Abstract

We present a set of long-term quantum key distribution (QKD) results from the QuantumCity initiative in Durban, South Africa. Many QKD experimental setups have failed to provide a long-term analysis of QKD systems in commercial environments. Long-term analysis of the stability and performance of these systems is an imperative step towards the market acceptance of QKD technology. The Durban–QuantumCity project intends to develop a multi-user quantum communication network that is currently overlaid on the fiber infrastructure of the eThekwini Municipality. The first phase of this project includes the deployment of a four-node star network. To date, two links have been deployed and one link has run continuously for a number of months. We provide a brief overview of practical implementations of quantum networks and the first set of results from the live data encryption of the QuantumCity project.

© 2010 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Field test of quantum key distribution in the Tokyo QKD Network

M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka, K. Yoshino, Y. Nambu, S. Takahashi, A. Tajima, A. Tomita, T. Domeki, T. Hasegawa, Y. Sakai, H. Kobayashi, T. Asai, K. Shimizu, T. Tokura, T. Tsurumaru, M. Matsui, T. Honjo, K. Tamaki, H. Takesue, Y. Tokura, J. F. Dynes, A. R. Dixon, A. W. Sharpe, Z. L. Yuan, A. J. Shields, S. Uchikoga, M. Legré, S. Robyr, P. Trinkler, L. Monat, J.-B. Page, G. Ribordy, A. Poppe, A. Allacher, O. Maurhart, T. Länger, M. Peev, and A. Zeilinger
Opt. Express 19(11) 10387-10409 (2011)

Field test of classical symmetric encryption with continuous variables quantum key distribution

Paul Jouguet, Sébastien Kunz-Jacques, Thierry Debuisschert, Simon Fossier, Eleni Diamanti, Romain Alléaume, Rosa Tualle-Brouri, Philippe Grangier, Anthony Leverrier, Philippe Pache, and Philippe Painchault
Opt. Express 20(13) 14030-14041 (2012)

Field test of a practical secure communication network with decoy-state quantum cryptography

Teng-Yun Chen, Hao Liang, Yang Liu, Wen-Qi Cai, Lei Ju, Wei-Yue Liu, Jian Wang, Hao Yin, Kai Chen, Zeng-Bing Chen, Cheng-Zhi Peng, and Jian-Wei Pan
Opt. Express 17(8) 6540-6549 (2009)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (4)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription