PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
This PDF file contains the front matter associated with SPIE Proceedings Volume 9996, including the Title Page, Copyright information, Table of Contents, Introduction (if any), and Conference Committee listing.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Modern cryptography encompasses much more than encryption of secret messages. Signature schemes are widely used to guarantee that messages cannot be forged or tampered with, for example in e-mail, software updates and electronic commerce. Messages are also transferrable, which distinguishes digital signatures from message authentication. Transferability means that messages can be forwarded; in other words, that a sender is unlikely to be able to make one recipient accept a message which is subsequently rejected by another recipient if the message is forwarded.
Similar to public-key encryption, the security of commonly used signature schemes relies on the assumed computational difficulty of problems such as finding discrete logarithms or factoring large primes. With quantum computers, such assumptions would no longer be valid. Partly for this reason, it is desirable to develop signature schemes with unconditional or information-theoretic security. Quantum signature schemes are one possible solution. Similar to quantum key distribution (QKD), their unconditional security relies only on the laws of quantum mechanics. Quantum signatures can be realized with the same system components as QKD, but are so far less investigated. This talk aims to provide an introduction to quantum signatures and to review theoretical and experimental progress so far.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable.
The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure.
There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority.
Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Continuous-variable quantum key distribution is a practical application of quantum information theory that is aimed at generation of secret cryptographic key between two remote trusted parties and that uses multi-photon quantum states as carriers of key bits. Remote parties share the secret key via a quantum channel, that presumably is under control of of an eavesdropper, and which properties must be taken into account in the security analysis.
Well-studied fiber-optical quantum channels commonly possess stable transmittance and low noise levels, while free-space channels represent a simpler, less demanding and more flexible alternative, but suffer from atmospheric effects such as turbulence that in particular causes a non-uniform transmittance distribution referred to as fading. Nonetheless free-space channels, providing an unobstructed line-of-sight, are more apt for short, mid-range and potentially long-range (using satellites) communication and will play an important role in the future development and implementation of QKD networks.
It was previously theoretically shown that coherent-state CV QKD should be in principle possible to implement over a free-space fading channel, but strong transmittance fluctuations result in the significant modulation-dependent channel excess noise. In this regime the post-selection of highly transmitting sub-channels may be needed, which can even restore the security of the protocol in the strongly turbulent channels. We now report the first proof-of-principle experimental test of coherent state CV QKD protocol using different levels Gaussian modulation over a mid-range (1.6-kilometer long) free-space atmospheric quantum channel. The transmittance of the link was characterized using intensity measurements for the reference but channel estimation using the modulated coherent states was also studied.
We consider security against Gaussian collective attacks, that were shown to be optimal against CV QKD protocols . We assumed a general entangling cloner collective attack (modeled using data obtained from the state measurement results on both trusted sides of the protocol), that allows to purify the noise added in the quantum channel . Our security analysis of coherent-state protocol also took into account the effect of imperfect channel estimation, limited post-processing efficiency and finite data ensemble size on the performance of the protocol. In this regime we observe the positive key rate even without the need of applying post-selection. We show the positive improvement of the key rate with increase of the modulation variance, still remaining low enough to tolerate the transmittance fluctuations.
The obtained results show that coherent-state CV QKD protocol that uses real free-space atmospheric channel can withstand negative influence of transmittance fluctuations, limited post-processing efficiency, imperfect channel estimation and other finite-size effects, and be successfully implemented. Our result paves the way to the full-scale implementation of the CV QKD in real free-space channels at mid-range distances.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In a very simplistic way, the Command and Control functions can be summarized as the need to provide the decision makers with an exhaustive, real-time, situation picture and the capability to convey their decisions down to the operational forces. This two-ways data and information flow is vital to the execution of current operations and goes far beyond the border of military operations stretching to Police and disaster recovery as well. The availability of off-the shelf technology has enabled hostile elements to endanger the security of the communication networks by violating the traditional security protocols and devices and hacking sensitive databases. In this paper an innovative approach based to implementing Device Independent Quantum Key Distribution system is presented. The use of this technology would prevent security breaches due to a stolen crypto device placed in an end-to-end communication chain. The system, operating with attenuated laser, is practical and provides the increasing of the distance between the legitimate users.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Security and Performance of Quantum Communication Systems
We consider the secret key capacity of the thermal loss channel, which is modeled by a beam splitter mixing an input signal mode with an environmental thermal mode. This capacity is the maximum value of secret bits that two remote parties can generate by means of the most general adaptive protocols assisted by unlimited and two-way classical communication. To date, only upper and lower bounds are known. The present work improves the lower bound by resorting to Gaussian protocols based on suitable trusted-noise detectors.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Publisher’s Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance.
In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
High-dimensional (dimension d > 2) quantum key distribution (QKD) protocols that encode information in the temporal degree of freedom promise to overcome some of the challenges of qubit-based (d = 2) QKD systems. In particular, the long recovery time of single-photon detectors and large channel noise at long distance both limit the rate at which a final secure key can be generated in a low-dimension QKD system. We propose and demonstrate a practical discrete-variable time-frequency protocol with d = 4 at a wavelength of 1550 nm, where the temporal states are secured by transmitting and detecting their dual states under Fourier transformation, known as the frequency-basis states, augmented by a decoy-state protocol. We show that the discrete temporal and frequency states can be generated and detected using commercially-available equipment with high timing and spectral efficiency. In our initial experiments, we only have access to detectors that have low efficiency (1%) at 1550 nm. Together with other component losses, our system is equivalent to a QKD system with ideal components and a 50-km-long optical-fiber quantum channel. We find that our system maintains a spectral visibility of over 99.0% with a quantum bit error rate of 2.3%, which is largely due to the finite extinction ratio of the intensity modulators used in the transmitter. The estimated secure key rate of this system is 7.7×104 KHz, which should improve drastically when we use detectors optimized for 1550 nm.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Progress in quantum computers and their threat to conventional public key infrastructure is driving new forms of encryption. Quantum Key Distribution (QKD) using entangled photons is a promising approach. A global QKD network can be achieved using satellites equipped with optical links. Despite numerous proposals, actual experimental work demonstrating relevant entanglement technology in space is limited due to the prohibitive cost of traditional satellite development. To make progress, we have designed a photon pair source that can operate on modular spacecraft called CubeSats. We report the in-orbit operation of the photon pair source on board an orbiting CubeSat and demonstrate pair generation and polarisation correlation under space conditions. The in-orbit polarisation correlations are compatible with ground-based tests, validating our design. This successful demonstration is a major experimental milestone towards a space-based quantum network. Our approach provides a cost-effective method for proving the space-worthiness of critical components used in entangled photon technology. We expect that it will also accelerate efforts to probe the overlap between quantum and relativistic models of physics.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
We present a design of a quantum information processing C-phase (Controlled-phase) gate applicable for generating cluster states that has a form of integrated photonic circuits assembled with cascaded directional couplers on a Ti in-diffused Lithium Niobate (Ti-LN) platform where directional couplers as the integrated optical analogue of bulk beam splitters are used as fundamental building blocks. Based on experimentally optimized fabrication parameters of Ti-LN optical waveguides operating at an 810nm wavelength, an integrated Ti-LN quantum C-phase gate is designed and simulated. Our proposed C-phase gate consists of three tunable directional couplers cascaded together with having different weighted switching ratios for providing a tool of routing vertically- and horizontally-polarized photons independently. Its operation mechanism relies on selectively controlling the optical coupling of orthogonally polarized modes via the change in the index of refraction, and its operation is confirmed by the BPM simulation.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Lyot filters have been designed for multi-access high capacity wavelength division multiplexing between a communications hub and spatially separated spokes. Reported here are modifications to a basic classical communications Lyot filter stage [1], but using a hyper-entangled bipartite input state possessing non-degenerate frequencies for advanced quantum communications. Lyot filters and pre-shared linking knowledge can be used to better ensure efficiency and efficacy in manifesting entanglement correlations between polarization degrees of freedom in non-rotationally invariant measurement bases. Lyot filters also allow entangled photon routing, a function of entanglement between incident frequencies and polarization.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The continuous-variable (CV) Einstein-Podolsky-Rosen (EPR) paradox and steering are demonstrated using a pulsed light source and waveguides. We shorten the duration of the local oscillator (LO) pulse by using parametric amplification to improve the temporal mode-matching between the entangled pulse and the LO pulse. After correcting for the amplifier noise, the product of the measured conditional variance of the quadrature-phase amplitudes is 0.74 < 1, which satisfies the EPR-Reid criterion.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
There are several problems that must be solved in order to increase the distance of quantum communication protocols based on photons as an information carriers. One of them is the dispersion, whose effects can be minimized by engineering spectral properties of transmitted photons. In particular, it is expected that positively correlated photon pairs can be very useful. We present the full characterization of a source of single photon pairs at a telecom wavelength based on type II spontaneous parametric down conversion (SPDC) process in a beta-barium borate (BBO) crystal. In the type II process, a pump photon, which is polarized extraordinarily, splits in a nonlinear medium into signal and idler photons, which are polarized perpendicularly to each other. In order for the process to be efficient a phase matching condition must be fulfilled. These conditions originate from momentum and energy conservation rules and put severe restrictions on source parameters. Seemingly, these conditions force the photon pair to be negatively correlated in their spectral domain. However, it is possible to achieve positive correlation for pulsed pumping. The experimentally available degrees of freedom of a source are the width of the pumping beam, the collected modes’ widths, the length of the nonlinear crystal and the duration of the pumping pulse. In our numerical model we use the following figures of merit: the pair production rate, the efficiency of photon coupling into a single mode fiber, the spectral correlation of the coupled photon pair. The last one is defined as the Pearson correlation parameter for a joint spectral distribution. The aim here is to find the largest positive spectral correlation and the highest coupling efficiency.
By resorting to the numerical model Ref. [1] we showed in Ref. [2], that by careful adjustment of the pump’s and the collected modes’ characteristics, one can optimize any of the source's parameters. Our numerical outcomes conform to the experimental results presented in Refs [3,4]. Here we investigate typical, experimentally available source parameters: the widths of the pump beam and collected modes ranging from 20μm to 500m, the crystal length ranging from 1mm to 7.5mm while the pulse duration is set to 50fs, 100fs or 150fs. We achieve the correlation coefficient value as high as approximately 0.8, or – for different values of parameters – coupling efficiency equal to 0.76.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Quantum Circuits, Memories, Simulators, Randomness Generators and Sensors I
Quantum information processing relies on the fundamental property of quantum interference, where the quality of the interference directly correlates to the indistinguishability of the interacting particles. The creation of these indistinguishable particles, photons in this case, has conventionally been accomplished with nonlinear crystals and optical filters to remove spectral distinguishability, albeit sacrificing the number of photons. This research describes the use of an integrated aluminum nitride microring resonator circuit to selectively generate photon pairs at the narrow cavity transmissions, thereby producing spectrally indistinguishable photons. These spectrally indistinguishable photons can then be routed through optical waveguide circuitry, concatenated interferometers, to manipulate and entangle the photons into the desired quantum states. Photon sources and circuitry are only two of the three required pieces of the puzzle. The final piece which this research is aimed at interfacing with are trapped ion quantum memories, based on trapped Ytterbium ions. These ions serve as very long lived and stable quantum memories with storage times on the order of 10’s of minutes, compared with photonic quantum memories which are limited to 10-6 to 10-3 seconds. The caveat with trapped ions is the interaction wavelength of the photons is 369.5nm and therefore the goal of this research is to develop entangled photon sources and circuitry in that wavelength regime to interact directly with the trapped ions and bypass the need for frequency conversion.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Quantum Circuits, Memories, Simulators, Randomness Generators and Sensors II
One of the greatest challenges in modern science is the realisation of quantum computers which, as their scale increases, will allow enhanced performance of tasks across many areas of quantum information processing. Quantum logic gates play a vital role in realising these applications by carrying out the elementary operations on the qubits; a key aim is minimising the resources needed to build these gates into useful circuits. While the salient features of a quantum computer have been shown in proof-of-principle experiments, e.g., single- and two-qubit gates, difficulties in scaling quantum systems to encode and manipulate multiple qubits has hindered demonstrations of more complex operations. This is exemplified by the classical Fredkin (or controlled-SWAP) gate [1] for which, despite many theoretical proposals [2,3] relying on concatenating multiple two-qubit gates, a quantum analogue has yet to be realised.
Here, by directly adding control to a two-qubit SWAP unitary [4], we use photonic qubit logic to report the first experimental demonstration of a quantum Fredkin gate [5]. Our scheme uses linear optics and improves on the overall probability of success by an order of magnitude over previous proposals [2,3]. This optical approach allows us to add control an arbitrary black-box unitary which is otherwise forbidden in the standard circuit model [6]. Additionally, the action of our gate exhibits quantum coherence allowing the generation of the highest fidelity three-photon GHZ states to date.
The quantum Fredkin gate has many applications in quantum computing, quantum measurements [7] and cryptography [8,9]. Using our scheme, we apply the Fredkin gate to the task of direct measurements of the purity and state overlap of a quantum system [7] without recourse to quantum state tomography.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Presented is a quantum lattice gas algorithm to efficiently model a system of Dirac particles interacting through an intermediary gauge field. The algorithm uses a fixed qubit array to represent both the spacetime and the particles contained in the spacetime. Despite being a lattice based algorithm, Lorentz invariance is preserved down to the grid scale, with the continuum Dirac Hamiltonian generating the local unitary evolution even at that scale: there is nonlinear scaling between the smallest observable time and that time measured in the quantum field theory limit, a kind of time dilation effect that emerges on small scales but has no effect on large scales. The quantum lattice gas algorithm correctly accounts for the anticommutative braiding of indistinguishable fermions|it does not suffer the Fermi-sign problem. It provides a highly convergent numerical simulation for strongly-correlated fermions equal to a covariant path integral, presented here for the case when a Dirac particle's Compton wavelength is large compared to the grid scale of the qubit array.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Optical phase measurement through its application in quantum metrology has pushed the precision limit with which some physical quantities can be measured accurately. At the very fundamental level, the laws of quantum mechanics dictate that the uncertainty in phase estimations scales as 1/N, where N is the number of quantum resources employed in the protocol [1]. This is the well known Heisenberg limit (HL) which is quadratically better than the traditional precision limit known as the standard quantum limit (SQL) with uncertainty asymptotically scaling as 1/sqrt{N} [1]. Several experiments have demonstrated that the SQL can be beaten by using an entangled state as the probe and a specific measurement scheme for ab initio estimation of unknown phases [2,3]. It has also been shown experimentally that even in the absence of the entanglement one can measure an unknown phase with imprecision scaling at the HL [4].
