OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 19, Iss. 5 — Feb. 28, 2011
  • pp: 3825–3834
« Show journal navigation

Fast optical source for quantum key distribution based on semiconductor optical amplifiers

M. Jofre, A. Gardelein, G. Anzolin, W. Amaya, J. Capmany, R. Ursin, L. Peñate, D. Lopez, J. L. San Juan, J. A. Carrasco, F. Garcia, F. J. Torcal-Milla, L. M. Sanchez-Brea, E. Bernabeu, J. M. Perdigues, T. Jennewein, J. P. Torres, M. W. Mitchell, and V. Pruneri  »View Author Affiliations


Optics Express, Vol. 19, Issue 5, pp. 3825-3834 (2011)
http://dx.doi.org/10.1364/OE.19.003825


View Full Text Article

Acrobat PDF (1524 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

A novel integrated optical source capable of emitting faint pulses with different polarization states and with different intensity levels at 100 MHz has been developed. The source relies on a single laser diode followed by four semiconductor optical amplifiers and thin film polarizers, connected through a fiber network. The use of a single laser ensures high level of indistinguishability in time and spectrum of the pulses for the four different polarizations and three different levels of intensity. The applicability of the source is demonstrated in the lab through a free space quantum key distribution experiment which makes use of the decoy state BB84 protocol. We achieved a lower bound secure key rate of the order of 3.64 Mbps and a quantum bit error ratio as low as 1.14 × 10−2 while the lower bound secure key rate became 187 bps for an equivalent attenuation of 35 dB. To our knowledge, this is the fastest polarization encoded QKD system which has been reported so far. The performance, reduced size, low power consumption and the fact that the components used can be space qualified make the source particularly suitable for secure satellite communication.

© 2011 Optical Society of America

1. Introduction

Quantum key Distribution (QKD), guarantees absolutely secure key distribution, since making use of the principles of quantum physics [1

1. C. H. Bennett and G. Brassard, “Quantum cryptography: Public-key distribution and coin tossing,” Proc. IEEE Int. Conference on Computers, Systems and Signal Processing 175–179 (1984).

], using the fact that it is not possible to measure or copy an unknown quantum state without being detected [2

2. V. Scarani, S. Iblisdir, N. Gisin, and A. Acín, “Quantum cloning,” Rev. Mod. Phys. 77, 1225–1256 (2005).

]. A cryptographic key is generated out from the measurement of the information encoded into specific quantum states of a photon (e.g. polarization or phase). The first QKD scheme, proposed by Bennett and Brassard [3

3. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5, 3–28 (1992).

], employed single photons sent through a quantum channel, plus classical communications over a public channel to generate a secure shared key. This scheme is commonly known as the BB84 protocol. Attenuated laser pulses or faint pulse sources (FPS), which in average emit less than one photon per pulse, are often used as signals in practical QKD devices. With the introduction of the decoy state protocol [4

4. W.-Y. Hwang, “Quantum key distribution with high loss: Toward global secure communication,” Phys. Rev. Lett. 91, 057901 (2003). [PubMed]

, 5

5. H.-K. Lo, X. Ma, and K. Chen, “Decoy State Quantum Key Distribution,” Phys. Rev. Lett. 94, 230504 (2005). [PubMed]

], faint pulse systems can offer comparable QKD security with respect to single photon sources, in particular for high loss situations [6

6. S. Nauerth, M. Fürst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, “Information leakage via side channels in freespace BB84 quantum cryptography,” N. J. Phys. 11, 065001 (2009).

].

In this paper, we report the development of a novel, compact and reliable FPS-based semiconductor optical amplifiers (SOAs) which emits pulses at a repetition rate of 100 MHz, suitable for free-space QKD applications. It has been measured that the source achieves a Lower Bound Secure Key Rate of 3.64 Mbps implementing the decoy state BB84 protocol. The source is capable of generating pulses with at least three different intensity levels (i.e. number of photons per pulse) and four different polarization states. The demonstrated FPS ensures high level of indistinguishability among the different intensity and polarization pulses and ensures phase incoherence of consecutive generated states. It is based on a single diode emitting a continuous optical train of pulses externally modulated in intensity and polarization by using a combination of four SOAs and polarizing optical elements. The wavelength, reduced power consumption, compactness and space qualifiable optoelectronic components constituting the source make it very suitable for space-based QKD transmission. Although the proposed source has been conceived for free space QKD at around 850 nm, the concept can be extended to other wavelengths (e.g. 1550 nm) and other media, including optical fibers.

