A Three-stage Phase Encoding Technique for Quantum Key Distribution
|
|
- Monica Sharp
- 5 years ago
- Views:
Transcription
1 A Three-stage Phase Encoding Technique for Quantum Key Distribution F. Zamani, S. Mandal, and P. K.Verma School of Electrical and Computer Engineering, University of Oklahoma, Tulsa, Oklahoma, USA Abstract - The only known transmission technique that provides unconditional security is based on quantum cryptography. The current workhorse of quantum cryptography, more precisely, quantum key distribution (QKD), is based on the BB 84 protocol. Most commercial QKD implementations are based on phase-coding the BB 84 protocol, where the unbalanced Mach-Zehnder Interferometer (UMZI) is used as the information coder and decoder. This paper presents a three-stage phase encoding quantum key distribution protocol which is based only on one two-way quantum channel. This protocol does not need key sifting for key establishment. The proposed technique thus obviates the use of a classical communication channel for key sifting and key distillation which are subject to eavesdropping. The proposed technique thus increases the key efficiency and security compared with the current techniques. Keywords: Quantum key distribution (QKD); sifted key; key reconciliation; Phase coding protocol; Plug and play system 1 Introduction The aim of cryptography is to prevent a cryptanalyst from deciphering information sent by one party to another party. In classical cryptography, the process of encryption and decryption of information is based on mathematical algorithms and the security of the classical cryptography is based on the difficulty of these algorithms. Quantum cryptography is a good solution for providing key distribution. Quantum key distribution (QKD) applies the quantum mechanics concept to guarantee security of a key exchange between two legitimate parties in the presence of cryptanalyst [1, 2, 3, 4]. According to the Heisenberg uncertainty principle and no-cloning theorem, measuring or copying the quantum state of the qubit alters the original information in the qubit [5]. In quantum key distribution, we are able to detect whether the eavesdropper has eavesdropped on the message or not, while the classical cryptography does not offer this feature. The BB 84 is the most commonly used quantum key distribution protocol proposed by Bennett and Brassard in 1984 [5, 6]. It utilizes one quantum channel and one two-way classical channel. The classical channel is a regular telecommunication channel, over which Alice and Bob exchange information. The aim is establishing a secret key between two authorized parties, Alice and Bob, with the possibility that Eve can be present during the key establishment process. The original proposal of BB 84 relies on the polarization encoding of a photon. Since the alignment and the stabilization of polarization axes between Alice and Bob is practically difficult and depolarization happens due to medium transmission changes, the phase-coding technique for implementing BB 84 is used. Called the Plug and Play protocol, it is one of the common implementations of BB 84. The Plug and Play system utilizes one two-way quantum channel and one two-way classical channel which is basically an Ethernet channel. This classical channel is used for key sifting and key distillation. In this paper we propose a three stage QKD protocol which uses a single two-way quantum channel, thus removing the need for depending on a classical channel. The proposed mechanism will increase the security and key efficiency of the key establishment procedure and there will be no need to have the key sifting step which reduces the size of the final key. The rest of the paper is organized as follows: the phase coding BB 84 protocol reviewed in Section II, Section III describes Plug and Play system, Section IV describes our proposed protocol, Section V illustrates the scenario in the presence of an eavesdropper and in Section VI the various advantages of the proposed protocol are described as compared with other phase coding protocols. Finally, in Section VII, we present our conclusions. 2 Phase coding BB 84 Protocol As mentioned earlier, the BB 84 protocol was first implemented using polarization encoding. At present, phase encoding is used because using the polarization states causes some alignment and stabilization difficulties in practice. The basic configuration of phase coding is shown in Fig. 1 [7, 11]. The sender (Alice) transmits a photon through an asymmetric Mach Zehnder interferometer. When the photon passes through the interferometer the phase difference a between the two paths is randomly chosen from one of four values, namely {0, π} and {π/2, 3π/2} by PMA (phase modulator of Alice). After sending the photon to the receiver, Bob receives the photon and then passes it through his interferometer which is identical to Alice s. The phase difference b on Bob s side is randomly chosen from {0, π/2} by PMB (phase modulator of Bob).The photon is then detected at one of the two interferometer s outputs, each of which has a detector. Using this method, a secret key is generated by the protocol which is as follows:
