-
Applications of machine learning in ion beam analysis of materials
Authors:
Tiago Fiorini da Silva
Abstract:
Ion Beam Analysis (IBA) is an established tool for material characterization, providing precise information on elemental composition, depth profiles, and structural information in the region near the surface of materials. However, traditional data processing methods can be slow and computationally intensive, limiting the efficiency and speed of the analysis. This article explores the current lands…
▽ More
Ion Beam Analysis (IBA) is an established tool for material characterization, providing precise information on elemental composition, depth profiles, and structural information in the region near the surface of materials. However, traditional data processing methods can be slow and computationally intensive, limiting the efficiency and speed of the analysis. This article explores the current landscape of applying Machine Learning Algorithms (MLA) in the field of IBA, demonstrating the immense potential to optimize and accelerate processes. We present how ML has been employed to extract valuable insights from large datasets, automate repetitive tasks, and enhance the interpretability of results, with practical examples of applications in various IBA techniques, such as RBS, PIXE, and others. Finally, perspectives on using MLA to approach open problems in IBA are also discussed.
△ Less
Submitted 30 January, 2025; v1 submitted 16 December, 2024;
originally announced December 2024.
-
Variable Attention Masking for Configurable Transformer Transducer Speech Recognition
Authors:
Pawel Swietojanski,
Stefan Braun,
Dogan Can,
Thiago Fraga da Silva,
Arnab Ghoshal,
Takaaki Hori,
Roger Hsiao,
Henry Mason,
Erik McDermott,
Honza Silovsky,
Ruchir Travadi,
Xiaodan Zhuang
Abstract:
This work studies the use of attention masking in transformer transducer based speech recognition for building a single configurable model for different deployment scenarios. We present a comprehensive set of experiments comparing fixed masking, where the same attention mask is applied at every frame, with chunked masking, where the attention mask for each frame is determined by chunk boundaries,…
▽ More
This work studies the use of attention masking in transformer transducer based speech recognition for building a single configurable model for different deployment scenarios. We present a comprehensive set of experiments comparing fixed masking, where the same attention mask is applied at every frame, with chunked masking, where the attention mask for each frame is determined by chunk boundaries, in terms of recognition accuracy and latency. We then explore the use of variable masking, where the attention masks are sampled from a target distribution at training time, to build models that can work in different configurations. Finally, we investigate how a single configurable model can be used to perform both first pass streaming recognition and second pass acoustic rescoring. Experiments show that chunked masking achieves a better accuracy vs latency trade-off compared to fixed masking, both with and without FastEmit. We also show that variable masking improves the accuracy by up to 8% relative in the acoustic re-scoring scenario.
△ Less
Submitted 18 April, 2023; v1 submitted 2 November, 2022;
originally announced November 2022.
-
Optimizing Bilingual Neural Transducer with Synthetic Code-switching Text Generation
Authors:
Thien Nguyen,
Nathalie Tran,
Liuhui Deng,
Thiago Fraga da Silva,
Matthew Radzihovsky,
Roger Hsiao,
Henry Mason,
Stefan Braun,
Erik McDermott,
Dogan Can,
Pawel Swietojanski,
Lyan Verwimp,
Sibel Oyman,
Tresi Arvizo,
Honza Silovsky,
Arnab Ghoshal,
Mathieu Martel,
Bharat Ram Ambati,
Mohamed Ali
Abstract:
Code-switching describes the practice of using more than one language in the same sentence. In this study, we investigate how to optimize a neural transducer based bilingual automatic speech recognition (ASR) model for code-switching speech. Focusing on the scenario where the ASR model is trained without supervised code-switching data, we found that semi-supervised training and synthetic code-swit…
▽ More
Code-switching describes the practice of using more than one language in the same sentence. In this study, we investigate how to optimize a neural transducer based bilingual automatic speech recognition (ASR) model for code-switching speech. Focusing on the scenario where the ASR model is trained without supervised code-switching data, we found that semi-supervised training and synthetic code-switched data can improve the bilingual ASR system on code-switching speech. We analyze how each of the neural transducer's encoders contributes towards code-switching performance by measuring encoder-specific recall values, and evaluate our English/Mandarin system on the ASCEND data set. Our final system achieves 25% mixed error rate (MER) on the ASCEND English/Mandarin code-switching test set -- reducing the MER by 2.1% absolute compared to the previous literature -- while maintaining good accuracy on the monolingual test sets.
△ Less
Submitted 21 October, 2022;
originally announced October 2022.
-
The Lipschitz Saturation of a Module
Authors:
Terence Gaffney,
Thiago F. da Silva
Abstract:
In this work we extend the concept of the Lipschitz saturation of an ideal defined in [5] to the context of modules in some different ways, and we prove they are generically equivalent.
In this work we extend the concept of the Lipschitz saturation of an ideal defined in [5] to the context of modules in some different ways, and we prove they are generically equivalent.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
Real and complex integral closure, Lipschitz equisingularity and applications on square matrices
Authors:
Thiago F. da Silva,
Nivaldo G. Grulha Jr.,
Miriam S. Pereira
Abstract:
Recently the authors investigated the Lipschitz triviality of simple germs of matrices. In this work, we improve some previous results and we present an extension of an integral closure result for the real setting. These tools are applied to investigate classes of square matrices singularities classified by Bruce and Tari.
Recently the authors investigated the Lipschitz triviality of simple germs of matrices. In this work, we improve some previous results and we present an extension of an integral closure result for the real setting. These tools are applied to investigate classes of square matrices singularities classified by Bruce and Tari.
△ Less
Submitted 18 May, 2020; v1 submitted 28 February, 2019;
originally announced February 2019.
-
Infinitesimal Lipschitz conditions on family of analytic varieties
Authors:
Terence Gaffney,
Thiago Filipe da Silva
Abstract:
In this work, we extend the concept of the double of an ideal defined in \cite{G2}, to the context of modules. We also obtain the genericity of the infinitesimal Lipschitz condition A for an enlarged class of analytic spaces.
In this work, we extend the concept of the double of an ideal defined in \cite{G2}, to the context of modules. We also obtain the genericity of the infinitesimal Lipschitz condition A for an enlarged class of analytic spaces.
△ Less
Submitted 23 October, 2019; v1 submitted 8 February, 2019;
originally announced February 2019.
-
The Bi-Lipschitz Equisingularity of Essentially Isolated Determinantal Singularities
Authors:
Thiago F. da Silva,
Nivaldo G. Grulha Jr,
Miriam S. Pereira
Abstract:
The bi-Lipschitz geometry is one of the main subjects in the modern approach of Singularity Theory. However, it rises from works of important mathematicians of the last century, especially Zariski. In this work we investigate the Bi-Lipschitz equisingularity of families of Essentially Isolated Determinantal Singularities inspired by the approach of Mostowski and Gaffney.
The bi-Lipschitz geometry is one of the main subjects in the modern approach of Singularity Theory. However, it rises from works of important mathematicians of the last century, especially Zariski. In this work we investigate the Bi-Lipschitz equisingularity of families of Essentially Isolated Determinantal Singularities inspired by the approach of Mostowski and Gaffney.
△ Less
Submitted 18 October, 2017; v1 submitted 10 May, 2017;
originally announced May 2017.
-
Categorical Aspects of the Double Structure of a Module
Authors:
Thiago F. da Silva
Abstract:
In this work we develop some categorical aspects of the double structure of a module.
In this work we develop some categorical aspects of the double structure of a module.
△ Less
Submitted 28 September, 2017; v1 submitted 27 April, 2017;
originally announced April 2017.
-
High-dimensional decoy-state quantum key distribution over 0.3 km of multicore telecommunication optical fibers
Authors:
G. Cañas,
N. Vera,
J. Cariñe,
P. González,
J. Cardenas,
P. W. R. Connolly,
A. Przysiezna,
E. S. Gómez,
M. Figueroa,
G. Vallone,
P. Villoresi,
T. Ferreira da Silva,
G. B. Xavier,
G. Lima
Abstract:
Multiplexing is a strategy to augment the transmission capacity of a communication system. It consists of combining multiple signals over the same data channel and it has been very successful in classical communications. However, the use of enhanced channels has only reached limited practicality in quantum communications (QC) as it requires the complex manipulation of quantum systems of higher dim…
▽ More
Multiplexing is a strategy to augment the transmission capacity of a communication system. It consists of combining multiple signals over the same data channel and it has been very successful in classical communications. However, the use of enhanced channels has only reached limited practicality in quantum communications (QC) as it requires the complex manipulation of quantum systems of higher dimensions. Considerable effort is being made towards QC using high-dimensional quantum systems encoded into the transverse momentum of single photons but, so far, no approach has been proven to be fully compatible with the existing telecommunication infrastructure. Here, we overcome such a technological challenge and demonstrate a stable and secure high-dimensional decoy-state quantum key distribution session over a 0.3 km long multicore optical fiber. The high-dimensional quantum states are defined in terms of the multiple core modes available for the photon transmission over the fiber, and the decoy-state analysis demonstrates that our technique enables a positive secret key generation rate up to 25 km of fiber propagation. Finally, we show how our results build up towards a high-dimensional quantum network composed of free-space and fiber based links
△ Less
Submitted 7 October, 2016; v1 submitted 5 October, 2016;
originally announced October 2016.
-
Quantum random number generation enhanced by weak-coherent states interference
Authors:
T. Ferreira da Silva,
G. B. Xavier,
G. C. Amaral,
G. P. Temporão,
J. P. von der Weid
Abstract:
We propose and demonstrate a technique for quantum random number generation based on the random population of the output spatial modes of a beam splitter when both inputs are simultaneously fed with indistinguishable weak coherent states. We simulate and experimentally validate the probability of generation of random bits as a function of the average photon number per input, and compare it to the…
▽ More
We propose and demonstrate a technique for quantum random number generation based on the random population of the output spatial modes of a beam splitter when both inputs are simultaneously fed with indistinguishable weak coherent states. We simulate and experimentally validate the probability of generation of random bits as a function of the average photon number per input, and compare it to the traditional approach of a single weak coherent state transmitted through a beam-splitter, showing an improvement of up to 32\%. The ensuing interference phenomenon reduces the probability of coincident counts between the detectors associated with bits 0 and 1, thus increasing the probability of occurrence of a valid output. A long bit string is assessed by a standard randomness test suite with good confidence. Our proposal can be easily implemented and opens attractive performance gains without a significant trade-off.
△ Less
Submitted 17 August, 2016;
originally announced August 2016.
-
Sub-Poisson States Heralded at a Hong-Ou-Mandel Interference Peak
Authors:
G. C. Amaral,
F. Calliari,
T. Ferreira da Silva,
G. P. Temporão,
J. P. von der Weid
Abstract:
A peak in coincidence events has been observed in a modified Hong-Ou-Mandel interferometer fed with weak coherent states inside the region of overlapping wave-packets. The inversion of the usual interference pattern represented by the HOM dip is equally observed when the wave packets are frequency displaced. The higher rate of coincidences indicates that photons are more likely to take on differen…
▽ More
A peak in coincidence events has been observed in a modified Hong-Ou-Mandel interferometer fed with weak coherent states inside the region of overlapping wave-packets. The inversion of the usual interference pattern represented by the HOM dip is equally observed when the wave packets are frequency displaced. The higher rate of coincidences indicates that photons are more likely to take on different output paths of the interferometer. This effect was harnessed so a detection on one of the arms could herald the presence of a photon in the other. The second order autocorrelation function at zero time was experimentally determined by means of the Hanburry-Brown and Twiss experiment and its value below 1 confirmed the sub-Poisson photon statistics of the heralded states.
△ Less
Submitted 11 March, 2016; v1 submitted 29 January, 2016;
originally announced January 2016.
-
Few-Photon Heteorodyne Spectroscopy
Authors:
Gustavo C Amaral,
Thiago Ferreira da Silva,
Guilherme P Temporão,
Jean Pierre von der Weid
Abstract:
We perform a high resolution Fourier Transform Spectroscopy of optical sources in the few-photon regime based on the phenomenon of two-photon interference in a beam splitter. From the heterodyne interferogram between test and reference sources it is possible to obtain the spectrum of the test source relative to that of the reference. The method proves to be a useful asset for spectral characteriza…
▽ More
We perform a high resolution Fourier Transform Spectroscopy of optical sources in the few-photon regime based on the phenomenon of two-photon interference in a beam splitter. From the heterodyne interferogram between test and reference sources it is possible to obtain the spectrum of the test source relative to that of the reference. The method proves to be a useful asset for spectral characterization of faint optical sources below the range covered by classical heterodyne beating techniques.
