We present a source of states for Quantum Key Distribution (QKD) based on a modular design exploiting the iPOGNAC, a stable, low-error, and calibration-free polarization modulation scheme, for both intensity and polarization encoding. This source is immune to the security vulnerabilities of other state sources such as side channels and some quantum hacking attacks. Remarkably, our intensity modulation scheme allows full tunability of the intensity ratio between the decoy and signal states, and mitigates patterning effects. The source was implemented and tested at the near-infrared optical band around 800 nm, of particular interest for satellite-based QKD. Furthermore, the modularity of the source simplifies its development, testing, and qua...
Popular modern encryption methods are at threat by quantum computing, where quantum algorithms have ...
Quantum key distribution (QKD) has the potential to improve communications security by offering cryp...
The information that is leaked to an eavesdropper during the error reconciliation phase of quantum k...
Quantum communication offers long-term security especially, but not only, relevant to government and...
An important issue in today’s information society is the security of data transmission against poten...
Satellite based Quantum Key Distribution (QKD) in Low Earth Orbit (LEO) is currently the only viable...
The secure distribution of the secret random bit sequences known as key material, is an essential pr...
To implement the BB84 decoy-state quantum key distribution (QKD) protocol over a lossy ground-satell...
To implement the BB84 decoy-state quantum key distribution (QKD) protocol over a lossy ground-satell...
Quantum key distribution (QKD) allows two remote parties to generate secret keys for cryptographic p...
Satellite based Quantum Key Distribution (QKD) in Low Earth Orbit (LEO) is currently the only viable...
Quantum Key Distribution (QKD) will be the first applications for quantum technologies, addressing i...
Cryptography has begun its journey into the field of quantum information theory. Classical cryptogra...
This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) projec...
Quantum key distribution (QKD) is a technology that allows two users to communicate with theoretical...
Popular modern encryption methods are at threat by quantum computing, where quantum algorithms have ...
Quantum key distribution (QKD) has the potential to improve communications security by offering cryp...
The information that is leaked to an eavesdropper during the error reconciliation phase of quantum k...
Quantum communication offers long-term security especially, but not only, relevant to government and...
An important issue in today’s information society is the security of data transmission against poten...
Satellite based Quantum Key Distribution (QKD) in Low Earth Orbit (LEO) is currently the only viable...
The secure distribution of the secret random bit sequences known as key material, is an essential pr...
To implement the BB84 decoy-state quantum key distribution (QKD) protocol over a lossy ground-satell...
To implement the BB84 decoy-state quantum key distribution (QKD) protocol over a lossy ground-satell...
Quantum key distribution (QKD) allows two remote parties to generate secret keys for cryptographic p...
Satellite based Quantum Key Distribution (QKD) in Low Earth Orbit (LEO) is currently the only viable...
Quantum Key Distribution (QKD) will be the first applications for quantum technologies, addressing i...
Cryptography has begun its journey into the field of quantum information theory. Classical cryptogra...
This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) projec...
Quantum key distribution (QKD) is a technology that allows two users to communicate with theoretical...
Popular modern encryption methods are at threat by quantum computing, where quantum algorithms have ...
Quantum key distribution (QKD) has the potential to improve communications security by offering cryp...
The information that is leaked to an eavesdropper during the error reconciliation phase of quantum k...