Linked e-resources

Details

Intro; Supervisor's Foreword; Acknowledgments; Contents; List of Abbreviations and Symbols; Symbols; Abbreviations; 1 Introduction; 1.1 Novel Contribution and Outline; References; 2 Building Blocks of Quantum Key Distribution; 2.1 Time-Phase QKD in d = 2 Hilbert Space; 2.1.1 Time-Phase States and Mutually Unbiased Bases; 2.1.2 The Protocol; 2.1.3 Entanglement-Based vs. Prepare-and-Measure Protocols; 2.2 An Intuitive Approach to Security; 2.3 Eavesdropping Strategies; 2.4 Practical Implementation of a d = 2 Time-Phase QKD System; 2.4.1 State Preparation; 2.4.2 State Detection

2.5 Limitations of d = 2 QKD Systems2.6 Conclusion; References; 3 High-Dimensional Time-Phase QKD; 3.1 Time-Phase QKD Protocol; 3.2 Experimental Details; 3.2.1 Transmitter; Calibration of Mean Photon Numbers; 3.2.2 Quantum Channel; 3.2.3 Receiver; Superconducting Nanowire Single-Photon Detectors; Time-Delay Interferometers; 3.3 System Characterization; 3.3.1 Quality of State Preparation and Detection; 3.3.2 Error Rates and Visibility; 3.4 Sketch of the Security Proof; 3.5 Demonstration of High-Rate Secret Key Throughput; 3.6 Secret Key Rate Simulation; 3.7 Detector Efficiency Calibration

3.8 Numerically Optimized Secret Key Rate3.9 Experimental Parameters; 3.10 Conclusion; References; 4 Unstructured High-Dimensional Time-Phase QKD; 4.1 Introduction; 4.2 Protocols and Security Framework; 4.2.1 The Security Framework; 4.2.2 Validation of Previously Known Results; 4.2.3 Results for Unstructured Case; 4.2.4 Results for Three-Intensity Decoy States; 4.3 Applications in Various Experimental Systems; 4.3.1 Time-Phase QKD in d = 4; 4.3.2 Orbital Angular Momentum-Based QKD Schemes; 4.4 Conclusion; References; 5 Scalable High-Dimensional Time-Bin QKD; 5.1 Introduction

5.2 The Hong-Ou-Mandel Interference5.3 Phase State Measurement Scheme with a Local Oscillator; 5.3.1 Efficiency Comparison with the Interferometric Approach; 5.4 Security Analysis; 5.4.1 Simulated Secret Key Rate; 5.5 Experimental Demonstration; 5.5.1 Characterization of HOM Interference; 5.5.2 Experimental Parameters; 5.5.3 System Performance; 5.6 Conclusion and Future Work; References; 6 Cloning of High-Dimensional Quantum States; 6.1 Introduction; 6.2 Quantum Cloning; 6.2.1 The No-Cloning Theorem; 6.2.2 Definitions and Terminologies; 6.3 Universal Optimal Quantum Cloning Machine

6.4 Experimental Implementation6.5 Results and Discussion; 6.6 Conclusion; References; 7 Conclusions and Future Experiments; 7.1 Summary; 7.2 Future Directions; References; Appendix A Efficiency of the Interferometric Setup; Appendix B Interferometer Characterization; B.1 Interferometer Performance; B.1.1 Stability at Nominally Constant Temperature; B.1.2 Visibility; B.1.3 Wide-Range Temperature-Dependent Path-Length Shift; Appendix C Numerics-Based Security Analysis; C.1 Security Analysis Framework; C.2 Explicit Calculation for d = 4; C.3 Matlab Code for the SDP

Browse Subjects

Show more subjects...

Statistics

from
to
Export