Paper Menu >>
Journal Menu >>
![]() Communications and Network, 2010, 2, 166-182 doi:10.4236/cn.2010.23025 Published Online August 2010 (http://www.SciRP.org/journal/cn) Copyright © 2010 SciRes. CN Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution Fabio Garzia, Roberto Cusani INFOCOM Department, SAPIENZA – Universi t y of Rome , Rome, Italy E-mail: fabio.garzia@uniroma1.it Received March 30, 2010; revised May 7, 2010; accepted J une 1, 2010 Abstract The purpose of this paper is to compare the performance of four passive optical network topologies in im- plementing multi-user quantum key distribution, using 3 protocols proposed by quantum cryptography (B92, EPR, and SSP). The considered networks are the passive-star network, the optical-ring network based on the Signac interferometer, the wavelength-routed network, and the wavelength-addressed bus network. The quantum bit-error rate and sifted key rate for each of these topologies are analysed to determine their suit- ability for providing quantum key distribution-service to networks of various sizes. The efficiency of the three considered protocols is also determined. Keywords: Quantum Cryptography, Quantum Key Distribution 1. Introduction The quantum cryptography term repres ents the s et of the techniques which allow two entities, Alice and Bob, to exchange reserved information by means of a quantum channel. A qu antum ch anne l is an op tic a l channel gover ned by the quantum mechanics. The job in cryptographic field of the quantum mechanics allows results impossible to be obtained with the only mathematics. More precisely, talking about quantum key distribution (QKD) is oppor- tune: the quantum channel is used to transmit a sequence of bits, well known only to Alice and Bob and then able to constitute the secret key of a cryptographic system. Therefore the next communications which are ciphered with such key can be made on a conventional channel (not quantum). Quantum key distribution is a method for securely distributing one-time-use encryption keys that are used for secure communications. These quantum systems are based on the theorem of Heisenberg [1], according to which the measurement of a quantum sys- tem generally perturbs it and gives an incomplete piece of information on his state preceding the measurement, and on the quantum no-cloning theorem [2], which for- bids the perfect copying of two non-orthogonal quantum states. Therefore the quantum nature of a channel makes sure that any interception is noticed. Hence an eavesdropper, Eve, cannot get any information about the communica- tion without i ntroducing pertur bati ons whic h would reveal her presence. To share a secret key, Alice and Bob must follow a protocol (BB84, B92, EPR, SSP). Once developed the procedure requested by the protocol, if any eavesdropper were not noticed, Alice and Bob share a secret key, which exchanged themselves without having to turn to a third reliable part and initially sharing no information, except that the one necessary to authenticate their com- munications part. The frequency used by Alice and Bob to share the sifted secret key is denominated sifted key rate (RSIFT). To reveal the presence of an eavesdropper, Eve, Alice and Bob monitor the quantum bit error rate (QBER). If the QBER exceeds a certain threshold the made communication is just considered as not safe and therefore the secret key is discarded. The security threshold depends on the used protocol. The QBER and the RSIFT are considered the fundamental parameters to evaluate the performances of a quantum channel. This analysis has already been done for BB84 protocol [3]. The purpose of this paper is to extend the mentioned analysis to other three common protocols that are B92, EPR and SSP. The remainder of this paper is organized as follows. Section II provides a review of 3 protocols used in addi- tion to BB84 protocol [3]. Section III outlines the four network topologies to be compared. The security thresh- old for every used protocol is determined in the Section IV. Section V provides a review of the physical princi- ples used for the simulations for each protocol. The re- ![]() F. GARZIA ET AL.167 sults of the comparison of the networks are presented in Sections 7 and 8, after having reported in Section 6 the parameters values employed. This is followed by a re- sults discussion, Section 4, and conclusions, Section5. 2. Protocols 2.1. BB84: First QKD Protocol The first protocol has been proposed in 1984 by Charles H. Bennett and Gilles Brassard [4], hence the name BB84 unde r w hi c h t hi s pr ot o c ol is recognized nowa day s . Alice wants to communicate Bob a bit sequence (qubits). The qubits are encoded with polarized photons. The protocol uses 4 polarization states: 0°, 90°, +45°, –45°. These states are represented in the following way: horizontal |H> , vertical |V>, |45°> and |-45°>, where H≡0° and V≡90°. This states are assembled in 2 non-orthogonal basis : rectilinear (|H> ; |V>) and diago- nal (|+45°> ; |–45°>). The bases are maximally conjugate in the sense that any pair of vectors, one from each basis, has the same overlap: 1/2 . Conventionally, one attributes the binary value 0 to states |H> and |45°>| and the value 1 to the other two states. In the first step, Alice sends individual photon to Bob in states chosen at random between the 4 basic states. Next, Bob measures the incoming photons in one of the two bases, chosen at random. If both Alice and Bob choose the same random basis, then Bob’s meas- urements have a deterministic outcome. If they do not choose the same basis, the outcome of his measurement becomes probabilistic. Once made all the measurements, Bob obtains a bit sequence said raw key. In the second step, Alice and Bob communicate over a public channel to compare the bases in which the qubits were encoded and measured. The qubits that are sent and measured in incompatible bases are discarded. The remaining qubits shared between Alice and Bob form the sifted keys. 2.2. B92 In an article of 1992 Charles Bennett proposed a new protocol, B92 [5,6]. The B92 quantum coding scheme is similar to the BB84 coding scheme but used only 2 out of the 4 BB84 states. It encodes classical bits in two non-orthogonal BB84 states. Since no measurement can distinguish two non-orthogonal quantum states, it is impossible to iden- tify the bit with certainty. Moreover, any atte mpt to learn the bit will modify the state in a noticeable way. This is the basic idea behind the quantum key distribution pro- tocol B92. By contrast to the BB84 case, the B92 coding scheme allows the receiver to learn whenever he gets the bit sent without further discussion with Alice. Since it uses only 2 quantum states, the B92 coding scheme is sometimes easier to implement. However, the security it provides is more difficult to be established in certain experimental settings and very often turns out to be to tally in secu re. Th e polar izatio n en code d version of B92 proceeds as follows for an idealized system. Both the transmitter “Alice” and the receiver “Bob” generate an independent random bit sequence. Alice then transmits her random bit sequence t o Bob using a clocked sequence of linearly polarized individual photons with polarization angles chosen according to her bit values as given by 0° ≡ 0 and 45° ≡ 1. In each time period, Bob makes a polarization measurement on an incoming pho- ton by orientating the transmission axis of his polarizer according to his bit value as given by –45° ≡ 0 and 90° ≡ 1. It can be seen that Bob detect only a photon (with probability one half) in the time slots where h is polarizer is not crossed with that of Alice. We refer to these in- stances as “unambiguous” since when they occur, Alice and Bob can be sure that their polarization settings were not orthogonal and, consequently, that their bit values were the same (both 0 or both 1). Conversely, the instances in which Bob receives no photon are referred to as “ambiguous” since they can arise either from the cases where Alice’s and Bob’s polarisers were crossed or from the cases where the polarisers were not crossed, but Bob failed (with probability 1 /2) to detect a photon. Bob then uses an authen ticated public ch ann el to info rm Alice of the time slots in which he obtained an unambiguous result (1/4 on average) and they use the shared subset of their initial random bit sequences represented by these time slots as a key. In this protocol, whose used values are shown in Ta- ble 1, we see that for the first and fourth bits Alice and Bob had different bit values, so that Bob doesn’t detect any bit in each case. However, for the second and third bits, Alice and Bob have the same bit values and the protocol is such that there is a probability of 50% that Bob detects a bit in each case. Of course, we cannot pre- dict in which of the two cases Bob detects the bit, but in this example he detects only third bit. The B92 protocol is intrinsically less efficient than the given BB84 that, also in ideal conditions (when no bit of the raw key is to be deleted), only 1/4 of the impulses gives a key bits, whil e wi th B B 84 p rot ocol fraction is 1/ 2. Table 1. An example of B92 protocol. Alice’s sequence 1 0 1 0 Alice’s polarization +45° 0° +45°0° Bob’s polarization -45° -45° 90° 90° Bob’s sequence 0 0 1 1 Bob’s bit detected No No Yes No Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL. 168 This inefficiency is the price that Alice and Bob must pay for secrecy. 2.3. Six State Protocol (SSP) The Six State Protocol (SSP) is better well-known as the BB84 with the addi t i on of 2 polarization states. Because of the complex nature of his coefficients, Hilbert space 2-dimensional admits also a third base (cir- cular) conjugate to both the rectilinear and diagonal bases: |0>=(|H>*|0 1 2+i|V>* 1 2) (1) 1| >=(|H>* 1 2-i|V>* 1 2) (2) where i = 1. In the SSP the polarization basis are determined by the Poincarè sphere. Photons’ polarization is seen along the Cartesian axes where x = rectilinear base; y = diagonal base; z = circular base. Thus, Alice sends a state randomly polarized in positive or negative x-, y-, or z-direction to Bob, who measures randomly in the x-, y- or z-basis. As in BB84 they com- municate over a public channel and keep only those cases in which their basis was the same. While two states are enough and four states are stan- dard, a 6-state protocol respects much more the symmetry of the qubit state space. The six states constitute 3 bases; hence the probability that Alice and Bob chose the same basis is only of 1/3. But the symmetry of this protocol greatly simplifies the security analysis and reduces Eve’s optimal information gain for a given error rate QBER. If Eve measures every photon, the QBER is 33%, compared to 25% in the case of the BB8 4 protocol [ 1]. 2.4. EPR The protocols described up to now foresee that Alice sends the photons to Bob, where the state of the photon codifies the value of the bit to be transmitted. In the EPR protocol [7], each of the two parts receives a particle |H>|V> |0> |1> |-45°> |45°> z x y Figure 1. Poincarè sphere. belonging to a couple, produc ed by a third sou rce. Ekert (1991) has devised a quantum protocol based on the properties of quantum correlated particles. Einstein, Podolsk and Rosen (EPR) [7] point out an interesting phenomenon in quantum mechanics. According to their theory, the EPR effect occurs when a pair of quantum mechanically correlated photons, called the entangled photons, is emitted from a source. The entanglement may arise out of conservation of angular momentum. As a result, each photon is in an undefined polarization. Yet, the two photons always give opposite polar izations when measured along the same basis. Since EPR pairs can be pairs of particles separated at great distances, this leads to what appears to be a paradoxical “action at a distance”. For example, it is possible to create a pair of photons (each of which we label below with the subscripts A and B, respectively) with correlated linear polarizations [8]. An example of such an entangled state is given by: (A,B)= (|H>A|V>B – |V>A|H>B)*2 1 (3) Einstein (1935) then states that such quantum correla- tion phenomena could be a strong indication that quan- tum mechanics is incomplete and that there exist “hidden variables”, inaccessible to experiments, which explain such “action at a distance”. Bell [9] gave a means for actually tes ting for local ly hidden variab le (LHV) theor i es . He proved that all such LHV theories must satisfy the Bell inequality. Quantum mechanics has been shown to violate the inequality. The EPR quantum protocol is a 3 state protocol that uses Bell’s inequality to detect the presence or absence of Eve as a hidden variable. We now describe a simplified version of this protocol in terms of the polarization states of an EPR photon pair. An EPR pair is created at the source. One photon of the constructed EPR pair is sent to Alice, the other to Bob. Alice and Bob at random with equal probability separately and independently measure their respective photons. Alice chooses randomly one of the three measurement directions indicated in Figure 2 whereas Bob chooses a set of directions rotated by 45 [10]. Alice records her measured bit. On the other hand, Bob records the complement of his measured bit. This z x (a) (b) Figures 2. (a) Alice’s directions of measurement; b) Bob’s directions of measurement. Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL.169 procedure is repeated for as many EPR pairs as needed. Alice and Bob carry on a discussion over a public channel to determine the correct bases they used for measurement. Each of them then separates its respective bit sequences into two sub-sequences. One subsequence, called raw key, consists of those bits at which they used the same basis for measurement. The other subsequence, called rejected key, consists of all the remaining bits. Unlike the BB84 and B92 protocols, the EPR protocol, instead of discarding rejected key, actually uses it to detect Eve’s presence. Alice and Bob now carry on a discussion over a public channel comparing their respec- tive rejected keys to determine whether or not Bell’s inequality is satisfied. If it is, Eve’s presence is detected. If not, then Eve is absent. In this way the probability that they happen to choose the same b asis is r educed from 1/2 to 2/9 [1], but at the same time as they establish a key they collect enough data to test Bell inequality. 3. Topologies of Multi-User QKD Networks The first experimental implementation of QKD occurred in 1989 [11], when encryption keys were transmitted through 30 cm of air using polarization-encoded photons. It was shown that the use of orthogonal states on more than 10 km of optical fibre is impossible, according to the characteristics of the sources available at present [2, 12]. To allow transmissions at distances always longer, it is therefore necessary the use of systems different from the ones used before. In particular when using an inter- ferometer we can encode qubits in an interferometric phase state. For example we explain the implementation of BB84 using an interferometer. Alice encodes the photons with her phase modulator (PM) by randomly choosing one of four phase shifts: 0 and correspond to one basis set and /2 and 3/2 correspond to another basis set. She associ- ates 0 and /2 with qubit 0, and and 3/2 with qubit 1. Bob makes his measurement by randomly choosing be- tween a 0 or /2 phase shift. Only photons with a final phase shift of 0 or (the difference of Alice’s and Bob’s phase shifts) can interfere in Bob’s interferometer to produce a deterministic outcome. Any final phase shift /2 or 3/2 leads to a probabilistic outcome. Thus, whenever Bob measures correctly, qubit 0 is routed to Detector 1 (Det1) and qubit 1 to Detector 2 (Det2). Since Bob’s measurement consists of a random choice of basis, half of the measurement results is probabilistic. Therefore, after the qubit transmission, Bob confers with Alice about the appropriate basis choice. Any qubit measured in an incompatible basis is discarded and does not be- come part of the final key. This process creates the sifted key. Now we introduce the four QKD network topologies to be compared [3]. These networks phase-encode the qubits in optical fibre interferometers. The optical-ring network uses a Signac interferometer; all other topologies are implemented with unbalanced Mach–Zehnder inter- ferometers (MZIs). The unbalanced MZI is a modifica- tion of the standard MZI with improved interference sta bility. This improved stability comes at the expense of a 3-dB loss, since half of the photons transmitted through it are lost in the non-interfering path combinations of the interferometer [1]. This makes networks that use the unbalanced MZIs more loss, thus lowering their sifted key rate and increasing their QBER. The single-photon sources used in the network topologies and in the calcu- lations are modelled as highly attenuated laser pulses that are typically used in practice and contain an average of 0.1 photon per pulse. The single-photon detectors are also modelled as the response of gated avalanche photo- diodes operated in Geiger mode [13]. In general, Alice is defined as the user that provides the qubit information in the four bases, and Bob is de- fined as the user that chooses between the two non- thogonal basis sets. For the passive-star (Figure 3), wavelength-routed (Figure 5), and wavelength-addressed bus (Figure 6) topologies, Alice is the network controller. TA TA TA PM PLS Alice 1 x N Splitter PM Det 1 Det 2 Dan Bob Chris N-th user Figure 3. Network topology of passive -star multi-user QKD network. (PLS: Pulsed laser source; TA: tuneable attenu- ator; PM: phase modulator; Det: detector.). TA PLS Circulator Coupler Det 1 Det 2 Bob Alice 1 Alice 2 Alice N PM Alice 3 PM CW CCW Figure 4. Network topology of optical-ring multi-user QKD network base d on Signac interferometer. Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL. 170 TA TA TA PM Tunable PLS Alice AWG PM Det 1 Det 2 Dan( 3 ) Bob ( 1) Chris( 1) N-th user( N ) Figure 5. Network topology of wavelength-routed multi- user QKD network. (AWG: arrayed-waveguide grating). TA TA TA PM Tunable PLS Alic e GGG PM Det 1Det 2 Bob PM Det 1Det 2 Chris PM Det 1Det 2 N-th user 12N Figure 6. Network topology of wavelength-addressed bus multi-user QKD network. (G: fibre Bragg grating). She is equipped with an unbalanced MZI, a pulsed laser source (PLS), a tuneable attenuator (TA), and a four -stat e PM. The users at the receiving end (Bob, Chris, Dan, N-th user) choo se between the two non-o r thogon al bases. Each one of them has another unbalanced MZI, a two-state PM, and a pair of single-photon detectors (Det1 and Det2). The optical-ring network (Figure 4) is sig- nificantly different from the others. Here, Bob is the network controller and services multiple Alice. Bob’s setup consists of a laser source, two detectors, a two-state PM, and a circulator. Each Alice only possesses a four-state PM. 3.1. Passive-Star Network The topology of the passive-star QKD network is shown in Figure 3 [3]. A passive-star QKD network was first demonstrated to connect four users over 5.4 km of opti- cal fibre [14]. This topology is an extension of the two-user system, with Alice linked to receivers through a 1xN splitter. Due to the indivisible nature of the photon, each photon is randomly routed to a single user by the 1xN splitter. This topology can be easily implemented but suffers from the effective loss induced by the 1 splitter, which reduces the probability of photons to reach the detectors of any particular user. This reduction scales inversely as the number of users on the network. For example, a three-user network having a 1x2 splitter reduces the probability that a photon reach the desired receiver by one half and consequently acts as a 3-dB attenuator. A 17-user network containing a 1x16 splitter acts effectively like a 12-dB attenuator, and so on. Al- though this drawback can be partially mitigated by higher initial qubit rates, the routing of the photons to each user is inherently nondeterministic. For example, the mean detection rate at each user after a 1xN splitter is 1/Nth of the detection rate of a single Bob without the 1xN splitter. However, since the routing of photons to each user through the 1xN splitter is random, at any given time, some users receive photons at a rate above the mean detection rate of 1/Nth, and some users receive photons at a rate below the mean detection rate. This nondeterministic detection rate constrains the design of secure quantum networks by limiting the amount of in- formation that can be securely encrypted. 3.2. Optical-Ring Network Based on Signac Interferometer Figure 4 shows the schematic diagram of the optical- ring network topology. A two-user QKD system based on the optical fibre Signac interferometer has been demon- strated [15]. This topology is significantly different from the topologies based on the unbalanced MZIs: the single- photon pulse en ters the Signac interferometer throug h an optical circulator. This pulse splits into two parts in the 50/50 coupler, and each travels around the Signac loop in clockwise (CW) and counter clockwise (CCW) direc- tions, respectively. Any user on the loop that is commu- nicating with Bob modulates the pulse travelling in the CW direction. Bob modulates the pulse travelling in the CCW direction. The position of Bob’s PM is important since the pulse that it modulates must be returning from its round trip in the loop in order to prevent any informa- tion about Bob’s modulation choice from travelling through the loop. A timing and control mechanism must also be established so that only one Alice can modulate the photon at a time. Upon travelling around the loop, the pulses interfere in the coupler and enter one of two pho- ton detectors. Photons enter Detector 1 (Det1 in Figure 4) when they experience a phase shift between the CW and CCW pulses inside the Signac interferometer. On the other hand, they enter Detector 2 (Det2 in Figure 4) when they experience a 2 phase shift between the CW and CCW pulses inside the Signac interferometer. The Signac interferometer has the advantage of being free from thermal fluctuations since the counter propagating pulses pass through the exact same fibre paths inside the Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL.171 loop. Another potential advantage is that each user on the network, except Bob, contains only a single-PM and no photon detectors. This can simplify any deployment of a secure ring network using the Signac because Bob is the only user that requires the single-photon detectors. 3.3. Wavelength-Routed Network The schematic diagram of the wavelength-routed net- work topology is depicted in Figure 5 [3]. This topo logy is implemented with unbalanced MZIs and is very similar in layout to the star network. The greater difference is that Alice has the ability to control which user receives the photons by employing a wavelength-routing scheme. Alice is equipped with a wavelength tuneable pulsed laser source (PLS) and the receivers are assigned their own wavelength channel. Alice transmits to a particular user by tuning her source to that user’s wavelength and the photons are routed via an arrayed waveguide grating (AWG). The advantage of this topology is that the inser- tion loss of the AWG is approximately uniform regard- less of the number of channels. Theoretically, the num- ber of users that this type of network supports is limited only by the channel spacing of the AWG and the band- width of the fibre. In addition, the single-photon detec- tors must be sensitive for the entire range of frequencies used in the network. This is not a concern as avalanche-photodiode (APD)-based single-photon de- tectors respond to a much broader spectrum than the band of wavelengths use d in multi-wavelength networks. Due to the principles of quantum mechanics described above, it is impossible for the spy Eve to gain perfect knowledge of the quantum state sent from Alice to Bob. Nevertheless, she can acquire some knowledge. Without interaction of a spy, each two-level quantum system carries 1 bit of information from Alice to Bob. When Eve gets hold of part of this information, she cannot prevent causing a disturbance to the state arriving at Bob’s side, and thus introducing a non-zero error rate. In principle, Bob can find out about this error rate and thus about the existence of a spy by communicating with Alice. The source for Eve’s knowledge is measurements performed on the signals (quantum states). The simplest eavesdrop- ping attack (intercept/resend) for Eve would be to meas- ure each signal just as Bob would do, and then to resend a signal to Bob which corresponds to the measurement result. Further we always have some detector noise, misalignments of detectors and so on. It should be pointed out that we cannot even in principle distinguish errors due to noise from errors due to eavesdropping activity. We therefore assume that all errors are due to eavesdropping. Another issue, not discussed here, is that of statistics. Eavesdroppers can be lucky: they create errors only on average, so in any specific realization the error rate might be zero (with probability exponentially small in the key length, of course). We are guided by the idea that a small error rate, for example 1 %, implies that an eavesdropper was not very active, while a big error rate is the signature of a serious eavesdropping attempt. But what is the meaning of “small” and “big”? From an information theoretic point of view, the natural measure of “knowledge” about some signal is represented by the Shannon information. It is measured in bits and can be defined for any two parties, the sender of the signal and the observer (receiver). In general terms, the knowledge of the observer consists of obtained measurement results and any additional gathered knowledge, like the an- nounced basis of signals in the BB84 protocol. 3.4. Wavelength-Addressed Bus Network The wavelength-addressed bus network is also based on the unbalanced MZI setup and it is shown in Figure 6 [3]. Like the wavelength-routed network, this network also allows Alice to route her photons to a desired user by tuning the photons to be desired wavelength. In such a system, Alice is equipped with a tuneable PLS, and each receiver is assigned its own wavelength channel. Alice selects an intended receiver by tuning her source to that user’s wavelength and transmits the encoded photons along the bus. The receivers are connected to the bus line through a fibre Bragg grating (G), which allows them to retrieve on ly the pho ton s, in tend ed for them. Th ese grating s are designed to reflect photons of a specific wavelength to a given user and transmit all others. The network accommodates multiple users by placing several fibre Bragg gratings in series along the bus. One of the merits of this topology is that it can be easily expanded to accommodate more users by simply tapping the bus and inserting a suitable grating. 