-
Long-range Quantum Cryptography: Amplified Quantum Key Distribution (AQKD)
Authors:
Richard J. Hughes,
Jane E. Nordholt
Abstract:
Recently, Takeoka, Guha and Wilde have established a new (loose) upper bound on the secret key capacity of a pure-loss bosonic channel that is several times larger than an error-free BB84 QKD channel with same transmittance. This suggests that new QKD protocols may exist with higher secret key rates and effective ranges larger than the metro-area limits of BB84 QKD over optical fiber. In this pape…
▽ More
Recently, Takeoka, Guha and Wilde have established a new (loose) upper bound on the secret key capacity of a pure-loss bosonic channel that is several times larger than an error-free BB84 QKD channel with same transmittance. This suggests that new QKD protocols may exist with higher secret key rates and effective ranges larger than the metro-area limits of BB84 QKD over optical fiber. In this paper we illustrate such a possibility with a new protocol called Amplified Quantum Key Distribution (AQKD), which will be compatible with the optical amplification typically encountered on inter-city fiber spans. We analyze one instantiation of AQKD, in which the transmitter enclave contains an optical amplifier (OA), with security against passive optical tap**. For this scenario AQKD is shown to: give three times the secret key rate of BB84 at spans up to 100km, increasing to more than a ten-fold gain at 140km; and double the maximum single-span optical fiber transmission range to inter-city distances (300km). Essential to these performance gains is a new information-theoretic protocol post-processing stage called generalized advantage distillation (GAD). AQKD could be implemented with commercial off-the-shelf (COTS) hardware as an augmentation of present-day BB84 QKD. AQKD avoids the expense, complexity and resource duplication of "trusted relay" approaches to QKD range extension. We expect AQKD to be compatible with fiber spans containing intermediate OAs, which will facilitate its deployment as an overlay on existing fiber networks.
△ Less
Submitted 26 June, 2014;
originally announced June 2014.
-
Network-Centric Quantum Communications with Application to Critical Infrastructure Protection
Authors:
Richard J. Hughes,
Jane E. Nordholt,
Kevin P. McCabe,
Raymond T. Newell,
Charles G. Peterson,
Rolando D. Somma
Abstract:
Network-centric quantum communications (NQC) - a new, scalable instantiation of quantum cryptography providing key management with forward security for lightweight encryption, authentication and digital signatures in optical networks - is briefly described. Results from a multi-node experimental test-bed utilizing integrated photonics quantum communications components, known as QKarDs, include: qu…
▽ More
Network-centric quantum communications (NQC) - a new, scalable instantiation of quantum cryptography providing key management with forward security for lightweight encryption, authentication and digital signatures in optical networks - is briefly described. Results from a multi-node experimental test-bed utilizing integrated photonics quantum communications components, known as QKarDs, include: quantum identification; verifiable quantum secret sharing; multi-party authenticated key establishment, including group keying; and single-fiber quantum-secured communications that can be applied as a security retrofit/upgrade to existing optical fiber installations. A demonstration that NQC meets the challenging simultaneous latency and security requirements of electric grid control communications, which cannot be met without compromises using conventional cryptography, is described.
△ Less
Submitted 1 May, 2013;
originally announced May 2013.
-
Security of Decoy-State Protocols for General Photon-Number-Splitting Attacks
Authors:
Rolando D. Somma,
Richard J. Hughes
Abstract:
Decoy-state protocols provide a way to defeat photon-number splitting attacks in quantum cryptography implemented with weak coherent pulses. We point out that previous security analyses of such protocols relied on assumptions about eavesdrop** attacks that considered treating each pulse equally and independently. We give an example to demonstrate that, without such assumptions, the security para…
▽ More
Decoy-state protocols provide a way to defeat photon-number splitting attacks in quantum cryptography implemented with weak coherent pulses. We point out that previous security analyses of such protocols relied on assumptions about eavesdrop** attacks that considered treating each pulse equally and independently. We give an example to demonstrate that, without such assumptions, the security parameters of previous decoy-state implementations could be worse than the ones claimed. Next we consider more general photon-number splitting attacks, which correlate different pulses, and give an estimation procedure for the number of single photon signals with rigorous security statements. The impact of our result is that previous analyses of the number of times a decoy-state quantum cryptographic system can be reused before it makes a weak key must be revised.
