-
Long-fiber Sagnac interferometers for twin field quantum key distribution networks
Authors:
Reem Mandil,
Li Qian,
Hoi-Kwong Lo
Abstract:
A Sagnac loop structure can help overcome the major difficulty in the practical implementation of a twin field quantum key distribution (TFQKD) network, namely, the need to stabilize the phase of a quantum state over many kilometers of fiber. Unfortunately, Rayleigh backscattering noise limits the signal-to-noise ratio for Sagnac systems containing long fibers and lossy photonic devices. Here, we…
▽ More
A Sagnac loop structure can help overcome the major difficulty in the practical implementation of a twin field quantum key distribution (TFQKD) network, namely, the need to stabilize the phase of a quantum state over many kilometers of fiber. Unfortunately, Rayleigh backscattering noise limits the signal-to-noise ratio for Sagnac systems containing long fibers and lossy photonic devices. Here, we solve this problem by sending optical pulses in long on-off bursts and using time post-selection on measurements taken with free-run single-photon avalanche detectors. We also investigate the impact of the residual phase noise uncompensated by the Sagnac structure and find that the variance of the phase noise scales as loop length to the third power, verifying an existing calculation in the literature. We measure the interference visibility in Sagnac loops of varying length without active phase or polarization stabilization and achieve > 97% visibility in 200 km ultra-low-loss fiber, which is, to our knowledge, the longest fiber Sagnac interferometer demonstrated. Our results indicate the suitability of a Sagnac system for long-distance TFQKD networks, an important step towards the practical implementation of metropolitan quantum networks.
△ Less
Submitted 15 July, 2024; v1 submitted 10 July, 2024;
originally announced July 2024.
-
Security flaws from time-varying active encoding in high-speed measurement-device-independent quantum key distribution
Authors:
Amita Gnanapandithan,
Li Qian,
Hoi-Kwong Lo
Abstract:
Quantum key distribution (QKD) can transmit secret keys with, in principle, information-theoretic security. However, bandwidth limitations in practical equipment threaten the security of high-speed (GHz) QKD systems. We propose and characterize a new side channel which arises when using active encoding. As an illustrative example, we focus on electro-optic phase modulation for polarization encodin…
▽ More
Quantum key distribution (QKD) can transmit secret keys with, in principle, information-theoretic security. However, bandwidth limitations in practical equipment threaten the security of high-speed (GHz) QKD systems. We propose and characterize a new side channel which arises when using active encoding. As an illustrative example, we focus on electro-optic phase modulation for polarization encoding at 1 GHz. We show that this side channel may reduce the maximum secure transmission distance by over 50% in a decoy state measurement-device-independent QKD protocol.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
GraphiQ: Quantum circuit design for photonic graph states
Authors:
Jie Lin,
Benjamin MacLellan,
Sobhan Ghanbari,
Julie Belleville,
Khuong Tran,
Luc Robichaud,
Roger G. Melko,
Hoi-Kwong Lo,
Piotr Roztocki
Abstract:
GraphiQ is a versatile open-source framework for designing photonic graph state generation schemes, with a particular emphasis on photon-emitter hybrid circuits. Built in Python, GraphiQ consists of a suite of design tools, including multiple simulation backends and optimization methods. The library supports scheme optimization in the presence of circuit imperfections, as well as user-defined opti…
▽ More
GraphiQ is a versatile open-source framework for designing photonic graph state generation schemes, with a particular emphasis on photon-emitter hybrid circuits. Built in Python, GraphiQ consists of a suite of design tools, including multiple simulation backends and optimization methods. The library supports scheme optimization in the presence of circuit imperfections, as well as user-defined optimization goals. Our framework thus represents a valuable tool for the development of practical schemes adhering to experimentally-relevant constraints. As graph states are a key resource for measurement-based quantum computing, all-photonic quantum repeaters, and robust quantum metrology, among others, we envision GraphiQ's broad impact for advancing quantum technologies.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Optimization of deterministic photonic graph state generation via local operations
Authors:
Sobhan Ghanbari,
Jie Lin,
Benjamin MacLellan,
Luc Robichaud,
Piotr Roztocki,
Hoi-Kwong Lo
Abstract:
Realizing photonic graph states, crucial in various quantum protocols, is challenging due to the absence of deterministic entangling gates in linear optics. To address this, emitter qubits are leveraged to establish and transfer the entanglement to photons. We introduce an optimization method for such protocols based on the local Clifford equivalency of states and the graph-shape correlated genera…
▽ More
Realizing photonic graph states, crucial in various quantum protocols, is challenging due to the absence of deterministic entangling gates in linear optics. To address this, emitter qubits are leveraged to establish and transfer the entanglement to photons. We introduce an optimization method for such protocols based on the local Clifford equivalency of states and the graph-shape correlated generation cost parameters. Employing this method, we achieve a 50% reduction in use of the 2-qubit gates for generation of the repeater graph states and a 65% reduction in the total gate count for 15-node random dense graphs.
△ Less
Submitted 31 December, 2023;
originally announced January 2024.
-
Fully Passive Measurement-Device-Independent Quantum Key Distribution
Authors:
Jinjie Li,
Wenyuan Wang,
Hoi-Kwong Lo
Abstract:
A recently proposed fully passive QKD removes all source modulator side channels. In this work, we combine the fully passive sources with MDI-QKD to remove simultaneously side channels from source modulators and detectors. We show a numerical simulation of the passive MDI-QKD, and we obtain an acceptable key rate while getting much better implementation security, as well as ease of implementation,…
▽ More
A recently proposed fully passive QKD removes all source modulator side channels. In this work, we combine the fully passive sources with MDI-QKD to remove simultaneously side channels from source modulators and detectors. We show a numerical simulation of the passive MDI-QKD, and we obtain an acceptable key rate while getting much better implementation security, as well as ease of implementation, compared with a recently proposed fully passive TF-QKD, paving the way towards more secure and practical QKD systems. We have proved that a fully passive protocol is compatible with MDI-QKD and we also proposed a novel idea that could potentially improve the sifting efficiency.
△ Less
Submitted 5 December, 2023; v1 submitted 14 September, 2023;
originally announced September 2023.
-
Composable Security of Distributed Symmetric Key Exchange Protocol
Authors:
Jie Lin,
Manfred von Willich,
Hoi-Kwong Lo
Abstract:
The Distributed Symmetric Key Exchange (DSKE) protocol provides secure secret exchange (e.g., for key exchange) between two honest parties that need not have had prior contact, and use intermediaries with whom they each securely share confidential data. We show the composable security of the DSKE protocol in the constructive cryptography framework of Maurer. Specifically, we prove the security (co…
▽ More
The Distributed Symmetric Key Exchange (DSKE) protocol provides secure secret exchange (e.g., for key exchange) between two honest parties that need not have had prior contact, and use intermediaries with whom they each securely share confidential data. We show the composable security of the DSKE protocol in the constructive cryptography framework of Maurer. Specifically, we prove the security (correctness and confidentiality) and robustness of this protocol against any computationally unbounded adversary, who additionally may have fully compromised a bounded number of the intermediaries and can eavesdrop on all communication. As DSKE is highly scalable in a network setting with no distance limit, it is expected to be a cost-effective quantum-safe cryptographic solution to safeguarding the network security against the threat of quantum computers.
△ Less
Submitted 26 April, 2023;
originally announced April 2023.
-
Fully-Passive Twin-Field Quantum Key Distribution
Authors:
Wenyuan Wang,
Rong Wang,
Hoi-Kwong Lo
Abstract:
We propose a fully-passive twin-field quantum key distribution (QKD) setup where basis choice, decoy-state preparation and encoding are all implemented entirely by post-processing without any active modulation. Our protocol can remove the potential side-channels from both source modulators and detectors, and additionally retain the high key rate advantage offered by twin-field QKD, thus offering g…
▽ More
We propose a fully-passive twin-field quantum key distribution (QKD) setup where basis choice, decoy-state preparation and encoding are all implemented entirely by post-processing without any active modulation. Our protocol can remove the potential side-channels from both source modulators and detectors, and additionally retain the high key rate advantage offered by twin-field QKD, thus offering great implementation security and good performance. Importantly, we also propose a post-processing strategy that uses mismatched phase slices and minimizes the effect of sifting. We show with numerical simulation that the new protocol can still beat the repeaterless bound and provide satisfactory key rate.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Proof-of-Principle Demonstration of Fully-Passive Quantum Key Distribution
Authors:
Chengqiu Hu,
Wenyuan Wang,
Kai-Sum Chan,
Zhenghan Yuan,
Hoi-Kwong Lo
Abstract:
Quantum key distribution (QKD) offers information-theoretic security based on the fundamental laws of physics. However, device imperfections, such as those in active modulators, may introduce side-channel leakage, thus compromising practical security. Attempts to remove active modulation, including passive decoy intensities preparation and polarization encoding, have faced theoretical constraints…
▽ More
Quantum key distribution (QKD) offers information-theoretic security based on the fundamental laws of physics. However, device imperfections, such as those in active modulators, may introduce side-channel leakage, thus compromising practical security. Attempts to remove active modulation, including passive decoy intensities preparation and polarization encoding, have faced theoretical constraints and inadequate security verification, thus hindering the achievement of a fully passive QKD scheme. Recent research has systematically analyzed the security of a fully passive modulation protocol. Based on this, we utilize the gain-switching technique in combination with the post-selection scheme and perform a proof-of-principle demonstration of a fully passive quantum key distribution with polarization encoding at channel losses of 7.2 dB, 11.6 dB, and 16.7 dB. Our work demonstrates the feasibility of active-modulation-free QKD in polarization-encoded systems.
△ Less
Submitted 9 May, 2023; v1 submitted 20 April, 2023;
originally announced April 2023.
-
Generation of a time-bin Greenberger--Horne--Zeilinger state with an optical switch
Authors:
Hsin-Pin Lo,
Takuya Ikuta,
Koji Azuma,
Toshimori Honjo,
William J. Munro,
Hiroki Takesue
Abstract:
Multipartite entanglement is a critical resource in quantum information processing that exhibits much richer phenomenon and stronger correlations than in bipartite systems. This advantage is also reflected in its multi-user applications. Although many demonstrations have used photonic polarization qubits, polarization-mode dispersion confines the transmission of photonic polarization qubits throug…
▽ More
Multipartite entanglement is a critical resource in quantum information processing that exhibits much richer phenomenon and stronger correlations than in bipartite systems. This advantage is also reflected in its multi-user applications. Although many demonstrations have used photonic polarization qubits, polarization-mode dispersion confines the transmission of photonic polarization qubits through an optical fiber. Consequently, time-bin qubits have a particularly important role to play in quantum communication systems. Here, we generate a three-photon time-bin Greenberger-Horne-Zeilinger (GHZ) state using a 2 x 2 optical switch as a time-dependent beam splitter to entangle time-bin Bell states from a spontaneous parametric down-conversion source and a weak coherent pulse. To characterize the three-photon time-bin GHZ state, we performed measurement estimation, showed a violation of the Mermin inequality, and used quantum state tomography to fully reconstruct a density matrix, which shows a state fidelity exceeding 70%. We expect that our three-photon time-bin GHZ state can be used for long-distance multi-user quantum communication.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
Quantum Discord Witness with Uncharacterized Devices
Authors:
Rong Wang,
Yao Yao,
Zhen-Qiang Yin,
Hoi-Kwong Lo
Abstract:
Quantum discord represents a correlation beyond classicality that could be useful for many quantum information tasks, and therefore is viewed as a valuable quantum resource. Theoretically, whether a bipartite quantum state has a non-zero amount of quantum discord or not can be determined once its density matrix is given. Experimentally, however, it is not easy to perform a reliable tomography on t…
▽ More
Quantum discord represents a correlation beyond classicality that could be useful for many quantum information tasks, and therefore is viewed as a valuable quantum resource. Theoretically, whether a bipartite quantum state has a non-zero amount of quantum discord or not can be determined once its density matrix is given. Experimentally, however, it is not easy to perform a reliable tomography on the state, especially when considering the imperfection of devices. Here, inspired by the so-called dimension witness, we propose a new approach using uncharacterized measurements to witness quantum discord of an unknown bipartite state within arbitrary dimension system. For any two-qubit state, we show that the maximum of witness happens when one performs mutually orthogonal basis measurement on each qubit. The feature of high robustness against device imperfections, such as loss-tolerance and error-tolerance, shows our method is experimentally feasible. Furthermore, we show that this witness can help us guarantee security in quantum key distribution.
△ Less
Submitted 15 April, 2023; v1 submitted 20 March, 2023;
originally announced March 2023.
-
Observation of binary phase states of time-multiplexed degenerate optical parametric oscillator pulses generated using a nonlinear fiber Sagnac loop
Authors:
Hsin-Pin Lo,
Takahiro Inagaki,
Toshimori Honjo,
Hiroki Takesue
Abstract:
We generated time-multiplexed degenerate optical parametric oscillator (DOPO) pulses using a nonlinear fiber Sagnac loop as a phase-sensitive amplifier (PSA) where the pump and amplified light in pump-signal-idler degenerate four-wave mixing can be spatially separated. By placing the PSA in a fiber cavity, we successfully generated more than 5,000 time-multiplexed DOPO pulses. We confirmed the bif…
▽ More
We generated time-multiplexed degenerate optical parametric oscillator (DOPO) pulses using a nonlinear fiber Sagnac loop as a phase-sensitive amplifier (PSA) where the pump and amplified light in pump-signal-idler degenerate four-wave mixing can be spatially separated. By placing the PSA in a fiber cavity, we successfully generated more than 5,000 time-multiplexed DOPO pulses. We confirmed the bifurcation of pulse phases to 0 or $π$ relative to the pump phase, which makes them useful for representing Ising spins in an Ising model solver based on coherent optical oscillator networks. We also confirmed inherent randomness of the DOPO phases using the NIST random number test.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Quantum repeaters: From quantum networks to the quantum internet
Authors:
Koji Azuma,
Sophia E. Economou,
David Elkouss,
Paul Hilaire,
Liang Jiang,
Hoi-Kwong Lo,
Ilan Tzitrin
Abstract:
A quantum internet is the holy grail of quantum information processing, enabling the deployment of a broad range of quantum technologies and protocols on a global scale. However, numerous challenges exist before the quantum internet can become a reality. Perhaps the most crucial of these is the realization of a quantum repeater, an essential component in the long-distance transmission of quantum i…
▽ More
A quantum internet is the holy grail of quantum information processing, enabling the deployment of a broad range of quantum technologies and protocols on a global scale. However, numerous challenges exist before the quantum internet can become a reality. Perhaps the most crucial of these is the realization of a quantum repeater, an essential component in the long-distance transmission of quantum information. As the analog of a classical repeater, extender, or booster, the quantum repeater works to overcome loss and noise in the quantum channels comprising a quantum network. Here, we review the conceptual frameworks and architectures for quantum repeaters, as well as the experimental progress towards their realization. We also discuss the various near-term proposals to overcome the limits to the communication rates set by point-to-point quantum communication. Finally, we overview how quantum repeaters fit within the broader challenge of designing and implementing a quantum internet.
△ Less
Submitted 18 July, 2023; v1 submitted 21 December, 2022;
originally announced December 2022.
-
Passive continuous variable quantum key distribution
Authors:
Chenyang Li,
Chengqiu Hu,
Wenyuan Wang,
Rong Wang,
Hoi-Kwong Lo
Abstract:
Passive quantum key distribution (QKD) has been proposed for discrete variable protocols to eliminate side channels in the source. Unfortunately, the key rate of passive DV-QKD protocols suffers from sifting loss and additional quantum errors. In this work, we propose the general framework of passive continuous variable quantum key distribution. Rather surprisingly, we find that the passive source…
▽ More
Passive quantum key distribution (QKD) has been proposed for discrete variable protocols to eliminate side channels in the source. Unfortunately, the key rate of passive DV-QKD protocols suffers from sifting loss and additional quantum errors. In this work, we propose the general framework of passive continuous variable quantum key distribution. Rather surprisingly, we find that the passive source is a perfect candidate for the discrete-modulated continuous variable quantum key distribution (DMCV QKD) protocol. With the phase space remapping scheme, we show that passive DMCV QKD offers the same key rate as its active counterpart. Considering the important advantage of removing side channels that have plagued the active ones, passive DMCV QKD is a promising alternative. In addition, our protocol makes the system much simpler by allowing modulator-free quantum key distribution. Finally, we experimentally characterize the passive DMCV QKD source, thus showing its practicality.
△ Less
Submitted 4 December, 2022;
originally announced December 2022.
-
Resource-Efficient Real-Time Polarization Compensation for MDI-QKD with Rejected Data
Authors:
Olinka Bedroya,
Chenyang Li,
Wenyuan Wang,
Jianyong Hu,
Hoi-Kwong Lo,
Li Qian
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD) closes all the security loopholes in the detection system and is a promising solution for secret key sharing. Polarization encoding is the most common QKD encoding scheme, as it is straightforward to prepare and measure. However, implementing polarization encoding in MDI QKD imposes extra challenges, as polarization alignment must b…
▽ More
Measurement-device-independent quantum key distribution (MDI-QKD) closes all the security loopholes in the detection system and is a promising solution for secret key sharing. Polarization encoding is the most common QKD encoding scheme, as it is straightforward to prepare and measure. However, implementing polarization encoding in MDI QKD imposes extra challenges, as polarization alignment must be maintained over both mutually unbiased bases and be maintained for both paths (Alice-Charlie and Bob-Charlie). Polarization alignment is usually done by interrupting the QKD process (reducing overall key generation rates) or using additional classical laser sources multiplexed with quantum channels for polarization alignment. Since low key rates and cost are the two most pressing challenges preventing wide adoption of QKD systems, using additional resources or reducing key rates runs contrary to making QKD commercially viable. Therefore, we propose and implement a novel polarization compensation scheme in the MDI-QKD system that avoids the aforementioned drawbacks by recycling part of discarded detection events. Our scheme evaluates the polarization drift in real-time based on single measurements corresponding to decoy intensities. Our fully automated experimental demonstration maintains the average polarization drift below 0.13 rad over 40 km of spooled fibre (without an insulating jacket) for at least four hours. The average quantum bit error rate is 3.8$\%$, and we achieved an average key rate of $7.45\times 10^{-6}$ bits per pulse.
