Proceedings ArticleDOI
Polarization tracking for quantum satellite communications
TLDR
In this paper, a tracking algorithm is proposed for polarization-encoded quantum satellite communications where polarization states are used to determine the bit transfer between the transmitter and receiver, and a novel dynamic polarization compensation scheme is also proposed.Abstract:
Satellite networks and quantum communications offer complementary opportunities for enhanced operations. Quantum communications provide security for the transmissions between satellites and ground stations; while the free-space link of satellite networks provide the potential of long distance transmission of quantum bits (qubit) for space communications. However, with the promising advantages of the two approaches, challenges remain to fully develop quantum-based satellite communications such as robust and reliable information detection which is difficult to achieve due to the movement of satellites. In this paper, a tracking algorithm is proposed for polarization-encoded quantum satellite communications where polarization states are used to determine the bit transfer between the transmitter and receiver. The polarization tracking is essential for the decoding of a qubit and the quantum key distribution (QKD). A practical channel model for free-space quantum communications is adopted in this paper. With the estimated polarization, a novel dynamic polarization compensation scheme is also proposed. The results show that our methods can accurately estimate the polarization, providing much lower quantum bit error rate (QBER) by compensation, as compared with the direct qubit detection without polarization tracking and compensation scheme.read more
Citations
More filters
Journal ArticleDOI
Futuristic view of the Internet of Quantum Drones: Review, challenges and research agenda
TL;DR: In this paper , the authors investigated how quantum drones, IoQDs, and CQS can be applied in new contexts in real-time applications in strategic areas of societal interest, especially during the quantum age.
Proceedings ArticleDOI
Game theoretic power allocation and waveform selection for satellite communications
TL;DR: A Game Theoretic Model for Satellite Communications (SATCOM) is set up to solve the interaction between the transmission pair and the jammer to reach a Nash Equilibrium (NE) and results show the effectiveness of the SATCOM power allocation, waveform selection scheme, and jams mitigation.
Proceedings ArticleDOI
On effectiveness of game theoretic modeling and analysis against cyber threats for avionic systems
TL;DR: A game theoretical based modeling and analysis was conducted to study the interaction between an adversary and a defender and the implementation of game-theoretic analysis on an Avionics Sensor-based Defense System (ASDS), which consists of distributed passive and active network sensors.
Journal ArticleDOI
Decoherence can help quantum cryptographic security
TL;DR: In this paper, the authors show that the security of the ping-pong protocol against a noise-restricted adversary improves under a non-unital noisy channel, but deteriorates under unital channels.
Proceedings ArticleDOI
Optimum Design for Robustness of Frequency Hopping System
Gang Wang,Khanh Pham,Erik Blasch,Tien Manh Nguyen,Genshe Chen,Dan Shen,Bin Jia,Xin Tian,Zhonghai Wang +8 more
TL;DR: Cognitive radio frequency interferences for a frequency hopping system will be demonstrated to maximize probability of interception, while probability of RFI detection is maintained, to demonstrate that the proposed optimum design outperforms the baseline methods.
References
More filters
Journal ArticleDOI
Quantum cryptography
TL;DR: A protocol for coin-tossing by exchange of quantum messages is presented, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox.
Journal ArticleDOI
Simple proof of security of the BB84 quantum key distribution protocol
Peter W. Shor,John Preskill +1 more
TL;DR: It is proved that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure, and a key distribution protocol based on entanglement purification is given, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol.