Quantum repeaters enable long-range quantum communication in the presence of attenuation. Here we propose a method to construct a robust quantum repeater network using only existing technology. We combine the ideas of brokered graph-state construction with double-heralded entanglement generation to form a system that is able to perform all parts of the procedure in a way that is highly tolerant to photon loss and imperfections in detectors. We show that when used in quantum key distribution this leads to secure kilohertz bit rates over intercontinental distances.
We develop techniques to analyse the statistics of completion times of non-deterministic elements in quantum entanglement generation, and how they affect the overall performance as measured by the secret key rate. By considering such processes as Markov chains, we show how to obtain exact expressions for the probability distributions over the number of errors that a network acquires, as well as the distribution of entanglement establishment times. We show how results from complex analysis can be used to analyse Markov matrices to extract information with a lower computational complexity than previous methods. We apply these techniques to the Innsbruck quantum repeater protocol, and find that consideration of the effect of statistical fluctuations tightens bounds on the secret key rate by 3 orders of magnitude. We also use the theory of order statistics to derive tighter bounds on the minimum quantum memory lifetimes that are required in order to communicate securely.
The discrete-variable QKD protocols based on BB84 are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-Horse sidechannel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve amongst the class of multi-mode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.
ultralong-distance quantum communication, Phys. Rev. A 95, 052336, https://doi.org/10.1103/PhysRevA.95.052336. This is an author produced version of a paper subsequently published in Physical Review A. Uploaded in accordance with the publisher's self-archiving policy.eprints@whiterose.ac.uk https://eprints.whiterose.ac.uk/ Reuse Unless indicated otherwise, fulltext items are protected by copyright with all rights reserved. The copyright exception in section 29 of the Copyright, Designs and Patents Act 1988 allows the making of a single copy solely for the purpose of non-commercial research or private study within the limits of fair dealing. The publisher or other rights-holder may allow further reproduction and re-use of this version -refer to the White Rose Research Online record for this item. Where records identify the publisher as the copyright holder, users can verify any specific terms of use on the publisher's website. TakedownIf you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing eprints@whiterose.ac.uk including the URL of the record and the reason for the withdrawal request.Practical Repeaters for Ultra-Long Distance Quantum Communication Quantum repeaters enable long-range quantum communication in the presence of attenuation. Here we propose a method to construct a robust quantum repeater network using only existing technology. We combine the ideas of brokered graph-state construction with double-heralded entanglement generation to form a system that is able to perform all parts of the procedure in a way that is highly tolerant to photon loss and imperfections in detectors. We show that when used in quantum key distribution this leads to secure kilohertz bit rates over intercontinental distances.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.