Interference between independent photonic integrated devices for quantum key distribution.
@article{Semenenko2019InterferenceBI,
title={Interference between independent photonic integrated devices for quantum key distribution.},
author={Henry Semenenko and Philip Sibson and Mark G. Thompson and Chris Erven},
journal={Optics letters},
year={2019},
volume={44 2},
pages={
275-278
}
}Advances in quantum computing are a rapidly growing threat towards modern cryptography. Quantum key distribution (QKD) provides long-term security without assuming the computational power of an adversary. However, inconsistencies between theory and experiment have raised questions in terms of real-world security, while large and power-hungry commercial systems have slowed wide-scale adoption. Measurement-device-independent QKD (MDI-QKD) provides a method of sharing secret keys that removes all…
17 Citations
Boosting the secret key rate in a shared quantum and classical fibre communication system
- Computer ScienceCommunications Physics
- 2019
Exploiting the concept of space division multiplexing in a 37-cores multicore fibre, this work demonstrates efficient secret key generation and high compatibility with classical communication.
Chip-based measurement-device-independent quantum key distribution
- Computer Science
- 2019
This work demonstrates a network topology that allows secure equipment sharing which is accessible with a cost-effective transmitter, significantly reducing the barrier for widespread uptake of quantum-secured communication.
Hong-Ou-Mandel interference between independent III-V on silicon waveguide integrated lasers.
- PhysicsOptics letters
- 2019
The experimental observation of Hong-Ou-Mandel interference with 46±2% visibility between WCPs generated by two independent III-V on silicon waveguide integrated lasers is reported, representing a substantial first step towards an implementation of MDI-QKD fully integrated in silicon.
Advances in Silicon Quantum Photonics
- PhysicsIEEE Journal of Selected Topics in Quantum Electronics
- 2021
The aim is the development of scalability on the platform, to point the way to ever-closer integration, toward silicon quantum photonic systems-on-a-chip.
Integrated photonic quantum technologies
- PhysicsNature Photonics
- 2019
This Review summarizes the advances in integrated photonic quantum technologies and its demonstrated applications, including quantum communications, simulations of quantum chemical and physical systems, sampling algorithms, and linear-optic quantum information processing.
Chip-based quantum communications
- PhysicsJournal of Semiconductors
- 2021
Quantum communications aim to share encryption keys between the transmitters and receivers governed by the laws of quantum mechanics. Integrated quantum photonics offers significant advantages of…
Hong–Ou–Mandel interference of two independent continuous-wave coherent photons
- Physics
- 2020
Interference between two completely independent photons lies at the heart of many photonic quantum information applications such as quantum repeaters, teleportation, and quantum key distribution.…
Two-photon interferences of weak coherent lights
- PhysicsScientific reports
- 2021
This study experimentally examined the Hong–Ou–Mandel-type TPI of phase-randomized weak coherent pulses to compare the TPI effect with that of correlated photons and quantitatively analyzed the results in terms of the single- and coincidence-counting rates and one- and two-photon interference-fringe shapes.
Two-Photon Interferences of Weak Coherent Lights
- Physics
- 2021
Multiphoton interference is an important phenomenon in modern quantum mechanics and experimental quantum optics, and it is fundamental for the development of quantum information science and…
Multi-secret Sharing Model based on Hermite Interpolation Polynomial and Quantum Graph State
- Computer Science
- 2020
The Hermite interpolation polynomial combined with the idea of homomorphic cryptography is used to construct a multi-secret sharing model based on quantum graph theory that can effectively resist external interception, replay, entanglement, tampering attacks and internal forgery, impersonation, deception and collusion attacks.
References
SHOWING 1-10 OF 43 REFERENCES
Chip-based quantum key distribution
- Computer ScienceNature communications
- 2017
This work reports low error rate, GHz clocked QKD operation of an indium phosphide transmitter chip and a silicon oxynitride receiver chip—monolithically integrated devices using components and manufacturing processes from the telecommunications industry for large-scale deployment of quantum key distribution into future telecommunications networks.
Measurement-device-independent quantum key distribution.
- PhysicsPhysical review letters
- 2012
The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors, and the key generation rate is many orders of magnitude higher than that based on full device independent QKD.
Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks.
- PhysicsPhysical review letters
- 2013
The first proof-of-principle implementation of a new quantum-key-distribution protocol that is immune to any such attack is reported, and the feasibility of controlled two-photon interference in a real-world environment is established.
Hong-Ou-Mandel interference between independent III-V on silicon waveguide integrated lasers.
- PhysicsOptics letters
- 2019
The experimental observation of Hong-Ou-Mandel interference with 46±2% visibility between WCPs generated by two independent III-V on silicon waveguide integrated lasers is reported, representing a substantial first step towards an implementation of MDI-QKD fully integrated in silicon.
Practical aspects of measurement-device-independent quantum key distribution
- Computer Science
- 2013
It is found that MDI-QKD is highly practical and thus can be easily implemented with standard optical devices, and a simple analytical method with only two decoy states for the finite decoy-state analysis is presented.
Interference of short optical pulses from independent gain-switched laser diodes for quantum secure communications
- Physics
- 2014
High-visibility interference is demonstrated from two independent GS lasers triggered at 1GHz to achieve high-speed measurement-device-independent-QKD, a scheme that promises long-haul quantum communications immune to all detector attacks.
Experimental demonstration of time-shift attack against practical quantum key distribution systems
- Physics
- 2007
This result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability $(\ensuremath{\sim}4%)$ to break the security of the system.
Decoy state quantum key distribution.
- Physics, Computer SciencePhysical review letters
- 2005
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Effects of detector efficiency mismatch on security of quantum cryptosystems
- Physics, Computer Science
- 2006
For the Bennett-Brassard 1984 (BB84) protocol, it is shown that if the efficiency mismatch between 0 and 1 detectors for some value of the control parameter gets large enough, Eve can construct a successful faked-states attack causing a quantum bit error rate lower than 11%.
Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors
- Computer Science
- 2013
General formulas for the decoy-state method for two-pulse sources with 3 different states are presented, which can be applied to the recently proposed MDIQKD with imperfect single-photon source such as the coherent states or the heralded states from the parametric down conversion.



