15,770 research outputs found
Post-processing procedure for industrial quantum key distribution systems
We present algorithmic solutions aimed on post-processing for industrial
quantum key distribution systems with hardware sifting. The main steps of the
procedure are error correction, parameter estimation, and privacy
amplification. Authentication of a classical public communication channel is
also considered.Comment: 5 pages; presented at the 3rd International School and Conference
"Saint-Petersburg OPEN 2016" (Saint-Petersburg, March 28-30, 2016
Unconditional privacy over channels which cannot convey quantum information
By sending systems in specially prepared quantum states, two parties can
communicate without an eavesdropper being able to listen. The technique, called
quantum cryptography, enables one to verify that the state of the quantum
system has not been tampered with, and thus one can obtain privacy regardless
of the power of the eavesdropper. All previous protocols relied on the ability
to faithfully send quantum states. In fact, until recently, they could all be
reduced to a single protocol where security is ensured though sharing maximally
entangled states. Here we show this need not be the case -- one can obtain
verifiable privacy even through some channels which cannot be used to reliably
send quantum states.Comment: Related to quant-ph/0608195 and for a more general audienc
Provably Secure and Practical Quantum Key Distribution over 307 km of Optical Fibre
Proposed in 1984, quantum key distribution (QKD) allows two users to exchange
provably secure keys via a potentially insecure quantum channel. Since then,
QKD has attracted much attention and significant progress has been made in both
theory and practice. On the application front, however, the operating distance
of practical fibre-based QKD systems is limited to about 150 km, which is
mainly due to the high background noise produced by commonly used semiconductor
single-photon detectors (SPDs) and the stringent demand on the minimum
classical- post-processing (CPP) block size. Here, we present a compact and
autonomous QKD system that is capable of distributing provably-secure
cryptographic key over 307 km of ultra-low-loss optical fibre (51.9 dB loss).
The system is based on a recently developed standard semiconductor (inGaAs)
SPDs with record low background noise and a novel efficient finite-key security
analysis for QKD. This demonstrates the feasibility of practical long-distance
QKD based on standard fibre optic telecom components.Comment: 6+7 pages, 3 figure
Universally-composable finite-key analysis for efficient four-intensity decoy-state quantum key distribution
We propose an efficient four-intensity decoy-state BB84 protocol and derive
concise security bounds for this protocol with the universally composable
finite-key analysis method. Comparing with the efficient three-intensity
protocol, we find that our efficient four-intensity protocol can increase the
secret key rate by at least . Particularly, this increasing rate of
secret key rate will be raised as the transmission distance increases. At a
large transmission distance, our efficient four-intensity protocol can improve
the performance of quantum key distribution profoundly.Comment: accepted by Eur. Phys. J.
- …