4. Security Threshold The QBER, which is indicative of the security and post-error-correction net key rate, is useful for assessing the performance of the network. High QBER values in QKD systems lower the net key rate during the error correction stage of the protocol [1]. In addition, high QBER allows an eavesdropper to gain more information about the transmitted keys at the expense of the legiti- mate receiver. It has been shown that for QBERs above a security threshold, an eavesdropper can actually gain more information than the legitimate receiver. If this happens, it is not possible to use any privacy-amplification technique. Therefore, when designing a QKD network, it is necessary to ensure that the baseline QBER is below this security threshold so that privacy amplification strategies may be used to eliminate any knowledge Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL. 172 gained by Eve [1]. For QBERs under this threshold (QBERT), the Shannon information between Alice and Bob (IAB) is higher than that in Eva’s possession (IE ), while for superior values that of Eva is greater: QBER < QBERT I AB > IE (4) QBER > QBERT I AB < IE (5) Bounds on the obtainable Shannon information for eavesdropping on single bits can be found in the litera- ture for different protocols. Fuchs et al. give bounds for the BB84 [16] and the B92 protocol [17]. A bound for the Six State Protocol was also obtained [18]. These bounds are illustrated in Figures 7–9 for each of used protocol. Note the trade-off between Eve’s information gain and the disturbance she causes: more information for Eve means higher error rate for Bob. For reasonably low error rates Eve’s maximal information is smallest in the six-state protocol, as it uses the largest ensemble of input states. Figure 7. Shannon Information (in normalized units) with B92 protocol. Figure 8. Shannon Information (in normalized units) with SSP. Figure 9. Shannon Information (in normalized units) with EPR protocol. Furthermore comparing Eva’s Shannon Information with the Shannon information between Alice and Bob, we are able to determinate the threshold for the QBER for each of the used protocols. 4.1. B92 Security Threshold for B92 protocol is: QBERT 14% (6) 4.2. SSP Security Threshold for the Six State Protocol is: QBERT 17% (7) 4.3. EPR Security Threshold for EPR protocol is: QBERT 15% (8) 5. Key Parameters in QKD QBER and RSIFT are two parameters used to gauge the performance of network topologies which offer QKD service. The QBER and sifted key rate equations that are used in the simulations are reviewed in this section. More detailed discussions on the physical principles underlying these equations are provided in references [1] and [19]. The sifted keys are those keys shared by Alice and Bob when they make compatible basis choices [19]: RSIFT = q RRAW (9) RRAW = fREP tLINK (raw key rate) (10) where q depends on protocol (for example, in BB84 pro- tocol q = 1/2 because half of the time Alice and Bob bases are not compatible), fREP is the repetition frequency, µ is the average number of photons per pulse, tLINK is the Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL.173 transmission coefficient of the link and is Bob’s detec- tion efficiency. The transmission coefficient is related to the loss lF (in dB per km) and length L (in km) of the fibre, the loss due to the number of users lN(N) (in dB), and the topology selected, by tLINK = 10/ 10 TNF lNlLl (11) The topology choice introduces a topology loss con- stant lT (in dB) that is an overhead of loss involved in working with a particular topology. This quantity is con- stant regardless of a network’s fibre length and number of users. The topology loss has 4 components: end-user losses arising from losses in the receiver’s interferometer, routing loss caused by the device that selects the user that receives the photon, the non-interfering path combi- nation loss in the unbalanced MZIs (for those topologies that use them), and miscellaneous losses, such as those caused by connectors and splices. The QBER is defined as the number of wrong bits of the total number of received bits and is normally in the order of a few percent. In the following we use it ex- pressed as a function of rates [1]: SIFT error errorSIFT error R R RR R QBER (12) One can distinguish three different contributions to RERROR. The first one arises because of photons ending up in the wrong detector, due to imperfect interference or polarization contrast. The rate ROPT is given by the product of the sifted key rate and the probability POPT of a photon going in the wrong detector: ROPT = RSIFT POPT (13) This contribution can be considered, for a given set-up, as an intrinsic error rate indicating the suitability to use it for QKD. Imperfect phase matching in the interferometer s results in reduced fringe visibilities that lead to an increased probability of routing photons to the wrong detectors. The probability of this type of error POPT is related to the fringe visibility (V) by: POPT = 2 1V (14) The second contr ibution, RDARK, arises from the detec- tor dark counts (or from remaining environmental stray light in free space setups). This rate is independent of the bit rate and depends only on the characteristic of the photon counter [13]. Of course, only dark counts falling in a short time window when a photon is expected give rise to errors: RDARK = k fREP PDARK (15) where PDARK is the probability of registering a dark count per time-window and per detector, and the k factor is related to the fact that a dark count has a k % chance to happen with Alice and Bob having chosen incompatible bases (thus eliminated during sifting). Finally error counts can arise from uncorrelated photons, because of imperfect phot on sources: RACC = 2 1fREP tLINK PACC (16) This factor appears only in systems based on entangled photons, where the photons belonging to different pairs, but arriving in the same time window, ar e no t necessar ily in the same state. The quantity PACC is the probability to find a second pair within the time window, knowing that a first one was created. The QBER can now be expressed as follows: SIFT ACCDARKOPT R RRR QBER (17) 6. Parameter Values The results are based on calculations assuming the following parameter values, which are held constant for each topology [1,13,14,20,21] : Pulse repetition rate (fREP) 1 MHz Mean number of photon per p ulse ( ) 0.1 Detector efficiency @1310 nm ( ) 20% Detector efficiency @1550 nm ( ) 10% Dark count probability (PDARK ) 10-5 Fringe visibility (V) 98% The transmission coefficient link tLINK varies from one topology to another. The values used in the simulations that contribute to tLINK are outlined for each topology in Table 2. In the table the contributions to the topology losses are also shown; namely, the end- user loss, routing loss, non-interfering path combination loss, and miscel- laneous loss. The end-user loss arises from the excess loss in the couplers and PM in the receiver’s interferometer. Routing loss is th e lo ss in th e dev ic e th a t rou tes the phot ons to each user. In the star, wavelength-routed, and bus networks, which are all based on the unbalanced MZI design, a 3-dB loss arises from non-interfering path combinations. The miscellaneous loss stems from losses Table 2. Losses contributing to the transmission coefficient tLINK for the 4 considered network topologies. Loss SourceStar Ring W.RoutedBus Topology Loss End User Loss (dB) Routing Loss (dB) N on interfer. path Loss (dB) Miscellaneous Loss (dB) 0.3 0.1 3.0 1.0 0.49 0.0 0.0 1.0 0.3 3.0 3.0 1.0 0.3 0.02 3.0 1.0 Total Topology Loss (dB)4.4 1.49 7.34.32 Fiber Loss (dB/km)0.35 @ 1310 nm 0.25 @ 1550 nm User number Loss ( dB)10log(N) 0.1N 00.2(N-1) Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL. 174 such as those due to connectors, splices, and imperfections in the network all of which occur in practical optical network setups. Now we are able to analyse the QBER and the RSIFT for every QKD protocol considered previously. The results of QBER for each topology are presented in sur- face plots which relate the QBER to the number of users and distance. The term “distance” is defined as the total fibre length used in the transmission of the photons. For the optical ring, it is the total length of the Signac loop. For all the other topologies, it is the total fibre length spanning Alice and Bob (or Chris, Dan, etc.). The system performances at the 1310-nm and 1550-nm telecommu- nications wavelength windows are shown in the results. The shaded regions in the QBER surface plots corre- spond to the combinations of distance and number of network users for which the QBER is less than QBERT. This threshold, previously mentioned in section IV, is the value below which secure key distribution can be per- formed on the network. Thus, the shape and area of the shaded regions allow one to easily determine the suit- ability of a given topology to support a given number of users. In addition, these plots also serve to show a net- work’s sensitivity to expanding the number of users. 7. QBER Performance 7.1. B92 As previously explained in section 2.2, B92 protocol is intrinsically less efficient than the given BB84 where, also in ideal conditions (when no bit of the raw key is to be deleted), only 1/4 of the impulses gives a key bits, while with BB84 this protocol fraction is 1/2. This in- efficiency is the price that Alice and Bob must pay for secrecy. RSIFT = 4 1RRAW =4 1 f REP tLINK (18) ROPT =4 1 f REP tLINK POPT (19) where POPT = 2 1V= 0.01 = 1% (20) since fringe visibility is 98%. RDARK = 2 1 f REP PDARK (21) The 3-D QBER surface of the four topologies using a carrier wavelength of 1310 nm is illustrated in Figure 10, and the 3-D QBER surface at 1550 nm is illustrated in Figure 11. Table 3 and Ta ble 4 summarize the informa- tion obtained from Figure 10 and Figure 11. 7.2. SSP As previously explained in Subsection 2.3, the six states (a) (b) (c) (d) Figure 10. B92-protocol topologies at 1310 nm. QBER sur- face as a function of users and distance. Users range: 2-128 users. Distance range: 0- 80 km. QBER<14% in shaded re- gion. (a) Passive Star B92 1310 nm; (b) Optical Ring B92 1310 nm; (c) Wavelength-routed B92 1310 nm; (d) Wave- length-addressed bus B92 1310 nm. Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL.175 (a) (b) (c) (d) Figures 11: B92-protocol, topologies at 1550 nm. QBER surface as a function of users and distance. Users range: 2-128 users. Distance range: 0-80 km. QBER<14% in shaded region. (a) Passive Star B92 1550 nm; (b) Optical Ring B92 1550 nm; (c) Wavelength-routed B92 1550 nm; (d) Wavelength-addressed bus B92 1550 nm. Table 3. B92-protocol Maximum number of users sup- ported by every topology at different distance for QBER <14%. Distance (km) Star 1310 nm / 1550 nm Ring 1310 nm / 1550 nm W.routed 1310 nm / 1550 nm Bus 1310 nm / 1550nm 10 32/20 >128 / >128 >128/ >128 76/66 20 14/11 >128 / >128 >128/ >128 59/54 30 6/6 110/ 110 >128/ >128 41/41 40 2/3 75/85 >128/ >128 24/29 50 1/2 40/60 0/>128 6/ 16 60 0/1 5/35 0/0 0/4 70 0/0 0/10 0/0 0/0 80 0/0 0/0 0/0 0/0 Table 4. B92-protocol Maximum distance (km) supported by every topology for various number of users for QBER<14% . Number of users Star 1310 nm / 1550 nm Ring 1310 nm / 1550 nm W.routed 1310 nm / 1550 nm Bus 1310 nm / 1550 nm 20 15/10 55/66 44/50 42/47 40 7/0 50/58 44/50 31/31 60 2/0 44/50 44/50 19/15 80 0/0 38/42 44/50 8/0 100 0/0 32/34 44/50 0/0 120 0/0 27/26 44/50 0/0 constitute 3 bases, hence the probability that Alice and Bob chose the same basis is only of 1/3. This means that to determinate the sifted key, that Alice and Bob can share, an average of 2/3 of the received bits must be dis- carded. But the symmetry of this protocol greatly simpli- fies the security analysis and reduces Eve’s optimal information gain for a given e rro r rate QBER . RSIFT = 3 1RRAW =3 1 f REP tLINK (22) ROPT =3 1 f REP tLINK POPT (23) where POPT = 2 1V = 0.01 = 1%, since fringe visibility is 98%. RDARK = 3 2 f REP PDARK (24) The 3-D QBER surface of the four topologies using a carrier wavelength of 1310 nm is illustrated in Figure 12, and the 3-D QBER surface at 1550 nm is illustrated in Figure 13. Table 5 and Table 6 summarize the informa- tion obtained from Figure 12 and Figure 13. 7.3. EPR As previously explained in Subsection 2.4, in the EPR protocol, each of the two parts (Alice and Bob) receives a particle belonging to a couple, produced by a thirsource. Because this source is not perfect, it could generate Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL. 176 (a) (b) (c) (d) Figures 12. SSP, topologies at 1310 nm. QBER surface as a function of users and distance. Users range: 2-128 users. Distance range: 0- 80 km. QBER<17% in shaded region. (a) Passive Star SSP 1310 nm; (b) Optical Ring SSP 1310 nm; (c) Wavelength-routed SSP 1310 nm; (d) Wavelength-ad- dressed bus SSP 1310 nm. Table 5. SSP. Maximum number of users supported by every topology at different distance for QBER <17%. Distance (km) Star 1310 nm / 1550 nm Ring 1310 nm / 1550 nm W.routed 1310 nm / 1550 nm Bus 1310 nm / 1550 nm 10 34/21 >128 / >128 >128 / >128 78/68 20 15/12 >128 / >128 >128 / >128 60/55 30 6/6 113 /113 >128 / >128 43/43 40 3/3 78 /88 >128 / >128 25/30 50 1/2 43 /63 0/ >128 8/18 60 0/1 8 /38 0/0 0/5 70 0/0 0 /13 0/0 0/0 80 0/0 0/0 0/0 0/0 Table 6. SSP. Maximum distance (km) supported by every topology for various number of users for QBER<17%. Number of users Star 1310 nm / 1550 nm Ring 1310 nm / 1550 nm W.routed 1310 nm / 1550 nm Bus 1310 nm / 1550 nm 20 16/11 56/67 45/52 43/48 40 8/0 50/59 45/52 31/32 60 3/0 45/51 45/52 20/16 80 0/0 39/43 45/52 9/0 100 0/0 33/35 45/52 1/0 120 0/0 28/27 45/52 0/0 uncorrelated photons that generate error counts (RACC). The photons belonging to different pairs, not necessarily in the same state, could arrive in the same time window with probability PACC. Furthermore the EPR protocol, instead of discarding rejected key, actually uses it to detect Eve’s presence. By a discussion over a public channel, Alice and Bob compare their respective rejected keys to determine whether or not Bell’s inequality is satisfied. If it is, Eve’s presence is detected. If not, then Eve is absent. In this way the probability that they happen to choose the same basis is reduced from 1/2 to 2/9 [1], but at the same time as they establish a key they collect enough data to test Bell inequality. RSIFT = 9 2RRAW =9 2 f REP tLINK (25) ROPT =9 2 f REP tLINK POPT (26) where POPT = 1%. RDARK = 9 7 f REP PDARK (27) RACC = 2 1fREP tLINK PACC (28) Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL.177 PACC = 2 1 2 = 000.5 (29) The 3-D QBER surface of the four topologies using a carrier wavelength of 1310 nm is illustrated in Figure 14, and the 3-D QBER surface at 1550 nm is illustrated in Figure 15. Tabl e 7 and Table 8 summarize the informa- tion obtained from Figure 14 and Figure 15. 