8 research outputs found
Finite-key analysis on the 1-decoy state QKD protocol
It has been shown that in the asymptotic case of infinite-key length the
2-decoy state QKD protocol outperforms the 1-decoy state protocol. Here, we
present a finite-key analysis of the 1-decoy method. Interestingly, we find
that for practical block sizes of up to bits, the 1-decoy protocol
achieves for almost all experimental settings higher secret key rates than the
2-decoy protocol. Since using only one decoy is also easier to implement, we
conclude that it is the best choice for practical QKD.Comment: 6 pages, 7 figures, Pape
Performance and security of 5 GHz repetition rate polarization-based Quantum Key Distribution
We present and characterize a source for a 5 GHz clocked polarization-based
simplified BB84 protocol. Secret keys are distributed over 151.5 km of standard
telecom fiber at a rate of 54.5 kbps. Potentially, an increased clock frequency
of the experiment introduces correlations between succeeding pulses. We discuss
the impact of these correlations and propose measurements to estimate the
relevant parameters.Comment: 5 pages, 3 figures, submitted to Applied Physics Letter
Simple and high-speed polarization-based QKD
We present a simplified BB84 protocol with only three quantum states and one
decoy-state level. We implement this scheme using the polarization degree of
freedom at telecom wavelength. Only one pulsed laser is used in order to reduce
possible side-channel attacks. The repetition rate of 625 MHz and the achieved
secret bit rate of 23 bps over 200 km of standard fiber are the actual state of
the art
High-speed integrated QKD system
Quantum key distribution (QKD) is nowadays a well established method for
generating secret keys at a distance in an information-theoretic secure way, as
the secrecy of QKD relies on the laws of quantum physics and not computational
complexity. In order to industrialize QKD, low-cost, mass-manufactured and
practical QKD setups are required. Hence, photonic and electronic integration
of the sender's and receiver's respective components is currently in the
spotlight. Here we present a high-speed (2.5 GHz) integrated QKD setup
featuring a transmitter chip in silicon photonics allowing for high-speed
modulation and accurate state preparation, as well as a
polarization-independent low-loss receiver chip in aluminum borosilicate glass
fabricated by the femtosecond laser micromachining technique. Our system
achieves raw bit error rates, quantum bit error rates and secret key rates
equivalent to a much more complex state-of-the-art setup based on discrete
components
Fast Single Photon Detectors and real-time Key Distillation: Enabling High Secret Key Rate QKD Systems
Quantum Key Distribution has made continuous progress over the last 20 years
and is now commercially available. However, the secret key rates (SKR) are
still limited to a few Mbps. Here, we present a custom multipixel
superconducting nanowire single-photon detectors and fast acquisition and
real-time key distillation electronics, removing two roadblocks and allowing an
increase of the SKR of more than an order of magnitude. In combination with a
simple 2.5 GHz clocked time-bin quantum key distribution system, we can
generate secret keys at a rate of 64 Mbps over a distance of 10.0 km and at a
rate of 3.0 Mbps over a distance of 102.4 km with real-time key distillation.Comment: 5 pages, 5 figures, submitted to Nature Photonic
Receiver-Device-Independent Quantum Key Distribution
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box. The security of the protocols is based on the assumption that Alice's prepared states have limited overlaps, but no explicit bound on the Hilbert space dimension is required. The protocols are immune to attacks on the receiver's device, such as blinding attacks. The users can establish a secret key while continuously monitoring the correct functioning of their devices through observed statistics. We report a proof-of-principle demonstration, involving mostly off-the-shelf equipment, as well as a high-efficiency superconducting nanowire detector. A positive key rate is demonstrated over a 4.8 km low-loss optical fiber with finite-key analysis. The prospects of implementing these protocols over longer distances is discussed
Receiver-device-independent quantum key distribution
International audienceWe study a class of receiver-device-independent quantum key distribution protocols based on a prepare-and-measure setup which aims to simplify their implementation. The security of the presented protocols relies on the assumption that the sender, Alice, prepares states that have limited inner-products. Hence, Alice’s device is partially characterized. There is no explicit bound on the Hilbert space dimension required. The receiver’s, Bob’s, device demands no characterization and can be represented as a black-box. The protocols are therefore immune to attacks on Bob’s device, such as blinding attacks. The users can generate a secret key while monitoring the correct functioning of their devices through observed statistics. We report a proof-of-principle demonstration, involving mostly off-the-shelf equipment, as well as a high-efficiency superconducting nanowire detector. A positive key rate is demonstrated over a 4.8 km low-loss optical fiber with finite-key analysis