skip to main content
10.1145/2093698.2093884acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisabelConference Proceedingsconference-collections
research-article

A prototype of a free-space QKD scheme based on the B92 protocol

Published: 26 October 2011 Publication History

Abstract

We describe the architecture of QuAKE (Quantum Advanced Key Exchanger), an experimental setup for quantum key distribution (QKD) over a free-space quantum channel based on the B92 protocol [1]. The system consists of a transmitter (Alice) and a receiver (Bob) that are connected through a free-space quantum channel over a distance of approximately 50 m, and are each driven by a field-programmable gate array (FPGA). The raw key shared by Alice and Bob is processed in four subsequent steps (i.e., sifting, channel estimation, key reconciliation and privacy amplification) which are implemented in Matlab. Finally, public discussion is implemented with the user datagram protocol (UDP) transport protocol running over the Internet protocol (IP) network protocol, while 802.11g underlies the physical layer transmission.

References

[1]
C. H. Bennett, "Quantum cryptography using any two nonorthogonal states," Phy. Rev. Lett., vol. 68, no. 21, pp. 3121--3124, May 1992.
[2]
C. Elliott, "Building the quantum network," New Journal of Physics, vol. 4, no. 1, pp. 46.1--46.12, Jul. 2002.
[3]
R. Alléaume et al., "SECOQC White Paper on Quantum Key Distribution and Cryptography," ArXiv, pp. 1--28, Jan. 2007, Arxiv preprint: arXiv:quant-ph/0403065v2.
[4]
R. Hughes, J. Nordholt, D. Derkacs, and C. Peterson, "Practical free-space quantum key distribution over 10 km in daylight and at night," New J. Phys., vol. 43, no. 4, July 2002.
[5]
Y.-S. Kim, Y.-C. Jeong, and Y.-H. Kim, "Implementation of polarization-coded free-space bb84 quantum key distribution," Laser Physics, vol. 18, no. 6, pp. 810--814, June 2008.
[6]
T. Schmitt-Manderbach et al., "Experimental demonstration of free-space decoy-state quantum key distribution over 144 km," Phy. Rev. Lett., vol. 98, no. 010504, pp. 1--4, January 2007.
[7]
H.-K. Lo, X. Ma, and K. Chen, "Decoy State Quantum Key Distribution," Physical Review Letters, vol. 94, no. 23, 2005.
[8]
B. Huttner, N. Imoto, N. Gisin, and T. Mor, "Quantum cryptography using any two nonorthogonal states," Phy. Rev. Lett., vol. 51, no. 3, pp. 1863--1869, March 1992.
[9]
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. Cryptology, vol. 5, no. 1, pp. 3--28, 1992.
[10]
M. Dušek, M. Jahma, and N. Lütkenhaus, "Unambiguous state discrimination in quantum cryptography with weak coherent states," Phy. Rev. A, vol. 62, no. 022306, pp. 1--9, July 2000.
[11]
N. Lütkenhaus, "Security against individual attacks for realistic quantum key distribution," Phy. Rev. A, vol. 61, no. 052304, pp. 1--9, April 2000.
[12]
C. H. Bennett, G. Brassard, S. Breidbard, and S. Wiesner, "Quantum cryptography, or unforgeable subway tokens." in Advances in Cryptology: Proceedings of CRYPTO '82, 1982, pp. 267--275.
[13]
W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson, G. H. Nickel, C. H. Donahue, and C. G. Peterson, "Fast, efficient error reconciliation for quantum cryptography," Phy. Rev. A, vol. 67, no. 052303, pp. 1--9, May 2003.
[14]
M. Canale, F. Renna, and N. Laurenti, "QKD secrecy for privacy amplification matrices with selective individual attacks," in Proc. QCRYPT 2011, Zurich, Switzerland, September 2011.
[15]
C.-H. Fung, X. Ma, and H. F. Chau, "Practical issue in quantum-key-distribution postprocessing," Phy. Rev. A, vol. 81, no. 012318, pp. 1--9, January 2010.
[16]
C. Elliott, D. Pearson, and G. Troxel, "Quantum cryptography in practice," in ACM SIGCOMM, 2003, pp. 227--238.
[17]
B. Slutsky, R. Rao, P. Sun, L. Tancevski, and S. Fainman, "Defense frontier analysis of quantum cryptographic systems," Applied Optics, vol. 37, no. 14, pp. 2869--2878, 1998.
[18]
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915--1923, November 1995.
[19]
D. R. Stinson, "Universal hashing and authentication codes," Designs, Codes and Cryptography, vol. 4, no. 369, 1994.

Cited By

View all
  • (2020)Quantum Cryptography and SimulationProceedings of the 2020 4th International Conference on Cryptography, Security and Privacy10.1145/3377644.3377671(36-41)Online publication date: 10-Jan-2020
  • (2013)Design optimization for quantum communications in a GNSS intersatellite network2013 International Conference on Localization and GNSS (ICL-GNSS)10.1109/ICL-GNSS.2013.6577252(1-6)Online publication date: Jun-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ISABEL '11: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
October 2011
949 pages
ISBN:9781450309134
DOI:10.1145/2093698
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Universitat Pompeu Fabra
  • IEEE
  • Technical University of Catalonia Spain: Technical University of Catalonia (UPC), Spain
  • River Publishers: River Publishers
  • CTTC: Technological Center for Telecommunications of Catalonia
  • CTIF: Kyranova Ltd, Center for TeleInFrastruktur

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. B92 protocol
  2. QKD
  3. free-space quantum channel
  4. quantum cryptography

Qualifiers

  • Research-article

Conference

ISABEL '11
Sponsor:
  • Technical University of Catalonia Spain
  • River Publishers
  • CTTC
  • CTIF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 10 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Quantum Cryptography and SimulationProceedings of the 2020 4th International Conference on Cryptography, Security and Privacy10.1145/3377644.3377671(36-41)Online publication date: 10-Jan-2020
  • (2013)Design optimization for quantum communications in a GNSS intersatellite network2013 International Conference on Localization and GNSS (ICL-GNSS)10.1109/ICL-GNSS.2013.6577252(1-6)Online publication date: Jun-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media