Amplification of the transmission rate for quantum key distribution based on subcarrier multiplexing

Author(s):  
Juan Pradilla ◽  
Jose Mora ◽  
Jose Capmany
2020 ◽  
Vol 18 (06) ◽  
pp. 2050031
Author(s):  
Ali Mehri-Toonabi ◽  
Mahdi Davoudi Darareh ◽  
Shahrooz Janbaz

In this work, we introduce a high-dimensional polarization-phase (PoP)-based quantum key distribution protocol, briefly named PoP[Formula: see text], where [Formula: see text] is the dimension of a hybrid quantum state including polarization and phase degrees of freedom of the same photon, and [Formula: see text] is the number of mutually unbiased bases. We present a detailed description of the PoP[Formula: see text] protocol as a special case, and evaluate its security against various individual and coherent eavesdropping strategies, and in each case, we compare it with the BB84 and the two-dimensional (TD)-PoP protocols. In all the strategies, the error threshold and the effective transmission rate of the PoP[Formula: see text] protocol are far greater than the other two protocols. Unlike most high-dimensional protocols, the simplicity of producing and detecting the qudits and the use of conventional components (such as traditional single-photon sources and quantum channels) are among the features of the PoP[Formula: see text] protocol.


2019 ◽  
Vol 9 (18) ◽  
pp. 3937
Author(s):  
Ying Guo ◽  
Minglu Cai ◽  
Duan Huang

Polarization is one of the physical characteristics of optical waves, and the polarization-division-multiplexing (PDM) scheme has gained much attraction thanks to its capability of achieving high transmission rate. In the PDM-based quantum key distribution (QKD), the key information could be encoded independently by the optical fields E x and E y , where the 2-dimensional modulation and orthogonal polarization multiplexing usually result in two-fold channel capacity. Unfortunately, the non-negligible polarization-dependent loss (PDL) caused by the crystal dichroism in optical devices may result in the signal distortion, leading to an imbalanced optical signal-to-noise ratio. Here, we present a polarization-pairwise coding (PPC) scheme for the PDM-based continuous-variable (CV) QKD systems to overcome the PDL problem. Numerical simulation results indicate that the PDL-induced performance degradation can be mitigated. In addition, the PPC scheme, tailored to be robust against a high level of PDL, offers a suitable solution to improve the performance of the PDM-based CVQKD in terms of the secret key rate and maximal transmission distance.


2014 ◽  
Vol 14 (9&10) ◽  
pp. 845-856
Author(s):  
Song Lin ◽  
Gong-De Guo ◽  
Fei Gao ◽  
Xiao-Fen Liu

Decoherence-free subspace (DFS) is a valid solution to realize quantum communication over a collective noise channel, and has been widely studied. Generally speaking, replacing a qubit with a DFS state will cause the reduction of communication efficiency. However, in this letter, it is shown that some kinds of noises may not lower the transmission rate of quantum key distribution. To illustrate it, we propose two quantum key distribution protocols based on Bell states. Here, two nonorthogonal and unbiased sets in a DFS are constructed by linear combination of particles at different positions. Since $n-1$ classical bits are distributed by using $2n$ qubits in our protocols, the transmission rate is close to that of noiseless BB84 protocol. Furthermore, when considering the cost of transmitting classical bits, the efficiencies of these protocols are even higher than that of BB84 protocol.


2021 ◽  
Author(s):  
Tao Wang ◽  
Peng Huang ◽  
Lang Li ◽  
Yingming Zhou ◽  
Guihua Zeng

Abstract Secret key rate is a core performance indicator in implementing quantum key distribution, which directly determines the transmission rate of enciphered data. Here we demonstrate a high-key-rate quantum key distribution system over mature telecom components. The entire framework of quantum key distribution over these components is constructed. The high-rate low-noise Gaussian modulation of coherent states is realized by a classical electro-optic IQ modulator. High-baud low-intensity quantum signals are received by a commercial integrated coherent receiver under the shot-noise limit. A series of digital signal processing algorithms are proposed to achieve accurate signal recovery and key distillation. The system has yield a secret key rate of 10.37 Mbps, 1.61 Mbps, 337.82 kbps, and 58.06 kbps under the standard telecom fiber of 20 km, 50 km, 70 km, and 100 km, respectively. Our results represent the achieved highest secret key generation rate for quantum key distribution using continuous variables at a standard telecom wavelength. Moreover, it breaks the isolation between quantum communication and classical optical communication in terms of components, and opens the way to a high-speed and cost-effective formation of metropolitan quantum secure communication networks.


Current cryptographic techniques broadly specified as conventional cryptography is solely based on the solidity of the mathematical concepts. The advancements in quantum computing can use reversible logic to compute the keys and easily break the existing security in conventional computers. From the analysis of the network structure of Internet of Things (IOT) it is very clear that the entire backbone of the system would collapse if it is attacked or hacked. IOT is a wireless technology that connects “ANYTHING” around to the Internet. IOT is a revolution which should be protected from the attackers as it would lead to several losses which could even be fatal. Hence a strong provision for securing users data in IOT is a real challenge. This paper is attempted to review the fundamentals of Quantum Key Distribution, security aspects for IOT and to address how QKD can be used to secure a IOT system. The challenge encountered is to increase the range and increase the transmission rate of data in QKD systems and to check for a possible solution to adhere these systems with existing information security solutions


2012 ◽  
Vol 61 (24) ◽  
pp. 240306
Author(s):  
Zhao Gu-Hao ◽  
Zhao Shang-Hong ◽  
Yao Zhou-Shi ◽  
Meng Wen ◽  
Wang Xiang ◽  
...  

2014 ◽  
Vol 14 (3&4) ◽  
pp. 217-235
Author(s):  
Viacheslav Burenkov ◽  
Bing Qi ◽  
Ben Fortescue ◽  
Hoi-Kwong Lo

The security of a high speed quantum key distribution system with finite detector dead time $\tau$ is analyzed. When the transmission rate becomes higher than the maximum count rate of the individual detectors ($1/\tau$), security issues affect the scheme for sifting bits. Analytical calculations and numerical simulations of the Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s scheme (further information is available in [D. J. Rogers, J. C. Bienfang, A. Nakassis, H. Xu, and C. W. Clark, New J. Phys.~{\bf 9}, 319 (2007)]) in the presence of an active eavesdropper Eve who has the power to perform an intercept-resend attack. It is shown that Rogers et al.'s scheme is no longer guaranteed to be secure. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are basis-independent and thus secure in the presence of dead time and an active eavesdropper are then introduced. We analyze and compare these secure sifting schemes for this active Eve scenario, and calculate and simulate their key generation rate. It is shown that the maximum key generation rate is $1/(2\tau)$ for passive basis selection, and $1/\tau$ for active basis selection. The security analysis for finite detector dead time is also extended to the decoy state BB84 protocol for one particular secure sifting scheme.


Sign in / Sign up

Export Citation Format

Share Document