2. The compact faint pulse source

Fig. 1 Schematic of the QKD source. [LD] denotes a laser diode, [C] a single-mode in-fiber 1x2 coupler, [SOA] a semiconductor optical amplifier, [P] a free-space thin-film polarizer and [BF] a single-mode bare fiber.

For the implementation of a QKD system using decoy state protocol, besides four different polarization states (0°, 90°,45°and −45°), the FPS source should generate three intensity levels (optimally 1/2, 1/8 and 0 photons in average per pulse [12

12. X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Phys. Rev. A 72, 012326 (2005).

]) in order to operate in the single photon regime while optimizing the decoy state protocol. Each SOA performs the double task of spatial switching and amplitude modulation; it selects a specific fiber output while, by changing the driving voltage, it generates the three intensity levels needed for the decoy state protocol. Note that the spatial switching among the four fiber outputs is then transformed in polarization modulation, according to the scheme described above, by going through different polarizing patterns of the polarizers substrate. In this way intensity and polarization modulation can be achieved with high extinction ratio (ER), without the need of using Polarization Maintaining Fibers (PMFs) and PMF couplers or the complexity of having to maintain a specific input polarization state or high Degree of Polarization (DOP) along the whole optical assembly. Usually, the common parameter of interest for a SOA is the gain. However in this case the frequency response to an electrical signal is equally important, in particular for the time and spectral indistinguishability of the pulses with different polarizations and energy levels.

A single LD outperforms, as commented in Section 4, the achievable security of the qubits sent by the source compared to using more than one LD, while using a DFB LD generates short optical pulses close to transform limited pulses which ensures the correct functionality and minimum additional distortion of any subsequent optical devices and components. The time duration and spectral bandwidth product of the generated pulses is 0.56, very close to the theoretical value for transform limited Gaussian pulses (0.44). The main reason of using SOAs as active switching and intensity selection devices is their high ER (> 20 dB) which is highly desirable when implementing 3-state decoy protocol. SOAs outperform other solutions such as Mach-Zehnder or Electro-absorptive modulators which have lower ER when operated with optical pulses as input signal. Finally, thin-film polarizers achieve high DOP of the order of 99.68%, being a remarkable specification in order to ensure an adequate quantum bit error ratio and thus high efficiency of secure key generation rate. Polarization modulators can not achieve such high values of DOP.

3. Experimental measurements

Figure 2 shows the train of optical pulses generated by the laser diode when driven by electrical pulses of 1 ns at 100 MHz. The resulting optical pulse duration is about 400 ps. Since all optical pulses are generated in the same way, by direct modulation of the laser diode, they can be assumed to be indistinguishable. The laser diode is driven in direct modulation with a strong RF driving pulse with 24 mA DC bias current (below threshold, 36 mA). Furthermore, the short optical pulse duration of 400 ps has the advantage of increasing the signal-to-noise ratio, since the measurement window (detection time) in the receiver side can small.

Fig. 2 Optical pulse train generation. Laser driver output (upper curve, right axis) produces few-ns, negative-going pulses which drive the DFB laser briefly above threshold (dashed-line, right axis). The laser output (lower curve, left axis), shows pulses with 100 MHz repetition rate and sub-ns duration.

In Fig. 3, the pulses with different intensities required to implement the decoy state protocol are shown for all the four SOAs, together with the driving signals, loaded with a 50Ω resistance for monitoring purposes. Notice that the modulation time window of the driving signals is much larger (> 5 ns) than the optical pulse thus minimum distortion is produced. A continuous periodic sequence, driving the four SOAs at the same time, is used to set the intensity level of a single SOA while the other three SOAs remaining in the OFF state. In particular, the three intensity levels correspond to: a high intensity level state which is set to 1/2 average photon per pulse by adjusting the coupling efficiency to the output bare fiber; then a second lower intensity level and the third level is set as vacuum (the SOA is not switched ON).

Fig. 3 Driving signals to the four SOAs (a) and corresponding generated optical pulses (b), as required for the implementation of the decoy state BB84 protocol. Note that the driving voltages are such that the peak optical intensities from the four SOAs are similar.

It is clear that the optical pulses from the SOAs have Amplified Spontaneous Emission (ASE) noise reducing the indistinguishability of the different states, this can be mitigated by using proper filters, as shown in Fig. 4, and/or selection of SOAs. In fact, SOAs 2 and 3 produce nearly identical pulses without the use of any filter.

