Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Practical quantum key distribution with polarization entangled photons

Open Access Open Access

Abstract

We present an entangled-state quantum cryptography system that operated for the first time in a real-world application scenario. The full key generation protocol was performed in real-time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. The generated quantum key was immediately handed over and used by a secure communication application.

©2004 Optical Society of America

Full Article  |  PDF Article
More Like This
Long-distance practical quantum key distribution by entanglement swapping

Artur Scherer, Barry C. Sanders, and Wolfgang Tittel
Opt. Express 19(4) 3004-3018 (2011)

Field test of a practical secure communication network with decoy-state quantum cryptography

Teng-Yun Chen, Hao Liang, Yang Liu, Wen-Qi Cai, Lei Ju, Wei-Yue Liu, Jian Wang, Hao Yin, Kai Chen, Zeng-Bing Chen, Cheng-Zhi Peng, and Jian-Wei Pan
Opt. Express 17(8) 6540-6549 (2009)

Entanglement-based quantum key distribution with biased basis choice via free space

Yuan Cao, Hao Liang, Juan Yin, Hai-Lin Yong, Fei Zhou, Yu-Ping Wu, Ji-Gang Ren, Yu-Huai Li, Ge-Sheng Pan, Tao Yang, Xiongfeng Ma, Cheng-Zhi Peng, and Jian-Wei Pan
Opt. Express 21(22) 27260-27268 (2013)

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (3)

Fig. 1.
Fig. 1. A quantum cryptography system is installed between the headquarters of a large bank (Alice) and the Vienna City Hall (Bob). The beeline distance between the two buildings is about 650m. The optical fibers were installed some weeks before the experiment in the Vienna sewage system and have a total length of 1.45 km.
Fig. 2.
Fig. 2. Sketch of the experimental setup. At the entangled state source a nonlinear BBO-crystal is pumped by a violet laser diode (LD) at 405nm and produces polarization-entangled photon pairs. Walk-off effects are compensated by the half-wave-plate (HWP) and the compensation crystals (BBO/2). One of the photons is locally analyzed in Alice’s detection module, while the other is sent over a 1.45 km long single-mode optical fiber (SMF) to the remote site (Bob). Polarization measurement is done in one of two bases (0° and 45°), by using a beam splitter (BS) which randomly sends incident photons to one of two polarizing beam splitters (PBS). One of the PBS is defined for measurement in the 0° basis, and the other in the 45° basis as the half wave plate (HWP) rotates the polarization by 45°. The final detection of the photons is done by passively quenched silicon avalanche photodiodes (APD). Once a photon is detected at one of Alice’s four avalanche photodiodes an optical trigger pulse is created (Sync. Laser) and sent over a standard telecommunication fiber to Bob to establish a common time basis. At both sites, the trigger pulses and the detection events from the APDs are fed into a dedicated quantum key generation device (QKD Electronics) for further processing. This QKD electronic is an embedded system, which is capable of autonomously running the classical protocol necessary for key generation via a standard TCP/IP connection.
Fig. 3.
Fig. 3. Results obtained during 18 minutes of the running experiment. That time was used to acquire 100 blocks of raw data that each consist of approximately 2500 bits after sifting. The blocks in this graph have been sorted by the estimated QBER and are not represented in the order of their acquisition. Each key block was further processed by the full quantum cryptography software. (a) Estimated QBER for the individual blocks and the real QBER determined by directly comparing the sifted key of each data block. This calculation was only done for evaluation of the system and is obviously not possible for a real key exchange. Additionally one can see the time it took to acquire the raw data of the given block. (b) The length of the final key, the number of bits disclosed by CASCADE and the number of bits discarded in privacy amplification. (c) The final secure bit rate produced by our system.
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.