Photon counting statistics using a digital oscilloscope

M.L. Martinez Ricci,J. Mazzaferri,A.V. Bragas,O.E. Martinez
DOI: https://doi.org/10.1119/1.2742400
2007-10-02
Abstract:We present a photon counting experiment designed for an undergraduate physics laboratory. The statistics of the number of photons of a pseudo-thermal light source is studied in two limiting cases: much longer and much shorter than the coherence time, giving Poisson and Bose-Einstein distributions, respectively. The experiment can be done in a reasonable time using a digital oscilloscope without the need of counting boards. The use of the oscilloscope has the advantage of allowing the storage of the data for further processing. The stochastic nature of the detection phenomena adds additional value because students are forced to do data processing and analysis.
Optics
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is that the current automatic security protocol analysis is only applicable to small - scale protocols. For larger protocols, since they are usually composed of multiple small - scale protocols, the method of compositional analysis is attractive, but this method is not simple. Specifically, the paper aims to bridge the gap between small - scale academic protocols and large - scale industrial protocols by developing a framework to achieve compositional analysis of a large class of security protocols. This framework aims to promote the automatic and manual verification of large - scale structured security protocols. The method is to first verify the properties of component protocols in a multi - protocol environment, and then derive the properties of the composite protocol. In order to reduce the complexity of multi - protocol verification, the author introduces the concept of protocol independence and proves some theorems, making it possible to analyze independent component protocols in an isolated state. By studying the key establishment sequence containing three sub - protocols in WiMAX, the paper demonstrates the applicability of this framework in actual protocols. Except for some simple inferences, the analysis is mainly completed using automatic tools.