scispace - formally typeset
Search or ask a question
Author

Frédéric Grosshans

Bio: Frédéric Grosshans is an academic researcher from University of Paris. The author has contributed to research in topics: Quantum cryptography & Quantum state. The author has an hindex of 20, co-authored 60 publications receiving 4874 citations. Previous affiliations of Frédéric Grosshans include École normale supérieure de Cachan & Centre national de la recherche scientifique.


Papers
More filters
Journal ArticleDOI
16 Jan 2003-Nature
TL;DR: This work proposes and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states and shot-noise-limited homodyne detection, which is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories.
Abstract: Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

1,224 citations

Journal ArticleDOI
TL;DR: This work proposes several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and shows that they are secure against individual eavesdropping attacks.
Abstract: We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against individual eavesdropping attacks. These protocols require that the transmission of the optical line between Alice and Bob is larger than 50%, but they do not rely on "sub-shot-noise" features such as squeezing. Their security is a direct consequence of the no-cloning theorem, which limits the signal-to-noise ratio of possible quantum measurements on the transmission line. Our approach can also be used for evaluating various QKD protocols using light with Gaussian statistics.

1,130 citations

Journal ArticleDOI
16 Feb 2007
TL;DR: This work reports an almost ideal realization of Wheeler's delayed-choice gedanken experiment with single photons allowing unambiguous which-way measurements.
Abstract: We report an almost ideal realization of wheeler's "delayed-choice" experiment where the light pulses are true single photons, allowing unambiguous which-way measurements. The clock-triggered single-photon source at the heart of the experiment, previously developed for quantum key distribution, is based on the pulsed, optically excited photoluminescence of a single N-V colour centre in a diamond nanocrystal. This system, which consists in a substitutional nitrogen atom (N) associated to a vacancy (V) in an adjacent lattice site of the diamond crystalline matrix, has an unsurpassed efficiency and photostability at room temperature.

582 citations

Journal ArticleDOI
TL;DR: It is proved that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.
Abstract: We analyze the asymptotic security of the family of Gaussian modulated quantum key distribution protocols for continuous-variables systems. We prove that the Gaussian unitary attack is optimal for all the considered bounds on the key rate when the first and second momenta of the canonical variables involved are known by the honest parties.

387 citations

Journal ArticleDOI
TL;DR: This paper gives an estimation of the secret key rate for protocols which do not contain a postselection procedure, and shows that recent continuous-variable protocols are able to provide fully secure secret keys in the finite-size scenario, over distances larger than $50$ km.
Abstract: The goal of this paper is to extend the framework of finite-size analysis recently developed for quantum key distribution to continuous-variable protocols. We do not solve this problem completely here, and we mainly consider the finite-size effects on the parameter estimation procedure. Despite the fact that some questions are left open, we are able to give an estimation of the secret key rate for protocols which do not contain a postselection procedure. As expected, these results are significantly more pessimistic than those obtained in the asymptotic regime. However, we show that recent continuous-variable protocols are able to provide fully secure secret keys in the finite-size scenario, over distances larger than $50$ km.

312 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this article, the authors present the Deutsch-Jozsa algorithm for continuous variables, and a deterministic version of it is used for quantum information processing with continuous variables.
Abstract: Preface. About the Editors. Part I: Quantum Computing. 1. Quantum computing with qubits S.L. Braunstein, A.K. Pati. 2. Quantum computation over continuous variables S. Lloyd, S.L. Braunstein. 3. Error correction for continuous quantum variables S.L. Braunstein. 4. Deutsch-Jozsa algorithm for continuous variables A.K. Pati, S.L. Braunstein. 5. Hybrid quantum computing S. Lloyd. 6. Efficient classical simulation of continuous variable quantum information processes S.D. Bartlett, B.C. Sanders, S.L. Braunstein, K. Nemoto. Part II: Quantum Entanglement. 7. Introduction to entanglement-based protocols S.L. Braunstein, A.K. Pati. 8. Teleportation of continuous uantum variables S.L. Braunstein, H.J. Kimble. 9. Experimental realization of continuous variable teleportation A. Furusawa, H.J. Kimble. 10. Dense coding for continuous variables S.L. Braunstein, H.J. Kimble. 11. Multipartite Greenberger-Horne-Zeilinger paradoxes for continuous variables S. Massar, S. Pironio. 12. Multipartite entanglement for continuous variables P. van Loock, S.L. Braunstein. 13. Inseparability criterion for continuous variable systems Lu-Ming Duan, G. Giedke, J.I. Cirac, P. Zoller. 14. Separability criterion for Gaussian states R. Simon. 15. Distillability and entanglement purification for Gaussian states G. Giedke, Lu-Ming Duan, J.I. Cirac, P. Zoller. 16. Entanglement purification via entanglement swapping S. Parke, S. Bose, M.B. Plenio. 17. Bound entanglement for continuous variables is a rare phenomenon P. Horodecki, J.I. Cirac, M. Lewenstein. Part III: Continuous Variable Optical-Atomic Interfacing. 18. Atomic continuous variable processing and light-atoms quantum interface A. Kuzmich, E.S. Polzik. Part IV: Limits on Quantum Information and Cryptography. 19. Limitations on discrete quantum information and cryptography S.L. Braunstein, A.K. Pati. 20. Quantum cloning with continuous variables N.J. Cerf. 21. Quantum key distribution with continuous variables in optics T.C. Ralph. 22. Secure quantum key distribution using squeezed states D. Gottesman, J. Preskill. 23. Experimental demonstration of dense coding and quantum cryptography with continuous variables Kunchi Peng, Qing Pan, Jing Zhang, Changde Xie. 24. Quantum solitons in optical fibres: basic requisites for experimental quantum communication G. Leuchs, Ch. Silberhorn, E. Konig, P.K. Lam, A. Sizmann, N. Korolkova. Index.

2,940 citations

Journal ArticleDOI
TL;DR: Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Abstract: Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete-variable, continuous-variable, and distributed-phase-reference protocols).

2,926 citations

Journal ArticleDOI
TL;DR: This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination.
Abstract: The science of quantum information has arisen over the last two decades centered on the manipulation of individual quanta of information, known as quantum bits or qubits. Quantum computers, quantum cryptography, and quantum teleportation are among the most celebrated ideas that have emerged from this new field. It was realized later on that using continuous-variable quantum information carriers, instead of qubits, constitutes an extremely powerful alternative approach to quantum information processing. This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements. Interestingly, such a restriction to the Gaussian realm comes with various benefits, since on the theoretical side, simple analytical tools are available and, on the experimental side, optical components effecting Gaussian processes are readily available in the laboratory. Yet, Gaussian quantum information processing opens the way to a wide variety of tasks and applications, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination. This review reports on the state of the art in this field, ranging from the basic theoretical tools and landmark experimental realizations to the most recent successful developments.

2,781 citations

Journal ArticleDOI
16 Jan 2003-Nature
TL;DR: In this paper, the authors investigate the feasibility of achieving electrically driven lasing from individual nanowires and show that these structures can function as Fabry-Perot optical cavities with mode spacing inversely related to the nanowire length.
Abstract: Electrically driven semiconductor lasers are used in technologies ranging from telecommunications and information storage to medical diagnostics and therapeutics. The success of this class of lasers is due in part to well-developed planar semiconductor growth and processing, which enables reproducible fabrication of integrated, electrically driven devices. Yet this approach to device fabrication is also costly and difficult to integrate directly with other technologies such as silicon microelectronics. To overcome these issues for future applications, there has been considerable interest in using organic molecules, polymers, and inorganic nanostructures for lasers, because these materials can be fashioned into devices by chemical processing. Indeed, amplified stimulated emission and lasing have been reported for optically pumped organic systems and, more recently, inorganic nanocrystals and nanowires. However, electrically driven lasing, which is required in most applications, has met with several difficulties in organic systems, and has not been addressed for assembled nanocrystals or nanowires. Here we investigate the feasibility of achieving electrically driven lasing from individual nanowires. Optical and electrical measurements made on single-crystal cadmium sulphide nanowires show that these structures can function as Fabry-Perot optical cavities with mode spacing inversely related to the nanowire length. Investigations of optical and electrical pumping further indicate a threshold for lasing as characterized by optical modes with instrument-limited linewidths. Electrically driven nanowire lasers, which might be assembled in arrays capable of emitting a wide range of colours, could improve existing applications and suggest new opportunities.

2,396 citations

Journal ArticleDOI
TL;DR: The rational control of the mechanical, chemical, electronic and optical properties of nanodiamonds through surface doping, interior doping and the introduction of functional groups are discussed.
Abstract: Nanodiamonds have excellent mechanical and optical properties, high surface areas and tunable surface structures. They are also non-toxic, which makes them well suited to biomedical applications. Here we review the synthesis, structure, properties, surface chemistry and phase transformations of individual nanodiamonds and clusters of nanodiamonds. In particular we discuss the rational control of the mechanical, chemical, electronic and optical properties of nanodiamonds through surface doping, interior doping and the introduction of functional groups. These little gems have a wide range of potential applications in tribology, drug delivery, bioimaging and tissue engineering, and also as protein mimics and a filler material for nanocomposites.

2,351 citations