Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 15 de 15
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Phys Rev Lett ; 126(10): 100501, 2021 Mar 12.
Artigo em Inglês | MEDLINE | ID: mdl-33784137

RESUMO

The security of real-world quantum key distribution (QKD) critically depends on the number of data points the system can collect in a finite time interval. To date, state-of-the-art finite-key security analyses require block lengths in the order of 10^{4} bits to obtain positive secret keys. This requirement, however, can be very difficult to achieve in practice, especially in the case of entanglement-based satellite QKD, where the overall channel loss can go up to 70 dB or more. Here, we provide an improved finite-key security analysis which reduces the block length requirement by 14% to 17% for standard channel and protocol settings. In practical terms, this reduction could save entanglement-based satellite QKD weeks of measurement time and resources, thereby bringing space-based QKD technology closer to reality. As an application, we use the improved analysis to show that the recently reported Micius QKD satellite is capable of generating positive secret keys with a 10^{-5} security level.

2.
Nature ; 582(7813): 501-505, 2020 06.
Artigo em Inglês | MEDLINE | ID: mdl-32541968

RESUMO

Quantum key distribution (QKD)1-3 is a theoretically secure way of sharing secret keys between remote users. It has been demonstrated in a laboratory over a coiled optical fibre up to 404 kilometres long4-7. In the field, point-to-point QKD has been achieved from a satellite to a ground station up to 1,200 kilometres away8-10. However, real-world QKD-based cryptography targets physically separated users on the Earth, for which the maximum distance has been about 100 kilometres11,12. The use of trusted relays can extend these distances from across a typical metropolitan area13-16 to intercity17 and even intercontinental distances18. However, relays pose security risks, which can be avoided by using entanglement-based QKD, which has inherent source-independent security19,20. Long-distance entanglement distribution can be realized using quantum repeaters21, but the related technology is still immature for practical implementations22. The obvious alternative for extending the range of quantum communication without compromising its security is satellite-based QKD, but so far satellite-based entanglement distribution has not been efficient23 enough to support QKD. Here we demonstrate entanglement-based QKD between two ground stations separated by 1,120 kilometres at a finite secret-key rate of 0.12 bits per second, without the need for trusted relays. Entangled photon pairs were distributed via two bidirectional downlinks from the Micius satellite to two ground observatories in Delingha and Nanshan in China. The development of a high-efficiency telescope and follow-up optics crucially improved the link efficiency. The generated keys are secure for realistic devices, because our ground receivers were carefully designed to guarantee fair sampling and immunity to all known side channels24,25. Our method not only increases the secure distance on the ground tenfold but also increases the practical security of QKD to an unprecedented level.

3.
Nature ; 507(7493): 443-7, 2014 Mar 27.
Artigo em Inglês | MEDLINE | ID: mdl-24670761

RESUMO

Among those who make a living from the science of secrecy, worry and paranoia are just signs of professionalism. Can we protect our secrets against those who wield superior technological powers? Can we trust those who provide us with tools for protection? Can we even trust ourselves, our own freedom of choice? Recent developments in quantum cryptography show that some of these questions can be addressed and discussed in precise and operational terms, suggesting that privacy is indeed possible under surprisingly weak assumptions.


Assuntos
Gestão da Informação/métodos , Gestão da Informação/normas , Privacidade , Comportamento de Escolha , Segurança Computacional/normas , Humanos , Magia , Pesquisa , Confiança
4.
Sci Am ; 307(3): 84-9, 2012 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-22928266
5.
Philos Trans A Math Phys Eng Sci ; 370(1971): 3418-31, 2012 Jul 28.
Artigo em Inglês | MEDLINE | ID: mdl-22711866

RESUMO

Alan Turing has certainly contributed to a widespread belief that the quest for a perfect, unbreakable, cipher is a futile pursuit. The ancient art of concealing information has, in the past, been matched by the ingenuity of code-breakers, but no longer! With the advent of quantum cryptography, the hopes of would-be eavesdroppers have been dashed, perhaps for good. Moreover, recent research, building on schemes that were invented decades ago to perform quantum cryptography, shows that secure communication certified by a sufficient violation of a Bell inequality makes a seemingly insane scenario possible-devices of unknown or dubious provenance, even those that are manufactured by our enemies, can be safely used for secure communication, including key distribution. All that is needed to implement this bizarre and powerful form of cryptography is a loophole-free test of a Bell inequality, which is on the cusp of technological feasibility. We provide a brief overview of the intriguing connections between Bell inequalities and cryptography and describe how studies of quantum entanglement and the foundations of quantum theory influence the way we may protect information in the future.

6.
Phys Rev Lett ; 109(16): 160404, 2012 Oct 19.
Artigo em Inglês | MEDLINE | ID: mdl-23350071

RESUMO

With the advent of quantum information, the violation of a Bell inequality is used to witness the absence of an eavesdropper in cryptographic scenarios such as key distribution and randomness expansion. One of the key assumptions of Bell's theorem is the existence of experimental "free will," meaning that measurement settings can be chosen at random and independently by each party. The relaxation of this assumption potentially shifts the balance of power towards an eavesdropper. We consider a no-signaling model with reduced "free will" and bound the adversary's capabilities in the task of randomness expansion.