△ Less
Submitted 11 March, 2016; v1 submitted 28 January, 2016;
originally announced January 2016.
-
Spectral characterization of weak coherent state sources based on two-photon interference
Authors:
Thiago Ferreira da Silva,
Gustavo C. do Amaral,
Douglas Vitoreti,
Guilherme P. Temporão,
Jean Pierre von der Weid
Abstract:
We demonstrate a method for characterizing the coherence function of coherent states based on two-photon interference. Two states from frequency mismatched faint laser sources are fed into a Hong-Ou-Mandel interferometer and the interference pattern is fitted with the presented theoretical model for the quantum beat. The fitting parameters are compared to the classical optical beat when bright ver…
▽ More
We demonstrate a method for characterizing the coherence function of coherent states based on two-photon interference. Two states from frequency mismatched faint laser sources are fed into a Hong-Ou-Mandel interferometer and the interference pattern is fitted with the presented theoretical model for the quantum beat. The fitting parameters are compared to the classical optical beat when bright versions of the sources are used. The results show the equivalence between both techniques.
△ Less
Submitted 8 July, 2015;
originally announced July 2015.
-
Linear-Optic Heralded Photon Source
Authors:
Thiago Ferreira da Silva,
Gustavo C. Amaral,
Guilherme P. Temporão,
Jean Pierre von der Weid
Abstract:
We present a Heralded Photon Source based only on linear optics and weak coherent states. By time-tuning a Hong-Ou-Mandel interferometer fed with frequency-displaced coherent states, the output photons can be synchronously heralded following sub-Poisson statistics, which is indicated by the second-order correlation function ($g^2\left(0\right)=0.556$). The absence of phase-matching restrictions ma…
▽ More
We present a Heralded Photon Source based only on linear optics and weak coherent states. By time-tuning a Hong-Ou-Mandel interferometer fed with frequency-displaced coherent states, the output photons can be synchronously heralded following sub-Poisson statistics, which is indicated by the second-order correlation function ($g^2\left(0\right)=0.556$). The absence of phase-matching restrictions makes the source widely tunable, with 100-nm spectral tunability on the telecom bands. The technique presents yield comparable to state-of-the-art spontaneous parametric down-conversion-based sources, with high coherence and fiber-optic quantum communication compatibility.
△ Less
Submitted 22 November, 2015; v1 submitted 7 July, 2015;
originally announced July 2015.
-
Quantum key distribution with untrusted detectors
Authors:
P. Gonzalez,
L. Rebon,
T. Ferreira da Silva,
M. Figueroa,
C. Saavedra,
M. Curty,
G. Lima,
G. B. Xavier,
W. A. T. Nogueira
Abstract:
Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality of the previous two in circumventing detector…
▽ More
Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality of the previous two in circumventing detector side-channel attacks, which arguably is the most hazardous part of QKD implementations. Our proposal has, however, one main requirement: the legitimate users of the system need to ensure that their labs do not leak any unwanted information to the outside. The security in the low-loss regime is guaranteed, while in the high-loss regime we already prove its robustness against some eavesdropping strategies.
△ Less
Submitted 18 August, 2015; v1 submitted 6 October, 2014;
originally announced October 2014.
-
Safeguarding Quantum Key Distribution through Detection Randomization
Authors:
Thiago Ferreira da Silva,
Gustavo C. do Amaral,
Guilherme B. Xavier,
Guilherme P. Temporão,
Jean Pierre von der Weid
Abstract:
We propose and experimentally demonstrate a scheme to render the detection apparatus of a Quantum Key Distribution system immune to the main classes of hacking attacks in which the eavesdropper explores the back-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are not deterministically accessible to the eavesdropper. We experimentally show that…
▽ More
We propose and experimentally demonstrate a scheme to render the detection apparatus of a Quantum Key Distribution system immune to the main classes of hacking attacks in which the eavesdropper explores the back-door opened by the single-photon detectors. The countermeasure is based on the creation of modes that are not deterministically accessible to the eavesdropper. We experimentally show that the use of beamsplitters and extra single-photon detectors at the receiver station passively creates randomized spatial modes that erase any knowledge the eavesdropper might have gained when using bright-light faked states. Additionally, we experimentally show a detector-scrambling approach where the random selection of the detector used for each measurement - equivalent to an active spatial mode randomization - hashes out the side-channel open by the detection efficiency mismatch-based attacks. The proposed combined countermeasure represents a practical and readily implementable solution against the main classes of quantum hacking attacks aimed on the single-photon detector so far, without intervening on the inner working of the devices.
△ Less
Submitted 2 October, 2014;
originally announced October 2014.
-
Impact of Raman scattered noise from multiple telecom channels on fiber-optic quantum key distribution systems
Authors:
Thiago Ferreira da Silva,
Guilherme B. Xavier,
Guilherme P. Temporão,
Jean Pierre von der Weid
Abstract:
In this paper we analyze the impact of the spontaneous Raman scattered noise generated from multiple optical classical channels on a single quantum key distribution channel, all within the telecom C-band. We experimentally measure the noise generated from up to 14 continuous lasers with different wavelengths using the dense wavelength division multiplexing (DWDM) standard, in both propagation dire…
▽ More
In this paper we analyze the impact of the spontaneous Raman scattered noise generated from multiple optical classical channels on a single quantum key distribution channel, all within the telecom C-band. We experimentally measure the noise generated from up to 14 continuous lasers with different wavelengths using the dense wavelength division multiplexing (DWDM) standard, in both propagation directions in respect to the QKD channel, over different standard SMF-28 fiber lengths. We then simulate the expected secure key generation rate for a decoy-states-based system as a function of distance under the presence of simultaneous telecom traffic with different modulation techniques, and show a severe penalty growing with the number of classical channels present. Our results show that, for in-band coexistence, the telecom channels should be distributed as close as possible from the quantum channel to avoid the Raman noise peaks. Operation far from the zero dispersion wavelength of the fiber is also beneficial as it greatly reduces the generation of four-wave mixing inside the quantum channel. Furthermore, narrow spectral filtering on the quantum channels is required due to the harsh limitations of performing QKD under real telecom environments, with the quantum and several classical channels coexisting in the same ITU-T C-band.
△ Less
Submitted 2 October, 2014;
originally announced October 2014.
-
Polarization-stable long-distance interference of independent photons for quantum communications
Authors:
T. Ferreira da Silva,
D. Vitoreti,
G. B. Xavier,
G. P. Temporão,
J. P. von der Weid
Abstract:
Interference between fully-independent faint laser sources over two 8.5-km full polarization-controlled fiber links was performed, with stable visibility of 47.8%, an essential step towards practical implementation of quantum communication protocols.
Interference between fully-independent faint laser sources over two 8.5-km full polarization-controlled fiber links was performed, with stable visibility of 47.8%, an essential step towards practical implementation of quantum communication protocols.
△ Less
Submitted 3 August, 2012;
originally announced August 2012.
-
Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems
Authors:
T. Ferreira da Silva,
G. B. Xavier,
G. P. Temporão,
J. P. von der Weid
Abstract:
By employing real-time monitoring of single-photon avalanche photodiodes we demonstrate how two types of practical eavesdropping strategies, the after-gate and time-shift attacks, may be detected. Both attacks are identified with the detectors operating without any special modifications, making this proposal well suited for real-world applications. The monitoring system is based on accumulating st…
▽ More
By employing real-time monitoring of single-photon avalanche photodiodes we demonstrate how two types of practical eavesdropping strategies, the after-gate and time-shift attacks, may be detected. Both attacks are identified with the detectors operating without any special modifications, making this proposal well suited for real-world applications. The monitoring system is based on accumulating statistics of the times between consecutive detection events, and extracting the afterpulse and overall efficiency of the detectors in real-time using mathematical models fit to the measured data. We are able to directly observe changes in the afterpulse probabilities generated from the after-gate and faint after-gate attacks, as well as different timing signatures in the time-shift attack. We also discuss the applicability of our scheme to other general blinding attacks.
△ Less
Submitted 2 August, 2012;
originally announced August 2012.
