Research Article  Open Access
Rameez Asif, William J. Buchanan, "QuantumtotheHome: Achieving Gbits/s Secure Key Rates via Commercial OfftheShelf Telecommunication Equipment", Security and Communication Networks, vol. 2017, Article ID 7616847, 10 pages, 2017. https://doi.org/10.1155/2017/7616847
QuantumtotheHome: Achieving Gbits/s Secure Key Rates via Commercial OfftheShelf Telecommunication Equipment
Abstract
There is current significant interest in FibertotheHome (FTTH) networks, that is, endtoend optical connectivity. Currently, it may be limited due to the presence of lastmile copper wire connections. However, in near future, it is envisaged that FTTH connections will exist, and a key offering would be the possibility of optical encryption that can best be implemented using Quantum Key Distribution (QKD). However, it is very important that the QKD infrastructure is compatible with the already existing networks for a smooth transition and integration with the classical data traffic. In this paper, we report the feasibility of using offtheshelf telecommunication components to enable high performance Continuous VariableQuantum Key Distribution (CVQKD) systems that can yield secure key rates in the range of 100Mbits/s under practical operating conditions. Multilevel phase modulated signals (PSK) are evaluated in terms of secure key rates and transmission distances. The traditional receiver is discussed, aided by the phase noise cancellation based digital signal processing module for detecting the complex quantum signals. Furthermore, we have discussed the compatibility of multiplexers and demultiplexers for wavelength division multiplexed QuantumtotheHome (QTTH) network and the impact of splitting ratio is analyzed. The results are thoroughly compared with the commercially available highcost encryption modules.
1. Introduction
The optical broadband world is taking shape and as it does so, researchers are carefully designing the networks and proposing the applications it will carry [1, 2]. Nextgeneration (NG) services such as cloud computing, 3D high definition television (HDTV), machinetomachine (M2M) communication, and Internet of things (IoT) require unprecedented optical channel bandwidths. Highspeed global traffic is increasing at a rate of 30–40% every year [3]. For this very reason, the M2M/IoT applications will not only benefit from fiberoptic broadband but also require it. Both M2M/IoT are using the Internet to transpose the physical world onto the networked one. Bandwidthhungry applications are driving adoption of fiberbased lastmile connections and raising the challenge of moving access network capacity to the next level, 1–10Gbits/s data traffic to the home, that is, FibertotheHome (FTTH) [4]. The researchers believe that FTTH is the key to develop a sustainable future, as it is now widely acknowledged that it is the only futureproof technology, when it comes to bandwidth capacity, speed, reliability, security, and scalability.
With more and more people using IoT devices and applications, data security is the area of endeavor, concerned with safeguarding the connected devices and networks in the IoT. Encryption is the key element of data security in NG networks. It provides physical layer of protection that shields confidential information from exposure to the external attacks. The most secure and widely used methods to protect the confidentiality and integrity of data transmission are based on symmetric cryptography. Much enhanced security is delivered with a mathematically unbreakable form of encryption called a onetime pad [5], whereby data is encrypted using a truly random key/sequence of the same length as the data being encrypted. In both cases, the main practical challenge is how to securely share the keys between the concerned parties, that is, Alice and Bob. Quantum Key Distribution (QKD) addresses these challenges by using quantum properties to exchange secret information, that is, cryptographic key, which can then be used to encrypt messages that are being communicated over an insecure channel.
QKD is a method used to disseminate encryption keys between two distant nodes, that is, Alice and Bob. The unconditional security of QKD is based on the intrinsic laws of quantum mechanics [6, 7]. Practically, any eavesdropper (i.e., commonly known as Eve) attempting to acquire information between Alice and Bob will disturb the quantum state of the encrypted data and thus can be detected by the bona fide users according to the noncloning theorem [8] by monitoring the disturbance in terms of quantum biterror ratio (QBER) or excess noise. The quest for long distance and high bitrate quantum encrypted transmission using optical fibers [9] has led researchers to investigate a range of methods [10, 11]. Two standard techniques have been implemented for encrypted transmission over standard single mode fiber (SSMF), that is, DVQKD [12, 13] and CVQKD [14–16]. DVQKD protocols, such as BB84 or coherent oneway (COW) [17], involve the generation and detection of very weak optical signals, ideally at single photon level. A range of successful technologies has been implemented via DVQKD protocol but typically these are quite different from the technologies used in classical communications [18]. CVQKD protocols have therefore been of interest as these protocols can make use of conventional telecommunication technologies. Moreover, the secure key is randomly encoded on the quadrature of the coherent state of a light pulse [19]. Such an approach has potential advantages because of its capability of attaining high secure key rate with modest technological resources.
