Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
The SECOQC quantum key distribution network in Vienna
The paper presents the architecture and functionality of the principal networking agent?the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network, and realizes end-to-end secure transport of key material between these destinations.
10-Mb/s Quantum Key Distribution
The first quantum-key-distribution (QKD) systems capable of delivering sustainable, real-time secure keys continuously at rates exceeding 10 Mb/s are reported, and the robustness and long-term stability on a second QKD system continuously running for 1 month without any user invention is confirmed.
Practical challenges in quantum key distribution
Before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security, according to a survey of key challenges.
Electrically Driven Single-Photon Source
Electroluminescence from a single quantum dot within the intrinsic region of a p-i-n junction is shown to act as an electrically driven single-photon source for applications in quantum information technology.
A quantum access network
- B. Fröhlich, J. Dynes, Marco Lucamarini, A. Sharpe, Zhiliang Yuan, A. Shields
- Computer ScienceNature
- 5 September 2013
It is shown that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network.
Gigahertz-gated InGaAs/InP single-photon detector with detection efficiency exceeding 55% at 1550 nm
We report on a gated single-photon detector based on InGaAs/InP avalanche photodiodes (APDs) with a single-photon detection efficiency exceeding 55% at 1550 nm. Our detector is gated at 1 GHz and…
Practical security bounds against the Trojan-horse attack in quantum key distribution
- Marco Lucamarini, I. Choi, M. Ward, J. Dynes, Zhiliang Yuan, A. Shields
- Physics, Computer Science
- 5 June 2015
The Trojan-horse attack is turned into an information leakage problem and the system security is quantified and related to the specification of the optical elements most relevant to security.
Unconditionally secure one-way quantum key distribution using decoy pulses
Experimental one-way decoy quantum key distribution (QKD) is reported as a function of distance up to 25.3km. The high key rates obtained exceed one order of magnitude more than QKD performed without…
Key to the quantum industry
As theories go, quantum mechanics has certainly been successful. Despite its many counterintuitive predictions, it has provided an accurate description of the atomic world for more than 80 years. It…
Experimental quantum key distribution beyond the repeaterless secret key capacity
The key rate overcomes the repeaterless secret key capacity bound limit at channel losses of 85 dB, corresponding to 530 km of ultralow-loss optical fibre, and represents a major step in promoting quantum communications as a dependable resource in today's world.