A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integration of Quantum Cryptography through Satellite Networks Transmission
2011
American Journal of Applied Sciences
stations for possible approach to subsystem with quantum communication in space, capable of generating and detecting entangled photons as well as faint laser pulses. ...
To do this in our project, we present theories regarding the following issues: Telecommunications Station and Satellite Communication Networks, Quantum Key Distribution, Open Space and Satellites, Analyses ...
Malek Benslama for his support in Electromagnetism and Telecommunication Laboratory which he is heading and for his supervising. ...
doi:10.3844/ajassp.2011.71.76
fatcat:pzws5pbcpva3vm2qohwl2sikm4
SECURITY OF QUANTUM KEY DISTRIBUTION
2008
International Journal of Quantum Information
As an application of these techniques, we prove the security of quantum key distribution (QKD), i.e., secret key agreement by communication over a quantum channel. ...
We propose an approach which allows to study general physical systems for which the above mentioned independence condition does not necessarily hold. ...
doi:10.1142/s0219749908003256
fatcat:srpapwllvzcalckuv634u2x4sa
Formal Verification of Quantum Protocols
[article]
2002
arXiv
pre-print
Quantum cryptography is therefore an interesting target for formal verification, and provides our first example; we expect the approach to be transferable to more general quantum information processing ...
The example we use is the quantum key distribution protocol proposed by Bennett and Brassard, commonly referred to as BB84. ...
Quantum cryptography is therefore an obvious and interesting target for formal verification, and provides our first example; we expect the approach to be transferable to more general quantum information ...
arXiv:quant-ph/0203086v1
fatcat:tbqivfl7qzhbvaowslkiislc3q
Wigner representation for experiments on quantum cryptography using two-photon polarization entanglement produced in parametric down-conversion
2008
Journal of Physics B: Atomic, Molecular and Optical Physics
We analyse the relation between two-photon entanglement and (non-secure) quantum key distribution within the Wigner framework in the Heisenberg picture. ...
Experiments using two-qubit polarization entanglement generated in nonlinear crystals are analysed in this formalism, along with the effects of eavesdropping attacks in the case of projective measurements ...
Acknowledgments We would like to acknowledge A Cabello and E Santos for their reading of the manuscript and their helpful comments. ...
doi:10.1088/0953-4075/41/4/045501
fatcat:iyfhdyrbkzeafjhw3rdevakylq
Space-borne quantum memories for global quantum communication
[article]
2020
arXiv
pre-print
Here, we analyse the use of quantum memory (QM)-equipped satellites for quantum communication focussing on global range repeaters and Measurement-Device-Independent (MDI) QKD. ...
We analyse how entanglement distribution performance depends on memory characteristics, determine benchmarks to assess performance of different tasks, and propose various architectures for light-matter ...
As one of the first applications of quantum communication, quantum key distribution (QKD) has been leading the emergence of quantum information technologies and establishes the foundation for wide-scale ...
arXiv:2006.10636v1
fatcat:gf2nbqn2nvdkfcibbziczemhk4
25 years of quantum cryptography
1996
ACM SIGACT News
The computational approach is apparently a dead end but several options remain to be analysed. ...
In addition to prototypes for quantum key distribution, Jaroslav Hrub:~ is working in Prague at implementing a quantum smart card for identification purposes [44] , following the protocol of Claude Cr ...
doi:10.1145/235666.235669
fatcat:l75mj2oygjecdnpoo7463lp3xe
An Automated Analysis of the Security of Quantum Key Distribution
[article]
2005
arXiv
pre-print
This paper discusses the use of computer-aided verification as a practical means for analysing quantum information systems; specifically, the BB84 protocol for quantum key distribution is examined using ...
The results presented here are a testament to the effectiveness of the model-checking approach for systems where analytical solutions may not be possible or plausible. ...
For quantum key distribution, the security parameters are conventionally written n and ǫ. ...
arXiv:cs/0502048v1
fatcat:rssoae56qrep3adljwuxctae2a
Quantum communications infrastructure architecture: theoretical background, network structure and technologies. A review of recent studies from a European public infrastructure perspective
[article]
2022
arXiv
pre-print
The more sophisticated schemes depend on ongoing advances in the generation and distribution of entanglement. ...
Quantum key distribution networks may be classified as trusted node; quantum repeater-entanglement-swapping based; point-to-multipoint based on passive beam splitters, active optical switchers or WDM; ...
The scheme is analysed with respect to optimal scaling and allows for long distance communication and fidelities approaching 1. ...
arXiv:2110.06762v2
fatcat:nqfq7q5iejhkhnqorilq6ce2iy
A macroscopic violation of no-signaling in time inequalities? How to test temporal entanglement with behavioral observables
2015
Frontiers in Psychology
The analyses of three independent experiments show a strong violation of NSIT in two out of three of them, suggesting the hypothesis of a quantum-like temporal entanglement between human choices at t1 ...
NSIT consists of a set of inequalities and represents mathematical conditions for macro-realism which require only two measurements in time. ...
Acknowledgments We thank Marco Genovese of INRIM, for an independent analysis of our results and his suggestion on how to weight the total results. ...
doi:10.3389/fpsyg.2015.01061
pmid:26283993
pmcid:PMC4518645
fatcat:d6jiqhyhcnd47deeuofz4vspuq
Entanglement-based quantum communication over 144 km
2007
Nature Physics
Furthermore we used the entangled pairs to generate a quantum cryptographic key under experimental conditions and constraints characteristic for a Space-to-ground experiment. ...
The distance in our experiment exceeds all previous free-space experiments by more than one order of magnitude and exploits the limit for ground-based free-space communication; significantly longer distances ...
This work was supported by ESA under the General Studies Programme (QIPS study, ESA's contract number 18805/04/NL/HE), the Austrian Science Foundation (FWF) under project number SFB1520, the A8-Quantum ...
doi:10.1038/nphys629
fatcat:l3krvpfesrarle2tdhl3owkspi
Advances in Space Quantum Communications
[article]
2021
arXiv
pre-print
Concerted efforts are underway to establish an infrastructure for a global quantum internet to realise a spectrum of quantum technologies. ...
We conclude with a discussion on fundamental physics experiments that could take advantage of a global, space-based quantum network. ...
Acknowledgments We acknowledge UKRI EPSRC Quantum Technology Hub in Quan- ...
arXiv:2103.12749v1
fatcat:fkljxmomebeyjdqwzhv7asqvmy
Device-dependent and device-independent quantum key distribution without a shared reference frame
2014
New Journal of Physics
Standard quantum key distribution (QKD) protocols typically assume that the distant parties share a common reference frame. ...
assumption for the latter case). ...
Foundation (grant PP00P2_138917), the EU project DIQIP, the National Sciences and Engineering Research Council of Canada (NSERC), Alberta Innovates Technology Futures (AITF), the Canadian Foundation for ...
doi:10.1088/1367-2630/16/4/043002
fatcat:gmm5dfzwwrchflg7goywoauoie
Multiple-Bell-Bases Parallel Quantum Key Distribution Using Feedback
2015
Open Cybernetics and Systemics Journal
There is a problem that some eavesdropping risks exist in PQKD (Parallel Quantum Key Distribution) systems for the same types of quantum channels. ...
The analyses results demonstrate that the eavesdropping risks in parallel quantum channels are reduced by feedback controls, and the QKD (quantum key distribution) bit rates are increased, which provides ...
Capmany proposed originally the concept and physical principle of PQKD based on quantum mechanics and frequency coding [1] , and they improved the QKD (quantum key distribution) bit rate using the approaches ...
doi:10.2174/1874110x01509010508
fatcat:dn53ts7hdngsbcpz4maem43yru
Securing quantum key distribution systems using fewer states
2018
Physical Review A
Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. ...
The users share quantum states prepared in two mutually-unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. ...
In a typical QKD session, Alice uses two independent quantum random number generators to generate the key and to make a preparation-basis choice, and Bob uses a quantum random number generator to make ...
doi:10.1103/physreva.97.042347
fatcat:qflmv2kdszclzethjwrwqjuv44
Nanosatellite experiments to enable future space-based QKD missions
2016
EPJ Quantum Technology
Once demonstrated, the photon pair sources can be deployed on more advanced satellites that are equipped with optical links to establish a global space-based quantum key distribution network. ...
We present a programme for establishing the space worthiness of highly-miniaturised, polarisation-entangled, photon pair sources using CubeSat nanosatellites. ...
Oi acknowledges the Scottish Quantum Information Network (QUISCO) and the EU FP7 CONNECT2SEA project "Development of Quantum Technologies for Space Applications". ...
doi:10.1140/epjqt/s40507-016-0051-7
fatcat:e3ynmakrvze2riylfydhil5g2m
« Previous
Showing results 1 — 15 out of 62,617 results