Skip to main content

Showing 1–50 of 53 results for author: Skaar, J

.
  1. Tunneling times of single photons

    Authors: Jan Gulla, Johannes Skaar

    Abstract: Although the group delay of classical pulses through a barrier may suggest superluminality, the information transfer is limited by the precursor which propagates at the vacuum light speed. Single photons, however, have infinite tails, and the question of causality becomes meaningless. We solve this problem by introducing strictly localized states close to single photons, which are examples of opti… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

  2. Strictly localized three-dimensional states close to single photons

    Authors: Kai Ryen, Jan Gulla, Johannes Skaar

    Abstract: A class of strictly localized states which can be made arbitrarily close to single photons is constructed, and expressions for central properties are provided. It is demonstrated that single photon states can be well approximated by these states down to localization scales on the order of a few pulse cycles. The results readily generalize to states close to $n$-photons. We also provide upper and l… ▽ More

    Submitted 14 December, 2021; v1 submitted 16 September, 2021; originally announced September 2021.

  3. arXiv:2109.06472  [pdf, other

    quant-ph

    Limits for realizing single photons

    Authors: Jan Gulla, Kai Ryen, Johannes Skaar

    Abstract: Exact single photons cannot be generated on demand due to their infinite tails. To quantify how close realizable optical states can be to some target single photon in one dimension, we argue that there are two natural but incompatible ways to specify the target state. Either it can be expressed as a photon with a chosen positive-frequency spectrum, or it can be described as an (unphysical) photon… ▽ More

    Submitted 2 November, 2023; v1 submitted 14 September, 2021; originally announced September 2021.

  4. Approaching single-photon pulses

    Authors: Jan Gulla, Johannes Skaar

    Abstract: Single-photon pulses cannot be generated on demand, due to incompatible requirements of positive frequencies and positive times. Resulting states therefore contain small probabilities for multiphotons. We derive upper and lower bounds for the maximum fidelity of realizable states that approximate single-photon pulses. The bounds have implications for ultrafast optics; the maximum fidelity is low f… ▽ More

    Submitted 22 February, 2021; v1 submitted 17 August, 2020; originally announced August 2020.

    Journal ref: Phys. Rev. Lett. 126, 073601 (2021)

  5. Fresnel's equations in statics and quasistatics

    Authors: Johannes Skaar

    Abstract: Fresnel's equations describe reflection and transmission of electromagnetic waves at an interface between two media. It turns out that these equations can be used in quasistatics and even statics, for example to straightforwardly calculate magnetic forces between a permanent magnet and a bulk medium. This leads to a generalization of the classical image method.

    Submitted 22 February, 2019; originally announced February 2019.

  6. arXiv:1812.05466  [pdf, ps, other

    physics.optics

    The magnetic permeability in Fresnel's equation

    Authors: Hans Olaf Hågenvik, Johannes Skaar

    Abstract: Magnetic permeabilities derived for infinite, periodic media are used in the Fresnel equation to calculate the reflection from corresponding semi-infinite media. By comparison to finite-difference-time-domain (FDTD) simulations, we find that the Fresnel equation gives accurate results for 2D metamaterials which mimic natural magnetism, in a frequency range where the magnetic moment density dominat… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

  7. arXiv:1810.07996  [pdf, other

    physics.class-ph cond-mat.mtrl-sci

    Four definitions of magnetic permeability for periodic metamaterials

    Authors: Johannes Skaar, Hans Olaf Hågenvik, Christopher A. Dirdal

    Abstract: We state and compare four different definitions of magnetic permeability for periodic, artificial media, or metamaterials. The connection between them, and properties in general, are discussed in detail, including causality, passivity, symmetry, asymptotic behavior, and origin dependence. The analysis is limited to metamaterials made from linear and nonmagnetic constituents.

    Submitted 7 February, 2019; v1 submitted 18 October, 2018; originally announced October 2018.

    Journal ref: Phys. Rev. B 99, 064407 (2019)

  8. Comment on "Inherent security of phase coding quantum key distribution systems against detector blinding attacks" [Laser Phys. Lett. 15, 095203 (2018)]

    Authors: Aleksey Fedorov, Ilja Gerhardt, Anqi Huang, Jonathan Jogenfors, Yury Kurochkin, Antía Lamas-Linares, Jan-Åke Larsson, Gerd Leuchs, Lars Lydersen, Vadim Makarov, Johannes Skaar

    Abstract: This is a brief comment on the Letter by Balygin and his coworkers [Laser Phys. Lett. 15, 095203 (2018)]. We point out an error that invalidates the Letter's conclusions.

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 2 pages

    Journal ref: Laser Phys. Lett. 16, 019401 (2019)

  9. arXiv:1710.00038  [pdf, other

    physics.class-ph

    Dielectric media considered as vacuum with sources

    Authors: Hans Olaf Hågenvik, Kjell Bløtekjær, Johannes Skaar

    Abstract: Conventional textbook treatments on electromagnetic wave propagation consider the induced charge and current densities as "bound", and therefore absorb them into a refractive index. In principle it must also be possible to treat the medium as vacuum, but with explicit charge and current densities. This gives a more direct, physical description. However, since the induced waves propagate in vacuum… ▽ More

    Submitted 15 June, 2018; v1 submitted 7 September, 2017; originally announced October 2017.

    Journal ref: Am. J. Phys. 85, 830-833 (2017)

  10. Space QUEST mission proposal: Experimentally testing decoherence due to gravity

    Authors: Siddarth Koduru Joshi, Jacques Pienaar, Timothy C. Ralph, Luigi Cacciapuoti, Will McCutcheon, John Rarity, Dirk Giggenbach, ** Gyu Lim, Vadim Makarov, Ivette Fuentes, Thomas Scheidl, Erik Beckert, Mohamed Bourennane, David Edward Bruschi, Adan Cabello, Jose Capmany, Alberto Carrasco-Casado, Eleni Diamanti, Miloslav Duusek, Dominique Elser, Angelo Gulinatti, Robert H. Hadfield, Thomas Jennewein, Rainer Kaltenbaek, Michael A. Krainak , et al. (20 additional authors not shown)

    Abstract: Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph,… ▽ More

    Submitted 9 January, 2018; v1 submitted 23 March, 2017; originally announced March 2017.

    Comments: 18 pages, 13 figures, included radiation damage to detectors in appendix

    Journal ref: New J. Phys. 20, 063016 (2018)

  11. Higher order multipoles in metamaterial homogenization

    Authors: Christopher A. Dirdal, Hans Olaf Hågenvik, Haakon Aamot Haave, Johannes Skaar

    Abstract: The higher order multipoles above the electric quadrupole are commonly neglected in metamaterial homogenization. We show that they nevertheless can be significant when second order spatial dispersive effects, such as the magnetic response, are considered. In this respect, they can be equally important as the magnetization and quadrupole terms, and should not automatically be neglected.

    Submitted 19 April, 2018; v1 submitted 6 January, 2017; originally announced January 2017.

    Comments: 8 pages, 5 figures

    Journal ref: IEEE Transactions on Antennas and Propagation, vol. 66, no. 11, pp. 6403-6407, Nov. 2018

  12. Secure detection in quantum key distribution by real-time calibration of receiver

    Authors: Øystein Marøy, Vadim Makarov, Johannes Skaar

    Abstract: The single photon detection efficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdrop** attack that exploits the photon receiver's imperfections. We present a method for estimating the detection efficiency, and calculate the corresponding secure key gene… ▽ More

    Submitted 18 June, 2018; v1 submitted 22 November, 2016; originally announced November 2016.

    Comments: 7 pages, 4 figures

    Journal ref: Quantum Sci. Technol. 2, 044013 (2017)

  13. Laplace-Fourier analysis and instabilities of a gainy slab

    Authors: Hans Olaf Hågenvik, Johannes Skaar

    Abstract: The idealization of monochromatic plane waves leads to considerable simplifications in the analysis of electromagnetic systems. However, for active systems this idealization may be dangerous due to the presence of growing waves. Here we consider a gainy slab, and use a realistic incident beam, which is both causal and has finite width. This clarifies some apparent paradoxes arising from earlier an… ▽ More

    Submitted 23 April, 2015; originally announced April 2015.

    Comments: 7 pages, 6 figures

  14. Relaxed dispersion constraints and metamaterial effective parameters with physical meaning for all frequencies

    Authors: Christopher A. Dirdal, Tarjei Bondevik, Johannes Skaar

    Abstract: Metamaterial effective parameters may exhibit freedom from typical dispersion constraints. For instance, the emergence of a magnetic response in arrays of split-ring resonators for long wavelengths cannot be attained in a passive continuous system obeying the Kramers-Kronig relations. We characterize such freedom by identifying the three possible asymptotes which effective parameters can approach… ▽ More

    Submitted 28 March, 2015; v1 submitted 27 October, 2014; originally announced October 2014.

    Comments: 7 pages, 7 figures

    Journal ref: Phys. Rev. B 91, 134102 (2015)

  15. Diamagnetism and the dispersion of the magnetic permeability

    Authors: Christopher A. Dirdal, Johannes Skaar

    Abstract: It is well known that the usual Kramers--Kronig relations for the relative permeability function $μ(ω)$ are not compatible with diamagnetism ($μ(0)<1$) and a positive imaginary part ($\text{Im}\,μ(ω)>0$ for $ω>0$). We demonstrate that a certain physical meaning can be attributed to $μ$ for all frequencies, and that in the presence of spatial dispersion, $μ$ does not necessarily tend to 1 for high… ▽ More

    Submitted 12 February, 2018; v1 submitted 22 October, 2014; originally announced October 2014.

    Journal ref: Dirdal, C.A. & Skaar, J. Eur. Phys. J. B (2018) 91: 131

  16. Fourier theory of linear gain media

    Authors: Hans Olaf Hågenvik, Markus E. Malema, Johannes Skaar

    Abstract: The analysis of wave propagation in linear, passive media is usually done by considering a single real frequency (the monochromatic limit) and also often a single plane wave component (plane wave limit), separately. For gain media, we demonstrate that these two limits generally do not commute; for example, one order may lead to a diverging field, while the other order leads to a finite field. More… ▽ More

    Submitted 27 March, 2015; v1 submitted 1 July, 2014; originally announced July 2014.

    Journal ref: Phys. Rev. A 91, 043826 (2015)

  17. arXiv:1310.8384  [pdf, ps, other

    quant-ph physics.ins-det

    Laser damage helps the eavesdropper in quantum cryptography

    Authors: Audun N. Bugge, Sebastien Sauge, Aina M. M. Ghazali, Johannes Skaar, Lars Lydersen, Vadim Makarov

    Abstract: We propose a class of attacks on quantum key distribution (QKD) systems where an eavesdropper actively engineers new loopholes by using damaging laser illumination to permanently change properties of system components. This can turn a perfect QKD system into a completely insecure system. A proof-of-principle experiment performed on an avalanche photodiode-based detector shows that laser damage can… ▽ More

    Submitted 20 February, 2014; v1 submitted 31 October, 2013; originally announced October 2013.

    Comments: Extended and improved discussions. This version is published in Phys. Rev. Lett. 5 pages, 4 figures

    Journal ref: Phys. Rev. Lett. 112, 070503 (2014)

  18. Superpositions of Lorentzians as the class of causal functions

    Authors: Christopher A. Dirdal, Johannes Skaar

    Abstract: We prove that all functions obeying the Kramers-Kronig relations can be approximated as superpositions of Lorentzian functions, to any precision. As a result, the typical text-book analysis of dielectric dispersion response functions in terms of Lorentzians may be viewed as encompassing the whole class of causal functions. A further consequence is that Lorentzian resonances may be viewed as possib… ▽ More

    Submitted 15 October, 2013; v1 submitted 29 July, 2013; originally announced July 2013.

    Comments: 9 pages, 10 figures

    Journal ref: Phys. Rev. A 88, 033834 (2013)

  19. arXiv:1307.5951  [pdf, ps, other

    quant-ph physics.ins-det

    A universal setup for active control of a single-photon detector

    Authors: Qin Liu, Antía Lamas-Linares, Christian Kurtsiefer, Johannes Skaar, Vadim Makarov, Ilja Gerhardt

    Abstract: The influence of bright light on a single-photon detector has been described in a number of recent publications. The impact on quantum key distribution (QKD) is important, and several hacking experiments have been tailored to fully control single-photon detectors. Special attention has been given to avoid introducing further errors into a QKD system. We describe the design and technical details of… ▽ More

    Submitted 15 December, 2013; v1 submitted 23 July, 2013; originally announced July 2013.

