Full-field mode sorter using two optimized phase transformations for high-dimensional quantum cryptography
نویسندگان
چکیده
منابع مشابه
Gaussian two-mode attacks in one-way quantum cryptography
We investigate the asymptotic security of one-way continuous variable quantum key distribution against Gaussian two-mode coherent attacks. The one-way protocol is implemented by arranging the channel uses in two-mode blocks. By applying symmetric random permutations over these blocks, the security analysis is in fact reduced to study two-mode coherent attacks and, in particular, Gaussian ones, ...
متن کاملHigher-Dimensional Quantum Cryptography
We report on a high-speed quantum cryptography system that utilizes simultaneous entanglement in polarization and in “time-bins”. With multiple degrees of freedom contributing to the secret key, we can achieve over ten bits of random entropy per detected coincidence. In addition, we collect from multiple spots o the downconversion cone to further amplify the data rate to achieve over 10 Mbits o...
متن کاملContinuous Variable Quantum Cryptography using Two-Way Quantum Communication
Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes with Gaussian statistics. Such protocols have shown the possibility of reaching very high secret key rates, even in the presence of strong losses ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Optics
سال: 2020
ISSN: 2040-8978,2040-8986
DOI: 10.1088/2040-8986/ab6303