Skip to main content

Showing 1–3 of 3 results for author: Harrington, J W

Searching in archive quant-ph. Search in all archives.
.
  1. Practical long-distance quantum key distribution system using decoy levels

    Authors: D. Rosenberg, C. G. Peterson, J. W. Harrington, P. R. Rice, N. Dallmann, K. T. Tyagi, K. P. McCabe, S. Nam, B. Baek, R. H. Hadfield, R. J. Hughes, J. E. Nordholt

    Abstract: Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully automated, robust QKD system based on t… ▽ More

    Submitted 18 June, 2008; originally announced June 2008.

    Comments: 9 pages

    Report number: LA-UR-07-7070

    Journal ref: New J. Phys. 11, 045009 (2009)

  2. Long distance decoy state quantum key distribution in optical fiber

    Authors: Danna Rosenberg, Jim W. Harrington, Patrick R. Rice, Philip A. Hiskett, Charles G. Peterson, Richard J. Hughes, Adriana E. Lita, Sae Woo Nam, Jane E. Nordholt

    Abstract: The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian appro… ▽ More

    Submitted 2 May, 2007; v1 submitted 26 July, 2006; originally announced July 2006.

    Comments: 4 pages, 3 figures

    Report number: LA-UR-06-5220

    Journal ref: Phys. Rev. Lett. 98 010503 (2007)

  3. arXiv:quant-ph/0503002  [pdf, ps, other

    quant-ph

    Enhancing practical security of quantum key distribution with a few decoy states

    Authors: Jim W. Harrington, J. Mark Ettinger, Richard J. Hughes, Jane E. Nordholt

    Abstract: Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an eavesdropper, but the decoy state method can detect this attack with current technology, yielding a high rate of secret bits. In this Letter, we develop rigorous security statements in the case of finite sta… ▽ More

    Submitted 1 March, 2005; originally announced March 2005.

    Comments: 4 pages, 5 figures, RevTex 4

    Report number: LA-UR-05-1156