△ Less
Submitted 23 April, 2024; v1 submitted 6 September, 2022;
originally announced September 2022.
-
Fully-Passive Quantum Key Distribution
Authors:
Wenyuan Wang,
Rong Wang,
Victor Zapatero,
Li Qian,
Bing Qi,
Marcos Curty,
Hoi-Kwong Lo
Abstract:
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed. Nonetheless, passive decoy-state generation and passive encoding have never been simultaneously implemented with linear optical elements before, whic…
▽ More
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed. Nonetheless, passive decoy-state generation and passive encoding have never been simultaneously implemented with linear optical elements before, which greatly limits the practicality of such passive QKD schemes. In this work, we overcome this limitation and propose a fully-passive QKD source with linear optics that eliminates active modulators for both decoy-state choice and encoding. This allows for highly practical QKD systems that avoid side-channels from the source modulators. The passive source we propose (combined with the decoy-state analysis) can create any arbitrary state on a qubit system and is protocol-independent. That is, it can be used for various protocols such as BB84, reference-frame-independent QKD, or the six-state protocol. It can also in principle be combined with e.g. measurement-device-independent QKD, to build a system without side-channels in either detectors or modulators.
△ Less
Submitted 12 July, 2022;
originally announced July 2022.
-
Characterisation of state-preparation uncertainty in quantum key distribution
Authors:
Anqi Huang,
Akihiro Mizutani,
Hoi-Kwong Lo,
Vadim Makarov,
Kiyoshi Tamaki
Abstract:
To achieve secure quantum key distribution, all imperfections in the source unit must be incorporated in a security proof and measured in the lab. Here we perform a proof-of-principle demonstration of the experimental techniques for characterising the source phase and intensity fluctuation in commercial quantum key distribution systems. When we apply the measured phase fluctuation intervals to the…
▽ More
To achieve secure quantum key distribution, all imperfections in the source unit must be incorporated in a security proof and measured in the lab. Here we perform a proof-of-principle demonstration of the experimental techniques for characterising the source phase and intensity fluctuation in commercial quantum key distribution systems. When we apply the measured phase fluctuation intervals to the security proof that takes into account fluctuations in the state preparation, it predicts a key distribution distance of over 100 km of fiber. The measured intensity fluctuation intervals are however so large that the proof predicts zero key, indicating a source improvement may be needed. Our characterisation methods pave the way for a future certification standard.
△ Less
Submitted 9 January, 2023; v1 submitted 24 May, 2022;
originally announced May 2022.
-
Distributed Symmetric Key Exchange: A scalable, quantum-proof key distribution system
Authors:
Hoi-Kwong Lo,
Mattia Montagna,
Manfred von Willich
Abstract:
We propose and implement a protocol for a scalable, cost-effective, information-theoretically secure key distribution and management system. The system, called Distributed Symmetric Key Exchange (DSKE), relies on pre-shared random numbers between DSKE clients and a group of Security Hubs. Any group of DSKE clients can use the DSKE protocol to distill from the pre-shared numbers a secret key. The c…
▽ More
We propose and implement a protocol for a scalable, cost-effective, information-theoretically secure key distribution and management system. The system, called Distributed Symmetric Key Exchange (DSKE), relies on pre-shared random numbers between DSKE clients and a group of Security Hubs. Any group of DSKE clients can use the DSKE protocol to distill from the pre-shared numbers a secret key. The clients are protected from Security Hub compromise via a secret sharing scheme that allows the creation of the final key without the need to trust individual Security Hubs. Precisely, if the number of compromised Security Hubs does not exceed a certain threshold, confidentiality is guaranteed to DSKE clients and, at the same time, robustness against denial-of-service (DoS) attacks. The DSKE system can be used for quantum-secure communication, can be easily integrated into existing network infrastructures, and can support arbitrary groups of communication parties that have access to a key. We discuss the high-level protocol, analyze its security, including its robustness against disruption. A proof-ofprinciple demonstration of secure communication between two distant clients with a DSKE-based VPN using Security Hubs on Amazon Web Server (AWS) nodes thousands of kilometres away from them was performed, demonstrating the feasibility of DSKEenabled secret sharing one-time-pad encryption with a data rate above 50 Mbit/s and a latency below 70 ms.
△ Less
Submitted 24 November, 2022; v1 submitted 1 May, 2022;
originally announced May 2022.
-
Quantum Complementarity Approach to Device-Independent Security
Authors:
Xingjian Zhang,
Pei Zeng,
Tian Ye,
Hoi-Kwong Lo,
Xiongfeng Ma
Abstract:
Complementarity is an essential feature of quantum mechanics. The preparation of an eigenstate of one observable implies complete randomness in its complementary observable. In quantum cryptography, complementarity allows us to formulate security analyses in terms of phase-error correction. However, in the device-independent regime that offers security without device characterization, the concept…
▽ More
Complementarity is an essential feature of quantum mechanics. The preparation of an eigenstate of one observable implies complete randomness in its complementary observable. In quantum cryptography, complementarity allows us to formulate security analyses in terms of phase-error correction. However, in the device-independent regime that offers security without device characterization, the concept becomes much subtler. Security proofs of device-independent quantum cryptography tasks are often complex and quite different from those of their more standard device-dependent cousins. The existing proofs pose huge challenges to experiments, among which large data-size requirement is a crux. Here, we show the complementarity security origin of the device-independent tasks. By linking complementarity with quantum nonlocality, we recast the device-independent scheme into a quantum error correction protocol. Going beyond the identical-and-independent-distribution case, we consider the most general attack. We generalize the sample entropy in classical Shannon theory for the finite-size analysis. Our method exhibits good finite-size performance and brings the device-independent scheme to a more practical regime. Applying it to the data in a recent ion-trap-based device-independent quantum key distribution experiment, one could reduce the requirement on data size to less than a third. Furthermore, the complementarity approach can be naturally extended to advantage key distillation to ease experiments by tolerating higher loss and lower transmittance.
△ Less
Submitted 11 October, 2022; v1 submitted 27 November, 2021;
originally announced November 2021.
-
Measurement device-independent quantum key distribution with passive, time-dependent source side-channels
Authors:
J. Eli Bourassa,
Amita Gnanapandithan,
Li Qian,
Hoi-Kwong Lo
Abstract:
While measurement-device-independent (MDI) quantum key distribution (QKD) allows two trusted parties to establish a shared secret key from a distance without needing to trust a central detection node, their quantum sources must be well-characterized, with side-channels at the source posing the greatest loophole to the protocol's security. In this paper, we identify a time-dependent side-channel in…
▽ More
While measurement-device-independent (MDI) quantum key distribution (QKD) allows two trusted parties to establish a shared secret key from a distance without needing to trust a central detection node, their quantum sources must be well-characterized, with side-channels at the source posing the greatest loophole to the protocol's security. In this paper, we identify a time-dependent side-channel in a common polarization-based QKD source that employs a Faraday mirror for phase stabilization. We apply the recently developed numerical proof technique from [Phys. Rev. A 99, 062332 (2019)] to quantify the sensitivity of the secret key rate to the quantum optical model for the side-channel, and to develop strategies to mitigate the information leakage. In particular, we find that the MDI three-state and BB84 protocols, while yielding the same key rate under ideal conditions, have diverging results in the presence of a side-channel, with BB84 proving more advantageous. While we consider only a representative case example, we expect the strategies developed and key rate analysis method to be broadly applicable to other leaky sources.
△ Less
Submitted 19 August, 2021;
originally announced August 2021.
