Squashing model for detectors and applications to quantum key distribution protocols

نویسندگان

  • Oleg Gittsovich
  • Normand J. Beaudry
  • Varun Narasimhachar
  • Ruben Romero Alvarez
  • Tobias Moroder
  • Norbert Lütkenhaus
چکیده

O. Gittsovich, N. J. Beaudry, 2 V. Narasimhachar, R. Romero Alvarez, 3 T. Moroder, 4 and N. Lütkenhaus Institute for Quantum Computing & Department of Physics and Astronomy, University of Waterloo, Waterloo ON Canada N2L 3G1 Institute for Theoretical Physics, ETH Zürich, 8093 Zürich, Switzerland Department of Physics, University of Toronto, Toronto ON Canada M5S 1A7 4 Naturwissenschaftlich-Technische Fakultät, Universität Siegen, Walter-Flex-Straße 3, D-57068 Siegen, Germany (Dated: October 21, 2013)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detector decoy quantum key distribution

Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is specially suited for t...

متن کامل

Robust polarization-based quantum key distribution over a collective-noise channel.

We present two polarization-based protocols for quantum key distribution. The protocols encode key bits in noiseless subspaces or subsystems and so can function over a quantum channel subjected to an arbitrary degree of collective noise, as occurs, for instance, due to rotation of polarizations in an optical fiber. These protocols can be implemented using only entangled photon-pair sources, sin...

متن کامل

Security analysis of the time-coding quantum key distribution protocols

We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security...

متن کامل

Long-distance quantum key distribution with imperfect devices

Nicoló Lo Piparo and Mohsen Razavi ∗ School of Electronic and Electrical Engineering, University of Leeds, Leeds, UK Abstract Quantum key distribution over probabilistic quantum repeaters is addressed. We compare, under practical assumptions, two such schemes in terms of their secure key generation rates per quantum memory. The two schemes under investigation are the one proposed by Duan et al....

متن کامل

ar X iv : q ua nt - p h / 06 11 04 4 v 1 3 N ov 2 00 6 Quantum key distribution with “ dual detectors ”

To improve the performance of a quantum key distribution (QKD) system, high speed, low dark count single photon detectors (or low noise homodyne detectors) are required. However, in practice, a fast detector usually is noisy. Here, we propose a “dual detectors” method to improve the performance of a practical QKD system with realistic detectors: the legitimate receiver randomly uses either a fa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1310.5059  شماره 

صفحات  -

تاریخ انتشار 2013