In this work we first present a new protocol able to estimate an optical phase at the Heisenberg limit, and then experimentally explore fundamental and practical issues in generating high-quality novel entangled states, for use in this protocol and beyond. Our aim in this study is to measure an unknown phase in the interval [0,2pi) with uncertainty attaining the exact HL. There is a condition that should be met to address this objective: preparation of an optimal state [5]. This would cover part of the presentation through which we explain how to experimentally realise such an optimal state with the current technological limitations and the feasibility of the scheme. In particular, we generate an entangled 3-photon (2-photon) state of specific superposition of GHZ (Bell) states. Our numerical simulation of the phase measurement gate together with the experimental outcomes show that the created state should have a high fidelity and purity to be able to have the phase uncertainty achieving the exact HL. Therefore, we briefly explain the modelling for experimental imperfections and finally present the results of experimental phase measurements.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A random number generation approach comprising a silicon nanocrystals LED (Si-NCs LED), silicon single photon avalanche photodiode (Si SPAD) and a field-programmable gate array (FPGA) is introduced. The Si-NCs LED is the source of entropy with photon emission in the visible range detectable by silicon detectors allowing the fabrication of an all-silicon-based device. The proposed quantum random number generator (QRNG) is robust against variations of the internal and external parameters such as aging of the components, changing temperature, the ambient interferences and the silicon detector artifacts. The raw data show high quality of randomness and passed all the statistical tests in National Institute of Standards and Technology (NIST) tests suite without the application of a post-processing algorithm. The efficiency of random number generation is 4-bits per detected photon.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Physical random numbers generated by quantum measurements are, in principle, impossible to predict. We have demonstrated the generation of physical random numbers by using a high-speed balanced photodetector to measure the quadrature amplitudes of vacuum states. Using this method, random numbers were generated at 500 Mbps, which is more than one order of magnitude faster than previously [Gabriel et al:, Nature Photonics 4, 711-715 (2010)]. The Crush test battery of the TestU01 suite consists of 31 tests in 144 variations, and we used them to statistically analyze these numbers. The generated random numbers passed 14 of the 31 tests. To improve the randomness, we performed a hash operation, in which each random number was multiplied by a random Toeplitz matrix; the resulting numbers passed all of the tests in the TestU01 Crush battery.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
We report on the development of continuous-variable quantum key distribution (CV-QKD) system that are based on discrete quadrature amplitude modulation (QAM) and homodyne detection of coherent states of light. We use a pulsed light source whose wavelength is 1550 nm and repetition rate is 10 MHz. The CV-QKD system can continuously generate secret key which is secure against entangling cloner attack. Key generation rate is 50 kbps when the quantum channel is a 10 km optical fiber. The CV-QKD system we have developed utilizes the four-state and post-selection protocol [T. Hirano, et al., Phys. Rev. A 68, 042331 (2003).]; Alice randomly sends one of four states {|±α⟩,|±𝑖α⟩}, and Bob randomly performs x- or p- measurement by homodyne detection. A commercially available balanced receiver is used to realize shot-noise-limited pulsed homodyne detection. GPU cards are used to accelerate the software-based post-processing. We use a non-binary LDPC code for error correction (reverse reconciliation) and the Toeplitz matrix multiplication for privacy amplification.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Two photon fields to date, are generated by a fully coherent pump beam. We have experimentally studied the generation of polarisation entangled single photon pairs using a partially coherent pump beam. The spatial coherence effects of the pump beam on the coincidence detection of an entangled single photon source was investigated. The fully coherent coincidence detection was compared to the partial coherence detection. The results show that the partial coherence of the pump beam leads to an increase in coincidence detection. The coherence properties of a beam is significant for freespace optical transmission specifically for free-space quantum communication over long distances.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Optical communication systems in free space require a coarse and fine alignment system to align the receiver and transmitter. In general a coarse alignment is not entirely accurate to transmit the laser beacon in the exact direction of the visible field of the camera. During this process, some algorithms such as the raster, spiral and raster spiral scan algorithm can be used to find the spot of the laser beacon. Applications that require to transmit data in form of polarization signals, such as quantum cryptography, requires a polarisation bases alignment system to transmit and receive the photons. In this paper we present a fine alignment system using a polarised laser beacon. The system proposed was subdivided into a coarse and fine alignment system. The coarse alignment was implemented by using the GPS to acquire the geographical position of the transmitter, receiver and a reference point. The fine alignment was achieved by using a polarised laser beacon from the receiver to the transmitter and a camera located on the transmitter side. The algorithm presented was capable of excluding the background noise. Furthermore the polarisation of the laser beacon was used to align the polarisation bases of the transmitter and the receiver.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
We describe a protocol in which we detect intercept-resend jamming of imaging and can reverse its effects. The security is based on control of the polarization states of photons that are sent to interrogate an object and form an image at a camera. The scheme presented here is a particular implementation of a general anti-jamming protocol established by Roga and Jeffers in Ref. 5. It is applied here to imaging by photons with partially distinguishable polarisation states. The protocol in this version is easily applicable as only single photon states are involved, however the efficiency is traded off against the intrusion detectability because of a leak of information to the intruder.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.