electro-optic modulator Quantum channel 50/50 BS H, V basis Bob Single-photon source H V PBS Single-photon detectors + 45, 45 basis Quantum transmission Information is encoded in two non-orthogonal bases Raw key generation rate: Repetition rate Rraw = ν ( μt + 4 d) Average photon number per pulse Transmission efficiency T Dark counts per clock cycle ( α L Lr )/10 =η10 +

7 Sifting and error correction Sifting Alice and Bob discard the bits for which they chose a different basis Sifted key generation rate: 1 1 Rsifted = Rraw = ν ( μt + 4 d ) 2 2 If the transmission is error-free, sifted key is unconditionally secure, any eavesdropping will unavoidably cause errors But all practical systems have errors Error correction Alice provides Bob with additional information about the key to correct errors, e.g. parity check by segment Leakage of additional information to Eve need algorithm to minimize number of revealed bits Length of error correction string Length of sifted key Shannon s noiseless coding theorem κ lim n = f ( e) elog 2e+ (1 e)log 2(1 e) n [ ] Efficiency of error correction algorithm

8 Privacy amplification Privacy amplification Key information has leaked to Eve Innocent error rate due to system imperfections Error correction We need to compress key so that Eve s information becomes exponentially small, e.g. randomly choose two bits and calculate XOR secure key Generalized privacy amplification theory: { τ ( )[ log (1 ) log (1 )]} R = R + f e e e+ e e secure sifted 2 2 Eve uses innocent system error rate to obtain key information by general quantum measurements on individual single photons shrinking factor calculated from security proof: 1 τ = log2 + 2e 2e 2 2

9 Photon number splitting attacks in BB84 Eve Lossless channel Alice QND photon number measurement Bob Quantum memory Delayed measurement For multi-photon states, Eve learns bit information without causing any error As the channel loss increases she blocks more and more single-photon states Modified shrinking factor: Poisson source 2 e e μt μ = + = 2 β β μt 2 1 e= 0 τ βlog2 2 2 β Fraction of single-photon states

10 Secure key distribution distance for BB84 μ For e ~0, d ~0: Rpoisson opt μt 2 μ T R T poisson Quadratic decrease with channel transmission 2 Rideal T Linear decrease with channel transmission BB84 with Poisson source is vulnerable to photon number splitting attacks

11 Outline The BB84 quantum key distribution protocol Differential phase shift quantum key distribution (DPS-QKD) The up-conversion single-photon detector Implementation of a 1 GHz DPS-QKD system Implementation of a 10 GHz DPS-QKD system Conclusion Future directions

12 Differential phase shift quantum key distribution (DPS-QKD) Alice Quantum channel Δt DET1 (0) Bob Coherent light source ATT PM (0,π) 0 π 0 0 BS BS Δt DET2 (1) Sifted key generation rate: Rsifted = Rraw = ν ( μt + 2 d) Principle of security non-deterministic collapse of a wavefunction in a quantum measurement 1 = N iφ1 iφ2 iφn iφn ψ e 1 e 2... e n... e N Detection event occurs at a time instance n randomly and reveals phase difference Δφ n =φ n+1 -φ n

13 Beamsplitter attack Alice Eve T Lossless channel Bob Quantum memory Optical switch One beam with average photon number N μt is sent to Bob, another with average photon number N μ(1-t ) is used by Eve Each photon in Eve s wavefunction is detected randomly at one of N time instances probability that she obtains the value of a bit at a certain time given that Bob detected a photon at that time is 2μ(1-T ) She obtains complete bit information for a fraction 2μ(1-T ) of bits without causing any error

14 Intercept and resend attack Eve Alice Single-photon source Bob X X Induces 25 % error rate If innocent system error rate is e, Eve can attack 4e bits she obtains complete bit information for a fraction 2e of bits Hybrid beamsplitter + intercept and resend attack: Eve does not have bit information for a fraction 1-2μ(1-T )-2e of bits τ = 1 2 μ(1 T) 2e { τ ( )[ log (1 ) log (1 )]} R = R + f e e e+ e e secure sifted 2 2

15 General individual attacks Eavesdropping strategy: Photon number splitting attack: QND measurement on total photon number in wavefunction, Eve sends N μt photons to Bob and keeps N μ(1-t ) photons, which are stored and measured individually equivalent to beamsplitter attack Optimal measurement on individual single photons, which spread over many pulses with a fixed phase modulation pattern in DPS- QKD Privacy amplification shrinking factor becomes: τ = [ μ ] μ (1 6 e) e= (1 T) log2 1 e 1 2 (1 T)

16 Secure key distribution distance for DPS-QKD For e ~0, d ~0: R μ DPS opt μt(1 2 μ) f ( T) R T DPS Linear decrease with channel transmission illustrates robustness to photon number splitting attacks Performance determined by robustness to photon number splitting attacks, which is accounted for in both analyses. DPS-QKD uses a Poisson source and is robust to photon number splitting attacks

17 Outline The BB84 quantum key distribution protocol Differential phase shift quantum key distribution The up-conversion single-photon detector Implementation of a 1 GHz DPS-QKD system Implementation of a 10 GHz DPS-QKD system Conclusion Future directions

18 Current single-photon detectors Wavelength Quantum efficiency Dark count rate Afterpulse effects InGaAs/InP APD nm ~10 % ~10 4 counts/s Large gated mode Si APD nm ~70 % ~50 counts/s Small non-gated mode No probability of detection All pulses are possibly detected Gate width (~1 ns) Dead time t d (~50 ns) Gate period 1/f g (~1 μs) R f T sifted gated = gμ sifted non-gated R Te νμtt d =νμ

19 The up-conversion single-photon detector 1.5 μm single-photon signal 1.3 μm strong pump 700 nm single-photon idler Periodically poled lithium niobate (PPLN) waveguide Si APD Sum frequency generation ω pump ω SFG ω signal ω pump + ω signal = ω SFG Birefrigent phase-matching: k pump + k signal = k SFG Quasi-phase-matching (QPM): k pump + k signal + K = k SFG, K = 2π/Λ QPM can be achieved for any desired interaction using nonlinear coefficients that couple waves of same polarization, which may be stronger very efficient nonlinear interactions Tight confinement of interacting fields in entire crystal higher signal conversion efficiency bulk waveguide

20 1.55 μm single-photon detection experimental setup 1.32 μm pump source 30 db isolator VATT 20 db Polarization splitter controller 99% Fixed 20 db attenuators splitter VATT 1% Polarization controller 1.55 μm signal source Power monitor 1% 1310/1550 WDM 99% Power monitor Fiber-coupled PPLN waveguide Lens SHG Filter Dichroic BS Pump, signal Temperature-controlled oven Mirror Prism Lens Si APD

21 N SFG int ernal = = Nsignal(0) Quantum efficiency Coupled mode theory for three-wave interactions in a waveguide with undepleted pump and lossless propagation: η ( L) sin 2 ( ηnor pl) η = η T e T T η signal α L SFG int ernal in out collection Si APD 99.9 % signal conversion efficiency in waveguide with ~100 mw of coupled pump power reduced to 83 % due to propagation losses reduced to 65 % due to input coupling, output coupling, fiber pigtail, reflection, and collection setup losses 46 % overall quantum efficiency

22 Dark counts dark counts/s at maximum quantum efficiency point Dark counts are not determined by Si APD but by a parasitic nonlinear process, which strongly depends on pump power

23 Dark count origin Spectral feature appears at SFG wavelength noise photons at 1.55 μm are up-converted via SFG process Possible source of noise photons: spontaneous Raman scattering in fiber and waveguide Solution: use longer pump wavelength than signal wavelength Stokes anti-stokes dark counts/s ω pump ω Stokes ω anti-stokes ω pump dark counts/s ω phonon ω phonon

24 Summary DPS-QKD protocol simple system architecture requires only practical, telecommunication components robust to photon number splitting attacks Up-conversion detector high efficiency (maximum 46 %) in the 1.5 μm telecommunication band quantum efficiency and dark counts depend on pump power convenient tuning tool for optimal operation regime depending on the application non-gated mode operation with small dead time enables fast communication

25 Outline The BB84 quantum key distribution protocol Differential phase shift quantum key distribution The up-conversion single-photon detector Implementation of a 1 GHz DPS-QKD system Implementation of a 10 GHz DPS-QKD system Conclusion Future directions

26 1 GHz DPS-QKD experimental setup 1.55 μm cw light source Polarization controller IM Polarization controller (0,π) PM VATT 20 db splitter 99% VATT Optical fiber 66 ps 15 GHz PPG 1 GHz DG Power monitor 1% 1 ns Clock source Measurement time window START Time Interval Analyzer STOP DET1 Temperature-controlled PLC Mach-Zehnder interferometer 1 ns 1 ns Logic unit 1.55 μm up-conversion single-photon detectors Insertion loss: 2.5 db Extinction ratio: 20 db DET2

27 Experimental setup in the lab Alice Quantum channel Bob Detector

28 Detector timing jitter characteristics Pulse broadening due to timing jitter of Si APD induces errors apply measurement time window, which also reduces effective dark counts 66 ps pulses, 10 5 counts/s FWHM: 75 ps FWTM: 240 ps We can use small measurement time window without significant degradation of the signal to noise ratio

29 Experimental results ( 1 6e) 2 2 Rsecure = Rsifted [1 2 μ(1 T)]log2 1 e + f ( e) [ elog 2 e+ (1 e) log 2(1 e) ] (a) η = 6 % D = counts/s time window = 200 ps d = (b) η = 0.4 % D = 350 counts/s time window = 100 ps d = (a) 2 Mbit/s km (b) km

30 Comparison with existing systems

31 Outline The BB84 quantum key distribution protocol Differential phase shift quantum key distribution The up-conversion single-photon detector Implementation of a 1 GHz DPS-QKD system Implementation of a 10 GHz DPS-QKD system Conclusion Future directions

32 10 GHz DPS-QKD experimental setup 1.55 μm, 10 GHz mode-locked laser Polarization controller (0,π) PM VATT 20 db splitter 99% VATT Optical fiber 10 ps 10 GHz PPG Power monitor 1% 100 ps Clock source Measurement time window START Time Interval Analyzer STOP DET1 Temperature-controlled PLC Mach-Zehnder interferometer 100 ps 100 ps Logic unit 1.55 μm up-conversion single-photon detectors Insertion loss: 2.5 db Extinction ratio: db DET2

33 Detector timing jitter characteristics Histogram of detected photons for fixed phase modulation pattern 10 ps pulses, counts/s Time (1 ns/div.) FWHM: 30 ps FWTM: 116 ps

34 Experimental results η = 0.27 %, D = 320 counts/s, time window = 10 ps d = Fiber length (km) Bit error rate due to dark counts (%) Bit error rate (%) Sifted key generation rate (kbit/s) Narrow pulse width and narrow FWHM we can use very narrow measurement time window extremely small contribution of dark counts to error rate Also verified by independence of total bit error rate on fiber length Error dominated by timing jitter, which is slightly higher for small fiber losses Threshold error rate for secure communication against general individual attacks is 4.5 % secure keys cannot be generated with ~10 % error rate

35 Conclusion We introduced and proved the security of the DPS-QKD protocol simple system architecture, robust to photon number splitting attacks excellent candidate for long distance fiber-optic quantum cryptography systems We demonstrated a fast and efficient single-photon detector in the 1.5 μm telecommunication band We implemented a practical DPS-QKD system operating at 1 GHz 2 Mbit/s sifted key generation rate over 10 km distribution of secure keys over 100 km of optical fiber high speed and long distance quantum cryptography possible with currently available technology We implemented a DPS-QKD system operating at 10 GHz did not yield secure keys due to high error rate, limited by the detector timing jitter

36 Future directions Proof of unconditional security for DPS-QKD Up-conversion detector improvements can lead to megahertz secure key generation rate and communication distance exceeding 250 km Reduce dark counts Improve timing jitter characteristics of avalanche photodiodes Superconducting single-photon detectors have very small dark counts and Gaussian response Entanglement-based BBM92 can withstand larger channel losses Quantum computation and quantum networking

Quantum key distribution

Quantum key distribution Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles

More information

Differential Phase Shift Quantum Key Distribution and Beyond

Differential Phase Shift Quantum Key Distribution and Beyond Differential Phase Shift Quantum Key Distribution and Beyond Yoshihisa Yamamoto E. L. Ginzton Laboratory, Stanford University National Institute of Informatics (Tokyo, Japan) DPS-QKD system Protocol System

More information

arxiv:quant-ph/ v1 25 Dec 2006

arxiv:quant-ph/ v1 25 Dec 2006 Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol Toyohiro Tsurumaru Mitsubishi Electric Corporation, Information Technology R&D Center 5-1-1

