Homodyne detection for quantum key distribution: an alternative to photon counting in BB84 protocol

被引:0
|
作者
Costa e Silva, M. B. [1 ]
Xu, Q. [1 ]
Agnolini, S. [1 ]
Gallion, P. [1 ]
Mendieta, F. J. [2 ]
机构
[1] Telecom Paris, Ecole Natl Super Telecommun, GET, 46 Rue Barrault, F-75013 Paris, France
[2] CICESE, Ensenada 22800, Baja California, Mexico
来源
关键词
quantum key distribution; quantum cryptography; coherent detection; homodyne detection; QPSK modulation; BB84; protocol;
D O I
10.1117/12.707785
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This paper presents the principles and experimental results of an optical fiber QKD system operating at 1550 nm; and using the BB84 protocol with QPSK signals. Our experimental setup consists of a time-multiplexed super-homodyne configuration using P.LN detectors in a differential scheme as an alternative to avalanche photon counting. Transmission over 11 km of optical fiber has been done using this detection scheme and major relevant characteristics such as noise, quantum efficiency and bit error rate (BER) are reported.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Practical quantum digital signature with a gigahertz BB84 quantum key distribution system
    An, Xue-Bi
    Zhang, Hao
    Zhang, Chun-Mei
    Chen, Wei
    Wang, Shuang
    Yin, Zhen-Qiang
    Wang, Qin
    He, De-Yong
    Hao, Peng-Lei
    Liu, Shu-Feng
    Zhou, Xing-Yu
    Guo, Guang-Can
    Han, Zheng-Fu
    OPTICS LETTERS, 2019, 44 (01) : 139 - 142
  • [42] Shor and Preskill's and Mayers's security proof for the BB84 quantum key distribution protocol
    Mayers, D
    EUROPEAN PHYSICAL JOURNAL D, 2002, 18 (02): : 161 - 170
  • [43] EFFICIENCY OF THE QUANTUM KEY DISTRIBUTION SYSTEMS - A COMPARATIVE STUDY OF BB84 PROTOCOL WITH ITS IMPROVED VERSIONS
    Zisu, Liliana
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 85 - 91
  • [44] Secrecy capacity in the BB84 protocol of quantum cryptography
    Brandt, HE
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING, PROCEEDINGS, 2003, : 383 - 386
  • [45] A Playful Sketch of the Quantum Cryptography Protocol BB84
    Calderbank, Robert
    IEEE BITS the Information Theory Magazine, 2022, 2 (03):
  • [46] Practical decoy-state BB84 quantum key distribution with quantum memory
    李咸柯
    宋小谦
    郭其伟
    周星宇
    王琴
    Chinese Physics B, 2021, (06) : 77 - 80
  • [47] Practical decoy-state BB84 quantum key distribution with quantum memory*
    Li, Xian-Ke
    Song, Xiao-Qian
    Guo, Qi-Wei
    Zhou, Xing-Yu
    Wang, Qin
    CHINESE PHYSICS B, 2021, 30 (06)
  • [48] Quantum Bit Commitment Combining with BB84 Protocol
    Zhang, Linxi
    Zhu, Changhua
    Zhao, Nan
    Pei, Changxing
    ELECTRICAL AND CONTROL ENGINEERING & MATERIALS SCIENCE AND MANUFACTURING, 2016, : 291 - 298
  • [49] Benefits of using Heralded Single Photon Source for Fiber-Based Quantum Key Distribution BB84
    Gueddana, Amor
    Attia, Moez
    Chatta, Rihab
    2013 10TH INTERNATIONAL CONFERENCE ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET-CNS), 2013, : 32 - 36
  • [50] Thwarting the photon-number-splitting attack with entanglement-enhanced BB84 quantum key distribution
    Sabottke, Carl F.
    Richardson, Chris D.
    Anisimov, Petr M.
    Yurtsever, Ulvi
    Lamas-Linares, Antia
    Dowling, Jonathan P.
    NEW JOURNAL OF PHYSICS, 2012, 14