Assalamualaikum and Good day,
We would like to invite all of you to the Photonics Lecture Series, which will be held as follows:
Date: 28 July 2015 (Tuesday)
Time: 10am - 11.30am
Venue: Galeri 2, Tingkat Bawah, Bangunan Pentadbiran, Fakulti Kejuruteraan, UPM
The talk will be given by two experts from MIMOS Berhad as detailed below:
Implementation of QKD Distribution
Speaker: Dr. Norshamsuri Ali@Hasim
Abstract: The B92 is one of the earlier protocols introduced and the simplest protocol. The work progress related to this protocol is not as extensive in the BB84 protocol. The protocol only uses two quantum states to establish the quantum keys. These states are prepared so that the two
states are non-orthogonal each other and measurement on these states are conclusive when the
result is an orthogonal state. There is a caveat in quantum physics, where two non orthogonal
states cannot be distinguished, thus it makes this protocol unconditionally secure by the laws of
quantum physics. The lack of development on this protocol is due to the limited capability of
noise and loss resistant in communication channels. However, it has been proved unconditionally
secure over noiseless and noisy channel by Tamaki et.all. Later, Lucamarini introduced the
modied version of this protocol, which gives an advantage to B92 protocol. In this paper it is
proven that the modied B92 is robust to noises and losses in communication channels. The new
B92 protocol gives more information on eavesdropper and may trigger the USD attack. In this
new proposal for B92, two uninformative states, which later can be used not only to improve
the security of the protocol but also to enable synchronization between two nodes in practical
implementation, are considered.
Practical two way QKD
Speaker: Dr. Mohd. Fared Abdul Kadir
Abstract: The needs for unconditional security assurance has resulted in the recent growing interest in Quantum Cryptography or also known as Quantum Key Distribution (QKD). However,
practical QKD systems with weak laser pulses su er from attacks such as photon number
splitting (PNS) attack which severely reduces their secure distance. This includes QKD systems
with the prepare and measure scheme such as BB84 protocol and also the two way scheme
such as the LM05 protocol which is known to exhibit higher secure key rate but shorter secure
distance. A way out to this problem is to use the recently introduced decoy state method.
Motivated by the recent success in the implementation of the LM05 protocol over optical ber
medium as well as the implementation of the BB84 protocol with decoy state, an automated
polarization encoded LM05 system over free space medium is rst developed and characterized.
Next, with the intention of extending the secure distance of the LM05 system, the decoy state
parameters for few decoy state schemes to be adapted into the LM05 system are estimated and
numerically simulated. Finally, the LM05 system is enhanced to adapt the decoy state scheme,
namely the weak+vacuum decoy state and characterized for its secure distance. The LM05 with
weak+vacuum decoy state system shows signicant improvement in the secure distance of the
original LM05 protocol.
Refreshment (breakfast) will be provided.