2015
DOI: 10.1109/jstqe.2014.2369507
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Photonic Network: Concept, Basic Tools, and Future Issues

Abstract: We present practical GHz-clocked QKD systems, next generation entanglement QKD technologies, and QKD platform to manage the secure keys and to support a variety of applications. We then show the intrinsic limit of QKD, i.e., a key rate bound, and discuss how to realize the provable (information theoretic) security with a larger secrecy capacity over longer distances. In particular, we present a basic theory of physical layer cryptography, which characterizes the secrecy capacity, and engineers the tradeoff bet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
24
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 56 publications
0
24
0
Order By: Relevance
“…Fortunately, quantum key distribution (QKD) provides a highly secure approach to sharing random encryption keys by transmitting single photons [2]. Although QKD has advanced from simple proof-of-principle experiments towards robust long-term demonstrations [3][4][5][6], it has still not obtained wide-scale adoption.…”
mentioning
confidence: 99%
“…Fortunately, quantum key distribution (QKD) provides a highly secure approach to sharing random encryption keys by transmitting single photons [2]. Although QKD has advanced from simple proof-of-principle experiments towards robust long-term demonstrations [3][4][5][6], it has still not obtained wide-scale adoption.…”
mentioning
confidence: 99%
“…Here, φ(ρ|W B , q, r) in (24) and φ(−ρ|W E , q, r) in (25) are functions of the given channels W B , W E and the input probability q. For the wiretap channel based on the OOK considered in this paper, these functions are given as in (26) and (27) at the top of the next page. The arbitrary constant r ≥ 0 is optimized so that each exponent be maximized.…”
Section: A Formulationmentioning
confidence: 99%
“…Against such a serious loophole, we develop its countermeasure which does not require new hardware. Although there are previous works [27][28][29] extending the coverage of the security proofs to accommodate the non-IID cases, a better performance of the QKD system will be achieved by developing more preemptive methods to circumvent correlations and fluctuations, based on the understanding on the real GHz-clocked QKD system [12] characteristics. We experimentally observe this modulation-pattern dependent intensity deviation and provide an efficient countermeasure.…”
Section: Introductionmentioning
confidence: 99%