PROGRESS IN OPTICS VOLUME 4 9. E. Wolf

Size: px
Start display at page:

Download "PROGRESS IN OPTICS VOLUME 4 9. E. Wolf"

Transcription

1 PROGRESS IN OPTICS VOLUME 4 9 E. Wolf

2

3 Preface v Chapter 1. Gaussian apodization and beam propagation, Virendra N. Mahajan (El Segundo, CA and Tucson, AZ, USA) 1 1. Introduction 3 2. Theory Pupil function Point-spread function Optical transfer function 5 3. Aberration-free Gaussian pupil Pupil function Point-spread function Optical transfer function Defocused Gaussian pupil Pupil function Point-spread function Axial irradiance Optical transfer function Strehl ratio, aberration tolerance, and Zernike-Gauss polynomials Strehl ratio Depth of focus Balanced aberrations Zernike-Gauss polynomials Strehl ratio for primary aberrations Balancing of defocus aberration with spherical aberration or astigmatism Focused beam Collimated beam Aberrated Gaussian pupil Spherical aberration Symmetry properties Line of sight Weakly-truncated Gaussian pupils and beams Pupil function Point-spread function Radius of curvature of the propagating wavefront Collimated beam Beam focusing and waist imaging by a lens Optical transfer function Strehl ratio, aberration balancing, and orthogonal polynomials 85

4 8.8. Beam characterization and measurement Nonparaxial Gaussian beams Conclusions 9 1 Acknowledgements 9 2 Appendix 9 2 References 9 3 Chapter 2. Controlling nonlinear optical processes in multi-leve l atomic systems, Amitabh Joshi and Min Xiao (Fayetteville, AR, USA) Introduction Modified linear and nonlinear optical properties in multi-level atomic systems Absorption reduction and dispersion enhancement Enhanced nonlinearity in EIT systems Enhanced four-wave mixing processes with induced atomic coherence Three-level atomic systems Four-level atomic systems Controlled optical bistability and optical multistability with three-level atoms inside a n optical cavity Theoretical calculation Controllable optical bistability Controllable optical multistability Controllable direction of hysteresis cycle in optical bistability/optical multistability Dynamic hysteresis in optical bistability Controlled optical switching in three-level atomic systems Controlled switching between bistable states All-optical switching controlled by coupling laser beam Controlled optical switching in four-level N-type atomic system Controlled optical instability with three-level atoms inside an optical cavity Theoretical calculation Experimental measurements Summary and outlook 170 Acknowledgement 172 References 172 Chapter 3. Photonic crystals, Henri Benisly (Orsay, France) and Claud e Weisbuch (Palaiseau, France and Santa Barbara, CA, USA) 177 Nomenclature 179 Main variables and notations Introduction Basics of periodic dielectric media and theoretical tools D Bragg structure Density of states, local DOS Generalizing to 2D and 3D periodic crystals Basics of band calculation The discovery of PBG Bloch waves Theoretical tools : a brief overview 209

5 3. Three-dimensional photonic crystals Introduction Fabrication of 3D photonic crystals Measurements Metallodielectric systems and microwave regime Two-dimensional photonic crystals Theoretical aspects D photonic crystal with vertical guidance D realizations Applications and characterization methods Photonic crystal fibers 27 1 Issues of fibre world 27 1 The playing field of photonic crystal fibers 27 1 Single-mode fiber 27 5 True PC guidance 276 High -Delta fiber 278 Special dispersion 27 8 Special applications: nonlinear optics, supercontinuum generation, etc 28 0 Brief overview of PCF modeling tools Conclusion and perspectives 28 3 Acknowledgements 28 8 References and special issues 28 8 Special issues of regular joumals on photonic crystals, in chronological order 28 8 References 28 9 Chapter 4. Symmetry properties and polarization descriptors for an arbitrary electromagnetic wavefield, Christian Brosseau (Brest, France ) and Aristide Dogariu (Orlando, FL, USA) Introduction A brief survey of the interplay between polarization concepts and geometry From Bartholinus (1669) to Stokes (1852) : polarization is a geometric property of light From Stokes (1852) to Poincar6 (1892) : polarization is an electromagnetic propert y of light From Poincare (1892) to Wolf (1954): polarization is a statistical property of light And now: geometric algebra is back Density matrix and the convexity property of the states of polarization Polarization and the density matrix Scalar invariants The convex set of polarization states Summary of geometric algebra Polarization of a plane wave Density matrix and degree of polarization Some important consequences and concrete applications Polarization of an arbitrary wave Density matrix and polarization descriptors Some applications Postscript 363

