The quantum internet will give us an infrastructure able to distribute and process quantum information on a planetary scale. The core of that internet will be formed from quantum error corrected links able to distribute information over large distances all while maintaining their coherence for long periods of time. However, many of the applications at the edge of such networks may rely on raw unencoded data – not protected by error correcting codes due to the nature of how it was generated. In this presentation, we will describe an experiment in which quantum information encoded on a physical qubit can be teleported into an error-corrected logical qubit. Our demonstration shows how one can get information into and out of quantum processors and tomorrows large-scale quantum networks.
Quantum cryptography promises unconditionally secure communication. Today, there exists a vast array of different QKD protocols that claim to offer security. However, looking in more detail, many subtleties lead to different security levels, or in the worst-case to no security at all. Here, we introduce the most crucial QKD security properties, ranging from different attack schemes to actual implementation security considerations. We present three different QKD use-cases with different network topologies: one trusted-node-based scenario (BB84 decoy) and two trusted-node-free (entanglement-based BBM92 and twin-field QKD). Using our, in cooperation with the European Space Agency (ESA), in-house developed simulations package, we simulate all relevant performance parameters, including the expected finite secret-key-rate. Furthermore, we assess all simulated QKD protocols’ applicability to satellite-based QKD networks and identify essential technologies. Interestingly, not the single-photon detection modules are the key drivers in terms of secure-key-rate performance, but the optical sending and receiving telescopes.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.