More information

Practical aspects of QKD security

Practical aspects of QKD security Practical aspects of QKD security Alexei Trifonov Audrius Berzanskis MagiQ Technologies, Inc. Secure quantum communication Protected environment Alice apparatus Optical channel (insecure) Protected environment

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

arxiv:quant-ph/ v2 7 Nov 2001

arxiv:quant-ph/ v2 7 Nov 2001 Quantum key distribution using non-classical photon number correlations in macroscopic light pulses A.C. Funk and M.G. Raymer Oregon Center for Optics and Department of Physics, University of Oregon, Eugene,

More information

Practical Quantum Key Distribution

Practical Quantum Key Distribution Leopold-Franzens-Universität Innsbruck Institut für Experimentalphysik Technikerstrasse 25 http://www.uibk.ac.at Practical Quantum Key Distribution Gregor Weihs Contents QKD Protocols Implementations of

More information

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits (*) Yoshihiro NAMBU*, Takaaki HATANAKA, and Kazuo NAKAMURA (*) Corresponding author: E-mail address: y-nambu@ah.jp.nec.com

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTONS FOLLOWING THE PING- PONG CODING PROTOCOL Martin Ostermeyer, Nino Walenta University of Potsdam, Institute of Physics, Nonlinear

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

Cryptography: the science of secret communications

Cryptography: the science of secret communications 1 Quantum key distribution a new tool for the secure communications toolbox Richard Hughes Physics Division Los Alamos National Laboratory 505-667-3876; ; http://quantum.lanl.gov cryptographic key transfer

More information

Experimental realization of quantum cryptography communication in free space

Experimental realization of quantum cryptography communication in free space Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao

More information

National Institute of Standards and Technology Gaithersburg, MD, USA

National Institute of Standards and Technology Gaithersburg, MD, USA National Institute of Standards and Technology Gaithersburg, MD, USA Physics y Laboratoryy & Information Technology Laboratory J. C. Bienfang, A. Restelli, D. Rogers, J. Galang C. W. Clark, Carl J. Williams

More information

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer Centre for Quantum Technologies, Singapore QUANTUM OPTICS Entanglement-based Free Space Quantum Cryptography in Full Daylight, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer

More information

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto Quantum Hacking Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto 1 Outline Introduction Quantum Key Distribution (QKD) Practical QKD Quantum Hacking Fake-state & Time-shifted

More information

Self-Phase Modulation in Optical Fiber Communications: Good or Bad?

Self-Phase Modulation in Optical Fiber Communications: Good or Bad? 1/100 Self-Phase Modulation in Optical Fiber Communications: Good or Bad? Govind P. Agrawal Institute of Optics University of Rochester Rochester, NY 14627 c 2007 G. P. Agrawal Outline Historical Introduction

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,

More information

Schemes to generate entangled photon pairs via spontaneous parametric down conversion

Schemes to generate entangled photon pairs via spontaneous parametric down conversion Schemes to generate entangled photon pairs via spontaneous parametric down conversion Atsushi Yabushita Department of Electrophysics National Chiao-Tung University? Outline Introduction Optical parametric

More information

Single Photon Generation & Application in Quantum Cryptography

Single Photon Generation & Application in Quantum Cryptography Single Photon Generation & Application in Quantum Cryptography Single Photon Sources Photon Cascades Quantum Cryptography Single Photon Sources Methods to Generate Single Photons on Demand Spontaneous

More information

Fiber Gratings p. 1 Basic Concepts p. 1 Bragg Diffraction p. 2 Photosensitivity p. 3 Fabrication Techniques p. 4 Single-Beam Internal Technique p.

Fiber Gratings p. 1 Basic Concepts p. 1 Bragg Diffraction p. 2 Photosensitivity p. 3 Fabrication Techniques p. 4 Single-Beam Internal Technique p. Preface p. xiii Fiber Gratings p. 1 Basic Concepts p. 1 Bragg Diffraction p. 2 Photosensitivity p. 3 Fabrication Techniques p. 4 Single-Beam Internal Technique p. 4 Dual-Beam Holographic Technique p. 5

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Communication. Serge Massar Université Libre de Bruxelles Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi

More information

New Results on Single-Photon Up-Conversion

New Results on Single-Photon Up-Conversion New Results on Single-Photon Up-Conversion Aaron P. VanDevender and Paul G. Kwiat University of Illinois, 1110 W Green St., Urbana, IL, USA ABSTRACT The process of up-conversion is shown to enable superior

More information

C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 111 C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i

More information

Optical solitons and its applications

Optical solitons and its applications Physics 568 (Nonlinear optics) 04/30/007 Final report Optical solitons and its applications 04/30/007 1 1 Introduction to optical soliton. (temporal soliton) The optical pulses which propagate in the lossless

More information

TWO-LAYER QUANTUM KEY DISTRIBUTION

TWO-LAYER QUANTUM KEY DISTRIBUTION TWO-LAYER QUANTUM KEY DISTRIBUTION PAULO VINÍCIUS PEREIRA PINHEIRO and RUBENS VIANA RAMOS paulovpp@gmail.com rubens.viana@pq.cnpq.br Laboratory of Quantum Information Technology, Department of Teleinformatic

More information

Ground-Satellite QKD Through Free Space. Steven Taylor

Ground-Satellite QKD Through Free Space. Steven Taylor Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution

More information

arxiv: v1 [quant-ph] 24 Jun 2014

arxiv: v1 [quant-ph] 24 Jun 2014 1 Entangling Time-Bin Qubits with a Switch Hiroki Takesue NTT Basic Research Laboratories, NTT Corporation, arxiv:1406.6165v1 [quant-ph] 24 Jun 2014 3-1 Morinosato Wakamiya, Atsugi, Kanagawa, 243-0198,

More information

B 2 P 2, which implies that g B should be

B 2 P 2, which implies that g B should be Enhanced Summary of G.P. Agrawal Nonlinear Fiber Optics (3rd ed) Chapter 9 on SBS Stimulated Brillouin scattering is a nonlinear three-wave interaction between a forward-going laser pump beam P, a forward-going

More information

Simulation of BB84 Quantum Key Distribution in depolarizing channel

Simulation of BB84 Quantum Key Distribution in depolarizing channel Simulation of BB84 Quantum Key Distribution in depolarizing channel Hui Qiao, Xiao-yu Chen * College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China xychen@mail.zjgsu.edu.cn

More information

Deterministic secure communications using two-mode squeezed states

Deterministic secure communications using two-mode squeezed states Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May

More information

arxiv:quant-ph/ v1 5 Aug 2004

arxiv:quant-ph/ v1 5 Aug 2004 1 Generation of polarization entangled photon pairs and violation of Bell s inequality using spontaneous four-wave mixing in fiber loop Hiroki Takesue and Kyo Inoue arxiv:quant-ph/0408032v1 5 Aug 2004

More information

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

Functional quantum nodes for entanglement distribution

Functional quantum nodes for entanglement distribution 61 Chapter 4 Functional quantum nodes for entanglement distribution This chapter is largely based on ref. 36. Reference 36 refers to the then current literature in 2007 at the time of publication. 4.1

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

Energy-time entanglement generation in optical fibers under CW pumping

Energy-time entanglement generation in optical fibers under CW pumping Energy-time entanglement generation in optical fibers under CW pumping Shuai Dong, 1 Qiang Zhou, 1 Wei Zhang, 1, Yuhao He, Weijun Zhang, Lixing You, Yidong Huang, 1 and Jiangde Peng 1 1 Tsinghua National

More information

SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES

SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES Quantum Information and Computation, Vol. 7, No. 5&6 (2007) 431 458 c Rinton Press SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES HOI-KWONG LO Center for Quantum

More information

Communications Quantiques

Communications Quantiques Communications Quantiques Hugo Zbinden Groupe de Physique Appliquée Quantum Technologies Université de Genève Cryptographie Quantique Génération de nombres aléatoires Stéganographie basée sur du bruit

More information

Quantum Networks with Atomic Ensembles

Quantum Networks with Atomic Ensembles Quantum Networks with Atomic Ensembles Daniel Felinto* dfelinto@df.ufpe.br C.W. Chou, H. Deng, K.S. Choi, H. de Riedmatten, J. Laurat, S. van Enk, H.J. Kimble Caltech Quantum Optics *Presently at Departamento