6 7. Summary and prospects 36 4 Acknowledgements 36 7 Appendix A : Lie groups in polarization optics 36 8 Al.SU(2) A.2. SU(3) 37 0 Appendix B : Madison convention for the density matrix of massive spin-1 particles 37 1 Appendix C : Degree of polarization of a field consisting of a superposition of an ensembl e of evanescent waves of random amplitude and of black-body radiation 374 References 376 Chapter 5. Quantum cryptography, Miloslav Dusek (Olomouc, Czech Republic), Norbert Lütkenhaus (Erlangen, Germany) and Martin Hendryc h (Castelldefels, Barcelona, Spain) Ciphering Introduction, cryptographic tasks Asymmetrical ciphers (public-key cryptography) Symmetrical ciphers (secret-key cryptography) Vemam cipher, key distribution problem Quantum key distribution The principle, eavesdropping can be detected Quantum measurement Quantum states cannot be cloned Protocol BB Eavesdropping, intercept-resend attack Some other discrete protocols for QKD Two-state protocol, B B92 protocol with a strong reference pulse Six-state protocol SARG protocol Decoy-state protocols Entanglement-based protocols Experiments QKD with weak laser pulses Entanglement-based protocols Technology Light sources Detectors Quantum channels Limitations Transmission rate Limit on the distance Quantum repeaters Supporting procedures Estimation of leaked information Error correction for classical bit strings Privacy amplification for classical bit strings Advantage distillation for classical bit strings Authentication of public discussion 428

7 8. Security Attacks on ideal protocols Secure key rates from classical three-party correlations Bounds on quantum key distribution Security proofs Specific attacks Results Side channels and other imperfections Prospects 446 Acknowledgements 446 References 446 Chapter 6. Optical quantum cloning, Nicolas J. Cerf (Bruxelles, Belgium) and Jaromfr Fiuräsek (Olomouc, Czech Republic) Introduction and history The no-cloning theorem Beyond the no-cloning theorem Quantum cloning without signaling Content of this review Overview of quantum cloning machines Universal cloning machines Pauli and Heisenberg cloning machines Phase- and Fourier-covariant cloning machines Group-covariant cloning machines High-d state-dependent cloning machines Cloning a pair of orthogonal qubits Entanglement cloning machines Real cloning machines Highly-asymmetric cloning machines Continuous-variable cloning machines Probabilistic cloning machines Economical cloning machines One-to-two quantum cloning as a CP map Isomorphism between CP maps and operators Covariance condition Cloning as a semidefinite programming problem Double-Bell ansatz Heisenberg cloning machines Three special cases of Heisenberg cloners N-to-M universal quantum cloning Optimal cloning transformation Optimality proof for 1 -a M cloning of qubits Universal asymmetric quantum cloning Universal-NOT gate Universal cloning of photons Amplification of light Symmetrization Universal asymmetric cloning of photons Cloning of orthogonally polarized photons 522

8 6. Phase-covariant cloning of photons Phase-covariant cloning of qubits Phase-covariant cloning of qudits Optical phase-covariant cloning Experimental phase-covariant cloning Cloning of optical continuous variables Cloning of coherent states Cloning by phase-insensitive amplification Experimental cloning of coherent states Gaussian distribution with finite width Cloning of conjugate coherent states Conclusions 54 1 Acknowledgements 54 2 References 54 2 Author index for Volume Subject index for Volume Contents of previous volumes 57 5 Cumulative index - Volumes

PRINCIPLES OF PHYSICAL OPTICS

PRINCIPLES OF PHYSICAL OPTICS PRINCIPLES OF PHYSICAL OPTICS C. A. Bennett University of North Carolina At Asheville WILEY- INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS Preface 1 The Physics of Waves 1 1.1 Introduction

More information

FUNDAMENTALS OF POLARIZED LIGHT

FUNDAMENTALS OF POLARIZED LIGHT FUNDAMENTALS OF POLARIZED LIGHT A STATISTICAL OPTICS APPROACH Christian Brosseau University of Brest, France A WILEY-INTERSCIENCE PUBLICATION JOHN WILEY & SONS, INC. New York - Chichester. Weinheim. Brisbane

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

Linear-optical quantum information processing: A few experiments

Linear-optical quantum information processing: A few experiments Linear-optical quantum information processing: A few experiments Miloslav Dušek Lucie Čelechovská, Karel Lemr, Michal Mičuda, Antonín Černoch, Jaromír Fiurášek, Miroslav Ježek, ek, Jan Soubusta, Radim

More information

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi

More information

Lasers and Electro-optics

Lasers and Electro-optics Lasers and Electro-optics Second Edition CHRISTOPHER C. DAVIS University of Maryland III ^0 CAMBRIDGE UNIVERSITY PRESS Preface to the Second Edition page xv 1 Electromagnetic waves, light, and lasers 1

More information

Fiber Gratings p. 1 Basic Concepts p. 1 Bragg Diffraction p. 2 Photosensitivity p. 3 Fabrication Techniques p. 4 Single-Beam Internal Technique p.

Fiber Gratings p. 1 Basic Concepts p. 1 Bragg Diffraction p. 2 Photosensitivity p. 3 Fabrication Techniques p. 4 Single-Beam Internal Technique p. Preface p. xiii Fiber Gratings p. 1 Basic Concepts p. 1 Bragg Diffraction p. 2 Photosensitivity p. 3 Fabrication Techniques p. 4 Single-Beam Internal Technique p. 4 Dual-Beam Holographic Technique p. 5

More information

LIST OF TOPICS BASIC LASER PHYSICS. Preface xiii Units and Notation xv List of Symbols xvii

LIST OF TOPICS BASIC LASER PHYSICS. Preface xiii Units and Notation xv List of Symbols xvii ate LIST OF TOPICS Preface xiii Units and Notation xv List of Symbols xvii BASIC LASER PHYSICS Chapter 1 An Introduction to Lasers 1.1 What Is a Laser? 2 1.2 Atomic Energy Levels and Spontaneous Emission

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

A Guide to Experiments in Quantum Optics

A Guide to Experiments in Quantum Optics Hans-A. Bachor and Timothy C. Ralph A Guide to Experiments in Quantum Optics Second, Revised and Enlarged Edition WILEY- VCH WILEY-VCH Verlag CmbH Co. KGaA Contents Preface 1 Introduction 1.1 Historical

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

High rate quantum cryptography with untrusted relay: Theory and experiment

High rate quantum cryptography with untrusted relay: Theory and experiment High rate quantum cryptography with untrusted relay: Theory and experiment CARLO OTTAVIANI Department of Computer Science, The University of York (UK) 1st TWQI Conference Ann Arbor 27-3 July 2015 1 In

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Quantum information processing using linear optics

Quantum information processing using linear optics Quantum information processing using linear optics Karel Lemr Joint Laboratory of Optics of Palacký University and Institute of Physics of Academy of Sciences of the Czech Republic web: http://jointlab.upol.cz/lemr

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Optics, Optoelectronics and Photonics

Optics, Optoelectronics and Photonics Optics, Optoelectronics and Photonics Engineering Principles and Applications Alan Billings Emeritus Professor, University of Western Australia New York London Toronto Sydney Tokyo Singapore v Contents

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,

More information

Optics.

