1
|
Lu FY, Wang ZH, Zapatero V, Chen JL, Wang S, Yin ZQ, Curty M, He DY, Wang R, Chen W, Fan-Yuan GJ, Guo GC, Han ZF. Experimental Demonstration of Fully Passive Quantum Key Distribution. PHYSICAL REVIEW LETTERS 2023; 131:110802. [PMID: 37774301 DOI: 10.1103/physrevlett.131.110802] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/18/2023] [Accepted: 08/01/2023] [Indexed: 10/01/2023]
Abstract
The passive approach to quantum key distribution (QKD) consists of removing all active modulation from the users' devices, a highly desirable countermeasure to get rid of modulator side channels. Nevertheless, active modulation has not been completely removed in QKD systems so far, due to both theoretical and practical limitations. In this Letter, we present a fully passive time-bin encoding QKD system and report on the successful implementation of a modulator-free QKD link. According to the latest theoretical analysis, our prototype is capable of delivering competitive secret key rates in the finite key regime.
Collapse
Affiliation(s)
- Feng-Yu Lu
- CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
| | - Ze-Hao Wang
- CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
| | - Víctor Zapatero
- Vigo Quantum Communication Center, University of Vigo, Vigo E-36310, Spain
- Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo E-36310, Spain
- AtlanTTic Research Center, University of Vigo, Vigo E-36310, Spain
| | - Jia-Lin Chen
- CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
| | - Shuang Wang
- CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, People's Republic of China
| | - Zhen-Qiang Yin
- CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, People's Republic of China
| | - Marcos Curty
- Vigo Quantum Communication Center, University of Vigo, Vigo E-36310, Spain
- Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo E-36310, Spain
- AtlanTTic Research Center, University of Vigo, Vigo E-36310, Spain
| | - De-Yong He
- CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, People's Republic of China
| | - Rong Wang
- Department of Physics, University of Hong Kong, Hong Kong SAR, People's Republic of China
| | - Wei Chen
- CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, People's Republic of China
| | - Guan-Jie Fan-Yuan
- CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
| | - Guang-Can Guo
- CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, People's Republic of China
| | - Zheng-Fu Han
- CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, People's Republic of China
- Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, People's Republic of China
| |
Collapse
|
2
|
Liu WB, Lu YS, Fu Y, Huang SC, Yin ZJ, Jiang K, Yin HL, Chen ZB. Source-independent quantum random number generator against tailored detector blinding attacks. OPTICS EXPRESS 2023; 31:11292-11307. [PMID: 37155768 DOI: 10.1364/oe.481832] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/10/2023]
Abstract
Randomness, mainly in the form of random numbers, is the fundamental prerequisite for the security of many cryptographic tasks. Quantum randomness can be extracted even if adversaries are fully aware of the protocol and even control the randomness source. However, an adversary can further manipulate the randomness via tailored detector blinding attacks, which are hacking attacks suffered by protocols with trusted detectors. Here, by treating no-click events as valid events, we propose a quantum random number generation protocol that can simultaneously address source vulnerability and ferocious tailored detector blinding attacks. The method can be extended to high-dimensional random number generation. We experimentally demonstrate the ability of our protocol to generate random numbers for two-dimensional measurement with a generation speed of 0.1 bit per pulse.
Collapse
|
3
|
Network-Compatible Unconditionally Secured Classical Key Distribution via Quantum Superposition-Induced Deterministic Randomness. CRYPTOGRAPHY 2022. [DOI: 10.3390/cryptography6010004] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
Abstract
Based on the addressability of quantum superposition and its unitary transformation, a network-compatible, unconditionally secured key distribution protocol is presented for arbitrary networking in a classical regime with potential applications of one-time-pad cryptography. The network capability is due to the addressable unitary transformation between arbitrary point-to-point connections in a network through commonly shared double transmission channels. The unconditional security is due to address-sensitive eavesdropping randomness via network authentication. The proposed protocol may offer a solid platform of unconditionally secured classical cryptography for mass-data communications in a conventional network, which would be otherwise impossible.
Collapse
|
4
|
Ruhul Fatin MA, Sajeed S. Generalized efficiency mismatch attack to bypass the detection-scrambling countermeasure. OPTICS EXPRESS 2021; 29:16073-16086. [PMID: 34154178 DOI: 10.1364/oe.419338] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/11/2021] [Accepted: 03/31/2021] [Indexed: 06/13/2023]
Abstract
The ability of an eavesdropper to compromise the security of a quantum communication system by changing the angle of the incoming light is well-known. Randomizing the role of the detectors has been proposed to be an efficient countermeasure to this type of attack. Here we show that the proposed countermeasure can be bypassed if the attack is generalized by including more attack variables. Using the experimental data from existing literature, we show how randomization effectively prevents the initial attack but fails to do so when Eve generalizes her attack strategy. Our result and methodology could be used to scrutinize a free-space quantum communication receiver against detector-efficiency-mismatch type attacks.
Collapse
|
5
|
Nonclassical Attack on a Quantum Key Distribution System. ENTROPY 2021; 23:e23050509. [PMID: 33922561 PMCID: PMC8146243 DOI: 10.3390/e23050509] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/29/2021] [Revised: 04/22/2021] [Accepted: 04/22/2021] [Indexed: 11/26/2022]
Abstract
The article is focused on research of an attack on the quantum key distribution system and proposes a countermeasure method. Particularly noteworthy is that this is not a classic attack on a quantum protocol. We describe an attack on the process of calibration. Results of the research show that quantum key distribution systems have vulnerabilities not only in the protocols, but also in other vital system components. The described type of attack does not affect the cryptographic strength of the received keys and does not point to the vulnerability of the quantum key distribution protocol. We also propose a method for autocompensating optical communication system development, which protects synchronization from unauthorized access. The proposed method is based on the use of sync pulses attenuated to a photon level in the process of detecting a time interval with a signal. The paper presents the results of experimental studies that show the discrepancies between the theoretical and real parameters of the system. The obtained data allow the length of the quantum channel to be calculated with high accuracy.
Collapse
|
6
|
Sajeed S, Chaiwongkhot P, Huang A, Qin H, Egorov V, Kozubov A, Gaidash A, Chistiakov V, Vasiliev A, Gleim A, Makarov V. An approach for security evaluation and certification of a complete quantum communication system. Sci Rep 2021; 11:5110. [PMID: 33658528 PMCID: PMC7930270 DOI: 10.1038/s41598-021-84139-3] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/03/2020] [Accepted: 02/12/2021] [Indexed: 11/18/2022] Open
Abstract
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.
Collapse
Affiliation(s)
- Shihan Sajeed
- Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1, Canada. .,Department of Physics and Astronomy, University of Waterloo, Waterloo, ON, N2L 3G1, Canada. .,Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1, Canada. .,Department of Electrical and Computer Engineering, University of Toronto, Toronto, M5S 3G4, Canada.
| | - Poompong Chaiwongkhot
- Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1, Canada.,Department of Physics and Astronomy, University of Waterloo, Waterloo, ON, N2L 3G1, Canada.,Department of Physics, Faculty of Science, Mahidol University, Bangkok, 10400, Thailand.,Quantum Technology Foundation (Thailand), Bangkok, 10110, Thailand
| | - Anqi Huang
- Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1, Canada.,Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1, Canada.,Institute for Quantum Information and State Key Laboratory of High Performance Computing, College of Computer Science and Technology, National University of Defense Technology, Changsha, 410073, People's Republic of China
| | - Hao Qin
- Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1, Canada.,CAS Quantum Network Co., Ltd., 99 Xiupu road, Shanghai, 201315, People's Republic of China
| | - Vladimir Egorov
- Faculty of Photonics and Optical Information, ITMO University, Kadetskaya line 3/2, 199034, St. Petersburg, Russia
| | - Anton Kozubov
- Faculty of Photonics and Optical Information, ITMO University, Kadetskaya line 3/2, 199034, St. Petersburg, Russia
| | - Andrei Gaidash
- Faculty of Photonics and Optical Information, ITMO University, Kadetskaya line 3/2, 199034, St. Petersburg, Russia
| | - Vladimir Chistiakov
- Faculty of Photonics and Optical Information, ITMO University, Kadetskaya line 3/2, 199034, St. Petersburg, Russia
| | - Artur Vasiliev
- Faculty of Photonics and Optical Information, ITMO University, Kadetskaya line 3/2, 199034, St. Petersburg, Russia
| | - Artur Gleim
- Faculty of Photonics and Optical Information, ITMO University, Kadetskaya line 3/2, 199034, St. Petersburg, Russia
| | - Vadim Makarov
- Department of Physics and Astronomy, University of Waterloo, Waterloo, ON, N2L 3G1, Canada.,Shanghai Branch, National Laboratory for Physical Sciences at Microscale and CAS Center for Excellence in Quantum Information, University of Science and Technology of China, Shanghai, 201315, People's Republic of China
| |
Collapse
|
7
|
Ham BS. Experimental demonstrations of unconditional security in a purely classical regime. Sci Rep 2021; 11:4149. [PMID: 33603110 PMCID: PMC7892578 DOI: 10.1038/s41598-021-83724-w] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/14/2020] [Accepted: 02/05/2021] [Indexed: 11/12/2022] Open
Abstract
So far, unconditional security in key distribution processes has been confined to quantum key distribution (QKD) protocols based on the no-cloning theorem of nonorthogonal bases. Recently, a completely different approach, the unconditionally secured classical key distribution (USCKD), has been proposed for unconditional security in the purely classical regime. Unlike QKD, both classical channels and orthogonal bases are key ingredients in USCKD, where unconditional security is provided by deterministic randomness via path superposition-based reversible unitary transformations in a coupled Mach-Zehnder interferometer. Here, the first experimental demonstration of the USCKD protocol is presented.
Collapse
Affiliation(s)
- Byoung S Ham
- Center for Photon Information Processing, School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, 123 Chumdangwagi-ro, Buk-gu, Gwangju, 61005, South Korea.
| |
Collapse
|
8
|
Ham BS. Analysis of phase noise effects in a coupled Mach-Zehnder interferometer for a much stabilized free-space optical link. Sci Rep 2021; 11:1900. [PMID: 33479354 PMCID: PMC7820431 DOI: 10.1038/s41598-021-81522-y] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/22/2020] [Accepted: 12/28/2020] [Indexed: 12/03/2022] Open
Abstract
Recently, new physics for unconditional security in a classical key distribution (USCKD) has been proposed and demonstrated in a frame of a double Mach-Zehnder interferometer (MZI) as a proof of principle, where the unconditional security is rooted in MZI channel superposition. Due to environmental phase noise caused by temperature variations, atmospheric turbulences, and mechanical vibrations, free-space optical links have been severely challenged for both classical and quantum communications. Here, the double MZI scheme of USCKD is analyzed for greatly subdued environment-caused phase noise via double unitary transformation, resulting in potential applications of free-space optical links, where the free-space optical link has been a major research area from fundamental physics of atomic clock and quantum key distribution to potential applications of geodesy, navigation, and MIMO technologies in mobile communications systems.
Collapse
Affiliation(s)
- Byoung S Ham
- Center for Photon Information Processing, School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, 123 Chumdangwagi-ro, Buk-gu, Gwangju, 61005, South Korea.
| |
Collapse
|
9
|
Wu Z, Huang A, Chen H, Sun SH, Ding J, Qiang X, Fu X, Xu P, Wu J. Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination. OPTICS EXPRESS 2020; 28:25574-25590. [PMID: 32907074 DOI: 10.1364/oe.397962] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/25/2020] [Accepted: 07/24/2020] [Indexed: 06/11/2023]
Abstract
Quantum key distribution (QKD) has been proved to be information-theoretically secure in theory. Unfortunately, the imperfect devices in practice compromise its security. Thus, to improve the security property of practical QKD systems, a commonly used method is to patch the loopholes in the existing QKD systems. However, in this work, we show an adversary's capability of exploiting the imperfection of the patch itself to bypass the patch. Specifically, we experimentally demonstrate that, in the detector under test, the patch of photocurrent monitor against the detector blinding attack can be defeated by the pulse illumination attack proposed in this paper. We also analyze the secret key rate under the pulse illumination attack, which theoretically confirmed that Eve can conduct the attack to learn the secret key. This work indicates the importance of inspecting the security loopholes in a detection unit to further understand their impacts on a QKD system. The method of pulse illumination attack can be a general testing item in the security evaluation standard of QKD.
Collapse
|
10
|
Garcia-Escartin JC, Sajeed S, Makarov V. Attacking quantum key distribution by light injection via ventilation openings. PLoS One 2020; 15:e0236630. [PMID: 32745079 PMCID: PMC7398518 DOI: 10.1371/journal.pone.0236630] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/23/2019] [Accepted: 07/10/2020] [Indexed: 11/19/2022] Open
Abstract
Quantum cryptography promises security based on the laws of physics with proofs of security against attackers of unlimited computational power. However, deviations from the original assumptions allow quantum hackers to compromise the system. We present a side channel attack that takes advantage of ventilation holes in optical devices to inject additional photons that can leak information about the secret key. We experimentally demonstrate light injection on an ID Quantique Clavis2 quantum key distribution platform and show that this may help an attacker to learn information about the secret key. We then apply the same technique to a prototype quantum random number generator and show that its output is biased by injected light. This shows that light injection is a potential security risk that should be addressed during the design of quantum information processing devices.
Collapse
Affiliation(s)
| | - Shihan Sajeed
- Institute for Quantum Computing, University of Waterloo, Waterloo, ON, Canada
- Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada
- Department of Physics and Astronomy, University of Waterloo, Waterloo, ON, Canada
- Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada
| | - Vadim Makarov
- Department of Physics and Astronomy, University of Waterloo, Waterloo, ON, Canada
- Russian Quantum Center, Skolkovo, Moscow, Russia
- Shanghai Branch, National Laboratory for Physical Sciences at Microscale and CAS Center for Excellence in Quantum Information, University of Science and Technology of China, Shanghai, People’s Republic of China
- NTI Center for Quantum Communications, National University of Science and Technology MISiS, Moscow, Russia
| |
Collapse
|
11
|
Ham BS. Unconditionally secured classical cryptography using quantum superposition and unitary transformation. Sci Rep 2020; 10:11687. [PMID: 32669598 PMCID: PMC7363683 DOI: 10.1038/s41598-020-68038-7] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/07/2019] [Accepted: 06/15/2020] [Indexed: 11/09/2022] Open
Abstract
Over decades quantum cryptography has been intensively studied for unconditionally secured key distribution in a quantum regime. Due to the quantum loopholes caused by imperfect single photon detectors and/or lossy quantum channels, however, the quantum cryptography is practically inefficient and even vulnerable to eavesdropping. Here, a method of unconditionally secured key distribution potentially compatible with current fiber-optic communications networks is proposed in a classical regime for high-speed optical backbone networks. The unconditional security is due to the quantum superposition-caused measurement indistinguishability between paired transmission channels and its unitary transformation resulting in deterministic randomness corresponding to the no-cloning theorem in a quantum key distribution protocol.
Collapse
Affiliation(s)
- Byoung S Ham
- Center for Photon Information Processing, School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju, 61005, South Korea.
| |
Collapse
|
12
|
Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding. ENTROPY 2019; 21:e21010080. [PMID: 33266796 PMCID: PMC7514190 DOI: 10.3390/e21010080] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/26/2018] [Revised: 01/11/2019] [Accepted: 01/14/2019] [Indexed: 11/17/2022]
Abstract
We propose a schematic setup of quantum key distribution (QKD) with an improved secret key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single photon, orbital angular momentum modes, and multi-path modes, are used to encode secret key information. Its practical implementation consists of optical elements that are within the reach of current technologies such as a multiport interferometer. We show that the proposed feasible protocol has improved the secret key rate with much sophistication compared to the previous 2-dimensional protocol known as the detector-device-independent QKD.
Collapse
|
13
|
Pinheiro PVP, Chaiwongkhot P, Sajeed S, Horn RT, Bourgoin JP, Jennewein T, Lütkenhaus N, Makarov V. Eavesdropping and countermeasures for backflash side channel in quantum cryptography. OPTICS EXPRESS 2018; 26:21020-21032. [PMID: 30119408 DOI: 10.1364/oe.26.021020] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/30/2018] [Accepted: 06/28/2018] [Indexed: 06/08/2023]
Abstract
Quantum key distribution (QKD) promises information theoretic secure key as long as the device performs as assumed in the theoretical model. One of the assumptions is an absence of information leakage about individual photon detection outcomes of the receiver unit. Here we investigate the information leakage from a QKD receiver due to photon emission caused by detection events in single-photon detectors (backflash). We test commercial silicon avalanche photodiodes and a photomultiplier tube, and find that the former emit backflashes. We study the spectral, timing and polarization characteristics of these backflash photons. We experimentally demonstrate on a free-space QKD receiver that an eavesdropper can distinguish which detector has clicked inside it, and thus acquire secret information. A set of countermeasures both in theory and on the physical devices are discussed.
Collapse
|
14
|
|