We present a violation of the CHSH inequality without the fair sampling assumption with a continuously pumped photon pair source combined with two high efficiency superconducting detectors. Due to the continuous nature of the source, the choice of the duration of each measurement round effectively controls the average number of photon pairs participating in the Bell test. We observe a maximum violation of S = 2.01602(32) with average number of pairs per round of ≈ 0.32, compatible with our system overall detection efficiencies. Systems that violate a Bell inequality are guaranteed to generate private randomness, with the randomness extraction rate depending on the observed violation and on the repetition rate of the Bell test. For our realization, the optimal rate of randomness generation is a compromise between the observed violation and the duration of each measurement round, with the latter realistically limited by the detection time jitter. Using an extractor composably secure against quantum adversary with quantum side information, we calculate an asymptotic rate of ≈ 1300 random bits/s. With an experimental run of 43 minutes, we generated 617 920 random bits, corresponding to ≈ 240 random bits/s.
We demonstrate a point-to-point clock synchronization protocol based on bidirectionally propagating photons generated in a single spontaneous parametric down-conversion (SPDC) source. Tight timing correlations between photon pairs are used to determine the single and round-trip times measured by two separate clocks, providing sufficient information for distance-independent absolute synchronization secure against symmetric delay attacks. We show that the coincidence signature useful for determining the round-trip time of a synchronization channel, established using a 10 km telecommunications fiber, can be derived from photons reflected off the end face of the fiber without additional optics. Our technique allows the synchronization of multiple clocks with a single reference clock co-located with the source, without requiring additional pair sources, in a client-server configuration suitable for synchronizing a network of clocks.
We consider the near-resonant interaction between a single atom and a focused light mode, where a single atom localized at the focus of a lens can scatter a significant fraction of light. Complementary to previous experiments on extinction and phase shift effects of a single atom, we report here on the measurement of coherently backscattered light. The strength of the observed effect suggests combining strong focusing with the well-established methods of cavity QED. We consider theoretically a nearly concentric cavity, which should allow for a strongly focused optical mode. Simple estimates show that in a such case one can expect a significant single photon Rabi frequency. This opens new perspectives and a possibility to scale up the system consisting of many atom+cavity nodes for quantum networking due to a significant technical simplification of the atom-light interfaces.
We demonstrate an attack on a clock synchronization protocol that attempts to detect tampering of the synchronization channel using polarization-entangled photon pairs. The protocol relies on a symmetrical channel, where propagation delays do not depend on propagation direction, for correctly deducing the offset between clocks -a condition that could be manipulated with optical circulators, which rely on static magnetic fields to break the reciprocity of propagating electromagnetic fields. Despite the polarization transformation induced within a set of circulators, our attack creates an error in time synchronization while successfully evading detection.
We demonstrate a point-to-point clock synchronization protocol based on bidirectionally propagating photons generated in a single spontaneous parametric down-conversion (SPDC) source. Tight timing correlations between photon pairs are used to determine the single and round-trip times measured by two separate clocks, providing sufficient information for distance-independent absolute synchronization secure against symmetric delay attacks. We show that the coincidence signature useful for determining the round-trip time of a synchronization channel, established using a 10 km telecommunications fiber, can be derived from photons reflected off the end face of the fiber without additional optics. Our technique allows the synchronization of multiple clocks with a single reference clock co-located with the source, without requiring additional pair sources, in a client-server configuration suitable for synchronizing a network of clocks.
We developed a modified version of a conventional (BB84) quantum key distribution protocol that can be understood and implemented by students at a pre-university level. We intentionally introduce a subtle but critical simplification to the original protocol, allowing the experiment to be assembled at the skill level appropriate for the students, at the cost of creating a security loophole. The security vulnerability is then exploited by student hackers, allowing the participants to think deeper about the underlying physics that makes the protocol secure in its original form.
We demonstrate a point-to-point clock synchronization protocol based on bidirectionally exchanging photons produced in spontaneous parametric down conversion (SPDC). The technique exploits tight timing correlations between photon pairs to achieve a precision of 51 ps in 100 s with count rates of order 200 s −1 . The protocol is distance independent, secure against symmetric delay attacks and provides a natural complement to techniques based on Global Navigation Satellite Systems (GNSS). The protocol works with mobile parties and can be augmented to provide authentication of the timing signal via a Bell inequality check.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.