Unconditionally secure quantum key distribution over 50 km of standard telecom fibre

@article{Gobby2004UnconditionallySQ,
  title={Unconditionally secure quantum key distribution over 50 km of standard telecom fibre},
  author={C. Gobby and Z. L. Yuan and Andrew J. Shields},
  journal={Electronics Letters},
  year={2004},
  volume={40},
  pages={1603-1605}
}
A weak pulse quantum key distribution system is presented, which is secure against all individual attacks, including photon number splitting. By carefully controlling the weak pulse intensity the maximum secure bit rate as a function of the fibre length is demonstrated. Unconditionally secure keys can be formed for standard telecom fibres exceeding 50 km in length. 
Decoy pulse quantum key distribution for practical purposes
TLDR
The random bits from the secure keys are found to pass stringent statistical tests and the decoy pulse protocol employed uses two weak pulses (signal and decoy) and one vacuum pulse.
Practical quantum key distribution over 60 hours at an optical fiber distance of 20km using weak and vacuum decoy pulses for enhanced security.
TLDR
This work demonstrates an experimental one-way decoy pulse quantum key distribution running continuously for 60 hours over a fiber distance of 20km and obtains the highest rate reported using this decoy protocol over this fiber distance and duration.
Unconditionally secure one-way quantum key distribution using decoy pulses
Experimental one-way decoy quantum key distribution (QKD) is reported as a function of distance up to 25.3km. The high key rates obtained exceed one order of magnitude more than QKD performed without
Unconditionally secure one-way quantum key distribution using decoy pulses
Experimental one-way decoy quantum key distribution (QKD) is reported as a function of distance up to 25.3km. The high key rates obtained exceed one order of magnitude more than QKD performed without
Secure Communication with One Decoy State and Two Way Quantum Key Distribution Scheme
Quantum Key Distribution (QKD) provides a mean for unconditionally secure secret key sharing for secure communication. For a practical QKD system, the recently proposed decoy state protocol has
Fast and long-distance differential-phase-shift quantum key distribution
  • E. Diamanti, C. Langrock, +5 authors K. Inoue
  • Physics
    2006 Conference on Lasers and Electro-Optics and 2006 Quantum Electronics and Laser Science Conference
  • 2006
A differential-phase-shift quantum key distribution experiment employing up-conversion single-photon detectors is presented. We achieved a 1-Mbit/s sifted key rate over a 20-km optical fiber, and
Continuous operation of a one-way quantum key distribution system over installed telecom fibre.
TLDR
A robust, compact and automated quantum key distribution system, based upon a one-way Mach-Zender interferometer, which is actively compensated for temporal drifts in the photon phase and polarization is demonstrated, suggesting that actively compensated QKD systems are suitable for practical applications.
Long-distance quantum key distribution in optical fibre
Use of low-noise detectors can both increase the secret bit rate of long-distance quantum key distribution (QKD) and dramatically extend the length of a fibre optic link over which secure keys can be
Differential phase shift quantum key distribution experiment over 105 km fibre
We report a quantum key distribution experiment based on the differential phase shift keying (DPSK) protocol with a Poissonian photon source, in which secure keys were generated over >100 km fibre
100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors.
TLDR
A quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber using low timing jitter 1.55 microm single-photon detectors.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 10 REFERENCES
Quantum key distribution over 122 km of standard telecom fiber
We report a demonstration of quantum key distribution over a standard telecom fiber exceeding 100 km in length. Through careful optimization of the interferometer and single photon detector, we
Security against individual attacks for realistic quantum key distribution
I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84
Quantum key distribution over 67 km with a plug
We present a fibre-optical quantum key distribution system. It works at 1550nm and is based on the plug & play setup. We tested the stability under field conditions using aerial and terrestrial
Limitations on practical quantum cryptography
TLDR
It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength.
Secret-Key Reconciliation by Public Discussion
TLDR
A more efficient protocol is presented, which leaks an amount of information acceptably close to the minimum possible for sufficiently reliable secret channels (those with probability of any symbol being transmitted incorrectly as large as 15%).
An Update on Quantum Cryptography
TLDR
It is proved that no technology whatsoever, as well as no amount of computing power, could break some of the authors' schemes, as long as some of the most fundamental principles of quantum physics hold true.
al.:‘Quantum key distribution over 67 km with a plug & play system
  • New J. Phys.,
  • 2002
Generalized privacy amplification
This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard and Robert (1988) for a special scenario. The results have
‘ Secretkey reconciliation by public discussion ’ , Lect
  • Notes Comp . Sci .
  • 1994
Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing
  • Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing
  • 1984