Norbert Lütkenhaus

ORCID: 0000-0002-4897-3376
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Quantum optics and atomic interactions
  • Laser-Matter Interactions and Applications
  • Neural Networks and Reservoir Computing
  • Orbital Angular Momentum in Optics
  • Photonic and Optical Devices
  • Chaos-based Image/Signal Encryption
  • Quantum-Dot Cellular Automata
  • Biofield Effects and Biophysics
  • Quantum and electron transport phenomena
  • Optical Network Technologies
  • Cryptographic Implementations and Security
  • Cryptography and Data Security
  • Spectroscopy and Quantum Chemical Studies
  • Mechanical and Optical Resonators
  • Semiconductor Quantum Structures and Devices
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Blind Source Separation Techniques
  • Molecular Communication and Nanonetworks
  • Hyperglycemia and glycemic control in critically ill and hospitalized patients
  • Advanced Breast Cancer Therapies
  • Ship Hydrodynamics and Maneuverability
  • Advancements in PLL and VCO Technologies

University of Waterloo
2016-2025

Perimeter Institute
2018-2020

Max Planck Institute for the Science of Light
2004-2011

Friedrich-Alexander-Universität Erlangen-Nürnberg
1995-2010

Universität Innsbruck
1998-2009

Technical University of Darmstadt
2009

The University of Queensland
2009

Institute of Theoretical Physics
2009

Helsinki Institute of Physics
1999-2007

University of Helsinki
1999-2005

Quantum key distribution (QKD) is the first quantum information task to reach level of mature technology, already fit for commercialization. It aims at creation a secret between authorized partners connected by channel and classical authenticated channel. The security can in principle be guaranteed without putting any restriction on eavesdropper's power. two sections provide concise up-to-date review QKD, biased toward practical side. rest paper presents essential theoretical tools that have...

10.1103/revmodphys.81.1301 article EN Reviews of Modern Physics 2009-09-29

We provide limits to practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the "qubits" sent from sender receiver. As we show, even distribution with perfect qubits might not be achievable over long distances when other are taken account. Furthermore, existing experimental schemes (based on weak pulses) currently do offer unconditional security for reported signal strength. Finally show that parametric down-conversion...

10.1103/physrevlett.85.1330 article EN Physical Review Letters 2000-08-07

In this paper, we present the quantum key distribution (QKD) network designed and implemented by European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004–2008), unifying efforts of 41 research industrial organizations. The paper summarizes SECOQC approach to QKD networks with a focus trusted repeater paradigm. It discusses architecture functionality prototype, which has been put into operation in Vienna 2008 publicly demonstrated framework conference held from...

10.1088/1367-2630/11/7/075001 article EN cc-by New Journal of Physics 2009-07-02

I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and down-conversion sources. The proof applies to Bennett-Brassard 1984 protocol with standard detection scheme (no strong reference pulse). obtain a formula secure bit rate per time slot an experimental setup, which can be used optimize performance existing schemes considered scenario.

10.1103/physreva.61.052304 article EN Physical Review A 2000-04-06

We prove the security of Bennett-Brassard (BB84) quantum key distribution protocol in case where source and detector are under limited control an adversary. Our proof applies when both have small basis-dependent flaws, as is typical practical implementations protocol. derive a general lower bound on asymptotic generation rate for weakly eavesdropping attacks, also estimate some special cases: sources that emit weak coherent states with random phases, detectors efficiency, misaligned detectors.

10.26421/qic4.5-1 article EN Quantum Information and Computation 2004-09-01

In this paper we investigate the possibility to make complete Bell measurements on a product Hilbert space of two two-level bosonic systems. We restrict our tools linear elements, like beam splitters and phase shifters, delay lines electronically switched photo-detectors, auxiliary bosons. As result show that with these never failing measurement is impossible.

10.1103/physreva.59.3295 article EN Physical Review A 1999-05-01

Abstract Despite the tremendous progress of quantum cryptography, efficient communication over long distances (≥1000 km) remains an outstanding challenge due to fiber attenuation and operation errors accumulated entire distance. Quantum repeaters (QRs), as a promising approach, can overcome both photon loss hence significantly speedup rate. Depending on methods used correct errors, all proposed QR schemes be classified into three categories (generations). Here we present first systematic...

10.1038/srep20463 article EN cc-by Scientific Reports 2016-02-15

We present an experimental study of higher-dimensional quantum key distribution protocols based on mutually unbiased bases, implemented by means photons carrying orbital angular momentum. perform ($d+1$) measurements in a classically simulated prepare-and-measure scheme and pair entangled for dimensions ranging from $d=2$ to 5. In our analysis, we pay attention the detection efficiency photon creation probability. As security measures, determine data average error rate, mutual information...

10.1103/physreva.88.032305 article EN Physical Review A 2013-09-05

Quantum repeaters (QRs) provide a way of enabling long distance quantum communication by establishing entangled qubits between remote locations. We investigate new approach to QRs in which information can be faithfully transmitted via noisy channel without the use teleportation, thus eliminating need establish links. Our makes small encoding blocks fault-tolerantly correct both operational and photon loss errors. describe optimize resource requirement for these with aim generation secure...

10.1103/physrevlett.112.250501 article EN Physical Review Letters 2014-06-27

We demonstrate that secure quantum key distribution systems based on continuous variable implementations can operate beyond the apparent 3 dB loss limit is implied by beam splitting attack. The was established for standard minimum uncertainty states such as coherent states. show that, an appropriate postselection mechanism, we enter a region where Eve's knowledge Alice's falls behind information shared between Alice and Bob, even in presence of substantial losses.

10.1103/physrevlett.89.167901 article EN Physical Review Letters 2002-09-25

We demonstrate that a necessary precondition for an unconditionally secure quantum key distribution is both sender and receiver can use the available measurement results to prove presence of entanglement in state effectively distributed between them. One thus systematically search using class witness operators be constructed from observed data. apply such analysis two well-known protocols, namely, 4-state protocol 6-state protocol. As special case, we show that, some asymmetric error...

10.1103/physrevlett.92.217903 article EN Physical Review Letters 2004-05-27

This paper prove the security of Bennett-Brassard (BB84) quantum key distribution protocol in case where source and detector are under limited control an adversary. proof applies when both have small basis-dependent flaws, as is typical practical implementations protocol. The estimation generation rate some special cases: sources that emit weak coherent states, detectors with efficiency, misaligned detectors.

10.1109/isit.2004.1365172 article EN 2004-12-23

In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It based the Bennett-Brassard of 1984 (BB84). The security proof complete as far use single photons signal states concerned. Emphasis given to practicability resulting protocol. For each run key distribution statement gives probability successful generation and an eavesdropper's knowledge, measured change in Shannon entropy, be below specified maximal value.

10.1103/physreva.59.3301 article EN Physical Review A 1999-05-01

We introduce a quantitative measure of nonclassical behavior based on negative regions quasiprobability distributions. Zeros the antinormal ordered phase-space representation characterize state to be maximally with respect this measure. All pure states particle or single field mode, except those Gaussian distributions, have one more zeros in representation.

10.1103/physreva.51.3340 article EN Physical Review A 1995-04-01

We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of high-power local oscillator between communicating parties. In this each signal pulse is accompanied by reference (or pair twin pulses), used to align Alice's and Bob's measurement bases. The method phase estimation compensation based on can be viewed as analog intradyne detection in classical coherent communication, which extracts information...

10.1103/physrevx.5.041010 article EN cc-by Physical Review X 2015-10-21

Variations of phase-matching measurement-device-independent quantum key distribution (PM-MDI QKD) protocols have been investigated before, but it was recently discovered that this type protocol (under the name twin-field can beat linear scaling repeaterless bound on secret capacity. We propose a variation PM-MDI QKD protocol, which reduces sifting cost and uses non-phase-randomized coherent states as test states. provide security proof in infinite limit. Our is conceptually simple gives...

10.1103/physreva.98.042332 article EN Physical review. A/Physical review, A 2018-10-25

Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret rate a given protocol. Analytical formulas are known protocols symmetries, since symmetry simplifies analysis. However, experimental imperfections break hence effect of on rates difficult estimate. Furthermore, it an interesting question whether (intentionally) asymmetric could outperform symmetric ones. Here, we develop robust...

10.1038/ncomms11712 article EN cc-by Nature Communications 2016-05-20

Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of a scheme is the Bennett-Brassard protocol that implemented via polarization signals, or equivalent signals. It turns out most powerful tool at disposition an eavesdropper photon-number splitting attack. We show this attack extended in relevant parameter regime so to preserve Poissonian photon number combination source and lossy channel.

10.1088/1367-2630/4/1/344 article EN cc-by New Journal of Physics 2002-07-12

The use of linearly independent signal states in realistic implementations quantum key distribution (QKD) enables an eavesdropper to perform unambiguous state discrimination. We explore quantitatively the limits for secure QKD imposed by this fact taking into account that receiver can monitor some extend photon number statistics signals even with todays standard detection schemes. compare our attack beamsplitting and show security against does not necessarily imply considered here.

10.1103/physreva.62.022306 article EN Physical Review A 2000-07-13

Measurements with photodetectors are naturally described in the infinite dimensional Fock space of one or several modes. For some measurements, a model has been postulated which describes full measurement as composition mapping (squashing) signal into small Hilbert followed by specified target measurement. We present formalism to investigate whether given pair and measurements can be connected squashing model. show that used Bennett-Brassard 1984 (BB84) protocol does allow description,...

10.1103/physrevlett.101.093601 article EN Physical Review Letters 2008-08-25

Entanglement detection typically relies on linear inequalities for mean values of certain observables (entanglement witnesses), where violation indicates entanglement. We provide a general method to improve any these bipartite systems via nonlinear expressions. The nonlinearities are different orders and can be directly measured in experiments, often without extra effort.

10.1103/physrevlett.96.170502 article EN Physical Review Letters 2006-05-01
Coming Soon ...