http://www.cnr.it/ontology/cnr/individuo/prodotto/ID177825
Quantum communication exploiting above threshold OPO intensity correlations and polarization encoding (Articolo in rivista)
- Type
- Label
- Quantum communication exploiting above threshold OPO intensity correlations and polarization encoding (Articolo in rivista) (literal)
- Anno
- 2007-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1016/j.optlaseng.2005.07.012 (literal)
- Alternative label
Solimeno, S. (3); Paris, M. G A (1); D'Auria, V. (3); Porzio, A. (3); Aniello, P. (4) (2007)
Quantum communication exploiting above threshold OPO intensity correlations and polarization encoding
in Optics and lasers in engineering; Elsevier Science Ltd., Oxford (Regno Unito)
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- Solimeno, S. (3); Paris, M. G A (1); D'Auria, V. (3); Porzio, A. (3); Aniello, P. (4) (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
- http://www.sciencedirect.com/science/article/pii/S0143816606001217 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
- Rivista
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
- Note
- Scopu (literal)
- ISI Web of Science (WOS) (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- (1) INFM - Dipartimento di Fisica; (2) Dipartimento di Scienze Fisiche - Università Federico II; (3) Coherentia-INFM - Unitá di Napoli; (4) INFN sez. Napoli Complesso Universitario di Monte Sant'Angelo (literal)
- Titolo
- Quantum communication exploiting above threshold OPO intensity correlations and polarization encoding (literal)
- Abstract
- We present a continuous variable quantum communication protocol based on bright continuous-wave twin-beams generated by a type-II OPO. Intensity correlation between the beams is used in conjunction with a binary randomization of polarization to guarantee security and reveal eavesdropping actions. The scheme presented is asymmetric. Bob (the receiver) retains one of the beams and sends the other one to Alice after a random rotation of its polarization. The cryptographic key elements are encoded through amplitude modulation by Alice, who sends back her beam to Bob after a second rotation of the polarization. Eventually, the beams are detected by Bob after a further random polarization rotation. The security of the system and the possibility of revealing the eavesdropping action in the case of an individual attack are demonstrated by evaluating the bit error rates. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
- Editore di
- Insieme di parole chiave di