416 research outputs found
Practical quantum key distribution over a 48-km optical fiber network
The secure distribution of the secret random bit sequences known as "key"
material, is an essential precursor to their use for the encryption and
decryption of confidential communications. Quantum cryptography is a new
technique for secure key distribution with single-photon transmissions:
Heisenberg's uncertainty principle ensures that an adversary can neither
successfully tap the key transmissions, nor evade detection (eavesdropping
raises the key error rate above a threshold value). We have developed
experimental quantum cryptography systems based on the transmission of
non-orthogonal photon states to generate shared key material over
multi-kilometer optical fiber paths and over line-of-sight links. In both
cases, key material is built up using the transmission of a single-photon per
bit of an initial secret random sequence. A quantum-mechanically random subset
of this sequence is identified, becoming the key material after a data
reconciliation stage with the sender. Here we report the most recent results of
our optical fiber experiment in which we have performed quantum key
distribution over a 48-km optical fiber network at Los Alamos using photon
interference states with the B92 and BB84 quantum key distribution protocols.Comment: 13 pages, 7 figures, .pdf format submitted to Journal of Modern
Optic
Metropolitan all-pass and inter-city quantum communication network
We have demonstrated a metropolitan all-pass quantum communication network in
field fiber for four nodes. Any two nodes of them can be connected in the
network to perform quantum key distribution (QKD). An optical switching module
is presented that enables arbitrary 2-connectivity among output ports.
Integrated QKD terminals are worked out, which can operate either as a
transmitter, a receiver, or even both at the same time. Furthermore, an
additional link in another city of 60 km fiber (up to 130 km) is seamless
integrated into this network based on a trusted relay architecture. On all the
links, we have implemented protocol of decoy state scheme. All of necessary
electrical hardware, synchronization, feedback control, network software,
execution of QKD protocols are made by tailored designing, which allow a
completely automatical and stable running. Our system has been put into
operation in Hefei in August 2009, and publicly demonstrated during an
evaluation conference on quantum network organized by the Chinese Academy of
Sciences on August 29, 2009. Real-time voice telephone with one-time pad
encoding between any two of the five nodes (four all-pass nodes plus one
additional node through relay) is successfully established in the network
within 60km.Comment: 9 pages, 2 figures, 2 table
Sundays in a Quantum Engineer's Life
I am a Quantum Engineer, but on Sundays I have principles, John Bell opened
his "underground colloquium" in March 1983, words which I will never forget!
What! John Bell, the great John Bell, presented himself as an engineer!?! one
of those people who make things work without even understanding how they
function?!? whereas I thought of John Bell as one of the greatest theoretician.Comment: Talk presented at the Conference in Commemoration of John S. Bell,
Vienna 10-14 November 2000. 4 pages & 3 figure
Quantum Cryptography in Practice
BBN, Harvard, and Boston University are building the DARPA Quantum Network,
the world's first network that delivers end-to-end network security via
high-speed Quantum Key Distribution, and testing that Network against
sophisticated eavesdropping attacks. The first network link has been up and
steadily operational in our laboratory since December 2002. It provides a
Virtual Private Network between private enclaves, with user traffic protected
by a weak-coherent implementation of quantum cryptography. This prototype is
suitable for deployment in metro-size areas via standard telecom (dark) fiber.
In this paper, we introduce quantum cryptography, discuss its relation to
modern secure networks, and describe its unusual physical layer, its
specialized quantum cryptographic protocol suite (quite interesting in its own
right), and our extensions to IPsec to integrate it with quantum cryptography.Comment: Preprint of SIGCOMM 2003 pape
- …