Fig. 4 Generated optical pulses after extensively removing ASE using a 3nm interference filter with central peak wavelength of 852nm.

4. Source security analysis

In all QKD implementations it is important to assess the actual security of the system, considering the imperfections of the different devices assembled. In this section the security of the presented source is computed with time and frequency resolution higher than the temporal and spectral shape widths of the generated optical pulses. Figure 5 shows the temporal and spectral shapes of pulses with same intensity level and four different polarization states, filtered ASE, where an offset has been introduced in the vertical axis only for visualization purposes otherwise the pulses would highly overlap in intensity. A 8 GHz amplified photodiode and a 4 MHz resolution Fabry-Perot interferometer were used for the temporal and spectral measurements on indistinguishability, respectively, showing a high degree of similarity of the generated optical pulses.

Fig. 5 Temporal (a) and spectral (b) profiles for pulses with same intensity level (high) and four different polarization states, where an offset has been introduced in the vertical axis only for visualization purposes. As expected, these show a high degree of similarity, indicating minimal distortion of the pulses.

Mutual information is the information shared by two random variables, X and Y: it measures how much knowing one of these variables reduces the uncertainty on the other. For example, if X and Y are independent, then knowing X does not give any information about Y and vice versa, so their mutual information is zero. On the other extreme, if X and Y are identical then all information conveyed by X is shared with Y: knowing X determines the value of Y and vice versa. Formally, the mutual information of two continuous random variables X and Y is defined as
I(X;Y)=YXp(x,y)log(p(x,y)p(x)p(y))dxdy
(1)
where I(X;Y) is the mutual information and p(x,y) is the joint probability distribution between X and Y variables, p(x) and p(y) are the probability distributions of X and Y variables, respectively.

In particular, in FPS sources it is interesting to compute the average mutual information between the different bits sent B and the physical parameters that could lead to side-channels, thus leaking information of the generated secure key to Eve if not accounted for. For the presented source, with filtered ASE, the mutual information for the relevant physical parameters with respect to the bit value B are computed below:
  • Spatial: The coupling output fiber also serves as a spatial filter, removing higher order modes. Because of the short length of the output SMF fiber (few centimeters) there might be still information transmitted by the fiber cladding. However this information leakage I(S : B) is of the order of 10−5 bits per pulse.
  • Spectral: The mutual information between the bit value B and the spectra F: I(F : B) = 1.75 × 10−3 bits per pulse.
  • Temporal: The mutual information between the bit value B and the temporal shape T: I(T : B) = 1.92×10−3 bits per pulse, when removing the ASE. If the ASE is not removed, considering the generated optical pulses from the four particular SOAs available, the mutual information computes to I(T : B) = 7.25 × 10−2 bits per pulse, mainly because of high levels of ASE in SOAs 1 and 4. If SOAs were pre-selected to have low ASE the I(T : B) could achieve the 10−3 bits per pulse order again.

Notice that in Fig. 5(a) different pulses are superimposed achieving a good temporal overlap by careful matching the fiber’s length with an accuracy of 1mm, not being necessary to further temporally adjust the overlap of the different optical pulses by using extra delay-adjustment hardware. Furthermore, it is clear that not perfect transform limited optical pulses are generated thus even similar optical pulses in their temporal and spectral envelopes could have distinguishing features in their phases. Using a single initial laser diode, considering that the distortion due to subsequent optical components is negligible (e.g. no significant chirp is introduced) because they are operated over a time scale much larger than the actual optical pulse duration, it ensures no distinguishing features in particular in the phases of the different optical pulses. While using initially different laser diodes, distinguishing features can be present in the phase of the different optical pulses which can not be avoided by proper filtering.

5. QKD free-space transmission

Figure 6 shows the setup used for the decoy state BB84 transmission measurement. The output bare fiber was connected to a free-space collimator pointing to the polarization-sensitive detection module, a.k.a. “Bob module” commonly used for polarization-encoded QKD. The polarization detection fidelity, defined as the ratio between erroneous detected polarization states to total detected polarization states which defines the capability to correctly resolve the received polarization states, of the receiver module used in the experiment was 7.9 × 10−3. Alice and Bob time references were synchronized using a classical channel providing a 10 MHz clock signal. The detections from the single-photon detectors (SAPD) were recorded by a timetagging unit and then transferred to a computer to derive the relevant parameters (e.g. Lower Bound Secure Key Rate (LBSKR), Raw Key Rate (RKR) and Quantum Bit Error Ratio (QBER)). The parameters of interest were extrapolated using enough accumulated detections in a burst mode operation, which for high RKR it accounted for about 100 ms while for the lowest RKR it accounted for 16.6 minutes. The timetagging unit allows 10 Mcps transmission to the computer, by direct memory access (DMA), and also it has a timestamp resolution of 78.125 ps. Accounting for 500 ps jitter of SAPD (Perkin Elmer SPCM-AQ4C), 100 ps jitter and 400 ps of the width of the generated optical pulses, a 1 ns time window was implemented by software, allowing to reduce the background noise.

Fig. 6 Schematic of the QKD measurement setup. Alice module is composed of the FPS also providing a common clock signal of 10 MHz in order to synchronize Alice and Bob modules. [C] denotes a fiber to free-space collimator, [NDF] a neutral density filter, [NPBS] a non-polarizing beamsplitter, [HWP] a half-wave plate, [PBS] a polarizing beamsplitter and [SAPD] a single-photon detector.

All but privacy amplification was implemented, were the lower bound for the secure key generation rate can be obtained as (security proof derived in [5

5. H.-K. Lo, X. Ma, and K. Chen, “Decoy State Quantum Key Distribution,” Phys. Rev. Lett. 94, 230504 (2005). [PubMed]

])
RqNμt{Qμf(Eμ)H2(Eμ)+Q1[1H2(e1)]}
(2)
where q depends on the implementation (1/2 for the BB84 protocol), Nμ is the total number of signal pulses sent, t is the time duration of the QKD transmission, μ represents the intensity of the signal states, Qμ is the gain of the signal states, Eμ is the signal pulses QBER, Q1 is the gain of single photon states, e1 is the error rate of single photon states, f (x) is the bi-direction error correction efficiency (taken as 1.16 [13

13. G. Brassard and L. Salvail, “Secret Key Reconciliation by Public Discussion,” Advances in Cryptology - EUROCRYPT ’93 765/1994, 410–423 (1994).

], for an error ratio of 1%) and H2 (x) is the binary Shannon information function, given by
H2(x)=xlog2(x)(1x)log2(1x)
(3)

6. Results and discussion

Figure 3 shows the SOAs’ capability to be driven at 100 MHz while achieving spatial switching operation and intensity level generation, suitable for decoy state BB84 protocol. In addition low driving voltages are needed, making the design suitable for electronic integration with low electrical power consumption drivers. Furthermore, by design, the phase of each pulse varies at random between pulses due to the fact that, as it was already mentioned, pulses are generated by taking continuously the laser diode above and below threshold, as explained in [11

11. M. Jofre, A. Gardelein, G. Anzolin, G. Molina-Terriza, J. P. Torres, M. W. Mitchell, and V. Pruneri, “100 MHz Amplitude and Polarization Modulated Optical Source for Free-Space Quantum Key Distribution at 850 nm,” J. Lightwave Technol. 28, 2572–2578 (2010).

].

The level of indistinguishability is directly reflected on the amount of Secure Key Rate (SKR) that has to be removed in the privacy amplification step, in order to ensure security. The amount of bits to be removed when filtering with interference filters (10−3 bits per pulse) can be achieved without using an interference filter but pre-selecting four SOAs with similar low ASE values. Considering the above values for I(S : B), I(F : B) and I(T : B) the corresponding information leakage is small compared to the information leakage indicated by the QBER of the contribution of pulses with more than one photon.

Fig. 7 QKD BB84 implementing decoy states transmission results. Raw Key Rate (blue solid line), Lower Bound Secure Key Rate (red dashed line) and QBER (magenta dotted line). The detectors’ efficiency was set to 50%, background yield 5.58 × 10−4, 2 dB were accounted for losses due to the transmitting and receiving optical systems.

Table 1. Summary of the QKD results for a BB84 transmission, implementing the decoy state protocol

table-icon
View This Table

7. Conclusions

We have shown that a single photon source based on an attenuated laser diode for QKD applications can be built based on a novel scheme including semiconductor optical amplifiers. The source is capable of generating pulses of random polarization distributed over four states and three intensity levels required for decoy state BB84 protocol. A lower bound secure key rate of 3.64 Mbps with a quantum bit error ratio as low as 1.14 × 10−2 for an attenuation of 6 dB. To our knowledge, this is the fastest polarization encoded QKD system which has been reported so far. Given the relatively low driving voltages of the SOAs, the laser diode and the other integrated optical components, the proposed transmitter is potentially low power consumption, highly integrable and stable. The experimental demonstration has been carried out at 850 nm, for the implementation in free-space links, with 100 MHz generation rates. However, taking into consideration that the SOA’s bandwidth can go well beyond 10 GHz and operate also at other wavelengths (e.g. 1310 nm and 1550 nm for fiber transmission), the source can be easily scalable to higher bit rates, the upper limit probably being set by the laser diode itself.

