Skip to main content

Showing 1–25 of 25 results for author: Hughes, R J

.
  1. arXiv:1406.6990  [pdf

    quant-ph

    Long-range Quantum Cryptography: Amplified Quantum Key Distribution (AQKD)

    Authors: Richard J. Hughes, Jane E. Nordholt

    Abstract: Recently, Takeoka, Guha and Wilde have established a new (loose) upper bound on the secret key capacity of a pure-loss bosonic channel that is several times larger than an error-free BB84 QKD channel with same transmittance. This suggests that new QKD protocols may exist with higher secret key rates and effective ranges larger than the metro-area limits of BB84 QKD over optical fiber. In this pape… ▽ More

    Submitted 26 June, 2014; originally announced June 2014.

    Comments: To be presented at QCrypt2014

    Report number: LA-UR 14-22960

  2. arXiv:1305.0305  [pdf

    quant-ph cs.CR

    Network-Centric Quantum Communications with Application to Critical Infrastructure Protection

    Authors: Richard J. Hughes, Jane E. Nordholt, Kevin P. McCabe, Raymond T. Newell, Charles G. Peterson, Rolando D. Somma

    Abstract: Network-centric quantum communications (NQC) - a new, scalable instantiation of quantum cryptography providing key management with forward security for lightweight encryption, authentication and digital signatures in optical networks - is briefly described. Results from a multi-node experimental test-bed utilizing integrated photonics quantum communications components, known as QKarDs, include: qu… ▽ More

    Submitted 1 May, 2013; originally announced May 2013.

    Comments: 7 pages, 3 figures

    Report number: LA-UR-13-22718 (version 2)

  3. Security of Decoy-State Protocols for General Photon-Number-Splitting Attacks

    Authors: Rolando D. Somma, Richard J. Hughes

    Abstract: Decoy-state protocols provide a way to defeat photon-number splitting attacks in quantum cryptography implemented with weak coherent pulses. We point out that previous security analyses of such protocols relied on assumptions about eavesdrop** attacks that considered treating each pulse equally and independently. We give an example to demonstrate that, without such assumptions, the security para… ▽ More

    Submitted 18 April, 2013; originally announced April 2013.

    Comments: 9 pages and 4 figures

    Report number: LA-UR 13-20168

    Journal ref: Physical Review A 87, 062330 (2013)

  4. Practical long-distance quantum key distribution system using decoy levels

    Authors: D. Rosenberg, C. G. Peterson, J. W. Harrington, P. R. Rice, N. Dallmann, K. T. Tyagi, K. P. McCabe, S. Nam, B. Baek, R. H. Hadfield, R. J. Hughes, J. E. Nordholt

    Abstract: Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully automated, robust QKD system based on t… ▽ More

    Submitted 18 June, 2008; originally announced June 2008.

    Comments: 9 pages

    Report number: LA-UR-07-7070

    Journal ref: New J. Phys. 11, 045009 (2009)

  5. Long distance decoy state quantum key distribution in optical fiber

    Authors: Danna Rosenberg, Jim W. Harrington, Patrick R. Rice, Philip A. Hiskett, Charles G. Peterson, Richard J. Hughes, Adriana E. Lita, Sae Woo Nam, Jane E. Nordholt

    Abstract: The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian appro… ▽ More

    Submitted 2 May, 2007; v1 submitted 26 July, 2006; originally announced July 2006.

    Comments: 4 pages, 3 figures

    Report number: LA-UR-06-5220

    Journal ref: Phys. Rev. Lett. 98 010503 (2007)

  6. Long-distance quantum key distribution in optical fiber

    Authors: P. A. Hiskett, D. Rosenberg, C. G. Peterson, R. J. Hughes, S. Nam, A. E. Lita, A. J. Miller, J. E. Nordholt

    Abstract: Use of low-noise detectors can both increase the secret bit rate of long-distance quantum key distribution (QKD) and dramatically extend the length of a fibre optic link over which secure key can be distributed. Previous work has demonstrated use of ultra-low-noise transition-edge sensors (TESs) in a QKD system with transmission over 50 km. In this work, we demonstrate the potential of the TESs… ▽ More

    Submitted 25 July, 2006; originally announced July 2006.

    Comments: 7 pages, 4 figures

    Report number: LA-UR-06-3212

  7. Quantum key distribution at telecom wavelengths with noise-free detectors

    Authors: Danna Rosenberg, Sae Woo Nam, Philip A. Hiskett, Charles G. Peterson, Richard J. Hughes, Jane E. Nordholt, Adriana E. Lita, Aaron J. Miller

    Abstract: The length of a secure link over which a quantum key can be distributed depends on the efficiency and dark-count rate of the detectors used at the receiver. We report on the first demonstration of quantum key distribution using transition-edge sensors with high efficiency and negligible dark-count rates. Using two methods of synchronization, a bright optical pulse scheme and an electrical signal… ▽ More

    Submitted 9 October, 2005; originally announced October 2005.

    Report number: LA-UR-05-7050

    Journal ref: Applied Physics Letters 88, 021108 (2006)

  8. arXiv:quant-ph/0503002  [pdf, ps, other

    quant-ph

    Enhancing practical security of quantum key distribution with a few decoy states

    Authors: Jim W. Harrington, J. Mark Ettinger, Richard J. Hughes, Jane E. Nordholt

    Abstract: Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an eavesdropper, but the decoy state method can detect this attack with current technology, yielding a high rate of secret bits. In this Letter, we develop rigorous security statements in the case of finite sta… ▽ More

    Submitted 1 March, 2005; originally announced March 2005.

    Comments: 4 pages, 5 figures, RevTex 4

    Report number: LA-UR-05-1156

  9. arXiv:quant-ph/0407050  [pdf

    quant-ph

    Comment on "Quantum key distribution with 1.25 Gbps clock synchronization" by J.C. Bienfang et al., quant-ph/0405097

    Authors: Richard J. Hughes, Jane E. Nordholt

    Abstract: We analyze the significance for quantum key distribution (QKD) of free-space quantum communications results reported in a recent paper (J. C. Bienfang et al., quant-ph/0405097, hereafter referred to as "Bienfang et al."), who contrast the quantum communications rate of their partial QKD implementation (which does not produce cryptographically useful shared, secret keys) over a short transmission… ▽ More

    Submitted 6 July, 2004; originally announced July 2004.

    Comments: 4 pages

    Report number: LA-UR-04-4297

  10. Practical free-space quantum key distribution over 10 km in daylight and at night

    Authors: Richard J. Hughes, Jane E. Nordholt, Derek Derkacs, Charles G. Peterson

    Abstract: We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency… ▽ More

    Submitted 13 June, 2002; originally announced June 2002.

    Comments: 15 pages, 7 figures, 1 table; to be published in New Journal of Physics: http://www.njp.org

    Report number: LA-UR-02-449

  11. Dynamical Stability of an Ion in a Linear Trap as a Solid-State Problem of Electron Localization

    Authors: G. P. Berman, A. R. Bishop, D. F. V. James, R. J. Hughes, D. I. Kamenev

    Abstract: When an ion confined in a linear ion trap interacts with a coherent laser field, the internal degrees of freedom, related to the electron transitions, couple to the vibrational degree of freedom of the ion. As a result of this interaction, quantum dynamics of the vibrational degree of freedom becomes complicated, and in some ranges of parameters even chaotic. We analyze the vibrational ion dynam… ▽ More

    Submitted 18 December, 2000; originally announced December 2000.

    Comments: 18 pages RevTex

    Report number: LAUR-00-5817

  12. Observation of power-law scaling for phase transitions in linear trapped ion crystals

    Authors: D. G. Enzer, M. M. Schauer, J. J. Gomez, M. S. Gulley, M. H. Holzscheiter, P. G. Kwiat, S. K. Lamoreaux, C. G. Peterson, V. D. Sandberg, D. Tupa, A. G. White, R. J. Hughes, D. F. V. James

    Abstract: We report an experimental confirmation of the power-law relationship between the critical anisotropy parameter and ion number for the linear-to-zigzag phase transition in an ionic crystal. Our experiment uses laser cooled calcium ions confined in a linear radio-frequency trap. Measurements for up to 10 ions are in good agreement with theoretical and numeric predictions. Implications on an upper… ▽ More

    Submitted 9 August, 2000; originally announced August 2000.

    Comments: Physical Review Letters in press, 4 pages, 4 figures

    Report number: LAUR 99-6177

    Journal ref: Physical Review Letters 85, no. 12, 2466-2470 (2000)

  13. Daylight quantum key distribution over 1.6 km

    Authors: W. T. Buttler, R. J. Hughes, S. K. Lamoreaux, G. L. Morgan, J. E. Nordholt, C. G. Peterson

    Abstract: Quantum key distribution (QKD) has been demonstrated over a point-to-point $\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

    Submitted 24 January, 2000; originally announced January 2000.

    Comments: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for publication consideration

    Report number: LAUR-00-116

  14. Nesting properties and anisotropy of the Fermi surface of LuNi$_{2}$B$_{2}$C

    Authors: S. B. Dugdale, M. A. Alam, I. Wilkinson, R. J. Hughes, I. R. Fisher, P. C. Canfield, G. Santi, T. Jarlborg

    Abstract: The rare earth nickel borocarbides, with the generic formula $R$Ni$_{2}$B$_{2}$C, have recently been shown to display a rich variety of phenomena. Most striking has been the competition between, and even coexistence of, antiferromagnetism and superconductivity. We have measured the Fermi surface (FS) of LuNi$_{2}$B$_{2}$C, and shown that it possesses nesting features capable of explaining some o… ▽ More

    Submitted 13 July, 1999; originally announced July 1999.

    Comments: 4 pages, 4 PS figures

  15. Practical quantum cryptography for secure free-space communications

    Authors: Richard J. Hughes, William T. Buttler, Paul G. Kwiat, Steve K. Lamoreaux, George L. Morgan, Jane E. Nordholt, C. G. Peterson

    Abstract: Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the qu… ▽ More

    Submitted 4 May, 1999; originally announced May 1999.

    Comments: 12 pages, 4 figures

    Report number: LA-UR-99-737

  16. Practical quantum key distribution over a 48-km optical fiber network

    Authors: Richard J. Hughes, George L. Morgan, C. Glen Peterson

    Abstract: The secure distribution of the secret random bit sequences known as "key" material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmiss… ▽ More

    Submitted 8 April, 1999; originally announced April 1999.

    Comments: 13 pages, 7 figures, .pdf format submitted to Journal of Modern Optics

    Report number: LA-UR-99-1593

  17. Dynamical Stability and Quantum Chaos of Ions in a Linear Trap

    Authors: G. P. Berman, D. F. V. James, R. J. Hughes, M. S. Gulley, M. H. Holzscheiter, G. V. Lopez

    Abstract: The realization of a paradigm chaotic system, namely the harmonically driven oscillator, in the quantum domain using cold trapped ions driven by lasers is theoretically investigated. The simplest characteristics of regular and chaotic dynamics are calculated. The possibilities of experimental realization are discussed.

    Submitted 18 March, 1999; originally announced March 1999.

    Comments: 24 pages, 17 figures, submitted to Phys. Rev A

    Report number: LAUR-99-1217

  18. arXiv:quant-ph/9807071  [pdf, ps, other

    quant-ph

    Trapped Ion Quantum Computer Research at Los Alamos

    Authors: D. F. V. James, M. S. Gulley, M. H. Holzscheiter, R. J. Hughes, P. G. Kwiat, S. K. Lamoreaux, C. G. Peterson, V. D. Sandberg, M. M. Schauer, C. M. Simmons, D. Tupa, P. Z. Wang, A. G. White

    Abstract: We briefly review the development and theory of an experiment to investigate quantum computation with trapped calcium ions. The ion trap, laser and ion requirements are determined, and the parameters required for simple quantum logic operations are described

    Submitted 24 July, 1998; originally announced July 1998.

    Comments: 12 pages, 6 figures; to appear in Proc. NASA-QCQC'98

    Report number: LA-UR 98-314

    Journal ref: Lecture Notes in Computer Science 1509, 426-437 (1999)

  19. Practical free-space quantum key distribution over 1 km

    Authors: W. T. Buttler, R. J. Hughes, P. G. Kwiat, S. K. Lamoreaux, G. G. Luther, G. L. Morgan, J. E. Nordholt, C. G. Peterson, C. M. Simmons

    Abstract: A working free-space quantum key distribution (QKD) system has been developed and tested over an outdoor optical path of ~1 km at Los Alamos National Laboratory under nighttime conditions. Results show that QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.

    Submitted 22 May, 1998; originally announced May 1998.

    Comments: 5 pages, 2 figures, 2 tables. Submitted to Physics Review Letters, May 1998

    Report number: LAUR-97-5157

    Journal ref: Phys.Rev.Lett.81:3283-3286,1998

  20. Free-space quantum key distribution

    Authors: W. T. Buttler, R. J. Hughes, P. G. Kwiat, G. G. Luther, G. L. Morgan, J. E. Nordholt, C. G. Peterson, C. M. Simmons

    Abstract: A working free-space quantum key distribution (QKD) system has been developed and tested over a 205-m indoor optical path at Los Alamos National Laboratory under fluorescent lighting conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly.

    Submitted 6 January, 1998; originally announced January 1998.

    Comments: 5 pages, 2 figures, 2 tables. To be published in Physical review A on or about 1 April 1998

    Report number: LA-UR-97-1975

  21. Cryptography, Quantum Computation and Trapped Ions

    Authors: Richard J. Hughes

    Abstract: The significance of quantum computation for cryptography is discussed. Following a brief survey of the requirements for quantum computational hardware, an overview of the ion trap quantum computation project at Los Alamos is presented. The physical limitations to quantum computation with trapped ions are analyzed and an assessment of the computational potential of the technology is made.

    Submitted 23 December, 1997; originally announced December 1997.

    Comments: 17 pages. Submitted to "Philosophical Transactions of the Royal Society," proceedings of the Royal Society Discussion Meeting on "Quantum Computation: Theory and Experiment," London, England, November 1997

    Report number: LA-UR-97-4986

    Journal ref: Phil.Trans.Roy.Soc.Lond.A365:1853-1868,1998

  22. The Los Alamos Trapped Ion Quantum Computer Experiment

    Authors: R. J. Hughes, D. F. V. James, J. J. Gomez, M. S. Gulley, M. H. Holzscheiter, P. G. Kwiat, S. K. Lamoreaux, C. G. Peterson, V. D. Sandberg, M. M. Schauer, C. M. Simmons, C. E. Thorburn, D. Tupa, P. Z. Wang, A. G. White

    Abstract: The development and theory of an experiment to investigate quantum computation with trapped calcium ions is described. The ion trap, laser and ion requirements are determined, and the parameters required for quantum logic operations as well as simple quantum factoring are described.

    Submitted 27 August, 1997; originally announced August 1997.

    Comments: 41 pages, 16 figures, submitted to Fortschritte der Physik

    Report number: LA-UR-97-3301

    Journal ref: Fortschritte der Physik 46, 329-362 (1998)

  23. Decoherence Bounds on Quantum Computation with Trapped Ions

    Authors: Richard J. Hughes, Daniel F. V. James, Emanuel H. Knill, Raymond Laflamme, Albert G. Petschek

    Abstract: Using simple physical arguments we investigate the capabilities of a quantum computer based on cold trapped ions. From the limitations imposed on such a device by spontaneous decay, laser phase coherence, ion heating and other sources of error, we derive a bound between the number of laser interactions and the number of ions that may be used. The largest number which may be factored using a vari… ▽ More

    Submitted 23 April, 1996; originally announced April 1996.

    Comments: 5 pages in RevTex, 2 figures, the paper is also avalaible at http://qso.lanl.gov/qc/

    Report number: LA-UR 96-1266

  24. Distribution Function Analysis of Mesoscopic Hop** Conductance Fluctuations

    Authors: R. J. F. Hughes, A. K. Savchenko, J. E. F. Frost, E. H. Linfield, J. T. Nicholls, M. Pepper, E. Kogan, M. Kaveh

    Abstract: Variable-range hop** (VRH) conductance fluctuations in the gate-voltage characteristics of mesoscopic GaAs and Si transistors are analyzed by means of their full distribution functions (DFs). The forms of the DF predicted by the theory of Raikh and Ruzin have been verified under controlled conditions for both the long, narrow wire and the short, wide channel geometries. The variation of the me… ▽ More

    Submitted 25 April, 1996; v1 submitted 8 March, 1996; originally announced March 1996.

    Comments: Revtex, 24 pages, 9 figures, figures are added

  25. Quantum Cryptography

    Authors: Richard J. Hughes, D. M. Alde, P. Dyer, G. G. Luther, G. L. Morgan, M. Schauer

    Abstract: Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature. In this paper we shall describe the theory of quantum cryptography, its potential relevance and the development of a prototype system at Los Alamos, which utilises the phenomenon of single-photon interference to perform quantum cryptography over an opti… ▽ More

    Submitted 3 April, 1995; originally announced April 1995.

    Comments: 36 pages in compressed PostScript format, 10 PostScript figures compressed tar file

    Report number: LA-UR-95-806