Phenothiazinyl rhodanylidene acetic acid merocyanine dyes with variable substitution pattern on the peripheral benzene ring were synthesized in good to excellent yields by Knoevenagel condensation of the corresponding phenothiazinyl aldehydes and rhodanine-N-acetic acid. The electronic properties were investigated by cyclic voltammetry, absorption, and fluorescence spectroscopy. Electron releasing substitution leads to an appreciable lowering of the oxidation potential, bathochromic shift of the absorption band, and minimization of the emission quantum yield. Not least as a consequence of these properties, the compounds are interesting for use as chromophores in dye-sensitized solar cells (DSSC). DSSCs were constructed and successfully tested by determining the characteristic parameters such as incident-photon-to-electron conversion efficiency (IPCE), fill factor (FF), and overall efficiency.
We introduce a constructive method to calculate the achievable secret key
rate for a generic class of quantum key distribution protocols, when only a
finite number n of signals is given. Our approach is applicable to all
scenarios in which the quantum state shared by Alice and Bob is known. In
particular, we consider the six state protocol with symmetric eavesdropping
attacks, and show that for a small number of signals, i.e. below the order of
10^4, the finite key rate differs significantly from the asymptotic value for n
approaching infinity. However, for larger n, a good approximation of the
asymptotic value is found. We also study secret key rates for protocols using
higher-dimensional quantum systems.Comment: 9 pages, 5 figure
We introduce the concept of a physical process that purifies a mixed quantum state, taken from a set of states, and investigate the conditions under which such a purification map exists. Here, a purification of a mixed quantum state is a pure state in a higher-dimensional Hilbert space, the reduced density matrix of which is identical to the original state. We characterize all sets of mixed quantum states, for which perfect purification is possible. Surprisingly, some sets of two non-commuting states are among them. Furthermore, we investigate the possibility of performing an imperfect purification.
We survey some results in quantum cryptography. After a brief introduction to classical cryptography, we provide the quantum-mechanical background needed to present some fundamental protocols from quantum cryptography. In particular, we review quantum key distribution via the BB84 protocol and its security proof, as well as the related quantum bit commitment protocol and its proof of insecurity.
We study eavesdropping in quantum key distribution with the six state protocol, when the signal states are mixed with white noise. This situation may arise either when Alice deliberately adds noise to the signal states before they leave her lab, or in a realistic scenario where Eve cannot replace the noisy quantum channel by a noiseless one. We find Eve's optimal mutual information with Alice, for individual attacks, as a function of the qubit error rate. Our result is that added quantum noise can make quantum key distribution more robust against eavesdropping.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.