8. RSIFT Performance To be able to make more visible the difference between the various topologies, we compare the sifted key rate of each topology as a function of distance for 4, 32, 64, 128 users. They were obviously assembled for every used protocol. The Sifted Key Rate performances of the four network topologies are the same for each used protocol. We use a grading system ranging from 1–4, where 1 indicates the network topology with the best performance, and 4 indi- cates the network topology with the worst performance, to summarize the results of the comparison of the sifted key rate performance of the network topologies. This is shown in Table 9. Another observation that is made is the distance (30 km) that the 1550- and 1310-nm sifted key rate lines for a particular network cross each other. This distance, which we conveniently call th e crossover distance, is the same for all four topologies and determines when the sifted key rate v alues at 1550 nm are greater or less than the key rates at 1310 nm. For distances less than the crossover distance, the sifted key rate values at 1310 nm are always greater than at 1550 nm. The situation reverses for distances beyond the cross- over distance so that the sifted key rate values at 1550 nm become greater. 9. Results Discussion Passive star network, that at first glance appears to be the easiest to implement, turns out to be the wor st net topology because: 1) supports the smallest number of users for any given distance; 2) is very sensitive to change in the distance and/or in number of the users; 3) has the lowest RSIFT . Furthermore it requires each user to have their own interferometer and photo-detectors. From this point of view, the ring topology is the simpler design, requiring each user to have only one four-state. Optical ring network is characterized from: 1) higher stability against polarization and phase fluctuations than the other three topologies since each pulse travels through the same fibre length in both the CW and CCW directions [2 2] ; (a) (b) (c) (d) Figure 13. EPR- protocol, topologies at 1310 nm. QBER surface as a function of users and distance. Users range: 2-128 users. Distance range: 0-80 km. QBER < 15% in shaded region. (a) Passive Star EPR 1310 nm; (b) Optical Ring EPR 1310 nm; (c) Wavelength-routed EPR 1310 nm; (d) Wavelength-addressed bus EPR 1310 nm. Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL. 178 (a) (b) (c) (d) Figure 14. EPR- protocol, topologies at 1550 nm. QBER surface as a function of users and distance. Users range: 2-128 users. Distance range: 0-80 km. QBER < 15% in shaded region. (a) Passive Star EPR 1550 nm; (b) Optical Ring EPR 1550 nm; (c) Wavelength-routed EPR 1550 nm; (d) Wavelength-addressed bus EPR 1550 nm. Table 7. EPR-protocol Maximum number of users sup- ported by every topology at different distance for QBER < 15%. Dis- tance (km) Star 1310 nm /1550 nm Ring 1310 nm /1550 nm W.routed 1310 nm / 1550 nm Bus 1310 nm /1550 nm 10 3/1 79 / 58 >128/ >128 26/16 20 1/1 44 / 33 0/ 0 8/3 30 0/0 9/9 0/ 0 0/0 40 0/0 0/0 0/0 0/0 50 0/0 0/0 0/0 0/0 60 0/0 0/0 0/0 0/0 70 0/0 0/0 0/0 0/0 80 0/0 0/0 0/0 0/0 Table 8. EPR-protocol Maximum distance (km) supported by every topology for various number of users for QBER < 15%. Number of users Star 1310 nm / 1550 nm Ring 1310 nm / 1550 nm W.routed 1310 nm / 1550 nm Bus 1310 nm / 1550 nm 20 0/0 26/25 15/10 13/7 40 0/0 21/17 15/10 2/0 60 0/0 15/9 15/10 0/0 80 0/0 9/1 15/10 0/0 100 0/0 4/0 15/10 0/0 120 0/0 0/0 15/10 0/0 Table 9. Comparison of the Sifted Key Rate performance for the 4 network topologies. Number of users Passive star Optical ring W.routed Bus 4 4 1 3 2 32 4 1 2 3 64 4 1 1 3 128 3 2 1 4 2) lowest structure loss (1.49 dB, Table2); 3) lowest QBER with less than 64 users; 4) highest Sifted Key Rate with less than 64 us ers 5) being more susceptible to Trojan horse attacks than systems based on the unbalanced MZI [3]. Wavelength ne twork: 1) is the most suitable for networks with more than 64 users, because its Sifted key Rate is independent of the number of users on the network; 2) it may not be the best choice for networks that are not expected to expand beyond 64 users because since it has the highest structure loss (7.3 dB). Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL.179 Figure 15. B92-protocol Sifted Key Rate versus distance for 4, 32, 64, 128 users. Figure 16. SSP. Sifted Key Rate versus distance for 4, 32, 64, 128 users. Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL. 180 Figure 17. EPR-protocol. Sifted Key Rate versus distance for 4, 32, 64, 128 users. Wavelength-addressed-bus network: 1) is the most favourable for networks with less than 20 users because it can be easily expanded and has moderate structure loss (4.32 dB); 2) is unadvisable for networks with large number of users because it has a higher per-user loss than the ring network. It has also been shown that there is a crossover dis- tance (30 km) that determines the optimum wavelength (1310 or 1550 nm) to use in the QKD network. About QKD analyzed protocol only B92 and SSP turned out the most efficient. The EPR protocol is the less efficient. The difficulty to handle couples of particles without changing their correlation does no t allow to obtai n high performances. The results obtained at the moment are the least encouraging for all the four net topologies. The maximum reachable distance was of 30 km with 9 user maximum using the Optical-Ring topology. Only for distances lower than 10 km it is possible to obtain sufficient performances avoiding however the Passive-Star topology. Six States Protocol and the B92 present praiseworthy results. The B92 is the protocol of QKD more used and allows to make less communications on public channel. Six State Protocol prevails on everybody because, having a security threshold of 17%, allows to have a high number of users also beyond the 60 km, furthermore it has the fastest Sifted Key Rate. Commonly used technologies and techniques have been applied in order to evaluate the performances (QBER and Sifted Key Rate). To avoid that Eva can take some photons and measure their polarization without disturbing the one of the photons which arrives to Bob, it was considered an attenuation of the transmitted radia- tion, obtaining an average 0.1 photons per impulse. Commonly used technologies and techniques have been applied in order to evaluate the performances (QBER and Sifted Key Rate). Furthermore we considered pho- ton-detectors with efficiency of 10% at 1550 nm and 20% at 1310 nm. Obviously, this choice implies a non- neglectable reduction of the performances, but this com- promise solution has been chosen to operate a more realistic analysis. Technological improvements in single-photon detectors are able to reduce the number of photons lost and therefore to increase the system performances. 10. Conclusions In this paper the performances of four passive optical network topologies in implementing multi-user QKD, using 3 protocols proposed by quantum cryptography (B92, EPR, and SSP) have been compared. The QBER and sifted key rate for each of these topologies have been analysed to determine their suitability for providing service to networks of vari ous sizes. Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL.181 11. References [1] N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, “Quan- tum Cryptography,” Reveiw of Modern Physics, Vol. 2, Septemner 2001, pp. 1-57. [2] W. K. Wootters and W. Zurek, “A Single Quantum Can- not be Cloned,” Nature, Vol. 299, London, 1982. pp. 802-803. [3] P. Kumavor, A. Beal, S. Yelin, E. Donkor and B. Wang, “Comparison of Four Multi-user Quantum Key Distribu- tion Schemes Over Passive Optical Networks,” Journal of Lightwave Technology, Vol 23, No.1 January 2005, p.268. [4] C. H. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” IEEE Conference on Computers, Systems Signal Processing, Bangalore, 1984. [5] C. Bennett, “Quantum Cryptography Using Any Two Non-orthogonal States,” Physical Review Letter, Vol. 68, 1992, p. 3121, [6] K. J. Gordon, V. Fernandez, P. D. Townsend and G. S. Buller, “A Short Wavelength Giga Hertz Clocked Fiber-Optic Quantum Key Distribution System,” IEEE Journal of Quantum Electronics, Vol 40, No7, July 2004, pp. 900-908. [7] A. Einstein, B. Podolsky and N. Rosen, “Can Quantum- Mechanical Description of Physical Reality be Considered Complete,” Physical Review, Vol. 41, May 1935, p. 777. [8] M. M. Ishtiaq Khan and M. Sher, “Protocols for Secure Quantum Transmission: A Review of Recent Develop- ments,” Pakistan Journal of Information and Technology, Vol. 2, No. 3, 2003, pp. 265-276. [9] J. Bell, “On the Einstein, Podolsky, Rosen Paradox,” Physics, Vol. 1, 1964, pp. 195-200. [10] D. Bruß and N. Lutkenhaus, “Quantum Key Distribution: From Principles to Practicalities,” Vol. 2, September 1999. [11] C. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, “Experimental Quantum Cryptography,” Journal of Cryptography, Vol. 5, No. 1, 1992, pp. 3-28. [12] A. Muller, J. Breguet and N. Gisin, “Experimental Demonstration of Quantum Cryptography Using Pola- rized Photons in Optical Fiber Over More Than 1 km,” Europhysics Letter, Vol. 23, 1993, pp. 383-388. [13] D. Stucki et al., “Photon Counting for Quantum Key Distribution with Peltier Cooled InGaAs/InP APD’s,” Journal of Modern Optics, Vol. 48, No. 13, 2001, pp. 1967-1981. [14] P. D. Townsend, “Quantum Cryptography on Multi-User Optical Fiber Networks,” Journal of Nature, Vol. 385, No.2, 1997, pp. 47-49. [15] T. Nishioka, H. Ishizuka, T. Hasegawa and J. Abe, “Circular Type Quantum Key Distribution,” IEEE Photon Technical Letter, Vol. 14, No. 4, April 2002, pp. 576-578. [16] C. A. Fuchs, N. Gisin, R. B. Griffiths, C. S. Niu and A. Peres, “Optimal Eavesdropping in Quantum Crypto- graphy I,” P hysical Review A, Vol. 56, 1997, pp. 1163. [17] C. A. Fuchs and A. Peres, “Quantum State Disturbance VS. Information Gain: Uncertainty Relations for Quantum Information,” Physical Review A, Vol. 53, 1996, pp. 2038-2045. [18] D. Bruß, “Optimal Eavesdropping in Quantum Crypto- graphy With Six States,” Physical Reveiw Letter, Vol. 81, 1998, p. 3018. [19] D. Stucki, N. Gisin, O. Guinnard, G. Ribordi and H. Zbinden, “Quantum Key Distribution over 67 km with a Plug&Play System,” New Journal of Physics, Vol. 4, July 2002, pp. 1-8. [20] P. A. Hiskett et al., “Eighty Kilometer Transmission Experiment Using an InGaAs/InP SPAD-based Quantum Cryptography Receiver Operating at 1.55 m,” Journal of Modern Optics, Vol. 48, No. 13, July 2001, pp. 1957-1966. [21] D. S. Bethune and W. P. Risk, “Autocompensating Quan- tum Cryptography,” New Journal of Physics, Vol. 4, July 2002, pp. 1-15. [22] X. Fang and R. O. Claus, “Polarization-Dependent All- fiber Wavelength Division Multiplexer Based on a Signac Interferometer,” Optical Letter, Vol. 20, No. 20, October 1995, pp. 2146-2148. [23] P. D. Townsend, J. G. Rarity and P. R. Tapste r, “Enhanced Single Photon Fringe Visibility in a 10 km-long Prototype Quantum Cryptography Channel,” Electronics Letter, Vol. 29, July 1993, pp. 1291-1293. [24] C. Marand and P. D. Townsend, “Quantum Key Distri- bution over Distances as Long as 30 km,” Optical Letter, Vol. 20, No. 16, August 1995, pp. 1695-1697. [25] H. Zbinden, “Interferometry With Faraday Mirrors for Quantum Cryptography,” Electronics Letter, Vol. 33, 1997, pp. 586-588. [26] H. Kosaka, A. Tomita, Y. Nambu, N. Kimura and K. Nakamura, “Single Photon Interference Experiment over 100 km for Quantum Cryptography System Using a Balanced Gated-Mode Photon Detector,” Electronics Letter, Vol. 39, No. 16, 2003, pp. 1199-1201. [27] S. J. D. Phoenix et al., “Multi-User Quantum Crypto- graphy on Optical Networks,” Journal of Modern Optics, Vol. 42, No. 6, January 1995, pp. 1155–1163. [28] A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden, and N. Gisin, “Plug and Play Systems for Quantum Cryptography,” Applied Physics Letter, Vol. 70, No. 7, February 1997, pp. 793–795. [29] E. Waks et al., “Secure Communication: Quantum Cryptography with a Photon Turnstile,” Nature, Vol. 420, London, December 2002, p. 762. [30] E. Moreau et al., “Single-Mode Solid-State Single Photon Source Based on Isolated Quantum Dots in Pillar Microcavities,” Applied Physcis Letter, Vol. 79, No. 18, October 2001, pp. 2865-2867. [31] H. Bechmann-Pasquinucci and N. Gisin, “Incoherent and Coherent Eavesdropping in the 6-state Protocol of Copyright © 2010 SciRes. CN ![]() F. GARZIA ET AL. Copyright © 2010 SciRes. CN 182 Quantum Cryptography,” Physical Review A, Vol. 59, No. 6, 1998, pp. 1-11. [32] A. Ekert, “Quantum Cryptography Based on Bell's Theorem,” Physical Review Letter, Vol. 67, 1991, pp. 661-663. [33] R. J. Hughes, G. L. Morgan and C. G. Peterson, “Practical Quantum Key Distribution over a 48-km Optical Fiber Network,” Physics Division Los Alamos National Liberatory, NM 87545. |