7.
Phys Rev Lett ; 98(9): 090501, 2007 Mar 02.
Artigo em Inglês | MEDLINE | ID: mdl-17359143

RESUMO

We address the problem of estimating the phase phi given N copies of the phase-rotation gate uphi. We consider, for the first time, the optimization of the general case where the circuit consists of an arbitrary input state, followed by any arrangement of the N phase rotations interspersed with arbitrary quantum operations, and ending with a general measurement. Using the polynomial method, we show that, in all cases where the measure of quality of the estimate phi for phi depends only on the difference phi-phi, the optimal scheme has a very simple fixed form. This implies that an optimal general phase estimation procedure can be found by just optimizing the amplitudes of the initial state.

8.
Phys Rev Lett ; 95(24): 240407, 2005 Dec 09.
Artigo em Inglês | MEDLINE | ID: mdl-16384360

RESUMO

Nonlinear properties of quantum states, such as entropy or entanglement, quantify important physical resources and are frequently used in quantum-information science. They are usually calculated from a full description of a quantum state, even though they depend only on a small number of parameters that specify the state. Here we extract a nonlocal and a nonlinear quantity, namely, the Renyi entropy, from local measurements on two pairs of polarization-entangled photons. We also introduce a "phase marking" technique which allows the selection of uncorrupted outcomes even with nondeterministic sources of entangled photons. We use our experimental data to demonstrate the violation of entropic inequalities. They are examples of nonlinear entanglement witnesses and their power exceeds all linear tests for quantum entanglement based on all possible Bell-Clauser-Horne-Shimony-Holt inequalities.

9.
Phys Rev Lett ; 94(4): 040505, 2005 Feb 04.
Artigo em Inglês | MEDLINE | ID: mdl-15783542

RESUMO

When prior partial information about a state to be cloned is available, it can be cloned with a fidelity higher than that of universal quantum cloning. We experimentally verify this intriguing relationship between the cloning fidelity and the prior information by reporting the first experimental optimal quantum state-dependent cloner, using nuclear magnetic resonance techniques. Our experiments may further cast important implications into many quantum information processing protocols.

10.
Phys Rev Lett ; 93(23): 230502, 2004 Dec 03.
Artigo em Inglês | MEDLINE | ID: mdl-15601134

RESUMO

Transfer of data in linear quantum registers can be significantly simplified with preengineered but not dynamically controlled interqubit couplings. We show how to implement a mirror inversion of the state of the register in each excitation subspace with respect to the center of the register. Our construction is especially appealing as it requires no dynamical control over individual interqubit interactions. If, however, individual control of the interactions is available then the mirror inversion operation can be performed on any substring of qubits in the register. In this case, a sequence of mirror inversions can generate any permutation of a quantum state of the involved qubits.

11.
Phys Rev Lett ; 92(18): 187902, 2004 May 07.
Artigo em Inglês | MEDLINE | ID: mdl-15169534

RESUMO

We propose a class of qubit networks that admit the perfect state transfer of any quantum state in a fixed period of time. Unlike many other schemes for quantum computation and communication, these networks do not require qubit couplings to be switched on and off. When restricted to N-qubit spin networks of identical qubit couplings, we show that 2log3N is the maximal perfect communication distance for hypercube geometries. Moreover, if one allows fixed but different couplings between the qubits, then perfect state transfer can be achieved over arbitrarily long distances in a linear chain.

12.
Phys Rev Lett ; 91(9): 097901, 2003 Aug 29.
Artigo em Inglês | MEDLINE | ID: mdl-14525209

RESUMO

The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.

13.
Phys Rev Lett ; 91(10): 100403, 2003 Sep 05.
Artigo em Inglês | MEDLINE | ID: mdl-14525468

RESUMO

Examples of geometric phases abound in many areas of physics. They offer both fundamental insights into many physical phenomena and lead to interesting practical implementations. One of them, as indicated recently, might be an inherently fault-tolerant quantum computation. This, however, requires one to deal with geometric phases in the presence of noise and interactions between different physical subsystems. Despite the wealth of literature on the subject of geometric phases very little is known about this very important case. Here we report the first experimental study of geometric phases for mixed quantum states. We show how different they are from the well-understood, noiseless, pure-state case.

14.
Phys Rev Lett ; 89(12): 127902, 2002 Sep 16.
Artigo em Inglês | MEDLINE | ID: mdl-12225125

RESUMO

Basing on positive maps separability criterion we propose the experimentally viable, direct detection of quantum entanglement. It is efficient and does not require any a priori knowledge about the state. For two qubits it provides a sharp (i.e., "if and only if") separability test and estimation of amount of entanglement. We view this method as a new form of quantum computation, namely, as a decision problem with quantum data structure.

15.
Phys Rev Lett ; 88(21): 217901, 2002 May 27.
Artigo em Inglês | MEDLINE | ID: mdl-12059503

RESUMO

We present a simple quantum network, based on the controlled-SWAP gate, that can extract certain properties of quantum states without recourse to quantum tomography. It can be used as a basic building block for direct quantum estimations of both linear and nonlinear functionals of any density operator. The network has many potential applications ranging from purity tests and eigenvalue estimations to direct characterization of some properties of quantum channels. Experimental realizations of the proposed network are within the reach of quantum technology that is currently being developed.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...