-
Practical long-distance quantum key distribution system using decoy levels
Authors:
D. Rosenberg,
C. G. Peterson,
J. W. Harrington,
P. R. Rice,
N. Dallmann,
K. T. Tyagi,
K. P. McCabe,
S. Nam,
B. Baek,
R. H. Hadfield,
R. J. Hughes,
J. E. Nordholt
Abstract:
Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully automated, robust QKD system based on t…
▽ More
Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully automated, robust QKD system based on the Bennett Brassard 1984 protocol (BB84) with low-noise superconducting nanowire single-photon detectors (SNSPDs) and decoy levels. Secret key is produced with unconditional security over a record 144.3 km of optical fibre, an increase of more than a factor of five compared to the previous record for unconditionally secure key generation in a practical QKD system.
△ Less
Submitted 18 June, 2008;
originally announced June 2008.
-
Long distance decoy state quantum key distribution in optical fiber
Authors:
Danna Rosenberg,
Jim W. Harrington,
Patrick R. Rice,
Philip A. Hiskett,
Charles G. Peterson,
Richard J. Hughes,
Adriana E. Lita,
Sae Woo Nam,
Jane E. Nordholt
Abstract:
The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian appro…
▽ More
The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian approximations in a one-way QKD system, enabling the creation of secure keys immune to photon-number-splitting attacks and highly resistant to Trojan horse attacks over 107 km of optical fiber.
△ Less
Submitted 2 May, 2007; v1 submitted 26 July, 2006;
originally announced July 2006.
-
Enhancing practical security of quantum key distribution with a few decoy states
Authors:
Jim W. Harrington,
J. Mark Ettinger,
Richard J. Hughes,
Jane E. Nordholt
Abstract:
Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an eavesdropper, but the decoy state method can detect this attack with current technology, yielding a high rate of secret bits. In this Letter, we develop rigorous security statements in the case of finite sta…
▽ More
Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an eavesdropper, but the decoy state method can detect this attack with current technology, yielding a high rate of secret bits. In this Letter, we develop rigorous security statements in the case of finite statistics with only a few decoy states, and we present the results of simulations of an experimental setup of a decoy state protocol that can be simply realized with current technology.
△ Less
Submitted 1 March, 2005;
originally announced March 2005.