-
Real-time characterization of gated-mode single-photon detectors
Authors:
T. Ferreira da Silva,
G. B. Xavier,
J. P. von der Weid
Abstract:
We propose a characterization method for the overall detection efficiency, afterpulse and dark count probabilities of single-photon counting modules in real-time with simple instrumentation. This method can be applied when the module is running in its intended application, and is based on monitoring the statistics of the times between consecutive detections. A mathematical model is derived and fit…
▽ More
We propose a characterization method for the overall detection efficiency, afterpulse and dark count probabilities of single-photon counting modules in real-time with simple instrumentation. This method can be applied when the module is running in its intended application, and is based on monitoring the statistics of the times between consecutive detections. A mathematical model is derived and fit to the data statistical distribution to simultaneously extract the characterization parameters. The feasibility of our scheme is demonstrated by performing measurements on three commercial devices based on cooled InGaAs APD operating in gated mode. Different statistical ensemble lengths were analyzed and results assess the scheme for real-time application.
△ Less
Submitted 30 July, 2012;
originally announced July 2012.
-
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits
Authors:
T. Ferreira da Silva,
D. Vitoreti,
G. B. Xavier,
G. C. do Amaral,
G. P. Temporão,
J. P. von der Weid
Abstract:
We perform a proof-of-principle demonstration of the measurement-device-independent quantum key distribution (MDI-QKD) protocol using weak coherent states and polarization-encoded qubits over two optical fiber links of 8.5 km each. Each link was independently stabilized against polarization drifts using a full-polarization control system employing two wavelength-multiplexed control channels. A lin…
▽ More
We perform a proof-of-principle demonstration of the measurement-device-independent quantum key distribution (MDI-QKD) protocol using weak coherent states and polarization-encoded qubits over two optical fiber links of 8.5 km each. Each link was independently stabilized against polarization drifts using a full-polarization control system employing two wavelength-multiplexed control channels. A linear-optics-based polarization Bell-state analyzer was built into the intermediate station, Charlie, which is connected to both Alice and Bob via the optical fiber links. Using decoy-states, a lower bound for the secret-key generation rate of 1.04x10^-6 bits/pulse is computed.
△ Less
Submitted 12 November, 2013; v1 submitted 26 July, 2012;
originally announced July 2012.
-
Active polarization control for quantum communication in long-distance optical fibers with shared telecom traffic
Authors:
G. B. Xavier,
G. Vilela de Faria,
T. Ferreira da Silva,
G. P. Temporao,
J. P. von der Weid
Abstract:
We experimentally demonstrate the compatibility of wavelength multiplexed active polarization stabilization for quantum communication in an optical fiber carrying telecom traffic. One of the feedback control channels contains a 9.953 Gb/s data stream generated from a BER meter. We verify the ability to transmit single-photons in the two opposite directions of a 23 km optical fiber spool, while mai…
▽ More
We experimentally demonstrate the compatibility of wavelength multiplexed active polarization stabilization for quantum communication in an optical fiber carrying telecom traffic. One of the feedback control channels contains a 9.953 Gb/s data stream generated from a BER meter. We verify the ability to transmit single-photons in the two opposite directions of a 23 km optical fiber spool, while maintaining their state of polarization stable and a classical BER in the feedback channel error-free, during 6 hours of continuous operation.
△ Less
Submitted 3 February, 2013; v1 submitted 22 December, 2009;
originally announced December 2009.
-
Practical random number generation protocol for entanglement-based quantum key distribution
Authors:
G. B. Xavier,
T. Ferreira da Silva,
G. Vilela de Faria,
G. P. Temporao,
J. P. von der Weid
Abstract:
A simple protocol which takes advantage of the inherent random times of detections in single photon counting modules is presented for random active basis choices when using entanglement-based protocols for Quantum Key Distribution (QKD). It may also be applicable to the BB84 protocol in certain cases. The scheme presented uses the single photon detectors already present on a QKD setup, working o…
▽ More
A simple protocol which takes advantage of the inherent random times of detections in single photon counting modules is presented for random active basis choices when using entanglement-based protocols for Quantum Key Distribution (QKD). It may also be applicable to the BB84 protocol in certain cases. The scheme presented uses the single photon detectors already present on a QKD setup, working on the same rate as the system is capable of detecting, and is, therefore, not limited by the output rates of quantum random number generators. This protocol only requires small hardware modifications making it an attractive solution. We perform a proof-of-principle experiment employing a spontaneous parametric down-conversion process in a $χ^{(2)}$ non-linear crystal to demonstrate the feasibility of our scheme, and show that the generated sequence passes randomness tests.
△ Less
Submitted 1 January, 2010; v1 submitted 2 October, 2008;
originally announced October 2008.