scispace - formally typeset
Open AccessJournal ArticleDOI

Field test of a continuous-variable quantum key distribution prototype

Reads0
Chats0
TLDR
A prototype that implements a continuous-variable quantum key distribution protocol based on coherent states and reverse reconciliation, which uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation.
Abstract
We have designed and realized a prototype that implements a continuous-variable quantum key distribution (QKD) protocol based on coherent states and reverse reconciliation. The system uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation. The security of the system is guaranteed against general coherent eavesdropping attacks. The performance of the prototype was tested over preinstalled optical fibres as part of a quantum cryptography network combining different QKD technologies. The stable and automatic operation of the prototype over 57?h yielded an average secret key distribution rate of 8?kbit?s?1 over a 3?dB loss optical fibre, including the key extraction process and all quantum and classical communication. This system is therefore ideal for securing communications in metropolitan size networks with high-speed requirements.

read more

Citations
More filters
Journal ArticleDOI

Gaussian quantum information

TL;DR: This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination.

Gaussian quantum information

TL;DR: In this article, a review of the state of the art in continuous-variable quantum information processing can be found, ranging from the basic theoretical tools and landmark experimental realizations to the most recent successful developments.
Journal ArticleDOI

The SECOQC quantum key distribution network in Vienna

TL;DR: The paper presents the architecture and functionality of the principal networking agent?the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network, and realizes end-to-end secure transport of key material between these destinations.
Journal ArticleDOI

Secure quantum key distribution with realistic devices

TL;DR: This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.
References
More filters
Journal ArticleDOI

On a class of error correcting binary group codes

TL;DR: A general method of constructing error correcting binary group codes is obtained and an example is worked out to illustrate the method of construction.
Journal ArticleDOI

Quantum key distribution using gaussian-modulated coherent states

TL;DR: This work proposes and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states and shot-noise-limited homodyne detection, which is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories.
Journal ArticleDOI

Continuous Variable Quantum Cryptography Using Coherent States

TL;DR: This work proposes several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and shows that they are secure against individual eavesdropping attacks.
Journal ArticleDOI

Continuous variable quantum cryptography

TL;DR: A quantum key distribution scheme in which small phase and amplitude modulations of cw light beams carry the key information and the presence of EPR-type correlations provides the quantum protection.
Journal ArticleDOI

Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.

TL;DR: A fully general approach to the security analysis of continuous-variable quantum key distribution (CV-QKD) is presented, and Gaussian attacks are shown to be optimal against all collective eavesdropping strategies.
Related Papers (5)