Acknowledgments

This work was carried out with the financial support of the Ministerio de Educación y Ciencia (Spain) through grants TEC2007-60185, FIS2007-60179, FIS2008-01051 and Consolider Ingenio CSD2006-00019, and also by the European Space Agency under the ARTES-5 telecom programme Contract No. 21460/08/NL/IA.

References and links

1.

C. H. Bennett and G. Brassard, “Quantum cryptography: Public-key distribution and coin tossing,” Proc. IEEE Int. Conference on Computers, Systems and Signal Processing 175–179 (1984).

2.

V. Scarani, S. Iblisdir, N. Gisin, and A. Acín, “Quantum cloning,” Rev. Mod. Phys. 77, 1225–1256 (2005).

3.

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5, 3–28 (1992).

4.

W.-Y. Hwang, “Quantum key distribution with high loss: Toward global secure communication,” Phys. Rev. Lett. 91, 057901 (2003). [PubMed]

5.

H.-K. Lo, X. Ma, and K. Chen, “Decoy State Quantum Key Distribution,” Phys. Rev. Lett. 94, 230504 (2005). [PubMed]

6.

S. Nauerth, M. Fürst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, “Information leakage via side channels in freespace BB84 quantum cryptography,” N. J. Phys. 11, 065001 (2009).

7.

D. Stucki, N. Walenta, F. Vannel, R. T. Thew, N. Gisin, H. Zbinden, S. Gray, C. R. Towery, and S. Ten, “High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres,” N. J. Phys. 11, 075003 (2009).

8.

T. Schmitt-Manderbach, H. Weier, M. Fürst, R. Ursin, F. Tiefenbacher, T. Scheidl, J. Perdigues, Z. Sodnik, C. Kurtsiefer, A. Rarity, J. G. Zeilinger, and H. Weinfurter, “Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km,” Phys. Rev. Lett. 98, 010504 (2007). [PubMed]

9.

J. M. Perdigues, B. Furch, C. J. Matos, O. Minster, L. Cacciapuoti, M. Pfennigbauer, M. Aspelmeyer, T. Jennewein, R. Ursin, T. Schmitt-Manderbach, G. Baister, J. Rarity, W. Leeb, C. Barbieri, H. Weinfurter, and A. Zeilinger, “Quantum communications at ESA: Towards a space experiment on the ISS,” Acta Astronaut. 63, 165–178 (2008).

10.

R. Ursin, T. Jennewein, J. Kofler, J. M. Perdigues, L. Cacciapuoti, C. J. de Matos, M. Aspelmeyer, A. Valencia, T. Scheidl, A. Fedrizzi, A. Acin, C. Barbieri, G. Bianco, C. Brukner, J. Capmany, S. Cova, D. Giggenbach, W. Leeb, R. H. Hadfield, R. Laflamme, N. Lutkenhaus, G. Milburn, M. Peev, T. Ralph, J. Rarity, R. Renner, E. Samain, N. Solomos, W. Tittel, J. P. Torres, M. Toyoshima, A. Ortigosa-Blanch, V. Pruneri, P. Villoresi, I. Walmsley, G. Weihs, H. Weinfurter, M. Zukowski, and A. Zeilinger, “Space-quest: Experiments with quantum entanglement in space,” Europhys. News 40, 26–29 (2009).

11.

M. Jofre, A. Gardelein, G. Anzolin, G. Molina-Terriza, J. P. Torres, M. W. Mitchell, and V. Pruneri, “100 MHz Amplitude and Polarization Modulated Optical Source for Free-Space Quantum Key Distribution at 850 nm,” J. Lightwave Technol. 28, 2572–2578 (2010).

12.

X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Phys. Rev. A 72, 012326 (2005).

13.

G. Brassard and L. Salvail, “Secret Key Reconciliation by Public Discussion,” Advances in Cryptology - EUROCRYPT ’93 765/1994, 410–423 (1994).

OCIS Codes
(060.2605) Fiber optics and optical communications : Free-space optical communication
(060.5565) Fiber optics and optical communications : Quantum communications
(270.5568) Quantum optics : Quantum cryptography

ToC Category:
Quantum Optics

History
Original Manuscript: October 7, 2010
Revised Manuscript: January 11, 2011
Manuscript Accepted: February 8, 2011
Published: February 14, 2011

Citation
M. Jofre, A. Gardelein, G. Anzolin, W. Amaya, J. Capmany, R. Ursin, L. Penate, D. Lopez, J. L. San Juan, J. A. Carrasco, F. Garcia, F. J. Torcal-Milla, L. M. Sanchez-Brea, E. Bernabeu, J. M. Perdigues, T. Jennewein, J. P. Torres, M. W. Mitchell, and V. Pruneri, "Fast optical source for quantum key distribution based on semiconductor optical amplifiers," Opt. Express 19, 3825-3834 (2011)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-19-5-3825


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. C. H. Bennett, and G. Brassard, “Quantum cryptography: Public-key distribution and coin tossing,” Proc. IEEE Int. Conference on Computers, Systems and Signal Processing 175–179 (1984).
  2. V. Scarani, S. Iblisdir, N. Gisin, and A. Acín, “Quantum cloning,” Rev. Mod. Phys. 77, 1225–1256 (2005).
  3. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5, 3–28 (1992).
  4. W.-Y. Hwang, “Quantum key distribution with high loss: Toward global secure communication,” Phys. Rev. Lett. 91, 057901 (2003). [PubMed]
  5. H.-K. Lo, X. Ma, and K. Chen, “Decoy State Quantum Key Distribution,” Phys. Rev. Lett. 94, 230504 (2005). [PubMed]
  6. S. Nauerth, M. F¨urst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, “Information leakage via side channels in freespace BB84 quantum cryptography,” N. J. Phys. 11, 065001 (2009).
  7. D. Stucki, N. Walenta, F. Vannel, R. T. Thew, N. Gisin, H. Zbinden, S. Gray, C. R. Towery, and S. Ten, “High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres,” N. J. Phys. 11, 075003 (2009).
  8. T. Schmitt-Manderbach, H. Weier, M. Fürst, R. Ursin, F. Tiefenbacher, T. Scheidl, J. Perdigues, Z. Sodnik, C. Kurtsiefer, A. Rarity, J. G. Zeilinger, and H. Weinfurter, “Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km,” Phys. Rev. Lett. 98, 010504 (2007). [PubMed]
  9. J. M. Perdigues, B. Furch, C. J. Matos, O. Minster, L. Cacciapuoti, M. Pfennigbauer, M. Aspelmeyer, T. Jennewein, R. Ursin, T. Schmitt-Manderbach, G. Baister, J. Rarity, W. Leeb, C. Barbieri, H. Weinfurter, and A. Zeilinger, “Quantum communications at ESA: Towards a space experiment on the ISS,” Acta Astronaut. 63, 165–178 (2008).
  10. R. Ursin, T. Jennewein, J. Kofler, J. M. Perdigues, L. Cacciapuoti, C. J. de Matos, M. Aspelmeyer, A. Valencia, T. Scheidl, A. Fedrizzi, A. Acin, C. Barbieri, G. Bianco, C. Brukner, J. Capmany, S. Cova, D. Giggenbach, W. Leeb, R. H. Hadfield, R. Laflamme, N. Lutkenhaus, G. Milburn, M. Peev, T. Ralph, J. Rarity, R. Renner, E. Samain, N. Solomos, W. Tittel, J. P. Torres, M. Toyoshima, A. Ortigosa-Blanch, V. Pruneri, P. Villoresi, I. Walmsley, G. Weihs, H. Weinfurter, M. Zukowski, and A. Zeilinger, “Space-quest: Experiments with quantum entanglement in space,” Europhys. News 40, 26–29 (2009).
  11. M. Jofre, A. Gardelein, G. Anzolin, G. Molina-Terriza, J. P. Torres, M. W. Mitchell, and V. Pruneri, “100 MHz Amplitude and Polarization Modulated Optical Source for Free-Space Quantum Key Distribution at 850 nm,” J. Lightwave Technol. 28, 2572–2578 (2010).
  12. X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Phys. Rev. A 72, 012326 (2005).
  13. G. Brassard and L. Salvail, “Secret Key Reconciliation by Public Discussion,” Advances in Cryptology - EUROCRYPT ’93 765/1994, 410–423 (1994).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited