2019
DOI: 10.1007/s10946-019-09793-5
|View full text |Cite
|
Sign up to set email alerts
|

Modular Quantum Key Distribution Setup for Research and Development Applications

Abstract: Quantum key distribution (QKD), ensuring the unconditional security of information, attracts a significant deal of interest. An important task is to design QKD systems as a platform for education as well as for research and development applications and fast prototyping new QKD protocols. Here we present a modular QKD setup driven by National Instruments (NI) cards with open source LabView code, open source Python code for post-processing procedures, and open source protocol for external applications. An import… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 52 publications
0
4
0
Order By: Relevance
“…Bob in turn randomly performs one of POVMs to distinguish the states in each set. Due to the basis reconciliation the acceptance rate of conclusive measurements (17) has to be multiplied by 1/2 for the 4+2 protocol.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Bob in turn randomly performs one of POVMs to distinguish the states in each set. Due to the basis reconciliation the acceptance rate of conclusive measurements (17) has to be multiplied by 1/2 for the 4+2 protocol.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, in our experimental setup we set 𝑡 = 65 dB as universal for 𝐿 50 km. We took the modular QKD platform for research and education [17,18] as a basis for our experimental setup. Component specifications not listed here, as well as automation of control and data acquisition, are described in [18].…”
Section: Protocol Parameter Optimizationmentioning
confidence: 99%
“…V. E. Rodimin et al [ 15 ] implemented the decoy-state protocol for secure long-distance quantum communications. The authors used Python code for post-processing procedures, and external applications are implemented using the open-source protocol.…”
Section: Related Workmentioning
confidence: 99%
“…We use a two-pass auto compensation QKD plug&play scheme, which is based on the modular QKD platform for research and education [28,29]. It operates on the basis of the original BB84 protocol [1] with or without decoy states [31,32].…”
Section: Appendix A: Qkd Setupmentioning
confidence: 99%