Field test of quantum key distribution in the Tokyo QKD Network.

@article{Sasaki2011FieldTO,
  title={Field test of quantum key distribution in the Tokyo QKD Network.},
  author={Masahide Sasaki and Mikio Fujiwara and Hirokazu Ishizuka and W. Klaus and Kentaro Wakui and Masahiro Takeoka and Shigehito Miki and Taro Yamashita and Z. Wang and Akihiro Tanaka and Ken-ichiro Yoshino and Yoshihiro Nambu and S. Takahashi and Akio Tajima and Akihisa Tomita and Tomoyasu Domeki and T. Hasegawa and Y. Sakai and H. Kobayashi and T. Asai and Kaoru Shimizu and Toshiyuki Tokura and Toyohiro Tsurumaru and Mitsuru Matsui and Toshimori Honjo and Kiyoshi Tamaki and Hiroki Takesue and Yasuhiro Tokura and James F. Dynes and Alexander R. Dixon and A. W. Sharpe and Z. L. Yuan and Andrew J. Shields and Shuichi Uchikoga and Matthieu Legre and S Robyr and Patrick Trinkler and Laurent Monat and J-B Page and Gregoire Ribordy and Andreas Poppe and Andreas Allacher and Oliver Maurhart and Thomas L{\"a}nger and Momtchil Peev and Anton Zeilinger},
  journal={Optics express},
  year={2011},
  volume={19 11},
  pages={
          10387-409
        }
}
A secure communication network with quantum key distribution in a metropolitan area is reported. Six different QKD systems are integrated into a mesh-type network. GHz-clocked QKD links enable us to demonstrate the world-first secure TV conferencing over a distance of 45km. The network includes a commercial QKD product for long-term stable operation, and application interface to secure mobile phones. Detection of an eavesdropper, rerouting into a secure path, and key relay via trusted nodes are… 

Quantum Key Distribution and Its Applications

  • M. Sasaki
  • Computer Science
    IEEE Security & Privacy
  • 2018
An overview of the recent status of quantum key distribution is given, which shows that QKD networks are now deployed in metropolitan areas, and continental-scale QKd networks have been constructed.

Measurement-device-independent quantum key distribution over untrustful metropolitan network

This work constructs a measurement-device-independent quantum key distribution (MDIQKD) network in a star topology over a 200 square kilometers metropolitan area, which is secure against untrustful relays and against all detection attacks.

Software defined quantum key distribution network

This paper introduces the design of the architecture and critical modules for the software defined quantum key distribution network (SQN), and shows that SQN can efficiently reduce the secure key consumption and improve the availability and performance of QKD network.

Open-Destination Measurement-Device-Independent Quantum Key Distribution Network

This work proposes a flexible and extensible scheme named as open-destination measurement-device-independent QKD network, which enjoys security against untrusted relays and all detector side-channel attacks.

Optimizing the deployment of quantum key distribution switch-based networks.

This work presents a QKKD network architecture that provides a significant reduction in the cost of deploying QKD networks by using optical switches and reducing the number ofQKD receiver devices, which use single-photon detectors.

Implementation of a 46-node quantum metropolitan area network

This work presents a field operation of a quantum metropolitan-area network with 46 nodes and realizes different topological structures and continuously run the network for 31 months, by employing standard equipment for network maintenance with an extendable configuration.

Quantum Key Distribution-bootstrapped Authentication for Secure Communication of Distributed Energy Resources

In this work, the first quantum key-bootstrapped authentication for smart grid communications on an electric utility fiber network is demonstrated. The developed method was prototyped in a software

Large scale quantum key distribution: challenges and solutions [Invited].

A brief review on the experimental efforts towards the goal of global quantum key distribution, including the security of practical QKD with imperfect devices,QKD metropolitan and backbone networks over optical fiber and satellite-based QKKD over free space.

Secure Key Throughput of Intermittent Trusted-Relay QKD Protocols

It is shown that the secret key rate is not the most important figure of merit in the design of QKD protocols with intermittent relays, despite its importance for standardQKD links.

Quantum key distribution network for multiple applications

The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes
...

References

SHOWING 1-10 OF 57 REFERENCES

The security of practical quantum key distribution

Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).

Field test of wavelength-saving quantum key distribution network.

A wavelength-saving topology of a quantum key distribution (QKD) network based on passive optical elements is proposed, and the field test of this network on commercial telecom optical fiber at the frequency of 20 MHz is reported.

Realizing long-term quantum cryptography

An overview of practical implementations of quantum networks and the first set of results from the live data encryption of the QuantumCity project, which intends to develop a multi-user quantum communication network that is currently overlaid on the fiber infrastructure of the eThekwini Municipality.

Deploying QKD in Standard Optical Networks

This poster reports on the findings studying the problems arising when integrating QKD systems in standard telecommunications networks.

Phase-Remapping Attack in Practical Quantum Key Distribution Systems

A phase-remapping attack targeting two practical bidirectional QKD systems showing that if the users of the systems are unaware of the attack, the final key shared between them can be compromised in some situations, and that the attack is feasible with only current technology.

Experimental quantum key distribution with decoy states.

By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber.

Decoy state quantum key distribution.

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

Breaking a quantum key distribution system through a timing side channel.

It is experimentally demonstrated how, in some implementations, timing information revealed during public discussion between the communicating parties can be used by an eavesdropper to undetectably access a significant portion of the "secret" key.

The SECOQC quantum key distribution network in Vienna

The paper presents the architecture and functionality of the principal networking agent—the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network, and realizes end-to-end secure transport of key material between these destinations.

A fully automated entanglement-based quantum cryptography system for telecom fiber networks

A quantum key distribution (QKD) system based on polarization entanglement for use in telecom fibers that is compact and portable with a fully automated start-up, and stabilization modules for polarization, synchronization and photon coupling allow hands-off operation.
...