During the last few years, there has been growing interest in exploring CVQKD, as listed in Table 1. The key feature of this method is the use of a classical coherent receiver that can be used for dedicated photoncounting [20]. After transmission, the quadratures of the received signals are measured using a shotnoise limited balanced coherent receiver using either the homodyne or heterodyne method. The lack of an advanced reconciliation technique at low SNR values limits the transmission distance of CVQKD systems to 60 km, which is lower than that for DVQKD systems [21]. The secure key rate of CVQKD is limited by the bandwidth of the balanced homodyne detector (BHD) and the performance of reconciliation schemes, which is degraded by the excess noise observed at high data rates [22].

In this article, we present the initial results, based on numerical analysis, to characterize and evaluate the distribution of secure data to the subscribers by implementing the QuantumtotheHome (QTTH) concept. We have systematically evaluated the performance of using (a) phase encoded data, that is, PSK (where ), to generate quantum keys and (b) limits of using a highspeed BHD, in terms of electronic and shot noise for commercially available coherent receiver to detect the CVQKD signals. Furthermore, the transceivers, noise equivalent power (NEP) contributions from analoguetodigital converter (ADC), and transimpedance amplifier (TIA) are modeled according to the commercial offtheshelf (COTS) equipment. Both singlechannel and especially wavelength division multiplexed (WDM) transmissions are investigated. We have also implemented (a) local local oscillator (LLO) concept to avoid possible eavesdropping on the reference signal and (b) a phase noise cancellation (PNC) module for offline digital signal processing of the received signals. Moreover, we have depicted the tradeoff between the secure key rates achieved and the split ratio of the access network considering the hybrid classicalquantum traffic. These detailed results will help the people from academics and industry to implement the QTTH concept in realtime networks. Furthermore, the designed system is energy efficient and cost effective.
2. Characterization of Alice and Bob for Coherent Transmission
The schematic of the proposed simplified QTTH network with PSK based quantum transmitter (Alice) and LLO based coherent receiver (Bob) is depicted in Figure 1. At Alice, a narrow linewidth laser is used at the wavelength of 1550 nm having a line width of 5 kHz allowing it to maintain low phase noise characteristics. A pseudorandom binary sequence (PRBS) of length is encoded for singlechannel transmission and delay decorrelated copies are generated for the WDM transmission. Furthermore, we perform pulse shaping at the transmitter according to the Nyquist criterion to generate intersymbol interference (ISI) free signals. Resultant 1 Gbaud 4PSK (fourstate phaseshift keying) signal is generated after the radiofrequency (RF) signals are modulated via an electrooptical modulator, where RF frequency is kept at 2 GHz. The complete mathematical model of CVQKD protocol is explained in “Appendix A.” The modulation variance is modeled with the help of a variable optical attenuator (VOA) just before the quantum channel. We used the standard single mode fiber (SMF28) parameters to emulate the quantum channel and losses, that is, attenuation dB/km, dispersion ps/nm·km, and nonlinear coefficient km^{−1}·W^{−1}. As the QKD transmission occurs at a very low power level, the impact of optical Kerr effects is considered negligible. The polarization mode dispersion (PMD) is considered as 0.2ps/ that enables more realistic simulations, that is, comparative to the realworld installed fiber networks.
For implementing the coherent receiver, COTS equipment has been modeled. The receiver module (Bob) consists of a 90° optical hybrid and a high optical power handling balanced photodiodes with 20 GHz bandwidth. The responsivity, gain of TIA, and noise equivalent power (NEP) of the receiver at 1550 nm are 0.8A/W, 4 K·V/W, and 22pW/, respectively. For our analysis, we have kept the high power, narrow linewidth local oscillator at the receiver, that is, integral part of Bob in order to avoid any eavesdropping on the reference signal. That is why it is termed as local local oscillator (LLO). The LLO photon level is considered as photons per pulse. A classical phase noise cancellation (PNC) based digital signal processing (DSP) is implemented to minimize the excess noise as shown in Figure 2. The PNC stage has two square operators for inphase and quadrature operators, one addition operator, and a digital DC cancellation block assisted by a downconverter. The detailed implementation of the PNC module is explained in “Appendix B” [23]. The coherent receiver requires a specific signaltonoise ratio (SNR) to detect the PSK signal.
