Advertisement

Quantum Cryptography over Underground Optical Fibers

  • R. J. Hughes
  • G. G. Luther
  • G. L. Morgan
  • C. G. Peterson
  • C. Simmons
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1109)

Abstract

Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light whose security is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the key transmissions, nor evade detection, owing to Heisenberg’s uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental system with which we are generating key material over 14-km of underground optical fiber. These results demonstrate that optical-fiber based quantum cryptography could allow secure, real-time key generation over “open” multi-km node-to-node optical fiber communications links between secure “islands.”

Keywords

Optical Fiber Quantum Cryptography Noise Rate True Random Number Generation Quantum Cryptography Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    For reviews see R. J. Hughes et al., “Quantum Cryptography,” Contemporary Physics 36, 149 (1995); C. H. Bennett et al., “Quantum Cryptography,” Scientific American 257 no. 10, 50 (1992).CrossRefGoogle Scholar
  2. 2.
    D. Atkins et al., “The Magic Words are Squeamish Ossifrage,” Advances in Cryptology-ASIACRYPT’ 94 Proceedings, Springer-Verlag, 1995, pp.263.Google Scholar
  3. 3.
    S. Wiesner, “Conjugate Coding,” SIGACT News 15, 78 (1983).CrossRefGoogle Scholar
  4. 4.
    C. H. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore (New York, IEEE, 1984).Google Scholar
  5. 5.
    A. K. Ekert, “Quantum Cryptography Based on Bell’s Theorem,” Phys. Rev. Lett. 67, 661 (1991).zbMATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    C. H. Bennett and G. Brassard, “The Dawn of a New Era for Quantum Cryptography: The Experimental Prototype is Working,” SIGACT NEWS 20, no. 4, 78. (1989); C. H. Bennett et al., “Experimental Quantum Cryptography,” J. Crypto. 5, 3 (1992).CrossRefGoogle Scholar
  7. 7.
    C. H. Bennett, “Quantum Cryptography Using Any Two Non-Orthogonal States,” Phys. Rev. Lett. 68, 3121 (1992).zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    P. D. Townsend, J. G. Rarity and P. Tapster, “Single Photon Interference in 10 km Long Optical Fiber Interferometer,” Elec. Lett. 29, 634 (1994); P. D. Townsend, J. G. Rarity and P. Tapster, “Enhanced Single Photon Fringe Visibility in a 10-km Long Prototype Quantum Cryptography Channel,” Elec. Lett. 29, 1291 (1994); P. D. Townsend, “Secure Key Distribution Based on Quantum Cryptography,” Elec. Lett. 30, 809 (1994); C. Marand and P. D. Townsend, “Quantum Key Distribution Over Distances as Long as 30 km,” Opt Lett. 20, 1695 (1995).CrossRefGoogle Scholar
  9. 9.
    A. Muller et al., “Experimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fibre Over More Than 1 km,” Europhys. Lett. 23, 383 (1993); A. Muller, H. Zbinden and N. Gisin, “Underwater Quantum Coding,” Nature 378, 449 (1995); A. Muller et al., “Quantum Cryptography Over 23 km in Installed Under-lake Telecom Fibre,” Europhys. Lett. 33, 335 (1996).CrossRefGoogle Scholar
  10. 10.
    J. D. Franson and H. Ilves, “Quantum Cryptography Using Optical Fibers,” Appl. Optics 33, 2949 (1994).CrossRefGoogle Scholar
  11. 11.
    R. J. Hughes et al., “Quantum Cryptography Over 14 km of Installed Optical Fiber,” Los Alamos report LA-UR-95-2836, invited paper to appear in Proceedings of “Seventh Rochester Conference on Coherence and Quantum Optics,” Rochester, NY, June 1995.Google Scholar
  12. 12.
    C. H. Bennett et al., “Generalized Privacy Amplification,” IEEE Trans. Inf. Theory 41, 1915 (1995).zbMATHCrossRefGoogle Scholar
  13. 13.
    P. C. M. Owens et al., “Photon Counting Using Passively Quenched Germanium Avalanche Photodiodes,” Appl. Optics 33, 6895 (1994); A. Lacaita et al., “Single-Photon Detection Beyond 1μm: Performance of Commercially Available Germanium Photodiodes,” Appl. Optics 33, 6902 (1994).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  • R. J. Hughes
    • 1
  • G. G. Luther
    • 1
  • G. L. Morgan
    • 1
  • C. G. Peterson
    • 1
  • C. Simmons
    • 1
  1. 1.Physics Division, Los Alamos National LaboratoryUniversity of CaliforniaLos AlamosUSA

Personalised recommendations