Skip to main content

Showing 1–30 of 30 results for author: Peev, M

.
  1. arXiv:2409.01069  [pdf, other

    quant-ph eess.SY

    A blueprint for large-scale quantum-network deployments

    Authors: Alberto Sebastián-Lombraña, Hans H. Brunner, Juan P. Brito, Rubén B. Méndez, Rafael J. Vicente, Jaime S. Buruaga, Laura Ortiz, Chi-Hang Fred Fung, Momtchil Peev, José M. Rivas-Moscoso, Felipe Jiménez, Antonio Pastor, Diego R. López, Jesús Folgueira, Vicente Martín

    Abstract: Quantum Communications is a field that promises advances in cryptography, quantum computing and clock synchronisation, among other potential applications. However, communication based on quantum phenomena requires an extreme level of isolation from external disturbances, making the transmission of quantum signals together with classical ones difficult. A range of techniques has been tested to intr… ▽ More

    Submitted 26 December, 2024; v1 submitted 2 September, 2024; originally announced September 2024.

    Comments: 18 pages

  2. arXiv:2311.12791  [pdf

    quant-ph

    MadQCI: a heterogeneous and scalable SDN QKD network deployed in production facilities

    Authors: V. Martin, J. P. Brito, L. Ortiz, R. B. Mendez, J. S. Buruaga, R. J. Vicente, A. Sebastián-Lombraña, D. Rincon, F. Perez, C. Sanchez, M. Peev, H. H. Brunner, F. Fung, A. Poppe, F. Fröwis, A. J. Shields, R. I. Woodward, H. Griesser, S. Roehrich, F. De La Iglesia, C. Abellan, M. Hentschel, J. M. Rivas-Moscoso, A. Pastor, J. Folgueira , et al. (1 additional authors not shown)

    Abstract: Current quantum key distribution (QKD) networks focus almost exclusively on transporting secret keys with the highest possible rate. Consequently, they are built as mostly fixed, ad hoc, logically, and physically isolated infrastructures designed to avoid any penalty to the quantum channel. This architecture is neither scalable nor cost-effective and future, real-world deployments will differ cons… ▽ More

    Submitted 3 December, 2023; v1 submitted 21 November, 2023; originally announced November 2023.

  3. arXiv:2311.08038  [pdf, other

    cs.CR cs.NI

    Linking QKD testbeds across Europe

    Authors: Max Brauer, Rafael J. Vicente, Jaime S. Buruaga, Ruben B. Mendez, Ralf-Peter Braun, Marc Geitz, Piotr Rydlichkowski, Hans H. Brunner, Fred Fung, Momtchil Peev, Antonio Pastor, Diego Lopez, Vicente Martin, Juan P. Brito

    Abstract: Quantum-key-distribution (QKD) networks are gaining importance and it has become necessary to analyze the most appropriate methods for their long-distance interconnection. In this paper, four different methods of interconnecting remote QKD networks are proposed. The methods are used to link three different QKD testbeds in Europe, located in Berlin, Madrid, and Poznan. Although long-distance QKD li… ▽ More

    Submitted 10 January, 2024; v1 submitted 14 November, 2023; originally announced November 2023.

  4. arXiv:2305.07388  [pdf, other

    math.PR math-ph math.OA

    A Dynamical Yukawa$_{2}$ Model

    Authors: Ajay Chandra, Martin Hairer, Martin Peev

    Abstract: We prove local (in space and time) well-posedness for a mildly regularised version of the stochastic quantisation of the Yukawa$_{2}$ Euclidean field theory with a self-interacting boson. Our regularised dynamic is still singular but avoids non-local divergences, allowing us to use a version of the Da Prato--Debussche argument. This model is a test case for a non-commutative probability framework… ▽ More

    Submitted 6 March, 2024; v1 submitted 12 May, 2023; originally announced May 2023.

    Comments: Added an argument using the Araki-Wyss representation to define a stronger non-commutative L^2 topology

    MSC Class: 81T08; 46L53; 60H15

  5. arXiv:2203.01622  [pdf

    quant-ph physics.ins-det physics.soc-ph

    Towards European Standards for Quantum Technologies

    Authors: O. van Deventer, N. Spethmann, M. Loeffler, M. Amoretti, R. van den Brink, N. Bruno, P. Comi, N. Farrugia, M. Gramegna, B. Kassenberg, W. Kozlowski, T. Länger, T. Lindstrom, V. Martin, N. Neumann, H. Papadopoulos, S. Pascazio, M. Peev, R. Pitwon, M. A. Rol, P. Traina, P. Venderbosch, F. K. Wilhelm-Mauch, A. Jenet

    Abstract: The Second Quantum Revolution facilitates the engineering of new classes of sensors, communication technologies, and computers with unprecedented capabilities. Supply chains for quantum technologies are emerging, some focussed on commercially available components for enabling technologies and/or quantum-technologies research infrastructures, others with already higher technology-readiness levels,… ▽ More

    Submitted 3 October, 2022; v1 submitted 3 March, 2022; originally announced March 2022.

    Journal ref: EPJ Quantum Technol. 9 (2022) 33

  6. The Engineering of Software-Defined Quantum Key Distribution Networks

    Authors: Alejandro Aguado, Victor Lopez, Diego Lopez, Momtchil Peev, Andreas Poppe, Antonio Pastor, Jesus Folgueira, Vicente Martiin

    Abstract: Quantum computers will change the cryptographic panorama. A technology once believed to lay far away into the future is increasingly closer to real world applications. Quantum computers will break the algorithms used in our public key infrastructure and in our key exchange protocols, forcing a complete retooling of the cryptography as we know it. Quantum Key distribution is a physical layer techno… ▽ More

    Submitted 29 June, 2019; originally announced July 2019.

    Comments: 7 pages, 4 figures, Accepted for publication in the IEEE Communications Magazine, Future Internet: Architectures and Protocols issue

    Journal ref: IEEE Communications Magazine ( Volume: 57 , Issue: 7 , July 2019 )

  7. A Novel Approach to Quality of Service Provisioning in Trusted Relay Quantum Key Distribution Networks

    Authors: Miralem Mehic, Peppino Fazio, Stefan Rass, Oliver Maurhart, Momtchil Peev, Andreas Poppe, Jan Rozhon, Marcin Niemiec, Miroslav Voznak

    Abstract: In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity between mobile ad-hoc networks and QKD technology, we pr… ▽ More

    Submitted 10 October, 2018; v1 submitted 9 October, 2018; originally announced October 2018.

    Comments: The article under the review in IEEE/ACM Transactions on Networking journal

    Report number: 19363016

    Journal ref: An updated version of this paper has been published in IEEE/ACM Transactions on Networking ( Volume: 28 , Issue: 1 , Feb. 2020 )

  8. Pilot-assisted intradyne reception for high-speed continuous-variable quantum key distribution with true local oscillator

    Authors: Fabian Laudenbach, Bernhard Schrenk, Christoph Pacher, Michael Hentschel, Chi-Hang Fred Fung, Fotini Karinou, Andreas Poppe, Momtchil Peev, Hannes Hübel

    Abstract: We present a pilot-assisted coherent intradyne reception methodology for CV-QKD with true local oscillator. An optically phase-locked reference tone, prepared using carrier-suppressed optical single-sideband modulation, is multiplexed in polarisation and frequency to the 250 Mbaud quantum signal in order to provide optical frequency- and phase matching between quantum signal and local oscillator.… ▽ More

    Submitted 3 October, 2019; v1 submitted 29 December, 2017; originally announced December 2017.

    Comments: 12 pages, 6 figures, 1 table

    Journal ref: Quantum 3, 193 (2019)

  9. Continuous-Variable Quantum Key Distribution with Gaussian Modulation -- The Theory of Practical Implementations

    Authors: Fabian Laudenbach, Christoph Pacher, Chi-Hang Fred Fung, Andreas Poppe, Momtchil Peev, Bernhard Schrenk, Michael Hentschel, Philip Walther, Hannes Hübel

    Abstract: Quantum key distribution using weak coherent states and homodyne detection is a promising candidate for practical quantum-cryptographic implementations due to its compatibility with existing telecom equipment and high detection efficiencies. However, despite the actual simplicity of the protocol, the security analysis of this method is rather involved compared to discrete-variable QKD. In this art… ▽ More

    Submitted 10 May, 2018; v1 submitted 27 March, 2017; originally announced March 2017.

    Comments: 71 pages, 9 figures, 1 table

    Journal ref: Adv. Quantum Technol. 1800011 (2018)

  10. Space QUEST mission proposal: Experimentally testing decoherence due to gravity

    Authors: Siddarth Koduru Joshi, Jacques Pienaar, Timothy C. Ralph, Luigi Cacciapuoti, Will McCutcheon, John Rarity, Dirk Giggenbach, Jin Gyu Lim, Vadim Makarov, Ivette Fuentes, Thomas Scheidl, Erik Beckert, Mohamed Bourennane, David Edward Bruschi, Adan Cabello, Jose Capmany, Alberto Carrasco-Casado, Eleni Diamanti, Miloslav Duusek, Dominique Elser, Angelo Gulinatti, Robert H. Hadfield, Thomas Jennewein, Rainer Kaltenbaek, Michael A. Krainak , et al. (20 additional authors not shown)

    Abstract: Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph,… ▽ More

    Submitted 9 January, 2018; v1 submitted 23 March, 2017; originally announced March 2017.

    Comments: 18 pages, 13 figures, included radiation damage to detectors in appendix

    Journal ref: New J. Phys. 20, 063016 (2018)

  11. arXiv:1412.6311  [pdf, other

    quant-ph

    A Differential Phase Shift Scheme for Quantum Key Distribution in Passive Optical Networks

    Authors: Michael Hentschel, Andreas Poppe, Bernhard Schrenk, Momtchil Peev, Edwin Querasser, Roland Lieger

    Abstract: We propose a scheme for quantum key distribution (QKD) in a passive optical network (PON) based on differential phase shift (DPS) coding. A centralized station including all expensive components serves many users, making it suitable for a true multi-user network in a local environment with moderate distances on the order of a few kilometers. The emphasis lies on an asymmetric design for cost effec… ▽ More

    Submitted 19 December, 2014; originally announced December 2014.

    Comments: 10 pages, 6 figures

  12. arXiv:1409.5965  [pdf, ps, other

    quant-ph cs.NI physics.optics

    Entanglement Distribution in Optical Networks

    Authors: Alex Ciurana, Vicente Martin, Jesus Martinez-Mateo, Bernhard Schrenk, Momtchil Peev, Andreas Poppe

    Abstract: The ability to generate entangled photon-pairs over a broad wavelength range opens the door to the simultaneous distribution of entanglement to multiple users in a network by using centralized sources and flexible wavelength-division multiplexing schemes. Here we show the design of a metropolitan optical network consisting of tree-type access networks whereby entangled photon-pairs are distributed… ▽ More

    Submitted 21 September, 2014; originally announced September 2014.

    Comments: 26 pages, 12 figures

  13. A simple and robust method for characterization of afterpulsing in single photon detectors

    Authors: Gerhard Humer, Momtchil Peev, Christoph Schaeff, Sven Ramelow, Mario Stipčević, Rupert Ursin

    Abstract: Single photon detectors are important for a wide range of applications each with their own specific requirements, which makes necessary the precise characterization of detectors. Here, we present a simple and accurate methodology of characterizing dark count rate, detection efficiency, and after-pulsing in single photon detectors purely based on their counting statistics. We demonstrate our new me… ▽ More

    Submitted 22 September, 2014; v1 submitted 7 September, 2014; originally announced September 2014.

    Comments: 10 pages, 7 figures

  14. arXiv:1407.3257  [pdf, ps, other

    quant-ph cs.IT

    Demystifying the Information Reconciliation Protocol Cascade

    Authors: Jesus Martinez-Mateo, Christoph Pacher, Momtchil Peev, Alex Ciurana, Vicente Martin

    Abstract: Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and,… ▽ More

    Submitted 22 December, 2014; v1 submitted 11 July, 2014; originally announced July 2014.

    Comments: 30 pages, 13 figures, 3 tables

    Journal ref: Quantum Information & Computation, vol. 15, no. 5&6, pp. 453-477 (2015)

  15. arXiv:1309.3923  [pdf, other

    quant-ph cs.CR cs.NI

    Quantum Metropolitan Optical Network based on Wavelength Division Multiplexing

    Authors: Alex Ciurana, Jesus Martinez-Mateo, Momtchil Peev, Andreas Poppe, Nino Walenta, Hugo Zbinden, Vicente Martin

    Abstract: Quantum Key Distribution (QKD) is maturing quickly. However, the current approaches to its application in optical networks make it an expensive technology. QKD networks deployed to date are designed as a collection of point-to-point, dedicated QKD links where non-neighboring nodes communicate using the trusted repeater paradigm. We propose a novel optical network model in which QKD systems share t… ▽ More

    Submitted 16 September, 2013; originally announced September 2013.

    Comments: 23 pages, 8 figures

    Journal ref: Optics Express, Vol. 22, Issue 2, pp. 1576-1593 (2014)

  16. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Authors: Christoph Pacher, Aysajan Abidin, Thomas Lorünser, Momtchil Peev, Rupert Ursin, Anton Zeilinger, Jan-Åke Larsson

    Abstract: We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a s… ▽ More

    Submitted 31 August, 2015; v1 submitted 3 September, 2012; originally announced September 2012.

    Comments: 34 pages

    Journal ref: Quantum Information Processing, 15(1), 327-362, 2016

  17. Field test of quantum key distribution in the Tokyo QKD Network

    Authors: M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, A. Tanaka, K. Yoshino, Y. Nambu, S. Takahashi, A. Tajima, A. Tomita, T. Domeki, T. Hasegawa, Y. Sakai, H. Kobayashi, T. Asai, K. Shimizu, T. Tokura, T. Tsurumaru, M. Matsui, T. Honjo, K. Tamaki, H. Takesue, Y. Tokura , et al. (18 additional authors not shown)

    Abstract: A novel secure communication network with quantum key distribution in a metropolitan area is reported. Different QKD schemes are integrated to demonstrate secure TV conferencing over a distance of 45km, stable long-term operation, and application to secure mobile phones.

    Submitted 18 March, 2011; originally announced March 2011.

    Comments: 21 pages, 19 figures

    Journal ref: Optics Express Vol. 19, Iss. 11, pp. 10387-10409 (2011)

  18. Quantum Interference between a Single-Photon Fock State and a Coherent State

    Authors: Armin Windhager, Martin Suda, Christoph Pacher, Momtchil Peev, Andreas Poppe

    Abstract: We derive analytical expressions for the single mode quantum field state at the individual output ports of a beam splitter when a single-photon Fock state and a coherent state are incident on the input ports. The output states turn out to be a statistical mixture between a displaced Fock state and a coherent state. Consequently we are able to find an analytical expression for the corresponding Wig… ▽ More

    Submitted 16 February, 2011; v1 submitted 9 September, 2010; originally announced September 2010.

    Comments: 9 pages, 6 figures

    Journal ref: Optics Communications 284 (2011) 1907-1912

  19. arXiv:0905.4325  [pdf, other

    quant-ph cs.CR

    Updating Quantum Cryptography Report ver. 1

    Authors: Donna Dodson, Mikio Fujiwara, Philippe Grangier, Masahito Hayashi, Kentaro Imafuku, Ken-ichi Kitayama, Prem Kumar, Christian Kurtsiefer, Gaby Lenhart, Norbert Luetkenhaus, Tsutomu Matsumoto, William J. Munro, Tsuyoshi Nishioka, Momtchil Peev, Masahide Sasaki, Yutaka Sata, Atsushi Takada, Masahiro Takeoka, Kiyoshi Tamaki, Hidema Tanaka, Yasuhiro Tokura, Akihisa Tomita, Morio Toyoshima, Rodney van Meter, Atsuhiro Yamagishi , et al. (2 additional authors not shown)

    Abstract: Quantum cryptographic technology (QCT) is expected to be a fundamental technology for realizing long-term information security even against as-yet-unknown future technologies. More advanced security could be achieved using QCT together with contemporary cryptographic technologies. To develop and spread the use of QCT, it is necessary to standardize devices, protocols, and security requirements a… ▽ More

    Submitted 27 May, 2009; originally announced May 2009.

    Comments: 74 pages

  20. arXiv:0904.4072  [pdf, other

    quant-ph

    Security of Trusted Repeater Quantum Key Distribution Networks

    Authors: Louis Salvail, Momtchil Peev, Eleni Diamanti, Romain Alleaume, Norbert Lutkenhaus, Thomas Laenger

    Abstract: A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security. In this paper we study security properties of QKD networks based on trusted repeater nodes. Such networks can already be deployed, based on current technology. We present an example of a trusted repeater QKD network, developed w… ▽ More

    Submitted 26 April, 2009; originally announced April 2009.

    Comments: 29 pages, 3 figures accepted for publication in Journal of Computer Security

  21. Space-QUEST: Experiments with quantum entanglement in space

    Authors: Rupert Ursin, Thomas Jennewein, Johannes Kofler, Josep M. Perdigues, Luigi Cacciapuoti, Clovis J. de Matos, Markus Aspelmeyer, Alejandra Valencia, Thomas Scheidl, Alessandro Fedrizzi, Antonio Acin, Cesare Barbieri, Giuseppe Bianco, Caslav Brukner, Jose Capmany, Sergio Cova, Dirk Giggenbach, Walter Leeb, Robert H. Hadfield, Raymond Laflamme, Norbert Lutkenhaus, Gerard Milburn, Momtchil Peev, Timothy Ralph, John Rarity , et al. (14 additional authors not shown)

    Abstract: The European Space Agency (ESA) has supported a range of studies in the field of quantum physics and quantum information science in space for several years, and consequently we have submitted the mission proposal Space-QUEST (Quantum Entanglement for Space Experiments) to the European Life and Physical Sciences in Space Program. We propose to perform space-to-ground quantum communication tests f… ▽ More

    Submitted 5 June, 2008; originally announced June 2008.

    Comments: 4 pages, 1 figure, accepted for the 59th International Astronautical Congress (IAC) 2008

    Journal ref: IAC Proceedings A2.1.3 (2008)

  22. Outline of the SECOQC Quantum-Key-Distribution Network in Vienna

    Authors: Andreas Poppe, Momtchil Peev, Oliver Maurhart

    Abstract: A Quantum Key Distribution (QKD) network is currently implemented in Vienna by integrating seven QKD-Link devices that connect five subsidiaries of SIEMENS Austria. We give an architectural overview of the network and present the enabling QKD-technologies, as well as the novel QKD network protocols.

    Submitted 1 April, 2008; originally announced April 2008.

    Comments: 10 pages, 5 figures

    Journal ref: International Journal of Quantum Information IJQI, Volume 6, 209-218 (April 2008)

  23. The Security of Practical Quantum Key Distribution

    Authors: Valerio Scarani, Helle Bechmann-Pasquinucci, Nicolas J. Cerf, Miloslav Dusek, Norbert Lutkenhaus, Momtchil Peev

    Abstract: Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on the eavesdropper's power.… ▽ More

    Submitted 30 September, 2009; v1 submitted 28 February, 2008; originally announced February 2008.

    Comments: Identical to the published version, up to cosmetic editorial changes

    Journal ref: Rev. Mod. Phys. 81, 1301 (2009)

  24. On the optimality of individual entangling-probe attacks against BB84 quantum key distribution

    Authors: I. Herbauts, S. Bettelli, H. Hübel, M. Peev

    Abstract: It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found. Moreover, this attack fills Luetkenhaus bound, independently of whether error positions are leaked to Eve, proving that it is tight. In addition, we clarify why the existence… ▽ More

    Submitted 12 November, 2007; originally announced November 2007.

    Comments: 12 pages, 3 figures

    Journal ref: Eur. Phys. J. D, 46, 395-406 (2008)

  25. arXiv:0709.2071  [pdf

    q-bio.QM

    Parameter Estimation in Biokinetic Degradation Models in Wastewater Treatment - A Novel Approach Relevant for Micro-pollutant Removal

    Authors: Monika Schoenerklee, Momtchil Peev

    Abstract: In this paper we address a general parameter estimation methodology for an extended biokinetic degradation model [1] for poorly degradable micropollutants. In particular we concentrate on parameter estimation of the micropollutant degradation sub-model by specialised microorganisms. In this case we focus on the case when only substrate degradation data are available and prove the structural iden… ▽ More

    Submitted 13 September, 2007; originally announced September 2007.

    Comments: 20 pages, 4 figures

  26. Vanishing Integral Relations and Expectation Values for Bloch Functions in Finite Domains

    Authors: C. Pacher, M. Peev

    Abstract: Integral identities for particular Bloch functions in finite periodic systems are derived. All following statements are proven for a finite domain consisting of an integer number of unit cells. It is shown that matrix elements of particular Bloch functions with respect to periodic differential operators vanish identically. The real valuedness, the time-independence and a summation property of th… ▽ More

    Submitted 28 March, 2007; originally announced March 2007.

    Comments: 10 pages

    Journal ref: The European Physical Journal B, Volume 59, Issue 4 , pp 519-525 (2007)

  27. arXiv:quant-ph/0701168  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Using quantum key distribution for cryptographic purposes: a survey

    Authors: Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev, Andreas Poppe, Thomas Pornin, John Rarity, Renato Renner, Gregoire Ribordy, Michel Riguidel, Louis Salvail, Andrew Shields, Harald Weinfurter, Anton Zeilinger

    Abstract: The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the… ▽ More

    Submitted 4 December, 2014; v1 submitted 23 January, 2007; originally announced January 2007.

    Comments: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-81

    Journal ref: Theoretical Computer Science, 560 (2014), pp. 62-81

  28. arXiv:quant-ph/0407131  [pdf, ps, other

    quant-ph

    A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography

    Authors: M. Peev, M. Nölle, O. Maurhardt, T. Lorünser, M. Suda, A. Poppe, R. Ursin, A. Fedrizzi, A. Zeilinger

    Abstract: In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks. We further propose a modified authentication algorithm which features higher efficiency with respect to consumption of mutual secret bits.

    Submitted 16 July, 2004; originally announced July 2004.

    Comments: 4 pages, submitted to the International Journal of Quantum Information, Proceedings of the meeting "Foundations of Quantum Information", Camerino, April 2004

  29. New intensity and visibility aspects of a double loop neutron interferometer

    Authors: M. Suda, H. Rauch, M. Peev

    Abstract: Various phase shifters and absorbers can be put into the arms of a double loop neutron interferometer. The mean intensity levels of the forward and diffracted beams behind an empty four plate interferometer of this type have been calculated. It is shown that the intensities in the forward and diffracted direction can be made equal using certain absorbers. In this case the interferometer can be r… ▽ More

    Submitted 17 May, 2004; originally announced May 2004.

    Comments: 12 pages, 9 figures, accepted for publication in the Journal of Optics B - Quantum and Semiclassical Optics

  30. Practical Quantum Key Distribution with Polarization-Entangled Photons

    Authors: A. Poppe, A. Fedrizzi, T. Loruenser, O. Maurhardt, R. Ursin, H. R. Boehm, M. Peev, M. Suda, C. Kurtsiefer, H. Weinfurter, T. Jennewein, A. Zeilinger

    Abstract: We present an entangled-state quantum cryptography system that operated for the first time in a real world application scenario. The full key generation protocol was performed in real time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. The generated quantum key was immediately handed… ▽ More

    Submitted 23 April, 2004; v1 submitted 20 April, 2004; originally announced April 2004.

    Comments: 5 pages, 3 figures

    Journal ref: Opt. Express 12, 3865-3871 (2004)