We present a security analysis against collective attacks for a time–energy entanglement-based quantum key distribution protocol, given the practical constraints of single-photon detector efficiency, channel loss, and finite-key considerations. We find a positive secure-key capacity when the key length increases beyond 10[superscript 4] for eight-dimensional systems. The minimum key length required is reduced by the ability to post-select on coincident single-photon detection events. Including finite-key effects, we show the ability to establish a shared secret key over a 200 km fiber link.United States. Defense Advanced Research Projects Agency. Information in a Photon ProgramUnited States. Army Research Office (Grant W911NF-10-1-0416)Na...
The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} m...
The security of quantum key distribution (QKD) has been proven for different protocols, in particula...
The theoretical existence of photon-number-splitting attacks creates a security loophole for most qu...
Time-energy high-dimensional quantum key distribution (HD-QKD) leverages the high-dimensional nature...
We propose a high-dimensional quantum key distribution (QKD) protocol that employs temporal correlat...
Time-energy high-dimensional quantum key distribution (HD-QKD) leverages the high-dimensional nature...
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate wit...
In recent years, the gap between theory and practice in quantum key distribution (QKD) has been sign...
[[abstract]]© 2005 International Society for Optical Engineering - What obstructs the realization of...
We investigate a class of partially device-independent quantum key distribution protocols based on a...
We present a quantum key distribution system with a 2.5 GHz repetition rate using a three-state time...
Conventional quantum key distribution (QKD) typically uses binary encoding based on photon polarizat...
The channel loss incurred in long-distance transmission places a significant burden on quantum key d...
Quantum key distribution is an application of quantum physics that allows two distant partners to se...
Security proofs of quantum key distribution (QKD) typically assume that the devices of the legitimat...
The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} m...
The security of quantum key distribution (QKD) has been proven for different protocols, in particula...
The theoretical existence of photon-number-splitting attacks creates a security loophole for most qu...
Time-energy high-dimensional quantum key distribution (HD-QKD) leverages the high-dimensional nature...
We propose a high-dimensional quantum key distribution (QKD) protocol that employs temporal correlat...
Time-energy high-dimensional quantum key distribution (HD-QKD) leverages the high-dimensional nature...
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate wit...
In recent years, the gap between theory and practice in quantum key distribution (QKD) has been sign...
[[abstract]]© 2005 International Society for Optical Engineering - What obstructs the realization of...
We investigate a class of partially device-independent quantum key distribution protocols based on a...
We present a quantum key distribution system with a 2.5 GHz repetition rate using a three-state time...
Conventional quantum key distribution (QKD) typically uses binary encoding based on photon polarizat...
The channel loss incurred in long-distance transmission places a significant burden on quantum key d...
Quantum key distribution is an application of quantum physics that allows two distant partners to se...
Security proofs of quantum key distribution (QKD) typically assume that the devices of the legitimat...
The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} m...
The security of quantum key distribution (QKD) has been proven for different protocols, in particula...
The theoretical existence of photon-number-splitting attacks creates a security loophole for most qu...