Experimental long wavelength quantum cryptography: From single-photon transmission to key extraction protocols

Abstract We present experiments on long wavelength (δ = 1.55 μm) ‘plug and play’ quantum cryptography systems. We discuss the performance of single-photon detectors at δ = 1.55 μm. Furthermore, we address the full implementation of the quantum cryptography protocol, discussing in detail the implementation of protocols for error correction and privacy amplification needed to get a secure key. We illustrate the theory with examples from a full software simulation to show the performance of the complete protocol in terms of final secure key creation rate.

[1]  M. Bourennane,et al.  Experiments on long wavelength (1550 nm) "plug and play" quantum cryptography systems. , 1999, Optics express.

[2]  Norbert Lütkenhaus,et al.  ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY , 1999 .

[3]  N. Gisin,et al.  Automated 'plug & play' quantum key distribution , 1998, quant-ph/9812052.

[4]  C. M. Simmons,et al.  Practical free-space quantum key distribution over 1 km , 1998 .

[5]  N. Gisin,et al.  Performance of InGaAs/InP Avalanche Photodiodes as Gated-Mode Photon Counters. , 1998, Applied optics.

[6]  Yeshaiahu Fainman,et al.  Security of quantum cryptography against individual attacks , 1998, Other Conferences.

[7]  Yeshaiahu Fainman,et al.  Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system , 1997 .

[8]  P. Townsend Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fibre using wavelength-division multiplexing , 1997 .

[9]  Lütkenhaus Security against eavesdropping in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[10]  A. Lacaita,et al.  Avalanche photodiodes and quenching circuits for single-photon detection. , 1996, Applied optics.

[11]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[12]  P R Tapster,et al.  Photon counting with passively quenched germanium avalanche. , 1994, Applied optics.

[13]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[14]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[15]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..