Experimental implementation of time-coding quantum key distribution
نویسندگان
چکیده
منابع مشابه
Security analysis of the time-coding quantum key distribution protocols
We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security...
متن کاملExperimental measurement-device-independent quantum key distribution.
Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-dev...
متن کاملExperimental quantum key distribution with decoy states.
To increase dramatically the distance and the secure key generation rate of quantum key distribution (QKD), the idea of quantum decoys--signals of different intensities--has recently been proposed. Here, we present the first experimental implementation of decoy state QKD. By making simple modifications to a commercial quantum key distribution system, we show that a secure key generation rate of...
متن کاملSecurity of practical phase-coding quantum key distribution
Security proof of practical quantum key distribution (QKD) has attracted a lot of attentions in recent years. Most of real-life QKD implementations are based on phase-coding BB84 protocol, which usually uses Unbalanced Mach-Zehnder Interferometer (UMZI) as the information coder and decoder. However, the long arm and short arm of UMZI will introduce different loss in practical experimental reali...
متن کاملExperimental study of high speed polarization-coding quantum key distribution with sifted-key rates over Mbit/s.
We present a quantitative study of various limitations on quantum cryptographic systems operating with sifted-key rates over Mbit/s. The dead time of silicon APDs not only limits the sifted-key rate but also causes correlation between the neighboring key bits. In addition to the well-known count-rate dependent timing jitter in avalanche photo-diode (APD), the faint laser sources, the vertical c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2005
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.72.062325