#### Filter Results:

#### Publication Year

1996

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- R J Hughes, D F V James, J J Gomez, M S Gulley, M H Holzscheiter, P G Kwiat +9 others
- 1998

The development and theory of an experiment to investigate quantum computation with trapped calcium ions is described. The ion trap, laser and ion requirements are determined, and the parameters required for quantum logic operations as well as simple quantum factoring are described.

- T E Chapuran, P Toliver, N A Peters, J Jackel, M S Goodman, R J Runser +9 others
- 2011

Modern optical networking techniques have the potential to greatly extend the applicability of quantum communications by moving beyond simple point-to-point optical links, and by leveraging existing fibre infrastructures. We experimentally demonstrate many of the fundamental capabilities that are required. These include optical-layer multiplexing,… (More)

- D Rosenberg, C G Peterson, J W Harrington, P R Rice, N Dallmann, K T Tyagi +6 others
- 2008

Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully… (More)

The significance of quantum computation for cryptography is discussed. Following a brief survey of the requirements for quantum computational hardware, an overview of the ion-trap quantum-computation project at Los Alamos is presented. The physical limitations to quantum computation with trapped ions are analysed and an assessment of the computational… (More)

Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light whose security is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the key transmissions, nor evade detection, owing… (More)

- Daphna G Enzer, Phillip G Hadley, Richard J Hughes, Charles G Peterson, Paul G Kwiat
- 2002

We have implemented the 'six-state' quantum cryptography protocol using polarization-entangled photon pairs, in which the polarization of each photon of a pair is measured in one of three randomly chosen bases. For a given amount of eavesdropping, this protocol results in a larger error rate than in four-or two-state protocols, but reduces the number of… (More)

- P. A. Hiskett, D. Rosenberg, C. G. Peterson, R. J. Hughes, S. Nam, A. E. Lita +2 others
- 2006

- Richard J. Hughes, William T. Buttler, P. G. Kwiat, Steven K. Lamoreaux, G. G. Luther, G. L. Morgan +3 others
- QCQC
- 1998

- Richard Hughes, Jane Nordholt
- Science
- 2011

The secure distribution of the secret random bit sequences known as " key " material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an… (More)