scholarly journals Secure polarization-independent subcarrier quantum key distribution in optical fiber channel using BB84 protocol with a strong reference

2016 ◽  
Vol 24 (3) ◽  
pp. 2619 ◽  
Author(s):  
A. V. Gleim ◽  
V. I. Egorov ◽  
Yu. V. Nazarov ◽  
S. V. Smirnov ◽  
V. V. Chistyakov ◽  
...  
CLEO: 2015 ◽  
2015 ◽  
Author(s):  
Artur V. Gleim ◽  
Vladimir Egorov ◽  
Yuri V. Nazarov ◽  
Semen V. Smirnov ◽  
Vladimir V. Chistyakov ◽  
...  

Photonics ◽  
2021 ◽  
Vol 8 (6) ◽  
pp. 208
Author(s):  
Xiangqing Wang ◽  
Jie Zhang ◽  
Bo Wang ◽  
Kongni Zhu ◽  
Haokun Song ◽  
...  

With the increase in the popularity of cloud computing and big data applications, the amount of sensitive data transmitted through optical networks has increased dramatically. Furthermore, optical transmission systems face various security risks at the physical level. We propose a novel key distribution scheme based on signal-to-noise ratio (SNR) measurements to extract the fingerprint of the fiber channel and improve the physical level of security. The SNR varies with time because the fiber channel is affected by many physical characteristics, such as dispersion, polarization, scattering, and amplifier noise. The extracted SNR of the optical fiber channel can be used as the basis of key generation. Alice and Bob can obtain channel characteristics by measuring the SNR of the optical fiber channel and generate the consistent key by quantization coding. The security and consistency of the key are guaranteed by the randomness and reciprocity of the channel. The simulation results show that the key generation rate (KGR) can reach 25 kbps, the key consistency rate (KCR) can reach 98% after key post-processing, and the error probability of Eve’s key is ~50%. In the proposed scheme, the equipment used is simple and compatible with existing optic fiber links.


2018 ◽  
Vol 121 (19) ◽  
Author(s):  
Alberto Boaron ◽  
Gianluca Boso ◽  
Davide Rusca ◽  
Cédric Vulliez ◽  
Claire Autebert ◽  
...  

2009 ◽  
Vol 27 (15) ◽  
pp. 3202-3211 ◽  
Author(s):  
Q. Xu ◽  
M. Sabban ◽  
M.B. Costa e Silva ◽  
P. Gallion ◽  
F.J. Mendieta

2005 ◽  
Vol 03 (supp01) ◽  
pp. 143-143 ◽  
Author(s):  
HOI-KWONG LO

Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states—a vacuum and a weak decoy state—asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution", . We also have done the first experimental demonstration of decoy state quantum key distribution, over 15km of Telecom fibers. This part of work is published in "Experimental Decoy State Quantum Key Distribution Over 15km", .


2014 ◽  
Vol 51 (9) ◽  
pp. 090603
Author(s):  
王剑 Wang Jian ◽  
朱勇 Zhu Yong ◽  
周华 Zhou Hua ◽  
苏洋 Su Yang ◽  
朱波 Zhu Bo

Entropy ◽  
2020 ◽  
Vol 22 (12) ◽  
pp. 1393
Author(s):  
Andrei Gaidash ◽  
Anton Kozubov ◽  
Svetlana Medvedeva ◽  
George Miroshnichenko

In this paper, we consider the influence of a divergence of polarization of a quantum signal transmitted through an optical fiber channel on the quantum bit error rate of the subcarrier wave quantum key distribution protocol. Firstly, we investigate the dependence of the optical power of the signal on the modulation indices’ difference after the second phase modulation of the signal. Then we consider the Liouville equation with regard to relaxation in order to develop expressions of the dynamics of the Stokes parameters. As a result, we propose a model that describes quantum bit error rate for the subcarrier wave quantum key distribution depending on the characteristics of the optical fiber. Finally, we propose several methods for minimizing quantum bit error rate.


Sign in / Sign up

Export Citation Format

Share Document