As first step, we quantified the coherent receiver to detect the PSK signals as we know that specific modulation formats require a particular optical signaltonoise ratio (OSNR) in order to be detected at biterror rate (BER) threshold. After modulating the 4PSK and 8PSK signals, backtoback signals are detected at the coherent receiver and normalized signaltonoise ratio (, the energy per bit to noise power spectral density ratio) is plotted against BER. The results are plotted in Figure 3(a). The BER threshold is set to be (factor of 8.6 dB), corresponding to a 7% overhead, that is, harddecision forward error correction (HDFEC), while softdecision FEC (SDFEC) level of BER (factor of 6.6 dB) can also be used corresponding to 20% overheard. From the results, we can depict that minimum of 10 dB and 6 dB values is required for the 8PSK and 4PSK signals at HDFEC, while this limit can further be reduced to smaller values but at the cost of 20% overheard in data rates, that is, SDFEC. We also investigated the ADC requirements to detect the PSK signals. The results are plotted in Figure 3(b). The ADC resolution (bits) is investigated with respect to the SNR penalty for 1 and 4Gbaud PSK signals. From the results, it is clear that 6–8bit ADC can be used to detect the PSK signals at different baud rates while keeping the SNR penalty 1 dB. It is worth mentioning here that high resolution ADCs can give you better performance but on the other hand they have high electronic noise that is not beneficial for high secure key rates in terms of QTTH. We have also summarized the ADC requirements [24] in terms of ADC bandwidth and ADC sampling rate (), as listed in Table 2.

(a)
(b)
3. Results and Discussions
3.1. PointtoPoint QKD Network
Since the noise equivalent power (NEP) determines electronic noise of the detection system, it is essential to select a TIA and ADC with lower NEP in order to achieve a low electronic noise to shot noise ratio (ESR). In addition, as the NEP of the TIA is amplified by the TIA itself, it dominates the total electronic noise. However, the ESR negligibly changes as the bandwidth of the detector is increased. This is because both electronic and shotnoise variances linearly increase with bandwidth, so it is beneficial to use the receivers having 1–20 GHz bandwidth. Since 20 GHz receivers are easily commercially available, we have modeled them for our analysis. Furthermore, the quantum link comprises the standard SMF and VOA to model the channel loss. Meanwhile, the variance of the excess noise is mainly due to the bias fluctuation of the modulator and timing jitter of the Bob, that is, receiver modules. It is estimated that the excess noise can be limited to be as small as 0.01 [25] below the zero key rate threshold. After optimizing the transmission model, (a) the corresponding power is ≈−70dBm [26], (b) the detector efficiency is 60, and (c) reconciliation efficiency is 95.
Based on the abovementioned values, we extended our studies to calculate the secure key rates (SKR) at different transmission distances, that is, transmittance values. We have kept the input power constant for every iteration. Furthermore, SKR for both the 4PSK and 8PSK modulation formats under collective attack [22] are depicted in Figure 4(a). The maximum of 100Mbits/s SKR can be achieved with this configuration by employing COTS modules for transmittance for 4PSK modulation, while SKR are 25Mbits/s and 1Mbit/s at and 0.6, respectively. From the graph it can also be concluded that the maximum transmission range for CVQKD based network is 60 km. Hence it is recommended that this QKD protocol can efficiently be used for access network, that is, QTTH. We have also investigated the performance of 8PSK modulation and the results are plotted in Figure 4(a). We have seen degradation in the transmission performance as compared to 4PSK modulation and this is due to the PNC algorithm that is implemented to process the received quantum signal. This concept of generating seamless quantum keys can further be enhanced for wavelength division multiplexed (WDM) networks that will help to generate high aggregate SKR via multiplexing the neighboring quantum channels. In this paper, we have multiplexed 12 WDM quantum channels to generate the aggregate SKR with the channel spacing of 25 and 50 GHz. The WDMQKD results, based on 4PSK modulation, are shown in Figure 4(b).
(a)
(b)
The results depict that the classical multiplexing techniques can efficiently be used to multiplex quantum signals without any degradation in the SKR. We have multiplexed the signals by using 25 and 50 GHz channel spacing, while aggregate secure key rate can reach up to 1.2 Gbits/s for a 12channel WDM quantum system at . The importance of these results is due to the fact that nextgeneration PON services are already aiming at Gbits/s data rates, so QKD can match the data rates. The 50 GHz channel spaced system shows negligible performance degradation as compared to singlechannel transmission case, whereas the 25 GHz channel spaced system depicts loss in SKR due to the fact of intersymbol interference between the neighboring channels. This degradation can be easily compensated with the help of efficient raisedcosine filters for pulse shaping at the transmitter. From the results we can also infer that the quantum signals are compatible with traditional passive optical adddrop multiplexers (OADMs) but the insertion loss from add/drop modules can impact the SKR.
A comparison of distance dependent secure key generation rates between CVQKD using 20 GHz BHD and stateoftheart DVQKD systems based on T12 protocol [27, 28] is shown in Figure 5. The transmission distance of CVQKD systems, limited by the lack of advanced reconciliation techniques at lower SNR, is far lower than that for DVQKD demonstrations. However, comparison of DVQKD and CVQKD shows that CVQKD has the potential to offer higher speed secure key transmission within an access network area (100 m to 50 km). Especially within 0–20 km range, that is, typical FTTH network, the SKR generated by using the traditional telecommunication components are 10s of magnitude higher than those of DV systems.
3.2. QTTH Network
Most of the efforts on the QKD system design and experimental demonstrations are limited to lab environments and pointtopoint transmissions, while actual FTTH networks have inline optical devices including but not limited to routers, switches, passive splitters, adddrop multiplexers, and erbium doped fiber amplifiers (EDFA), as envisioned in Figure 6(a). This restricts the deployment of QKD networks along with the classical data channels. However, in this paper we have investigated the compatibility of optical network components and their impact on the secure key rates. We have emulated the scenario of a typical quantum access network as shown in Figure 6(b).
(a)
(b)
(c)
The optical line terminal (OLT) consists of a QKD transmitter; that is, in this paper a PSK modulated transmitter is modeled. The optical distribution comprises (a) standard single mode fiber of 5 km length and (b) passive optical splitter with different split ratios. The commercially available splitters have insertion loss that is listed in Table 3. The variable splitting ratio is vital for the secure key rates as it will contribute to the attenuation and excess noise of the system. To test the simulation model under realistic conditions we have also added 0.15 dB splicing loss for every connection with the passive optical splitter. The results are depicted in Figure 7 where we have plotted the SKR with respect to the splitting ratio of the system. It can be deduced from the graph that for a splitting ratio the SKR drops down to 10Mbits/s per user, while the SKR of 1Mbits/s can be achieved with the splitting ratio of . Moreover, the classical telecommunication components can be used to design a seamless QTTH network and for short range transmission as well as for data center applications it can perform better as compared to the much expensive DVQKD systems [10].

3.3. Hybrid ClassicalQuantum Traffic in Access Networks
For the commercial compatibility of quantum signals with the existing optical networks, the wavelength and optimum power assignment to the signals are very much important. Different wavelength assignment [29–31] techniques have been investigated to avoid possible intersymbol interference between the classical and quantum signals. The best possible solution is to place the classical channels at 200 GHz channel spacing [31] in order to avoid any interference with the weakly powered quantum signals. Most importantly, we have implemented the concept of LLO; hence local oscillator signal is not generated from transmitter by using 90 : 10 coupler [18]. So, apparently with LLO and 200 GHz channel spacing, there is no crosstalk among the hybrid classicalquantum signals in the quantum channel. This is very much ideal for commercially available telecommunication components in the Cband (1530 to 1565 nm). Furthermore, with 200 GHz channel spacing the classical channels can be encoded up to 400Gbit/s line rate with advanced modulation formats, that is, dualpolarization QAM (). But most importantly, high data rate classical channels need sophisticated high bandwidth receivers that inherently have high electronics noise. Due to this reason, they are not suitable for quantum multiplexed signals as shown in Figure 6(c). As we are investigating a 20 GHz coherent receiver, we have kept the data rate at 2.5Gbit/s/polarization of quadrature phaseshift keying (PSK) signals for classical data. The power of the classical data channels is optimized below −15dBm. The quantum channel loss in this analysis corresponds to the 20 km of the optical fiber. The results for quantum signals at diverse wavelengths are depicted in Figure 8. The wavelength windows that are not occupied with the quantum channels are used for classical data transmission of PSK signals. These signals are efficiently detected below the HDFEC level, while the SKR of the quantum signals are 10Mbits/s. We can conclude from the results the compatibility of quantum signals with the classical telecommunication components. Furthermore, Lband (1565–1625 nm, extended DWDM band) can also be used to generate the hybrid classicalquantum signals as broadband lasers are readily available commercially.
4. Conclusion
To summarize, we have theoretically established a QTTH transmission model to estimate the potential of using the commercially available modules to generate the quantum keys. From the results, we can depict that CVQKD protocol is beneficial for short range transmission distances and it is concluded that 100Mbits/s SKR can be achieved for , while, for FTTH networks, 25Mbits/s SKR can be achieved for , that is, equivalent 10 km of the optical fiber transmission. These key rates are much higher than the commercially available encrypters based on DV protocol. The CVQKD protocol is compatible with network components like multiplexers and demultiplexers. Due to this benefit, we can multiplex several quantum signals together to transfer aggregate high SKR in the range of 1Gbits/s. Moreover, the splitting ratio associated with the commercially available optical passive splitters influences the SKR and dramatically decreases beyond splitting ratio. These results provide a solid base to enhance the existing telecommunication infrastructure and modules to deliver endtoend optical data encryption to the subscribers.
Appendix
A. Mathematical Model for CVQKD Signals
Alice generates random PSK symbols that can be optimized from pseudorandom binary sequence (PRBS) at the transmitter; that is, . These random symbols are upconverted to radiofrequency (RF) domain with corresponding inphase and quadrature signals [25] that are denoted by and . Mathematically these two components can be expressed as inwhere is the RF angular frequency. The output is then used as the input of modulator, MachZehnder modulator (MZM). The resultant optical field can be expressed as in (A.2) and further simplified as in (A.3)where refers to the modulation index and , , and represent the power, angular frequency of the carrier, and phase noise. For evaluating the modulation variance of the optical signal, expressed as shotnoise units (SNUs), the parameter and variable optical attenuator (VOA) are modeled. To further simply the mathematical model, the quantum channel loss is expressed as the attenuation of the optical fiber. Moreover, channel introduced noise variance is expressed as inwhere is the transmittance (relation between transmission length and attenuation, i.e., for backtoback and for 80 km fiber transmission) and is the excess noise. Practically, possible excess noise contributions, expressed as SNUs [18, 32], may come from the imperfect modulation, laser phase noise, laser line width, local oscillator fluctuations, and coherent detector imbalance [33].
In this paper, we have used the concept of a local local oscillator (LLO). It is a very vital configuration to keep the laser at the receiver, that is, Bob’s side, in order to prevent any eavesdropping attempt on the quantum channel to get the reference information of the incoming signal. The electric field of the LLO can be expressed as inwhere , , and represent the power, angular frequency, and phase noise of the LLO, respectively. The structure of the Bob comprises a 90° optical hybrid and two balanced photodetectors. The coherent receiver has an overall efficiency of and electrical noise of . Practically, comprises electrical noise from transimpedance amplifiers (TIA) as well as contribution from the analoguetodigital converters (ADCs). The receiver added noise variance can be expressed as in
Furthermore, the total noise variance of the system, including Alice and Bob, can be expressed as in
B. Digital Signal Processing (DSP) Module
Conventionally, in order to detect the weakly powered incoming quantum signals, a high power local oscillator is required. It is very important to select the local oscillator with narrow line width, so that the laser fluctuations cannot contribute to the system excess noise. Furthermore, it will help the coherent receiver to have a low complex digital signal processing (DSP) module, that is, phase noise cancellation (PNC) algorithm. As a prerequisite for PNC module, the photocurrents of the inphase and quadrature signals, after the balanced photodetectors, have to be measured accurately. Mathematically, they can be expressed as inwhere and define the inphase and quadrature components of the additive phase noise that needs to be compensated. We have implemented the phase noise cancellation (PNC) algorithm [25]. By combining the squares of the inphase and quadrature component of photocurrents, as in (B.1), that is, , and cancelling the DC component, the final result can be expressed as in
The final step in the DSP module is to downconvert the RF signal. The resultant inphase and quadrature components can be expressed as inwhere and are the equivalent additive noise that is added during the transmission and detection processes prior to DSP module. By considering (B.3), it is concluded that the original PSK signals can be detected without any frequency and phase distortions.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this article.
