|   | 
Details
   web
Records
Author (up) Stucki, D.; Walenta, N.; Vannel, F.; Thew, R.T.; Gisin, N.; Zbinden, H.; Gray, S.; Towery, C. R.; Ten, S.
Title High rate long-distance quantum key distribution over 250 km of ultra low loss fibres Type Journal Article
Year 2009 Publication New J. Phys. Abbreviated Journal
Volume 11 Issue 7 Pages 075003
Keywords SSPD, quantum cryptography, QKD, COW
Abstract We present a fully automated quantum key distribution prototype running at 625 MHz clock rate. Taking advantage of ultra low loss fibres and low-noise superconducting detectors, we can distribute 6,000 secret bits per second over 100 km and 15 bits per second over 250km.
Address
Corporate Author Thesis
Publisher Place of Publication Editor
Language Summary Language Original Title
Series Editor Series Title Abbreviated Series Title
Series Volume Series Issue Edition
ISSN ISBN Medium
Area Expedition Conference
Notes Approved no
Call Number RPLAB @ akorneev @ Serial 610
Permanent link to this record
 

 
Author (up) Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, Ch; Makarov, V.; Leuchs, G.
Title After-gate attack on a quantum cryptosystem Type Journal Article
Year 2011 Publication New J. Phys. Abbreviated Journal
Volume 13 Issue 1 Pages 14
Keywords quantum cryptography; hacking; interception; attack; SPD; APD; QKD
Abstract We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.
Address
Corporate Author Thesis
Publisher Place of Publication Editor
Language Summary Language Original Title
Series Editor Series Title Abbreviated Series Title
Series Volume Series Issue Edition
ISSN ISBN Medium
Area Expedition Conference
Notes Approved no
Call Number RPLAB @ gujma @ Serial 730
Permanent link to this record