๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Quantum Cryptography on Optical Fiber Networks

โœ Scribed by Paul D. Townsend


Publisher
Elsevier Science
Year
1998
Tongue
English
Weight
311 KB
Volume
4
Category
Article
ISSN
1068-5200

No coin nor oath required. For personal study only.

โœฆ Synopsis


The security of conventional or classical cryptography systems relies upon ลฝ . the supposed but often unproven difficulty of solving certain classes of mathematical problems. Quantum cryptography represents a new paradigm for secure communications systems since its security is based not on computational complexity, but instead on the laws of quantum physics, the same fundamental laws that govern the behavior of the universe. This paper describes recent progress at BT Laboratories in the development of practical optical fiber-based quantum cryptography systems. These developments include interferometric systems operating in the 1.3-m-wavelength fiber transparency window over point-to-point links up to ; 50 km in length and on multi-user passive optical networks. We describe how this technology performs on fiber links installed in BT's public network and discuss issues such as cross-talk with conventional data channels propagating at different wavelengths in the same fiber. The experimental results are used to make some conclusions about the likely performance parameters and application opportunities for this new technology.


๐Ÿ“œ SIMILAR VOLUMES


Optical fibers for optical networking
โœ James J. Refi ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Institute of Electrical and Electronics Engineers ๐ŸŒ English โš– 394 KB ๐Ÿ‘ 1 views
Optical fiber amplifiers for WDM optical
โœ Yan Sun; Atul K. Srivastava; Jianhui Zhou; James W. Sulhoff ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Institute of Electrical and Electronics Engineers ๐ŸŒ English โš– 448 KB ๐Ÿ‘ 1 views
Quantum cryptography based on interactio
โœ Guang-Can Guo; Bao-Sen Shi ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 47 KB

We present a new quantum key distribution model based on interaction-free measurement. The security against two interceptrresend eavesdropping strategies in ideal channel and device is shown. This scheme is easily implementable in current experiments.