ترغب بنشر مسار تعليمي؟ اضغط هنا

A comprehensive design and performance analysis of LEO satellite quantum communication

123   0   0.0 ( 0 )
 نشر من قبل Brendon Higgins
 تاريخ النشر 2012
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

Optical quantum communication utilizing satellite platforms has the potential to extend the reach of quantum key distribution (QKD) from terrestrial limits of ~200 km to global scales. We have developed a thorough numerical simulation using realistic simulated orbits and incorporating the effects of pointing error, diffraction, atmosphere and telescope design, to obtain estimates of the loss and background noise which a satellite-based system would experience. Combining with quantum optics simulations of sources and detection, we determine the length of secure key for QKD, as well as entanglement visibility and achievable distances for fundamental experiments. We analyze the performance of a low Earth orbit (LEO) satellite for downlink and uplink scenarios of the quantum optical signals. We argue that the advantages of locating the quantum source on the ground justify a greater scientific interest in an uplink as compared to a downlink. An uplink with a ground transmitter of at least 25 cm diameter and a 30 cm receiver telescope on the satellite could be used to successfully perform QKD multiple times per week with either an entangled photon source or with a weak coherent pulse source, as well as perform long-distance Bell tests and quantum teleportation. Our model helps to resolve important design considerations such as operating wavelength, type and specifications of sources and detectors, telescope designs, specific orbits and ground station locations, in view of anticipated overall system performance.


قيم البحث

اقرأ أيضاً

We propose and characterize a quantum interface between telecommunication wavelengths (1311 nm) and an Yb-dipole transition (369.5 nm) based on a second order sum frequency process in a PPKTP waveguide. An external (internal) conversion efficiency ab ove 5% (10%) is shown using classical bright light.
We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on communication rate as a function of h ardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (MidpointSource) delivers the highest communication rate when there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network.
81 - Dominique Elser 2015
By harnessing quantum effects, we nowadays can use encryption that is in principle proven to withstand any conceivable attack. These fascinating quantum features have been implemented in metropolitan quantum networks around the world. In order to int erconnect such networks over long distances, optical satellite communication is the method of choice. Standard telecommunication components allow one to efficiently implement quantum communication by measuring field quadratures (continuous variables). This opens the possibility to adapt our Laser Communication Terminals (LCTs) to quantum key distribution (QKD). First satellite measurement campaigns are currently validating our approach.
The characterization of quantum processes, e.g. communication channels, is an essential ingredient for establishing quantum information systems. For quantum key distribution protocols, the amount of overall noise in the channel determines the rate at which secret bits are distributed between authorized partners. In particular, tomographic protocols allow for the full reconstruction, and thus characterization, of the channel. Here, we perform quantum process tomography of high-dimensional quantum communication channels with dimensions ranging from 2 to 5. We can thus explicitly demonstrate the effect of an eavesdropper performing an optimal cloning attack or an intercept-resend attack during a quantum cryptographic protocol. Moreover, our study shows that quantum process tomography enables a more detailed understanding of the channel conditions compared to a coarse-grained measure, such as quantum bit error rates. This full characterization technique allows us to optimize the performance of quantum key distribution under asymmetric experimental conditions, which is particularly useful when considering high-dimensional encoding schemes.
Standard protocols for quantum key distribution (QKD) require that the sender be able to transmit in two or more mutually unbiased bases. Here, we analyze the extent to which the performance of QKD is degraded by diffraction effects that become relev ant for long propagation distances and limited sizes of apertures. In such a scenario, different states experience different amounts of diffraction, leading to state-dependent loss and phase acquisition, causing an increased error rate and security loophole at the receiver. To solve this problem, we propose a pre-compensation protocol based on pre-shaping the transverse structure of quantum states. We demonstrate, both theoretically and experimentally, that when performing QKD over a link with known, symbol-dependent loss and phase shift, the performance of QKD will be better if we intentionally increase the loss of certain symbols to make the loss and phase shift of all states same. Our results show that the pre-compensated protocol can significantly reduce the error rate induced by state-dependent diffraction and thereby improve the secure key rate of QKD systems without sacrificing the security.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا