Literature DB >> 24116757

Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks.

A Rubenok1, J A Slater, P Chan, I Lucio-Martinez, W Tittel.   

Abstract

Several vulnerabilities of single-photon detectors have recently been exploited to compromise the security of quantum-key-distribution (QKD) systems. In this Letter, we report the first proof-of-principle implementation of a new quantum-key-distribution protocol that is immune to any such attack. More precisely, we demonstrated this new approach to QKD in the laboratory over more than 80 km of spooled fiber, as well as across different locations within the city of Calgary. The robustness of our fiber-based implementation, together with the enhanced level of security offered by the protocol, confirms QKD as a realistic technology for safeguarding secrets in transmission. Furthermore, our demonstration establishes the feasibility of controlled two-photon interference in a real-world environment and thereby removes a remaining obstacle to realizing future applications of quantum communication, such as quantum repeaters and, more generally, quantum networks.

Year:  2013        PMID: 24116757     DOI: 10.1103/PhysRevLett.111.130501

Source DB:  PubMed          Journal:  Phys Rev Lett        ISSN: 0031-9007            Impact factor:   9.161


  19 in total

1.  The ultimate physical limits of privacy.

Authors:  Artur Ekert; Renato Renner
Journal:  Nature       Date:  2014-03-27       Impact factor: 49.962

2.  Experimental quantum key distribution certified by Bell's theorem.

Authors:  D P Nadlinger; P Drmota; B C Nichol; G Araneda; D Main; R Srinivas; D M Lucas; C J Ballance; K Ivanov; E Y-Z Tan; P Sekatski; R L Urbanke; R Renner; N Sangouard; J-D Bancal
Journal:  Nature       Date:  2022-07-27       Impact factor: 69.504

3.  Mode-pairing quantum key distribution.

Authors:  Pei Zeng; Hongyi Zhou; Weijie Wu; Xiongfeng Ma
Journal:  Nat Commun       Date:  2022-07-07       Impact factor: 17.694

4.  Hacking on decoy-state quantum key distribution system with partial phase randomization.

Authors:  Shi-Hai Sun; Mu-Sheng Jiang; Xiang-Chun Ma; Chun-Yan Li; Lin-Mei Liang
Journal:  Sci Rep       Date:  2014-04-23       Impact factor: 4.379

5.  All-photonic intercity quantum key distribution.

Authors:  Koji Azuma; Kiyoshi Tamaki; William J Munro
Journal:  Nat Commun       Date:  2015-12-16       Impact factor: 14.919

6.  Experimental quantum fingerprinting with weak coherent pulses.

Authors:  Feihu Xu; Juan Miguel Arrazola; Kejin Wei; Wenyuan Wang; Pablo Palacios-Avila; Chen Feng; Shihan Sajeed; Norbert Lütkenhaus; Hoi-Kwong Lo
Journal:  Nat Commun       Date:  2015-10-30       Impact factor: 14.919

7.  Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

Authors:  Ting-Ting Song; Su-Juan Qin; Qiao-Yan Wen; Yu-Kun Wang; Heng-Yue Jia
Journal:  Sci Rep       Date:  2015-10-16       Impact factor: 4.379

8.  Simulating of the measurement-device independent quantum key distribution with phase randomized general sources.

Authors:  Qin Wang; Xiang-Bin Wang
Journal:  Sci Rep       Date:  2014-04-14       Impact factor: 4.379

9.  Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol.

Authors:  Akihiro Mizutani; Kiyoshi Tamaki; Rikizo Ikuta; Takashi Yamamoto; Nobuyuki Imoto
Journal:  Sci Rep       Date:  2014-06-10       Impact factor: 4.379

10.  W-state Analyzer and Multi-party Measurement-device-independent Quantum Key Distribution.

Authors:  Changhua Zhu; Feihu Xu; Changxing Pei
Journal:  Sci Rep       Date:  2015-12-08       Impact factor: 4.379

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.