pith. machine review for the scientific record. sign in

arxiv: 0810.1264 · v4 · submitted 2008-10-07 · 🪐 quant-ph

Recognition: unknown

Field test of a practical secure communication network with decoy-state quantum cryptography

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords communicationnodesquantumwereapplicationcryptographydecoy-statenetwork
0
0 comments X
read the original abstract

We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.