    Comments: 10 pages, 10 figures

    Journal ref: Rev. Sci. Instrum. 85, 013108 (2014)

  20. arXiv:1301.6374  [pdf, ps, other

    cond-mat.mes-hall physics.optics quant-ph

    Symmetries and optical transitions of hexagonal quantum dots in GaAs/AlGaAs nanowires

    Authors: Guro K. Svendsen, Johannes Skaar, Helge Weman, Marc-André Dupertuis

    Abstract: We investigate the properties of electronic states and optical transitions in hexagonal GaAs quantum dots within AlGaAs nanowires. Such dots are particularly interesting due to their high degree of symmetry. A streamlined postsymmetrization technique based on class operators (PTCO) is developed which enables one to benefit in one run from the insight brought by the Maximal symmetrization and reduc… ▽ More

    Submitted 27 January, 2013; originally announced January 2013.

    Journal ref: Phys. Rev. B 92, 205303 (2015)

  21. Reciprocity and the scattering matrix of waveguide modes

    Authors: Guro K. Svendsen, Magnus W. Haakestad, Johannes Skaar

    Abstract: The implications of the Lorentz reciprocity theorem for a scatterer connected to waveguides with arbitrary modes, including degenerate, evanescent, and complex modes, are discussed. In general it turns out that a matrix $CS$ is symmetric, where $C$ is the matrix of generalized orthogonality coefficients, and $S$ is the scattering matrix. Examples are given, including a scatterer surrounded by wave… ▽ More

    Submitted 11 January, 2013; originally announced January 2013.

  22. Error Estimation, Error Correction and Verification In Quantum Key Distribution

    Authors: Øystein Marøy, Magne Gudmundsen, Lars Lydersen, Johannes Skaar

    Abstract: We consider error correction in quantum key distribution. To avoid that Alice and Bob unwittingly end up with different keys precautions must be taken. Before running the error correction protocol, Bob and Alice normally sacrifice some bits to estimate the error rate. To reduce the probability that they end up with different keys to an acceptable level, we show that a large number of bits must be… ▽ More

    Submitted 24 October, 2012; originally announced October 2012.

    Comments: 9 pages, 8 figures

    Journal ref: IET Inf. Secur. 8, 277-282 (2014)

  23. Inverse scattering of dispersive stratified structures

    Authors: Johannes Skaar, Magnus W. Haakestad

    Abstract: We consider the inverse scattering problem of retrieving the structural parameters of a stratified medium consisting of dispersive materials, given knowledge of the complex reflection coefficient in a finite frequency range. It is shown that the inverse scattering problem does not have a unique solution in general. When the dispersion is sufficiently small, such that the time-domain Fresnel reflec… ▽ More

    Submitted 31 July, 2012; originally announced July 2012.

    Journal ref: JOSA B, Vol. 29, Issue 9, pp. 2438-2445 (2012)

  24. arXiv:1111.0767  [pdf, ps, other

    physics.optics

    Investigations of Bragg reflectors in nanowire lasers

    Authors: Guro Kristin Svendsen, Helge Weman, Johannes Skaar

    Abstract: The reflectivity of various Bragg reflectors in connection to waveguide structures, including nanowires, has been investigated using modal reflection and transmission matrices. A semi-analytical model was applied yielding increased understanding of the diffraction effects present in such gratings. Planar waveguides and nanowire lasers are considered in particular. Two geometries are compared; Brag… ▽ More

    Submitted 22 June, 2012; v1 submitted 3 November, 2011; originally announced November 2011.

    Journal ref: J. Appl. Phys. 111, 123102 (2012)

  25. Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"

    Authors: Lars Lydersen, Vadim Makarov, Johannes Skaar

    Abstract: This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].

    Submitted 19 June, 2011; originally announced June 2011.

    Comments: 2 pages

    Journal ref: Appl. Phys. Lett. 99, 196101 (2011)

  26. Experimentally faking the violation of Bell's inequalities

    Authors: Ilja Gerhardt, Qin Liu, Antía Lamas-Linares, Johannes Skaar, Valerio Scarani, Vadim Makarov, Christian Kurtsiefer

    Abstract: Entanglement witnesses such as Bell inequalities are frequently used to prove the non-classicality of a light source and its suitability for further tasks. By demonstrating Bell inequality violations using classical light in common experimental arrangements, we highlight why strict locality and efficiency conditions are not optional, particularly in security-related scenarios.

    Submitted 23 October, 2011; v1 submitted 16 June, 2011; originally announced June 2011.

    Comments: Added discussion of countermeasures, updated references. This version is published in Phys. Rev. Lett. 5 pages, 4 figures

    Journal ref: Phys. Rev. Lett. 107, 170404 (2011)

  27. Controlling a superconducting nanowire single-photon detector using tailored bright illumination

    Authors: Lars Lydersen, Mohsen K. Akhlaghi, A. Hamed Majedi, Johannes Skaar, Vadim Makarov

    Abstract: We experimentally demonstrate that a superconducting nanowire single-photon detector is deterministically controllable by bright illumination. We found that bright light can temporarily make a large fraction of the nanowire length normally-conductive, can extend deadtime after a normal photon detection, and can cause a hotspot formation during the deadtime with a highly nonlinear sensitivity. In r… ▽ More

    Submitted 16 November, 2011; v1 submitted 13 June, 2011; originally announced June 2011.

    Comments: Expanded discussions, updated references. 9 pages, 8 figures

    Journal ref: New J. Phys. 13, 113042 (2011)

  28. Superlinear threshold detectors in quantum cryptography

    Authors: Lars Lydersen, Nitin Jain, Christoffer Wittmann, Øystein Marøy, Johannes Skaar, Christoph Marquardt, Vadim Makarov, Gerd Leuchs

    Abstract: We introduce the concept of a superlinear threshold detector, a detector that has a higher probability to detect multiple photons if it receives them simultaneously rather than at separate times. Highly superlinear threshold detectors in quantum key distribution systems allow eavesdrop** the full secret key without being revealed. Here, we generalize the detector control attack, and analyze how… ▽ More

    Submitted 17 August, 2011; v1 submitted 10 June, 2011; originally announced June 2011.

    Comments: Rewritten for clearity. Included a discussion on detector dark counts, a discussion on how to tackle this type of loopholes, and updated references. 8 pages, 6 figures

    Journal ref: Phys. Rev. A 84, 032320 (2011)

  29. Inverse scattering of 2d photonic structures by layer-strip**

    Authors: Marte P. Hatlo Andresen, Harald E. Krogstad, Johannes Skaar

    Abstract: Design and reconstruction of 2d and 3d photonic structures are usually carried out by forward simulations combined with optimization or intuition. Reconstruction by means of layer-strip** has been applied in seismic processing as well as in design and characterization of 1d photonic structures such as fiber Bragg gratings. Layer-strip** is based on causality, where the earliest scattered light… ▽ More

    Submitted 2 February, 2011; originally announced February 2011.

    Journal ref: JOSA B, Vol. 28, Issue 4, pp. 689-696 (2011)

  30. Secure gated detection scheme for quantum cryptography

    Authors: Lars Lydersen, Vadim Makarov, Johannes Skaar

    Abstract: Several attacks have been proposed on quantum key distribution systems with gated single-photon detectors. The attacks involve triggering the detectors outside the center of the detector gate, and/or using bright illumination to exploit classical photodiode mode of the detectors. Hence a secure detection scheme requires two features: The detection events must take place in the middle of the gate,… ▽ More

    Submitted 29 January, 2011; originally announced January 2011.

