2017
DOI: 10.1103/physreva.95.061805
|View full text |Cite
|
Sign up to set email alerts
|

Setting a disordered password on a photonic memory

Abstract: Encryption is a vital tool of information technology protecting our data in the world with ubiquitous computers. While photons are regarded as ideal information carriers, it is a must to implement such data protection on all-optical storage. However, the intrinsic risk of data breaches in existing schemes of photonic memory was never addressed. We theoretically demonstrate the first protocol using spatially disordered laser fields to encrypt data stored on an optical memory, namely, encrypted photonic memory. … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…In particular, the ac-Stark shift caused by an additional light field has been proposed as a versatile way to realize the GEM scheme [24]. Recent theoretical proposals went beyond the simple gradient shape and suggested to engineer the stored spin-wave shape to realize Kapitsa-Dirac diffraction [25] or a quantum memory protected with a disordered password [26]. Finally, a recent experiment used the ac-Stark shift to realize a spin-wave beamsplitter at the single-excitation level demonstrating Hong-Ou-Mandel interference for stored light [27].…”
Section: Introductionmentioning
confidence: 99%
“…In particular, the ac-Stark shift caused by an additional light field has been proposed as a versatile way to realize the GEM scheme [24]. Recent theoretical proposals went beyond the simple gradient shape and suggested to engineer the stored spin-wave shape to realize Kapitsa-Dirac diffraction [25] or a quantum memory protected with a disordered password [26]. Finally, a recent experiment used the ac-Stark shift to realize a spin-wave beamsplitter at the single-excitation level demonstrating Hong-Ou-Mandel interference for stored light [27].…”
Section: Introductionmentioning
confidence: 99%
“…Besides, recent works have led to the realization of robust authentication protocols based on quantum passwords [32,33]. Recently, encrypted data storage by the application of a disordered field on photonic quantum memories has been accomplished [34].…”
Section: Introductionmentioning
confidence: 99%
“…The former is used to optimize the echo efficiency, and the latter is intended for beating the theoretically maximum echo efficiency of 54% [27,30]. In view of the success of the optical echo memory [30][31][32][33][34][35][36] based on atomic frequency comb (AFC) [37,38], our scheme gives an importnat step for the development of future γ-ray echo memory [27]. Moreover, the present results suggest applications such as a γ-ray coherent delay line providing an input γ-ray pulse with a tunable time delay, and the generation of time-bin qubit for single γ quanta.…”
mentioning
confidence: 99%