scholarly journals An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states

2017 ◽  
Vol 381 (35) ◽  
pp. 2922-2926 ◽  
Author(s):  
Hong Lai ◽  
Ming-Xing Luo ◽  
Cheng Zhan ◽  
Josef Pieprzyk ◽  
Mehmet A. Orgun
Entropy ◽  
2020 ◽  
Vol 22 (4) ◽  
pp. 434
Author(s):  
F. Hadi Madjid ◽  
John M. Myers

Entangled states of light exhibit measurable correlations between light detections at separated locations. These correlations are exploited in entangled-state quantum key distribution. To do so involves setting up and maintaining a rhythm of communication among clocks at separated locations. Here, we try to disentangle our thinking about clocks as used in actual experiments from theories of time, such as special relativity or general relativity, which already differ between each other. Special relativity intertwines the concept of time with a particular definition of the synchronization of clocks, which precludes synchronizing every clock to every other clock. General relativity imposes additional barriers to synchronization, barriers that invite seeking an alternative depending on any global concept of time. To this end, we focus on how clocks are actually used in some experimental situations. We show how working with clocks without worrying about time makes it possible to generalize some designs for quantum key distribution and also clarifies the need for alternatives to the special-relativistic definition of synchronization.


2012 ◽  
Vol 26 (16) ◽  
pp. 1250109 ◽  
Author(s):  
A. BECIR ◽  
M. R. B. WAHIDDIN

In this paper, we derive tight bounds for the eavesdropping attacks on continuous variable quantum key distribution (CV-QKD) protocol that involves nonmaximally entangled states. We show that deriving bounds on the eavesdropper's accessible information based on the Heisenberg uncertainty yields upper bounds, but those bounds are not tight. For this reason, we follow different techniques to derive the desired tight bounds. The new bounds are tight for all CV-QKD protocols that involve two-mode entangled state. Our derivations are applied to direct and reverse reconciliation schemes of protocol implementation, respectively.


2010 ◽  
Vol 08 (06) ◽  
pp. 1013-1022 ◽  
Author(s):  
FEN-ZHUO GUO ◽  
FEI GAO ◽  
QIAO-YAN WEN ◽  
FU-CHEN ZHU

A two-step channel-encrypting quantum key distribution protocol is proposed. Using the previously shared EPR pairs as the quantum key, two bits of classical key can be established via one information carrier EPR state on average. In theory, the efficiency of this protocol reaches 100%, and there is no need to consume any entangled states including both the quantum key and the information carriers in ideal condition. The protocol can resist the particular attack that is fatal to other some channel-encrypting schemes. Principally, we prove the security against the most general individual attack of this protocol. Entanglement collapse in practical situation, as well as the realistic implementation of this protocol is also discussed.


2012 ◽  
Vol 2012 ◽  
pp. 1-10 ◽  
Author(s):  
Octavian Dănilă ◽  
Paul E. Sterian ◽  
Andreea Rodica Sterian

Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. Commonly known entangled states have been obtained with photons and electrons, but other quantum elements such as quarks, leptons, and neutrinos have shown their informational potential. In this paper, we present the perspective of exploiting the phenomenon of entanglement that appears in nuclear particle interactions as a resource for quantum key distribution protocols.


2005 ◽  
Vol 03 (01) ◽  
pp. 141-146 ◽  
Author(s):  
FABIO A. BOVINO ◽  
PIETRO VARISCO ◽  
ANNA MARTINOLI ◽  
PAOLO DE NICOLO ◽  
SANDRA BRUZZO ◽  
...  

We present the architecture and recent experimental results for a quantum key distribution system realized at Elsag spa Quantum Optics Laboratory with a key distribution rate suitable for practical industrial applications. The current system can reliably distribute secure cryptographic keys at a rate of 1,500 bit per second and higher at a few hundred meters, with a quantum bit error rate lower than 1%.


Sign in / Sign up

Export Citation Format

Share Document