1
|
Dervisevic E, Voznak M, Mehic M. Bases selection with pseudo-random functions in BB84 scheme. Heliyon 2024; 10:e23578. [PMID: 38173502 PMCID: PMC10761772 DOI: 10.1016/j.heliyon.2023.e23578] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/19/2023] [Revised: 12/05/2023] [Accepted: 12/06/2023] [Indexed: 01/05/2024] Open
Abstract
Because the spectrum of services available in modern telecommunication networks is constantly expanding, security has become increasingly important. Simultaneously, in an era of constant progress in mathematics and computing, the security of existing cryptographic solutions becomes questionable. Quantum Key Distribution (QKD) is a promising secret key agreement primitive that enables long-awaited practical Information-Theoretical Secure (ITS) communications. The key generation rate, however, is one of the limitations of its widespread application to secure high throughput data flows. This paper addresses the aforementioned limitation by employing perfectly correlated bases selection defined by the output of Pseudo-Random Functions based on the keyed-Hash Message Authentication Code construction. In theory, the proposed variant of the BB84 scheme is ITS, reduces memory requirements, and reduces communication overhead during the post-processing stage. It can benefit QKD networks as a service by increasing capacity and accommodating users with varying security needs.
Collapse
Affiliation(s)
- Emir Dervisevic
- Department of Telecommunications, Faculty of Electrical Engineering, University of Sarajevo, Sarajevo, 71000, Bosnia and Herzegovina
| | - Miroslav Voznak
- Department of Telecommunications, Faculty of Electrical Engineering and Computer Science, VSB – Technical University of Ostrava, Ostrava, 708 00, Czechia
| | - Miralem Mehic
- Department of Telecommunications, Faculty of Electrical Engineering, University of Sarajevo, Sarajevo, 71000, Bosnia and Herzegovina
- Department of Telecommunications, Faculty of Electrical Engineering and Computer Science, VSB – Technical University of Ostrava, Ostrava, 708 00, Czechia
| |
Collapse
|
2
|
Wei JH, Xu XY, Hu SM, Zhou Q, Li L, Liu NL, Chen K. Measurement-Device-Independent Quantum Key Distribution Based on Decoherence-Free Subspaces with Logical Bell State Analyzer. ENTROPY (BASEL, SWITZERLAND) 2023; 25:869. [PMID: 37372213 DOI: 10.3390/e25060869] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/29/2023] [Revised: 05/26/2023] [Accepted: 05/27/2023] [Indexed: 06/29/2023]
Abstract
Measurement-device-independent quantum key distribution (MDI-QKD) enables two legitimate users to generate shared information-theoretic secure keys with immunity to all detector side attacks. However, the original proposal using polarization encoding is sensitive to polarization rotations stemming from birefringence in fibers or misalignment. To overcome this problem, here we propose a robust QKD protocol without detector vulnerabilities based on decoherence-free subspaces using polarization-entangled photon pairs. A logical Bell state analyzer is designed specifically for such encoding. The protocol exploits common parametric down-conversion sources, for which we develop a MDI-decoy-state method, and requires neither complex measurements nor a shared reference frame. We have analyzed the practical security in detail and presented a numerical simulation under various parameter regimes, showing the feasibility of the logical Bell state analyzer along with the potential that double communication distance can be achieved without a shared reference frame.
Collapse
Affiliation(s)
- Jun-Hao Wei
- Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Xin-Yu Xu
- Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Shu-Ming Hu
- Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Qing Zhou
- Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Li Li
- Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
- Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, China
| | - Nai-Le Liu
- Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
- Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, China
| | - Kai Chen
- Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
- Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, China
| |
Collapse
|
3
|
Tanaka HK. Cosmic coding and transfer for ultra high security near-field communications. iScience 2023; 26:105897. [PMID: 36718362 PMCID: PMC9883181 DOI: 10.1016/j.isci.2022.105897] [Citation(s) in RCA: 4] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/04/2022] [Revised: 11/30/2022] [Accepted: 12/22/2022] [Indexed: 01/06/2023] Open
Abstract
By using true random number (TRN) generators, encoding with the highest security can be realized. However, a completely secure strategy to transfer these TRNs has not yet been devised. Quantum key distribution (QKD) has attempted to establish secure key distribution methodology of this kind; however, several quantum cracking strategies have been predicted and experimentally demonstrated. In this work, COSMOCAT was invented as a solution for next-generation ultrahigh security near-field communications. With COSMOCAT, TRNs are generated from naturally occurring and ubiquitous cosmic-ray muons and the generated cosmic keys are distributed by these muons with an unprecedented level of security. The successful results of this experiment indicate that our prototype and the new key-generation-and-distribution standard can be utilized for practical encoding and near-field data transfer at rates of 10-100 Mbps. It is anticipated that COSMOCAT will be one of key techniques for future high security, near-field communication management.
Collapse
Affiliation(s)
- Hiroyuki K.M. Tanaka
- University of Tokyo, Tokyo, Japan,International Virtual Muography Institute (VMI), Global, Tokyo, Japan,Corresponding author
| |
Collapse
|
4
|
Mastriani M. Quantum key secure communication protocol via enhanced superdense coding. OPTICAL AND QUANTUM ELECTRONICS 2023; 55:10. [DOI: 10.1007/s11082-022-04303-5] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/27/2021] [Accepted: 10/14/2022] [Indexed: 09/02/2023]
|
5
|
Bebrov G. More optimal relativistic quantum key distribution. Sci Rep 2022; 12:15377. [PMID: 36100618 PMCID: PMC9470693 DOI: 10.1038/s41598-022-15247-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/18/2022] [Accepted: 06/21/2022] [Indexed: 11/09/2022] Open
Abstract
A great challenge in the field of quantum cryptography is the design and implementation of optimal quantum key distribution (QKD) scheme. An optimal scheme in terms of security is the so-called relativistic quantum key distribution; it ensures the security of the system by using both quantum phenomena and relativity. However, the existing relativistic schemes have not demonstrated optimality in terms of efficiency and rate (including secret key rate). Here we report two point-to-point relativistic quantum key distribution schemes implemented with weak coherent pulses. Both schemes rely on high-dimensional quantum systems (phase and polarization encodings are utilized for establishing key bits). One of the proposed schemes is a system comprised of two sequentially connected interferometers, as the first (interferometer) controls the behavior of the second one. The other proposed scheme represents a setup of a classic relativistic QKD, but with slight modification. Both of the proposed schemes are characterized with high secret key rate. The latter scheme has the highest secret key rate of all the relativistic QKD protocols. However, the values for the secret key rate are relevant for distances of up to 150 km. The former scheme has lower secret key rate, but longer operating distances (the work could operate at distances of up to 320 km). Those values of rate are obtained without disturbing the security. Secret-key-rate comparison between distinct models is reported. The proposed relativistic models are compared to twin-field QKD protocols. Furthermore, the work proposes a metric for evaluating the optimality of a QKD. It is defined as a ratio between the secret key rate (at a given distance) and the amount of quantum resources (qubits) used in the QKD of concern. It is shown that one of the proposed schemes in this article is the most optimal relativistic key distribution and more optimal than the original twin-field. It is also verified that the proposed schemes excels the original twin-field in terms of secret key rate, but for short distances.
