Secure communication via quantum illumination

In the quantum illumination protocol for secure communication, Alice prepares entangled signal and idler beams via spontaneous parametric downconversion. She sends the signal beam to Bob, while retaining the idler. Bob imposes message modulation on the beam he receives from Alice, amplifies it, and...

Full description

Bibliographic Details
Main Authors: Shapiro, Jeffrey H. (Contributor), Zhang, Zheshen (Contributor), Wong, Franco N. C. (Contributor)
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science (Contributor), Massachusetts Institute of Technology. Research Laboratory of Electronics (Contributor)
Format: Article
Language:English
Published: Springer US, 2016-07-28T17:43:02Z.
Subjects:
Online Access:Get fulltext
LEADER 01896 am a22002293u 4500
001 103793
042 |a dc 
100 1 0 |a Shapiro, Jeffrey H.  |e author 
100 1 0 |a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science  |e contributor 
100 1 0 |a Massachusetts Institute of Technology. Research Laboratory of Electronics  |e contributor 
100 1 0 |a Shapiro, Jeffrey H.  |e contributor 
100 1 0 |a Zhang, Zheshen  |e contributor 
100 1 0 |a Wong, Franco N. C.  |e contributor 
700 1 0 |a Zhang, Zheshen  |e author 
700 1 0 |a Wong, Franco N. C.  |e author 
245 0 0 |a Secure communication via quantum illumination 
260 |b Springer US,   |c 2016-07-28T17:43:02Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/103793 
520 |a In the quantum illumination protocol for secure communication, Alice prepares entangled signal and idler beams via spontaneous parametric downconversion. She sends the signal beam to Bob, while retaining the idler. Bob imposes message modulation on the beam he receives from Alice, amplifies it, and sends it back to her. Alice then decodes Bob's information by making a joint quantum measurement on the light she has retained and the light she has received from him. The basic performance analysis for this protocol-which demonstrates its immunity to passive eavesdropping, in which Eve can only listen to Alice and Bob's transmissions-is reviewed, along with the results of its first proof-of-principle experiment. Further analysis is then presented, showing that secure data rates in excess of 1 Gbps may be possible over 20-km-long fiber links with technology that is available or under development. Finally, an initial scheme for thwarting active eavesdropping, in which Eve injects her own light into Bob's terminal, is proposed and analyzed. 
546 |a en 
655 7 |a Article 
773 |t Quantum Information Processing