2 4) The linear polarization is rotated by 90 degrees in the shorter arm of the interferometer, not shown in Fig. 2. 5) Both the beams then recombine and come out one after another from Bob s side. (The first pulse passed the short and the second pulse passed the long arm of the interferometer). 6) The pulses are then transmitted to Alice through the optical fiber. Figure 1. Schematic diagram of phase coding protocol 1) A number of photons are sequentially transmitted from Alice to Bob. 2) After the completion of the transmission through the quantum channel, Bob tells Alice which phase was chosen by him to detect the photon. 3) Alice lets Bob know using the classical channel, whether she chose a from {0, π} or from {π/2, 3π/2) for the detected photon. This phase information enables Bob to know if the detection event was deterministic or probabilistic. 4) In case of deterministic detection events, Alice considers a zero (X basis) axis or π/2 (Y basis) as bit 0 and b equals π (X basis) or 3π/2 (Y basis) as bit 1, whereas, Bob considers the detector 1 click as bit 0 and the detector 2 click as bit 1. In case of probabilistic detection events, they ignore them. A bit string created in this step is the sifted key. 5) Finally, after obtaining the sifted bit string, the two parties should communicate with each other through the classical channel to apply error correction and privacy amplification to obtain the final secret key. 2.1 Plug and Play System In this section, we describe a phase coding autocompensating system which is part of the Plug and Play implementation [8, 9, 10, 11]. The structure of the phase coding auto-compensating system is as shown in Fig. 2. The steps under which the system operates are as follows: Bob s Side: 1) Laser (L) produces strongly linearly polarized pulses of photons on Bob side. 2) The beam is then separated into two equal parts at the 50/50 beam splitter (BS). 3) The long arm of the interferometer contains a delay line (DL) and the Bob s phase modulator (PMB) is not used at this step of transmission. Alice s side: 7) Pulses that reach Alice, passing the BS 10/90 (90% of the intensity will be registered in the detector DA). 8) The other output of the beam splitter which is 10% is attenuated by the variable attenuator (VA) and reflected by a Faraday Mirror (FM), where the polarization states are reversed. 9) Alice applies a phase of 0 or π (bit 0 and 1 in the X-basis) and π/2 or 3π/2 (bit 0 and 1 in the Y-basis) on the second pulse for implementing the BB 84 protocol with her phase modulator (PMA). 10) The two pulses coming out as the output from Alice s side are orthogonal to each other but they have their polarizations interchanged because they have been reflected by the Faraday Mirror (FM). Thus, a compensation of all accumulated polarizations changes can take place on the way back from Alice to Bob. Bob side: 11) Two pulses arrive at Bob s interferometer and the first pulse now enters the long arm because of the changed polarization states. 12) Bob randomly chooses the measurement basis by applying a 0 or a π/2 phase shift on the first pulse by using his phase modulator (PMB). 13) The second pulse passes the short path in the interferometer. 14) Both pulses arrive at the same time at beam splitter (BS) and interfere with each other. 15) They are detected either in the detector 1 (D1) or after passing through the circulator (C) in the detector (D2). 16) The system is a usual QKD system which is using phase encoding between coherent pulses for transmitting a key from Alice to Bob. If Bob s phase (PMB) = 0 and Alice s phase (PMA) = 0 or π, then measuring it in the X basis, one of Bob s detectors obtains a conclusive result, which thereby determines the bit to be a 0 or 1. On the other hand, when the phase of PMB is 0 and that of PMA is π/2 or 3π/2, either of the two detectors of Bob clicks with equal probability. This is because Alice chooses the Y-basis and Bob chooses the X-basis, which are different bases. A complementary process happens for PMB=π/2.
3 Figure 2. Schematic diagram of Plug and Play system, (FM: Faraday Mirror, BS: beam splitter, PBS: polarization beam splitter, PMA: Phase modulator of Alice, PMB: Phase modulator of Bob, DL: delay line, VA: variable attenuator, C: circulator, D1&D2&DA: detectors, L: laser, SL: storage line) Alice and Bob after exchanging raw keys through the quantum channel need to communicate with each other through the classical channel to sift the raw key and discard Bob s random clicks. Also, after obtaining the sifted bit string, the two parties should communicate with each other through the classical channel to apply key distillation and Privacy Amplification to obtain the final secret key. In this paper, we propose a new quantum key distribution protocol, which utilizes a two way quantum channel and does not need the two parties to communicate to get the sifted key. This three stage quantum key distribution protocol will be discussed in the next section in detail. 2.2 The Proposed Protocol As we discussed in the previous section, the Plug and Play system is based on using a classical channel for key sifting and key reconciliation. Our proposed protocol is based on encoding the qubits in a similar manner to the Plug and Play system, but we propose to use a two way quantum channel for the quantum key distribution. The idea for omitting the classical channel to sift the key comes from Kak s three stage polarization based protocol which is the only QKD protocol using three stages for key establishment [14,15]. The key establishment technique of our proposed protocol is described in Fig. 3. In the proposed protocol Alice has a bit string that she wants to share with Bob as the secret key. The key distribution procedure is achieved in the following way: 1- Strong linearly polarized pulses of photons are produced by a laser from Alice s side. The qubits are encoded in the relative phase between two subsequent pulses. 2- Alice applies an arbitrary phase of α1 to the first pulse and β1 to the second pulse and sends these two pulses through the quantum channel to Bob. 3- Bob receives these pulses and applies another arbitrary phase α2 to the first pulse and β2 to the second pulse and sends them back to Alice. It should be mentioned here that these arbitrary phases are known only to Alice and Bob respectively. 