File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/ISIT.2006.261920
- Scopus: eid_2-s2.0-39049171347
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Simulation and implementation of decoy state quantum key distribution over 60km telecom fiber
Title | Simulation and implementation of decoy state quantum key distribution over 60km telecom fiber |
---|---|
Authors | |
Issue Date | 2006 |
Citation | IEEE International Symposium on Information Theory - Proceedings, 2006, p. 2094-2098 How to Cite? |
Abstract | Decoy state quantum key distribution (QKD) has been proposed as a novel approach to improve dramatically both the security and the performance of practical QKD setups. Recently, many theoretical efforts have been made on this topic and have theoretically predicted the high performance of decoy method. However, the gap between theory and experiment remains open. In this paper, we report the first experiments on decoy state QKD, thus bridging the gap. Two protocols of decoy state QKD are implemented: one-decoy protocol over 15km of standard telecom fiber, and weak+vacuum protocol over 60km of standard telecom fiber. We implemented the decoy state method on a modified commercial QKD system. The modification we made is simply adding commercial acousto-optic modulator (AOM) on the QKD system. The AOM is used to modulate the intensity of each signal individually, thus implementing the decoy state method. As an important part of implementation, numerical simulation of our set-up is also performed. The simulation shows that standard security proofs give a zero key generation rate at the distance we perform decoy state QKD (both 15km and 60km). Therefore decoy state QKD is necessary for long distance secure communication. Our implementation shows explicitly the power and feasibility of decoy method, and brings it to our real-life. © 2006 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/285612 |
ISSN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhao, Yi | - |
dc.contributor.author | Qi, Bing | - |
dc.contributor.author | Ma, Xiongfeng | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.contributor.author | Qian, Li | - |
dc.date.accessioned | 2020-08-18T04:56:12Z | - |
dc.date.available | 2020-08-18T04:56:12Z | - |
dc.date.issued | 2006 | - |
dc.identifier.citation | IEEE International Symposium on Information Theory - Proceedings, 2006, p. 2094-2098 | - |
dc.identifier.issn | 2157-8101 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285612 | - |
dc.description.abstract | Decoy state quantum key distribution (QKD) has been proposed as a novel approach to improve dramatically both the security and the performance of practical QKD setups. Recently, many theoretical efforts have been made on this topic and have theoretically predicted the high performance of decoy method. However, the gap between theory and experiment remains open. In this paper, we report the first experiments on decoy state QKD, thus bridging the gap. Two protocols of decoy state QKD are implemented: one-decoy protocol over 15km of standard telecom fiber, and weak+vacuum protocol over 60km of standard telecom fiber. We implemented the decoy state method on a modified commercial QKD system. The modification we made is simply adding commercial acousto-optic modulator (AOM) on the QKD system. The AOM is used to modulate the intensity of each signal individually, thus implementing the decoy state method. As an important part of implementation, numerical simulation of our set-up is also performed. The simulation shows that standard security proofs give a zero key generation rate at the distance we perform decoy state QKD (both 15km and 60km). Therefore decoy state QKD is necessary for long distance secure communication. Our implementation shows explicitly the power and feasibility of decoy method, and brings it to our real-life. © 2006 IEEE. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE International Symposium on Information Theory - Proceedings | - |
dc.title | Simulation and implementation of decoy state quantum key distribution over 60km telecom fiber | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/ISIT.2006.261920 | - |
dc.identifier.scopus | eid_2-s2.0-39049171347 | - |
dc.identifier.spage | 2094 | - |
dc.identifier.epage | 2098 | - |