2005
DOI: 10.1088/1367-2630/7/1/232
|View full text |Cite
|
Sign up to set email alerts
|

Differential phase shift quantum key distribution experiment over 105 km fibre

Abstract: Abstract. We report a quantum key distribution experiment based on the differential phase shift keying (DPSK) protocol with a Poissonian photon source, in which secure keys were generated over >100 km fibre for the first time. We analysed the security of the DPSK protocol and showed that it is robust against strong attacks by Eve, including a photon number splitting attack. To implement this protocol, we developed a new detector for the 1.5 µm band based on frequency up-conversion in a periodically poled lithi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
127
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 144 publications
(128 citation statements)
references
References 32 publications
1
127
0
Order By: Relevance
“…Also, faked states exploiting detector efficiency mismatch can be constructed for energy-time encoding and differential phase shift keying QKD schemes [41,42,43,44,45]; see examples of faked states in Ref. [46].…”
Section: Discussionmentioning
confidence: 99%
“…Also, faked states exploiting detector efficiency mismatch can be constructed for energy-time encoding and differential phase shift keying QKD schemes [41,42,43,44,45]; see examples of faked states in Ref. [46].…”
Section: Discussionmentioning
confidence: 99%
“…SHG, however, cannot be used for faint nonclassical states. In 2004, frequency up-conversion of single photons was achieved via nondegenerate sumfrequency generation [19] and used to increase the detection efficiency in quantum key distribution [20]. In [21] the nonclassical correlation between an up-converted photon and a reference photon was verified.…”
mentioning
confidence: 99%
“…We thus go beyond single-photon conversion [19][20][21]. With appropriate input states our setup is able to up-convert superpositions of coherent states with negative Wigner functions [5,6] as well as Einstein-Podolsky-Rosen entangled states [3,4].…”
mentioning
confidence: 99%
“…From this viewpoint, the DPS protocol has been analyzed by Takesue et al (Takesue et al, 2005). In this section we show that the complexity of the DPS QKD protocol's security analysis can be decreased dramatically, using fast computational information geometric methods , (Gyongyosi & Imre, 2010a), (Nielsen et al, 2007), , (Nielsen & Nock, 2008a), (Nielsen & Nock, 2009).…”
Section: The Dps Qkd Protocolmentioning
confidence: 99%
“…QKD schemes were implemented over a 250 km long optical fiber, however these distances are still small compared to the distances in standard optical communication networks (Curty et al, 2008), (Inoue et al, 2003), (Honjo et al, 2004), (Kwiat et al, 2001), (Manderbach et al, 2007), (Takesue et al, 2005), (Stucki et al, 2009). The Six-state quantum cryptography protocol uses six polarization states to encode the logical bits in the qubits.…”
Section: Demonstration Of Qkdmentioning
confidence: 99%