Optics. Optics www.optics.rochester.edu/classes/opt100/opt100page.html Course outline Light is a Ray (Geometrical Optics) 1. Nature of light 2. Production and measurement of light 3. Geometrical optics 4. Matrix

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key

More information

Physics of Light and Optics

Physics of Light and Optics Physics of Light and Optics Justin Peatross and Harold Stokes Brigham Young University Department of Physics and Astronomy All Publication Rights Reserved (2001) Revised April 2002 This project is supported

More information

Optical Quantum Communication with Quantitative Advantage. Quantum Communication

Optical Quantum Communication with Quantitative Advantage. Quantum Communication Optical Quantum Communication with Quantitative Advantage Juan Miguel Arrazola Benjamin Lovitz Ashutosh Marwah Dave Touchette Norbert Lütkenhaus Institute for Quantum Computing & Department of Physics

More information

A Matlab Realization of Shor s Quantum Factoring Algorithm

A Matlab Realization of Shor s Quantum Factoring Algorithm 1 A Matlab Realization of Shor s Quantum Factoring Algorithm S. Jha, P. Chatterjee, A.Falor and M. Chakraborty, Member IEEE Department of Information Technology Institute of Engineering & Management Kolkata,

More information

Integrated optical circuits for classical and quantum light. Part 2: Integrated quantum optics. Alexander Szameit

Integrated optical circuits for classical and quantum light. Part 2: Integrated quantum optics. Alexander Szameit Integrated optical circuits for classical and quantum light Part 2: Integrated quantum optics Alexander Szameit Alexander Szameit alexander.szameit@uni-jena.de +49(0)3641 947985 +49(0)3641 947991 Outline

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

Security and implementation of differential phase shift quantum key distribution systems

Security and implementation of differential phase shift quantum key distribution systems Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006 Classical cryptography cryptography = κρυπτός +

More information

Optics, Light and Lasers

Optics, Light and Lasers Dieter Meschede Optics, Light and Lasers The Practical Approach to Modern Aspects of Photonics and Laser Physics Second, Revised and Enlarged Edition BICENTENNIAL.... n 4 '':- t' 1 8 0 7 $W1LEY 2007 tri

More information

Quantum key distribution

Quantum key distribution Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Quantum Key Distribution. The Starting Point

Quantum Key Distribution. The Starting Point Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated

More information

DIFFRACTION PHYSICS THIRD REVISED EDITION JOHN M. COWLEY. Regents' Professor enzeritus Arizona State University

DIFFRACTION PHYSICS THIRD REVISED EDITION JOHN M. COWLEY. Regents' Professor enzeritus Arizona State University DIFFRACTION PHYSICS THIRD REVISED EDITION JOHN M. COWLEY Regents' Professor enzeritus Arizona State University 1995 ELSEVIER Amsterdam Lausanne New York Oxford Shannon Tokyo CONTENTS Preface to the first

More information

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

Laser Optics-II. ME 677: Laser Material Processing Instructor: Ramesh Singh 1

Laser Optics-II. ME 677: Laser Material Processing Instructor: Ramesh Singh 1 Laser Optics-II 1 Outline Absorption Modes Irradiance Reflectivity/Absorption Absorption coefficient will vary with the same effects as the reflectivity For opaque materials: reflectivity = 1 - absorptivity

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

QuReP. Quantum Repeaters for Long Distance Fibre-Based Quantum Communication. Rob Thew. Coordinator: Nicolas Gisin

QuReP. Quantum Repeaters for Long Distance Fibre-Based Quantum Communication. Rob Thew. Coordinator: Nicolas Gisin QuReP Quantum Repeaters for Long Distance Fibre-Based Quantum Communication Rob Thew Coordinator: Nicolas Gisin 1. Direct transmission Photon source Alice 2. Entanglement distribution: α Goal is to distribute

More information

Mobile Free Space Quantum Key Distribution for short distance secure communication

Mobile Free Space Quantum Key Distribution for short distance secure communication DEPARTMENT OF PHYSICS LUDWIG-MAXIMILIAN-UNIVERSITY OF MUNICH Master s Thesis Mobile Free Space Quantum Key Distribution for short distance secure communication Tobias Vogl January 21, 216 Supervised by

More information

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016

More information

Computer Modelling and Numerical Simulation of the Solid State Diode Pumped Nd 3+ :YAG Laser with Intracavity Saturable Absorber

Computer Modelling and Numerical Simulation of the Solid State Diode Pumped Nd 3+ :YAG Laser with Intracavity Saturable Absorber Copyright 2009 by YASHKIR CONSULTING LTD Computer Modelling and Numerical Simulation of the Solid State Diode Pumped Nd 3+ :YAG Laser with Intracavity Saturable Absorber Yuri Yashkir 1 Introduction The

More information

Practical aspects of QKD security

Practical aspects of QKD security Practical aspects of QKD security Alexei Trifonov Audrius Berzanskis MagiQ Technologies, Inc. Secure quantum communication Protected environment Alice apparatus Optical channel (insecure) Protected environment

More information

arxiv:quant-ph/ v2 17 Sep 2002

arxiv:quant-ph/ v2 17 Sep 2002 Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

Wavefront aberration analysis with a multi-order diffractive optical element

Wavefront aberration analysis with a multi-order diffractive optical element Wavefront aberration analysis with a multi-order diffractive optical element P.A. Khorin 1, S.A. Degtyarev 1,2 1 Samara National Research University, 34 Moskovskoe Shosse, 443086, Samara, Russia 2 Image

More information

Optical quantum cloning

Optical quantum cloning E. Wolf, Progress in Optics 49 2006 Elsevier B.V. All rights reserved Chapter 6 Optical quantum cloning by Nicolas J. Cerf Centre for Quantum Information and Communication, Ecole Polytechnique, Université

More information

A tutorial on meta-materials and THz technology

A tutorial on meta-materials and THz technology p.1/49 A tutorial on meta-materials and THz technology Thomas Feurer thomas.feurer@iap.unibe.ch Institute of Applied Physics Sidlerstr. 5, 3012 Bern Switzerland p.2/49 Outline Meta-materials Super-lenses

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++

Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++ Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++ Ryan D. L. Engle, Douglas D. Hodson, Michael R. Grimaila, Logan O. Mailloux, Colin V. McLaughlin and Gerald Baumgartner Air

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Journal of Computer Science 3 (6): 44-49, 7 ISSN 549-3636 7 Science Publications Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Iyed Ben Slimen, Olfa Trabelsi, Houria

More information

Quantum Correlations as Necessary Precondition for Secure Communication

Quantum Correlations as Necessary Precondition for Secure Communication Quantum Correlations as Necessary Precondition for Secure Communication Phys. Rev. Lett. 92, 217903 (2004) quant-ph/0307151 Marcos Curty 1, Maciej Lewenstein 2, Norbert Lütkenhaus 1 1 Institut für Theoretische

More information

Photonic/Plasmonic Structures from Metallic Nanoparticles in a Glass Matrix

Photonic/Plasmonic Structures from Metallic Nanoparticles in a Glass Matrix Excerpt from the Proceedings of the COMSOL Conference 2008 Hannover Photonic/Plasmonic Structures from Metallic Nanoparticles in a Glass Matrix O.Kiriyenko,1, W.Hergert 1, S.Wackerow 1, M.Beleites 1 and

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER

More information

Design and Correction of optical Systems

Design and Correction of optical Systems Design and Correction of optical Systems Part 10: Performance criteria 1 Summer term 01 Herbert Gross Overview 1. Basics 01-04-18. Materials 01-04-5 3. Components 01-05-0 4. Paraxial optics 01-05-09 5.