    Comments: 7 pages, 3 figures

    Journal ref: Phys. Rev. A 83, 032306 (2011)

  31. Tailored bright illumination attack on distributed-phase-reference protocols

    Authors: Lars Lydersen, Johannes Skaar, Vadim Makarov

    Abstract: Detector control attacks on quantum key distribution systems exploit the linear mode of avalanche photodiode in single photon detectors. So far, the protocols under consideration have been the BB84 protocol and its derivatives. Here we present how bright tailored illumination exploiting the linear mode of detectors can be used to eavesdrop on distributed-phase-reference protocols, such as differen… ▽ More

    Submitted 20 December, 2010; originally announced December 2010.

    Comments: 5 pages, 3 figures

    Journal ref: J. Mod. Opt. 58, 680--685 (2011)

  32. arXiv:1012.3270  [pdf, ps, other

    physics.optics

    Model for reflection and transmission matrices of nanowire end facets

    Authors: Guro K. Svendsen, Helge Weman, Johannes Skaar

    Abstract: Nanowires show a large potential for various electrooptical devices, such as light emitting diodes, solar cells and nanowire lasers. We present a direct method developed to calculate the modal reflection and transmission matrix at the end facets of a waveguide of arbitrary cross section, resulting in a generalized version of the Fresnel equations. The reflection can be conveniently computed using… ▽ More

    Submitted 4 April, 2011; v1 submitted 15 December, 2010; originally announced December 2010.

    Comments: 11 pages,14 figures

    Journal ref: J. Appl. Phys. 109, 103101 (2011)

  33. Reply to "Avoiding the Detector Blinding Attack on Quantum Cryptography"

    Authors: Lars Lydersen, Carlos Wiechers, Christoffer Wittmann, Dominique Elser, Johannes Skaar, Vadim Makarov

    Abstract: This is a reply to the comment by Yuan et al. [arXiv:1009.6130v1] on our publication [arXiv:1008.4593].

    Submitted 2 December, 2010; originally announced December 2010.

    Comments: 1 page

    Journal ref: Nature Photonics 4, 801 (2010)

  34. Full-field implementation of a perfect eavesdropper on a quantum cryptography system

    Authors: Ilja Gerhardt, Qin Liu, Antia Lamas-Linares, Johannes Skaar, Christian Kurtsiefer, Vadim Makarov

    Abstract: Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-fiel… ▽ More

    Submitted 18 March, 2012; v1 submitted 30 October, 2010; originally announced November 2010.

    Comments: Revised after editorial and peer-review feedback. This version is published in Nat. Commun. 8 pages, 6 figures, 1 table

    Journal ref: Nat. Commun. 2, 349 (2011)

  35. arXiv:1009.4592  [pdf, ps, other

    physics.optics

    Total internal reflection and evanescent gain

    Authors: Jon Olav Grepstad, Johannes Skaar

    Abstract: Total internal reflection occurs for large angles of incidence, when light is incident from a high-refractive-index medium onto a low-index medium. We consider the situation where the low-index medium is active. By invoking causality in its most fundamental form, we argue that evanescent gain may or may not appear, depending on the analytic and global properties of the permittivity function. For c… ▽ More

    Submitted 15 October, 2011; v1 submitted 23 September, 2010; originally announced September 2010.

    Comments: http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-19-22-21404

    Journal ref: Optics Express Vol. 19, Iss. 22, pp. 21404-21418 (2011)

  36. After-gate attack on a quantum cryptosystem

    Authors: Carlos Wiechers, Lars Lydersen, Christoffer Wittmann, Dominique Elser, Johannes Skaar, Christoph Marquardt, Vadim Makarov, Gerd Leuchs

    Abstract: We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdrop… ▽ More

    Submitted 14 September, 2010; originally announced September 2010.

    Comments: 14 pages, 8 figures

    Journal ref: New J. Phys. 13, 013043 (2011)

  37. Thermal blinding of gated detectors in quantum cryptography

    Authors: Lars Lydersen, Carlos Wiechers, Christoffer Wittmann, Dominique Elser, Johannes Skaar, Vadim Makarov

    Abstract: It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating voltages in the circuit [L. Lydersen et al., Nat. Photonics DOI:10.1038/nphoton.2010.214]. This allows for an attack eavesdrop** the full raw an… ▽ More

    Submitted 14 September, 2010; originally announced September 2010.

    Comments: 10 pages, 12 figures

    Journal ref: Optics Express 18, 27938-27954 (2010)

  38. Hacking commercial quantum cryptography systems by tailored bright illumination

    Authors: Lars Lydersen, Carlos Wiechers, Christoffer Wittmann, Dominique Elser, Johannes Skaar, Vadim Makarov

    Abstract: The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdrop** by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD… ▽ More

    Submitted 4 March, 2011; v1 submitted 26 August, 2010; originally announced August 2010.

    Comments: Revised version, rewritten for clarity. 5 pages, 5 figures. To download the Supplementary information (which is in open access), go to the journal web site at http://dx.doi.org/10.1038/nphoton.2010.214

    Journal ref: Nature Photonics 4, 686 - 689 (2010)

  39. arXiv:1008.3223  [pdf, other

    physics.optics

    Negative refraction: A tutorial

    Authors: Johannes Skaar

    Abstract: The concepts of negative refractive index and near-field imaging are explained in the form of a tutorial.

    Submitted 19 August, 2010; originally announced August 2010.

  40. arXiv:1008.2874  [pdf, other

    physics.optics

    Causality and Its Implications for Passive and Active Media

    Authors: Johannes Skaar

    Abstract: The implications of causality are examined in detail for the permittivity, permeability, and refractive index of passive and active media. Particular attention is given to negative index media.

    Submitted 17 August, 2010; originally announced August 2010.

    Comments: URSI EMTS 2010 conference, Berlin 2010

  41. The effect of gain saturation in a gain compensated perfect lens

    Authors: Marte P. Hatlo Andresen, Aleksander V. Skaldebø, Magnus W. Haakestad, Harald E. Krogstad, Johannes Skaar

    Abstract: The transmission of evanescent waves in a gain-compensated perfect lens is discussed. In particular, the impact of gain saturation is included in the analysis, and a method for calculating the fields of such nonlinear systems is developed. Gain compensation clearly improves the resolution; however, a number of nonideal effects arise as a result of gain saturation. The resolution associated with th… ▽ More

    Submitted 15 July, 2010; originally announced July 2010.

    Comments: to appear in J. Opt. Soc. Am. B

    Journal ref: JOSA B, Vol. 27, Issue 8, pp. 1610-1616 (2010)

  42. Security of quantum key distribution with arbitrary individual imperfections

    Authors: Øystein Marøy, Lars Lydersen, Johannes Skaar

    Abstract: We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be… ▽ More

    Submitted 1 June, 2010; v1 submitted 20 March, 2009; originally announced March 2009.

    Journal ref: Phys. Rev. A 82, 032337 (2010)

  43. arXiv:0809.3408  [pdf, other

    quant-ph physics.ins-det

    Controlling an actively-quenched single photon detector with bright light

    Authors: Sebastien Sauge, Lars Lydersen, Andrey Anisimov, Johannes Skaar, Vadim Makarov

    Abstract: We control using bright light an actively-quenched avalanche single-photon detector. Actively-quenched detectors are commonly used for quantum key distribution (QKD) in the visible and near-infrared range. This study shows that these detectors are controllable by the same attack used to hack passively-quenched and gated detectors. This demonstrates the generality of our attack and its possible app… ▽ More

    Submitted 23 October, 2011; v1 submitted 19 September, 2008; originally announced September 2008.

    Comments: Expanded discussions, updated references, added a picture of decapsulated APD, reformatted to single-column style. Accepted to Opt. Express. 11 pages, 6 figures

    Journal ref: Opt. Express 19, 23590 (2011)

  44. arXiv:0807.0767  [pdf, ps, other

    quant-ph

    Security of quantum key distribution with bit and basis dependent detector flaws

    Authors: L. Lydersen, J. Skaar

    Abstract: We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), in the presence of bit and basis dependent detector flaws. We suggest a powerful attack that can be used in systems with detector efficiency mismatch, even if the detector assignments are chosen randomly by Bob. A security proof is provided, valid for any basis dependent, possibly lossy, lin… ▽ More

    Submitted 4 January, 2010; v1 submitted 4 July, 2008; originally announced July 2008.