Acknowledgments
The authors would like to acknowledge the project research support from Edinburgh Napier University, UK, for Project STRENGTH (Scalable, Tuneable, Resilient and Encrypted Next Generation Transmission Hub).
References
 R. Asif, “Advanced and flexible multicarrier receiver architecture for highcount multicore fiber based space division multiplexed applications,” Scientific Reports, vol. 6, Article ID 27465, 2016. View at: Publisher Site  Google Scholar
 Y. Ding, V. Kamchevska, K. Dalgaard et al., “Reconfigurable SDM switching using novel silicon photonic integrated circuit,” Scientific Reports, vol. 6, Article ID 39058, 2016. View at: Publisher Site  Google Scholar
 C. Lam, H. Liu, B. Koley, X. Zhao, V. Kamalov, and V. Gill, “Fiber optic communication technologies: what's needed for datacenter network operations,” IEEE Communications Magazine, vol. 48, no. 7, pp. 32–39, 2010. View at: Publisher Site  Google Scholar
 C. F. Lam, “Fiber to the home: getting beyond 10 Gb/s,” Optics and Photonics News, vol. 27, no. 3, pp. 22–29, 2016. View at: Publisher Site  Google Scholar
 R. Horstmeyer, B. Judkewitz, I. M. Vellekoop, S. Assawaworrarit, and C. Yang, “Physical keyprotected onetime pad,” Scientific Reports, vol. 3, Article ID 03543, 2013. View at: Publisher Site  Google Scholar
 N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Reviews of Modern Physics, vol. 74, no. 1, pp. 145–195, 2002. View at: Publisher Site  Google Scholar
 H.K. Lo, M. Curty, and K. Tamaki, “Secure quantum key distribution,” Nature Photonics, vol. 8, no. 8, pp. 595–604, 2014. View at: Publisher Site  Google Scholar
 W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature, vol. 299, no. 5886, pp. 802803, 1982. View at: Publisher Site  Google Scholar
 B. Fröhlich, M. Lucamarini, J. F. Dynes et al., “Longdistance quantum key distribution secure against coherent attacks,” Optica, vol. 4, no. 1, p. 163, 2017. View at: Publisher Site  Google Scholar
 B. Fröhlich, J. F. Dynes, M. Lucamarini et al., “Quantum secured gigabit optical access networks,” Scientific Reports, vol. 5, Article ID 18121, 2015. View at: Publisher Site  Google Scholar
 L. C. Comandar, M. Lucamarini, B. Fröhlich et al., “Quantum key distribution without detector vulnerabilities using optically seeded lasers,” Nature Photonics, vol. 10, no. 5, pp. 312–315, 2016. View at: Publisher Site  Google Scholar
 X. Ma, B. Qi, Y. Zhao, and H.K. Lo, “Practical decoy state for quantum key distribution,” Physical Review A  Atomic, Molecular, and Optical Physics, vol. 72, no. 1, Article ID 012326, 2005. View at: Publisher Site  Google Scholar
 Y. Zhao, B. Qi, X. Ma, H.K. Lo, and L. Qian, “Experimental quantum key distribution with decoy states,” Physical Review Letters, vol. 96, no. 7, Article ID 070502, 2006. View at: Publisher Site  Google Scholar
 D. B. S. Soh, C. Brif, P. J. Coles et al., “Selfreferenced continuousvariable quantum key distribution protocol,” Physical Review X, vol. 5, no. 4, Article ID 041010, 2015. View at: Publisher Site  Google Scholar
 P. Jouguet, S. KunzJacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of longdistance continuousvariable quantum key distribution,” Nature Photonics, vol. 7, no. 5, pp. 378–381, 2013. View at: Publisher Site  Google Scholar
 D. Huang, P. Huang, H. Li, T. Wang, Y. Zhou, and G. Zeng, “Field demonstration of a continuousvariable quantum key distribution network,” Optics Letters, vol. 41, no. 15, pp. 3511–3514, 2016. View at: Publisher Site  Google Scholar
 D. Stucki, C. Barreiro, S. Fasel et al., “Continuous high speed coherent oneway quantum key distribution,” Optics Express, vol. 17, no. 16, pp. 13326–13334, 2009. View at: Publisher Site  Google Scholar
 B. Qi, L.L. Huang, L. Qian, and H.K. Lo, “Experimental study on the Gaussianmodulated coherentstate quantum key distribution over standard telecommunication fibers,” Physical Review A  Atomic, Molecular, and Optical Physics, vol. 76, no. 5, Article ID 052323, 2007. View at: Publisher Site  Google Scholar
 I. Derkach, V. C. Usenko, and R. Filip, “Preventing sidechannel effects in continuousvariable quantum key distribution,” Physical Review A  Atomic, Molecular, and Optical Physics, vol. 93, no. 3, Article ID 032309, 2016. View at: Publisher Site  Google Scholar
 Y. Painchaud, M. Poulin, M. Morin, and M. Têtu, “Performance of balanced detection in a coherent receiver,” Optics Express, vol. 17, no. 5, pp. 3659–3672, 2009. View at: Publisher Site  Google Scholar
 A. Leverrier, R. Alléaume, J. Boutros, G. Zémor, and P. Grangier, “Multidimensional reconciliation for a continuousvariable quantum key distribution,” Physical Review A  Atomic, Molecular, and Optical Physics, vol. 77, no. 4, Article ID 042325, 2008. View at: Publisher Site  Google Scholar
 Y.M. Chi, B. Qi, W. Zhu et al., “A balanced homodyne detector for highrate Gaussianmodulated coherentstate quantum key distribution,” New Journal of Physics, vol. 13, no. 1, Article ID 013003, 2011. View at: Publisher Site  Google Scholar
 R. Asif and W. J. Buchanan, “Seamless cryptographic key generation via offtheshelf telecommunication components for endtoend data encryption,” in Proceeding of the 10th IEEE International Conference on Internet of Things (iThings) '17, Paper ID SITN–2, June 2017. View at: Google Scholar
 C.Y. Lin, R. Asif, M. Holtmannspoetter, and B. Schmauss, “Nonlinear mitigation using carrier phase estimation and digital backward propagation in coherent QAM transmission,” Optics Express, vol. 20, no. 26, pp. B405–B412, 2012. View at: Publisher Site  Google Scholar
 Z. Qu, I. B. Djordjevic, and M. A. Neifeld, “RFsubcarrierassisted fourstate continuousvariable QKD based on coherent detection,” Optics Letters, vol. 41, no. 23, pp. 5507–5510, 2016. View at: Publisher Site  Google Scholar
 A. Karlsson, M. Bourennane, G. Ribordy et al., “Singlephoton counter for longhaul telecom,” IEEE Circuits and Devices Magazine, vol. 15, no. 6, pp. 34–40, 1999. View at: Publisher Site  Google Scholar
 L. C. Comandar, B. Fröhlich, M. Lucamarini et al., “Room temperature singlephoton detectors for high bit rate quantum key distribution,” Applied Physics Letters, vol. 104, no. 2, Article ID 021101, 2014. View at: Publisher Site  Google Scholar
 B. Korzh, C. C. W. Lim, R. Houlmann et al., “Provably secure and practical quantum key distribution over 307km of optical fibre,” Nature Photonics, vol. 9, no. 3, pp. 163–168, 2015. View at: Publisher Site  Google Scholar
 R. Asif, F. Ye, and T. Morioka, “λselection strategy in C+L band 1Pbit/s (448 WDM/19core/128 Gbit/s/channel) flexgrid space division multiplexed transmission,” in Proceedings of the European Conference on Networks and Communications, EuCNC 2015, pp. 321–324, fra, July 2015. View at: Publisher Site  Google Scholar
 M. Razavi, “Multipleaccess quantum key distribution networks,” IEEE Transactions on Communications, vol. 60, no. 10, pp. 3071–3079, 2012. View at: Publisher Site  Google Scholar
 S. Bahrani, M. Razavi, and J. A. Salehi, “Optimal wavelength allocation in hybrid quantumclassical networks,” in Proceedings of the 24th European Signal Processing Conference, EUSIPCO 2016, pp. 483–487, hun, September 2016. View at: Publisher Site  Google Scholar
 S. Fossier, E. Diamanti, T. Debuisschert, A. Villing, R. TualleBrouri, and P. Grangier, “Field test of a continuousvariable quantum key distribution prototype,” New Journal of Physics, vol. 11, no. 4, Article ID 045023, 2009. View at: Publisher Site  Google Scholar
 D. Huang, D. Lin, C. Wang et al., “Continuousvariable quantum key distribution with 1 Mbps secure key rate,” Optics Express, vol. 23, no. 13, Article ID 017511, pp. 17511–17519, 2015. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2017 Rameez Asif and William J. Buchanan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.