4- Alice again receives the two pulses from Bob and applies α1 to the first pulse and β1 to the second pulse for encoding bit 0. On the other hand, for encoding bit 1, Alice applies ( α1+π) and β1 to the first and second pulses respectively and sends them back to Bob. 5- Bob receives the two pulses from Alice and applies α2 and β2 to the first and second pulses. These pulses after passing through the unbalanced interferometer are finally detected either in detector 1 (bit 0 ) or detector 2 (bit 1 ) according to their phase difference (0 or π). The system structure of the proposed protocol is sketched in Fig. 4. In the proposed system, at Alice s side, a laser produces strong linearly polarized pulses of photons. The beam is then separated into two parts at the 50/50 beam splitter (BS) and enters into the unbalanced interferometer with a delay line DL in the long arm, which produces two pulses. Then with the help of the phase modulator (PMA1), Alice applies an arbitrary phase of α1 to the first pulse and β1 to the second pulse and sends these two pulses through the quantum channel to Bob. Now Bob uses his phase modulator (PMB1) to apply another arbitrary phase α2 to the first pulse and β2 to the second pulse and sends them back to Alice. Next, Alice encodes bit 0 and 1, according to the key establishment procedure described above using the phase modulator (PMA2) and sends these encoded qubits back through the quantum channel (optical fiber) to Bob. Bob receives the two pulses from Alice and applies ( α2) and ( β2) to the first and second pulses using his phase modulator (PMB2). Bob then inverts the polarizations of the pulses and sends them to the interferometer. Due to this reversal of the polarizations of the pulses, the pulses which had travelled through the shorter arms of the interferometer at Alice s side will pass through the long arm of the interferometer at Bob s side and vice versa. As a result, the two pulses will reach the beam splitter where they interfere. Then they are detected
4 either in detector 1(D1) or detector 2 (D2) according to their phase difference. Now Bob considers the detector 1 clicks as bit 0 and the detector 2 clicks as bit 1.Thus, in this way, Alice shares her identical key with Bob without the process of key sifting and hence obviating the need for a classical channel in this step. We will consider the existence of Eve in our protocol in the next section. 2.3 Impact of an Intruder One of the primary advantages of the proposed protocol is that Alice and Bob use arbitrary phases each time for the key establishment and thus an intruder Eve cannot guess the actual guess the actual phase which is applied to the pulses in each transmission. So, in this case, Eve cannot get any information from avesdropping on the channel and she can only apply some random phases and disturb the information which Bob receives. Alice α1 β 1 Bob α1 β 1 For Encoding bit 0 α1+α2- α1 β 1+β 2- β 1 α1+α2- α1 β 1+β 2- β 1 α1+α2- α1-α2 β 1+β 2- β 1-β 2 D1 For Encoding bit 1 α1+α2- α1+π β 1+β 2- β 1 Δθ = 0 α1+α2- α1+π β 1+β 2- β 1 α1+α2- α1-α2 +π β 1+β 2- β 1-β 2 Δθ = π D2 Fig.3. Schematic diagram of key establishment procedure of the proposed protocol Alice Bob LASER BS DL H V (α1,β1) PMA1 1 2 PMA2 Optical fiber (-α2,-β2) PMB2 2 1 PMB1 V H PBS DL D2 D1 For bit 0 :(-α1,-β1) For bit 1 :(-α1+π,-β1) Encoding Box (α2,β2) Figure 4. Schematic diagram of proposed protocol system, (BS: beam splitter, PBS: polarization beam splitter,pma1&pma2: Phase modulator of Alice, PMB1&PMB2 : Phase modulator of Bob, DL: delay line, C: circulator, D1&D2: detectors)
5 In the case where Eve applies some random phase to the pulses in order to disturb the information, the phase difference of the two pulses will be detected randomly by the two detectors. To overcome this vulnerability, Alice and Bob put some portion of the previous established key as a test key and send it at the first of the transmission in order to check the presence of any intruder on the channel. If any of the two parties get some error in the test key, they know that there is an intruder present and they abort the transmission. Moreover, for avoiding the man in the middle attack, Alice and Bob use this test key part for authentication and thus in this case there is no chance for Eve to attack the protocol by disguising to be the man-in-the-middle. 2.4 The Advantages of Proposed Protocol in Comparison with the Other Phase-Coding Protocols 1. Raw key efficiency is defined as the length of the raw key shared by Alice and Bob divided by the length of the random bits generated by Alice [10]. In the proposed protocol due to the usage of two-way quantum channel and three stages of transmission, the raw key efficiency of the protocol can reach 100 percent, which is twice as much as that of the other phase coding protocols [12,13], which is only 50 per cent. 2. The other phase coding protocols need both quantum channel and classical channel for raw key generation, which is basically a weak channel in the sense of security but the proposed protocol only utilizes a twoway quantum channel for raw key generation and this causes Eve s information reduction dramatically. 3. The proposed protocol is more secure according to other protocol because there is no need to transmit the phase information through the classical channel and Eve cannot get any information about the key so the privacy amplification step which is necessary for the other protocols is obviated. As a result the key establishment security and efficiency in our protocol is more than others. 4. In the proposed protocol, Alice can send the encoded key stream to Bob and because there is no key sifting in this method, an effective coding scheme based on forward error correction will reduce the probability of error in the final key to an arbitrary small value so there is no need to have classical channel for error correction. Proposed method uses a three-stage protocol. Fiberbased polarization changes are addressed through the use of phase encoding and an auto compensation technique used in the plug and play system. 5. The proposed protocol is robust against photon number splitting attack and it does not need to have single photon generator because if Eve intercept the photons cannot get any information without having the phase of pulses. 3 Conclusions This paper has presented a novel means for exchanging quantum key between two entities, Alice and Bob. The technique is based on the use of a two-way quantum channel instead of one-way quantum channel as in BB 84. The two way quantum channel is used both for exchanging the quantum key as well as for replacing the conventional key sifting and key distillation on a classical channel. The proposed method thus obviates the need for a classical channel which is an additional security threat. The two-way quantum channel uses a three-stage protocol described in this paper. 4 References [1] Lo HK, Chau HF. Unconditional security of quantum key distribution over arbitrary long distances. Science 1999; 283(5410): [2] V.L. Kurochkin, I.G. Neizvestny, Quantum Cryptography, 10th International Conference and Seminar EDM'2009, Section III, [3] V.Teja1, P. Banerjee2, N. N. Sharma3 and R. K. Mittal3, Quantum Cryptography: State-of-Art,Challenges and Future Perspectives, Proceedings of the 7th IEEE International Conference on Nanotechnology, [4] M.S. Sharbaf, Quantum Cryptography: A New Generation of Information Technology Sec urity System, Sixth International Conference on Information Technology: New Generations, [5] G. Benenti, G. Casatti, and G. Strini, Principles of Quantum computation, vol. I: Basic Concepts, World Scientific Publishing, New Jersey, [6] C. H. Bennett, and G. Brassard, Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 10-12, 1984, pp [7] G. Massimo Palma, Quantum Cryptography, in Handbook of Information Security, Volume II, Part 3, pp , John Wiley and Sons Inc., New Jersey, [8] K.Inoue, Quantum Key Distribution Technologies, IEEE Journal of Selected Topics In Quantum Electronics, VOL. 12, NO. 4, JULY/AUGUST [9] A.muller, T. herzog, B.Huttner, W.tittle and H.zbinden, Plug and Play Systems for quantum cryptography, Appl.Phys.Lett. 70, 793(1997) 98, 102 [10] G.Ribordy, J.-D.Gautier, N. Gisin, O. Guinnard and H. Zbinden, Automated plug and play quantum key distribution, Electronics Letters, VOL.34,No.22, 1998 [11] V.Scarani, H.Bechmann-Pasquinucci, N. J. Cerf, Dusek, N.Lutkenhaus, M. Peev, The Security of Practical Quantum Key Distribution, Foundations of Physics ver.3, 2009; arxiv: quant-ph/ [12] K.Inoue, E.Waks, Y.Yamamoto, Differential-Phase Shift Quantum Key Distribution Physical Rev. Lett, Vol.89, 2002, [13] H.Takesue, T.Honjo, K.Tamaki, and Y.Tokura, Differential Phase Shift-Quantum Key Distribution IEEE Communications Magazine , 2009 [14] S. Kak, A three-stage quantum cryptography protocol. Foundations of Physics Letters 19, 293, 2006; arxiv: quant-ph/ [15] P. Basuchowdhuri, Comparing BB84 and Authentication-Aided Kak s Three-Stage Quantum Protocol,CITED AS: ARxIV:CS/ v1
Unconditionally secure quantum key distribution over 50km of satndard telecom fibre
Unconditionally secure quantum key distribution over 50km of satndard telecom fibre C. Gobby,* Z. L. Yuan and A. J. Shields Toshiba Research Europe Ltd, Cambridge Research Laboratory, 260 Cambridge Science
More informationarxiv: v1 [quant-ph] 13 May 2010
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system Feihu Xu, 1, Bing Qi, 1, and Hoi-Kwong Lo 1, 1 Center for Quantum Information and Quantum Control (CQIQC),
More informationGlobal quantum key distribution using CubeSat-based photon sources
Global quantum key distribution using CubeSat-based photon sources David Mitlyng S-fifteen Space Systems 1550 Larimer Street, Suite 293, Denver, CO 80202; +1-650-704-5650 david@s15.space Robert Bedington
More informationDifferential-Phase-Shift Quantum Key Distribution
Differential-Phase-Shift Quantum Key Distribution Kyo Inoue Osaka University NTT Basic Research Laboratories JST CREST Collaboration with H. Takesue, T. Honjo (NTT Basic Res. Labs.) Yamamoto group (Stanford
More informationLong-distance quantum key distribution in optical fibre
Long-distance quantum key distribution in optical fibre P. A. Hiskett 1, D. Rosenberg 1, C. G. Peterson 1, R. J. Hughes 1, S. Nam 2, A. E. Lita 2, A. J. Miller 3 and J. E. Nordholt 1 1 Los Alamos National
More informationHigh rate, long-distance quantum key distribution over 250km of ultra low loss fibres
High rate, long-distance quantum key distribution over 250km of ultra low loss fibres D Stucki 1, N Walenta 1, F Vannel 1, R T Thew 1, N Gisin 1, H Zbinden 1,3, S Gray 2, C R Towery 2 and S Ten 2 1 : Group
More informationQKD Overview. Review of Modern Physics 74 p (2002) "Quantum cryptography by N. Gisin, G. Ribordy, W. Tittel, H. Zbinden.
QKD Overview Review of Modern Physics 74 p 145-190 (2002) "Quantum cryptography by N. Gisin, G. Ribordy, W. Tittel, H. Zbinden. Practical issues Security of BB84 relies on single-photon qubits Single photon
More informationRandom Sequences for Choosing Base States and Rotations in Quantum Cryptography
Random Sequences for Choosing Base States and Rotations in Quantum Cryptography Sindhu Chitikela Department of Computer Science Oklahoma State University Stillwater, OK, USA sindhu.chitikela@okstate.edu
More informationQuantum Cryptography Kvantekryptering
Lecture in "Fiberkomponenter" course, November 13, 2003 NTNU Quantum Cryptography Kvantekryptering Vadim Makarov www.vad1.com/qcr/ Classical vs. quantum information Classical information Perfect copy Unchanged
More informationQUANTUM key distribution (QKD) provides a secret key
IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, VOL. 21, NO. 3, MAY/JUNE 2015 6600207 Differential Phase-Shift Quantum Key Distribution Systems Kyo Inoue (Invited Paper) Abstract Differential phase-shift
More informationarxiv:quant-ph/ v1 22 Jul 1999
Continuous Variable Quantum Cryptography T.C.Ralph Department of Physics, Faculty of Science, The Australian National University, ACT 0200 Australia Fax: +61 6 249 0741 Telephone: +61 6 249 4105 E-mail:
More informationQuantum key distribution system clocked at 2 GHz
Quantum key distribution system clocked at 2 GHz Karen J. Gordon, Veronica Fernandez, Gerald S. Buller School of Engineering and Physical Sciences, Heriot-Watt University, Edinburgh, UK, EH14 4AS k.j.gordon@hw.ac.uk
More informationarxiv: v2 [quant-ph] 16 Jul 2018
High speed error correction for continuous-variable quantum key distribution with multi-edge type LDPC code Xiangyu Wang 1, Yichen Zhang 1,, Song Yu 1,*, and Hong Guo 2 arxiv:1711.01783v2 [quant-ph] 16
More informationImplementation of an attack scheme on a practical QKD system
Implementation of an attack scheme on a practical QKD system Q. Liu, I. Gerhardt A. Lamas-Linares, V. Makarov, C. Kurtsiefer Q56.5 - DPG Tagung Hannover, 12. March 2010 Overview Our BBM92 QKD implementation
More informationPolarization recovery and auto-compensation in Quantum Key Distribution network 1
Polarization recovery and auto-compensation in Quantum Key Distribution network 1 Lijun Ma a, Hai Xu a,b, Xiao Tang a a National Institute of Standards and Technology, 1 Bureau Dr., Gaithersburg, MD 2899
More informationLow loss QKD optical scheme for fast polarization encoding
Low loss QKD optical scheme for fast polarization encoding A. Duplinskiy,,*, V. Ustimchik,3, A. Kanapin,4, V. Kurochkin and Y. Kurochkin Russian Quantum Center (RQC), Business Center «Ural», 00, Novaya
More informationarxiv: v1 [quant-ph] 6 Oct 2009
A 24 km fiber-based discretely signaled continuous variable quantum key distribution system arxiv:0910.1042v1 [quant-ph] 6 Oct 2009 Quyen Dinh Xuan 1, Zheshen Zhang 1,2, and Paul L. Voss 1,2 1. Georgia
More informationQuantum key distribution with 1.25 Gbps clock synchronization
Quantum key distribution with 1.25 Gbps clock synchronization J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, Charles W. Clark, Carl J. Williams National Institute
More informationQuantum key distribution system clocked at 2 GHz
Quantum key distribution system clocked at 2 GHz Karen J. Gordon, Veronica Fernandez, Gerald S. Buller School of Engineering and Physical Sciences, Heriot-Watt University, Edinburgh, UK, EH14 4AS k.j.gordon@hw.ac.uk
More informationHigh speed coherent one-way quantum key distribution prototype
High speed coherent one-way quantum key distribution prototype Damien Stucki 1, Claudio Barreiro 1, Sylvain Fasel 1, Jean-Daniel Gautier 1, Olivier Gay 2, Nicolas Gisin 1, Rob Thew 1, Yann Thoma 1, Patrick
More informationTowards practical quantum cryptography
Appl. Phys. B 69, 389 393 (1999) / Digital Object Identifier (DOI) 10.1007/s003409900166 Applied Physics B Lasers and Optics Springer-Verlag 1999 Towards practical quantum cryptography S. Chiangga 1,2,P.Zarda
More informationCountermeasure against tailored bright illumination attack for DPS-QKD
Countermeasure against tailored bright illumination attack for DPS-QKD Toshimori Honjo, 1,* Mikio Fujiwara, Kaoru Shimizu, 3 Kiyoshi Tamaki, 3 Shigehito Miki, Taro Yamashita, Hirotaka Terai, Zhen Wang,
More informationCOHERENT DETECTION OPTICAL OFDM SYSTEM
342 COHERENT DETECTION OPTICAL OFDM SYSTEM Puneet Mittal, Nitesh Singh Chauhan, Anand Gaurav B.Tech student, Electronics and Communication Engineering, VIT University, Vellore, India Jabeena A Faculty,
More informationarxiv: v4 [quant-ph] 4 Mar 2014
Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol Xiang-Chun Ma, Shi-Hai Sun, Mu-Sheng Jiang and Lin-Mei Liang Department of Physics, National
More information10-GHz clock differential phase shift quantum key distribution experiment
10-GHz clock differential phase shift quantum key distribution experiment Hiroki Takesue 1,2, Eleni Diamanti 3, Carsten Langrock 3, M. M. Fejer 3 and Yoshihisa Yamamoto 3 1 NTT Basic Research Laboratories,
More informationCountermeasure against blinding attacks on low-noise detectors with background noise cancellation scheme
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Countermeasure against blinding attacks on low-noise detectors with background noise cancellation scheme Min Soo
More informationA Practical Method to Achieve Perfect Secrecy
A Practical Method to Achieve Perfect Secrecy Amir K. Khandani E&CE Department, University of Waterloo August 3 rd, 2014 Perfect Secrecy: One-time Pad One-time Pad: Bit-wise XOR of a (non-reusable) binary
More informationPolarization-independent subcarrier quantum communication system and its application in ITMO University quantum network
Polarization-independent subcarrier quantum communication system and its application in ITMO University quantum network Artur Gleim 1,2, Vladimir Egorov 1, Simon Smirnov 1, Vladimir Chistyakov 1, Oleg
More informationHigh-speed free-space quantum key distribution with automatic tracking for short-distance urban links
High-speed free-space quantum key distribution with automatic tracking for short-distance urban links Alberto Carrasco-Casado (1), María-José García-Martínez (2), Natalia Denisenko (2), Verónica Fernández
More informationFUTURE communications networks must offer improved
1 Quantum-Classical Access Networks with Embedded Optical Wireless Links Osama Elmabrok, Student Member, IEEE, Masoud Ghalaii, Student Member, IEEE, and Mohsen Razavi arxiv:1707.080v [quant-ph] 7 Jan 018
More informationQuantum Key Distribution with Integrated Optical Circuits
Department für Physik Ludwig-Maximilians-Universität München Master s Thesis Quantum Key Distribution with Integrated Optical Circuits Stefan Frick March 28, 2013 Supervised by Prof. Dr. Harald Weinfurter
More informationSHF Communication Technologies AG
SHF Communication Technologies AG Wilhelm-von-Siemens-Str. 23D 12277 Berlin Germany Phone ++49 30 / 772 05 10 Fax ++49 30 / 753 10 78 E-Mail: sales@shf.de Web: http://www.shf.de Application Note DQPSK
More informationThis is a repository copy of Quantum-Classical Access Networks with Embedded Optical Wireless Links.
This is a repository copy of Quantum-Classical Access Networks with Embedded Optical Wireless Links. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/106594/ Version: Accepted
More informationCurrent status of the DARPA Quantum Network
Current status of the DARPA Quantum Network Chip Elliott 1, Alexander Colvin, David Pearson, Oleksiy Pikalo, John Schlafer, Henry Yeh BBN Technologies, 10 Moulton Street, Cambridge MA 02138 ABSTRACT This
More informationControlling excess noise in fiber optics continuous variables quantum key distribution
Controlling excess noise in fiber optics continuous variables quantum key distribution Jérôme Lodewyck, Thierry Debuisschert, Rosa Tualle-Brouri, Philippe Grangier To cite this version: Jérôme Lodewyck,
More informationPublic Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014
7 Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 Cryptography studies techniques for secure communication in the presence of third parties. A typical
More informationEncryption at the Speed of Light? Towards a cryptanalysis of an optical CDMA encryption scheme
Encryption at the Speed of Light? Towards a cryptanalysis of an optical CDMA encryption scheme Sharon Goldberg * Ron Menendez **, Paul R. Prucnal * *, ** Telcordia Technologies IPAM Workshop on Special
More informationSHF Communication Technologies AG
SHF Communication Technologies AG Wilhelm-von-Siemens-Str. 23 Aufgang D 12277 Berlin Marienfelde Germany Phone ++49 30 / 772 05 10 Fax ++49 30 / 753 10 78 E-Mail: sales@shf.biz Web: http://www.shf.biz
More informationarxiv: v1 [quant-ph] 14 Sep 2017
Continuous-variable QKD over 50km commercial fiber arxiv:1709.04618v1 [quant-ph] 14 Sep 2017 Yichen Zhang 1,2, Zhengyu Li 1, Ziyang Chen 1, Christian Weedbrook 3, Yijia Zhao 2, Xiangyu Wang 2, Chunchao
More informationarxiv: v2 [quant-ph] 17 Jan 2015
Robust Shot Noise Measurement for CVQKD Sébastien Kunz-Jacques 1 and Paul Jouguet 1 1 SeQureNet, 23 avenue d Italie, 75013 Paris, France (Dated: June 7, 2018) We study a practical method to measure the
More informationPerformance Analysis Of Hybrid Optical OFDM System With High Order Dispersion Compensation
Performance Analysis Of Hybrid Optical OFDM System With High Order Dispersion Compensation Manpreet Singh Student, University College of Engineering, Punjabi University, Patiala, India. Abstract Orthogonal
More informationPolarization Shift Keying for free space QKD
Polarization Shift Keying for free space QKD Effect of noise on reliability of the QKD protocols Ram Soorat and Ashok Vudayagiri Email: avsp@uohyd.ernet.in School of Physics, University of Hyderabad Hyderabad,
More informationA Short Wavelength GigaHertz Clocked Fiber- Optic Quantum Key Distribution System
Heriot-Watt University School of Engineering and Physical Sciences 1 A Short Wavelength GigaHertz Clocked Fiber- Optic Quantum Key Distribution System Karen J. Gordon, Veronica Fernandez, Paul D. Townsend,
More informationQuantum secured gigabit optical access networks
Quantum secured gigabit optical access networks Bernd Fröhlich 1,*, James F Dynes 1, Marco Lucamarini 1, Andrew W Sharpe 1, Simon W-B Tam 1, Zhiliang Yuan 1 & Andrew J Shields 1 1 Toshiba Research Europe
More informationInterleaving And Channel Encoding Of Data Packets In Wireless Communications
Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218
More informationComparative Study of OFDM & MC-CDMA in WiMAX System
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 64-68 Comparative Study of OFDM & MC-CDMA in WiMAX
More informationDelphi. M. W. Roberts. Abstract. An optical communication system is described. The system provides a unique operational capability.
Delphi M. W. Roberts Abstract An optical communication system is described. The system provides a unique operational capability. 1. Introduction A representation of the system is shown in Figure 1. The
More informationResearch Article Polarization-Basis Tracking Scheme in Satellite Quantum Key Distribution
International Optics Volume 211, Article ID 254154, 8 pages doi:1.1155/211/254154 Research Article Polarization-Basis Tracking Scheme in Satellite Quantum Key Distribution Morio Toyoshima, 1 Hideki Takenaka,
More informationETSI GS QKD 003 V1.1.1 ( ) Group Specification
GS QKD 003 V1.1.1 (2010-12) Group Specification Quantum Key Distribution (QKD); Components and Internal Interfaces Disclaimer This document has been produced and approved by the Quantum Key Distribution
More informationPhase Modulator for Higher Order Dispersion Compensation in Optical OFDM System
Phase Modulator for Higher Order Dispersion Compensation in Optical OFDM System Manpreet Singh 1, Karamjit Kaur 2 Student, University College of Engineering, Punjabi University, Patiala, India 1. Assistant
More informationDesigning Optical Layouts for AEI s 10 meter Prototype. Stephanie Wiele August 5, 2008
Designing Optical Layouts for AEI s 10 meter Prototype Stephanie Wiele August 5, 2008 This summer I worked at the Albert Einstein Institute for Gravitational Physics as a member of the 10 meter prototype
More informationSingle Photon Interference Katelynn Sharma and Garrett West University of Rochester, Institute of Optics, 275 Hutchison Rd. Rochester, NY 14627
Single Photon Interference Katelynn Sharma and Garrett West University of Rochester, Institute of Optics, 275 Hutchison Rd. Rochester, NY 14627 Abstract: In studying the Mach-Zender interferometer and
More informationAFRL-RI-RS-TR
AFRL-RI-RS-TR-2016-067 INVESTIGATING QUANTUM MODULATION STATES MARCH 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR FORCE RESEARCH LABORATORY INFORMATION
More informationPractical free-space quantum key distribution over 10 km in daylight and at night
Practical free-space quantum key distribution over 10 km in daylight and at night Richard J Hughes, Jane E Nordholt, Derek Derkacs and Charles G Peterson Physics Division, Los Alamos National Laboratory,
More informationYale University Department of Computer Science
LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work
More informationi-tee An Image Encryption Algorithm based on Multilevel Encryption using a Randomly Generated Bitmap Image
AUSTRALIAN JOURNAL OF BASIC AND APPLIED SCIENCES ISSN:1991-8178 EISSN: 2309-8414 Journal home page: www.ajbasweb.com i-tee An Image Encryption Algorithm based on Multilevel Encryption using a Randomly
More informationBER Analysis for Synchronous All-Optical CDMA LANs with Modified Prime Codes
BER Analysis for Synchronous All-Optical CDMA LANs with Modified Prime Codes Pham Manh Lam Faculty of Science and Technology, Assumption University Bangkok, Thailand Abstract The analysis of the BER performance
More informationModelling PM-BPSK Signals for Coherent Optical Transmission over Single-Mode Fiber
2013 European Modelling Symposium Modelling PM-BPSK Signals for Coherent Optical Transmission over Single-Mode Fiber Navya Yelloji, Navnith Ravindran, Anand Kumar Electrical and Electronics Engineering
More informationMegabits secure key rate quantum key distribution
Megabits secure key rate quantum key distribution To cite this article: Q Zhang et al 2009 New J. Phys. 11 045010 View the article online for updates and enhancements. Related content - Differential phase
More informationTurbo-coding of Coherence Multiplexed Optical PPM CDMA System With Balanced Detection
American Journal of Applied Sciences 4 (5): 64-68, 007 ISSN 1546-939 007 Science Publications Turbo-coding of Coherence Multiplexed Optical PPM CDMA System With Balanced Detection K. Chitra and V.C. Ravichandran
More informationLab Report 3: Speckle Interferometry LIN PEI-YING, BAIG JOVERIA
Lab Report 3: Speckle Interferometry LIN PEI-YING, BAIG JOVERIA Abstract: Speckle interferometry (SI) has become a complete technique over the past couple of years and is widely used in many branches of
More informationToward a security certificated communication system - How we are learning to stop worrying
QCrypt2015 30 th, September 2015 Hitotsubashi-hall, Tokyo, Japan Toward a security certificated communication system - How we are learning to stop worrying Akihisa Tomita Graduate School of Information
More informationBlock Ciphers Security of block ciphers. Symmetric Ciphers
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 26 Assume encryption and decryption use the same key. Will discuss how to distribute key to all parties later Symmetric ciphers unusable
More informationSeaworthy Quantum Key Distribution Design and Validation (SEAKEY) Contract Period of Performance (Base + Option): 7 February September 2016
12 November 2015 Office of Naval Research 875 North Randolph Street, Suite 1179 Arlington, VA 22203-1995 BBN Technologies 10 Moulton Street Cambridge, MA 02138 Delivered via Email to: richard.t.willis@navy.mil
More informationHigh-repetition rate quantum key distribution
Invited Paper High-repetition rate quantum key distribution J. C. Bienfang, A. Restelli, D. Rogers, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, L. Ma, H. Xu, D. H. Su, Charles W. Clark, and Carl J.
