2019
DOI: 10.1140/epjqt/s40507-019-0075-x
|View full text |Cite
|
Sign up to set email alerts
|

Field trial of a three-state quantum key distribution scheme in the Florence metropolitan area

Abstract: In-field demonstrations in real-world scenarios boost the development of a rising technology towards its integration in existing infrastructures. Although quantum key distribution (QKD) devices are already adopted outside the laboratories, current field implementations still suffer from high costs and low performances, preventing this emerging technology from a large-scale deployment in telecommunication networks. Here we present a simple, practical and efficient QKD scheme with finite-key analysis, performed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
37
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 55 publications
(39 citation statements)
references
References 28 publications
0
37
0
Order By: Relevance
“…The temporal synchronization is achieved using the Qubit4Sync algorithm [21]. This implies that the two parties do not need a shared clock reference such as a pulsed laser [4,5,19]. Alice's clock is recovered by Bob only using the time-of-arrival of qubits while the absolute time is recovered by sending an initial public string encoded in the first 10 6 states of the QKD transmission.…”
Section: B Receivermentioning
confidence: 99%
See 2 more Smart Citations
“…The temporal synchronization is achieved using the Qubit4Sync algorithm [21]. This implies that the two parties do not need a shared clock reference such as a pulsed laser [4,5,19]. Alice's clock is recovered by Bob only using the time-of-arrival of qubits while the absolute time is recovered by sending an initial public string encoded in the first 10 6 states of the QKD transmission.…”
Section: B Receivermentioning
confidence: 99%
“…QKD is characterized by a consolidated composable security framework [1,2] and by rapid and continuous technical advancements [3]. In fact, several QKD field trials are being performed to demonstrate the real-world applicability of this technology [4][5][6][7] and several start-ups and university spin-offs are being created to intercept the growing market demands.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Nowadays, a topological quantum cryptography is the most secure cryptography concept with the highest impact on computer security, business, and society, but it is rarely used in biology. Experimental quantum cryptography narrows the gap and it approaches the implementation of theoretical knowledge outside the laboratories, e.g., by the investigation of quantum key distribution with finite decoy states [13,14].…”
Section: Introductionmentioning
confidence: 99%
“…Common-clock very long baseline interferometry using a coherent optical fiber link The transmission of optical signals with an ultrastable, well-known frequency using optical fibers dates back to the '90s, when specific techniques were first developed to cancel the effect of mechanical fiber noise on the optical phase [1,2]. This redesigned the experimental practice in fundamental frequency metrology, allowing the comparison of distant atomic clocks at their ultimate accuracy over increasingly longer distances [3][4][5][6][7][8][9], and other unprecedented experiments in high-resolution atomic [10][11][12] and molecular physics [13][14][15], relativistic geodesy [9], quantum communication [16,17], and even seismology, for what concerns the detection of underwater earthquakes in seas and oceans [18]. The need of distributing frequency reference signals between distant sites without deterioration arose even before in radio astronomy and geodesy, for deep-space communication and tracking [19] and the synchronization of radio telescope arrays.…”
mentioning
confidence: 99%