Experimental implementation of time-coding quantum key distribution

被引:15
作者
Boucher, W [1 ]
Debuisschert, T [1 ]
机构
[1] THALES Res & Technol France, F-91767 Palaiseau, France
来源
PHYSICAL REVIEW A | 2005年 / 72卷 / 06期
关键词
D O I
10.1103/PhysRevA.72.062325
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We have implemented an experimental setup in order to demonstrate the feasibility of time-coding protocols for quantum key distribution. Alice produces coherent 20-ns faint pulses of light at 853 nm. They are sent to Bob with delay 0 ns (encoding bit 0) or 10 ns (encoding bit 1). Bob directs at random the received pulses to two different arms. In the first one, a 300 ps resolution Si photon counter allows Bob to precisely measure the detection times of each photon in order to establish the key. Comparing them with the emission times of the pulses sent by Alice allows one to evaluate the quantum bit error rate (QBER). The minimum obtained QBER is 1.62%. The possible loss of coherence in the setup can be exploited by Eve to eavesdrop the line. Therefore, the second arm of Bob setup is a Mach-Zehnder interferometer with a 10 ns propagation delay between the two paths. Contrast measurement of the output beams allows one to measure the autocorrelation function of the received pulses that characterizes their average coherence. In the case of an ideal setup, the value expected with the pulses sent by Alice is 0.576. The experimental value of the pulses autocorrelation function is found to be 0.541. Knowing the resulting loss of coherence and the measured QBER, one can evaluate the mutual information between Alice and Eve and the mutual information between Alice and Bob, in the case of intercept-resend attacks and in the case of attacks with intrication. With our values, Bob has an advantage on Eve of 0.43 bit per pulse. The maximum possible QBER corresponding to equal informations for Bob and Eve is 5.8%. With the usual attenuation of fibres at 850 nm, it shows that secure key distribution is possible up to a distance of 2.75 km, which is sufficient for local links.
引用
收藏
页数:9
相关论文
共 17 条
[1]  
[Anonymous], 2012, Probability Theory: The Logic Of Science
[2]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[3]  
Bennett C.H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[4]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[5]   An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light [J].
Bethune, DS ;
Risk, WP .
IEEE JOURNAL OF QUANTUM ELECTRONICS, 2000, 36 (03) :340-347
[6]   Limitations on practical quantum cryptography [J].
Brassard, G ;
Lütkenhaus, N ;
Mor, T ;
Sanders, BC .
PHYSICAL REVIEW LETTERS, 2000, 85 (06) :1330-1333
[7]   QUANTUM CRYPTOGRAPHY WITH POLARIZED PHOTONS IN OPTICAL FIBERS - EXPERIMENT AND PRACTICAL LIMITS [J].
BREGUET, J ;
MULLER, A ;
GISIN, N .
JOURNAL OF MODERN OPTICS, 1994, 41 (12) :2405-2412
[8]   Optimal eavesdropping in cryptography with three-dimensional quantum states [J].
Bruss, D ;
Macchiavello, C .
PHYSICAL REVIEW LETTERS, 2002, 88 (12) :4
[9]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[10]   Time coding protocols for quantum key distribution [J].
Debuisschert, T ;
Boucher, W .
PHYSICAL REVIEW A, 2004, 70 (04) :042306-1