2005
DOI: 10.1103/physrevlett.95.180503
|View full text |Cite
|
Sign up to set email alerts
|

No-Switching Quantum Key Distribution Using Broadband Modulated Coherent Light

Abstract: We realize an end-to-end no-switching quantum key distribution protocol using continuous-wave coherent light. We encode weak broadband Gaussian modulations onto the amplitude and phase quadratures of light beams. Our no-switching protocol achieves high secret key rate via a post-selection protocol that utilizes both quadrature information simultaneously. We establish a secret key rate of 25 Mbits/s for a lossless channel and 1 kbit/s for 90% channel loss, per 17 MHz of detected bandwidth, assuming individual G… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
169
0
1

Year Published

2006
2006
2019
2019

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 229 publications
(170 citation statements)
references
References 22 publications
0
169
0
1
Order By: Relevance
“…To determine the quadratures X and Y, Bob has to use a phase reference as local oscillator for the homodyne measurements [6,30]. This phase reference is sent along with the signal state in our experiment, as it is done in most continuous variable quantum cryptography experiments [31,32,33,34,35,36]. The analysis of quantum correlations does not directly apply to this new situation.…”
Section: Experimental Apparatusmentioning
confidence: 99%
“…To determine the quadratures X and Y, Bob has to use a phase reference as local oscillator for the homodyne measurements [6,30]. This phase reference is sent along with the signal state in our experiment, as it is done in most continuous variable quantum cryptography experiments [31,32,33,34,35,36]. The analysis of quantum correlations does not directly apply to this new situation.…”
Section: Experimental Apparatusmentioning
confidence: 99%
“…Alice and Bob then both announce the absolute values of their encodings |S A | and measurement results |m B | respectively. This is in contrast to previous zero excess noise protocols where only Alice announces her absolute value [3,7]. Alice and Bob then post-select information for which they have a mutual information advantage over Eve and discard information for which they do not.…”
mentioning
confidence: 91%
“…These protocols are based on the random Gaussian modulation of coherent states using either homodyne [4] or heterodyne [5] detection and both have been experimentally demonstrated [6,7,8,9,10]. At present PS-based CV-QKD has practical advantages in terms of key distillation and has been demonstrated experimentally for up to 90% channel loss [7].…”
mentioning
confidence: 99%
See 2 more Smart Citations