Collapse
Affiliation(s)
- Georgi Bebrov
- Telecommunications Department, Technical University of Varna, 9010, Varna, Bulgaria.
| |
Collapse
|
6
|
Guo C, Zhang Y, Wu T, Li K, Ran Y, Dong C. Threshold switching strategy for unambiguous state discrimination of quadrature phase-shift-keying coherent states under thermal noise. OPTICS EXPRESS 2022; 30:34043-34052. [PMID: 36242426 DOI: 10.1364/oe.466090] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/07/2022] [Accepted: 08/09/2022] [Indexed: 06/16/2023]
Abstract
Quantum-enhanced measurement technologies can unambiguously discriminate coherent states with accuracy beyond the classical heterodyne measurement. However, typical quantum-enhanced measurement scheme is vulnerable to the thermal noise, which will change the photon counting statistics of the coherent state. This paper presents a threshold-switching strategy that can discriminate quadrature phase-shift-keying coherent states with performance surpassing the typical quantum-enhanced scheme. In our scheme, photon number resolving detectors are used to switch the value of the threshold, which can mitigate the influence of thermal noise and other imperfections. Simulation results show that our scheme unambiguously discriminates the signal states with higher correct probability and the same error ratio compared with the typical scheme. Besides, this scheme can reduce the error ratio simultaneously for thermal noise N ≤ 0.2. The paper demonstrations that quantum-enhanced measurement with the threshold-switching strategy can adapt to different thermal noises by switching the value of the threshold under situations of different thermal noises and signal states.
Collapse
|
7
|
Chen X, Chen L, Yan Y. Detecting a Photon-Number Splitting Attack in Decoy-State Measurement-Device-Independent Quantum Key Distribution via Statistical Hypothesis Testing. ENTROPY (BASEL, SWITZERLAND) 2022; 24:1232. [PMID: 36141118 PMCID: PMC9497591 DOI: 10.3390/e24091232] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/11/2022] [Revised: 08/14/2022] [Accepted: 08/23/2022] [Indexed: 06/16/2023]
Abstract
Measurement-device-independent quantum key distribution (MDI-QKD) is innately immune to all detection-side attacks. Due to the limitations of technology, most MDI-QKD protocols use weak coherent photon sources (WCPs), which may suffer from a photon-number splitting (PNS) attack from eavesdroppers. Therefore, the existing MDI-QKD protocols also need the decoy-state method, which can resist PNS attacks very well. However, the existing decoy-state methods do not attend to the existence of PNS attacks, and the secure keys are only generated by single-photon components. In fact, multiphoton pulses can also form secure keys if we can confirm that there is no PNS attack. For simplicity, we only analyze the weaker version of a PNS attack in which a legitimate user's pulse count rate changes significantly after the attack. In this paper, under the null hypothesis of no PNS attack, we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state MDI-QKD protocols via statistical hypothesis testing, extract a normal distribution statistic, and provide a detection method and the corresponding Type I error probability. If the result is judged to be an attack, we use the existing decoy-state method to estimate the secure key rate. Otherwise, all pulses with the same basis leading to successful Bell state measurement (BSM) events including both single-photon pulses and multiphoton pulses can be used to generate secure keys, and we give the formula of the secure key rate in this case. Finally, based on actual experimental data from other literature, the associated experimental results (e.g., the significance level is 5%) show the correctness of our method.
Collapse
Affiliation(s)
- Xiaoming Chen
- School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
- Beijing Electronic Science and Technology Institute, Beijing 100070, China
- School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230026, China
| | - Lei Chen
- School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
- Beijing Electronic Science and Technology Institute, Beijing 100070, China
| | - Yalong Yan
- School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230026, China
| |
Collapse
|
8
|
Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation. APPLIED SCIENCES-BASEL 2022. [DOI: 10.3390/app12094709] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/10/2022]
Abstract
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy against the photon number splitting attack. It was shown that the 1-decoy state protocol, easier to implement in the practical QKD system, outperforms the 2-decoy state protocol for block sizes of up to 108 bits. How intensity fluctuations influence the performance of the 1-decoy state protocol with finite resources remains a pending issue. In this paper, we present a finite-key analysis of the 1-decoy state protocol with intensity fluctuations and obtain the secret key rate formula about intensity fluctuations. Our numerical simulation results show that the stronger the intensity fluctuations, the lower the secret key rate for a small data block size of a few bits. Our research can provide theoretical implications for the selection of data size in the QKD system with intensity fluctuations.
Collapse
|
9
|
Zhang JH, Zhang FL, Wang ZX, Yang H, Fei SM. Unambiguous State Discrimination with Intrinsic Coherence. ENTROPY (BASEL, SWITZERLAND) 2021; 24:18. [PMID: 35052044 PMCID: PMC8775143 DOI: 10.3390/e24010018] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/14/2021] [Revised: 12/11/2021] [Accepted: 12/17/2021] [Indexed: 06/14/2023]
Abstract
We investigate the discrimination of pure-mixed (quantum filtering) and mixed-mixed states and compare their optimal success probability with the one for discriminating other pairs of pure states superposed by the vectors included in the mixed states. We prove that under the equal-fidelity condition, the pure-pure state discrimination scheme is superior to the pure-mixed (mixed-mixed) one. With respect to quantum filtering, the coherence exists only in one pure state and is detrimental to the state discrimination for lower dimensional systems; while it is the opposite for the mixed-mixed case with symmetrically distributed coherence. Making an extension to infinite-dimensional systems, we find that the coherence which is detrimental to state discrimination may become helpful and vice versa.