-
Experiment on scalable multi-user twin-field quantum key distribution network
Authors:
Xiaoqing Zhong,
Wenyuan Wang,
Reem Mandil,
Hoi-Kwong Lo,
Li Qian
Abstract:
Twin-field quantum key distribution (TFQKD) systems have shown great promise for implementing practical long-distance secure quantum communication due to its measurement-device-independent nature and its ability to offer fundamentally superior rate-loss scaling than point-to-point QKD systems. A surge of research and development effort in the last two years has produced many variants of protocols…
▽ More
Twin-field quantum key distribution (TFQKD) systems have shown great promise for implementing practical long-distance secure quantum communication due to its measurement-device-independent nature and its ability to offer fundamentally superior rate-loss scaling than point-to-point QKD systems. A surge of research and development effort in the last two years has produced many variants of protocols and experimental demonstrations. In terms of hardware topology, TFQKD systems interfering quantum signals from two remotely phase-locked laser sources are in essence giant Mach-Zehnder interferometers (MZIs) requiring active phase stabilization. Such configurations are inherently unsuitable for a TFQKD network, where more than one user-pair share the common quantum measurement station, because it is practically extremely difficult, if not impossible, to stabilize MZIs of largely disparate path lengths, a situation that is inevitable in a multi-user-pair TFQKD network. On the other hand, Sagnac interferometer based TFQKD systems exploiting the inherent phase stability of the Sagnac ring can implement asymmetric TFQKD, and are therefore eminently suitable for implementing a TFQKD network. In this work, we experimentally demonstrate a proof-of-principle multi-user-pair Sagnac TFQKD network where three user pairs sharing the same measurement station can perform pair-wise TFQKD through time multiplexing, with channel losses up to 58 dB, and channel loss asymmetry up to 15 dB. In some cases, the secure key rates still beat the rate-loss bounds for point-to-point repeaterless QKD systems, even in this network configuration. It is to our knowledge the first multi-user-pair TFQKD network demonstration, an important step in advancing quantum communication network technologies.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
Detecting Entanglement in Unfaithful States
Authors:
Yongtao Zhan,
Hoi-Kwong Lo
Abstract:
Entanglement witness is an effective method to detect entanglement in unknown states without doing full tomography. One of the most widespread schemes of witnessing entanglement is measuring its fidelity with respect to a pure entangled state. Recently, a large class of states whose entanglement can not be detected with the fidelity witness has been discovered in Phys.Rev.Lett \textbf{124},200502(…
▽ More
Entanglement witness is an effective method to detect entanglement in unknown states without doing full tomography. One of the most widespread schemes of witnessing entanglement is measuring its fidelity with respect to a pure entangled state. Recently, a large class of states whose entanglement can not be detected with the fidelity witness has been discovered in Phys.Rev.Lett \textbf{124},200502(2020). They are called unfaithful states. In this paper we propose a new way to detect entanglement by calculating the lower bound of entanglement using measurement results. Numerical simulation shows our method can detect entanglement in unfaithful states with a small number of measurements. Moreover, we generalize our scheme to multipartite states and show that it can tolerate higher noise than previous entanglement witness operators with same number of measurement settings.
△ Less
Submitted 18 March, 2021; v1 submitted 12 October, 2020;
originally announced October 2020.
-
Tagging idea in continuous variable quantum key distribution and its application
Authors:
Chenyang Li,
Thomas Van Himbeeck,
Li Qian,
Hoi-Kwong Lo
Abstract:
Despite tremendous theoretical and experimental progress in continuous variable (CV) quantum key distribution (QKD), its security has not been rigorously established for practical systems with multiple imperfections. The idea of tagging is widely used in security proofs of discrete variable quantum key distribution with imperfect devices. In this paper, we generalize the tagging idea from discrete…
▽ More
Despite tremendous theoretical and experimental progress in continuous variable (CV) quantum key distribution (QKD), its security has not been rigorously established for practical systems with multiple imperfections. The idea of tagging is widely used in security proofs of discrete variable quantum key distribution with imperfect devices. In this paper, we generalize the tagging idea from discrete variable to continuous variable.
Based on untagged signals, we prove the security of the imperfect quantum key distribution system in the most conservative case. By introducing a generic imperfection model, we can evaluate and further incorporate multiple imperfections in the different stages such as modulation, channel and detection. Finally, with this generic model and tagging idea, we can prove the security of continuous variable key distribution system with multiple imperfections. Our case study shows our proofs are able to provide secure keys in the presence of both modulation and detection flaws.
△ Less
Submitted 7 October, 2020;
originally announced October 2020.
-
Tomography-based Quantum Key Distribution
Authors:
Yongtao Zhan,
Hoi-Kwong Lo
Abstract:
It has previously been shown that quantum state tomography can be used to increase the key rate of quantum key distribution (QKD) for the special case of qubits (i.e.,d=2). Here, we consider the case of higher dimensions, i.e., qudits, and show that, for a prime number d>2, quantum state tomography can also improve the key rate of d-dimensional qudit-based QKD schemes, compared to the standard (d+…
▽ More
It has previously been shown that quantum state tomography can be used to increase the key rate of quantum key distribution (QKD) for the special case of qubits (i.e.,d=2). Here, we consider the case of higher dimensions, i.e., qudits, and show that, for a prime number d>2, quantum state tomography can also improve the key rate of d-dimensional qudit-based QKD schemes, compared to the standard (d+1)-basis protocol. We apply our results to previous QKD experiments based on OAM (orbital angular momentum) encoding and demonstrate the advantage of tomography-based QKD protocols. Moreover, we compare the key rate of tomography-based QKD protocol with reference-frame-independent QKD protocol. We show that, for a rotation channel, the two protocols give the same key rate. However, for any other channels, tomography-based QKD protocol always gives a higher key rate than reference-frame-independent QKD protocol.
△ Less
Submitted 26 August, 2020;
originally announced August 2020.
-
Loss-tolerant quantum key distribution with a twist
Authors:
J. Eli Bourassa,
Ignatius William Primaatmaja,
Charles Ci Wen Lim,
Hoi-Kwong Lo
Abstract:
The security of measurement device-independent quantum key distribution (MDI QKD) relies on a thorough characterization of one's optical source output, especially any noise in the state preparation process. Here, we provide an extension of the loss-tolerant protocol [Phys. Rev. A 90, 052314 (2014)], a leading proof technique for analyzing the security of QKD, to MDI QKD protocols that employ mixed…
▽ More
The security of measurement device-independent quantum key distribution (MDI QKD) relies on a thorough characterization of one's optical source output, especially any noise in the state preparation process. Here, we provide an extension of the loss-tolerant protocol [Phys. Rev. A 90, 052314 (2014)], a leading proof technique for analyzing the security of QKD, to MDI QKD protocols that employ mixed signal states. We first reframe the core of the proof technique, noting its generalization to treat $d$-dimensional signal encodings. Concentrating on the qubit signal state case, we find that the mixed states can be interpreted as providing Alice and Bob with a virtual shield system they can employ to reduce Eve's knowledge of the secret key. We then introduce a simple semidefinite programming method for optimizing the virtual operations they can perform on the shield system to yield a higher key rate, along with an example calculation of fundamentally achievable key rates in the case of random polarization modulation error.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Efficient experimental quantum fingerprinting with wavelength division multiplexing
Authors:
Xiaoqing Zhong,
Feihu Xu,
Hoi-Kwong Lo,
Li Qian
Abstract:
Quantum communication complexity studies the efficiency of information communication (that is, the minimum amount of communication required to achieve a certain task) using quantum states. One representative example is quantum fingerprinting, in which the simultaneous message passing model is considered and the minimum amount of communication could be exponentially smaller than the classical finge…
▽ More
Quantum communication complexity studies the efficiency of information communication (that is, the minimum amount of communication required to achieve a certain task) using quantum states. One representative example is quantum fingerprinting, in which the simultaneous message passing model is considered and the minimum amount of communication could be exponentially smaller than the classical fingerprinting protocol. Experimental demonstrations based on a practical quantum fingerprinting protocol where coherent states are used to construct the fingerprints, have successfully shown the superiority of quantum fingerprinting. However, as a consequence of using coherent states, the communication time in this coherent quantum fingerprinting (CQF) protocol is increased. Moreover, the minimum amount of information communicated in these experimental demonstrations is largely limited by the dark counts of the single photon detectors. Here, we propose to enhance the performance of the existing CQF protocol through applying wavelength division multiplexing (WDM) and simultaneous detection of multiple wavelength channels. We show that the new WDM-CQF protocol can potentially reduce the communication time significantly. More importantly, with the same experimental parameters, the amount of communication is much reduced in the new scheme compared with the original CQF protocol. The more wavelength channels are used, the less communication is required by WDM-CQF protocol. We also perform a proof-of-concept experimental demonstration of the new WDM-CQF protocol with 6 wavelength channels. The experimental results further validate that the new scheme with WDM not only beats the classical protocol, but also reduces the amount of communication required by the original CQF protocol by more than half.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
Precise tuning of single-photon frequency using optical single sideband modulator
Authors:
Hsin-Pin Lo,
Hiroki Takesue
Abstract:
Frequency translation of single photons while preserving their quantum characteristics is an important technology for flexible networking of photonic quantum communication systems. Here we demonstrate a flexible scheme to interface different-color photons using an optical single sideband (OSSB) modulator. By changing the radio-frequency signal that drives the modulators, we can easily shift and pr…
▽ More
Frequency translation of single photons while preserving their quantum characteristics is an important technology for flexible networking of photonic quantum communication systems. Here we demonstrate a flexible scheme to interface different-color photons using an optical single sideband (OSSB) modulator. By changing the radio-frequency signal that drives the modulators, we can easily shift and precisely tune the frequency of single photons. Using the OSSB modulator, we successfully erased the frequency distinguishability of non-degenerated photon pairs to obtain the Hong-Ou-Mandel interference with a visibility exceeding 90%. We also demonstrated that the level of distinguishability can be precisely controlled by the OSSB modulator. We expect that the OSSB modulator will provide a simple and flexible photonic interface for realizing advanced quantum information systems.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Entanglement generation using a controlled-phase gate for time-bin qubits
Authors:
Hsin-Pin Lo,
Takuya Ikuta,
Nobuyuki Matsuda,
Toshimori Honjo,
Hiroki Takesue
Abstract:
Quantum logic gates are important for quantum computations and quantum information processing in numerous physical systems. While time-bin qubits are suited for quantum communications over optical fiber, many essential quantum logic gates for them have not yet been realized. Here, we demonstrated a controlled-phase (C-Phase) gate for time-bin qubits that uses a 2x2 optical switch based on an elect…
▽ More
Quantum logic gates are important for quantum computations and quantum information processing in numerous physical systems. While time-bin qubits are suited for quantum communications over optical fiber, many essential quantum logic gates for them have not yet been realized. Here, we demonstrated a controlled-phase (C-Phase) gate for time-bin qubits that uses a 2x2 optical switch based on an electro-optic modulator. A Hong-Ou-Mandel interference measurement showed that the switch could work as a time-dependent beam splitter with a variable spitting ratio. We confirmed that two independent time-bin qubits were entangled as a result of the C-Phase gate operation with the switch.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Quantum process tomography of a controlled-phase gate for time-bin qubits
Authors:
Hsin-Pin Lo,
Takuya Ikuta,
Nobuyuki Matsuda,
Toshimori Honjo,
William J. Munro,
Hiroki Takesue
Abstract:
Time-bin qubits, where information is encoded in a single photon at different times, have been widely used in optical fiber and waveguide based quantum communications. With the recent developments in distributed quantum computation, it is logical to ask whether time-bin encoded qubits may be useful in that context. We have recently realized a time-bin qubit controlled-phase (C-Phase) gate using a…
▽ More
Time-bin qubits, where information is encoded in a single photon at different times, have been widely used in optical fiber and waveguide based quantum communications. With the recent developments in distributed quantum computation, it is logical to ask whether time-bin encoded qubits may be useful in that context. We have recently realized a time-bin qubit controlled-phase (C-Phase) gate using a 2 X 2 optical switch based on a lithium niobate waveguide, with which we demonstrated the generation of an entangled state. However, the experiment was performed with only a pair of input states, and thus the functionality of the C-Phase gate was not fully verified. In this research, we used quantum process tomography to establish a process fidelity of 97.1%. Furthermore, we demonstrated the controlled-NOT gate operation with a process fidelity greater than 94%. This study confirms that typical two-qubit logic gates used in quantum computational circuits can be implemented with time-bin qubits, and thus it is a significant step forward for realization of distributed quantum computation based on time-bin qubits.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Proof-of-principle experimental demonstration of twin-field quantum key distribution over optical channels with asymmetric losses
Authors:
Xiaoqing Zhong,
Wenyuan Wang,
Li Qian,
Hoi-Kwong Lo
Abstract:
Twin-field (TF) quantum key distribution (QKD) is highly attractive because it can beat the fundamental limit of secret key rate for point-to-point QKD without quantum repeaters. Many theoretical and experimental studies have shown the superiority of TFQKD in long-distance communication. All previous experimental implementations of TFQKD have been done over optical channels with symmetric losses.…
▽ More
Twin-field (TF) quantum key distribution (QKD) is highly attractive because it can beat the fundamental limit of secret key rate for point-to-point QKD without quantum repeaters. Many theoretical and experimental studies have shown the superiority of TFQKD in long-distance communication. All previous experimental implementations of TFQKD have been done over optical channels with symmetric losses. But in reality, especially in a network setting, the distances between users and the middle node could be very different. In this paper, we perform a first proof-of-principle experimental demonstration of TFQKD over optical channels with asymmetric losses. We compare two compensation strategies, that are (1) applying asymmetric signal intensities and (2) adding extra losses, and verify that strategy (1) provides much better key rate. Moreover, the higher the loss, the more key rate enhancement it can achieve. By applying asymmetric signal intensities, TFQKD with asymmetric channel losses not only surpasses the fundamental limit of key rate of point-to-point QKD for 50 dB overall loss, but also has key rate as high as $2.918\times10^{-6}$ for 56 dB overall loss. Whereas no keys are obtained with strategy (2) for 56 dB loss. The increased key rate and enlarged distance coverage of TFQKD with asymmetric channel losses guarantee its superiority in long-distance quantum networks.
△ Less
Submitted 28 January, 2020;
originally announced January 2020.
-
Prefixed-threshold Real-Time Selection for Free-Space Measurement-Device-Independent Quantum Key Distribution
Authors:
Wenyuan Wang,
Feihu Xu,
Hoi-Kwong Lo
Abstract:
Measurement-Device-Independent (MDI) QKD eliminates detector side channels in QKD and allows an untrusted relay between two users. A desirable yet highly challenging application is to implement MDI-QKD through free-space channels. One of the major factors that affect the secure key rate in free-space MDI-QKD is atmospheric turbulence. In this work we show two important results: First, the independ…
▽ More
Measurement-Device-Independent (MDI) QKD eliminates detector side channels in QKD and allows an untrusted relay between two users. A desirable yet highly challenging application is to implement MDI-QKD through free-space channels. One of the major factors that affect the secure key rate in free-space MDI-QKD is atmospheric turbulence. In this work we show two important results: First, the independent fluctuations of transmittances in the two channels can significantly reduce MDI-QKD performance due to turbulence-induced channel asymmetry. Second, we consider the Prefixed Real-Time Selection (P-RTS) method we formerly introduced to BB84 and extend it to MDI-QKD. Users can monitor classical transmittances in their channels and improve performance by post-selecting signals in real-time based on pre-calculated thresholds. We show that we can establish a 2-dimensional threshold between Alice and Bob to post-select signals with both high signal-to-noise ratio and low channel asymmetry in real time, and greatly extend the maximum range of MDI-QKD in the presence of turbulence, which can be an important step towards future free-space MDI-QKD experiments.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
Simple security proofs for continuous-variable quantum key distribution with intensity fluctuating sources
Authors:
Chenyang Li,
Li Qian,
Hoi-Kwong Lo
Abstract:
Quantum Key Distribution (QKD) in principle offers unconditional security based on the laws of physics. Continuous variable (CV) quantum key distribution has the potential for high-key-rate and low-cost implementations using standard telecom components. Despite tremendous theoretical and experimental progress in continuous-variable quantum key distribution, the security has not been rigorously est…
▽ More
Quantum Key Distribution (QKD) in principle offers unconditional security based on the laws of physics. Continuous variable (CV) quantum key distribution has the potential for high-key-rate and low-cost implementations using standard telecom components. Despite tremendous theoretical and experimental progress in continuous-variable quantum key distribution, the security has not been rigorously established for most current continuous-variable quantum key distribution systems that have imperfections. Among the imperfections, intensity fluctuation is a significant principal problem affecting security. In this paper, we provide simple security proofs for continuous-variable quantum key distribution systems with an intensity fluctuating sources. Specifically, depending on device assumptions in the source, the imperfect systems are divided into two cases for security proofs. Our proofs are simple to implement without any hardware adjustment for the current continuous-variable quantum key distribution system. Besides, we show some compensation schemes for the decoding flaws for an outlook.
△ Less
Submitted 17 October, 2021; v1 submitted 29 August, 2019;
originally announced August 2019.
-
Simple Method for Asymmetric Twin-Field Quantum Key Distribution
Authors:
Wenyuan Wang,
Hoi-Kwong Lo
Abstract:
Twin-Field quantum key distribution (TF-QKD) can beat the linear bound of repeaterless QKD systems. After the proposal of the original protocol, multiple papers have extended the protocol to prove its security. However, these works are limited to the case where the two channels have equal amount of loss (i.e. are symmetric). In a practical network setting, it is very likely that the channels are a…
▽ More
Twin-Field quantum key distribution (TF-QKD) can beat the linear bound of repeaterless QKD systems. After the proposal of the original protocol, multiple papers have extended the protocol to prove its security. However, these works are limited to the case where the two channels have equal amount of loss (i.e. are symmetric). In a practical network setting, it is very likely that the channels are asymmetric due to e.g. geographical locations. In this paper we extend the "simple TF-QKD" protocol to the scenario with asymmetric channels. We show that by simply adjusting the two signal states of the two users (and not the decoy states) they can effectively compensate for channel asymmetry and consistently obtain an order of magnitude higher key rate than previous symmetric protocol. It also can provide 2-3 times higher key rate than the strategy of deliberately adding fibre to the shorter channel until channels have equal loss (and is more convenient as users only need to optimize their laser intensities and do not need to physically modify the channels). We also perform simulation for a practical case with three decoy states and finite data size, and show that our method works well and has a clear advantage over prior art methods with realistic parameters.
△ Less
Submitted 11 July, 2019;
originally announced July 2019.
-
Secure quantum key distribution with realistic devices
Authors:
Feihu Xu,
Xiongfeng Ma,
Qiang Zhang,
Hoi-Kwong Lo,
Jian-Wei Pan
Abstract:
In principle, quantum key distribution (QKD) offers information-theoretic security based on the laws of physics. In practice, however, the imperfections of realistic devices might introduce deviations from the idealized models used in security analyses. Can quantum code-breakers successfully hack real systems by exploiting the side channels? Can quantum code-makers design innovative counter-measur…
▽ More
In principle, quantum key distribution (QKD) offers information-theoretic security based on the laws of physics. In practice, however, the imperfections of realistic devices might introduce deviations from the idealized models used in security analyses. Can quantum code-breakers successfully hack real systems by exploiting the side channels? Can quantum code-makers design innovative counter-measures to foil quantum code-breakers? This article reviews theoretical and experimental progress in the practical security aspects of quantum code-making and quantum code-breaking. After numerous attempts, researchers now thoroughly understand and are able to manage the practical imperfections. Recent advances, such as the measurement-device-independent protocol, have closed the critical side channels in the physical implementations, paving the way for secure QKD with realistic devices.
△ Less
Submitted 19 February, 2020; v1 submitted 21 March, 2019;
originally announced March 2019.
-
Remote blind state preparation with weak coherent pulses in the field
Authors:
Yang-Fan Jiang,
Kejin Wei,
Liang Huang,
Ke Xu,
Qi-Chao Sun,
Yu-Zhe Zhang,
Weijun Zhang,
Hao Li,
Lixing You,
Zhen Wang,
Hoi-Kwong Lo,
Feihu Xu,
Qiang Zhang,
Jian-Wei Pan
Abstract:
Quantum computing has seen tremendous progress in the past years. Due to the implementation complexity and cost, the future path of quantum computation is strongly believed to delegate computational tasks to powerful quantum servers on cloud. Universal blind quantum computing (UBQC) provides the protocol for the secure delegation of arbitrary quantum computations, and it has received significant a…
▽ More
Quantum computing has seen tremendous progress in the past years. Due to the implementation complexity and cost, the future path of quantum computation is strongly believed to delegate computational tasks to powerful quantum servers on cloud. Universal blind quantum computing (UBQC) provides the protocol for the secure delegation of arbitrary quantum computations, and it has received significant attention. However, a great challenge in UBQC is how to transmit quantum state over long distance securely and reliably. Here, we solve this challenge by proposing and demonstrating a resource-efficient remote blind qubit preparation (RBQP) protocol with weak coherent pulses for the client to produce, using a compact and low-cost laser. We demonstrate the protocol in field, experimentally verifying the protocol over 100-km fiber. Our experiment uses a quantum teleportation setup in telecom wavelength and generates $1000$ secure qubits with an average fidelity of $(86.9\pm1.5)\%$, which exceeds the quantum no-cloning fidelity of equatorial qubit states. The results prove the feasibility of UBQC over long distances, and thus serving as a key milestone towards secure cloud quantum computing.
△ Less
Submitted 5 September, 2019; v1 submitted 19 March, 2019;
originally announced March 2019.
-
Proof-of-principle experimental demonstration of twin-field type quantum key distribution
Authors:
X. Zhong,
J. Hu,
M. Curty,
L. Qian,
H. -K. Lo
Abstract:
The twin-field (TF) quantum key distribution (QKD) protocol and its variants are highly attractive because they can beat the well-known rate-loss limit (i.e., the PLOB bound) for QKD protocols without quantum repeaters. In this paper, we perform a proof-of-principle experimental demonstration of TF-QKD based on the protocol proposed by Curty et al. which removes from the original TF-QKD scheme the…
▽ More
The twin-field (TF) quantum key distribution (QKD) protocol and its variants are highly attractive because they can beat the well-known rate-loss limit (i.e., the PLOB bound) for QKD protocols without quantum repeaters. In this paper, we perform a proof-of-principle experimental demonstration of TF-QKD based on the protocol proposed by Curty et al. which removes from the original TF-QKD scheme the need for post-selection on the matching of a global phase, and can deliver nearly an order of magnitude higher secret key rate. Furthermore, we overcome the major difficulty in the practical implementation of TF-QKD, namely, the need to stabilize the phase of the quantum state over kilometers of fiber. A Sagnac loop structure is utilized to ensure excellent phase stability between the different parties. Using decoy states, we demonstrate secret-key generation rates that beat the PLOB bound when the channel loss is above 40 dB.
△ Less
Submitted 26 February, 2019;
originally announced February 2019.
-
Machine Learning for Optimal Parameter Prediction in Quantum Key Distribution
Authors:
Wenyuan Wang,
Hoi-Kwong Lo
Abstract:
For a practical quantum key distribution (QKD) system, parameter optimization - the choice of intensities and probabilities of sending them - is a crucial step in gaining optimal performance, especially when one realistically considers finite communication time. With the increasing interest in the field to implement QKD over free-space on moving platforms, such as drones, handheld systems, and eve…
▽ More
For a practical quantum key distribution (QKD) system, parameter optimization - the choice of intensities and probabilities of sending them - is a crucial step in gaining optimal performance, especially when one realistically considers finite communication time. With the increasing interest in the field to implement QKD over free-space on moving platforms, such as drones, handheld systems, and even satellites, one needs to perform parameter optimization with low latency and with very limited computing power. Moreover, with the advent of the Internet of Things (IoT), a highly attractive direction of QKD could be a quantum network with multiple devices and numerous connections, which provides a huge computational challenge for the controller that optimizes parameters for a large-scale network. Traditionally, such an optimization relies on brute-force search, or local search algorithms, which are computationally intensive, and will be slow on low-power platforms (which increases latency in the system) or infeasible for even moderately large networks. In this work we present a new method that uses a neural network to directly predict the optimal parameters for QKD systems. We test our machine learning algorithm on hardware devices including a Raspberry Pi 3 single-board-computer (similar devices are commonly used on drones) and a mobile phone, both of which have a power consumption of less than 5 watts, and we find a speedup of up to 100-1000 times when compared to standard local search algorithms. The predicted parameters are highly accurate and can preserve over 95-99% of the optimal secure key rate. Moreover, our approach is highly general and not limited to any specific QKD protocol.
△ Less
Submitted 5 June, 2019; v1 submitted 18 December, 2018;
originally announced December 2018.
-
Entropic uncertainty relations and the measurement range problem, with consequences for high-dimensional quantum key distribution
Authors:
J. Eli Bourassa,
Hoi-Kwong Lo
Abstract:
The measurement range problem, where one cannot determine the data outside the range of the detector, limits the characterization of entanglement in high-dimensional quantum systems when employing, among other tools from information theory, the entropic uncertainty relations. Practically, the measurement range problem weakens the security of entanglement-based large-alphabet quantum key distributi…
▽ More
The measurement range problem, where one cannot determine the data outside the range of the detector, limits the characterization of entanglement in high-dimensional quantum systems when employing, among other tools from information theory, the entropic uncertainty relations. Practically, the measurement range problem weakens the security of entanglement-based large-alphabet quantum key distribution (QKD) employing degrees of freedom including time-frequency or electric field quadrature. We present a modified entropic uncertainty relation that circumvents the measurement range problem under certain conditions, and apply it to well-known QKD protocols. For time-frequency QKD, although our bound is an improvement, we find that high channel loss poses a problem for its feasibility. In continuous variable QKD, we find our bound provides a quantitative way to monitor for saturation attacks.
△ Less
Submitted 12 December, 2018; v1 submitted 12 October, 2018;
originally announced October 2018.
-
Experimental demonstration of high-rate measurement-device-independent quantum key distribution over asymmetric channels
Authors:
Hui Liu,
Wenyuan Wang,
Kejin Wei,
Xiao-Tian Fang,
Li Li,
Nai-Le Liu,
Hao Liang,
Si-Jie Zhang,
Weijun Zhang,
Hao Li,
Lixing You,
Zhen Wang,
Hoi-Kwong Lo,
Teng-Yun Chen,
Feihu Xu,
Jian-Wei Pan
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate all detector side channels and it is practical with current technology. Previous implementations of MDI-QKD all use two symmetric channels with similar losses. However, the secret key rate is severely limited when different channels have different losses. Here we report the results of the first high-rate MDI-QKD experi…
▽ More
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate all detector side channels and it is practical with current technology. Previous implementations of MDI-QKD all use two symmetric channels with similar losses. However, the secret key rate is severely limited when different channels have different losses. Here we report the results of the first high-rate MDI-QKD experiment over $asymmetric$ channels. By using the recent 7-intensity optimization approach, we demonstrate $>$10x higher key rate than previous best-known protocols for MDI-QKD in the situation of large channel asymmetry, and extend the secure transmission distance by more than 20-50 km in standard telecom fiber. The results have moved MDI-QKD towards widespread applications in practical network settings, where the channel losses are asymmetric and user nodes could be dynamically added or deleted.
△ Less
Submitted 27 April, 2019; v1 submitted 26 August, 2018;
originally announced August 2018.
-
Simple security proof of twin-field type quantum key distribution protocol
Authors:
Marcos Curty,
Koji Azuma,
Hoi-Kwong Lo
Abstract:
Twin-field (TF) quantum key distribution (QKD) was conjectured to beat the private capacity of a point-to-point QKD link by using single-photon interference in a central measuring station. This remarkable conjecture has recently triggered an intense research activity to prove its security. Here, we introduce a TF-type QKD protocol which is conceptually simpler than the original proposal. It relies…
▽ More
Twin-field (TF) quantum key distribution (QKD) was conjectured to beat the private capacity of a point-to-point QKD link by using single-photon interference in a central measuring station. This remarkable conjecture has recently triggered an intense research activity to prove its security. Here, we introduce a TF-type QKD protocol which is conceptually simpler than the original proposal. It relies on local phase randomization, instead of global phase randomization, which significantly simplifies its security analysis and is arguably less demanding experimentally. We demonstrate that the secure key rate of our protocol has a square-root improvement over the point-to-point private capacity, as conjectured by the original TF-QKD scheme.
△ Less
Submitted 18 December, 2018; v1 submitted 19 July, 2018;
originally announced July 2018.
-
Secure quantum communication in the presence of phase and polarization dependent loss
Authors:
Chenyang Li,
Marcos Curty,
Feihu Xu,
Olinka Bedroya,
Hoi-Kwong Lo
Abstract:
Silicon photonics holds the promise of the miniaturization of quantum communication devices. Recently, silicon chip optical transmitters for quantum key distribution (QKD) have been built and demonstrated experimentally. Nonetheless, these silicon chips suffer substantial polarization and phase dependent loss which, if unchecked, could compromise the security of QKD systems. Here, we first restore…
▽ More
Silicon photonics holds the promise of the miniaturization of quantum communication devices. Recently, silicon chip optical transmitters for quantum key distribution (QKD) have been built and demonstrated experimentally. Nonetheless, these silicon chips suffer substantial polarization and phase dependent loss which, if unchecked, could compromise the security of QKD systems. Here, we first restore the security by regarding the single photons without phase and polarization dependence as untagged and secure qubits. Next, by using a post-selection technique, one could implement a secure QKD protocol that provides a high key generation rate even in the presence of severe phase and polarization dependent loss. Our solution is simple to realize in a practical experiment as it does not require any hardware modification.
△ Less
Submitted 20 October, 2018; v1 submitted 11 July, 2018;
originally announced July 2018.
-
Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks
Authors:
Wenyuan Wang,
Feihu Xu,
Hoi-Kwong Lo
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate detector side channels and prevent all attacks on detectors. The future of MDI-QKD is a quantum network that provides service to many users over untrusted relay nodes. In a real quantum network, the losses of various channels are different and users are added and deleted over time. To adapt to these features, we propos…
▽ More
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate detector side channels and prevent all attacks on detectors. The future of MDI-QKD is a quantum network that provides service to many users over untrusted relay nodes. In a real quantum network, the losses of various channels are different and users are added and deleted over time. To adapt to these features, we propose a type of protocols that allow users to independently choose their optimal intensity settings to compensate for different channel losses. Such protocol enables a scalable high-rate MDI-QKD network that can easily be applied for channels of different losses and allows users to be dynamically added/deleted at any time without affecting the performance of existing users.
△ Less
Submitted 26 February, 2019; v1 submitted 9 July, 2018;
originally announced July 2018.
-
Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound
Authors:
Kiyoshi Tamaki,
Hoi-Kwong Lo,
Wenyuan Wang,
Marco Lucamarini
Abstract:
Quantum key distribution is a way to distribute secret keys to distant users with information theoretic security and key rates suitable for real-world applications. Its rate-distance figure, however, is limited by the natural loss of the communication channel and can never surpass a theoretical limit known as point-to-point secret key capacity. Recently, a new type of quantum key distribution with…
▽ More
Quantum key distribution is a way to distribute secret keys to distant users with information theoretic security and key rates suitable for real-world applications. Its rate-distance figure, however, is limited by the natural loss of the communication channel and can never surpass a theoretical limit known as point-to-point secret key capacity. Recently, a new type of quantum key distribution with an intermediate relay was proposed to overcome this limit (M. Lucamarini, Z. L. Yuan, J. F. Dynes and A. J. Shields, Nature, 2018). However, a standard application of the decoy state method limited the security analysis of this scheme to hold under restrictive assumptions for the eavesdropper. Hence, overcoming the point-to-point secret key capacity with an information-theoretic secure scheme is still an open question. Here, we propose a novel way to use decoy states to answer this question. The key idea is to switch between a Test mode and a Code mode, the former enabling the decoy state parameter estimation and the latter generating a key through a phase encoding protocol. This way, we confirm the scaling properties of the original scheme and overcome the secret key capacity at long distances. Our work plays a key role to unlock the potential of practical secure quantum communications.
△ Less
Submitted 11 September, 2018; v1 submitted 14 May, 2018;
originally announced May 2018.
-
Repeated multi-qubit readout and feedback with a mixed-species trapped-ion register
Authors:
Vlad Negnevitsky,
Matteo Marinelli,
Karan Mehta,
Hsiang-Yu Lo,
Christa Flühmann,
Jonathan P. Home
Abstract:
Quantum error correction will be essential for realizing the full potential of large-scale quantum information processing devices. Fundamental to its experimental realization is the repetitive detection of errors via projective measurements of quantum correlations among qubits, and correction using conditional feedback. Performing these tasks repeatedly requires a system in which measurement and f…
▽ More
Quantum error correction will be essential for realizing the full potential of large-scale quantum information processing devices. Fundamental to its experimental realization is the repetitive detection of errors via projective measurements of quantum correlations among qubits, and correction using conditional feedback. Performing these tasks repeatedly requires a system in which measurement and feedback decision times are short compared to qubit coherence times, where the measurement reproduces faithfully the desired projection, and for which the measurement process has no detrimental effect on the ability to perform further operations. Here we demonstrate up to 50 sequential measurements of correlations between two beryllium-ion qubits using a calcium ion ancilla, and implement feedback which allows us to stabilize two-qubit subspaces as well as Bell states. Multi-qubit mixed-species gates are used to transfer information from qubits to the ancilla, enabling quantum state detection with negligible crosstalk to the stored qubits. Heating of the ion motion during detection is mitigated using sympathetic recooling. A key element of the experimental system is a powerful classical control system, which features flexible in-sequence processing to implement feedback control. The methods employed here provide a number of essential ingredients for scaling trapped-ion quantum computing, and provide new opportunities for quantum state control and entanglement-enhanced quantum metrology.
△ Less
Submitted 26 April, 2018; v1 submitted 25 April, 2018;
originally announced April 2018.
-
Quantum key distribution with setting-choice-independently correlated light sources
Authors:
Akihiro Mizutani,
Go Kato,
Koji Azuma,
Marcos Curty,
Rikizo Ikuta,
Takashi Yamamoto,
Nobuyuki Imoto,
Hoi-Kwong Lo,
Kiyoshi Tamaki
Abstract:
Despite the enormous theoretical and experimental progress made so far in quantum key distribution (QKD), the security of most existing QKD implementations is not rigorously established yet. A critical obstacle is that almost all existing security proofs make ideal assumptions on the QKD devices. Problematically, such assumptions are hard to satisfy in the experiments, and therefore it is not obvi…
▽ More
Despite the enormous theoretical and experimental progress made so far in quantum key distribution (QKD), the security of most existing QKD implementations is not rigorously established yet. A critical obstacle is that almost all existing security proofs make ideal assumptions on the QKD devices. Problematically, such assumptions are hard to satisfy in the experiments, and therefore it is not obvious how to apply such security proofs to practical QKD systems. Fortunately, any imperfections and security-loopholes in the measurement devices can be perfectly closed by measurement-device-independent QKD (MDI-QKD), and thus we only need to consider how to secure the source devices. Among imperfections in the source devices, correlations between the sending pulses are one of the principal problems. In this paper, we consider a setting-choice-independent correlation (SCIC) framework in which the sending pulses can present arbitrary correlations but they are independent of the previous setting choices such as the bit, the basis and the intensity settings. Within the framework of SCIC, we consider the dominant fluctuations of the sending states, such as the relative phases and the intensities, and provide a self-contained information theoretic security proof for the loss-tolerant QKD protocol in the finite-key regime. We demonstrate the feasibility of secure quantum communication within a reasonable number of pulses sent, and thus we are convinced that our work constitutes a crucial step toward guaranteeing implementation security of QKD.
△ Less
Submitted 26 March, 2018;
originally announced March 2018.
-
Pre-fixed Threshold Real Time Selection Method in Free-space Quantum Key Distribution
Authors:
Wenyuan Wang,
Feihu Xu,
Hoi-Kwong Lo
Abstract:
Free-space Quantum key distribution (QKD) allows two parties to share a random key with unconditional security, between ground stations, between mobile platforms, and even in satellite-ground quantum communications. Atmospheric turbulence causes fluctuations in transmittance, which further affect the quantum bit error rate (QBER) and the secure key rate. Previous post-selection methods to combat a…
▽ More
Free-space Quantum key distribution (QKD) allows two parties to share a random key with unconditional security, between ground stations, between mobile platforms, and even in satellite-ground quantum communications. Atmospheric turbulence causes fluctuations in transmittance, which further affect the quantum bit error rate (QBER) and the secure key rate. Previous post-selection methods to combat atmospheric turbulence require a threshold value determined after all quantum transmission. In contrast, here we propose a new method where we pre-determine the optimal threshold value even before quantum transmission. Therefore, the receiver can discard useless data immediately, thus greatly reducing data storage requirement and computing resource. Furthermore, our method can be applied to a variety of protocols, including, for example, not only single-photon BB84, but also asymptotic and finite-size decoy-state BB84, which can greatly increase its practicality.
△ Less
Submitted 24 December, 2017;
originally announced December 2017.
-
Foiling covert channels and malicious classical post-processing units in quantum key distribution
Authors:
Marcos Curty,
Hoi-Kwong Lo
Abstract:
Existing security proofs of quantum key distribution (QKD) suffer from two fundamental weaknesses. First, memory attacks have emerged as an important threat to the security of even device-independent quantum key distribution (DI-QKD), whenever QKD devices are re-used. This type of attacks constitutes an example of covert channels, which have attracted a lot of attention in security research in con…
▽ More
Existing security proofs of quantum key distribution (QKD) suffer from two fundamental weaknesses. First, memory attacks have emerged as an important threat to the security of even device-independent quantum key distribution (DI-QKD), whenever QKD devices are re-used. This type of attacks constitutes an example of covert channels, which have attracted a lot of attention in security research in conventional cryptographic and communication systems. Second, it is often implicitly assumed that the classical post-processing units of a QKD system are trusted. This is a rather strong assumption and is very hard to justify in practice. Here, we propose a simple solution to these two fundamental problems. Specifically, we show that by using verifiable secret sharing and multiple optical devices and classical post-processing units, one could re-establish the security of QKD. Our techniques are rather general and they apply to both DI-QKD and non-DI-QKD.
△ Less
Submitted 23 November, 2017;
originally announced November 2017.
-
Space QUEST mission proposal: Experimentally testing decoherence due to gravity
Authors:
Siddarth Koduru Joshi,
Jacques Pienaar,
Timothy C. Ralph,
Luigi Cacciapuoti,
Will McCutcheon,
John Rarity,
Dirk Giggenbach,
Jin Gyu Lim,
Vadim Makarov,
Ivette Fuentes,
Thomas Scheidl,
Erik Beckert,
Mohamed Bourennane,
David Edward Bruschi,
Adan Cabello,
Jose Capmany,
Alberto Carrasco-Casado,
Eleni Diamanti,
Miloslav Duusek,
Dominique Elser,
Angelo Gulinatti,
Robert H. Hadfield,
Thomas Jennewein,
Rainer Kaltenbaek,
Michael A. Krainak
, et al. (20 additional authors not shown)
Abstract:
Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph,…
▽ More
Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph, G J Milburn, and T Downes, Phys. Rev. A, 79(2):22121, 2009, T C Ralph and J Pienaar, New Journal of Physics, 16(8):85008, 2014], a bipartite entangled system could decohere if each particle traversed through a different gravitational field gradient. We propose to study this effect in a ground to space uplink scenario. We extend the above theoretical predictions of Ralph and coworkers and discuss the scientific consequences of detecting/failing to detect the predicted gravitational decoherence. We present a detailed mission design of the European Space Agency's (ESA) Space QUEST (Space - Quantum Entanglement Space Test) mission, and study the feasibility of the mission schema.
△ Less
Submitted 9 January, 2018; v1 submitted 23 March, 2017;
originally announced March 2017.
-
Quantum harmonic oscillator state control in a squeezed Fock basis
Authors:
D. Kienzler,
H. -Y. Lo,
V. Negnevitsky,
C. Flühmann,
M. Marinelli,
J. P. Home
Abstract:
We demonstrate control of a trapped-ion quantum harmonic oscillator in a squeezed Fock state basis, using engineered Hamiltonians analogous to the Jaynes-Cummings and anti-Jaynes-Cummings forms. We demonstrate that for squeezed Fock states with low $n$ the engineered Hamiltonians reproduce the $\sqrt{n}$ scaling of the matrix elements which is typical of Jaynes-Cummings physics, and also examine d…
▽ More
We demonstrate control of a trapped-ion quantum harmonic oscillator in a squeezed Fock state basis, using engineered Hamiltonians analogous to the Jaynes-Cummings and anti-Jaynes-Cummings forms. We demonstrate that for squeezed Fock states with low $n$ the engineered Hamiltonians reproduce the $\sqrt{n}$ scaling of the matrix elements which is typical of Jaynes-Cummings physics, and also examine deviations due to the finite wavelength of our control fields. Starting from a squeezed vacuum state, we apply sequences of alternating transfer pulses which allow us to climb the squeezed Fock state ladder, creating states up to excitations of $n = 6$ with up to 8.7 dB of squeezing, as well as demonstrating superpositions of these states. These techniques offer access to new sets of states of the harmonic oscillator which may be applicable for precision metrology or quantum information science.
△ Less
Submitted 2 August, 2017; v1 submitted 16 December, 2016;
originally announced December 2016.
-
Security of quantum key distribution with iterative sifting
Authors:
Kiyoshi Tamaki,
Hoi-Kwong Lo,
Akihiro Mizutani,
Go Kato,
Charles Ci Wen Lim,
Koji Azuma,
Marcos Curty
Abstract:
Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. The quantum phase of the protocol then ends when the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al. [N…
▽ More
Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. The quantum phase of the protocol then ends when the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al. [New J. Phys. 18 053001 (2016)] showed that iterative sifting makes QKD insecure, especially in the finite key regime, if the parameter estimation for privacy amplification uses the random sampling theory. This implies that a number of existing finite key security proofs could be flawed and cannot guarantee security. Here, we solve this serious problem by showing that the use of Azuma's inequality for parameter estimation makes QKD with iterative sifting secure again. This means that the existing protocols whose security proof employs this inequality remain secure even if they employ iterative sifting. Also, our results highlight a fundamental difference between the random sampling theorem and Azuma's inequality in proving security.
△ Less
Submitted 30 May, 2017; v1 submitted 20 October, 2016;
originally announced October 2016.
-
Large Cross-Phase Modulations at the Few-Photon Level
Authors:
Zi-Yu Liu,
Yi-Hsin Chen,
Yen-Chun Chen,
Hsiang-Yu Lo,
Pin-Ju Tsai,
Ite A. Yu,
Ying-Cheng Chen,
Yong-Fan Chen
Abstract:
We demonstrate an efficient cross-phase modulation (XPM) based on a closed-loop double-Λ system. The property of the double-Λ medium can be controlled by changing the phases of the applied optical fields. This phase-dependent XPM scheme can achieve large phase modulations at low-light intensities without requiring cavities or tightly focusing of laser beams. With this scheme, we observe a π-level…
▽ More
We demonstrate an efficient cross-phase modulation (XPM) based on a closed-loop double-Λ system. The property of the double-Λ medium can be controlled by changing the phases of the applied optical fields. This phase-dependent XPM scheme can achieve large phase modulations at low-light intensities without requiring cavities or tightly focusing of laser beams. With this scheme, we observe a π-level phase shift with two pulses both consisting of 8 photons in cold rubidium atoms. Such novel scheme provides a simple route to generate strong interactions between photons and may have potential applications in all-optical quantum signal processing.
△ Less
Submitted 4 July, 2016;
originally announced July 2016.