Share This Author
Sharper focus for a radially polarized light beam.
We experimentally demonstrate for the first time that a radially polarized field can be focused to a spot size significantly smaller [0.16(1)lambda(2)] than for linear polarization (0.26lambda(2)).…
Colloquium: The Einstein-Podolsky-Rosen paradox: From concepts to applications
This Colloquium examines the field of the Einstein, Podolsky, and Rosen (EPR) gedanken experiment, from the original paper of Einstein, Podolsky, and Rosen, through to modern theoretical proposals of…
Continuous variable quantum cryptography: beating the 3 dB loss limit.
- C. Silberhorn, T. Ralph, N. Lütkenhaus, G. Leuchs
- Physics, Computer SciencePhysical review letters
- 11 April 2002
It is shown that, by an appropriate postselection mechanism, one can enter a region where Eve's knowledge on Alice's key falls behind the information shared between Alice and Bob, even in the presence of substantial losses.
Focusing light to a tighter spot
A generator for unique quantum random numbers based on vacuum states
Researchers demonstrate random-number generation by exploiting the intrinsic randomness of vacuum states. The approach may lead to reliable and high-speed quantum random-number generators for…
Quantum information processing and communication
Abstract.We present an excerpt of the document “Quantum Information Processing and Communication: Strategic report on current status, visions and goals for research in Europe”, which has been…
A versatile source of single photons for quantum information processing.
A fully tunable, narrow-band and efficient single-photon source based on a whispering gallery mode resonator that supports a cavity-assisted spontaneous parametric down-conversion process and yields anti-bunching with g(2)(0)<0.2.
Device calibration impacts security of quantum key distribution.
This work proposes and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine, and devise an optimal and realistic strategy using faked states to break the security of the cryptosystem.
Entanglement of Gaussian states and the applicability to quantum key distribution over fading channels
A method of fading discrimination and subsequent post-selection of the corresponding sub-states is introduced and it is shown that it can improve the entanglement resource and restore the security of the key distribution over a realistic fading link.