Collapse
Affiliation(s)
- Jin-Hua Zhang
- Department of Physics, Xinzhou Teacher’s University, Xinzhou 034000, China;
| | - Fu-Lin Zhang
- Department of Physics, School of Science, Tianjin University, Tianjin 300072, China
| | - Zhi-Xi Wang
- School of Mathematical Sciences, Capital Normal University, Beijing 100048, China;
| | - Hui Yang
- Department of Physics, Xinzhou Teacher’s University, Xinzhou 034000, China;
| | - Shao-Ming Fei
- School of Mathematical Sciences, Capital Normal University, Beijing 100048, China;
- Max-Planck-Institute for Mathematics in the Sciences, D-04103 Leipzig, Germany
| |
Collapse
|
10
|
Bebrov G. Higher-rate relativistic quantum key distribution. Sci Rep 2021; 11:23543. [PMID: 34876616 PMCID: PMC8651778 DOI: 10.1038/s41598-021-02739-5] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/07/2021] [Accepted: 11/16/2021] [Indexed: 11/10/2022] Open
Abstract
One of the major problems in the field of quantum key distribution (QKD) is the low key rates at which the systems operate. The reasons for this are the processes used to ensure the key distribution itself: sifting, parameter estimation, key reconciliation, and privacy amplification. So, this reduction in the rate of communication is inherent to all existing quantum key distribution schemes. This paper is concerned with proposing a solution to mitigate the rate reduction of the so-called relativistic QKD. To mitigate the reduction, we introduce a modified relativistic QKD protocol, which is based on Mach-Zehnder interferometer being used as a probabilistic basis selection system (basis misalignment occurs between the parties in approximately half of the transferred qubits). The interferometric scheme allows the participating parties to correlate the mutual unbiased bases (MUBs) chosen by them. In this regard, a qubit could be used to transfer more than one bit of information. To be precise, by implementing the proposed interferometric scheme into a relativistic QKD protocol, a qubit is able to transfer two bits of information. This results in achieving a protocol, which is characterized with a greater rate of communication, two times greater than the usual rate. The modified protocol is proven to be secure against intercept-resend and collective attacks.
Collapse
Affiliation(s)
- Georgi Bebrov
- Telecommunications Department, Technical University of Varna, Varna, 9010, Bulgaria.
| |
Collapse
|
11
|
LEO Satellites Constellation-to-Ground QKD Links: Greek Quantum Communication Infrastructure Paradigm. PHOTONICS 2021. [DOI: 10.3390/photonics8120544] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Quantum key distribution (QKD) has gained a lot of attention over the past few years, but the implementation of quantum security applications is still challenging to accomplish with the current technology. Towards a global-scale quantum-secured network, satellite communications seem to be a promising candidate to successfully support the quantum communication infrastructure (QCI) by delivering quantum keys to optical ground terminals. In this research, we examined the feasibility of satellite-to-ground QKD under daylight and nighttime conditions using the decoy-state BB84 QKD protocol. We evaluated its performance on a hypothetical constellation with 10 satellites in sun-synchronous Low Earth Orbit (LEO) that are assumed to communicate over a period of one year with three optical ground stations (OGSs) located in Greece. By taking into account the atmospheric effects of turbulence as well as the background solar radiance, we showed that positive normalized secure key rates (SKRs) up to 3.9×10−4 (bps/pulse) can be obtained, which implies that satellite-to-ground QKD can be feasible for various conditions, under realistic assumptions in an existing infrastructure.
Collapse
|
12
|
The Performance of Satellite-Based Links for Measurement-Device-Independent Quantum Key Distribution. ENTROPY 2021; 23:e23081010. [PMID: 34441150 PMCID: PMC8393344 DOI: 10.3390/e23081010] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/15/2021] [Revised: 07/29/2021] [Accepted: 07/31/2021] [Indexed: 11/16/2022]
Abstract
Measurement-device-independent quantum key distribution (MDI-QKD) protocol has high practical value. Satellite-based links are useful to build long-distance quantum communication network. The model of satellite-based links for MDI-QKD was proposed but it lacks practicality. This work further analyzes the performance of it. First, MDI-QKD and satellite-based links model are introduced. Then considering the operation of the satellite the performance of their combination is studied under different weather conditions. The results may provide important references for combination of optical-fiber-based links on the ground and satellite-based links in space, which is helpful for large-scale quantum communication network.
Collapse
|
13
|
Kaur J, Ramkumar K.R. The recent trends in cyber security: A review. JOURNAL OF KING SAUD UNIVERSITY - COMPUTER AND INFORMATION SCIENCES 2021. [DOI: 10.1016/j.jksuci.2021.01.018] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
14
|
González-Payo J, Trényi R, Wang W, Curty M. Upper Security Bounds for Coherent-One-Way Quantum Key Distribution. PHYSICAL REVIEW LETTERS 2020; 125:260510. [PMID: 33449754 DOI: 10.1103/physrevlett.125.260510] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/01/2020] [Accepted: 12/15/2020] [Indexed: 06/12/2023]
Abstract
The performance of quantum key distribution (QKD) is severely limited by multiphoton pulses emitted by laser sources due to the photon-number splitting attack. Coherent-one-way (COW) QKD has been introduced as a promising solution to overcome this limitation, and thus extend the achievable distance of practical QKD. Indeed, thanks to its experimental simplicity, the COW protocol is already used in commercial applications. Here, we derive simple upper security bounds on its secret key rate, which demonstrate that it scales at most quadratically with the system's transmittance, thus solving a long-standing problem. That is, in contrast to what has been claimed, this approach is inappropriate for long-distance QKD transmission. Remarkably, our findings imply that all implementations of the COW protocol performed so far are insecure.
Collapse
Affiliation(s)
- Javier González-Payo
- Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo E-36310, Spain
| | - Róbert Trényi
- Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo E-36310, Spain
| | - Weilong Wang
- Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo E-36310, Spain
- State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan 450001, China
- Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, Henan 450001, China
| | - Marcos Curty
- Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo E-36310, Spain
| |
Collapse
|
15
|
Generalized sequential state discrimination for multiparty QKD and its optical implementation. Sci Rep 2020; 10:8247. [PMID: 32427876 PMCID: PMC7237475 DOI: 10.1038/s41598-020-63719-9] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/13/2019] [Accepted: 03/24/2020] [Indexed: 11/21/2022] Open
Abstract
Sequential state discrimination is a strategy for N separated receivers. As sequential state discrimination can be applied to multiparty quantum key distribution (QKD), it has become one of the relevant research fields in quantum information theory. Up to now, the analysis of sequential state discrimination has been confined to special cases. In this report, we consider a generalization of sequential state discrimination. Here, we do not limit the prior probabilities and the number of quantum states and receivers. We show that the generalized sequential state discrimination can be expressed as an optimization problem. Moreover, we investigate a structure of generalized sequential state discrimination for two quantum states and apply it to multiparty QKD. We demonstrate that when the number of receivers is not too many, generalized sequential state discrimination for two pure states can be suitable for multiparty QKD. In addition, we show that generalized sequential state discrimination for two mixed states can be performed with high optimal success probability. This optimal success probability is even higher than those of quantum reproducing and quantum broadcasting strategy. Thus, generalized sequential state discrimination of mixed states is adequate for performing multiparty QKD. Furthermore, we prove that generalized sequential state discrimination can be implemented experimentally by using linear optics. Finally, we analyze the security of multiparty QKD provided by optimal sequential state discrimination. Our analysis shows that the multiparty QKD guarantees nonzero secret key rate even in low channel efficiency.
Collapse
|
16
|
Ding HJ, Chen JJ, Ji L, Zhou XY, Zhang CH, Zhang CM, Wang Q. 280-km experimental demonstration of a quantum digital signature with one decoy state. OPTICS LETTERS 2020; 45:1711-1714. [PMID: 32235980 DOI: 10.1364/ol.389848] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/02/2023]
Abstract
A quantum digital signature (QDS) guarantees the unforgeability, nonrepudiation, and transferability of signature messages with information-theoretic security, and hence has attracted much attention recently. However, most previous implementations of QDS showed relatively low signature rates and/or short transmission distance. In this Letter, we report a proof-of-principle phase-encoding QDS demonstration using only one decoy state. First, such a method avoids the modulation of the vacuum state, thus reducing experimental complexity and random number consumption. Moreover, incorporated with low-loss asymmetric Mach-Zehnder interferometers and a real-time polarization calibration technique, we have successfully achieved a higher signature rate, e.g., 0.98 bit/s at 103 km, and to date, a record-breaking, to the best of our knowledge, transmission distance of over 280-km installed fibers. Our work represents a significant step towards real-world applications of QDS.
Collapse
|
17
|
Guo PL, Dong C, He Y, Jing F, He WT, Ren BC, Li CY, Deng FG. Efficient quantum key distribution against collective noise using polarization and transverse spatial mode of photons. OPTICS EXPRESS 2020; 28:4611-4624. [PMID: 32121695 DOI: 10.1364/oe.374292] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/06/2019] [Accepted: 01/06/2020] [Indexed: 06/10/2023]
Abstract
Channel noise is the main issue which reduces the efficiency of quantum communication. Here we present an efficient scheme for quantum key distribution against collective-rotation channel noise using polarization and transverse spatial mode of photons. Exploiting the two single-photon Bell states and two-photon hyperentangled Bell states in the polarization and the transverse spatial mode degrees of freedom (DOFs), the mutually unbiased bases can be encoded for logical qubits against the collective-rotation noise. Our scheme shows noiseless subspaces can be made up of two DOFs of two photons instead of multiple photons, which will reduce the resources required for noiseless subspaces and depress the photonic loss sensitivity. Moreover, the two single-photon Bell states and two-photon hyperentangled Bell states are symmetrical to the two photons, which means the relative order of the two photons is not required in our scheme, so the receiver only needs to measure the state of each photon, which makes our protocol easy to execute in experiment than the previous works.
Collapse
|
18
|
Zhang CH, Zhang CM, Wang Q. Twin-field quantum key distribution with modified coherent states. OPTICS LETTERS 2019; 44:1468-1471. [PMID: 30874678 DOI: 10.1364/ol.44.001468] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/28/2018] [Accepted: 02/18/2019] [Indexed: 06/09/2023]
Abstract
The twin-field quantum key distribution (TF-QKD) protocol is designed to beat the rate-distance limit of quantum key distributions without employing quantum repeaters; meanwhile, it can offer the measurement-device-independent secure level. In this Letter, we propose to improve the performance of TF-QKD protocols by employing modified coherent states. Based on the Wang et al. sending-or-not scheme [Phys. Rev. A98, 062323 (2018)PLRAAN1050-294710.1103/PhysRevA.98.062323], we study the key rate with the modified coherent states in finite data size and do comparisons with the one using weak coherent states. Through numerical simulations, we demonstrate that modified coherent states can substantially increase the performance of QKD more than the latter.
Collapse
|
19
|
Wide Area Key Distribution Network Based on a Quantum Key Distribution System. APPLIED SCIENCES-BASEL 2019. [DOI: 10.3390/app9061073] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
The point-to-point quantum key distribution (QKD) system is limited by the transmission distance. So, the wide area QKD network with multiple endpoints is the research focus of this study. The relay-node scenario and key relay protocols provide the solutions to the QKD network. The early key relay protocols require the relay nodes to be reliable. Once the relay nodes become compromised, the whole network is insecure. In this paper, we extend the chain structure of the public-XOR(exclusive OR)-key scheme with two endpoints to the complex network with multiple endpoints. The relay nodes in our scheme do not need encryption actions, decryption actions, or storage XOR keys, which simplifies the system compared with other key distribution schemes based on trusted relay nodes. Our scheme not only improves the practical performance and simplifies the system’s complexity, but it also ensures that the security is not reduced. Specifically, we rigorously demonstrate that an eavesdropper can never access the key shared by the users of the network as long as the process of generating XOR keys and destroying the original keys is secure. In addition, we discuss the information leakage of the practical QKD network from the perspective of the unicity distance.
Collapse
|
20
|
Hu XL, Cao Y, Yu ZW, Wang XB. Measurement-Device-Independent Quantum Key Distribution over asymmetric channel and unstable channel. Sci Rep 2018; 8:17634. [PMID: 30518943 PMCID: PMC6281621 DOI: 10.1038/s41598-018-35507-z] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/06/2018] [Accepted: 11/07/2018] [Indexed: 12/02/2022] Open
Abstract
We show that a high key rate of Measurement-Device-Independent Quantum Key Distribution (MDIQKD) over asymmetric and unstable quantum channel can be obtained by full optimization and compensation. Employing a gradient optimization method, we make the full optimization taking both the global optimization for the 12 independent parameters and the joint constraints for statistical fluctuations. We present a loss-compensation method by monitoring the channel loss for an unstable channel. The numerical simulation shows that the method can produce high key rate for both the asymmetric channel and the unstable channel. Compared with the existing results of independent constraints, our result here improves the key rate by 1 to tens of times in typical experimental conditions.
Collapse
Affiliation(s)
- Xiao-Long Hu
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China
| | - Yuan Cao
- National Laboratory for Physical Sciences at the Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, 230026, China
- CAS Center for Exellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai, 201315, China
| | - Zong-Wen Yu
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China
- Data Communication Science and Technology Research Institute, Beijing, 100191, China
| | - Xiang-Bin Wang
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China.
- Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui, 230026, China.
- Shenzhen Institute for Quantum Science and Engineering, and Department of Physics, Southern University of Science and Technology, Shenzhen, 518055, China.
| |
Collapse
|
21
|
Abstract
Sequential state discrimination is a strategy for quantum state discrimination of a sender’s quantum states when N receivers are separately located. In this report, we propose optical designs that can perform sequential state discrimination of two coherent states. For this purpose, we consider not only binary phase-shifting-key (BPSK) signals but also general coherent states, with arbitrary prior probabilities. Since our optical designs do not include electric feedback, they can be implemented without difficulty. Furthermore, we analyze our proposal for the case of photon loss. We also demonstrate that sequential state discrimination of two coherent states performs better than the probabilistic quantum cloning strategy. This proposal can facilitate multiparty QKD based on coherent states.
Collapse
|
22
|
DiMario MT, Becerra FE. Robust Measurement for the Discrimination of Binary Coherent States. PHYSICAL REVIEW LETTERS 2018; 121:023603. [PMID: 30085718 DOI: 10.1103/physrevlett.121.023603] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/15/2018] [Indexed: 06/08/2023]
Abstract
The discrimination of two nonorthogonal states is a fundamental element for secure and efficient communication. Quantum measurements of nonorthogonal coherent states can enhance information transfer beyond the limits of conventional technologies. We demonstrate a strategy for binary state discrimination based on optimized single-shot measurements with photon number resolving detection with a finite number resolution. This strategy enables a high degree of robustness to noise and imperfections while being scalable to high rates and, in principle, allows for surpassing the quantum noise limit (QNL) in practical situations. These features make the strategy inherently compatible with high-bandwidth communication and quantum information applications, providing advantages over the QNL under realistic conditions.
Collapse
Affiliation(s)
- M T DiMario
- Center for Quantum Information and Control, Department of Physics and Astronomy, University of New Mexico, Albuquerque, New Mexico 87131, USA
| | - F E Becerra
- Center for Quantum Information and Control, Department of Physics and Astronomy, University of New Mexico, Albuquerque, New Mexico 87131, USA
| |
Collapse
|
23
|
Mao CC, Zhou XY, Zhu JR, Zhang CH, Zhang CM, Wang Q. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method. OPTICS EXPRESS 2018; 26:13289-13300. [PMID: 29801354 DOI: 10.1364/oe.26.013289] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/12/2018] [Accepted: 04/16/2018] [Indexed: 06/08/2023]
Abstract
Recently Zhang et al [ Phys. Rev. A95, 012333 (2017)] developed a new approach to estimate the failure probability for the decoy-state BB84 QKD system when taking finite-size key effect into account, which offers security comparable to Chernoff bound, while results in an improved key rate and transmission distance. Based on Zhang et al's work, now we extend this approach to the case of the measurement-device-independent quantum key distribution (MDI-QKD), and for the first time implement it onto the four-intensity decoy-state MDI-QKD system. Moreover, through utilizing joint constraints and collective error-estimation techniques, we can obviously increase the performance of practical MDI-QKD systems compared with either three- or four-intensity decoy-state MDI-QKD using Chernoff bound analysis, and achieve much higher level security compared with those applying Gaussian approximation analysis.
Collapse
|
24
|
Fei YY, Meng XD, Gao M, Wang H, Ma Z. Quantum man-in-the-middle attack on the calibration process of quantum key distribution. Sci Rep 2018. [PMID: 29523828 PMCID: PMC5845025 DOI: 10.1038/s41598-018-22700-3] [Citation(s) in RCA: 17] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022] Open
Abstract
Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and low error rate. All QKD security proofs implicitly assume that the quantum channel has been established securely. However, the eavesdropper may attack the calibration process to break the security assumption of QKD and provide precondition to steal information about the final key successfully. In this paper, we reveal the security risk of the calibration process of a passive-basis-choice BB84 QKD system by launching a quantum man-in-the-middle attack which intercepts all calibration signals and resends faked ones. Large temporal bit-dependent or basis-dependent detector efficiency mismatch can be induced. Then we propose a basis-dependent detector efficiency mismatch (BEM) based faked states attack on a single photon BB84 QKD to stress the threat of BEM. Moreover, the security of single photon QKD systems with BEM is studied simply and intuitively. Two effective countermeasures are suggested to remove the general security risk of the calibration process.
Collapse
Affiliation(s)
- Yang-Yang Fei
- State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, China
| | - Xiang-Dong Meng
- State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, China
| | - Ming Gao
- State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, China.
| | - Hong Wang
- State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, China
| | - Zhi Ma
- State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, Henan, 450001, China.,CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui, 230026, China
| |
Collapse
|
25
|
Abstract
Efficiency in measurement-device-independent quantum key distribution(MDI-QKD) can be improved not only by the protocol, but also single-photon sources. We study the behavior of MDI-QKD with statistical fluctuation using quantum blockade source. Numerical simulation for a type of 4-intensity protocol shows that, after parameter optimization, this source can improve the final key rate by 100 times compared with traditional weak coherent state sources.
Collapse
|
26
|
Zhang CH, Zhang CM, Guo GC, Wang Q. Biased three-intensity decoy-state scheme on the measurement-device-independent quantum key distribution using heralded single-photon sources. OPTICS EXPRESS 2018; 26:4219-4229. [PMID: 29475274 DOI: 10.1364/oe.26.004219] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/27/2017] [Accepted: 01/17/2018] [Indexed: 06/08/2023]
Abstract
At present, most of the measurement-device-independent quantum key distributions (MDI-QKD) are based on weak coherent sources and limited in the transmission distance under realistic experimental conditions, e.g., considering the finite-size-key effects. Hence in this paper, we propose a new biased decoy-state scheme using heralded single-photon sources for the three-intensity MDI-QKD, where we prepare the decoy pulses only in X basis and adopt both the collective constraints and joint parameter estimation techniques. Compared with former schemes with WCS or HSPS, after implementing full parameter optimizations, our scheme gives distinct reduced quantum bit error rate in the X basis and thus show excellent performance, especially when the data size is relatively small.
Collapse
|
27
|
Liu C, Liu J, Zhang J, Zhu S. Improvement of reliability in multi-interferometer-based counterfactual deterministic communication with dissipation compensation. OPTICS EXPRESS 2018; 26:2261-2269. [PMID: 29401766 DOI: 10.1364/oe.26.002261] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/02/2017] [Accepted: 12/27/2017] [Indexed: 06/07/2023]
Abstract
The direct counterfactual quantum communication (DCQC) is a surprising phenomenon that quantum information can be transmitted without using any carriers of physical particles. The nested interferometers are promising devices for realizing DCQC as long as the number of interferometers goes to be infinity. Considering the inevitable loss or dissipation in practical experimental interferometers, we analyze the dependence of reliability on the number of interferometers, and show that the reliability of direct communication is being rapidly degraded with the large number of interferometers. Furthermore, we simulate and test this counterfactual deterministic communication protocol with a finite number of interferometers, and demonstrate the improvement of the reliability using dissipation compensation in interferometers.
Collapse
|
28
|
The Experimental Demonstration of High Efficiency Interaction-free Measurement for Quantum Counterfactual-like Communication. Sci Rep 2017; 7:10875. [PMID: 28883494 PMCID: PMC5589862 DOI: 10.1038/s41598-017-11305-x] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/25/2016] [Accepted: 08/22/2017] [Indexed: 11/08/2022] Open
Abstract
We present an interaction-free measurement with quantum Zeno effect and a high efficiency η = 74.6% ± 0.15%. As a proof-of-principle demonstration, this measurement can be used to implement a quantum counterfactual-like communication protocol. Instead of a single photon state, we use a coherent light as the input source and show that the output agrees with the proposed quantum counterfactual communication protocol according to Salih et al. Although the counterfactuality is not achieved due to the presence of a few photons in the public channel, we show that the signal light is nearly absent in the public channel, which exhibits a proof-of-principle quantum counterfactual-like property of communication.
Collapse
|
29
|
Quantum key distribution with prepare-and-measure Bell test. Sci Rep 2016; 6:35032. [PMID: 27733771 PMCID: PMC5062072 DOI: 10.1038/srep35032] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/21/2016] [Accepted: 09/22/2016] [Indexed: 11/08/2022] Open
Abstract
The prepare-and-measure quantum key distribution (QKD) has the merits of fast speed, high key generation rate, and easy implementation. However, the detector side channel attacks greatly undermine the security of the key bits. The eavesdropper, Eve, exploits the flaws of the detectors to obtain illegal information without violating quantum principles. It means that she can intervene in the communication without being detected. A prepare-and-measure Bell test protocol will be proposed. By randomly carrying out Bell test at the side of the information receiver, Bob, Eve's illegal information gain within the detector side channel attack can be well bounded. This protocol does not require any improvement on the detectors used in available prepare-and-measure QKD. Though we only illustrate its application in the BB84 protocol, it is applicable for any prepare-and-measure QKD.
Collapse
|
30
|
Chen L, Zhang W, Cai K, Zhang Y, Qi Q. Revisiting the which-way experiment with twisted light beams. OPTICS LETTERS 2014; 39:5897-5900. [PMID: 25361114 DOI: 10.1364/ol.39.005897] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
Abstract
We report an experiment of which-way information and a quantum eraser based on polarization-controlled interference of two twisted light beams carrying high orbital angular momentum (OAM) up to ℓ=±50 and ±100, respectively. By changing the polarization plane of one OAM beam from 0° to 90° with respect to that of the other OAM beam, we observe the gradual disappearance of the interference petal-like patterns into the noninterference single bright rings. Subsequently, we use the eraser of a diagonal polarizer to retrieve the characteristic petal-like interference. The experimental results can be well explained in the frame of single-photon Greenberger-Horne-Zeilinger-like (GHZ-like) entanglement. Our work may be beneficial to understanding the wave-particle duality of light.
Collapse
|
31
|
Mizutani A, Tamaki K, Ikuta R, Yamamoto T, Imoto N. Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol. Sci Rep 2014; 4:5236. [PMID: 24913431 PMCID: PMC4050389 DOI: 10.1038/srep05236] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/09/2014] [Accepted: 05/20/2014] [Indexed: 11/26/2022] Open
Abstract
The measurement-device-independent quantum key distribution (MDI QKD) was proposed to make BB84 completely free from any side-channel in detectors. Like in prepare & measure QKD, the use of other protocols in MDI setting would be advantageous in some practical situations. In this paper, we consider SARG04 protocol in MDI setting. The prepare & measure SARG04 is proven to be able to generate a key up to two-photon emission events. In MDI setting we show that the key generation is possible from the event with single or two-photon emission by a party and single-photon emission by the other party, but the two-photon emission event by both parties cannot contribute to the key generation. On the contrary to prepare & measure SARG04 protocol where the experimental setup is exactly the same as BB84, the measurement setup for SARG04 in MDI setting cannot be the same as that for BB84 since the measurement setup for BB84 in MDI setting induces too many bit errors. To overcome this problem, we propose two alternative experimental setups, and we simulate the resulting key rate. Our study highlights the requirements that MDI QKD poses on us regarding with the implementation of a variety of QKD protocols.
Collapse
Affiliation(s)
- Akihiro Mizutani
- Graduate School of Engineering Science, Osaka University, Toyonaka, Osaka 560-8531, Japan
| | - Kiyoshi Tamaki
- NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato-Wakamiya Atsugi-Shi, 243-0198, Japan
| | - Rikizo Ikuta
- Graduate School of Engineering Science, Osaka University, Toyonaka, Osaka 560-8531, Japan
| | - Takashi Yamamoto
- Graduate School of Engineering Science, Osaka University, Toyonaka, Osaka 560-8531, Japan
| | - Nobuyuki Imoto
- Graduate School of Engineering Science, Osaka University, Toyonaka, Osaka 560-8531, Japan
| |
Collapse
|
32
|
Sasaki T, Yamamoto Y, Koashi M. Practical quantum key distribution protocol without monitoring signal disturbance. Nature 2014; 509:475-8. [DOI: 10.1038/nature13303] [Citation(s) in RCA: 221] [Impact Index Per Article: 22.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/29/2013] [Accepted: 03/27/2014] [Indexed: 11/09/2022]
|
33
|
Sun SH, Jiang MS, Ma XC, Li CY, Liang LM. Hacking on decoy-state quantum key distribution system with partial phase randomization. Sci Rep 2014; 4:4759. [PMID: 24755767 PMCID: PMC3996487 DOI: 10.1038/srep04759] [Citation(s) in RCA: 32] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/11/2013] [Accepted: 04/04/2014] [Indexed: 11/24/2022] Open
Abstract
Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.
Collapse
Affiliation(s)
- Shi-Hai Sun
- Department of Physics, National University of Defense Technology, Changsha 410073, P. R. China
| | - Mu-Sheng Jiang
- Department of Physics, National University of Defense Technology, Changsha 410073, P. R. China
| | - Xiang-Chun Ma
- Department of Physics, National University of Defense Technology, Changsha 410073, P. R. China
| | - Chun-Yan Li
- Department of Physics, National University of Defense Technology, Changsha 410073, P. R. China
| | - Lin-Mei Liang
- 1] Department of Physics, National University of Defense Technology, Changsha 410073, P. R. China [2] State Key Laboratory of High Performance Computing, National University of Defense Technology, Changsha 410073, People's Republic of China
| |
Collapse
|
34
|
Wang Q, Wang XB. Simulating of the measurement-device independent quantum key distribution with phase randomized general sources. Sci Rep 2014; 4:4612. [PMID: 24728000 PMCID: PMC3985083 DOI: 10.1038/srep04612] [Citation(s) in RCA: 51] [Impact Index Per Article: 5.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/28/2013] [Accepted: 02/28/2014] [Indexed: 11/09/2022] Open
Abstract
We present a model on the simulation of the measurement-device independent quantum key distribution (MDI-QKD) with phase randomized general sources. It can be used to predict experimental observations of a MDI-QKD with linear channel loss, simulating corresponding values for the gains, the error rates in different basis, and also the final key rates. Our model can be applicable to the MDI-QKDs with arbitrary probabilistic mixture of different photon states or using any coding schemes. Therefore, it is useful in characterizing and evaluating the performance of the MDI-QKD protocol, making it a valuable tool in studying the quantum key distributions.
Collapse
Affiliation(s)
- Qin Wang
- Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
| | - Xiang-Bin Wang
- Department of Physics and State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing 100084, China
- Jinan Institute of Quantum Technology, Shandong Academy of Information Technology, Jinan, China
| |
Collapse
|
35
|
Experimental quantum key distribution with finite-key security analysis for noisy channels. Nat Commun 2014; 4:2363. [PMID: 24008848 DOI: 10.1038/ncomms3363] [Citation(s) in RCA: 35] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/28/2012] [Accepted: 07/26/2013] [Indexed: 11/08/2022] Open
Abstract
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.
Collapse
|
36
|
Liang WY, Wang S, Li HW, Yin ZQ, Chen W, Yao Y, Huang JZ, Guo GC, Han ZF. Proof-of-principle experiment of reference-frame-independent quantum key distribution with phase coding. Sci Rep 2014; 4:3617. [PMID: 24402550 PMCID: PMC3885882 DOI: 10.1038/srep03617] [Citation(s) in RCA: 37] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/28/2013] [Accepted: 12/09/2013] [Indexed: 11/16/2022] Open
Abstract
We have demonstrated a proof-of-principle experiment of reference-frame-independent phase coding quantum key distribution (RFI-QKD) over an 80-km optical fiber. After considering the finite-key bound, we still achieve a distance of 50 km. In this scenario, the phases of the basis states are related by a slowly time-varying transformation. Furthermore, we developed and realized a new decoy state method for RFI-QKD systems with weak coherent sources to counteract the photon-number-splitting attack. With the help of a reference-frame-independent protocol and a Michelson interferometer with Faraday rotator mirrors, our system is rendered immune to the slow phase changes of the interferometer and the polarization disturbances of the channel, making the procedure very robust.
Collapse
Affiliation(s)
- Wen-Ye Liang
- Key Laboratory of Quantum Information, University of Science and Technology of China, CAS, Hefei, Anhui 230026, China
- Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| | - Shuang Wang
- Key Laboratory of Quantum Information, University of Science and Technology of China, CAS, Hefei, Anhui 230026, China
- Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| | - Hong-Wei Li
- Key Laboratory of Quantum Information, University of Science and Technology of China, CAS, Hefei, Anhui 230026, China
- Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| | - Zhen-Qiang Yin
- Key Laboratory of Quantum Information, University of Science and Technology of China, CAS, Hefei, Anhui 230026, China
- Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| | - Wei Chen
- Key Laboratory of Quantum Information, University of Science and Technology of China, CAS, Hefei, Anhui 230026, China
- Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| | - Yao Yao
- Key Laboratory of Quantum Information, University of Science and Technology of China, CAS, Hefei, Anhui 230026, China
- Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| | - Jing-Zheng Huang
- Key Laboratory of Quantum Information, University of Science and Technology of China, CAS, Hefei, Anhui 230026, China
- Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| | - Guang-Can Guo
- Key Laboratory of Quantum Information, University of Science and Technology of China, CAS, Hefei, Anhui 230026, China
- Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| | - Zheng-Fu Han
- Key Laboratory of Quantum Information, University of Science and Technology of China, CAS, Hefei, Anhui 230026, China
- Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| |
Collapse
|
37
|
The security of decoy state protocol in the partial photon number splitting attack. ACTA ACUST UNITED AC 2013. [DOI: 10.1007/s11434-013-6037-2] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
38
|
Becerra FE, Fan J, Migdall A. Implementation of generalized quantum measurements for unambiguous discrimination of multiple non-orthogonal coherent states. Nat Commun 2013; 4:2028. [PMID: 23774177 DOI: 10.1038/ncomms3028] [Citation(s) in RCA: 46] [Impact Index Per Article: 4.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/18/2013] [Accepted: 05/21/2013] [Indexed: 11/09/2022] Open
Abstract
Generalized quantum measurements implemented to allow for measurement outcomes termed inconclusive can perform perfect discrimination of non-orthogonal states, a task which is impossible using only measurements with definitive outcomes. Here we demonstrate such generalized quantum measurements for unambiguous discrimination of four non-orthogonal coherent states and obtain their quantum mechanical description, the positive-operator valued measure. For practical realizations of this positive-operator valued measure, where noise and realistic imperfections prevent perfect unambiguous discrimination, we show that our experimental implementation outperforms any ideal standard-quantum-limited measurement performing the same non-ideal unambiguous state discrimination task for coherent states with low mean photon numbers.
Collapse
Affiliation(s)
- F E Becerra
- Joint Quantum Institute, University of Maryland and National Institute of Standards and Technology, Gaithersburg, Maryland 20899, USA.
| | | | | |
Collapse
|
39
|
García-Martínez MJ, Denisenko N, Soto D, Arroyo D, Orue AB, Fernandez V. High-speed free-space quantum key distribution system for urban daylight applications. APPLIED OPTICS 2013; 52:3311-3317. [PMID: 23669845 DOI: 10.1364/ao.52.003311] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/19/2013] [Accepted: 04/16/2013] [Indexed: 06/02/2023]
Abstract
We report a free-space quantum key distribution system designed for high-speed key transmission in urban areas. Clocking the system at gigahertz frequencies and efficiently filtering background enables higher secure key rates than those previously achieved by similar systems. The transmitter and receiver are located in two separate buildings 300 m apart in downtown Madrid and they exchange secure keys at rates up to 1 Mbps. The system operates in full bright daylight conditions with an average secure key rate of 0.5 Mbps and 24 h stability without human intervention.
Collapse
Affiliation(s)
- M J García-Martínez
- Information Security Institute, Spanish National Research Council (CSIC), Serrano 144, Madrid 28006, Spain.
| | | | | | | | | | | |
Collapse
|
40
|
Wang XB. Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors. PHYSICAL REVIEW A 2013; 87:012320. [DOI: 10.1103/physreva.87.012320] [Citation(s) in RCA: 33] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
41
|
Moroder T, Curty M, Lim CCW, Thinh LP, Zbinden H, Gisin N. Security of distributed-phase-reference quantum key distribution. PHYSICAL REVIEW LETTERS 2012; 109:260501. [PMID: 23368542 DOI: 10.1103/physrevlett.109.260501] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/31/2012] [Indexed: 06/01/2023]
Abstract
Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof of these schemes in a realistic setting has been elusive. We solve this long-standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result, we provide lower bounds on the key generation rate of a variant of the coherent-one-way quantum key distribution protocol. In contrast to standard predictions, it appears to scale quadratically with the system transmittance.
Collapse
Affiliation(s)
- Tobias Moroder
- Naturwissenschaftlich-Technische Fakultät, Universität Siegen, Walter-Flex-Straße 3, D-57068 Siegen, Germany
| | | | | | | | | | | |
Collapse
|
42
|
Jain N, Wittmann C, Lydersen L, Wiechers C, Elser D, Marquardt C, Makarov V, Leuchs G. Device calibration impacts security of quantum key distribution. PHYSICAL REVIEW LETTERS 2011; 107:110501. [PMID: 22026652 DOI: 10.1103/physrevlett.107.110501] [Citation(s) in RCA: 16] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/24/2011] [Indexed: 05/31/2023]
Abstract
Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.
Collapse
Affiliation(s)
- Nitin Jain
- Max Planck Institute for the Science of Light, Günther-Scharowsky-Straße 1, Bau 24, 91058 Erlangen, Germany.
| | | | | | | | | | | | | | | |
Collapse
|
43
|
An error-free protocol for quantum entanglement distribution in long-distance quantum communication. CHINESE SCIENCE BULLETIN-CHINESE 2011. [DOI: 10.1007/s11434-010-4336-4] [Citation(s) in RCA: 19] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
44
|
Zhang Y, Chen W, Wang S, Yin ZQ, Xu FX, Wu XW, Dong CH, Li HW, Guo GC, Han ZF. Practical non-Poissonian light source for passive decoy state quantum key distribution. OPTICS LETTERS 2010; 35:3393-3395. [PMID: 20967077 DOI: 10.1364/ol.35.003393] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/30/2023]
Abstract
Passive decoy state quantum key distribution (QKD) has enormous potential in high-speed applications. In this Letter, an intrinsic-stable non-Poissonian light source was implemented with Faraday mirrors and could be a crucial element in realizing passive decoy state QKD. The stable g((2))(0) was obtained through a Hanbury Brown-Twiss experiment, and the results fit well with the theoretical value according to Curty et al.'s theory [Opt. Lett.34, 3238 (2009)].
Collapse
Affiliation(s)
- Yang Zhang
- Key Laboratory of Quantum Information, University of Science and Technology of China, CAS, Hefei 230026, China
| | | | | | | | | | | | | | | | | | | |
Collapse
|
45
|
Liu Y, Chen TY, Wang J, Cai WQ, Wan X, Chen LK, Wang JH, Liu SB, Liang H, Yang L, Peng CZ, Chen K, Chen ZB, Pan JW. Decoy-state quantum key distribution with polarized photons over 200 km. OPTICS EXPRESS 2010; 18:8587-8594. [PMID: 20588703 DOI: 10.1364/oe.18.008587] [Citation(s) in RCA: 12] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/29/2023]
Abstract
We report an implementation of decoy-state quantum key distribution (QKD) over 200 km optical fiber cable through photon polarization encoding. This is achieved by constructing the whole QKD system operating at 320 MHz repetition rate, and developing high-speed transmitter and receiver modules. A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock. A final key rate of 15 Hz is distributed within the experimental time of 3089 seconds, by using super-conducting single photon detectors. This is longest decoy-state QKD yet demonstrated up to date. It helps to make a significant step towards practical secure communication in long-distance scope.
Collapse
Affiliation(s)
- Yang Liu
- Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| | | | | | | | | | | | | | | | | | | | | | | | | | | |
Collapse
|
46
|
Chen TY, Liang H, Liu Y, Cai WQ, Ju L, Liu WY, Wang J, Yin H, Chen K, Chen ZB, Peng CZ, Pan JW. Field test of a practical secure communication network with decoy-state quantum cryptography. OPTICS EXPRESS 2009; 17:6540-6549. [PMID: 19365479 DOI: 10.1364/oe.17.006540] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/27/2023]
Abstract
We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.
Collapse
Affiliation(s)
- Teng-Yun Chen
- Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026, China
| | | | | | | | | | | | | | | | | | | | | | | |
Collapse
|
47
|
|
48
|
Wang XB. Decoy-state quantum key distribution with large random errors of light intensity. PHYSICAL REVIEW A 2007; 75:052301. [DOI: 10.1103/physreva.75.052301] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
49
|
Peng CZ, Zhang J, Yang D, Gao WB, Ma HX, Yin H, Zeng HP, Yang T, Wang XB, Pan JW. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. PHYSICAL REVIEW LETTERS 2007; 98:010505. [PMID: 17358464 DOI: 10.1103/physrevlett.98.010505] [Citation(s) in RCA: 22] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/23/2006] [Indexed: 05/14/2023]
Abstract
We demonstrate the decoy-state quantum key distribution (QKD) with one-way quantum communication in polarization space over 102 km. Further, we simplify the experimental setup and use only one detector to implement the one-way decoy-state QKD over 75 km, with the advantage to overcome the security loopholes due to the efficiency mismatch of detectors. Our experimental implementation can really offer the unconditionally secure final keys. We use 3 different intensities of 0, 0.2, and 0.6 for the light sources in our experiment. In order to eliminate the influences of polarization mode dispersion in the long-distance single-mode optical fiber, an automatic polarization compensation system is utilized to implement the active compensation.
Collapse
Affiliation(s)
- Cheng-Zhi Peng
- Department of Physics, Tsinghua University, Beijing, China
| | | | | | | | | | | | | | | | | | | |
Collapse
|
50
|
Wang XB. Quantum Key Distribution: Security, Feasibility and Robustness. TOPICS IN APPLIED PHYSICS 2006:185-233. [DOI: 10.1007/3-540-33133-6_8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|