Skip to main content

Showing 1–3 of 3 results for author: Ferenczi, A

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2412.03222  [pdf

    quant-ph

    Building Europe's first space-based Quantum Key Distribution system -- The German Aerospace Center's role in the EAGLE-1 mission

    Authors: Gabriela Calistro-Rivera, Oliver Heirich, Amita Shrestha, Agnes Ferenczi, Alexandru Duliu, Jakob Eppinger, Bruno Femenia Castella, Christian Fuchs, Elisa Garbagnati, Douglas Laidlaw, Pia Lützen, Innocenzo De Marco, Florian Moll, Johannes Prell, Andrew Reeves, Jorge Rosano Nonay, Christian Roubal, Joana S. Torres, Matthias Wagner

    Abstract: The EAGLE-1 mission aims to develop Europe's first sovereign, end-to-end space-based quantum key distribution (QKD) system. The mission is led by the European Space Agency (ESA) and SES in collaboration with several European National Space Agencies and private partners. The state-of-the-art QKD system will consist of a payload on board the EAGLE-1 low Earth orbit (LEO) satellite, optical ground st… ▽ More

    Submitted 4 December, 2024; originally announced December 2024.

    Comments: 9 pages, 5 figures. Manuscript presented at the 75th International Astronautical Congress (IAC), Milan, Italy, 14-18 October 2024

  2. Security proof of the unbalanced phase-encoded BB84 protocol

    Authors: Agnes Ferenczi, Varun Narasimhachar, Norbert Lütkenhaus

    Abstract: In optical implementations of the phase-encoded BB84 protocol, the bit information is usually encoded in the phase of two consecutive photon pulses generated in a Mach-Zehnder interferometer. In the actual experimental realization, the loss in the arms of the Mach-Zehnder interferometer is not balanced, for example because only one arm contains a lossy phase modulator. Therefore, the amplitudes of… ▽ More

    Submitted 28 June, 2012; originally announced June 2012.

  3. Symmetries in Quantum Key Distribution and the Connection between Optimal Attacks and Optimal Cloning

    Authors: Agnes Ferenczi, Norbert Lütkenhaus

    Abstract: We investigate the connection between the optimal collective eavesdropping attack and the optimal cloning attack where the eavesdropper employs an optimal cloner to attack the quantum key distribution (QKD) protocol. The analysis is done in the context of the security proof in [Devetak and Winter, Proc. of the Roy. Soc. of London Series A, 461, 207 (2005); Kraus, Gisin and Renner, Phys. Rev. Lett.… ▽ More

    Submitted 14 December, 2011; originally announced December 2011.