## A Real-Time QKD System Based on FPGA

Journal of Lightwave Technology, Vol. 30, Issue 20, pp. 3226-3234 (2012)

Acrobat PDF (1182 KB)

### Abstract

A real-time quantum key distribution (QKD) system is developed in this paper. In the system, based on the feature of a field-programmable gate array, secure key extraction control and algorithm have been optimally designed to perform sifting, error correction, and privacy amplification altogether in real time. In the QKD experiment, information synchronization mechanism and high-speed classic data channel are designed to ensure the steady operation of the system. Decoy state and synchronous laser light source are used in the system, while the length of optical fiber between Alice and Bob is 20 km. With photons repetition frequency of 20 MHz, the final key rate could reach 17 kb/s. Smooth and robust operation is verified with 6 h continuous test and associated with encrypted voice communication test.

© 2012 IEEE

**Citation**

Hong-Fei Zhang, Jian Wang, Ke Cui, Chun-Li Luo, Sheng-Zhao Lin, Lei Zhou, Hao Liang, Teng-Yun Chen, Kai Chen, and Jian-Wei Pan, "A Real-Time QKD System Based on FPGA," J. Lightwave Technol. **30**, 3226-3234 (2012)

http://www.opticsinfobase.org/jlt/abstract.cfm?URI=jlt-30-20-3226

Sort: Year | Journal | Reset

### References

- C. H. Bennett, G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," Proc. IEEE Int. Conf. Comput., Syst., Signal Process. (1984) pp. 175-179.
- C. H. Bennett, "Quantum cryptography using any two states," Phys. Rev. Lett. 68, 3121-3124 (1992).
- A. Ekert, "Quantum cryptography based on Bell theorem," Phys. Rev. Lett. 67, 661-663 (1991).
- P. W. Shor, J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Phys. Rev. Lett. 85, 441-444 (2000).
- W. Y. Hwang, "Quantum key distribution with high loss: Toward global secure communication," Phys. Rev. Lett. 91, 057901-057904 (2003).
- H. K. Lo, X. F. Ma, K. Chen, "Decoy state quantum key distribution," Phys. Rev. Lett. 94, 230504-1-230504-4 (2005).
- X. B. Wang, "Decoy-state protocol for quantum cryptography with four different intensities of coherent light," Phys. Rev. A 72, 012322-1-012322-6 (2005).
- T. Y. Chen, H. Liang, Y. Liu, W. Q. Cai, L. Ju, W. Y. Liu, J. Wang, H. Yin, K. Chen, Z. B. Chen, C. Z. Peng, J. W. Pan, "Field test of a practical secure communication network with decoy-state quantum cryptography," Opt. Exp. 17, 6540-6549 (2009).
- T. Y. Chen, J. Wang, H. Liang, W. Y. Liu, Y. Liu, X. Jiang, Y. Wang, X. Wan, W. Q. Cai, L. Ju, L. K. Chen, L. J. Wang, Y. Gao, K. Chen, C. Z. Peng, Z. B. Chen, J. W. Pan, "Metropolitan all-pass and inter-city quantum communication network," Opt. Exp. 18, 27217-27225 (2010).
- C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin, "Experimental quantum cryptography," J. Cryptogr. 5, 3-28 (1992).
- N. Gisin, G. Ribordy, W. Tittel, H. Zbinden, "Quantum cryptography," Rev. Mod. Phys. 74, 145-190 (2002).
- G. Brassard, L. Salvail, "Secret-key reconciliation by public discussion," Proc. Adv. Cryptogr.â€”Eurocrypt (1994) pp. 410-423.
- C. H. Bennett, G. Brassard, C. Crepeau, U. M. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory 41, 1915-1923 (1995).
- J. Wang, X. Wan, H. F. Zhang, "Design of FPGA and USB based control board for quantum random number generator," Optoelectron. Lett. 5, 380-382 (2009).
- H. F. Zhang, J. Wang, C. Luo, K. Cui, Z. Yao, H. Liang, G. Jin, "Development of a high speed true random number generator based on jitter," Nuclear Tech. 34, 556-560 (2011) (Chinese).
- X. Wan, K. Cui, Y. Gao, H.-F. Zhang, C.-L. Luo, J. Wang, "Design of high-precision synchronization in quantum key distribution system," Chin. J. Quantum Electron. 28, 324-328 (2011) (in Chinese).
- W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson, G. H. Nickel, C. H. Donahue, C. G. Peterson, "Fast, efficient error reconciliation for quantum cryptography," Phys. Rev. A 67, 052303-1-052303-18 (2003).
- K. Cui, H. F. Zhang, "A real-time design based on FPGA for expeditious error reconciliation in QKD system," IEEE Trans. Inf. Forensics Security to be published.
- H. Krawczyk, "LFSR-based hashing and authentication," Proc. Adv. Cryptol.---CRYPTO (1994) pp. 129-139.
- K. Cui, "Design of process control in QKD system," Nuclear Electronics and Detection Technology to be published (in Chinese).

## Cited By |

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article | Next Article »

OSA is a member of CrossRef.