Experimental implementation of time-coding quantum key distribution

被引:15
|
作者
Boucher, W [1 ]
Debuisschert, T [1 ]
机构
[1] THALES Res & Technol France, F-91767 Palaiseau, France
来源
PHYSICAL REVIEW A | 2005年 / 72卷 / 06期
关键词
D O I
10.1103/PhysRevA.72.062325
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We have implemented an experimental setup in order to demonstrate the feasibility of time-coding protocols for quantum key distribution. Alice produces coherent 20-ns faint pulses of light at 853 nm. They are sent to Bob with delay 0 ns (encoding bit 0) or 10 ns (encoding bit 1). Bob directs at random the received pulses to two different arms. In the first one, a 300 ps resolution Si photon counter allows Bob to precisely measure the detection times of each photon in order to establish the key. Comparing them with the emission times of the pulses sent by Alice allows one to evaluate the quantum bit error rate (QBER). The minimum obtained QBER is 1.62%. The possible loss of coherence in the setup can be exploited by Eve to eavesdrop the line. Therefore, the second arm of Bob setup is a Mach-Zehnder interferometer with a 10 ns propagation delay between the two paths. Contrast measurement of the output beams allows one to measure the autocorrelation function of the received pulses that characterizes their average coherence. In the case of an ideal setup, the value expected with the pulses sent by Alice is 0.576. The experimental value of the pulses autocorrelation function is found to be 0.541. Knowing the resulting loss of coherence and the measured QBER, one can evaluate the mutual information between Alice and Eve and the mutual information between Alice and Bob, in the case of intercept-resend attacks and in the case of attacks with intrication. With our values, Bob has an advantage on Eve of 0.43 bit per pulse. The maximum possible QBER corresponding to equal informations for Bob and Eve is 5.8%. With the usual attenuation of fibres at 850 nm, it shows that secure key distribution is possible up to a distance of 2.75 km, which is sufficient for local links.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Experimental quantum key distribution with source flaws
    Xu, Feihu
    Wei, Kejin
    Sajeed, Shihan
    Kaiser, Sarah
    Sun, Shihai
    Tang, Zhiyuan
    Qian, Li
    Makarov, Vadim
    Lo, Hoi-Kwong
    PHYSICAL REVIEW A, 2015, 92 (03):
  • [42] Implementation of Secure Key Distribution Based On Quantum Cryptography
    Elboukhari, Mohamed
    Azizi, Abdelmalek
    Azizi, Mostafa
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 361 - +
  • [43] Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network
    Zixin Huang
    Siddarth Koduru Joshi
    Djeylan Aktas
    Cosmo Lupo
    Armanda O. Quintavalle
    Natarajan Venkatachalam
    Sören Wengerowsky
    Martin Lončarić
    Sebastian Philipp Neumann
    Bo Liu
    Željko Samec
    Laurent Kling
    Mario Stipčević
    Rupert Ursin
    John G. Rarity
    npj Quantum Information, 8
  • [44] Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network
    Huang, Zixin
    Joshi, Siddarth Koduru
    Aktas, Djeylan
    Lupo, Cosmo
    Quintavalle, Armanda O.
    Venkatachalam, Natarajan
    Wengerowsky, Soren
    Loncaric, Martin
    Neumann, Sebastian Philipp
    Liu, Bo
    Samec, Zeljko
    Kling, Laurent
    Stipcevic, Mario
    Ursin, Rupert
    Rarity, John G.
    NPJ QUANTUM INFORMATION, 2022, 8 (01)
  • [45] Security of practical phase-coding quantum key distribution
    Li, Hong-Wei
    Yin, Zhen-Qiang
    Han, Zheng-Fu
    Bao, Wan-Su
    Guo, Guang-Can
    Quantum Information and Computation, 2010, 10 (9-10): : 771 - 779
  • [46] High-capacity quantum Fibonacci coding for key distribution
    Simon, David S.
    Lawrence, Nate
    Trevino, Jacob
    Dal Negro, Luca
    Sergienko, Alexander V.
    PHYSICAL REVIEW A, 2013, 87 (03):
  • [47] Analysis of polarization coding for subcarrier multiplexing quantum key distribution
    Hailin Xiao
    Shan Ouyang
    Anthony Theodore Chronopoulos
    Quantum Information Processing, 2019, 18
  • [48] Subcarrier multiplexing quantum key distribution based on polarization coding
    Zhao Gu-Hao
    Zhao Shang-Hong
    Yao Zhou-Shi
    Meng Wen
    Wang Xiang
    Zhu Zhi-Hang
    Liu Feng
    ACTA PHYSICA SINICA, 2012, 61 (24)
  • [49] Analysis of polarization coding for subcarrier multiplexing quantum key distribution
    Xiao, Hailin
    Ouyang, Shan
    Chronopoulos, Anthony Theodore
    QUANTUM INFORMATION PROCESSING, 2019, 18 (05)
  • [50] SECURITY OF PRACTICAL PHASE-CODING QUANTUM KEY DISTRIBUTION
    Li, Hong-Wei
    Yin, Zhen-Qiang
    Han, Zheng-Fu
    Bao, Wan-Su
    Guo, Guang-Can
    QUANTUM INFORMATION & COMPUTATION, 2010, 10 (9-10) : 771 - 779