Sylvain Fasel

Learn More
General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob’s system via the quantum channel, are analyzed. We illustrate the power of such attacks with today’s technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any(More)
We report on experimental evidence of the preservation of the energy-time entanglement of a pair of photons after a photon-plasmon-photon conversion. This preservation is observed in two different plasmon conversion experiments, namely, extraordinary optical transmission through subwavelength metallic hole arrays and long range surface plasmon propagation(More)
We present a full implementation of a quantum key distribution system using energy-time entangled photon pairs over a 30 km standard telecom fiber quantum channel. Two bases of two orthogonal states are implemented and the set-up is shown to be robust to environmental constraints such as temperature variation. Two different ways to manage chromatic(More)
Quantum key distribution (QKD) is the first commercial quantum technology operating at the level of single quanta and is a leading light for quantum-enabled photonic technologies. However, controlling these quantum optical systems in real world environments presents significant challenges. For the first time, we have brought together three key concepts for(More)
It has been shown theoretically that a light amplifier working on the physical principle of stimulated emission should achieve optimal quantum cloning of the polarization state of light. We demonstrate close-to-optimal universal quantum cloning of polarization in a standard fiber amplifier for telecom wavelengths. For cloning 1-->2 we find a fidelity of(More)
Quantum key distribution (QKD) is the first commercial quantum technology operating at the level of single quanta and is a leading light for quantum-enabled photonic technologies. However, controlling these quantum optical systems in real world environments presents significant challenges. For the first time, we have brought together three key concepts for(More)
General Trojan horse attacks on quantum key distribution systems are analyzed. We illustrate the power of such attacks with today’s technology and conclude that all system must implement active counter-measures. In particular all systems must include an auxiliary detector that monitors any incoming light. We show that such counter-measures can be efficient,(More)
  • 1