More informationarxiv: v3 [quant-ph] 19 Jun 2015
Generating the local oscillator locally in continuous-variable quantum key distribution based on coherent detection arxiv:1503.0066v3 [quant-ph] 19 Jun 015 Bing Qi, 1,, Pavel Lougovski, 1 Raphael Pooser,
More informationComparison of Polarization Shift Keying and Amplitude Shift Keying Modulation Techniques in FSO
Comparison of Polarization Shift Keying and Amplitude Shift Keying Modulation Techniques in FSO Jeema P. 1, Vidya Raj 2 PG Student [OEC], Dept. of ECE, TKM Institute of Technology, Kollam, Kerala, India
More informationSolution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.
Example - Coin Toss Coin Toss: Alice and Bob want to toss a coin. Easy to do when they are in the same room. How can they toss a coin over the phone? Mutual Commitments Solution: Alice tosses a coin and
More informationTechnical Brief #2. Depolarizers
Technical Brief #2 Depolarizers What is a depolarizer?...2 Principle of operation...2 Source coherence function dependence...2 Depolarizer realization...3 Input linear polarization state definition...4
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties
More informationUltrashort Pulse Measurement Using High Sensitivity Two Photon Absorption Waveguide Semiconductor
Ultrashort Pulse Measurement Using High Sensitivity Two Photon Absorption Wguide Semiconductor MOHAMMAD MEHDI KARKHANEHCHI Department of Electronics, Faculty of Engineering Razi University Taghbostan,
More informationNEW LASER ULTRASONIC INTERFEROMETER FOR INDUSTRIAL APPLICATIONS B.Pouet and S.Breugnot Bossa Nova Technologies; Venice, CA, USA
NEW LASER ULTRASONIC INTERFEROMETER FOR INDUSTRIAL APPLICATIONS B.Pouet and S.Breugnot Bossa Nova Technologies; Venice, CA, USA Abstract: A novel interferometric scheme for detection of ultrasound is presented.
More informationSwept Wavelength Testing:
Application Note 13 Swept Wavelength Testing: Characterizing the Tuning Linearity of Tunable Laser Sources In a swept-wavelength measurement system, the wavelength of a tunable laser source (TLS) is swept
More informationMotion-Compensated Handheld Quantum Key Distribution System
Motion-Compensated Handheld Quantum Key Distribution System Hyunchae Chun 1, Iris Choi 2, Grahame Faulkner 1, Larry Clarke 3, Bryan Barber 3, Glenn George 3, Colin Capon 3, Antti Niskanen 4, Joachim Wabnig
More informationπ code 0 Changchun,130000,China Key Laboratory of National Defense.Changchun,130000,China Keywords:DPSK; CSRZ; atmospheric channel
4th International Conference on Computer, Mechatronics, Control and Electronic Engineering (ICCMCEE 2015) Differential phase shift keying in the research on the effects of type pattern of space optical
More informationarxiv: v1 [quant-ph] 15 May 2016
A directly phase-modulated light source Z. L. Yuan, 1, B. Fröhlich, 1 M. Lucamarini, 1 G. L. Roberts, 1, 2 J. F. Dynes, 1 and A. J. Shields 1 1 Toshiba Research Europe Ltd, 28 Cambridge Science Park, arxiv:165.4594v1
More informationManchester Coding and Decoding Generation Theortical and Expermental Design
American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS) ISSN (Print) 2313-4410, ISSN (Online) 2313-4402 Global Society of Scientific Research and Researchers http://asrjetsjournal.org/
More informationLecture 7 Fiber Optical Communication Lecture 7, Slide 1
Dispersion management Lecture 7 Dispersion compensating fibers (DCF) Fiber Bragg gratings (FBG) Dispersion-equalizing filters Optical phase conjugation (OPC) Electronic dispersion compensation (EDC) Fiber
More informationPHASE TO AMPLITUDE MODULATION CONVERSION USING BRILLOUIN SELECTIVE SIDEBAND AMPLIFICATION. Steve Yao
PHASE TO AMPLITUDE MODULATION CONVERSION USING BRILLOUIN SELECTIVE SIDEBAND AMPLIFICATION Steve Yao Jet Propulsion Laboratory, California Institute of Technology 4800 Oak Grove Dr., Pasadena, CA 91109
More informationCharles M. Simmons P-23/CON. Jane E. Nordholt, NIS-1
.-.. -.,-. -, LA-uR-99-A74f I Approved forpubl[c release; distribution /s unlimited 96114 Title: Quantum Cryptography for secure Communications to Low-Earth Orbit Satellites. A th@): Richard J. Hughes,
More informationControlled dense coding for continuous variables using three-particle entangled states
PHYSICAL REVIEW A 66 032318 2002 Controlled dense coding for continuous variables using three-particle entangled states Jing Zhang Changde Xie and Kunchi Peng* The State Key Laboratory of Quantum Optics
More informationUltra high speed optical transmission using subcarrier-multiplexed four-dimensional LDPCcoded
Ultra high speed optical transmission using subcarrier-multiplexed four-dimensional LDPCcoded modulation Hussam G. Batshon 1,*, Ivan Djordjevic 1, and Ted Schmidt 2 1 Department of Electrical and Computer
More informationCoherent Receivers: A New Paradigm For Optical Components. ECOC Market Focus September 20, 2010
Photonic Integrated Circuit Based Coherent Receivers: A New Paradigm For Optical Components G. Ferris Lipscomb ECOC Market Focus September 20, 2010 Agenda Advanced Coding Schemes Use Phase Encoding To
More informationQ uantum key distribution (QKD)1 is an important technique for future quantum information applications.