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

A Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol

A Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol Appl Math Inf Sci 8, No 6, 769-773 (4) 769 Applied Mathematics & Information Sciences An International Journal http://dxdoiorg/785/amis/86 A Necessary Condition for the Security of Coherent- One-Way Quantum

More information

Full polarization control for fiber optical quantum communication systems using polarization encoding

Full polarization control for fiber optical quantum communication systems using polarization encoding Full polarization control for fiber optical quantum communication systems using polarization encoding G. B. Xavier, G. Vilela de Faria, G. P. Temporão and J. P. von der Weid* Pontifical Catholic University

More information

New schemes for manipulating quantum states using a Kerr cell. Istituto Elettrotecnico Nazionale Galileo Ferraris, Str. delle Cacce 91, I Torino

New schemes for manipulating quantum states using a Kerr cell. Istituto Elettrotecnico Nazionale Galileo Ferraris, Str. delle Cacce 91, I Torino New schemes for manipulating quantum states using a Kerr cell Marco Genovese and C.Novero Istituto Elettrotecnico Nazionale Galileo Ferraris, Str. delle Cacce 91, I-10135 Torino Recently, Quantum Non Demolition

More information

Multi User Frequency Time Coded Quantum Key Distribution Network Using a Plug-and-Play System

Multi User Frequency Time Coded Quantum Key Distribution Network Using a Plug-and-Play System ONDM 208 53 Multi User Frequency Time Coded Quantum Key Distribution Network Using a Plug-and-Play System Y.T. Aladadi, A.F. Abas, Abdulmalik Alwarafy, M.T. Alresheedi Department of Electrical Engineering,

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Supplementary Figure 1 Comparison of single quantum emitters on two type of substrates:

Supplementary Figure 1 Comparison of single quantum emitters on two type of substrates: Supplementary Figure 1 Comparison of single quantum emitters on two type of substrates: a, Photoluminescence (PL) spectrum of localized excitons in a WSe 2 monolayer, exfoliated onto a SiO 2 /Si substrate

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Nonlinear Effects in Optical Fiber. Dr. Mohammad Faisal Assistant Professor Dept. of EEE, BUET

Nonlinear Effects in Optical Fiber. Dr. Mohammad Faisal Assistant Professor Dept. of EEE, BUET Nonlinear Effects in Optical Fiber Dr. Mohammad Faisal Assistant Professor Dept. of EEE, BUET Fiber Nonlinearities The response of any dielectric material to the light becomes nonlinear for intense electromagnetic

More information

A central problem in cryptography: the key distribution problem.

A central problem in cryptography: the key distribution problem. Scientific American 314, 48-55 (2016) A central problem in cryptography: the key distribution problem. Mathematics solution: public key cryptography. Public-key cryptography relies on the computational

More information

Toward Polarization Encoding Measurement- Device-Independent Quantum Key Distribution in Free-Space

Toward Polarization Encoding Measurement- Device-Independent Quantum Key Distribution in Free-Space University of Tennessee, Knoxville Trace: Tennessee Research and Creative Exchange Masters Theses Graduate School 5-2018 Toward Polarization Encoding Measurement- Device-Independent Quantum Key Distribution

More information

Quantum information processing using linear optics

Quantum information processing using linear optics Quantum information processing using linear optics Karel Lemr Joint Laboratory of Optics of Palacký University and Institute of Physics of Academy of Sciences of the Czech Republic web: http://jointlab.upol.cz/lemr

More information

QuReP. Quantum Repeaters for Long Distance Fibre-Based Quantum Communication. Rob Thew. Coordinator: Nicolas Gisin

QuReP. Quantum Repeaters for Long Distance Fibre-Based Quantum Communication. Rob Thew. Coordinator: Nicolas Gisin QuReP Quantum Repeaters for Long Distance Fibre-Based Quantum Communication Rob Thew Coordinator: Nicolas Gisin 1. Direct transmission Photon source Alice 2. Entanglement distribution: α Goal is to distribute

More information

arxiv:quant-ph/ v1 21 Apr 2004

arxiv:quant-ph/ v1 21 Apr 2004 Distribution of time-bin entangled qubits over 5 km of optical fiber I. Marcikic, H. de Riedmatten, W. Tittel, H. Zbinden, M. Legré and N. Gisin Group of Applied Physics-Optique, University of Geneva,

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Continuous-variable quantum key distribution with a locally generated local oscillator

