OSA's Digital Library

Optics Express

Optics Express

  • Editor: Michael Duncan
  • Vol. 12, Iss. 16 — Aug. 9, 2004
  • pp: 3865–3871

Practical quantum key distribution with polarization entangled photons

A. Poppe, A. Fedrizzi, R. Ursin, H. R. Böhm, T. Lorünser, O. Maurhardt, M. Peev, M. Suda, C. Kurtsiefer, H. Weinfurter, T. Jennewein, and A. Zeilinger  »View Author Affiliations

Optics Express, Vol. 12, Issue 16, pp. 3865-3871 (2004)

View Full Text Article

Enhanced HTML    Acrobat PDF (313 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



We present an entangled-state quantum cryptography system that operated for the first time in a real-world application scenario. The full key generation protocol was performed in real-time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. The generated quantum key was immediately handed over and used by a secure communication application.

© 2004 Optical Society of America

OCIS Codes
(030.5260) Coherence and statistical optics : Photon counting
(060.4510) Fiber optics and optical communications : Optical communications

ToC Category:
Research Papers

Original Manuscript: June 8, 2004
Revised Manuscript: August 3, 2004
Published: August 9, 2004

A. Poppe, A. Fedrizzi, R. Ursin, H. Böhm, T. Lörunser, O. Maurhardt, M. Peev, M. Suda, C. Kurtsiefer, H. Weinfurter, T. Jennewein, and A. Zeilinger, "Practical quantum key distribution with polarization entangled photons," Opt. Express 12, 3865-3871 (2004)

Sort:  Journal  |  Reset  


  1. N. Gisin, G. Ribordy,W. Tittel, and H. Zbinden, ???Quantum Cryptography,??? Rev. Mod. Phys. 74, 145???195 (2002). [CrossRef]
  2. idQuantique SA (Geneve, Switzerland), <a href="http://www.idquantique.com/.">http://www.idquantique.com/</a>
  3. magiq technologies (Sommerville, USA), <a href="http://www.magiqtech.com/.">http://www.magiqtech.com/</a>
  4. NEC Ltd.(Tokyo, Japan), <a href="http://www.nec.com/.">http://www.nec.com/</a>
  5. J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, C. W. Clark, and C. J. Williams, ???Quantum key distribution with 1.25 Gbps clock synchronization,??? Opt. Express 12, 2011???2017 (2004). [CrossRef] [PubMed]
  6. C. Bennett and G. Brassard, ???Quantum Cryptography: public key distribution and coin tossing,??? in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing(Bangalore, India, 1984), pp. 175???179. [PubMed]
  7. N. Lütkenhaus, ???Estimates for practical quantum cryptography,??? Phys. Rev. A 59, 3301???3319 (1999). [CrossRef]
  8. H. Inamori, N. Lütkenhaus, and D. Mayers, ???Unconditional security of practical quantum key distribution,??? quant-ph/0107017 (2001).
  9. A. K. Ekert, ???Quantum cryptography based on Bell???s theorem,??? Phys. Rev. Lett. 67, 661???663 (1991). [CrossRef] [PubMed]
  10. N. Lütkenhaus, ???Security against individual attacks for realistic quantum key distribution,??? Phys. Rev. A 61, 052304 (2000). [CrossRef]
  11. G. S. Vernam, ???Cipher printing telegraph systems for secret wire and radio,??? J. Amer. Inst. Elect. Eng. 55, 109???115 (1926).
  12. T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, ???Quantum cryptography with entangled photons,??? Phys. Rev. Lett. 84, 4729???4732 (2000). [CrossRef] [PubMed]
  13. D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat, ???Entangled state quantum cryptography: eavesdropping on the Ekert protocol,??? Phys. Rev. Lett. 84, 4733???4736 (2000). [CrossRef] [PubMed]
  14. W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, ???Quantum cryptography using entangled photons in energy-time Bell states,??? Phys. Rev. Lett. 84, 4737???4740 (2000). [CrossRef] [PubMed]
  15. H. Böhm, ???A compact source for polarization entangled photon pairs,??? Master???s thesis, Vienna University of Technology (2003).
  16. M. Aspelmeyer, H. R. Böhm, T. Gyatso, T. Jennewein, R. Kaltenbaek, M. Lindenthal, G. Molina-Terriza, A. Poppe, K. Resch, M. Taraba, R. Ursin, P. Walther, and A. Zeilinger, ???Long-distance free-space distribution of quantum entanglement,??? Science 301, 621???623 (2003). [CrossRef] [PubMed]
  17. P. Trojek, C. Schmid, M. Bourennane, H. Weinfurter, and C. Kurtsiefer, ???Compact source of polarization-entangled photon,??? Opt. Express 12, 276???281 (2004). [CrossRef] [PubMed]
  18. S. Wiesner, ???Conjugate Coding,??? submitted to IEEE Information Theory (ca. 1970) Later published in Sigact News 15(1), 78???88 (1983).
  19. P. G. Kwiat, K. Mattle, H. Weinfurter, and A. Zeilinger, ???New high-intensity source of polarization-entangled photon pairs,??? Phys. Rev. Lett. 75, 4337???4341 (1995). [CrossRef] [PubMed]
  20. C. Kurtsiefer, M. Oberparleiter, and H. Weinfurter, ???High-efficiency entangled photon pair collection in type-II parametric fluorescence,??? Phys. Rev. A 64, 023802 (2001). [CrossRef]
  21. R. Lieger, T. Lorünser, G. Humer, and F. Schupfer, ???Embedding quantum cryptography on DSP-boards,??? in Proceedings of EUSIPCO - to be published (Vienna, Austria, 2004).
  22. G. Brassard and L. Salvail, ???Secret key reconciliation by public discussion,??? Lecture Notes in Computer Science 765, 410???423 (1994). [CrossRef]
  23. M. Peev, O. Maurhardt, T. Lorünser, M. Suda, M. Nölle, A. Poppe, R. Ursin, A. Fedrizzi, H. Böhm, T. Jennewein, and A. Zeilinger, ???A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography,??? in Proceedings of the International Meeting on Quantum Information Science ???Foundations of Quantum Information??? - to be published (Camerino, Italy, 2004).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Fig. 1. Fig. 2. Fig. 3.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited