Practical analysis of decoy method in QKD over underwater optical fiber

Davide Bacco*, Domenico Ribezzo, Mujtaba Zahidy, Claudia De Lazzari, Ilaria Vagniluca, Antoine Petitjean, Gianmarco Lemmi, Tommaso Occhipinti, Francesco Saverio Cataliotti, Leif K. Oxenløwe, André Xuereb, Alessandro Zavatta

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

85 Downloads (Pure)

Abstract

Quantum key distribution (QKD) is the first commercial application of the second quantum revolution. Although QKD systems have already been developed and implemented all around the world, some open challenges are limiting the overall deployment of this technology (limited key rate, limited link distance, etc.). By improving the current QKD protocols, it is possible to increase the final secret key generation rate. In this work, we compare 1-decoy with 2-decoy methods in BB84 protocol over an underwater optical fiber link connecting Malta to Italy, showing that 2-decoy can achieve more than twice the key rate of 1-decoy method.

Original languageEnglish
Title of host publicationQuantum Computing, Communication, and Simulation III
EditorsPhilip R. Hemmer, Alan L. Migdall
Number of pages7
PublisherSPIE - International Society for Optical Engineering
Publication date2023
Article number124460D
ISBN (Electronic)9781510659971
DOIs
Publication statusPublished - 2023
EventSPIE Quantum West 2023 - Moscone center San Francisco, San Francisco, United States
Duration: 28 Jan 20233 Feb 2023

Conference

ConferenceSPIE Quantum West 2023
LocationMoscone center San Francisco
Country/TerritoryUnited States
CitySan Francisco
Period28/01/202303/02/2023
SponsorSPIE
SeriesProceedings of SPIE - The International Society for Optical Engineering
Volume12446
ISSN0277-786X

Keywords

  • Decoy-state method
  • Field-trial experiment
  • Quantum communication
  • Quantum cryptography
  • Quantum key distribution

Fingerprint

Dive into the research topics of 'Practical analysis of decoy method in QKD over underwater optical fiber'. Together they form a unique fingerprint.

Cite this