    Comments: 10 pages, 4 figures; v4: rewritten for clarity

    Journal ref: Quant. Inf. Comp. 10, 0060 (2010)

  45. arXiv:0712.3132  [pdf, ps, other

    physics.optics physics.class-ph

    On the electromagnetic properties of active media

    Authors: Bertil Nistad, Johannes Skaar

    Abstract: Several results concerning active media or metamaterials are proved and discussed. In particular, we consider the permittivity, permeability, wave vector, and refractive index, and discuss stability, refraction, gain, and fundamental limitations resulting from causality.

    Submitted 16 June, 2008; v1 submitted 19 December, 2007; originally announced December 2007.

    Journal ref: Phys. Rev. E 78, 036603 (2008)

  46. arXiv:0707.3252  [pdf, ps, other

    math-ph

    Inverse scattering in multimode structures

    Authors: Ole Henrik Waagaard, Johannes Skaar

    Abstract: We consider the inverse scattering problem associated with any number of interacting modes in one-dimensional structures. The coupling between the modes is contradirectional in addition to codirectional, and may be distributed continuously or in discrete points. The local coupling as a function of position is obtained from reflection data using a layer-strip** type method, and the separate ide… ▽ More

    Submitted 22 July, 2007; originally announced July 2007.

    Comments: To appear in SIAM Journal of Applied Mathematics

    Journal ref: SIAM J. Appl. Math. 68, 311-333 (2007)

  47. arXiv:0706.3054  [pdf, ps, other

    physics.optics

    The perfect lens on a finite bandwidth

    Authors: Øyvind Lind-Johansen, Kristian Seip, Johannes Skaar

    Abstract: The resolution associated with the so-called perfect lens of thickness $d$ is $-2πd/\ln(|χ+2|/2)$. Here the susceptibility $χ$ is a Hermitian function in $H^2$ of the upper half-plane, i.e., a $H^2$ function satisfying $χ(-ω)=\bar{χ(ω)}$. An additional requirement is that the imaginary part of $χ$ be nonnegative for nonnegative arguments. Given an interval $I$ on the positive half-axis, we compu… ▽ More

    Submitted 20 June, 2007; originally announced June 2007.

    Journal ref: J. Math. Phys. 50, 012908 (2009)

  48. arXiv:quant-ph/0702262  [pdf, other

    quant-ph

    Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols

    Authors: Vadim Makarov, Johannes Skaar

    Abstract: In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the incoming pulses). It has previously been shown that the Bennett-Brassard 1984 (BB84) protocol is vulnerable to this attack. In this paper, we show… ▽ More

    Submitted 23 November, 2007; v1 submitted 27 February, 2007; originally announced February 2007.

    Comments: 9 pages, 2 tables, 5 figures; v3: rewritten for clarity, a few explanations and recent references added

    Journal ref: Quant. Inf. Comp. 8, 0622 (2008)

  49. On resolving the refractive index and the wave vector

    Authors: Johannes Skaar

    Abstract: The identification of the refractive index and wave vector for general (possibly active) linear, isotropic, homogeneous, and non-spatially dispersive media is discussed. Correct conditions for negative refraction necessarily include the global properties of the permittivity and permeability functions $ε=ε(ω)$ and $μ=μ(ω)$. On the other hand, a necessary and sufficient condition for left-handedne… ▽ More

    Submitted 20 November, 2006; v1 submitted 12 July, 2006; originally announced July 2006.

    Journal ref: Optics Letters 31, pp. 3372-3374 (2006)

  50. Effects of detector efficiency mismatch on security of quantum cryptosystems

    Authors: Vadim Makarov, Andrey Anisimov, Johannes Skaar

    Abstract: We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photon detectors, this control parameter can be the timing of the incoming pulse. When the eavesdropper sends short pulses using the appropriate timing so that the two gated detectors in Bob's setup have differe… ▽ More

    Submitted 6 March, 2007; v1 submitted 3 November, 2005; originally announced November 2005.

    Comments: v3: identical to the journal version. However, after publication we have discovered that Eq. 11 is incorrect: the available bit rate after privacy amplification is reduced even in the case (QBER)=0 [see Quant. Inf. Comp. 7, 73 (2007)]

    Journal ref: Phys. Rev. A 74, 022313 (2006)