Modeling quantum optics for quantum key distribution system simulation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards the Modeling and Simulation of Quantum Key Distribution Systems

Quantum Key Distribution (QKD) is a nextgeneration security technology that exploits the properties of quantum mechanics to enable two parties to generate an unconditionally secure shared secret key. QKD is novel because its security is based upon the fundamental laws of quantum mechanics and not on computational complexity. QKD systems are composed of multiple interconnected electrical, optica...

متن کامل

High-dimensional quantum key distribution using dispersive optics

High-dimensional quantum key distribution using dispersive optics. " Physical Review A 87, no. 6 (June 2013). Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. We pr...

متن کامل

Mixed basis quantum key distribution with linear optics

Two-qubit quantum codes have been suggested to obtain better efficiency and higher loss tolerance in quantum key distribution. Here, we propose a two-qubit quantum key distribution protocol based on a mixed basis consisting of two Bell states and two states from the computational basis. All states can be generated from a single entangled photon pair resource by using local operations on only on...

متن کامل

Quantum Key Distribution with Continuous Variables in Optics

We discuss a quantum key distribution scheme in which small phase and amplitude modulations of quantum limited, CW light beams carry the key information. We identify universal constraints on the level of shared information between the intended receiver (Bob) and any eavesdropper (Eve) and use this to make a general evaluation of the security and efficiency of the scheme.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology

سال: 2017

ISSN: 1548-5129,1557-380X

DOI: 10.1177/1548512916684561