dc.contributor.author | Shapiro, Jeffrey H. | |
dc.contributor.author | Zhang, Zheshen | |
dc.contributor.author | Wong, Franco N. C. | |
dc.date.accessioned | 2016-07-28T17:43:02Z | |
dc.date.available | 2016-07-28T17:43:02Z | |
dc.date.issued | 2013-11 | |
dc.date.submitted | 2013-07 | |
dc.identifier.issn | 1570-0755 | |
dc.identifier.issn | 1573-1332 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/103793 | |
dc.description.abstract | In the quantum illumination protocol for secure communication, Alice prepares entangled signal and idler beams via spontaneous parametric downconversion. She sends the signal beam to Bob, while retaining the idler. Bob imposes message modulation on the beam he receives from Alice, amplifies it, and sends it back to her. Alice then decodes Bob’s information by making a joint quantum measurement on the light she has retained and the light she has received from him. The basic performance analysis for this protocol—which demonstrates its immunity to passive eavesdropping, in which Eve can only listen to Alice and Bob’s transmissions—is reviewed, along with the results of its first proof-of-principle experiment. Further analysis is then presented, showing that secure data rates in excess of 1 Gbps may be possible over 20-km-long fiber links with technology that is available or under development. Finally, an initial scheme for thwarting active eavesdropping, in which Eve injects her own light into Bob’s terminal, is proposed and analyzed. | en_US |
dc.publisher | Springer US | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1007/s11128-013-0662-1 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
dc.source | Springer US | en_US |
dc.title | Secure communication via quantum illumination | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Shapiro, Jeffrey H., Zheshen Zhang, and Franco N. C. Wong. “Secure Communication via Quantum Illumination.” Quantum Information Processing 13.10 (2014): 2171–2193. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Research Laboratory of Electronics | en_US |
dc.contributor.mitauthor | Shapiro, Jeffrey H. | en_US |
dc.contributor.mitauthor | Zhang, Zheshen | en_US |
dc.contributor.mitauthor | Wong, Franco N. C. | en_US |
dc.relation.journal | Quantum Information Processing | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
dc.date.updated | 2016-05-23T12:17:20Z | |
dc.language.rfc3066 | en | |
dc.rights.holder | Springer Science+Business Media New York | |
dspace.orderedauthors | Shapiro, Jeffrey H.; Zhang, Zheshen; Wong, Franco N. C. | en_US |
dspace.embargo.terms | N | en |
dc.identifier.orcid | https://orcid.org/0000-0003-1998-6159 | |
dc.identifier.orcid | https://orcid.org/0000-0002-6094-5861 | |
dc.identifier.orcid | https://orcid.org/0000-0002-8668-8162 | |
mit.license | OPEN_ACCESS_POLICY | en_US |