In this paper, we present the approach to complete Bell state analysis based on filtering mapping. The key distinctive feature of this appoach is that it avoids complications related to using either hyperentanglement or representation of the Bell states as concatenated Greenber-Horne-Zeilinger (C-GHZ) state to perform discrimination procedure. We describe two techniques developed within the suggested approach and based on two-step algorithms with two different types of filtration mapping which can be called the non-demolition and semi-demolition filtrations.
View Article and Find Full Text PDFIn this paper, we consider the influence of a divergence of polarization of a quantum signal transmitted through an optical fiber channel on the quantum bit error rate of the subcarrier wave quantum key distribution protocol. Firstly, we investigate the dependence of the optical power of the signal on the modulation indices' difference after the second phase modulation of the signal. Then we consider the Liouville equation with regard to relaxation in order to develop expressions of the dynamics of the Stokes parameters.
View Article and Find Full Text PDFIn this paper we propose feasibility demonstration of twin-field quantum key ditribution system based on multi-mode weak coherent phase-coded states. Their utilization provides indisputable advantages described in the paper. We also provide the detailed description of nontrivial interference scheme for those states and derive detection and quantum bit error rates.
View Article and Find Full Text PDFDry immersion (DI) is acknowledged as a reliable space flight analog condition. At DI, subject is immersed in water being wrapped in a waterproof film to imitate microgravity (μG). Microgravity is known to decrease muscle tone due to deprivation of the sensory stimuli that activate the reflexes that keep up the muscle tone.
View Article and Find Full Text PDFWe consider a subcarrier wave quantum key distribution (QKD) system, where quantum encoding is carried out at weak sidebands generated around a coherent optical beam as a result of electro-optical phase modulation. We study security of two protocols, B92 and BB84, against one of the most powerful attacks for this class of systems, the collective beam-splitting attack. Our analysis includes the case of high modulation index, where the sidebands are essentially multimode.
View Article and Find Full Text PDF