More information

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD International Journal of Scientific and Research Publications, Volume 5, Issue 1, January 2015 1 Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD Mohamed Youssef Khalaf Elwadeya

More information

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used

More information

Entanglement creation and characterization in a trapped-ion quantum simulator

Entanglement creation and characterization in a trapped-ion quantum simulator Time Entanglement creation and characterization in a trapped-ion quantum simulator Christian Roos Institute for Quantum Optics and Quantum Information Innsbruck, Austria Outline: Highly entangled state

More information

Modeling microlenses by use of vectorial field rays and diffraction integrals

Modeling microlenses by use of vectorial field rays and diffraction integrals Modeling microlenses by use of vectorial field rays and diffraction integrals Miguel A. Alvarez-Cabanillas, Fang Xu, and Yeshaiahu Fainman A nonparaxial vector-field method is used to describe the behavior

More information

Nondifractive propagation of light in photonic crystals

Nondifractive propagation of light in photonic crystals Nondifractive propagation of light in photonic crystals Kestutis Staliunas (1) and Ramon Herrero () (1) ICREA, Departament de Fisica i Enginyeria Nuclear, Universitat Politecnica de Catalunya, Colom 11,

More information

arxiv:quant-ph/ v1 25 Dec 2006

arxiv:quant-ph/ v1 25 Dec 2006 Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol Toyohiro Tsurumaru Mitsubishi Electric Corporation, Information Technology R&D Center 5-1-1

More information

Elements of Quantum Optics

Elements of Quantum Optics Pierre Meystre Murray Sargent III Elements of Quantum Optics Fourth Edition With 124 Figures fya Springer Contents 1 Classical Electromagnetic Fields 1 1.1 Maxwell's Equations in a Vacuum 2 1.2 Maxwell's

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 111 C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off. The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

Quantum cryptography and quantum hacking. Dr. Lars Lydersen

Quantum cryptography and quantum hacking. Dr. Lars Lydersen Quantum cryptography and quantum hacking Dr. Lars Lydersen GOVCERT.NL, Rotterdam 5. November 2 Quantum Hacking group NTNU, Trondheim & UNIK, Kjeller www.iet.ntnu.no/groups/optics/qcr/ Prof. Johannes Skaar

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Practical Quantum Key Distribution

Practical Quantum Key Distribution Leopold-Franzens-Universität Innsbruck Institut für Experimentalphysik Technikerstrasse 25 http://www.uibk.ac.at Practical Quantum Key Distribution Gregor Weihs Contents QKD Protocols Implementations of

More information

Quantum Cryptography: A Short Historical overview and Recent Developments

Quantum Cryptography: A Short Historical overview and Recent Developments Quantum Cryptography: A Short Historical overview and Recent Developments Ioannis P. Antoniades Informatics Department, Aristotle University of Thessaloniki, Thessaloniki 541 24, Greece Vasilios G. Chouvardas

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.

More information

Zernike Polynomials and Beyond

Zernike Polynomials and Beyond Zernike Polynomials and Beyond "Introduction to Aberrations" ExP x W S O OA R P(x g, ) P z y zg Virendra N. Mahajan The Aerospace Corporation Adjunct Professor El Segundo, California 945 College of Optical

More information

3.1 The Plane Mirror Resonator 3.2 The Spherical Mirror Resonator 3.3 Gaussian modes and resonance frequencies 3.4 The Unstable Resonator

3.1 The Plane Mirror Resonator 3.2 The Spherical Mirror Resonator 3.3 Gaussian modes and resonance frequencies 3.4 The Unstable Resonator Quantum Electronics Laser Physics Chapter 3 The Optical Resonator 3.1 The Plane Mirror Resonator 3. The Spherical Mirror Resonator 3.3 Gaussian modes and resonance frequencies 3.4 The Unstable Resonator

More information

Device-Independent Quantum Information Processing (DIQIP)

Device-Independent Quantum Information Processing (DIQIP) Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Fundamental Security Issues in Continuous Variable Quantum Key Distribution

Fundamental Security Issues in Continuous Variable Quantum Key Distribution Fundamental Security Issues in Continuous Variable Quantum Key Distribution arxiv:1208.5827v1 [quant-ph] 29 Aug 2012 Horace P. Yuen Department of Electrical Engineering and Computer Science Department

More information

Trapping and Interfacing Cold Neutral Atoms Using Optical Nanofibers

Trapping and Interfacing Cold Neutral Atoms Using Optical Nanofibers Trapping and Interfacing Cold Neutral Atoms Using Optical Nanofibers Colloquium of the Research Training Group 1729, Leibniz University Hannover, Germany, November 8, 2012 Arno Rauschenbeutel Vienna Center

More information

arxiv:quant-ph/ v6 6 Mar 2007

arxiv:quant-ph/ v6 6 Mar 2007 Phase-Remapping Attack in Practical Quantum Key Distribution Systems Chi-Hang Fred Fung, 1, Bing Qi, 1, Kiyoshi Tamaki, 2, and Hoi-Kwong Lo 1, 1 Center for Quantum Information and Quantum Control, Department

More information

Quantum non-demolition measurements:

Quantum non-demolition measurements: Quantum non-demolition measurements: One path to truly scalable quantum computation Kae Nemoto Tim Spiller Sean Barrett Ray Beausoleil Pieter Kok Bill Munro HP Labs (Bristol) Why should optical quantum

More information

Solitons. Nonlinear pulses and beams

Solitons. Nonlinear pulses and beams Solitons Nonlinear pulses and beams Nail N. Akhmediev and Adrian Ankiewicz Optical Sciences Centre The Australian National University Canberra Australia m CHAPMAN & HALL London Weinheim New York Tokyo

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

A semi-device-independent framework based on natural physical assumptions

A semi-device-independent framework based on natural physical assumptions AQIS 2017 4-8 September 2017 A semi-device-independent framework based on natural physical assumptions and its application to random number generation T. Van Himbeeck, E. Woodhead, N. Cerf, R. García-Patrón,

More information

Key distillation from quantum channels using two-way communication protocols

Key distillation from quantum channels using two-way communication protocols Key distillation from quantum channels using two-way communication protocols Joonwoo Bae and Antonio Acín ICFO-Institut de Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels, Barcelona,

More information

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTONS FOLLOWING THE PING- PONG CODING PROTOCOL Martin Ostermeyer, Nino Walenta University of Potsdam, Institute of Physics, Nonlinear

More information

MODERN OPTICS. P47 Optics: Unit 9

MODERN OPTICS. P47 Optics: Unit 9 MODERN OPTICS P47 Optics: Unit 9 Course Outline Unit 1: Electromagnetic Waves Unit 2: Interaction with Matter Unit 3: Geometric Optics Unit 4: Superposition of Waves Unit 5: Polarization Unit 6: Interference

More information

Genuine three-partite entangled states with a hidden variable model

Genuine three-partite entangled states with a hidden variable model Genuine three-partite entangled states with a hidden variable model Géza Tóth 1,2 and Antonio Acín 3 1 Max-Planck Institute for Quantum Optics, Garching, Germany 2 Research Institute for Solid State Physics

More information

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography D. J. Guan Abstract The development of quantum algorithms and quantum information theory, as well as the design

More information

Quantum Cloning WOOTTERS-ZUREK CLONER

Quantum Cloning WOOTTERS-ZUREK CLONER Quantum Cloning Quantum cloning has been a topic of considerable interest for many years. It turns out to be quantum limit for copying an input state and is closely related to linear amplification when

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

Experimental realization of quantum cryptography communication in free space

Experimental realization of quantum cryptography communication in free space Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao

More information

Applications of Quantum Key Distribution (QKD)

Applications of Quantum Key Distribution (QKD) Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information