• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 61
  • 8
  • 4
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 90
  • 90
  • 72
  • 35
  • 23
  • 21
  • 18
  • 17
  • 16
  • 16
  • 13
  • 11
  • 11
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

A Classical-Light Attack on Energy-Time Entangled Quantum Key Distribution, and Countermeasures

Jogenfors, Jonathan January 2015 (has links)
Quantum key distribution (QKD) is an application of quantum mechanics that allowstwo parties to communicate with perfect secrecy. Traditional QKD uses polarization of individual photons, but the development of energy-time entanglement could lead to QKD protocols robust against environmental effects. The security proofs of energy-time entangled QKD rely on a violation of the Bell inequality to certify the system as secure. This thesis shows that the Bell violation can be faked in energy-time entangled QKD protocols that involve a postselection step, such as Franson-based setups. Using pulsed and phase-modulated classical light, it is possible to circumvent the Bell test which allows for a local hidden-variable model to give the same predictions as the quantum-mechanical description. We show that this attack works experimentally and also how energy-time-entangled systems can be strengthened to avoid our attack.
62

High-speed continuous-variable quantum key distribution over atmospheric turbulent channels

Qu, Zhen, Djordjevic, Ivan B. 20 February 2017 (has links)
We experimentally demonstrate a RF-assisted four-state continuous-variable quantum key distribution (CV-QKD) system in the presence of turbulence. The atmospheric turbulence channel is emulated by two spatial light modulators (SLMs) on which two randomly generated azimuthal phase patterns are recorded yielding Andrews' azimuthal phase spectrum. Frequency and phase locking are not required in our system thanks to the proposed digital phase noise cancellation (PNC) stage. Besides, the transmittance fluctuation can be monitored accurately by the DC level in this PNC stage, which is free of post-processing noise. The mean excess noise is measured to be 0.014, and the maximum secret key rate of >20Mbit/s can be obtained with the transmittance of 0.85, while employing the commercial PIN photodetectors.
63

Active Phase Compensation in a Fiber-Optical Mach-Zehnder Interferometer / Aktiv faskompensation i en fiberoptisk Mach-Zehnder-interferometer.

Argillander, Joakim January 2020 (has links)
This thesis investigates the phenomena of phase stability in a fiber-optical MZI (Mach-Zehnder Interferometer). The MZI is a key building block of optical systems for use in experiments with both continuous-wave light and with single photons. By splitting incoming light into two beams and allowing it to interfere with itself, an interference pattern is visible at the output, and this phenomena can be used to code information. This is the operating principle in, for example, QKD (Quantum Key Distribution) experiments. This interference requires coherence that is higher than the length difference between the beams that the incoming light is split into. Particularly the phase of the beams must be equal to achieve constructive interference. If one beam is phase-shifted (with respect to the other) due to the light having traversed a longer path, only partially constructive interference is achieved. If the phase shift also varies with time this leads to a system where experiments can no longer reliably be performed. Sources of these fluctuations are thermal, acoustic or mechanical. Fiber-optical interferometers are particularly sensitive to path length fluctuations of the waveguides as the fiber-optic medium contracts and elongates with temperature, and also has a larger surface area for circulating air to mechanically disturb the waveguides than bulk optics interferometers. In this thesis, a solution to environment-induced phase drift is presented by evaluating implementations of feedback algorithms for automatic control. The algorithms PID (Proportional-, Integral-, Derivative controller) and an ICA (IncrementalControl Algorithm) have been investigated and the performance of these controllers has been compared when used with, and without, optical enclosures. The algorithms are implemented in an FPGA (Field-Programmable Gate Array) and the controller actuates an electro-optical phase modulator that can add a phase shift to one of the light beams in the MZI. This thesis shows that significant improvement in the optical stability can be achieved with active control compared to an interferometer without active phase control. / Det här examensarbetet undersöker fenomenet fasstabilitet i en fiber-optisk MZI (Mach-Zehnder-Interferometer). MZI:n är en viktig byggsten i optiska system som används till experiment med både kontinuerligt emitterande lasrar och med enskilda fotoner. Genom att dela upp inkommande ljus i två strålar och låta det interferera med sig själv så bildas ett interferensmöster vid utgången vilket kan användas för att koda information. Det här är huvudprincipen bakom, till exempel, experiment inom QKD (kvantnyckeldistribution, eng: Quantum Key Distribution). Denna interferens förutsätter en koherens (högre än längdskillnaden mellan strålarna) mellan strålarna som det inkommande ljuset är uppdelat i. Särskilt måste fasen hos de bägge strålarna vara lika för att åstadkomma fullständig konstruktiv intereferens. Om en stråle är fasförskjuten (i förhållande till den andra) på grund av att ljuset har färdats en längre sträcka så uppnås endast delvis konstruktiv interferens. Om fasförskjutningen även varierar med tiden så leder det till ett system där experiment inte längre kan pålitligt utföras. Sådana fluktuationer är orsakade av termiskt, akustiskt samt mekaniskt varierande effekter. Fiberoptiska interferometrar är särskilt känsliga mot förändringar i vågledarnas längd. Detta på grund av att det fiberoptiska mediet dras ihop respektive sträcks ut med temperaturen, samt att fibern har en större ytarea som cirkulerande luft kan påverka mekaniskt jämfört med interferometrar konstruerade av bulkoptik. I det här examensarbetet presenteras en lösning på problemet med miljöinducerad fasskift genom att utvärdera reglertekniska återkopplande algoritmer. Algoritmerna PID (Proportionell-, Integrerande-, Deriverande regulator) samt ICA (Inkrementell Regleralgoritm, eng: Incremental Control Algorithm) har undersökts och deras prestanda har jämförts med samt utan avskärmning. Algoritmerna har implementerats i en FPGA (fältprogrammerbar grindmatris, eng: Field-Programmable Gate Array) och regulatorn styr en elektrooptisk fasmodulator som kan addera en fasförskjutning till en av ljusstrålarna i MZI:n. Resultat visar att passiv avskärmning inte är tillräckligt utan behöver användas tillsammans med aktiv reglering för att uppnå stabilitet över en längre tidsperiod. Detta examensarbete visar på att en signifikant förbättring i den optiska stabiliteten kan uppnås med aktiv reglering jämfört med en interferometer utan aktiv fasreglering.
64

Development and validation of a receiver for free-space Quantum Key Distribution / Utveckling och validering av en mottagare för fri-rymd Kvantnyckeldistribution

B. Amaro, Mário January 2024 (has links)
Quantum Key Distribution (QKD) is a promising method for information exchange that relies on quantum mechanical principles to increase the security of encodedinformation in comparison with traditional cryptography. The objective of this degree project was to plan, build and validate a receiver system for Free-Space QKD. To testit, a simple state-preparation setup was built, using a 780 nm laser for the QKD channel and a 680 nm laser for tracking, and both were sent over a single free-spacequantum channel. On the receiver side, the beam is received by a telescope that focuses it into the eye-opening where the receiver is positioned. Here, the tracking laser isdeflected to a camera (intended for a tracking algorithm, to be implemented in the future) and the QKD laser beam is split, and its polarization measured in |H⟩/|V⟩ and|+⟩/|−⟩ basis. Finally, the system is validated by testing that the beam propagates over the free-space channel, that the polarization correction is properly applied and,finally, that each polarization is routed into the right detector. By replacing the test sender with another with a capacity for sending states random number generation, thedeveloped receiver should be able to take part in quantum communication via protocols such as BB84, B92 or Decoy-State. / Kvantnyckeldistribution (QKD) är en lovande metod för informationsutbyte som förlitar sig på kvantmekaniska principer för att öka säkerheten för kodad informationjämfört med traditionell kryptografi. Syftet med detta examensprojekt var att planera, bygga och validera ett mottagarsystem för Fritt Rymd QKD. För att testa det,byggdes en enkel state-preparation setup, med hjälp av en 780 nm laser för QKD kanal och en 680 nm- laser för spårning, och båda skickades över en enda fri-rymdkvantkanal. På mottagarens sida tas strålen emot av ett teleskop som fokuserar den i ögonöppningen där mottagaren är placerad. Här avlägsnas spårningslasern till enkamera (som är avsedd för en spåringsalgoritm, som ska genomföras i framtiden) och QKD-laserstrålen är uppdelad, och polariseringen mäts i |H⟩/|V⟩ och |+⟩/|−⟩ bas.Slutligen valideras systemet genom att testa att strålen sprider sig över den fria rymdkanalen, att polariseringskorrigering tillämpas korrekt och, slutligen, att varjepolarisering riktas till rätt detektor. Genom att ersätta testsändaren med en annan med en kapacitet för att sända stater slumptalsgenerering, bör den utvecklademottagaren kunna delta i kvantkommunikation via protokoll som BB84, B92 eller Decoy-State.
65

Integrated Optics Modules Based Proposal for Quantum Information Processing, Teleportation, QKD, and Quantum Error Correction Employing Photon Angular Momentum

Djordjevic, Ivan B. 02 1900 (has links)
To address key challenges for both quantum communication and quantum computing applications in a simultaneous manner, we propose to employ the photon angular momentum approach by invoking the well-known fact that photons carry both the spin angular momentum (SAM) and the orbital angular momentum (OAM). SAM is associated with polarization, while OAM is associated with azimuthal phase dependence of the complex electric field. Given that OAM eigenstates are mutually orthogonal, in principle, an arbitrary number of bits per single photon can be transmitted. The ability to generate/analyze states with different photon angular momentum, by using either holographic or interferometric methods, allows the realization of quantum states in multidimensional Hilbert space. Because OAM states provide an infinite basis state, while SAM states are 2-D only, the OAM can also be used to increase the security for quantum key distribution (QKD) applications and improve computational power for quantum computing applications. The goal of this paper is to describe photon angular momentum based deterministic universal quantum qudit gates, namely, {generalized-X, generalized-Z, generalized-CNOT} qudit gates, and different quantum modules of importance for various applications, including (fault-tolerant) quantum computing, teleportation, QKD, and quantum error correction. For instance, the basic quantum modules for quantum teleportation applications include the generalized-Bell-state generation module and the QFT-module. The basic quantum module for quantum error correction and fault-tolerant computing is the nonbinary syndrome calculator module. The basic module for entanglement assisted QKD is either the generalized-Bell-state generation module or the Weyl-operator-module. The possibility of implementing all these modules in integrated optics is discussed as well. Finally, we provide security analysis of entanglement assisted multidimensional QKD protocols, employing the proposed qudit modules, by taking into account the imperfect generation of OAM modes.
66

Metody návrhu bezpečnostních protokolů / Methods of the Security Protocols Design

Míchal, Luboš Unknown Date (has links)
The security protocols are widely used for providing safe communication. They are used for creating private communication channels in unsecured area. This thesis deals with the design of such protocols and their properties. The first part deals with properties and requirements of designed protocol as well as with the most common attacks on protocols. In the second part, the method of trace formula is described in more detail. This method is used for analytic design of security protocols. Later, the library of automated functions was created upon the principles of the method. The library support both the handling of protocol properties and protocol design. The thesis concludes with some examples of generated protocols.
67

Sistemas de comunicaÃÃo quÃntica usando interferÃmetro de Sagnac e dinÃmica do entrelaÃamento de estados bipartites de qubitis em canais ruidosos / Quantum communication systems using interferometer of Sagnac and dynamics of the entanglement of qubitis bipartites states in noisy channel

Wellington Alves de Brito 02 September 2006 (has links)
CoordenaÃÃo de AperfeiÃoamento de NÃvel Superior / O presente trabalho à divido em duas partes. Na primeira, a utilizaÃÃo do interferÃmetro de Sagnac em informaÃÃo quÃntica à analisada atravÃs da aplicaÃÃo do mesmo em trÃs problemas: MediÃÃo livre de interaÃÃo, distribuiÃÃo quÃntica de chaves e compartilhamento de segredo. Para a mediÃÃo livre de interaÃÃo, dois sistemas usando o Sagnac foram propostos. Considerando detectores ideais e ausÃncia de perdas, um deles apresenta probabilidade de sucesso de 25% por fÃton consumido, enquanto que o segundo apresenta probabilidade de determinar corretamente a presenÃa do objeto prÃxima a 100% por fÃton consumido. Para a distribuiÃÃo quÃntica de chaves foi proposta uma configuraÃÃo diferente das existentes, sendo a principal diferenÃa a ausÃncia de retorno do pulso enviado, como ocorre nos sistemas com Sagnac anteriormente propostos. Isto evita ataques do tipo Cavalo de TrÃia. Por fim, foi proposta uma configuraÃÃo Ãptica que permite que um segredo compartilhado por cinco pessoas, localmente distantes, seja usado apenas quando todos os cinco concordarem. A segunda parte da dissertaÃÃo apresenta um estudo analÃtico e numÃrico da variaÃÃo do entrelaÃamento de estados bipartites de qubits quando da propagaÃÃo dos mesmos em canais quÃnticos ruidosos. Em particular, foi encontrada uma fÃrmula exata que relaciona os entrelaÃamentos dos estados na entrada e saÃda do canal, quando o estado na entrada à puro e o canal à modelado pela interaÃÃo do estado bipartite (sinal) com um qubit (estado do canal) atravÃs de uma operaÃÃo unitÃria canÃnica. / This work is divided into two parts. In the first one, the use of the Sagnac interferometer in quantum information is analyzed applying it in three problems: interaction-free measurement, quantum key distribution, and secret sharing. For the interaction-free measurement two systems using Sagnac interferometer were proposed. Considering ideal detectors and loss less devices, one of them has a success probability of 25% for each photon used while the other presents the probability of getting success to detect the presence of the object close to 100% for each photon used. For quantum key distribution, it was proposed a different setup, where the main difference is that the pulse sent by the transmitter does not come back to him/her as happen with the systems based on Sagnac proposed before. This avoids the Trojan horse attack. Finally, it was proposed an optical configuration where it is possible to share a secret among five users, locally distant, that could be used only when all five persons agreed. The second part of this dissertation presents an analytical and numerical study of the entanglement variation of bipartite states of qubits during propagation in a quantum noisy channel. Particularly, it was found an exactly formula which relates the entanglement of states in the input and output of the channel, when the input state is pure and the channel is modeled by a canonical unitary operation.
68

Authentication in quantum key growing

Cederlöf, Jörgen January 2005 (has links)
<p>Quantum key growing, often called quantum cryptography or quantum key distribution, is a method using some properties of quantum mechanics to create a secret shared cryptography key even if an eavesdropper has access to unlimited computational power. A vital but often neglected part of the method is unconditionally secure message authentication. This thesis examines the security aspects of authentication in quantum key growing. Important concepts are formalized as Python program source code, a comparison between quantum key growing and a classical system using trusted couriers is included, and the chain rule of entropy is generalized to any Rényi entropy. Finally and most importantly, a security flaw is identified which makes the probability to eavesdrop on the system undetected approach unity as the system is in use for a long time, and a solution to this problem is provided.</p>
69

Authentication in quantum key growing

Cederlöf, Jörgen January 2005 (has links)
Quantum key growing, often called quantum cryptography or quantum key distribution, is a method using some properties of quantum mechanics to create a secret shared cryptography key even if an eavesdropper has access to unlimited computational power. A vital but often neglected part of the method is unconditionally secure message authentication. This thesis examines the security aspects of authentication in quantum key growing. Important concepts are formalized as Python program source code, a comparison between quantum key growing and a classical system using trusted couriers is included, and the chain rule of entropy is generalized to any Rényi entropy. Finally and most importantly, a security flaw is identified which makes the probability to eavesdrop on the system undetected approach unity as the system is in use for a long time, and a solution to this problem is provided. / ICG QC
70

Advanced Coding Techniques For Fiber-Optic Communications And Quantum Key Distribution

Zhang, Yequn January 2015 (has links)
Coding is an essential technology for efficient fiber-optic communications and secure quantum communications. In particular, low-density parity-check (LDPC) coding is favoured due to its strong error correction capability and high-throughput implementation feasibility. In fiber-optic communications, it has been realized that advanced high-order modulation formats and soft-decision forward error correction (FEC) such as LDPC codes are the key technologies for the next-generation high-speed optical communications. Therefore, energy-efficient LDPC coding in combination with advanced modulation formats is an important topic that needs to be studied for fiber-optic communications. In secure quantum communications, large-alphabet quantum key distribution (QKD) is becoming attractive recently due to its potential in improving the efficiency of key exchange. To recover the carried information bits, efficient information reconciliation is desirable, for which the use of LDPC coding is essential. In this dissertation, we first explore different efficient LDPC coding schemes for optical transmission of polarization-division multiplexed quadrature-amplitude modulation (QAM) signals. We show that high energy efficiency can be achieved without incurring extra overhead and complexity. We then study the transmission performance of LDPC-coded turbo equalization for QAM signals in a realistic fiber link as well as that of pragmatic turbo equalizers. Further, leveraging the polarization freedom of light, we expand the signal constellation into a four-dimensional (4D) space and evaluate the performance of LDPC-coded 4D signals in terms of transmission reach. Lastly, we study the security of a proposed weak-coherent-state large-alphabet QKD protocol and investigate the information reconciliation efficiency based on LDPC coding.

Page generated in 0.0781 seconds