△ Less
Submitted 18 April, 2013;
originally announced April 2013.
-
Practical long-distance quantum key distribution system using decoy levels
Authors:
D. Rosenberg,
C. G. Peterson,
J. W. Harrington,
P. R. Rice,
N. Dallmann,
K. T. Tyagi,
K. P. McCabe,
S. Nam,
B. Baek,
R. H. Hadfield,
R. J. Hughes,
J. E. Nordholt
Abstract:
Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully automated, robust QKD system based on t…
▽ More
Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully automated, robust QKD system based on the Bennett Brassard 1984 protocol (BB84) with low-noise superconducting nanowire single-photon detectors (SNSPDs) and decoy levels. Secret key is produced with unconditional security over a record 144.3 km of optical fibre, an increase of more than a factor of five compared to the previous record for unconditionally secure key generation in a practical QKD system.
△ Less
Submitted 18 June, 2008;
originally announced June 2008.
-
Long distance decoy state quantum key distribution in optical fiber
Authors:
Danna Rosenberg,
Jim W. Harrington,
Patrick R. Rice,
Philip A. Hiskett,
Charles G. Peterson,
Richard J. Hughes,
Adriana E. Lita,
Sae Woo Nam,
Jane E. Nordholt
Abstract:
The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian appro…
▽ More
The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian approximations in a one-way QKD system, enabling the creation of secure keys immune to photon-number-splitting attacks and highly resistant to Trojan horse attacks over 107 km of optical fiber.
△ Less
Submitted 2 May, 2007; v1 submitted 26 July, 2006;
originally announced July 2006.
-
Long-distance quantum key distribution in optical fiber
Authors:
P. A. Hiskett,
D. Rosenberg,
C. G. Peterson,
R. J. Hughes,
S. Nam,
A. E. Lita,
A. J. Miller,
J. E. Nordholt
Abstract:
Use of low-noise detectors can both increase the secret bit rate of long-distance quantum key distribution (QKD) and dramatically extend the length of a fibre optic link over which secure key can be distributed. Previous work has demonstrated use of ultra-low-noise transition-edge sensors (TESs) in a QKD system with transmission over 50 km. In this work, we demonstrate the potential of the TESs…
▽ More
Use of low-noise detectors can both increase the secret bit rate of long-distance quantum key distribution (QKD) and dramatically extend the length of a fibre optic link over which secure key can be distributed. Previous work has demonstrated use of ultra-low-noise transition-edge sensors (TESs) in a QKD system with transmission over 50 km. In this work, we demonstrate the potential of the TESs by successfully generating error-corrected, privacy-amplified key over 148.7 km of dark optical fibre at a mean photon number mu = 0.1, or 184.6 km of dark optical fibre at a mean photon number of 0.5. We have also exchanged secret key over 67.5 km that is secure against powerful photon-number-splitting attacks.
△ Less
Submitted 25 July, 2006;
originally announced July 2006.
-
Quantum key distribution at telecom wavelengths with noise-free detectors
Authors:
Danna Rosenberg,
Sae Woo Nam,
Philip A. Hiskett,
Charles G. Peterson,
Richard J. Hughes,
Jane E. Nordholt,
Adriana E. Lita,
Aaron J. Miller
Abstract:
The length of a secure link over which a quantum key can be distributed depends on the efficiency and dark-count rate of the detectors used at the receiver. We report on the first demonstration of quantum key distribution using transition-edge sensors with high efficiency and negligible dark-count rates. Using two methods of synchronization, a bright optical pulse scheme and an electrical signal…
▽ More
The length of a secure link over which a quantum key can be distributed depends on the efficiency and dark-count rate of the detectors used at the receiver. We report on the first demonstration of quantum key distribution using transition-edge sensors with high efficiency and negligible dark-count rates. Using two methods of synchronization, a bright optical pulse scheme and an electrical signal scheme, we have successfully distributed key material at 1,550 nm over 50 km of optical fiber. We discuss how use of these detectors in a quantum key distribution system can result in dramatic increases in range and performance.
△ Less
Submitted 9 October, 2005;
originally announced October 2005.
-
Enhancing practical security of quantum key distribution with a few decoy states
Authors:
Jim W. Harrington,
J. Mark Ettinger,
Richard J. Hughes,
Jane E. Nordholt
Abstract:
Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an eavesdropper, but the decoy state method can detect this attack with current technology, yielding a high rate of secret bits. In this Letter, we develop rigorous security statements in the case of finite sta…
▽ More
Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an eavesdropper, but the decoy state method can detect this attack with current technology, yielding a high rate of secret bits. In this Letter, we develop rigorous security statements in the case of finite statistics with only a few decoy states, and we present the results of simulations of an experimental setup of a decoy state protocol that can be simply realized with current technology.
△ Less
Submitted 1 March, 2005;
originally announced March 2005.
-
Comment on "Quantum key distribution with 1.25 Gbps clock synchronization" by J.C. Bienfang et al., quant-ph/0405097
Authors:
Richard J. Hughes,
Jane E. Nordholt
Abstract:
We analyze the significance for quantum key distribution (QKD) of free-space quantum communications results reported in a recent paper (J. C. Bienfang et al., quant-ph/0405097, hereafter referred to as "Bienfang et al."), who contrast the quantum communications rate of their partial QKD implementation (which does not produce cryptographically useful shared, secret keys) over a short transmission…
▽ More
We analyze the significance for quantum key distribution (QKD) of free-space quantum communications results reported in a recent paper (J. C. Bienfang et al., quant-ph/0405097, hereafter referred to as "Bienfang et al."), who contrast the quantum communications rate of their partial QKD implementation (which does not produce cryptographically useful shared, secret keys) over a short transmission distance, with the secret bit rates of previous full QKD implementations over much longer distances. We show that when a cryptographically relevant comparison with previous results is made, the system described by Bienfang et al. would offer no advantages for QKD, contrary to assertions in their paper and in spite of its high clock rate. Further, we show that the claim made by Bienfang et al. that "high transmission rates serve ... to extend the distance over which a QKD system can operate" is incorrect. Our analysis illustrates an important aspect of QKD that is too often overlooked in experiments: the sifted bit rate can be a highly misleading indicator of the performance of a QKD system.
△ Less
Submitted 6 July, 2004;
originally announced July 2004.
-
Practical free-space quantum key distribution over 10 km in daylight and at night
Authors:
Richard J. Hughes,
Jane E. Nordholt,
Derek Derkacs,
Charles G. Peterson
Abstract:
We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency…
▽ More
We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency, we infer that free-space QKD will be practical over much longer ranges under these and other atmospheric and instrumental conditions.
△ Less
Submitted 13 June, 2002;
originally announced June 2002.
-
Dynamical Stability of an Ion in a Linear Trap as a Solid-State Problem of Electron Localization
Authors:
G. P. Berman,
A. R. Bishop,
D. F. V. James,
R. J. Hughes,
D. I. Kamenev
Abstract:
When an ion confined in a linear ion trap interacts with a coherent laser field, the internal degrees of freedom, related to the electron transitions, couple to the vibrational degree of freedom of the ion. As a result of this interaction, quantum dynamics of the vibrational degree of freedom becomes complicated, and in some ranges of parameters even chaotic. We analyze the vibrational ion dynam…
▽ More
When an ion confined in a linear ion trap interacts with a coherent laser field, the internal degrees of freedom, related to the electron transitions, couple to the vibrational degree of freedom of the ion. As a result of this interaction, quantum dynamics of the vibrational degree of freedom becomes complicated, and in some ranges of parameters even chaotic. We analyze the vibrational ion dynamics using a formal analogy with the solid-state problem of electron localization. In particular, we show how the resonant approximation used in analysis of the ion dynamics, leads to a transition from a two-dimensional (2D) to a one-dimensional problem (1D) of electron localization. The localization length in the solid-state problem is estimated in cases of weak and strong interaction between the cites of the 2D cell by using the methods of resonance perturbation theory, common in analysis of 1D time-dependent dynamical systems.
△ Less
Submitted 18 December, 2000;
originally announced December 2000.
-
Observation of power-law scaling for phase transitions in linear trapped ion crystals
Authors:
D. G. Enzer,
M. M. Schauer,
J. J. Gomez,
M. S. Gulley,
M. H. Holzscheiter,
P. G. Kwiat,
S. K. Lamoreaux,
C. G. Peterson,
V. D. Sandberg,
D. Tupa,
A. G. White,
R. J. Hughes,
D. F. V. James
Abstract:
We report an experimental confirmation of the power-law relationship between the critical anisotropy parameter and ion number for the linear-to-zigzag phase transition in an ionic crystal. Our experiment uses laser cooled calcium ions confined in a linear radio-frequency trap. Measurements for up to 10 ions are in good agreement with theoretical and numeric predictions. Implications on an upper…
▽ More
We report an experimental confirmation of the power-law relationship between the critical anisotropy parameter and ion number for the linear-to-zigzag phase transition in an ionic crystal. Our experiment uses laser cooled calcium ions confined in a linear radio-frequency trap. Measurements for up to 10 ions are in good agreement with theoretical and numeric predictions. Implications on an upper limit to the size of data registers in ion trap quantum computers are discussed.
△ Less
Submitted 9 August, 2000;
originally announced August 2000.
-
Daylight quantum key distribution over 1.6 km
Authors:
W. T. Buttler,
R. J. Hughes,
S. K. Lamoreaux,
G. L. Morgan,
J. E. Nordholt,
C. G. Peterson
Abstract:
Quantum key distribution (QKD) has been demonstrated over a point-to-point $\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.
Quantum key distribution (QKD) has been demonstrated over a point-to-point $\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.
△ Less
Submitted 24 January, 2000;
originally announced January 2000.
-
Nesting properties and anisotropy of the Fermi surface of LuNi$_{2}$B$_{2}$C
Authors:
S. B. Dugdale,
M. A. Alam,
I. Wilkinson,
R. J. Hughes,
I. R. Fisher,
P. C. Canfield,
G. Santi,
T. Jarlborg
Abstract:
The rare earth nickel borocarbides, with the generic formula $R$Ni$_{2}$B$_{2}$C, have recently been shown to display a rich variety of phenomena. Most striking has been the competition between, and even coexistence of, antiferromagnetism and superconductivity. We have measured the Fermi surface (FS) of LuNi$_{2}$B$_{2}$C, and shown that it possesses nesting features capable of explaining some o…
▽ More
The rare earth nickel borocarbides, with the generic formula $R$Ni$_{2}$B$_{2}$C, have recently been shown to display a rich variety of phenomena. Most striking has been the competition between, and even coexistence of, antiferromagnetism and superconductivity. We have measured the Fermi surface (FS) of LuNi$_{2}$B$_{2}$C, and shown that it possesses nesting features capable of explaining some of the phenomena experimentally observed. In particular, it had previously been conjectured that a particular sheet of FS is responsible for the modulated magnetic structures manifest in some of the series. We report the first direct experimental observation of this sheet.
△ Less
Submitted 13 July, 1999;
originally announced July 1999.
-
Practical quantum cryptography for secure free-space communications
Authors:
Richard J. Hughes,
William T. Buttler,
Paul G. Kwiat,
Steve K. Lamoreaux,
George L. Morgan,
Jane E. Nordholt,
C. G. Peterson
Abstract:
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the qu…
▽ More
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.
△ Less
Submitted 4 May, 1999;
originally announced May 1999.
-
Practical quantum key distribution over a 48-km optical fiber network
Authors:
Richard J. Hughes,
George L. Morgan,
C. Glen Peterson
Abstract:
The secure distribution of the secret random bit sequences known as "key" material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmiss…
▽ More
The secure distribution of the secret random bit sequences known as "key" material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdrop** raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. Here we report the most recent results of our optical fiber experiment in which we have performed quantum key distribution over a 48-km optical fiber network at Los Alamos using photon interference states with the B92 and BB84 quantum key distribution protocols.
△ Less
Submitted 8 April, 1999;
originally announced April 1999.
-
Dynamical Stability and Quantum Chaos of Ions in a Linear Trap
Authors:
G. P. Berman,
D. F. V. James,
R. J. Hughes,
M. S. Gulley,
M. H. Holzscheiter,
G. V. Lopez
Abstract:
The realization of a paradigm chaotic system, namely the harmonically driven oscillator, in the quantum domain using cold trapped ions driven by lasers is theoretically investigated. The simplest characteristics of regular and chaotic dynamics are calculated. The possibilities of experimental realization are discussed.
The realization of a paradigm chaotic system, namely the harmonically driven oscillator, in the quantum domain using cold trapped ions driven by lasers is theoretically investigated. The simplest characteristics of regular and chaotic dynamics are calculated. The possibilities of experimental realization are discussed.
△ Less
Submitted 18 March, 1999;
originally announced March 1999.
-
Trapped Ion Quantum Computer Research at Los Alamos
Authors:
D. F. V. James,
M. S. Gulley,
M. H. Holzscheiter,
R. J. Hughes,
P. G. Kwiat,
S. K. Lamoreaux,
C. G. Peterson,
V. D. Sandberg,
M. M. Schauer,
C. M. Simmons,
D. Tupa,
P. Z. Wang,
A. G. White
Abstract:
We briefly review the development and theory of an experiment to investigate quantum computation with trapped calcium ions. The ion trap, laser and ion requirements are determined, and the parameters required for simple quantum logic operations are described
We briefly review the development and theory of an experiment to investigate quantum computation with trapped calcium ions. The ion trap, laser and ion requirements are determined, and the parameters required for simple quantum logic operations are described
△ Less
Submitted 24 July, 1998;
originally announced July 1998.
-
Practical free-space quantum key distribution over 1 km
Authors:
W. T. Buttler,
R. J. Hughes,
P. G. Kwiat,
S. K. Lamoreaux,
G. G. Luther,
G. L. Morgan,
J. E. Nordholt,
C. G. Peterson,
C. M. Simmons
Abstract:
A working free-space quantum key distribution (QKD) system has been developed and tested over an outdoor optical path of ~1 km at Los Alamos National Laboratory under nighttime conditions. Results show that QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.
A working free-space quantum key distribution (QKD) system has been developed and tested over an outdoor optical path of ~1 km at Los Alamos National Laboratory under nighttime conditions. Results show that QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.
△ Less
Submitted 22 May, 1998;
originally announced May 1998.
-
Free-space quantum key distribution
Authors:
W. T. Buttler,
R. J. Hughes,
P. G. Kwiat,
G. G. Luther,
G. L. Morgan,
J. E. Nordholt,
C. G. Peterson,
C. M. Simmons
Abstract:
A working free-space quantum key distribution (QKD) system has been developed and tested over a 205-m indoor optical path at Los Alamos National Laboratory under fluorescent lighting conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly.
A working free-space quantum key distribution (QKD) system has been developed and tested over a 205-m indoor optical path at Los Alamos National Laboratory under fluorescent lighting conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly.
△ Less
Submitted 6 January, 1998;
originally announced January 1998.
-
Cryptography, Quantum Computation and Trapped Ions
Authors:
Richard J. Hughes
Abstract:
The significance of quantum computation for cryptography is discussed. Following a brief survey of the requirements for quantum computational hardware, an overview of the ion trap quantum computation project at Los Alamos is presented. The physical limitations to quantum computation with trapped ions are analyzed and an assessment of the computational potential of the technology is made.
The significance of quantum computation for cryptography is discussed. Following a brief survey of the requirements for quantum computational hardware, an overview of the ion trap quantum computation project at Los Alamos is presented. The physical limitations to quantum computation with trapped ions are analyzed and an assessment of the computational potential of the technology is made.
△ Less
Submitted 23 December, 1997;
originally announced December 1997.
-
The Los Alamos Trapped Ion Quantum Computer Experiment
Authors:
R. J. Hughes,
D. F. V. James,
J. J. Gomez,
M. S. Gulley,
M. H. Holzscheiter,
P. G. Kwiat,
S. K. Lamoreaux,
C. G. Peterson,
V. D. Sandberg,
M. M. Schauer,
C. M. Simmons,
C. E. Thorburn,
D. Tupa,
P. Z. Wang,
A. G. White
Abstract:
The development and theory of an experiment to investigate quantum computation with trapped calcium ions is described. The ion trap, laser and ion requirements are determined, and the parameters required for quantum logic operations as well as simple quantum factoring are described.
The development and theory of an experiment to investigate quantum computation with trapped calcium ions is described. The ion trap, laser and ion requirements are determined, and the parameters required for quantum logic operations as well as simple quantum factoring are described.
△ Less
Submitted 27 August, 1997;
originally announced August 1997.
-
Decoherence Bounds on Quantum Computation with Trapped Ions
Authors:
Richard J. Hughes,
Daniel F. V. James,
Emanuel H. Knill,
Raymond Laflamme,
Albert G. Petschek
Abstract:
Using simple physical arguments we investigate the capabilities of a quantum computer based on cold trapped ions. From the limitations imposed on such a device by spontaneous decay, laser phase coherence, ion heating and other sources of error, we derive a bound between the number of laser interactions and the number of ions that may be used. The largest number which may be factored using a vari…
▽ More
Using simple physical arguments we investigate the capabilities of a quantum computer based on cold trapped ions. From the limitations imposed on such a device by spontaneous decay, laser phase coherence, ion heating and other sources of error, we derive a bound between the number of laser interactions and the number of ions that may be used. The largest number which may be factored using a variety of species of ion is determined.
△ Less
Submitted 23 April, 1996;
originally announced April 1996.
-
Distribution Function Analysis of Mesoscopic Hop** Conductance Fluctuations
Authors:
R. J. F. Hughes,
A. K. Savchenko,
J. E. F. Frost,
E. H. Linfield,
J. T. Nicholls,
M. Pepper,
E. Kogan,
M. Kaveh
Abstract:
Variable-range hop** (VRH) conductance fluctuations in the gate-voltage characteristics of mesoscopic GaAs and Si transistors are analyzed by means of their full distribution functions (DFs). The forms of the DF predicted by the theory of Raikh and Ruzin have been verified under controlled conditions for both the long, narrow wire and the short, wide channel geometries. The variation of the me…
▽ More
Variable-range hop** (VRH) conductance fluctuations in the gate-voltage characteristics of mesoscopic GaAs and Si transistors are analyzed by means of their full distribution functions (DFs). The forms of the DF predicted by the theory of Raikh and Ruzin have been verified under controlled conditions for both the long, narrow wire and the short, wide channel geometries. The variation of the mean square fluctuation size with temperature in wires fabricated from both materials is found to be described quantitatively by Lee's model of VRH along a 1D chain. Armed with this quantitative validation of the VRH model, the DF method is applied to the problem of magnetoconductance in the insulating regime. Here a non-monotonic variation of the magnetoconductance is observed in Si MOSFETS whose sign at low magnetic fields is dependent on the channel geometry. The origin of this defect is discussed within the framework of the interference model of VRH magnetoconductance in terms of narrowing of the DF in a magnetic field.
△ Less
Submitted 25 April, 1996; v1 submitted 8 March, 1996;
originally announced March 1996.
-
Quantum Cryptography
Authors:
Richard J. Hughes,
D. M. Alde,
P. Dyer,
G. G. Luther,
G. L. Morgan,
M. Schauer
Abstract:
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature. In this paper we shall describe the theory of quantum cryptography, its potential relevance and the development of a prototype system at Los Alamos, which utilises the phenomenon of single-photon interference to perform quantum cryptography over an opti…
▽ More
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature. In this paper we shall describe the theory of quantum cryptography, its potential relevance and the development of a prototype system at Los Alamos, which utilises the phenomenon of single-photon interference to perform quantum cryptography over an optical fiber communications link.
△ Less
Submitted 3 April, 1995;
originally announced April 1995.