Field test of a continuous-variable quantum key distribution prototype
Simon Fossier,Eleni Diamanti,Thierry Debuisschert,André Villing,Rosa Tualle-Brouri,Philippe Grangier +5 more
Reads0
Chats0
TLDR
A prototype that implements a continuous-variable quantum key distribution protocol based on coherent states and reverse reconciliation, which uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation.Abstract:
We have designed and realized a prototype that implements a continuous-variable quantum key distribution (QKD) protocol based on coherent states and reverse reconciliation. The system uses time and polarization multiplexing for optimal transmission and detection of the signal and phase reference, and employs sophisticated error-correction codes for reconciliation. The security of the system is guaranteed against general coherent eavesdropping attacks. The performance of the prototype was tested over preinstalled optical fibres as part of a quantum cryptography network combining different QKD technologies. The stable and automatic operation of the prototype over 57?h yielded an average secret key distribution rate of 8?kbit?s?1 over a 3?dB loss optical fibre, including the key extraction process and all quantum and classical communication. This system is therefore ideal for securing communications in metropolitan size networks with high-speed requirements.read more
Citations
More filters
Journal ArticleDOI
Gaussian quantum information
Christian Weedbrook,Stefano Pirandola,Raúl García-Patrón,Nicolas J. Cerf,Timothy C. Ralph,Jeffrey H. Shapiro,Seth Lloyd +6 more
TL;DR: This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination.
Gaussian quantum information
Christian Weedbrook,Stefano Pirandola,Raúl García-Patrón,Nicolas J. Cerf,Timothy C. Ralph,Jeffrey H. Shapiro,Seth Lloyd +6 more
TL;DR: In this article, a review of the state of the art in continuous-variable quantum information processing can be found, ranging from the basic theoretical tools and landmark experimental realizations to the most recent successful developments.
Journal ArticleDOI
The SECOQC quantum key distribution network in Vienna
Momtchil Peev,Christoph Pacher,Romain Alléaume,Claudio Barreiro,Jan Bouda,W. Boxleitner,T. Debuisschert,Eleni Diamanti,Eleni Diamanti,Mehrdad Dianati,James F. Dynes,Sandrine Fasel,Simon Fossier,M. Furst,J. D. Gautier,Nicolas Gisin,Philippe Grangier,Andreas Happe,Y. Hasani,Michael Hentschel,Hannes Hübel,G. Humer,Thomas Länger,Matthieu Legre,Roland Lieger,Jérôme Lodewyck,Thomas Lorünser,Norbert Lütkenhaus,Norbert Lütkenhaus,A. Marhold,Thomas Matyus,O. Maurhart,L. Monat,Sebastian Nauerth,J-B. Page,Andreas Poppe,E. Querasser,G. Ribordy,S. Robyr,Louis Salvail,Andrew W. Sharpe,Andrew J. Shields,Damien Stucki,M. Suda,C. Tamas,Thomas Themel,Rob Thew,Yann Thoma,Alexander Treiber,Patrick Trinkler,Rosa Tualle-Brouri,Fabien Vannel,Nino Walenta,Henning Weier,Harald Weinfurter,Ilse Wimberger,Zhiliang Yuan,Hugo Zbinden,Anton Zeilinger +58 more
TL;DR: The paper presents the architecture and functionality of the principal networking agent?the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network, and realizes end-to-end secure transport of key material between these destinations.
Journal ArticleDOI
Advances in quantum cryptography
Stefano Pirandola,Ulrik L. Andersen,Leonardo Banchi,Mario Berta,Darius Bunandar,Roger Colbeck,Dirk Englund,Tobias Gehring,Cosmo Lupo,Carlo Ottaviani,Jason Pereira,Mohsen Razavi,Jesni Shamsul Shaari,Marco Tomamichel,Vladyslav C. Usenko,Giuseppe Vallone,Paolo Villoresi,Petros Wallden +17 more
TL;DR: This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Journal ArticleDOI
Secure quantum key distribution with realistic devices
TL;DR: This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.
References
More filters
Journal ArticleDOI
On a class of error correcting binary group codes
TL;DR: A general method of constructing error correcting binary group codes is obtained and an example is worked out to illustrate the method of construction.
Journal ArticleDOI
Quantum key distribution using gaussian-modulated coherent states
Frédéric Grosshans,Gilles Van Assche,Jérôme Wenger,Rosa Brouri,Nicolas J. Cerf,Philippe Grangier +5 more
TL;DR: This work proposes and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states and shot-noise-limited homodyne detection, which is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories.
Journal ArticleDOI
Continuous Variable Quantum Cryptography Using Coherent States
TL;DR: This work proposes several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and shows that they are secure against individual eavesdropping attacks.
Journal ArticleDOI
Continuous variable quantum cryptography
TL;DR: A quantum key distribution scheme in which small phase and amplitude modulations of cw light beams carry the key information and the presence of EPR-type correlations provides the quantum protection.
Journal ArticleDOI
Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.
TL;DR: A fully general approach to the security analysis of continuous-variable quantum key distribution (CV-QKD) is presented, and Gaussian attacks are shown to be optimal against all collective eavesdropping strategies.