scholarly journals Autocompensating high-dimensional quantum cryptography by phase conjugation in optical fibers

2020 ◽  
Vol 238 ◽  
pp. 11004
Author(s):  
Jesús Liñares-Beiras ◽  
Xesús Prieto-Blanco ◽  
Daniel Balado ◽  
Gabriel M. Carral

We present a system based on phase conjugation in optical fibers for autocompensating highdimensional quantum cryptohraphy. Phase changes and coupling effects are auto-compensated by a single loop between Alice and Bob. Bob uses a source of coherent states and next Alice attenuate them up to a single photon level and thus 1-qudit states are generated for implementing a particular QKD protocol, for instance the BB84 one, together with decoy states to detect eavesdropping attacks.

2021 ◽  
Author(s):  
Shuang-Yin Huang ◽  
Zhou-Xiang Wang ◽  
Min Wang ◽  
Qian-Qian Tian ◽  
Chenghou Tu ◽  
...  

2010 ◽  
Vol 82 (6) ◽  
Author(s):  
Marco Barbieri ◽  
Nicolò Spagnolo ◽  
Marco G. Genoni ◽  
Franck Ferreyrol ◽  
Rémi Blandino ◽  
...  

2008 ◽  
Author(s):  
K. V. Smirnov ◽  
Yu. B. Vachtomin ◽  
R. V. Ozhegov ◽  
I. V. Pentin ◽  
E. V. Slivinskaya ◽  
...  

2018 ◽  
Vol 25 (02) ◽  
pp. 1850007 ◽  
Author(s):  
Anita Da̧browska

Using Gardiner and Collet’s input-output model and the concept of cascade system, we determine the filtering equation for a quantum system driven by light in some specific nonclassical states. The quantum system and electromagnetic field are described by making use of quantum stochastic unitary evolution. We consider two examples of the nonclassical states of field: a combination of vacuum and single photon states and a mixture of two coherent states. The stochastic evolution conditioned on the results of the photon counting and quadrature measurements is described.


2014 ◽  
Vol 14 (3&4) ◽  
pp. 236-254
Author(s):  
Xiao-Ming Xiu ◽  
Li Dong ◽  
Hong-Zhi Shen ◽  
Ya-Jun Gao ◽  
X. X. Yi

We propose a protocol of quantum privacy comparison with polarization-entangled Einstein-Podolsky-Rosen (Bell) states and the coherent states. One of two legitimate participants, Alice, prepares polarization-entangled Bell states and keeps one photon of each photon pair and sends the other photons to the third party, Charlie. Receiving the photons, Charlie performs single-photon transformation operations on them and then sends them to the other legitimate participant, Bob. Three participants adopt parity analysis method to check the distribution security of Bell states. Exploiting polarization beam splitters and nonlinear interactions mediated by the probe coherent states in Kerr media, Alice and Bob check the parities of their photons using the bases of $\{\ket H, \ket V\}$ or $\{\ket +, \ket -\}$. On the basis of the parity analysis outcomes and Charlie's publicized information, they can analyze the security of the distributed quantum channel. Confirming secure distribution of the shared Bell states, two participants perform respective parity measurements on the privacy photons and own photons of Bell states, and then send the results to Charlie. According to information provided by two legitimate participants and his single-qubit transformation operations, Charlie compares the privacy information of Alice and Bob and publicizes the conclusion.


2011 ◽  
Vol 11 (1&2) ◽  
pp. 124-141
Author(s):  
Nguyen B. An ◽  
Kisik Kim ◽  
Jaewan Kim

We propose a scheme to generate a recently introduced type of entangled coherent states using realistic weak cross-Kerr nonlinearities and intense laser beams. An intense laser can be filtered to make a faint one to be used for production of a single photon which is necessary in our scheme. The optical devices used are conventional ones such as interferometer, mirrors, beam-splitters, phase-shifters and photo-detectors. We also provide a detailed analysis on the effects of possible imperfections and decoherence showing that our scheme is robust against such effects.


Sign in / Sign up

Export Citation Format

Share Document