OPEN SUBJECT AREAS: QUANTUM INFORMATION QUANTUM OPTICS Received 14 November 2013 Accepted 11 March 2014 Published 2 April 2014 A fiber-based quasi-continuous-wave quantum key distribution system Yong Shen,
More informationHigh Speed Homodyne Detector for Gaussian-Modulated Coherent-State Quantum Key Distribution. Yuemeng Chi
High Speed Homodyne Detector for Gaussian-Modulated Coherent-State Quantum Key Distribution by Yuemeng Chi A thesis submitted in conformity with the requirements for the degree of Master of Applied Science
More informationV.Sorge/E.Ritter, Handout 2
06-20008 Cryptography The University of Birmingham Autumn Semester 2015 School of Computer Science V.Sorge/E.Ritter, 2015 Handout 2 Summary of this handout: Symmetric Ciphers Overview Block Ciphers Feistel
More informationCOMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES
COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES Encoding Coding is the process of embedding clocks into a given data stream and producing a signal that can be transmitted over a selected medium.
More informationJones matrix analysis of high-precision displacement measuring interferometers
Jones matrix analysis of high-precision displacement measuring interferometers Peter de Groot, Laurel Brook Road, Middlefield, CT USA 06455 e-mail: peterd@zygo.com Abstract I analyze error sources in high-performance
More informationA New Logic Gate for High Speed Optical Signal Processing Using Mach- Zehnder Interferometer (MZI)
A New Logic Gate for High Speed Optical Signal Processing Using Mach- Zehnder Interferometer (MZI) Dr. Sanjeev Kumar 1, Bhushan Kumar 2, Akshay Singh 3 Assistant Professor, Department of Electronics and
More informationNEW APPROACH TO DESIGN DIGITALLY TUNABLE OPTICAL FILTER SYSTEM FOR WAVELENGTH SELEC- TIVE SWITCHING BASED OPTICAL NETWORKS
Progress In Electromagnetics Research Letters, Vol. 9, 93 100, 2009 NEW APPROACH TO DESIGN DIGITALLY TUNABLE OPTICAL FILTER SYSTEM FOR WAVELENGTH SELEC- TIVE SWITCHING BASED OPTICAL NETWORKS A. Banerjee
More informationLecture-8 Transmission of Signals
Lecture-8 Transmission of Signals The signals are transmitted as electromagnetic waveforms. As the signal may be analog or digital, there four case of signal transmission. Analog data Analog Signal:- The
More informationLecture 3: Wireless Physical Layer: Modulation Techniques. Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday
Lecture 3: Wireless Physical Layer: Modulation Techniques Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday Modulation We saw a simple example of amplitude modulation in the last lecture Modulation how
More informationThree-level Code Division Multiplex for Local Area Networks
Three-level Code Division Multiplex for Local Area Networks Mokhtar M. 1,2, Quinlan T. 1 and Walker S.D. 1 1. University of Essex, U.K. 2. Universiti Pertanian Malaysia, Malaysia Abstract: This paper reports
More informationNext-Generation Optical Fiber Network Communication
Next-Generation Optical Fiber Network Communication Naveen Panwar; Pankaj Kumar & manupanwar46@gmail.com & chandra.pankaj30@gmail.com ABSTRACT: In all over the world, much higher order off modulation formats
More informationA NEW APPROACH TO DESIGN DIGITALLY TUNABLE OPTICAL FILTER SYSTEM FOR DWDM OPTICAL NETWORKS
Progress In Electromagnetics Research M, Vol. 11, 213 223, 2010 A NEW APPROACH TO DESIGN DIGITALLY TUNABLE OPTICAL FILTER SYSTEM FOR DWDM OPTICAL NETWORKS A. Banerjee Department of Electronics and Communication
More informationData Transmission Definition Data Transmission Analog Transmission Digital Transmission
Data Transmission Definition Data Transmission Data transmission occurs between transmitter (sender) and receiver over some transmission medium. This transfer of data takes place via some form of transmission
More informationElectronically tunable fabry-perot interferometers with double liquid crystal layers
Electronically tunable fabry-perot interferometers with double liquid crystal layers Kuen-Cherng Lin *a, Kun-Yi Lee b, Cheng-Chih Lai c, Chin-Yu Chang c, and Sheng-Hsien Wong c a Dept. of Computer and
More informationarxiv: v1 [quant-ph] 23 Oct 2012
Experimental demonstration of long-distance continuous-variable quantum key distribution Paul Jouguet, 1, 2 Sébastien Kunz-Jacques, 2 Anthony Leverrier, 3 Philippe Grangier, 4 and Eleni Diamanti 1 1 LTCI,
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication
More informationModifications of the coherence radar for in vivo profilometry in dermatology
Modifications of the coherence radar for in vivo profilometry in dermatology P. Andretzky, M. W. Lindner, G. Bohn, J. Neumann, M. Schmidt, G. Ammon, and G. Häusler Physikalisches Institut, Lehrstuhl für
More information