Impact of Raman Scattered Noise from Multiple Telecom Channels on Fiber-Optic Quantum Key Distribution Systems (original) (raw)

Free PDF

Orthogonal frequency division multiplexed quantum key distribution in the presence of Raman noise Cover Page

Free PDF

Toward the Integration of CV Quantum Key Distribution in Deployed Optical Networks Cover Page

Free PDF

Quantum key distribution in an optical fiber at distances of up to 200 km and a bit rate of 180 bit/s Cover Page

Free PDF

Optical networking for quantum key distribution and quantum communications Cover Page

Free PDF

Quantum key distribution over 122 km of standard telecom fiber Cover Page

Free PDF

Long-distance quantum key distribution in optical fibre Cover Page

A Quantum Key Distribution Network Through Single Mode Optical Fiber

2009

Quantum key distribution (QKD) has been developed within the last decade that is provably secure against arbitrary computing power, and even against quantum computer attacks. Now there is a strong need of research to exploit this technology in the existing communication networks. In this paper we have presented various experimental results pertaining to QKD like Raw key rate and Quantum bit error rate (QBER). We found these results over 25 km single mode optical fiber. The experimental setup implemented the enhanced version of BB84 QKD protocol. Based upon the results obtained, we have presented a network design which can be implemented for the realization of large scale QKD networks. Furthermore, several new ideas are presented and discussed to integrate the QKD technique in the classical communication networks.

Free PDF

A Quantum Key Distribution Network Through Single Mode Optical Fiber Cover Page

Long-distance decoy-state quantum key distribution in optical fiber

Physical review letters, 2007

The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultralow-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian approximations in a one-way QKD system, enabling the creation of secure keys immune to photon-number-splitting attacks and highly resistant to Trojan horse attacks over 107 km of optical fiber.

Free PDF

Long-distance decoy-state quantum key distribution in optical fiber Cover Page

Free PDF

Quantum key distribution at telecom wavelengths with noise-free detectors Cover Page

Free PDF

Stability of high bit rate quantum key distribution on installed fiber Cover Page