ترغب بنشر مسار تعليمي؟ اضغط هنا

The influence of bright light on a single-photon detector has been described in a number of recent publications. The impact on quantum key distribution (QKD) is important, and several hacking experiments have been tailored to fully control single-pho ton detectors. Special attention has been given to avoid introducing further errors into a QKD system. We describe the design and technical details of an apparatus which allows to attack a quantum-cryptographic connection. This device is capable of controlling free-space and fiber-based systems and of minimizing unwanted clicks in the system. With different control diagrams, we are able to achieve a different level of control. The control was initially targeted to the systems using BB84 protocol, with polarization encoding and basis switching using beamsplitters, but could be extended to other types of systems. We further outline how to characterize the quality of active control of single-photon detectors.
Gao et al. [Phys. Rev. Lett. 101, 208901 (2008)] have described a possible intercept-resend attack for the quantum protocol for detectable Byzantine agreement in Phys. Rev. Lett. 100, 070504 (2008). Here we describe an extension of the protocol which defeats such attacks.
Practical quantum state tomography is usually performed by carrying out repeated measurements on many copies of a given state. The accuracy of the reconstruction depends strongly on the dimensionality of the system and the number of copies used for t he measurements. We investigate the accuracy of an experimental implementation of a minimal and optimal tomography scheme for one- and two-qubit states encoded in the polarization of photons. A suitable statistical model for the attainable accuracy is introduced.
We provide an estimate on the absolute values of the emission rate of photon pairs produced by spontaneous parametric down conversion in a bulk crystal when all interacting fields are in single transverse Gaussian modes. Both collinear and non-collin ear configurations are covered, and we arrive at a fully analytical expression for the collinear case. Our results agree reasonably well with values found in typical experiments, which allows this model to be used for understanding the dependency on the relevant experimental parameters.
We introduce a new quantum protocol for solving detectable Byzantine agreement (also called detectable broadcast) between three parties, and also for solving the detectable liar detection problem. The protocol is suggested by the properties of a four -qubit entangled state, and the classical part of the protocol is simpler than that of previous proposals. In addition, we present an experimental implementation of the protocol using four-photon entanglement.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا