-
Tunneling times of single photons
Authors:
Jan Gulla,
Johannes Skaar
Abstract:
Although the group delay of classical pulses through a barrier may suggest superluminality, the information transfer is limited by the precursor which propagates at the vacuum light speed. Single photons, however, have infinite tails, and the question of causality becomes meaningless. We solve this problem by introducing strictly localized states close to single photons, which are examples of opti…
▽ More
Although the group delay of classical pulses through a barrier may suggest superluminality, the information transfer is limited by the precursor which propagates at the vacuum light speed. Single photons, however, have infinite tails, and the question of causality becomes meaningless. We solve this problem by introducing strictly localized states close to single photons, which are examples of optical states produced by on-demand single-photon sources. These states can be arbitrarily close to single photons while demonstrating causality for their leading edge.
△ Less
Submitted 4 October, 2021;
originally announced October 2021.
-
Strictly localized three-dimensional states close to single photons
Authors:
Kai Ryen,
Jan Gulla,
Johannes Skaar
Abstract:
A class of strictly localized states which can be made arbitrarily close to single photons is constructed, and expressions for central properties are provided. It is demonstrated that single photon states can be well approximated by these states down to localization scales on the order of a few pulse cycles. The results readily generalize to states close to $n$-photons. We also provide upper and l…
▽ More
A class of strictly localized states which can be made arbitrarily close to single photons is constructed, and expressions for central properties are provided. It is demonstrated that single photon states can be well approximated by these states down to localization scales on the order of a few pulse cycles. The results readily generalize to states close to $n$-photons. We also provide upper and lower bounds for the fidelity between a given single photon and any state strictly localized to a given volume. These results constitute the limit of photon localization, complementary to the weak-localization limit (I. Bialynicki-Birula, Phys. Rev. Lett. 80, 5247 (1998)).
△ Less
Submitted 14 December, 2021; v1 submitted 16 September, 2021;
originally announced September 2021.
-
Limits for realizing single photons
Authors:
Jan Gulla,
Kai Ryen,
Johannes Skaar
Abstract:
Exact single photons cannot be generated on demand due to their infinite tails. To quantify how close realizable optical states can be to some target single photon in one dimension, we argue that there are two natural but incompatible ways to specify the target state. Either it can be expressed as a photon with a chosen positive-frequency spectrum, or it can be described as an (unphysical) photon…
▽ More
Exact single photons cannot be generated on demand due to their infinite tails. To quantify how close realizable optical states can be to some target single photon in one dimension, we argue that there are two natural but incompatible ways to specify the target state. Either it can be expressed as a photon with a chosen positive-frequency spectrum, or it can be described as an (unphysical) photon in a chosen positive-time pulse. The results show that for sufficiently short target pulses, the closest realizable states contain substantial multiphoton components. Upper and lower bounds for the maximum fidelity are derived and are expressed as functions of the size of the target state's tail, for negative time or negative frequency, respectively. We also generalize the bounds to arbitrary photon-number states.
△ Less
Submitted 2 November, 2023; v1 submitted 14 September, 2021;
originally announced September 2021.
-
Approaching single-photon pulses
Authors:
Jan Gulla,
Johannes Skaar
Abstract:
Single-photon pulses cannot be generated on demand, due to incompatible requirements of positive frequencies and positive times. Resulting states therefore contain small probabilities for multiphotons. We derive upper and lower bounds for the maximum fidelity of realizable states that approximate single-photon pulses. The bounds have implications for ultrafast optics; the maximum fidelity is low f…
▽ More
Single-photon pulses cannot be generated on demand, due to incompatible requirements of positive frequencies and positive times. Resulting states therefore contain small probabilities for multiphotons. We derive upper and lower bounds for the maximum fidelity of realizable states that approximate single-photon pulses. The bounds have implications for ultrafast optics; the maximum fidelity is low for pulses with few cycles or close to the onset, but increases rapidly as the pulse envelope varies more slowly. We also demonstrate strictly localized states that are close to single photons.
△ Less
Submitted 22 February, 2021; v1 submitted 17 August, 2020;
originally announced August 2020.
-
Fresnel's equations in statics and quasistatics
Authors:
Johannes Skaar
Abstract:
Fresnel's equations describe reflection and transmission of electromagnetic waves at an interface between two media. It turns out that these equations can be used in quasistatics and even statics, for example to straightforwardly calculate magnetic forces between a permanent magnet and a bulk medium. This leads to a generalization of the classical image method.
Fresnel's equations describe reflection and transmission of electromagnetic waves at an interface between two media. It turns out that these equations can be used in quasistatics and even statics, for example to straightforwardly calculate magnetic forces between a permanent magnet and a bulk medium. This leads to a generalization of the classical image method.
△ Less
Submitted 22 February, 2019;
originally announced February 2019.
-
The magnetic permeability in Fresnel's equation
Authors:
Hans Olaf Hågenvik,
Johannes Skaar
Abstract:
Magnetic permeabilities derived for infinite, periodic media are used in the Fresnel equation to calculate the reflection from corresponding semi-infinite media. By comparison to finite-difference-time-domain (FDTD) simulations, we find that the Fresnel equation gives accurate results for 2D metamaterials which mimic natural magnetism, in a frequency range where the magnetic moment density dominat…
▽ More
Magnetic permeabilities derived for infinite, periodic media are used in the Fresnel equation to calculate the reflection from corresponding semi-infinite media. By comparison to finite-difference-time-domain (FDTD) simulations, we find that the Fresnel equation gives accurate results for 2D metamaterials which mimic natural magnetism, in a frequency range where the magnetic moment density dominates the $\mathcal O(k^2)$ part of the total Landau--Lifshitz permittivity. For a 1D layered structure, or for large frequencies, the correspondence is poor. We also demonstrate that even if a medium is described accurately by a local permittivity and permeability, the Fresnel equation is not necessarily valid.
△ Less
Submitted 13 December, 2018;
originally announced December 2018.
-
Four definitions of magnetic permeability for periodic metamaterials
Authors:
Johannes Skaar,
Hans Olaf Hågenvik,
Christopher A. Dirdal
Abstract:
We state and compare four different definitions of magnetic permeability for periodic, artificial media, or metamaterials. The connection between them, and properties in general, are discussed in detail, including causality, passivity, symmetry, asymptotic behavior, and origin dependence. The analysis is limited to metamaterials made from linear and nonmagnetic constituents.
We state and compare four different definitions of magnetic permeability for periodic, artificial media, or metamaterials. The connection between them, and properties in general, are discussed in detail, including causality, passivity, symmetry, asymptotic behavior, and origin dependence. The analysis is limited to metamaterials made from linear and nonmagnetic constituents.
△ Less
Submitted 7 February, 2019; v1 submitted 18 October, 2018;
originally announced October 2018.
-
Comment on "Inherent security of phase coding quantum key distribution systems against detector blinding attacks" [Laser Phys. Lett. 15, 095203 (2018)]
Authors:
Aleksey Fedorov,
Ilja Gerhardt,
Anqi Huang,
Jonathan Jogenfors,
Yury Kurochkin,
Antía Lamas-Linares,
Jan-Åke Larsson,
Gerd Leuchs,
Lars Lydersen,
Vadim Makarov,
Johannes Skaar
Abstract:
This is a brief comment on the Letter by Balygin and his coworkers [Laser Phys. Lett. 15, 095203 (2018)]. We point out an error that invalidates the Letter's conclusions.
This is a brief comment on the Letter by Balygin and his coworkers [Laser Phys. Lett. 15, 095203 (2018)]. We point out an error that invalidates the Letter's conclusions.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Dielectric media considered as vacuum with sources
Authors:
Hans Olaf Hågenvik,
Kjell Bløtekjær,
Johannes Skaar
Abstract:
Conventional textbook treatments on electromagnetic wave propagation consider the induced charge and current densities as "bound", and therefore absorb them into a refractive index. In principle it must also be possible to treat the medium as vacuum, but with explicit charge and current densities. This gives a more direct, physical description. However, since the induced waves propagate in vacuum…
▽ More
Conventional textbook treatments on electromagnetic wave propagation consider the induced charge and current densities as "bound", and therefore absorb them into a refractive index. In principle it must also be possible to treat the medium as vacuum, but with explicit charge and current densities. This gives a more direct, physical description. However, since the induced waves propagate in vacuum in this picture, it is not straightforward to realize that the wavelength becomes different compared to that in vacuum. We provide an explanation, and also associated time-domain simulations. As an extra bonus the results turn out to illuminate the behavior of metamaterials.
△ Less
Submitted 15 June, 2018; v1 submitted 7 September, 2017;
originally announced October 2017.
-
Space QUEST mission proposal: Experimentally testing decoherence due to gravity
Authors:
Siddarth Koduru Joshi,
Jacques Pienaar,
Timothy C. Ralph,
Luigi Cacciapuoti,
Will McCutcheon,
John Rarity,
Dirk Giggenbach,
** Gyu Lim,
Vadim Makarov,
Ivette Fuentes,
Thomas Scheidl,
Erik Beckert,
Mohamed Bourennane,
David Edward Bruschi,
Adan Cabello,
Jose Capmany,
Alberto Carrasco-Casado,
Eleni Diamanti,
Miloslav Duusek,
Dominique Elser,
Angelo Gulinatti,
Robert H. Hadfield,
Thomas Jennewein,
Rainer Kaltenbaek,
Michael A. Krainak
, et al. (20 additional authors not shown)
Abstract:
Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph,…
▽ More
Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph, G J Milburn, and T Downes, Phys. Rev. A, 79(2):22121, 2009, T C Ralph and J Pienaar, New Journal of Physics, 16(8):85008, 2014], a bipartite entangled system could decohere if each particle traversed through a different gravitational field gradient. We propose to study this effect in a ground to space uplink scenario. We extend the above theoretical predictions of Ralph and coworkers and discuss the scientific consequences of detecting/failing to detect the predicted gravitational decoherence. We present a detailed mission design of the European Space Agency's (ESA) Space QUEST (Space - Quantum Entanglement Space Test) mission, and study the feasibility of the mission schema.
△ Less
Submitted 9 January, 2018; v1 submitted 23 March, 2017;
originally announced March 2017.
-
Higher order multipoles in metamaterial homogenization
Authors:
Christopher A. Dirdal,
Hans Olaf Hågenvik,
Haakon Aamot Haave,
Johannes Skaar
Abstract:
The higher order multipoles above the electric quadrupole are commonly neglected in metamaterial homogenization. We show that they nevertheless can be significant when second order spatial dispersive effects, such as the magnetic response, are considered. In this respect, they can be equally important as the magnetization and quadrupole terms, and should not automatically be neglected.
The higher order multipoles above the electric quadrupole are commonly neglected in metamaterial homogenization. We show that they nevertheless can be significant when second order spatial dispersive effects, such as the magnetic response, are considered. In this respect, they can be equally important as the magnetization and quadrupole terms, and should not automatically be neglected.
△ Less
Submitted 19 April, 2018; v1 submitted 6 January, 2017;
originally announced January 2017.
-
Secure detection in quantum key distribution by real-time calibration of receiver
Authors:
Øystein Marøy,
Vadim Makarov,
Johannes Skaar
Abstract:
The single photon detection efficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdrop** attack that exploits the photon receiver's imperfections. We present a method for estimating the detection efficiency, and calculate the corresponding secure key gene…
▽ More
The single photon detection efficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdrop** attack that exploits the photon receiver's imperfections. We present a method for estimating the detection efficiency, and calculate the corresponding secure key generation rate. The estimation is done by testing gated detectors using a randomly activated photon source inside the receiver unit. This estimate gives a secure rate for any detector with non-unity single photon detection efficiency, both inherit or due to blinding. By adding extra optical components to the receiver, we make sure that the key is extracted from photon states for which our estimate is valid. The result is a quantum key distribution scheme that is secure against any attack that exploits detector imperfections.
△ Less
Submitted 18 June, 2018; v1 submitted 22 November, 2016;
originally announced November 2016.
-
Laplace-Fourier analysis and instabilities of a gainy slab
Authors:
Hans Olaf Hågenvik,
Johannes Skaar
Abstract:
The idealization of monochromatic plane waves leads to considerable simplifications in the analysis of electromagnetic systems. However, for active systems this idealization may be dangerous due to the presence of growing waves. Here we consider a gainy slab, and use a realistic incident beam, which is both causal and has finite width. This clarifies some apparent paradoxes arising from earlier an…
▽ More
The idealization of monochromatic plane waves leads to considerable simplifications in the analysis of electromagnetic systems. However, for active systems this idealization may be dangerous due to the presence of growing waves. Here we consider a gainy slab, and use a realistic incident beam, which is both causal and has finite width. This clarifies some apparent paradoxes arising from earlier analyses of this setup. In general it turns out to be necessary to involve complex frequencies $ω$ and/or complex transversal wavenumbers $k_x$. Simultaneously real $ω$ and $k_x$ cannot describe amplified waves in a slab which is infinite in the transversal direction. We also show that the only possibility to have an absolute instability for a finite width beam, is if a normally incident plane wave would experience an instability.
△ Less
Submitted 23 April, 2015;
originally announced April 2015.
-
Relaxed dispersion constraints and metamaterial effective parameters with physical meaning for all frequencies
Authors:
Christopher A. Dirdal,
Tarjei Bondevik,
Johannes Skaar
Abstract:
Metamaterial effective parameters may exhibit freedom from typical dispersion constraints. For instance, the emergence of a magnetic response in arrays of split-ring resonators for long wavelengths cannot be attained in a passive continuous system obeying the Kramers-Kronig relations. We characterize such freedom by identifying the three possible asymptotes which effective parameters can approach…
▽ More
Metamaterial effective parameters may exhibit freedom from typical dispersion constraints. For instance, the emergence of a magnetic response in arrays of split-ring resonators for long wavelengths cannot be attained in a passive continuous system obeying the Kramers-Kronig relations. We characterize such freedom by identifying the three possible asymptotes which effective parameters can approach when analytically continued. Apart from their dispersion freedom, we also demonstrate that the effective parameters may be redefined in such a way that they have a certain physical meaning for all frequencies. There exists several possible definitions for the effective permittivity and permeability whereby this is achieved, thereby giving several possible frequency variations for high frequencies, while nevertheless converging to the same dispersion for long wavelengths.
△ Less
Submitted 28 March, 2015; v1 submitted 27 October, 2014;
originally announced October 2014.
-
Diamagnetism and the dispersion of the magnetic permeability
Authors:
Christopher A. Dirdal,
Johannes Skaar
Abstract:
It is well known that the usual Kramers--Kronig relations for the relative permeability function $μ(ω)$ are not compatible with diamagnetism ($μ(0)<1$) and a positive imaginary part ($\text{Im}\,μ(ω)>0$ for $ω>0$). We demonstrate that a certain physical meaning can be attributed to $μ$ for all frequencies, and that in the presence of spatial dispersion, $μ$ does not necessarily tend to 1 for high…
▽ More
It is well known that the usual Kramers--Kronig relations for the relative permeability function $μ(ω)$ are not compatible with diamagnetism ($μ(0)<1$) and a positive imaginary part ($\text{Im}\,μ(ω)>0$ for $ω>0$). We demonstrate that a certain physical meaning can be attributed to $μ$ for all frequencies, and that in the presence of spatial dispersion, $μ$ does not necessarily tend to 1 for high frequencies $ω$ and fixed wavenumber $\mathbf k$. Taking the asymptotic behavior into account, diamagnetism can be compatible with Kramers--Kronig relations even if the imaginary part of the permeability is positive. We provide several examples of diamagnetic media and metamaterials for which $μ(ω,\mathbf k)\not\to 1$ as $ω\to\infty$.
△ Less
Submitted 12 February, 2018; v1 submitted 22 October, 2014;
originally announced October 2014.
-
Fourier theory of linear gain media
Authors:
Hans Olaf Hågenvik,
Markus E. Malema,
Johannes Skaar
Abstract:
The analysis of wave propagation in linear, passive media is usually done by considering a single real frequency (the monochromatic limit) and also often a single plane wave component (plane wave limit), separately. For gain media, we demonstrate that these two limits generally do not commute; for example, one order may lead to a diverging field, while the other order leads to a finite field. More…
▽ More
The analysis of wave propagation in linear, passive media is usually done by considering a single real frequency (the monochromatic limit) and also often a single plane wave component (plane wave limit), separately. For gain media, we demonstrate that these two limits generally do not commute; for example, one order may lead to a diverging field, while the other order leads to a finite field. Moreover, the plane wave limit may be dependent on whether it is realized with a rect function excitation or gaussian excitation of infinite widths. We consider wave propagation in gain media by a Fourier--Laplace integral in time and space, and demonstrate how the correct monochromatic limit or plane wave limit can be taken, by deforming the integration surface in complex frequency--complex wavenumber space. We also give the most general criterion for absolute instabilities. The general theory is applied in several cases, and is used to predict media with novel properties. In particular, we show the existence of isotropic media which in principle exhibit simultaneous refraction, meaning that they refract positively and negatively at the same time.
△ Less
Submitted 27 March, 2015; v1 submitted 1 July, 2014;
originally announced July 2014.
-
Laser damage helps the eavesdropper in quantum cryptography
Authors:
Audun N. Bugge,
Sebastien Sauge,
Aina M. M. Ghazali,
Johannes Skaar,
Lars Lydersen,
Vadim Makarov
Abstract:
We propose a class of attacks on quantum key distribution (QKD) systems where an eavesdropper actively engineers new loopholes by using damaging laser illumination to permanently change properties of system components. This can turn a perfect QKD system into a completely insecure system. A proof-of-principle experiment performed on an avalanche photodiode-based detector shows that laser damage can…
▽ More
We propose a class of attacks on quantum key distribution (QKD) systems where an eavesdropper actively engineers new loopholes by using damaging laser illumination to permanently change properties of system components. This can turn a perfect QKD system into a completely insecure system. A proof-of-principle experiment performed on an avalanche photodiode-based detector shows that laser damage can be used to create loopholes. After about 1 W illumination, the detectors' dark count rate reduces 2 to 5 times, permanently improving single-photon counting performance. After about 1.5 W, the detectors switch permanently into the linear photodetection mode and become completely insecure for QKD applications.
△ Less
Submitted 20 February, 2014; v1 submitted 31 October, 2013;
originally announced October 2013.
-
Superpositions of Lorentzians as the class of causal functions
Authors:
Christopher A. Dirdal,
Johannes Skaar
Abstract:
We prove that all functions obeying the Kramers-Kronig relations can be approximated as superpositions of Lorentzian functions, to any precision. As a result, the typical text-book analysis of dielectric dispersion response functions in terms of Lorentzians may be viewed as encompassing the whole class of causal functions. A further consequence is that Lorentzian resonances may be viewed as possib…
▽ More
We prove that all functions obeying the Kramers-Kronig relations can be approximated as superpositions of Lorentzian functions, to any precision. As a result, the typical text-book analysis of dielectric dispersion response functions in terms of Lorentzians may be viewed as encompassing the whole class of causal functions. A further consequence is that Lorentzian resonances may be viewed as possible building blocks for engineering any desired metamaterial response, for example by use of split ring resonators of different parameters. Two example functions, far from typical Lorentzian resonance behavior, are expressed in terms of Lorentzian superpositions: A steep dispersion medium that achieves large negative susceptibility with arbitrarily low loss/gain, and an optimal realization of a perfect lens over a bandwidth. Error bounds are derived for the approximation.
△ Less
Submitted 15 October, 2013; v1 submitted 29 July, 2013;
originally announced July 2013.
-
A universal setup for active control of a single-photon detector
Authors:
Qin Liu,
Antía Lamas-Linares,
Christian Kurtsiefer,
Johannes Skaar,
Vadim Makarov,
Ilja Gerhardt
Abstract:
The influence of bright light on a single-photon detector has been described in a number of recent publications. The impact on quantum key distribution (QKD) is important, and several hacking experiments have been tailored to fully control single-photon detectors. Special attention has been given to avoid introducing further errors into a QKD system. We describe the design and technical details of…
▽ More
The influence of bright light on a single-photon detector has been described in a number of recent publications. The impact on quantum key distribution (QKD) is important, and several hacking experiments have been tailored to fully control single-photon detectors. Special attention has been given to avoid introducing further errors into a QKD system. We describe the design and technical details of an apparatus which allows to attack a quantum-cryptographic connection. This device is capable of controlling free-space and fiber-based systems and of minimizing unwanted clicks in the system. With different control diagrams, we are able to achieve a different level of control. The control was initially targeted to the systems using BB84 protocol, with polarization encoding and basis switching using beamsplitters, but could be extended to other types of systems. We further outline how to characterize the quality of active control of single-photon detectors.
△ Less
Submitted 15 December, 2013; v1 submitted 23 July, 2013;
originally announced July 2013.
-
Symmetries and optical transitions of hexagonal quantum dots in GaAs/AlGaAs nanowires
Authors:
Guro K. Svendsen,
Johannes Skaar,
Helge Weman,
Marc-André Dupertuis
Abstract:
We investigate the properties of electronic states and optical transitions in hexagonal GaAs quantum dots within AlGaAs nanowires. Such dots are particularly interesting due to their high degree of symmetry. A streamlined postsymmetrization technique based on class operators (PTCO) is developed which enables one to benefit in one run from the insight brought by the Maximal symmetrization and reduc…
▽ More
We investigate the properties of electronic states and optical transitions in hexagonal GaAs quantum dots within AlGaAs nanowires. Such dots are particularly interesting due to their high degree of symmetry. A streamlined postsymmetrization technique based on class operators (PTCO) is developed which enables one to benefit in one run from the insight brought by the Maximal symmetrization and reduction of fields (MSRF) approach reported by Dalessi et al. [Phys. Rev. B 81, 125106 (2010)], after having solved the Schrödinger equation. Definite advantages of the PTCO are that it does not require having to modify any existing code for the calculation of the electronic structure, and that it allows to numerically test for elevated symmetries. We show in the frame of a 4-band k.p model that despite the fact that the D6h symmetry of the nanostructure is broken at the microscopic level by the underlying Zinc Blende crystal structure, the effect is quite small. Most of the particularities of the electronic states and their optical emission can be understood by symmetry elevation to D6h and the presence of approximate azimuthal and radial quantum numbers.
△ Less
Submitted 27 January, 2013;
originally announced January 2013.
-
Reciprocity and the scattering matrix of waveguide modes
Authors:
Guro K. Svendsen,
Magnus W. Haakestad,
Johannes Skaar
Abstract:
The implications of the Lorentz reciprocity theorem for a scatterer connected to waveguides with arbitrary modes, including degenerate, evanescent, and complex modes, are discussed. In general it turns out that a matrix $CS$ is symmetric, where $C$ is the matrix of generalized orthogonality coefficients, and $S$ is the scattering matrix. Examples are given, including a scatterer surrounded by wave…
▽ More
The implications of the Lorentz reciprocity theorem for a scatterer connected to waveguides with arbitrary modes, including degenerate, evanescent, and complex modes, are discussed. In general it turns out that a matrix $CS$ is symmetric, where $C$ is the matrix of generalized orthogonality coefficients, and $S$ is the scattering matrix. Examples are given, including a scatterer surrounded by waveguides or free space, and discontinuities of waveguides.
△ Less
Submitted 11 January, 2013;
originally announced January 2013.
-
Error Estimation, Error Correction and Verification In Quantum Key Distribution
Authors:
Øystein Marøy,
Magne Gudmundsen,
Lars Lydersen,
Johannes Skaar
Abstract:
We consider error correction in quantum key distribution. To avoid that Alice and Bob unwittingly end up with different keys precautions must be taken. Before running the error correction protocol, Bob and Alice normally sacrifice some bits to estimate the error rate. To reduce the probability that they end up with different keys to an acceptable level, we show that a large number of bits must be…
▽ More
We consider error correction in quantum key distribution. To avoid that Alice and Bob unwittingly end up with different keys precautions must be taken. Before running the error correction protocol, Bob and Alice normally sacrifice some bits to estimate the error rate. To reduce the probability that they end up with different keys to an acceptable level, we show that a large number of bits must be sacrificed. Instead, if Alice and Bob can make a good guess about the error rate before the error correction, they can verify that their keys are similar after the error correction protocol. This verification can be done by utilizing properties of Low Density Parity Check codes used in the error correction. We compare the methods and show that by verification it is often possible to sacrifice less bits without compromising security. The improvement is heavily dependent on the error rate and the block length, but for a key produced by the IdQuantique system Clavis^2, the increase in the key rate is approximately 5 percent. We also show that for systems with large fluctuations in the error rate a combination of the two methods is optimal.
△ Less
Submitted 24 October, 2012;
originally announced October 2012.
-
Inverse scattering of dispersive stratified structures
Authors:
Johannes Skaar,
Magnus W. Haakestad
Abstract:
We consider the inverse scattering problem of retrieving the structural parameters of a stratified medium consisting of dispersive materials, given knowledge of the complex reflection coefficient in a finite frequency range. It is shown that the inverse scattering problem does not have a unique solution in general. When the dispersion is sufficiently small, such that the time-domain Fresnel reflec…
▽ More
We consider the inverse scattering problem of retrieving the structural parameters of a stratified medium consisting of dispersive materials, given knowledge of the complex reflection coefficient in a finite frequency range. It is shown that the inverse scattering problem does not have a unique solution in general. When the dispersion is sufficiently small, such that the time-domain Fresnel reflections have durations less than the round-trip time in the layers, the solution is unique and can be found by layer peeling. Numerical examples with dispersive and lossy media are given, demonstrating the usefulness of the method for e.g. THz technology.
△ Less
Submitted 31 July, 2012;
originally announced July 2012.
-
Investigations of Bragg reflectors in nanowire lasers
Authors:
Guro Kristin Svendsen,
Helge Weman,
Johannes Skaar
Abstract:
The reflectivity of various Bragg reflectors in connection to waveguide structures, including nanowires, has been investigated using modal reflection and transmission matrices. A semi-analytical model was applied yielding increased understanding of the diffraction effects present in such gratings. Planar waveguides and nanowire lasers are considered in particular. Two geometries are compared; Brag…
▽ More
The reflectivity of various Bragg reflectors in connection to waveguide structures, including nanowires, has been investigated using modal reflection and transmission matrices. A semi-analytical model was applied yielding increased understanding of the diffraction effects present in such gratings. Planar waveguides and nanowire lasers are considered in particular. Two geometries are compared; Bragg reflectors within the waveguides are shown to have significant advantages compared to Bragg reflectors in the substrate, when diffraction effects are significant.
△ Less
Submitted 22 June, 2012; v1 submitted 3 November, 2011;
originally announced November 2011.
-
Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"
Authors:
Lars Lydersen,
Vadim Makarov,
Johannes Skaar
Abstract:
This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].
This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].
△ Less
Submitted 19 June, 2011;
originally announced June 2011.
-
Experimentally faking the violation of Bell's inequalities
Authors:
Ilja Gerhardt,
Qin Liu,
Antía Lamas-Linares,
Johannes Skaar,
Valerio Scarani,
Vadim Makarov,
Christian Kurtsiefer
Abstract:
Entanglement witnesses such as Bell inequalities are frequently used to prove the non-classicality of a light source and its suitability for further tasks. By demonstrating Bell inequality violations using classical light in common experimental arrangements, we highlight why strict locality and efficiency conditions are not optional, particularly in security-related scenarios.
Entanglement witnesses such as Bell inequalities are frequently used to prove the non-classicality of a light source and its suitability for further tasks. By demonstrating Bell inequality violations using classical light in common experimental arrangements, we highlight why strict locality and efficiency conditions are not optional, particularly in security-related scenarios.
△ Less
Submitted 23 October, 2011; v1 submitted 16 June, 2011;
originally announced June 2011.
-
Controlling a superconducting nanowire single-photon detector using tailored bright illumination
Authors:
Lars Lydersen,
Mohsen K. Akhlaghi,
A. Hamed Majedi,
Johannes Skaar,
Vadim Makarov
Abstract:
We experimentally demonstrate that a superconducting nanowire single-photon detector is deterministically controllable by bright illumination. We found that bright light can temporarily make a large fraction of the nanowire length normally-conductive, can extend deadtime after a normal photon detection, and can cause a hotspot formation during the deadtime with a highly nonlinear sensitivity. In r…
▽ More
We experimentally demonstrate that a superconducting nanowire single-photon detector is deterministically controllable by bright illumination. We found that bright light can temporarily make a large fraction of the nanowire length normally-conductive, can extend deadtime after a normal photon detection, and can cause a hotspot formation during the deadtime with a highly nonlinear sensitivity. In result, although based on different physics, the superconducting detector turns out to be controllable by virtually the same techniques as avalanche photodiode detectors. As demonstrated earlier, when such detectors are used in a quantum key distribution system, this allows an eavesdropper to launch a detector control attack to capture the full secret key without being revealed by to many errors in the key.
△ Less
Submitted 16 November, 2011; v1 submitted 13 June, 2011;
originally announced June 2011.
-
Superlinear threshold detectors in quantum cryptography
Authors:
Lars Lydersen,
Nitin Jain,
Christoffer Wittmann,
Øystein Marøy,
Johannes Skaar,
Christoph Marquardt,
Vadim Makarov,
Gerd Leuchs
Abstract:
We introduce the concept of a superlinear threshold detector, a detector that has a higher probability to detect multiple photons if it receives them simultaneously rather than at separate times. Highly superlinear threshold detectors in quantum key distribution systems allow eavesdrop** the full secret key without being revealed. Here, we generalize the detector control attack, and analyze how…
▽ More
We introduce the concept of a superlinear threshold detector, a detector that has a higher probability to detect multiple photons if it receives them simultaneously rather than at separate times. Highly superlinear threshold detectors in quantum key distribution systems allow eavesdrop** the full secret key without being revealed. Here, we generalize the detector control attack, and analyze how it performs against quantum key distribution systems with moderately superlinear detectors. We quantify the superlinearity in superconducting single-photon detectors based on earlier published data, and gated avalanche photodiode detectors based on our own measurements. The analysis shows that quantum key distribution systems using detector(s) of either type can be vulnerable to eavesdrop**. The avalanche photodiode detector becomes superlinear towards the end of the gate, allowing eavesdrop** using trigger pulses containing less than 120 photons per pulse. Such an attack would be virtually impossible to catch with an optical power meter at the receiver entrance.
△ Less
Submitted 17 August, 2011; v1 submitted 10 June, 2011;
originally announced June 2011.
-
Inverse scattering of 2d photonic structures by layer-strip**
Authors:
Marte P. Hatlo Andresen,
Harald E. Krogstad,
Johannes Skaar
Abstract:
Design and reconstruction of 2d and 3d photonic structures are usually carried out by forward simulations combined with optimization or intuition. Reconstruction by means of layer-strip** has been applied in seismic processing as well as in design and characterization of 1d photonic structures such as fiber Bragg gratings. Layer-strip** is based on causality, where the earliest scattered light…
▽ More
Design and reconstruction of 2d and 3d photonic structures are usually carried out by forward simulations combined with optimization or intuition. Reconstruction by means of layer-strip** has been applied in seismic processing as well as in design and characterization of 1d photonic structures such as fiber Bragg gratings. Layer-strip** is based on causality, where the earliest scattered light is used to recover the structure layer-by-layer.
Our set-up is a 2d layered nonmagnetic structure probed by plane polarized harmonic waves entering normal to the layers. It is assumed that the dielectric permittivity in each layer only varies orthogonal to the polarization. Based on obtained reflectance data covering a suitable frequency interval, time-localized pulse data are synthesized and applied to reconstruct the refractive index profile in the leftmost layer by identifying the local, time-domain Fresnel reflection at each point. Once the first layer is known, its impact on the reflectance data is stripped off, and the procedure repeated for the next layer.
Through numerical simulations it will be demonstrated that it is possible to reconstruct structures consisting of several layers. The impact of evanescent modes and limited bandwidth is discussed.
△ Less
Submitted 2 February, 2011;
originally announced February 2011.
-
Secure gated detection scheme for quantum cryptography
Authors:
Lars Lydersen,
Vadim Makarov,
Johannes Skaar
Abstract:
Several attacks have been proposed on quantum key distribution systems with gated single-photon detectors. The attacks involve triggering the detectors outside the center of the detector gate, and/or using bright illumination to exploit classical photodiode mode of the detectors. Hence a secure detection scheme requires two features: The detection events must take place in the middle of the gate,…
▽ More
Several attacks have been proposed on quantum key distribution systems with gated single-photon detectors. The attacks involve triggering the detectors outside the center of the detector gate, and/or using bright illumination to exploit classical photodiode mode of the detectors. Hence a secure detection scheme requires two features: The detection events must take place in the middle of the gate, and the detector must be single-photon sensitive. Here we present a technique called bit-mapped gating, which is an elegant way to force the detections in the middle of the detector gate by coupling detection time and quantum bit error rate. We also discuss how to guarantee single-photon sensitivity by directly measuring detector parameters. Bit-mapped gating also provides a simple way to measure the detector blinding parameter in security proofs for quantum key distribution systems with detector efficiency mismatch, which up until now has remained a theoretical, unmeasurable quantity. Thus if single-photon sensitivity can be guaranteed within the gates, a detection scheme with bit-mapped gating satisfies the assumptions of the current security proofs.
△ Less
Submitted 29 January, 2011;
originally announced January 2011.
-
Tailored bright illumination attack on distributed-phase-reference protocols
Authors:
Lars Lydersen,
Johannes Skaar,
Vadim Makarov
Abstract:
Detector control attacks on quantum key distribution systems exploit the linear mode of avalanche photodiode in single photon detectors. So far, the protocols under consideration have been the BB84 protocol and its derivatives. Here we present how bright tailored illumination exploiting the linear mode of detectors can be used to eavesdrop on distributed-phase-reference protocols, such as differen…
▽ More
Detector control attacks on quantum key distribution systems exploit the linear mode of avalanche photodiode in single photon detectors. So far, the protocols under consideration have been the BB84 protocol and its derivatives. Here we present how bright tailored illumination exploiting the linear mode of detectors can be used to eavesdrop on distributed-phase-reference protocols, such as differential-phase-shift and coherent-one-way.
△ Less
Submitted 20 December, 2010;
originally announced December 2010.
-
Model for reflection and transmission matrices of nanowire end facets
Authors:
Guro K. Svendsen,
Helge Weman,
Johannes Skaar
Abstract:
Nanowires show a large potential for various electrooptical devices, such as light emitting diodes, solar cells and nanowire lasers. We present a direct method developed to calculate the modal reflection and transmission matrix at the end facets of a waveguide of arbitrary cross section, resulting in a generalized version of the Fresnel equations. The reflection can be conveniently computed using…
▽ More
Nanowires show a large potential for various electrooptical devices, such as light emitting diodes, solar cells and nanowire lasers. We present a direct method developed to calculate the modal reflection and transmission matrix at the end facets of a waveguide of arbitrary cross section, resulting in a generalized version of the Fresnel equations. The reflection can be conveniently computed using Fast Fourier Transforms. We demonstrate that the reflection is qualitatively described by two main parameters, the modal field confinement and the average Fresnel reflection of the plane waves constituting the waveguide mode.
△ Less
Submitted 4 April, 2011; v1 submitted 15 December, 2010;
originally announced December 2010.
-
Reply to "Avoiding the Detector Blinding Attack on Quantum Cryptography"
Authors:
Lars Lydersen,
Carlos Wiechers,
Christoffer Wittmann,
Dominique Elser,
Johannes Skaar,
Vadim Makarov
Abstract:
This is a reply to the comment by Yuan et al. [arXiv:1009.6130v1] on our publication [arXiv:1008.4593].
This is a reply to the comment by Yuan et al. [arXiv:1009.6130v1] on our publication [arXiv:1008.4593].
△ Less
Submitted 2 December, 2010;
originally announced December 2010.
-
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
Authors:
Ilja Gerhardt,
Qin Liu,
Antia Lamas-Linares,
Johannes Skaar,
Christian Kurtsiefer,
Vadim Makarov
Abstract:
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-fiel…
▽ More
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire 'secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.
△ Less
Submitted 18 March, 2012; v1 submitted 30 October, 2010;
originally announced November 2010.
-
Total internal reflection and evanescent gain
Authors:
Jon Olav Grepstad,
Johannes Skaar
Abstract:
Total internal reflection occurs for large angles of incidence, when light is incident from a high-refractive-index medium onto a low-index medium. We consider the situation where the low-index medium is active. By invoking causality in its most fundamental form, we argue that evanescent gain may or may not appear, depending on the analytic and global properties of the permittivity function. For c…
▽ More
Total internal reflection occurs for large angles of incidence, when light is incident from a high-refractive-index medium onto a low-index medium. We consider the situation where the low-index medium is active. By invoking causality in its most fundamental form, we argue that evanescent gain may or may not appear, depending on the analytic and global properties of the permittivity function. For conventional, weak gain media, we show that there is an absolute instability associated with infinite transversal dimensions. This instability can be ignored or eliminated in certain cases, for which evanescent gain prevails.
△ Less
Submitted 15 October, 2011; v1 submitted 23 September, 2010;
originally announced September 2010.
-
After-gate attack on a quantum cryptosystem
Authors:
Carlos Wiechers,
Lars Lydersen,
Christoffer Wittmann,
Dominique Elser,
Johannes Skaar,
Christoph Marquardt,
Vadim Makarov,
Gerd Leuchs
Abstract:
We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdrop…
▽ More
We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.
△ Less
Submitted 14 September, 2010;
originally announced September 2010.
-
Thermal blinding of gated detectors in quantum cryptography
Authors:
Lars Lydersen,
Carlos Wiechers,
Christoffer Wittmann,
Dominique Elser,
Johannes Skaar,
Vadim Makarov
Abstract:
It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating voltages in the circuit [L. Lydersen et al., Nat. Photonics DOI:10.1038/nphoton.2010.214]. This allows for an attack eavesdrop** the full raw an…
▽ More
It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating voltages in the circuit [L. Lydersen et al., Nat. Photonics DOI:10.1038/nphoton.2010.214]. This allows for an attack eavesdrop** the full raw and secret key without increasing the quantum bit error rate (QBER). Here we show how thermal effects in detectors under bright illumination can lead to the same outcome. We demonstrate that the detectors in a commercial QKD system Clavis2 can be blinded by heating the avalanche photo diodes (APDs) using bright illumination, so-called thermal blinding. Further, the detectors can be triggered using short bright pulses once they are blind. For systems with pauses between packet transmission such as the plug-and-play systems, thermal inertia enables Eve to apply the bright blinding illumination before eavesdrop**, making her more difficult to catch.
△ Less
Submitted 14 September, 2010;
originally announced September 2010.
-
Hacking commercial quantum cryptography systems by tailored bright illumination
Authors:
Lars Lydersen,
Carlos Wiechers,
Christoffer Wittmann,
Dominique Elser,
Johannes Skaar,
Vadim Makarov
Abstract:
The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdrop** by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD…
▽ More
The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdrop** by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD systems can be fully remote-controlled using specially tailored bright illumination. This makes it possible to tracelessly acquire the full secret key; we propose an eavesdrop** apparatus built of off-the-shelf components. The loophole is likely to be present in most QKD systems using avalanche photodiodes to detect single photons. We believe that our findings are crucial for strengthening the security of practical QKD, by identifying and patching technological deficiencies.
△ Less
Submitted 4 March, 2011; v1 submitted 26 August, 2010;
originally announced August 2010.
-
Negative refraction: A tutorial
Authors:
Johannes Skaar
Abstract:
The concepts of negative refractive index and near-field imaging are explained in the form of a tutorial.
The concepts of negative refractive index and near-field imaging are explained in the form of a tutorial.
△ Less
Submitted 19 August, 2010;
originally announced August 2010.
-
Causality and Its Implications for Passive and Active Media
Authors:
Johannes Skaar
Abstract:
The implications of causality are examined in detail for the permittivity, permeability, and refractive index of passive and active media. Particular attention is given to negative index media.
The implications of causality are examined in detail for the permittivity, permeability, and refractive index of passive and active media. Particular attention is given to negative index media.
△ Less
Submitted 17 August, 2010;
originally announced August 2010.
-
The effect of gain saturation in a gain compensated perfect lens
Authors:
Marte P. Hatlo Andresen,
Aleksander V. Skaldebø,
Magnus W. Haakestad,
Harald E. Krogstad,
Johannes Skaar
Abstract:
The transmission of evanescent waves in a gain-compensated perfect lens is discussed. In particular, the impact of gain saturation is included in the analysis, and a method for calculating the fields of such nonlinear systems is developed. Gain compensation clearly improves the resolution; however, a number of nonideal effects arise as a result of gain saturation. The resolution associated with th…
▽ More
The transmission of evanescent waves in a gain-compensated perfect lens is discussed. In particular, the impact of gain saturation is included in the analysis, and a method for calculating the fields of such nonlinear systems is developed. Gain compensation clearly improves the resolution; however, a number of nonideal effects arise as a result of gain saturation. The resolution associated with the lens is strongly dependent on the saturation constant of the active medium.
△ Less
Submitted 15 July, 2010;
originally announced July 2010.
-
Security of quantum key distribution with arbitrary individual imperfections
Authors:
Øystein Marøy,
Lars Lydersen,
Johannes Skaar
Abstract:
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be…
▽ More
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.
△ Less
Submitted 1 June, 2010; v1 submitted 20 March, 2009;
originally announced March 2009.
-
Controlling an actively-quenched single photon detector with bright light
Authors:
Sebastien Sauge,
Lars Lydersen,
Andrey Anisimov,
Johannes Skaar,
Vadim Makarov
Abstract:
We control using bright light an actively-quenched avalanche single-photon detector. Actively-quenched detectors are commonly used for quantum key distribution (QKD) in the visible and near-infrared range. This study shows that these detectors are controllable by the same attack used to hack passively-quenched and gated detectors. This demonstrates the generality of our attack and its possible app…
▽ More
We control using bright light an actively-quenched avalanche single-photon detector. Actively-quenched detectors are commonly used for quantum key distribution (QKD) in the visible and near-infrared range. This study shows that these detectors are controllable by the same attack used to hack passively-quenched and gated detectors. This demonstrates the generality of our attack and its possible applicability to eavsdrop** the full secret key of all QKD systems using avalanche photodiodes (APDs). Moreover, the commercial detector model we tested (PerkinElmer SPCM-AQR) exhibits two new blinding mechanisms in addition to the previously observed thermal blinding of the APD, namely: malfunctioning of the bias voltage control circuit, and overload of the DC/DC converter biasing the APD. These two new technical loopholes found just in one detector model suggest that this problem must be solved in general, by incorporating generally imperfect detectors into the security proof for QKD.
△ Less
Submitted 23 October, 2011; v1 submitted 19 September, 2008;
originally announced September 2008.
-
Security of quantum key distribution with bit and basis dependent detector flaws
Authors:
L. Lydersen,
J. Skaar
Abstract:
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), in the presence of bit and basis dependent detector flaws. We suggest a powerful attack that can be used in systems with detector efficiency mismatch, even if the detector assignments are chosen randomly by Bob. A security proof is provided, valid for any basis dependent, possibly lossy, lin…
▽ More
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), in the presence of bit and basis dependent detector flaws. We suggest a powerful attack that can be used in systems with detector efficiency mismatch, even if the detector assignments are chosen randomly by Bob. A security proof is provided, valid for any basis dependent, possibly lossy, linear optical imperfections in the channel/receiver/detectors. The proof does not assume the so-called squashing detector model.
△ Less
Submitted 4 January, 2010; v1 submitted 4 July, 2008;
originally announced July 2008.
-
On the electromagnetic properties of active media
Authors:
Bertil Nistad,
Johannes Skaar
Abstract:
Several results concerning active media or metamaterials are proved and discussed. In particular, we consider the permittivity, permeability, wave vector, and refractive index, and discuss stability, refraction, gain, and fundamental limitations resulting from causality.
Several results concerning active media or metamaterials are proved and discussed. In particular, we consider the permittivity, permeability, wave vector, and refractive index, and discuss stability, refraction, gain, and fundamental limitations resulting from causality.
△ Less
Submitted 16 June, 2008; v1 submitted 19 December, 2007;
originally announced December 2007.
-
Inverse scattering in multimode structures
Authors:
Ole Henrik Waagaard,
Johannes Skaar
Abstract:
We consider the inverse scattering problem associated with any number of interacting modes in one-dimensional structures. The coupling between the modes is contradirectional in addition to codirectional, and may be distributed continuously or in discrete points. The local coupling as a function of position is obtained from reflection data using a layer-strip** type method, and the separate ide…
▽ More
We consider the inverse scattering problem associated with any number of interacting modes in one-dimensional structures. The coupling between the modes is contradirectional in addition to codirectional, and may be distributed continuously or in discrete points. The local coupling as a function of position is obtained from reflection data using a layer-strip** type method, and the separate identification of the contradirectional and codirectional coupling is obtained using matrix factorization. Ambiguities are discussed in detail, and different {\it a priori} information that can resolve the ambiguities is suggested. The method is exemplified by applications to multimode optical waveguides with quasi-periodical perturbations.
△ Less
Submitted 22 July, 2007;
originally announced July 2007.
-
The perfect lens on a finite bandwidth
Authors:
Øyvind Lind-Johansen,
Kristian Seip,
Johannes Skaar
Abstract:
The resolution associated with the so-called perfect lens of thickness $d$ is $-2πd/\ln(|χ+2|/2)$. Here the susceptibility $χ$ is a Hermitian function in $H^2$ of the upper half-plane, i.e., a $H^2$ function satisfying $χ(-ω)=\bar{χ(ω)}$. An additional requirement is that the imaginary part of $χ$ be nonnegative for nonnegative arguments. Given an interval $I$ on the positive half-axis, we compu…
▽ More
The resolution associated with the so-called perfect lens of thickness $d$ is $-2πd/\ln(|χ+2|/2)$. Here the susceptibility $χ$ is a Hermitian function in $H^2$ of the upper half-plane, i.e., a $H^2$ function satisfying $χ(-ω)=\bar{χ(ω)}$. An additional requirement is that the imaginary part of $χ$ be nonnegative for nonnegative arguments. Given an interval $I$ on the positive half-axis, we compute the distance in $L^\infty(I)$ from a negative constant to this class of functions. This result gives a surprisingly simple and explicit formula for the optimal resolution of the perfect lens on a finite bandwidth.
△ Less
Submitted 20 June, 2007;
originally announced June 2007.
-
Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols
Authors:
Vadim Makarov,
Johannes Skaar
Abstract:
In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the incoming pulses). It has previously been shown that the Bennett-Brassard 1984 (BB84) protocol is vulnerable to this attack. In this paper, we show…
▽ More
In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the incoming pulses). It has previously been shown that the Bennett-Brassard 1984 (BB84) protocol is vulnerable to this attack. In this paper, we show that several other protocols and encodings may also be vulnerable. We consider a faked states attack in the case of a partial efficiency mismatch on the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol, and derive the quantum bit error rate as a function of detector efficiencies. Additionally, it is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols.
△ Less
Submitted 23 November, 2007; v1 submitted 27 February, 2007;
originally announced February 2007.
-
On resolving the refractive index and the wave vector
Authors:
Johannes Skaar
Abstract:
The identification of the refractive index and wave vector for general (possibly active) linear, isotropic, homogeneous, and non-spatially dispersive media is discussed. Correct conditions for negative refraction necessarily include the global properties of the permittivity and permeability functions $ε=ε(ω)$ and $μ=μ(ω)$. On the other hand, a necessary and sufficient condition for left-handedne…
▽ More
The identification of the refractive index and wave vector for general (possibly active) linear, isotropic, homogeneous, and non-spatially dispersive media is discussed. Correct conditions for negative refraction necessarily include the global properties of the permittivity and permeability functions $ε=ε(ω)$ and $μ=μ(ω)$. On the other hand, a necessary and sufficient condition for left-handedness can be identified at a single frequency ($\reε/|ε|+\reμ/|μ|<0$). At oblique incidence to semi-infinite, active media it is explained that the wave vector generally loses its usual interpretation for real frequencies.
△ Less
Submitted 20 November, 2006; v1 submitted 12 July, 2006;
originally announced July 2006.
-
Effects of detector efficiency mismatch on security of quantum cryptosystems
Authors:
Vadim Makarov,
Andrey Anisimov,
Johannes Skaar
Abstract:
We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photon detectors, this control parameter can be the timing of the incoming pulse. When the eavesdropper sends short pulses using the appropriate timing so that the two gated detectors in Bob's setup have differe…
▽ More
We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photon detectors, this control parameter can be the timing of the incoming pulse. When the eavesdropper sends short pulses using the appropriate timing so that the two gated detectors in Bob's setup have different efficiencies, the security of quantum key distribution can be compromised. Specifically, we show for the Bennett-Brassard 1984 (BB84) protocol that if the efficiency mismatch between 0 and 1 detectors for some value of the control parameter gets large enough (roughly 15:1 or larger), Eve can construct a successful faked-states attack causing a quantum bit error rate lower than 11%. We also derive a general security bound as a function of the detector sensitivity mismatch for the BB84 protocol. Experimental data for two different detectors are presented, and protection measures against this attack are discussed.
△ Less
Submitted 6 March, 2007; v1 submitted 3 November, 2005;
originally announced November 2005.