# Two-dimensional distributed-phase-reference protocol for quantum key distribution

@article{Bacco2016TwodimensionalDP, title={Two-dimensional distributed-phase-reference protocol for quantum key distribution}, author={Davide Bacco and Jesper B. Christensen and Mario A. Usuga Castaneda and Yunhong Ding and S{\o}ren Forchhammer and Karsten Rottwitt and Leif Katsuo Oxenl{\o}we}, journal={Scientific Reports}, year={2016}, volume={6} }

Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the…

## 34 Citations

### Efficient Time-Bin Encoding for Practical High-Dimensional Quantum Key Distribution

- Physics, Computer SciencePhysical Review Applied
- 2020

This work presents a novel scheme for fiber-based 4-dimensional QKD, with time and phase encoding and one-decoy state technique, which allows to measure the 4- dimensional states with a simplified and compact receiver, where only two single-photon detectors are necessary, thus making it a cost-effective solution for practical and Fiber-based QK D.

### Round-robin differential-phase-shift quantum key distribution with twisted photons

- Computer Science, PhysicsPhysical Review A
- 2018

This scheme proposes and experimentally demonstrates an implementation of the RRDPS protocol using the photonic orbital angular momentum degree of freedom in dimensions $L=3$--8, 16, 32, and 64, and shows that Alice's generation stage and Bob's detection stage can each be reduced to a single phase element, greatly simplifying the implementation.

### High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform

- Computer ScienceQuantum Inf. Process.
- 2019

The inherent encoding framework provides a secure solution to key distribution, where the secret information can be hidden into the relative phases of the generated high-dimensional entangled state by performing the quantum Fourier transform and the quantum controlled-NOT gate.

### Fiber based high-dimensional quantum communication with twisted photons

- Physics
- 2018

Quantum communication (QC) concerns the faithful transmission of quantum states between separated parties, and represents a key enabler for many quantum applications, ranging from quantum key…

### Manipulating photon coherence to enhance the security of practical quantum key distribution

- Computer Science
- 2017

This work implements the first DPR QKD system based on the differential quadrature phase shift protocol, which is modulator-free, does not require active stabilization or a complex receiver, and also offers megabit per second key rates, almost three times higher than the standard Bennett-Brassard 1984 protocol.

### High-dimensional measurement-device-independent quantum key distribution on two-dimensional subspaces

- Computer Science, PhysicsPhysical Review A
- 2018

It is shown that high-dimensional (Hi-D) encoding (qudits) improves the performance of current mdi-QKD implementations and shows an improvement in the key generation rate.

### Experimental DPTS protocol over 170 km fiber-based link

- Computer Science, Physics
- 2017

A new two-dimensional differential phase-time shifting QKD protocol, in which the information is encoded in the time and relative phase of weak coherent pulses, which is highly practical and simple in its implementation and demonstrates the robustness of this scheme by transmitting the quantum signal over 170 km single-mode fiber with tolerable QBER.

### A two-dimensional quantum key distribution protocol based on polarization-phase encoding

- Computer Science, PhysicsInternational Journal of Quantum Information
- 2019

A new quantum key distribution protocol, which is referred to as polarization-phase (PoP) protocol, in this protocol, two degrees of photonic freedom of the same particle are allowed.

### Round-Robin Differential Phase-Time-Shifting Protocol for Quantum Key Distribution: Theory and Experiment

- Computer SciencePhysical Review Applied
- 2021

A new version of this so-called round-robin differential phase-shifting (RRDPS) protocol, in which both time and phase degrees-of-freedom are utilized to enlarge the Hilbert space dimensionality, without increasing experimental complexity or relaxing security assumptions is proposed.

### A direct GHz-clocked phase and intensity modulated transmitter applied to quantum key distribution

- Computer ScienceQuantum Science and Technology
- 2018

A direct-modulation based transmitter is demonstrated that can be used to implement most weak coherent pulse-based QKD protocols with simple changes to the driving signals, giving megabit per second secure key rates, 1.60 times higher than if purely phase-encoded BB84 was used.

## References

SHOWING 1-10 OF 49 REFERENCES

### The security of practical quantum key distribution

- Computer Science
- 2009

Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).

### Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography

- Computer Science, Mathematics
- 2008

New upper bounds for the differential-phase-shift and the coherent-one-way security are presented in the limit of large distances by considering a large class of collective attacks, namely those in which the adversary attaches ancillary quantum systems to each pulse or to each pair of pulses.

### A quantum access network

- Computer ScienceNature
- 2013

It is shown that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network.

### Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack

- Physics
- 2005

A photon-number-splitting (PNS) attack against differential-phase-shift (DPS) quantum key distribution (QKD) is described. In the conventional 1984 Bennett-Brassard protocol, using weak laser light,…

### Experimental quantum key distribution with finite-key security analysis for noisy channels.

- Computer ScienceNature communications
- 2013

This work demonstrates experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds, and indicates that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

### Towards practical and fast Quantum Cryptography

- Computer Science, Physics
- 2004

A new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses, using an interferometer built on an additional monitoring line to monitor the presence of a spy.

### Experimental demonstration of a quantum key distribution without signal disturbance monitoring

- Computer Science
- 2015

The first active implementation of the round-robin differential phase shift protocol is presented, in which monitoring of the signal disturbance is unnecessary, and the feasibility of the RRDPS protocol is confirmed, particularly in high-error situations.

### Practical quantum key distribution protocol without monitoring signal disturbance

- Computer ScienceNature
- 2014

It is found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers and has a better tolerance of bit errors and of finite-sized-key effects.

### Fast and simple one-way quantum key distribution

- Physics, Computer Science
- 2005

A new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate, featuring a high efficiency in terms of distilled secret bit per qubit.

### Field test of quantum key distribution in the Tokyo QKD Network.

- Computer Science, PhysicsOptics express
- 2011

Two GHz-clocked QKD links enable the world-first secure TV conferencing over a distance of 45km to be demonstrated and detection of an eavesdropper, rerouting into a secure path, and key relay via trusted nodes are demonstrated in this network.