Quantum communication exploiting above threshold OPO intensity correlations and polarization encoding (Articolo in rivista)

Type
Label
  • Quantum communication exploiting above threshold OPO intensity correlations and polarization encoding (Articolo in rivista) (literal)
Anno
  • 2007-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1016/j.optlaseng.2005.07.012 (literal)
Alternative label
  • Solimeno, S. (3); Paris, M. G A (1); D'Auria, V. (3); Porzio, A. (3); Aniello, P. (4) (2007)
    Quantum communication exploiting above threshold OPO intensity correlations and polarization encoding
    in Optics and lasers in engineering; Elsevier Science Ltd., Oxford (Regno Unito)
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Solimeno, S. (3); Paris, M. G A (1); D'Auria, V. (3); Porzio, A. (3); Aniello, P. (4) (literal)
Pagina inizio
  • 463 (literal)
Pagina fine
  • 467 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://www.sciencedirect.com/science/article/pii/S0143816606001217 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
  • 45 (literal)
Rivista
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
  • 5 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
  • 4 (literal)
Note
  • Scopu (literal)
  • ISI Web of Science (WOS) (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • (1) INFM - Dipartimento di Fisica; (2) Dipartimento di Scienze Fisiche - Università Federico II; (3) Coherentia-INFM - Unitá di Napoli; (4) INFN sez. Napoli Complesso Universitario di Monte Sant'Angelo (literal)
Titolo
  • Quantum communication exploiting above threshold OPO intensity correlations and polarization encoding (literal)
Abstract
  • We present a continuous variable quantum communication protocol based on bright continuous-wave twin-beams generated by a type-II OPO. Intensity correlation between the beams is used in conjunction with a binary randomization of polarization to guarantee security and reveal eavesdropping actions. The scheme presented is asymmetric. Bob (the receiver) retains one of the beams and sends the other one to Alice after a random rotation of its polarization. The cryptographic key elements are encoded through amplitude modulation by Alice, who sends back her beam to Bob after a second rotation of the polarization. Eventually, the beams are detected by Bob after a further random polarization rotation. The security of the system and the possibility of revealing the eavesdropping action in the case of an individual attack are demonstrated by evaluating the bit error rates. (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
Editore di
Insieme di parole chiave di
data.CNR.it