Loss-tolerant quantum secure positioning with weak laser sources
نویسندگان
چکیده
Charles Ci Wen Lim, ∗ Feihu Xu, George Siopsis, Eric Chitambar, Philip G. Evans, and Bing Qi 3 Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831-6418, USA Research Laboratory of Electronics, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, Massachusetts 02139, USA Department of Physics and Astronomy, The University of Tennessee, Knoxville, Tennessee 37996-1200, USA Department of Physics and Astronomy, Southern Illinois University, Carbondale, Illinois 62901, USA
منابع مشابه
Quantum cryptography: from theory to practice
Quantum cryptography: from theory to practice Xiongfeng Ma Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto 2008 Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics to guarantee secure communication. The security of quantum cryptography was proven in the last decade. Many security analyses are based on ...
متن کاملSimulation of Direct Pumping of Quantum Dots in a Quantum Dot Laser
In this paper, the nonlinear rate equations governing a quantum dot laser isused to simulate the transient as well as the steady-state behaviors of the laser.Computation results show that the rate equations are capable of simulating true behaviorof a quantum dot laser. Then, the pump rates of the rate equations (which show indirectelectrical pumping of the quantum dots through a wetting layer) ...
متن کاملAll-photonic quantum repeaters
Quantum communication holds promise for unconditionally secure transmission of secret messages and faithful transfer of unknown quantum states. Photons appear to be the medium of choice for quantum communication. Owing to photon losses, robust quantum communication over long lossy channels requires quantum repeaters. It is widely believed that a necessary and highly demanding requirement for qu...
متن کاملClassical leakage resilience from fault-tolerant quantum computation
Physical implementations of cryptographic algorithms leak information, which makes them vulnerable to so-called side-channel attacks. The problem of secure computation in the presence of leakage is generally known as leakage resilience. In this work, we establish a connection between leakage resilience and fault-tolerant quantum computation. We first prove that for a general leakage model, ther...
متن کاملLight Coupling in Polymer Nanofibers: from Single-photon Emission to Random Lasing
The understanding of the phenomena underlying the interaction of photons with dielectric, metallic and hybrid microand nano-structures and the development of advanced fabrication tools have paved the way to the realization of complex, nanostructured photonic structures, with tailored and exotic absorption and emission properties. Among such nanostructured materials, polymer nanofibers have intr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1607.08193 شماره
صفحات -
تاریخ انتشار 2016