Free Space Decoy-state Quantum Key Distribution Implementation

A. G. Magnoni, I. H. López Grande, M. A. Larotonda


Download Paper

Base Information

Volume

V50 - N2 / 2017 Ordinario

Reference

187-192

DOI

http://doi.org/10.7149/OPA.50.2.49045

Language

English

Keywords

Quantum Key Distribution; Open Air Communications; Decoy State

Abstract

In this work we introduce a complete Quantum Key Distribution device that implements a decoy-state protocol [1]. Qubits are coded in the polarization state of weak optical pulses, produced by infrared LEDs [2]. The link between Transmission (Alice) and Reception (Bob) stages is open air, which is the preferred channel to eventually through low-orbit satellites establish quantum communications. Both terminals are placed on different rooms, separated by approximately 8 meters. In order to compensate misalignments produced by small mechanic displacements or atmospheric thermal gradients, the system implements a closed-loop for automatic alignment based on a counter-propagating laser, a servo-actuated mirror and a CMOS image sensor. The apparatus runs in an autonomous way, and in the above described conditions it is able to generate raw cryptographic key at a rate of 185 bits/s, with a QBER of 6.15%.

References

0

W.-Y. Hwang, "Quantum Key Distribution with High Loss: Toward Global Secure Communication,"Phys. Rev. Lett. 91, 057901 (2003).DOI

1

I.H. Lo?pez Grande, C.T. Schmiegelow, M.A. Larotonda, Papers in Physics, 8, 080002 (2016).DOI

2

C. H. Bennett, G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing,"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 175, 8(1984).

3

W. K. Wooters, W. H. Zurek, "A single quanta cannot be cloned," 299, Nature, 802-803 (1982).DOI

4

C. E. Shannon, "Communication Theory of Secrecy Systems," Bell Syst. Tech. J, 28, (IV), 656-715 (1949).DOI

5

N. Gisin et al., "Quantum Cryptography," Rev. Mod. Phys, 74, (I), 42-43 (2002).DOI

6

G. Nogues et al., "Seeing a single photon without destroying it," Nature, 400, pp. 239–242, (1999).DOI

7

X.-B. Wang, "Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography," Phys.Rev. Lett., 94, (230503) (2005).DOI

8

H.-K Lo et al., "Decoy State Quantum Key Distribution," Phys. Rev. Lett., 94, (230504) (2005).DOI

9

I. Marcikic et al., "Distribution of time-bin entangled qubits over 50 km of optical fiber," Phys. Rev. Lett.,93, (180502), (2004).DOI

10

N. Gisin et al., "Quantum Cryptography," Rev. Mod. Phys, 74, (I), 30 (2002).DOI

11

N. Gisin et al., "Operational system for quantum cryptography," Elect. Lett., 31, 232–234, (1995).DOI

12

R. J. Hughes et al., "Free-space quantum key distribution in daylight," J. Mod. Opt, 47, (2-3), 549–562,(2000).DOI

13

A. G. Magnoni, "Distribucio?n Cua?ntica de Claves en aire con estados sen?uelo," tesis de licenciatura Ciencias F??sica, FCEN-UBA (2016).

14

J. F. Dynes et al., "Unconditionally secure one-wat Quantum Key Distribution using decoy states,"Conference on Lasers and Electro-Optics/Quantum Electronics and Laser Science Conference and Photonic Applications Systems Technologies, QML3, OSA (2007).