Continuous-variable quantum key distribution with a locally generated local oscillator Continuous-variable quantum key distribution with a locally generated local oscillator Bing Qi, Pavel Lougovski, Raphael Pooser, Warren Grice, Miljko Bobrek, Charles Ci Wen Lim, and Philip G. Evans Quantum

More information

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Vadim Makarov www.vad1.com/lab Security model of QKD Security proof.laws of physics & Model of equipment Hack Integrate

More information

Implementation of ALOHA up-conversion interferometer at 3.39µm (L band) 1/20

Implementation of ALOHA up-conversion interferometer at 3.39µm (L band) 1/20 Implementation of ALOHA up-conversion interferometer at 3.39µm (L band) Ludovic SZEMENDERA - Xlim Photonics PhD supervisors : F. REYNAUD and L. GROSSARD Monday 14 th march 016 Implementation of ALOHA up-conversion

More information

Title Experimental long-distance quantum secure direct communication

Title Experimental long-distance quantum secure direct communication Title Experimental long-distance quantum secure direct communication The authors Feng Zhu, Tsinghua National Laboratory for Information Science and Technology, Department of Electronic Engineering, Tsinghua

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

Toward the Generation of Bell Certified Randomness Using Photons

Toward the Generation of Bell Certified Randomness Using Photons Toward the Generation of Bell Certified Randomness Using Photons Alessandro Cerè, Siddarth Koduru Josh, Chen Ming Chia, Jean-Daniel Bancal, Lana Sheridan, Valerio Scarani, Christian Kurtsiefer Quantum

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

Quantum cryptography and quantum hacking. Dr. Lars Lydersen

Quantum cryptography and quantum hacking. Dr. Lars Lydersen Quantum cryptography and quantum hacking Dr. Lars Lydersen GOVCERT.NL, Rotterdam 5. November 2 Quantum Hacking group NTNU, Trondheim & UNIK, Kjeller www.iet.ntnu.no/groups/optics/qcr/ Prof. Johannes Skaar

More information

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/0601168 v2 12 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION DOI: 1.138/NPHOTON.13.355 A quantum memory for orbital angular momentum photonic qubits - Supplementary Information - A. Nicolas, L. Veissier, L. Giner, E. Giacobino, D. Maxein, J. Laurat Laboratoire Kastler

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider

More information

Single photons. how to create them, how to see them. Alessandro Cerè

Single photons. how to create them, how to see them. Alessandro Cerè Single photons how to create them, how to see them Alessandro Cerè Intro light is quantum light is cheap let s use the quantum properties of light Little interaction with the environment We can send them

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION SUPPLEMENTARY INFORMATION doi:1.138/nature1366 I. SUPPLEMENTARY DISCUSSION A. Success criterion We shall derive a success criterion for quantum teleportation applicable to the imperfect, heralded dual-rail

More information

Confocal Microscopy Imaging of Single Emitter Fluorescence and Hanbury Brown and Twiss Photon Antibunching Setup

Confocal Microscopy Imaging of Single Emitter Fluorescence and Hanbury Brown and Twiss Photon Antibunching Setup 1 Confocal Microscopy Imaging of Single Emitter Fluorescence and Hanbury Brown and Twiss Photon Antibunching Setup Abstract Jacob Begis The purpose of this lab was to prove that a source of light can be

More information

Multi-user quantum key distribution with a semi-conductor source of entangled photon pairs

Multi-user quantum key distribution with a semi-conductor source of entangled photon pairs Multi-user quantum key distribution with a semi-conductor source of entangled photon pairs C. Autebert1, J. Trapateau2, A. Orieux2, A. Lemaître3, C. Gomez-Carbonell3, E. Diamanti2, I. Zaquine2, and S.

More information

Privacy Amplification of QKD Protocol in a Quantum Router

Privacy Amplification of QKD Protocol in a Quantum Router Available online at www.sciencedirect.com Procedia Engineering 3 (01) 536 543 I-SEEC011 Privacy Amplification of QKD Protocol in a Quantum Router S. Chaiyasoonthorn a, P. Youplao b, S. Mitatha b, P.P.

More information

Design of Quantum Repeaters

Design of Quantum Repeaters Design of Quantum Repeaters by Yi Li A thesis submitted for the degree of Doctor of Philosophy of The Australian National University July 2017 c Copyright by Yi Li 2017 All Rights Reserved Page ii Statement

More information

Hong-Ou-Mandel dip using photon pairs from a PPLN waveguide

Hong-Ou-Mandel dip using photon pairs from a PPLN waveguide Hong-Ou-Mandel dip using photon pairs from a PPLN waveguide Qiang Zhang 1, Hiroki Takesue, Carsten Langrock 1, Xiuping Xie 1, M. M. Fejer 1, Yoshihisa Yamamoto 1,3 1. Edward L. Ginzton Laboratory, Stanford

More information

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD International Journal of Scientific and Research Publications, Volume 5, Issue 1, January 2015 1 Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD Mohamed Youssef Khalaf Elwadeya

More information

Quantum and Nano Optics Laboratory. Jacob Begis Lab partners: Josh Rose, Edward Pei

Quantum and Nano Optics Laboratory. Jacob Begis Lab partners: Josh Rose, Edward Pei Quantum and Nano Optics Laboratory Jacob Begis Lab partners: Josh Rose, Edward Pei Experiments to be Discussed Lab 1: Entanglement and Bell s Inequalities Lab 2: Single Photon Interference Labs 3 and 4:

More information

Laboratory 3&4: Confocal Microscopy Imaging of Single-Emitter Fluorescence and Hanbury Brown and Twiss setup for Photon Antibunching

Laboratory 3&4: Confocal Microscopy Imaging of Single-Emitter Fluorescence and Hanbury Brown and Twiss setup for Photon Antibunching Laboratory 3&4: Confocal Microscopy Imaging of Single-Emitter Fluorescence and Hanbury Brown and Twiss setup for Photon Antibunching Jose Alejandro Graniel Institute of Optics University of Rochester,

More information

Security of high speed quantum key distribution with finite detector dead time

Security of high speed quantum key distribution with finite detector dead time Security of high speed quantum key distribution with finite detector dead time Viacheslav Burenkov,5, Bing Qi 2,3, Ben Fortescue 4 and Hoi-Kwong Lo,2,3 Department of Physics, University of Toronto, Toronto,

More information

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security Mehrdad Sepehri Sharbaf Senior IEEE Member California State University Dominguez Hills Computer Science

More information

arxiv:quant-ph/ v1 22 Mar 2002

arxiv:quant-ph/ v1 22 Mar 2002 Quantum Key Distribution over 67 km with a plug&play system arxiv:quant-ph/0203118v1 22 Mar 2002 I D. Stucki, N. Gisin, O. Guinnard*, G. Ribordy*, H. Zbinden GAP-Optique, University of Geneva, rue de l

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION Spectral compression of single photons: Supplementary Material J. Lavoie 1, J. M. Donohue 1, L. G. Wright 1, A. Fedrizzi & K. J. Resch 1 1 Institute for Quantum Computing and Department of Physics & Astronomy,

More information

arxiv: v1 [quant-ph] 6 Oct 2008

arxiv: v1 [quant-ph] 6 Oct 2008 Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate A. R. Dixon, 1,2 Z. L. Yuan, 1, J. F. Dynes, 1 A. W. Sharpe, 1 and A. J. Shields 1 1 Toshiba Research Europe Ltd, Cambridge Research

More information

Single Microwave-Photon Detector based on Superconducting Quantum Circuits

Single Microwave-Photon Detector based on Superconducting Quantum Circuits 17 th International Workshop on Low Temperature Detectors 19/July/2017 Single Microwave-Photon Detector based on Superconducting Quantum Circuits Kunihiro Inomata Advanced Industrial Science and Technology

More information

Nonlinear Fiber Optics and its Applications in Optical Signal Processing

Nonlinear Fiber Optics and its Applications in Optical Signal Processing 1/44 Nonlinear Fiber Optics and its Applications in Optical Signal Processing Govind P. Agrawal Institute of Optics University of Rochester Rochester, NY 14627 c 2007 G. P. Agrawal Outline Introduction

More information

Quantum key distribution with 2-bit quantum codes

Quantum key distribution with 2-bit quantum codes Quantum key distribution with -bit quantum codes Xiang-Bin Wang Imai Quantum Computation and Information project, ERATO, Japan Sci. and Tech. Corp. Daini Hongo White Bldg. 0, 5-8-3, Hongo, Bunkyo, Tokyo

More information