#### Filter Results:

- Full text PDF available (20)

#### Publication Year

1996

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- R J Hughes, D F V James, +12 authors A G White
- 1998

The development and theory of an experiment to investigate quantum computation with trapped calcium ions is described. The ion trap, laser and ion requirements are determined, and the parameters required for quantum logic operations as well as simple quantum factoring are described.

- T E Chapuran, P Toliver, +12 authors H. Dardy
- 2011

Modern optical networking techniques have the potential to greatly extend the applicability of quantum communications by moving beyond simple point-to-point optical links, and by leveraging existing fibre infrastructures. We experimentally demonstrate many of the fundamental capabilities that are required. These include optical-layer multiplexing,… (More)

- D Rosenberg, C G Peterson, +9 authors J E Nordholt
- 2008

Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully… (More)

The significance of quantum computation for cryptography is discussed. Following a brief survey of the requirements for quantum computational hardware, an overview of the ion-trap quantum-computation project at Los Alamos is presented. The physical limitations to quantum computation with trapped ions are analysed and an assessment of the computational… (More)

Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light whose security is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the key transmissions, nor evade detection, owing… (More)

- Danna Rosenberg, Jim W Harrington, +6 authors Jane E Nordholt
- Physical review letters
- 2007

The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultralow-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite… (More)

- Daphna G Enzer, Phillip G Hadley, Richard J Hughes, Charles G Peterson, Paul G Kwiat
- 2002

We have implemented the 'six-state' quantum cryptography protocol using polarization-entangled photon pairs, in which the polarization of each photon of a pair is measured in one of three randomly chosen bases. For a given amount of eavesdropping, this protocol results in a larger error rate than in four-or two-state protocols, but reduces the number of… (More)

- P. A. Hiskett, D. Rosenberg, +5 authors J. E. Nordholt
- 2006

49224 Use of low-noise detectors can both increase the secret bit rate of long-distance quantum key distribution (QKD) and dramatically extend the length of a fibre optic link over which secure key can be distributed. Previous work has demonstrated use of ultra-low-noise transition-edge sensors (TESs) in a QKD system with transmission over 50 km. In this… (More)

- Richard J. Hughes, William T. Buttler, +6 authors C. M. Simmons
- QCQC
- 1998

- Richard Hughes, Jane Nordholt
- Science
- 2011