Performance Evaluations of Quantum Key Distribution System Architectures

Quantum key distribution (QKD) exploits the laws of quantum physics to generate shared secret cryptographic keys and can detect eavesdroppers during the key generation process. However, previous QKD research has focused more on theory than practice.

[1]  R. Renner,et al.  An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.

[2]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[3]  Kai Chen,et al.  Field test of a practical secure communication network with decoy-state quantum cryptography. , 2008, Optics express.

[4]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[5]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[6]  A. Tajima,et al.  High-Speed Quantum Key Distribution System for 1-Mbps Real-Time Key Generation , 2012, IEEE Journal of Quantum Electronics.

[7]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[8]  Pierre L’Ecuyer,et al.  Random Number Generation , 2008, Encyclopedia of Algorithms.

[9]  P. L’Ecuyer Random Number Generation , 2012 .

[10]  Valerio Scarani,et al.  The black paper of quantum cryptography: Real implementation problems , 2009, Theor. Comput. Sci..

[11]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[12]  R. Hadfield Single-photon detectors for optical quantum information applications , 2009 .

[13]  L. Oesterling,et al.  Comparison of commercial and next generation quantum key distribution: Technologies for secure communication of information , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[14]  K. Tamaki,et al.  Performance of Long-Distance Quantum Key Distribution Over 90-km Optical Links Installed in a Field Environment of Tokyo Metropolitan Area , 2014, Journal of Lightwave Technology.