1
|
Xiao YR, Jia ZY, Song YC, Bao Y, Fu Y, Yin HL, Chen ZB. Source-independent quantum secret sharing with entangled photon pair networks. OPTICS LETTERS 2024; 49:4210-4213. [PMID: 39090896 DOI: 10.1364/ol.527857] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/18/2024] [Accepted: 06/24/2024] [Indexed: 08/04/2024]
Abstract
The large-scale deployment of quantum secret sharing (QSS) in quantum networks is currently challenging due to the requirements for the generation and distribution of multipartite entanglement states. Here we present an efficient source-independent QSS protocol utilizing entangled photon pairs in quantum networks. Through the post-matching method, which means the measurement events in the same basis are matched, the key rate is almost independent of the number of participants. In addition, the unconditional security of our QSS against internal and external eavesdroppers can be proved by introducing an equivalent virtual protocol. Our protocol has great performance and technical advantages in future quantum networks.
Collapse
|
2
|
Gupta S, Agarwal I, Mogiligidda V, Kumar Krishnan R, Chennuri S, Aggarwal D, Hoodati A, Cooper S, Ranjan, Bilal Sheik M, Bhavya KM, Hegde M, Krishna MN, Chauhan AK, Korrapati M, Singh S, Singh JB, Sud S, Gupta S, Pant S, Sankar, Agrawal N, Ranjan A, Mohapatra P, Roopak T, Ahmad A, Nanjunda M, Singh D. ChaQra: a cellular unit of the Indian quantum network. Sci Rep 2024; 14:16752. [PMID: 39033224 PMCID: PMC11271476 DOI: 10.1038/s41598-024-67495-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/01/2024] [Accepted: 07/11/2024] [Indexed: 07/23/2024] Open
Abstract
Major research interests on quantum key distribution (QKD) are primarily focused on increasing 1. Point-to-point transmission distance (1000 km). 2. Secure key rate (Mbps). 3. Security of quantum layer (device-independence). It is great to push the boundaries in these fronts but these isolated approaches are neither scalable nor cost-effective due to requirements of specialised hardware and different infrastructure. Current and future QKD network requires addressing different set of challenges apart from distance, key rate and quantum security. In this regard, we present ChaQra-a sub quantum network with core features as 1. Crypto agility (integration in the already deployed telecommunication fibres). 2. Software defined networking (SDN paradigm for routing different nodes). 3. reliability (addressing denial-of-service with hybrid quantum safe cryptography). 4. upgradability (modules upgradation based on scientific and technological advancements). 5. Beyond QKD (using QKD network for distributed computing, multi-party computation etc). Our results demonstrate a clear path to create and accelerate quantum secure Indian subcontinent under national quantum mission.
Collapse
Affiliation(s)
- Shashank Gupta
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India.
- Okinawa Institute of Science and Technology Graduate University, Okinawa, Japan.
| | - Iteash Agarwal
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | | | | | - Sruthi Chennuri
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Deepika Aggarwal
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Anwesha Hoodati
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Sheroy Cooper
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Ranjan
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | | | - K M Bhavya
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Manasa Hegde
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - M Naveen Krishna
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | | | | | - Sumit Singh
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - J B Singh
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Sunil Sud
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Sunil Gupta
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Sidhartha Pant
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Sankar
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Neha Agrawal
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Ashish Ranjan
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Piyush Mohapatra
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - T Roopak
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Arsh Ahmad
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - M Nanjunda
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| | - Dilip Singh
- QuNu Labs Pvt. Ltd., M. G. Road, Bengaluru, 560025, Karnataka, India
| |
Collapse
|
3
|
Ciobanu BC, Verzotti LP, Popescu PG. Optimal and scalable entanglement distribution over crossbar quantum networks. Sci Rep 2024; 14:11714. [PMID: 38777846 PMCID: PMC11111698 DOI: 10.1038/s41598-024-62274-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/12/2023] [Accepted: 05/15/2024] [Indexed: 05/25/2024] Open
Abstract
Crossbar networks are a cornerstone of network architectures, capable of operating both as standalone interconnections or as integral switching components in complex, multi-stage systems. The main advantages of crossbar networks are their non-blocking operation and unparalleled minimal latency. With the advent of large scale quantum networks, crossbars might be an important asset towards the Quantum Internet. This study proposes a solution for the problem of distributing entanglement within crossbar quantum networks. Entangled particles are a consumable resource in quantum networks, and are being used by most quantum protocols. By ensuring that nodes within quantum networks are being supplied with entanglement, the reliability and efficiency of the network is maintained. By providing an efficient, scalable framework that can be used to achieve optimal entanglement distribution within crossbar quantum networks, this study offers a theoretical achievement which can be also used for enhancing quantum network performance. An algorithm for selecting an optimal entanglement distribution configuration is proposed and fully tested on realistic possible configurations.
Collapse
Affiliation(s)
- Bogdan-Călin Ciobanu
- Computer Science and Engineering Department, University POLITEHNICA of Bucharest, 60042, Bucharest, Romania
| | - Luca Perju Verzotti
- Computer Science and Engineering Department, University POLITEHNICA of Bucharest, 60042, Bucharest, Romania
| | - Pantelimon George Popescu
- Computer Science and Engineering Department, University POLITEHNICA of Bucharest, 60042, Bucharest, Romania.
| |
Collapse
|
4
|
Liang S, Cheng J, Qin J, Li J, Shi Y, Yan Z, Jia X, Xie C, Peng K. High-Speed Quantum Radio-Frequency-Over-Light Communication. PHYSICAL REVIEW LETTERS 2024; 132:140802. [PMID: 38640392 DOI: 10.1103/physrevlett.132.140802] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/18/2023] [Accepted: 03/12/2024] [Indexed: 04/21/2024]
Abstract
Quantum dense coding (QDC) means to transmit two classical bits by only transferring one quantum bit, which has enabled high-capacity information transmission and strengthened system security. Continuous-variable QDC offers a promising solution to increase communication rates while achieving seamless integration with classical communication systems. Here, we propose and experimentally demonstrate a high-speed quantum radio-frequency-over-light (RFOL) communication scheme based on QDC with an entangled state, and achieve a practical rate of 20 Mbps through digital modulation and RFOL communication. This scheme bridges the gap between quantum technology and real-world communication systems, which bring QDC closer to practical applications and offer prospects for further enhancement of metropolitan communication networks.
Collapse
Affiliation(s)
- Shaocong Liang
- State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People's Republic of China
| | - Jialin Cheng
- State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People's Republic of China
| | - Jiliang Qin
- State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People's Republic of China
- Collaborative Innovation Center of Extreme Optics, Shanxi University, Taiyuan 030006, People's Republic of China
| | - Jiatong Li
- State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People's Republic of China
| | - Yi Shi
- State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People's Republic of China
| | - Zhihui Yan
- State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People's Republic of China
- Collaborative Innovation Center of Extreme Optics, Shanxi University, Taiyuan 030006, People's Republic of China
| | - Xiaojun Jia
- State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People's Republic of China
- Collaborative Innovation Center of Extreme Optics, Shanxi University, Taiyuan 030006, People's Republic of China
| | - Changde Xie
- State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People's Republic of China
- Collaborative Innovation Center of Extreme Optics, Shanxi University, Taiyuan 030006, People's Republic of China
| | - Kunchi Peng
- State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan 030006, People's Republic of China
- Collaborative Innovation Center of Extreme Optics, Shanxi University, Taiyuan 030006, People's Republic of China
| |
Collapse
|
5
|
Ahn B, Park J, Lee J, Lee S. High-dimensional single photon based quantum secure direct communication using time and phase mode degrees. Sci Rep 2024; 14:888. [PMID: 38195695 PMCID: PMC10776589 DOI: 10.1038/s41598-024-51212-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/08/2023] [Accepted: 01/02/2024] [Indexed: 01/11/2024] Open
Abstract
Quantum secure direct communication (QSDC) can guarantee security using the characteristics of quantum mechanics even when a message is directly transmitted through a quantum channel without using a secret key. However, the transmission rate of the QSDC is limited by the dead time of a single photon detector (SPD) as well as channel loss over the distance. To overcome this limited transmission rate, we propose a high-dimensional single photon-based QSDC protocol that applies two optical degrees of freedom: time and phase state. First, an N-dimensional time and phase state generation method that considers the dead time is proposed to minimize the measurement loss of a transmitted message. Second, among the two types of quantum states, the phase state with relatively low measurement efficiency is used only for eavesdropping detection, and the time state is used for sending messages with differential delay time bin-based encoding techniques. Lastly, we propose an efficient method for measuring N-dimensional time and phase-based quantum states and recovering classical bit information. This study performs security analysis against various attacks, and verifies the transmission rate improvement effect through simulation. The result indicates that our proposal can guarantee higher security and transmission rates compared to the conventional DL04 QSDC.
Collapse
Affiliation(s)
- Byungkyu Ahn
- Communication and Media Standard Lab., LG Electronics, Seoul, 06772, South Korea.
| | - Jooyoun Park
- Communication and Media Standard Lab., LG Electronics, Seoul, 06772, South Korea
| | - Jonghyun Lee
- Communication and Media Standard Lab., LG Electronics, Seoul, 06772, South Korea
| | - Sangrim Lee
- Communication and Media Standard Lab., LG Electronics, Seoul, 06772, South Korea
| |
Collapse
|
6
|
Wang M, Zhang W, Guo J, Song X, Long G. Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network. ENTROPY (BASEL, SWITZERLAND) 2023; 25:1548. [PMID: 37998240 PMCID: PMC10670810 DOI: 10.3390/e25111548] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/08/2023] [Revised: 11/07/2023] [Accepted: 11/12/2023] [Indexed: 11/25/2023]
Abstract
Quantum secure direct communication (QSDC) offers a practical way to realize a quantum network which can transmit information securely and reliably. Practical quantum networks are hindered by the unavailability of quantum relays. To overcome this limitation, a proposal has been made to transmit the messages encrypted with classical cryptography, such as post-quantum algorithms, between intermediate nodes of the network, where encrypted messages in quantum states are read out in classical bits, and sent to the next node using QSDC. In this paper, we report a real-time demonstration of a computationally secure relay for a quantum secure direct communication network. We have chosen CRYSTALS-KYBER which has been standardized by the National Institute of Standards and Technology to encrypt the messages for transmission of the QSDC system. The quantum bit error rate of the relay system is typically below the security threshold. Our relay can support a QSDC communication rate of 2.5 kb/s within a 4 ms time delay. The experimental demonstration shows the feasibility of constructing a large-scale quantum network in the near future.
Collapse
Affiliation(s)
- Min Wang
- Beijing Academy of Quantum Information Sciences, Beijing 100193, China; (M.W.)
| | - Wei Zhang
- Beijing Academy of Quantum Information Sciences, Beijing 100193, China; (M.W.)
| | - Jianxing Guo
- Beijing Academy of Quantum Information Sciences, Beijing 100193, China; (M.W.)
| | - Xiaotian Song
- Beijing Academy of Quantum Information Sciences, Beijing 100193, China; (M.W.)
| | - Guilu Long
- Beijing Academy of Quantum Information Sciences, Beijing 100193, China; (M.W.)
- State Key Laboratory of Low-Dimensional Quantum Physics and Department of Physics, Tsinghua University, Beijing 100084, China
- Frontier Science Center for Quantum Information, Beijing 100084, China
- Beijing National Research Center for Information Science and Technology, Beijing 100084, China
| |
Collapse
|
7
|
Kim HJ, Jung JH, Lee KJ, Ra YS. Recovering quantum entanglement after its certification. SCIENCE ADVANCES 2023; 9:eadi5261. [PMID: 37792929 PMCID: PMC10550226 DOI: 10.1126/sciadv.adi5261] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/02/2023] [Accepted: 09/05/2023] [Indexed: 10/06/2023]
Abstract
Entanglement is a crucial quantum resource with broad applications in quantum information science. For harnessing entanglement in practice, it is a prerequisite to certify the entanglement of a given quantum state. However, the certification process itself destroys the entanglement, thereby precluding further exploitation of the entanglement. Resolving this conflict, here, we present a protocol that certifies the entanglement of a quantum state without complete destruction and then probabilistically recovers the original entanglement to provide useful entanglement for further quantum applications. We experimentally demonstrate this protocol in a photonic quantum system and highlight its usefulness for selecting high-quality entanglement from a realistic entanglement source. Moreover, our study reveals various trade-off relations among the physical quantities involved in the protocol. Our results show how entanglement certification can be made compatible with subsequent quantum applications and be beneficial to sort entanglement for better performance in quantum technologies.
Collapse
Affiliation(s)
- Hyeon-Jin Kim
- Department of Physics, Korea Advanced Institute of Science and Technology, Daejeon 34141, Korea
| | - Ji-Hyeok Jung
- Department of Physics, Korea Advanced Institute of Science and Technology, Daejeon 34141, Korea
| | - Kyung-Jun Lee
- Department of Physics, Korea Advanced Institute of Science and Technology, Daejeon 34141, Korea
| | - Young-Sik Ra
- Department of Physics, Korea Advanced Institute of Science and Technology, Daejeon 34141, Korea
| |
Collapse
|
8
|
Rahim MT, Khan A, Khalid U, Rehman JU, Jung H, Shin H. Quantum secure metrology for network sensing-based applications. Sci Rep 2023; 13:11630. [PMID: 37468566 DOI: 10.1038/s41598-023-38802-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/29/2022] [Accepted: 07/14/2023] [Indexed: 07/21/2023] Open
Abstract
Quantum secure metrology protocols harness quantum effects to probe remote systems with enhanced precision and security. Traditional QSM protocols require multi-partite entanglement, which limits its near-term implementation due to technological constraints. This paper proposes a QSM scheme that employs Bell pairs to provide unconditional security while offering precision scaling beyond the standard quantum limit. We provide a detailed comparative performance analysis of our proposal under multiple attacks. We found that the employed controlled encoding strategy is far better than the parallel encoding of multi-partite entangled states with regard to the secrecy of the parameter. We also identify and characterize an intrinsic trade-off relationship between the maximum achievable precision and security under the limited availability of resources. The dynamic scalability of the proposed protocol makes it suitable for large-scale network sensing scenarios.
Collapse
Affiliation(s)
- Muhammad Talha Rahim
- Department of Electronics and Information Convergence Engineering, Kyung Hee University, Yongin, Republic of Korea
| | - Awais Khan
- Department of Electronics and Information Convergence Engineering, Kyung Hee University, Yongin, Republic of Korea
| | - Uman Khalid
- Department of Electronics and Information Convergence Engineering, Kyung Hee University, Yongin, Republic of Korea
| | - Junaid Ur Rehman
- Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, 1855, Luxembourg, Luxembourg
| | - Haejoon Jung
- Department of Electronics and Information Convergence Engineering, Kyung Hee University, Yongin, Republic of Korea
| | - Hyundong Shin
- Department of Electronics and Information Convergence Engineering, Kyung Hee University, Yongin, Republic of Korea.
| |
Collapse
|
9
|
Luo W, Cao L, Shi Y, Wan L, Zhang H, Li S, Chen G, Li Y, Li S, Wang Y, Sun S, Karim MF, Cai H, Kwek LC, Liu AQ. Recent progress in quantum photonic chips for quantum communication and internet. LIGHT, SCIENCE & APPLICATIONS 2023; 12:175. [PMID: 37443095 DOI: 10.1038/s41377-023-01173-8] [Citation(s) in RCA: 7] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Abstract] [Grants] [Subscribe] [Scholar Register] [Received: 08/07/2022] [Revised: 04/27/2023] [Accepted: 04/28/2023] [Indexed: 07/15/2023]
Abstract
Recent years have witnessed significant progress in quantum communication and quantum internet with the emerging quantum photonic chips, whose characteristics of scalability, stability, and low cost, flourish and open up new possibilities in miniaturized footprints. Here, we provide an overview of the advances in quantum photonic chips for quantum communication, beginning with a summary of the prevalent photonic integrated fabrication platforms and key components for integrated quantum communication systems. We then discuss a range of quantum communication applications, such as quantum key distribution and quantum teleportation. Finally, the review culminates with a perspective on challenges towards high-performance chip-based quantum communication, as well as a glimpse into future opportunities for integrated quantum networks.
Collapse
Affiliation(s)
- Wei Luo
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore
| | - Lin Cao
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore
| | - Yuzhi Shi
- Institute of Precision Optical Engineering, School of Physics Science and Engineering, Tongji University, 200092, Shanghai, China.
| | - Lingxiao Wan
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore
| | - Hui Zhang
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore
| | - Shuyi Li
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore
| | - Guanyu Chen
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore
| | - Yuan Li
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore
| | - Sijin Li
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore
| | - Yunxiang Wang
- School of Optoelectronic Science and Engineering, University of Electronic Science and Technology of China, 610054, Chengdu, China
| | - Shihai Sun
- School of Electronics and Communication Engineering, Sun Yat-Sen University, 518100, Shenzhen, Guangdong, China
| | - Muhammad Faeyz Karim
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore.
| | - Hong Cai
- Institute of Microelectronics, A*STAR (Agency for Science, Technology and Research), Singapore, 138634, Singapore.
| | - Leong Chuan Kwek
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore.
- Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore, 117543, Singapore.
- National Institute of Education, Nanyang Technological University, Singapore, 637616, Singapore.
| | - Ai Qun Liu
- Quantum Science and Engineering Centre (QSec), Nanyang Technological University, Singapore, 639798, Singapore.
| |
Collapse
|
10
|
Cao Z, Lu Y, Chai G, Yu H, Liang K, Wang L. Realization of Quantum Secure Direct Communication with Continuous Variable. RESEARCH (WASHINGTON, D.C.) 2023; 6:0193. [PMID: 37456930 PMCID: PMC10348661 DOI: 10.34133/research.0193] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 04/03/2023] [Accepted: 06/21/2023] [Indexed: 07/18/2023]
Abstract
With the progress of theoretical and applied technologies, the communication system based on the classical encryption is seriously threatened by quantum computing and distributed computing. A communication method that directly loads confidential information on the quantum state, quantum secure direct communication (QSDC), came into being for resisting security threats. Here, we report the first continuous-variable QSDC (CV-QSDC) experimental demonstration for verifying the feasibility and effectiveness of the CV-QSDC protocol based on Gaussian mapping and propose a parameter estimation for signal classification under the actual channels. In our experiment, we provided 4 × 102 blocks, where each block contains 105 data for direct information transmission. For the transmission distance of 5 km in our experiment, the excess noise is 0.0035 SNU, where SNU represents the unit of shot-noise units. The 4.08 × 105 bit per second experimental results firmly demonstrated the feasibility of CV-QSDC under the fiber channel. The proposed grading judgment method based on parameter estimation provides a practical and available message processing scheme for CV-QSDC in a practical fiber channel and lays the groundwork for the grading reconciliation.
Collapse
Affiliation(s)
- Zhengwen Cao
- School of Information Science and Technology, Northwest University, Xi'an710127, China
| | - Yuan Lu
- School of Information Science and Technology, Northwest University, Xi'an710127, China
| | - Geng Chai
- School of Information Science and Technology, Northwest University, Xi'an710127, China
| | - Hao Yu
- School of Information Science and Technology, Northwest University, Xi'an710127, China
| | - Kexin Liang
- School of Information Science and Technology, Northwest University, Xi'an710127, China
| | - Lei Wang
- School of Information Science and Technology, Northwest University, Xi'an710127, China
| |
Collapse
|
11
|
Kirsanov NS, Pastushenko VA, Kodukhov AD, Yarovikov MV, Sagingalieva AB, Kronberg DA, Pflitsch M, Vinokur VM. Forty thousand kilometers under quantum protection. Sci Rep 2023; 13:8756. [PMID: 37253776 DOI: 10.1038/s41598-023-35579-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/21/2023] [Accepted: 05/20/2023] [Indexed: 06/01/2023] Open
Abstract
Quantum key distribution (QKD) is a revolutionary cryptography response to the rapidly growing cyberattacks threat posed by quantum computing. Yet, the roadblock limiting the vast expanse of secure quantum communication is the exponential decay of the transmitted quantum signal with the distance. Today's quantum cryptography is trying to solve this problem by focusing on quantum repeaters. However, efficient and secure quantum repetition at sufficient distances is still far beyond modern technology. Here, we shift the paradigm and build the long-distance security of the QKD upon the quantum foundations of the Second Law of Thermodynamics and end-to-end physical oversight over the transmitted optical quantum states. Our approach enables us to realize quantum states' repetition by optical amplifiers keeping states' wave properties and phase coherence. The unprecedented secure distance range attainable through our approach opens the door for the development of scalable quantum-resistant communication networks of the future.
Collapse
Affiliation(s)
| | | | | | | | | | | | - M Pflitsch
- Terra Quantum AG, St. Gallen, 9000, Switzerland
| | - V M Vinokur
- Terra Quantum AG, St. Gallen, 9000, Switzerland.
| |
Collapse
|
12
|
Xin X, He S, Li Y, Li C. Nontraditional Deterministic Remote State Preparation Using a Non-Maximally Entangled Channel without Additional Quantum Resources. ENTROPY (BASEL, SWITZERLAND) 2023; 25:e25050768. [PMID: 37238523 DOI: 10.3390/e25050768] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/28/2023] [Revised: 04/19/2023] [Accepted: 04/29/2023] [Indexed: 05/28/2023]
Abstract
In this paper, we have reinvestigated probabilistic quantum communication protocols and developed a nontraditional remote state preparation protocol that allows for deterministically transferring information encoded in quantum states using a non-maximally entangled channel. With an auxiliary particle and a simple measurement method, the success probability of preparing a d-dimensional quantum state is increased to 1 without spending additional quantum resources in advance to improve quantum channels, such as entanglement purification. Furthermore, we have designed a feasible experimental scheme to demonstrate the deterministic paradigm of transporting a polarization-encoded photon from one location to another using a generalized entangled state. This approach provides a practical method to address decoherence and environmental noises in actual quantum communication.
Collapse
Affiliation(s)
- Xuanxuan Xin
- School of Physics, Dalian University of Technology, Dalian 116024, China
| | - Shiwen He
- School of Physics, Dalian University of Technology, Dalian 116024, China
| | - Yongxing Li
- School of Physics, Dalian University of Technology, Dalian 116024, China
| | - Chong Li
- School of Physics, Dalian University of Technology, Dalian 116024, China
| |
Collapse
|
13
|
Zhao ZS, Li PL, Gan WM. Traceless encryption approach for physical layer security in coherent optical communications system. OPTICS EXPRESS 2023; 31:12585-12596. [PMID: 37157415 DOI: 10.1364/oe.482135] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/10/2023]
Abstract
We proposed and numerically studied a traceless encryption approach for physical layer security in coherent optical communications system, the most attractive advantage of which is that it is hard for eavesdroppers to be aware that the transmission signal has been encrypted because the modulation formats of encrypted signal are still the regular ones, i.e. traceless encryption. In the proposed approach, the phase only or the combination of phase and amplitude dimensions can be used for encryption and decryption. Three simple encryption rules are designed and used to investigate the encryption security performance of the scheme, in which the QPSK signal can be encrypted to be as 8PSK, QPSK and 8QAM. The results show that three simple encryption rules can cause 37.5%, 25%, 62.5% of user signal binary codes to be misinterpreted by the eavesdroppers, respectively. When the modulation formats of encrypted signal and user signal are identical, the scheme can not only cover up the real information, but also have a potential application at misleading eavesdroppers. The impacts of the control light peak power at the receiver on the decryption performance are also analysed, the results indicate that the decryption performance of the scheme has a good tolerance to the peak power fluctuation of control light at the receiver.
Collapse
|
14
|
Schneeloch J, Tison CC, Jacinto HS, Alsing PM. Negativity vs. purity and entropy in witnessing entanglement. Sci Rep 2023; 13:4601. [PMID: 36944676 PMCID: PMC10030834 DOI: 10.1038/s41598-023-31273-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/19/2022] [Accepted: 03/09/2023] [Indexed: 03/23/2023] Open
Abstract
In this paper, we explore the value of measures of mixedness in witnessing entanglement. While all measures of mixedness may be used to witness entanglement, we show that all such entangled states must have a negative partial transpose (NPT). Where the experimental resources needed to determine this negativity scale poorly at high dimension, we compare different measures of mixedness over both Haar-uniform and uniform-purity ensembles of joint quantum states at varying dimension to gauge their relative success at witnessing entanglement. In doing so, we find that comparing joint and marginal purities is overwhelmingly (albeit not exclusively) more successful at identifying entanglement than comparing joint and marginal von Neumann entropies, in spite of requiring fewer resources. We conclude by showing how our results impact the fundamental relationship between correlation and entanglement and related witnesses.
Collapse
Affiliation(s)
- James Schneeloch
- Air Force Research Laboratory, Information Directorate, Rome, NY, 13441, USA.
| | - Christopher C Tison
- Air Force Research Laboratory, Information Directorate, Rome, NY, 13441, USA
| | - H Shelton Jacinto
- Air Force Research Laboratory, Information Directorate, Rome, NY, 13441, USA
| | - Paul M Alsing
- Air Force Research Laboratory, Information Directorate, Rome, NY, 13441, USA
| |
Collapse
|
15
|
Jiang GL, Liu WQ, Wei HR. Heralded and high-efficient entanglement concentrations based on linear optics assisted by time-delay degree of freedom. OPTICS EXPRESS 2022; 30:47836-47846. [PMID: 36558702 DOI: 10.1364/oe.476342] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/23/2022] [Accepted: 11/30/2022] [Indexed: 06/17/2023]
Abstract
Entanglement concentration is a critical technique to prevent degraded fidelity and security in long-distance quantum communication. We propose novel practical entanglement concentration protocols (ECPs) for less-entangled Bell and Greenberger-Horne-Zeilinger states with unknown parameters by solely using simple linear optics. We avoid the need for the post-selection principles or photon-number-resolving detectors to identify the parity-check measurement completely by orchestrating auxiliary time degree of freedom, and the success of ECPs is exactly heralded by the detection signatures without destroying the incident qubits. Additionally, the outting incident photons kept are in the maximally entangled or the less-entangled state, and the success probability can be increased by recycling the latter. The heralded and the basic linear optical elements make our practical ECPs are accessible to experimental investigation with current technology.
Collapse
|
16
|
Yang CW. Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol. Sci Rep 2022; 12:18381. [PMID: 36319692 PMCID: PMC9626572 DOI: 10.1038/s41598-022-23135-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/04/2022] [Accepted: 10/25/2022] [Indexed: 11/14/2022] Open
Abstract
This study proposes a new encoding method, also known as an encryption chain based on the measurement result. Then, using the encryption chain to propose a unitary-operation-based semi-quantum key distribution protocol (SQKD) protocol. In the existing SQKD protocols, semi-quantum environments adopt a round-trip transmission strategy. In round-trip transmission, the classical participant must resend the received photons to the quantum participant after implementing local operations. Therefore, round-trip transmissions are vulnerable to Trojan horse attacks. Hence, the classical participant must be equipped with a photon number splitter and an optical wavelength filter device against Trojan horse attacks. This is illogical for semi-quantum environments because the burden on the classical participant is significantly increased as it involves the prevention of Trojan horse attacks. The proposed SQKD protocol is congenitally immune to Trojan horse attacks and involves no extra hardware because it is designed based on a one-way transmission as opposed to a round-trip transmission. When compared to the existing SQKD protocols, the proposed SQKD protocol provides the best qubit efficiency, and classical participants only require two quantum capabilities, which enhance its practicability. Moreover, the proposed SQKD protocol is free from collective attacks, Trojan horse attacks, and intercept-resend attacks. Thus, the proposed scheme is more efficient and practical than the existing SQKD protocols.
Collapse
Affiliation(s)
- Chun-Wei Yang
- grid.254145.30000 0001 0083 6092Master Program for Digital Health Innovation, College of Humanities and Sciences, China Medical University, No. 100, Sec. 1, Jingmao Rd., Beitun Dist., Taichung, 406040 Taiwan, ROC
| |
Collapse
|
17
|
Key Technologies, Applications and Trends of Internet of Things for Energy-Efficient 6G Wireless Communication in Smart Cities. ENERGIES 2022. [DOI: 10.3390/en15155608] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
Abstract
Smart cities can be made into super-smart cities through IoT devices’ implication of energy-efficient 6G. IoT devices are expected to reach fifty billion, but limited information is available regarding the energy-efficient 6G wireless communication standard. This article highlights the key technologies, applications, and trends in the Internet of Things (IoT) for energy-efficient 6G wireless communication in smart cities. The systematic review helped to achieve the aim of the study by considering the 20 articles extracted from databases and Google that fell between 2015 and 2021 and are written in English. The findings identified that quantum communication, blockchain, visible light communication (VLC), 6G brain–computer interface (BCI), symbiotic radio, and others are the key technologies. The applications of IoT technologies and energy-efficient 6G are found in 15 Minute City, Industrial Town, Intelligent Transport systems and others. Furthermore, the trend of using 6G through IoT devices in smart cities is promising.
Collapse
|
18
|
Abdel Hakeem SA, Hussein HH, Kim H. Security Requirements and Challenges of 6G Technologies and Applications. SENSORS 2022; 22:s22051969. [PMID: 35271113 PMCID: PMC8914636 DOI: 10.3390/s22051969] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/11/2022] [Revised: 02/23/2022] [Accepted: 03/01/2022] [Indexed: 12/03/2022]
Abstract
After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In addition, it is expected to extend mobile communication possibilities where earlier generations could not have developed. Several potential technologies are predicted to serve as the foundation of 6G networks. These include upcoming and current technologies such as post-quantum cryptography, artificial intelligence (AI), machine learning (ML), enhanced edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technologies such as blockchain. From a security and privacy perspective, these developments need a reconsideration of prior security traditional methods. New novel authentication, encryption, access control, communication, and malicious activity detection must satisfy the higher significant requirements of future networks. In addition, new security approaches are necessary to ensure trustworthiness and privacy. This paper provides insights into the critical problems and difficulties related to the security, privacy, and trust issues of 6G networks. Moreover, the standard technologies and security challenges per each technology are clarified. This paper introduces the 6G security architecture and improvements over the 5G architecture. We also introduce the security issues and challenges of the 6G physical layer. In addition, the AI/ML layers and the proposed security solution in each layer are studied. The paper summarizes the security evolution in legacy mobile networks and concludes with their security problems and the most essential 6G application services and their security requirements. Finally, this paper provides a complete discussion of 6G networks’ trustworthiness and solutions.
Collapse
Affiliation(s)
- Shimaa A. Abdel Hakeem
- School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea;
- Electronics Research Institute (ERI), El Nozha, Cairo 12622, Egypt;
| | - Hanan H. Hussein
- Electronics Research Institute (ERI), El Nozha, Cairo 12622, Egypt;
| | - HyungWon Kim
- School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea;
- Correspondence:
| |
Collapse
|
19
|
Bibak K, Kapron BM, Srinivasan V. Authentication of variable length messages in quantum key distribution. EPJ QUANTUM TECHNOLOGY 2022; 9:8. [PMID: 35224512 PMCID: PMC8850259 DOI: 10.1140/epjqt/s40507-022-00127-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/29/2021] [Accepted: 02/06/2022] [Indexed: 06/14/2023]
Abstract
Authentication plays a critical role in the security of quantum key distribution (QKD) protocols. We propose using Polynomial Hash and its variants for authentication of variable length messages in QKD protocols. Since universal hashing is used not only for authentication in QKD but also in other steps in QKD like error correction and privacy amplification, and also in several other areas of quantum cryptography, Polynomial Hash and its variants as the most efficient universal hash function families can be used in these important steps and areas, as well. We introduce and analyze several efficient variants of Polynomial Hash and, using deep results from number theory, prove that each variant gives an ε-almost-Δ-universal family of hash functions. We also give a general method for transforming any such family to an ε-almost-strongly universal family of hash functions. The latter families can then, among other applications, be used in the Wegman-Carter MAC construction which has been shown to provide a universally composable authentication method in QKD protocols. As Polynomial Hash has found many applications, our constructions and results are potentially of interest in various areas.
Collapse
Affiliation(s)
- Khodakhast Bibak
- Department of Computer Science and Software Engineering, Miami University, Oxford, Ohio 45056 USA
| | - Bruce M. Kapron
- Department of Computer Science, University of Victoria, Victoria, BC V8W 3P6 Canada
| | - Venkatesh Srinivasan
- Department of Computer Science, University of Victoria, Victoria, BC V8W 3P6 Canada
| |
Collapse
|
20
|
Wu L, Chai T, Liu Y, Zhou Y, Qin J, Yan Z, Jia X. Deterministic distribution of multipartite entanglement in a quantum network by continuous-variable polarization states. OPTICS EXPRESS 2022; 30:6388-6396. [PMID: 35209578 DOI: 10.1364/oe.451062] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/14/2021] [Accepted: 02/01/2022] [Indexed: 06/14/2023]
Abstract
Quantum network plays a vitally important role in the practical application of quantum information, which requires the deterministic entanglement distribution among multiple remote users. Here, we propose a feasible scheme to deterministically distribute quadripartite entanglement by continuous-variable (CV) polarization states. The quantum server prepares the quadripartite CV polarization entanglement and distributes them to four remote users via optical fiber. In this way, the measurement of CV polarization entanglement is local oscillation free, which makes the long distance entanglement distribution in commercial optical fiber communication networks possible. Furthermore, both the Greenberger-Horne-Zeilinger-like (GHZ-like) and cluster-like polarization entangled states can be distributed among four users by controlling the beam splitter network in quantum server, which are confirmed by the extended criteria for polarization entanglement of multipartite optical modes. The protocol provides the direct reference for experimental implementation and can be directly extended to quantum network with more users, which is essential for a metropolitan quantum network.
Collapse
|
21
|
Revolution or Evolution? Technical Requirements and Considerations towards 6G Mobile Communications. SENSORS 2022; 22:s22030762. [PMID: 35161509 PMCID: PMC8839279 DOI: 10.3390/s22030762] [Citation(s) in RCA: 14] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/28/2021] [Revised: 01/08/2022] [Accepted: 01/13/2022] [Indexed: 02/04/2023]
Abstract
Ever since the introduction of fifth generation (5G) mobile communications, the mobile telecommunications industry has been debating whether 5G is an “evolution” or “revolution” from the previous legacy mobile networks, but now that 5G has been commercially available for the past few years, the research direction has recently shifted towards the upcoming generation of mobile communication system, known as the sixth generation (6G), which is expected to drastically provide significant and evolutionary, if not revolutionary, improvements in mobile networks. The promise of extremely high data rates (in terabits), artificial intelligence (AI), ultra-low latency, near-zero/low energy, and immense connected devices is expected to enhance the connectivity, sustainability, and trustworthiness and provide some new services, such as truly immersive “extended reality” (XR), high-fidelity mobile hologram, and a new generation of entertainment. Sixth generation and its vision are still under research and open for developers and researchers to establish and develop their directions to realize future 6G technology, which is expected to be ready as early as 2028. This paper reviews 6G mobile technology, including its vision, requirements, enabling technologies, and challenges. Meanwhile, a total of 11 communication technologies, including terahertz (THz) communication, visible light communication (VLC), multiple access, coding, cell-free massive multiple-input multiple-output (CF-mMIMO) zero-energy interface, intelligent reflecting surface (IRS), and infusion of AI/machine learning (ML) in wireless transmission techniques, are presented. Moreover, this paper compares 5G and 6G in terms of services, key technologies, and enabling communications techniques. Finally, it discusses the crucial future directions and technology developments in 6G.
Collapse
|
22
|
Zhou MG, Cao XY, Lu YS, Wang Y, Bao Y, Jia ZY, Fu Y, Yin HL, Chen ZB. Experimental Quantum Advantage with Quantum Coupon Collector. RESEARCH (WASHINGTON, D.C.) 2022; 2022:9798679. [PMID: 35586151 PMCID: PMC9082318 DOI: 10.34133/2022/9798679] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/04/2022] [Accepted: 04/10/2022] [Indexed: 12/03/2022]
Abstract
An increasing number of communication and computational schemes with quantum advantages have recently been proposed, which implies that quantum technology has fertile application prospects. However, demonstrating these schemes experimentally continues to be a central challenge because of the difficulty in preparing high-dimensional states or highly entangled states. In this study, we introduce and analyze a quantum coupon collector protocol by employing coherent states and simple linear optical elements, which was successfully demonstrated using realistic experimental equipment. We showed that our protocol can significantly reduce the number of samples needed to learn a specific set compared with the classical limit of the coupon collector problem. We also discuss the potential values and expansions of the quantum coupon collector by constructing a quantum blind box game. The information transmitted by the proposed game also broke the classical limit. These results strongly prove the advantages of quantum mechanics in machine learning and communication complexity.
Collapse
Affiliation(s)
- Min-Gang Zhou
- National Laboratory of Solid State Microstructures, School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Xiao-Yu Cao
- National Laboratory of Solid State Microstructures, School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Yu-Shuo Lu
- National Laboratory of Solid State Microstructures, School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Yang Wang
- National Laboratory of Solid State Microstructures, School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Yu Bao
- National Laboratory of Solid State Microstructures, School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Zhao-Ying Jia
- National Laboratory of Solid State Microstructures, School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Yao Fu
- MatricTime Digital Technology Co. Ltd., Nanjing 211899, China
| | - Hua-Lei Yin
- National Laboratory of Solid State Microstructures, School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Zeng-Bing Chen
- National Laboratory of Solid State Microstructures, School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- MatricTime Digital Technology Co. Ltd., Nanjing 211899, China
| |
Collapse
|
23
|
The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app112411784] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ensure optimum software retreat. The accurate assessment of software’s durability and security is a dynamic aspect in assessing, administrating, and controlling security for strengthening the features of security. This paper essentially emphasises the demarcation and depiction of quantum computing from a software security perspective. At present, different symmetrical-based cryptography approaches or algorithms are being used to protect different government and non-government sectors, such as banks, healthcare sectors, defense, transport, automobiles, navigators, weather forecasting, etc., to ensure software durability and security. However, many crypto schemes are likely to collapse when a large qubit-based quantum computer is developed. In such a scenario, it is necessary to pay attention to the security alternatives based on quantum computing. Presently, the different factors of software durability are usability, dependability, trustworthiness, and human trust. In this study, we have also classified the durability level in the second stage. The intention of the evaluation of the impact on security over quantum duration is to estimate and assess the security durability of software. In this research investigation, we have followed the symmetrical hybrid technique of fuzzy analytic hierarchy process (FAHP) and fuzzy technique for order of preference by similarity to ideal solution (FTOPSIS). The obtained results, and the method used in this estimation, would make a significant contribution to future research for organising software security and durability (SSD) in the presence of a quantum computer.
Collapse
|
24
|
Hu Z, Kais S. A quantum encryption design featuring confusion, diffusion, and mode of operation. Sci Rep 2021; 11:23774. [PMID: 34893658 PMCID: PMC8664820 DOI: 10.1038/s41598-021-03241-8] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2021] [Accepted: 11/09/2021] [Indexed: 11/25/2022] Open
Abstract
Quantum cryptography-the application of quantum information processing and quantum computing techniques to cryptography has been extensively investigated. Two major directions of quantum cryptography are quantum key distribution (QKD) and quantum encryption, with the former focusing on secure key distribution and the latter focusing on encryption using quantum algorithms. In contrast to the success of the QKD, the development of quantum encryption algorithms is limited to designs of mostly one-time pads (OTP) that are unsuitable for most communication needs. In this work we propose a non-OTP quantum encryption design utilizing a quantum state creation process to encrypt messages. As essentially a non-OTP quantum block cipher the method stands out against existing methods with the following features: 1. complex key-ciphertext relation (i.e. confusion) and complex plaintext-ciphertext relation (i.e. diffusion); 2. mode of operation design for practical encryption on multiple blocks. These features provide key reusability and protection against eavesdropping and standard cryptanalytic attacks.
Collapse
Affiliation(s)
- Zixuan Hu
- Department of Chemistry, Purdue Quantum Science and Engineering Institute, Purdue University, West Lafayette, IN, 47907, USA
- Department of Physics, Purdue Quantum Science and Engineering Institute, Purdue University, West Lafayette, IN, 47907, USA
| | - Sabre Kais
- Department of Chemistry, Purdue Quantum Science and Engineering Institute, Purdue University, West Lafayette, IN, 47907, USA.
- Department of Physics, Purdue Quantum Science and Engineering Institute, Purdue University, West Lafayette, IN, 47907, USA.
| |
Collapse
|
25
|
Sheng YB, Zhou L, Long GL. One-step quantum secure direct communication. Sci Bull (Beijing) 2021; 67:367-374. [DOI: 10.1016/j.scib.2021.11.002] [Citation(s) in RCA: 30] [Impact Index Per Article: 10.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/06/2021] [Revised: 10/13/2021] [Accepted: 10/26/2021] [Indexed: 10/19/2022]
|
26
|
Qi Z, Li Y, Huang Y, Feng J, Zheng Y, Chen X. A 15-user quantum secure direct communication network. LIGHT, SCIENCE & APPLICATIONS 2021; 10:183. [PMID: 34521809 PMCID: PMC8440625 DOI: 10.1038/s41377-021-00634-2] [Citation(s) in RCA: 14] [Impact Index Per Article: 4.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/13/2021] [Revised: 08/31/2021] [Accepted: 09/04/2021] [Indexed: 05/31/2023]
Abstract
Quantum secure direct communication (QSDC) based on entanglement can directly transmit confidential information. However, the inability to simultaneously distinguish the four sets of encoded entangled states limits its practical application. Here, we explore a QSDC network based on time-energy entanglement and sum-frequency generation. In total,15 users are in a fully connected QSDC network, and the fidelity of the entangled state shared by any two users is >97%. The results show that when any two users are performing QSDC over 40 km of optical fiber, the fidelity of the entangled state shared by them is still >95%, and the rate of information transmission can be maintained above 1 Kbp/s. Our result demonstrates the feasibility of a proposed QSDC network and hence lays the foundation for the realization of satellite-based long-distance and global QSDC in the future.
Collapse
Affiliation(s)
- Zhantong Qi
- State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Physics and Astronomy, Shanghai Jiao Tong University, 200240, Shanghai, China
| | - Yuanhua Li
- State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Physics and Astronomy, Shanghai Jiao Tong University, 200240, Shanghai, China.
- Department of Physics, Jiangxi Normal University, 330022, Nanchang, China.
| | - Yiwen Huang
- State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Physics and Astronomy, Shanghai Jiao Tong University, 200240, Shanghai, China
| | - Juan Feng
- State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Physics and Astronomy, Shanghai Jiao Tong University, 200240, Shanghai, China
| | - Yuanlin Zheng
- State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Physics and Astronomy, Shanghai Jiao Tong University, 200240, Shanghai, China
- Shanghai Research Center for Quantum Sciences, 201315, Shanghai, China
| | - Xianfeng Chen
- State Key Laboratory of Advanced Optical Communication Systems and Networks, School of Physics and Astronomy, Shanghai Jiao Tong University, 200240, Shanghai, China.
- Shanghai Research Center for Quantum Sciences, 201315, Shanghai, China.
- Collaborative Innovation Center of Light Manipulation and Applications, Shandong Normal University, 250358, Jinan, China.
| |
Collapse
|
27
|
Long GL, Zhang H. Drastic increase of channel capacity in quantum secure direct communication using masking. Sci Bull (Beijing) 2021; 66:1267-1269. [PMID: 36654146 DOI: 10.1016/j.scib.2021.04.016] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/09/2021] [Revised: 03/25/2021] [Accepted: 03/26/2021] [Indexed: 01/20/2023]
Affiliation(s)
- Gui-Lu Long
- State Key Laboratory of Low-dimensional Quantum Physics and Department of Physics, Tsinghua University, Beijing 100084, China; Beijing Academy of Quantum Information Sciences, Beijing 100193, China; Collaborative Innovation Center of Quantum Matter, Beijing 100084, China; Beijing National Research Center for Information Science and Technology, Beijing 100084, China.
| | - Haoran Zhang
- State Key Laboratory of Low-dimensional Quantum Physics and Department of Physics, Tsinghua University, Beijing 100084, China
| |
Collapse
|
28
|
Kozubov AV, Gaidash AA, Kiselev AD, Miroshnichenko GP. Filtration mapping as complete Bell state analyzer for bosonic particles. Sci Rep 2021; 11:14236. [PMID: 34244596 PMCID: PMC8270949 DOI: 10.1038/s41598-021-93679-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/20/2021] [Accepted: 06/21/2021] [Indexed: 11/09/2022] Open
Abstract
In this paper, we present the approach to complete Bell state analysis based on filtering mapping. The key distinctive feature of this appoach is that it avoids complications related to using either hyperentanglement or representation of the Bell states as concatenated Greenber-Horne-Zeilinger (C-GHZ) state to perform discrimination procedure. We describe two techniques developed within the suggested approach and based on two-step algorithms with two different types of filtration mapping which can be called the non-demolition and semi-demolition filtrations. In the method involving non-demolition filtration measurement the filtration process employs cross-Kerr nonlinearity and the probe mode to distinguish between the two pairs of the Bell states. In the case of semi-demolition measurement, the two states are unambiguously discriminated and hence destroyed, whereas filtraton keeps the other two states intact. We show that the measurement that destroys the single photon subspace in every mode and preserves the superposition of zero and two photons can be realized with discrete photodetection based on microresonator with atoms.
Collapse
Affiliation(s)
- A V Kozubov
- Department of Mathematical Methods for Quantum Technologies, Steklov Mathematical Institute of Russian Academy of Sciences, 119991, Moscow, Russia.
- Laboratory of Quantum Processes and Measurements, ITMO University, Kadetskaya Line 3b, 199034, Saint Petersburg, Russia.
| | - A A Gaidash
- Department of Mathematical Methods for Quantum Technologies, Steklov Mathematical Institute of Russian Academy of Sciences, 119991, Moscow, Russia
- Laboratory of Quantum Processes and Measurements, ITMO University, Kadetskaya Line 3b, 199034, Saint Petersburg, Russia
| | - A D Kiselev
- Laboratory of Quantum Processes and Measurements, ITMO University, Kadetskaya Line 3b, 199034, Saint Petersburg, Russia
- Faculty of Physics, St. Petersburg State University, 199034, Saint Petersburg, Russia
| | - G P Miroshnichenko
- Faculty of Laser Photonics and Optoelectronics, ITMO University, 49 Kronverksky Pr., 197101, Saint Petersburg, Russia
| |
Collapse
|
29
|
Yan PS, Zhou L, Zhong W, Sheng YB. Feasible measurement-based entanglement purification in linear optics. OPTICS EXPRESS 2021; 29:9363-9384. [PMID: 33820366 DOI: 10.1364/oe.420348] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/20/2021] [Accepted: 03/01/2021] [Indexed: 06/12/2023]
Abstract
Entanglement purification is used to distill high quality entangled states from several noisy low quality entangled states, and it plays a key role in quantum repeater. The measurement-based entanglement purification protocol (MB-EPP) does not require local two-qubit gates or single-particle measurements on the noisy pairs and may offer significant advantages compared with the gate-based EPPs. We present an alternative MB-EPP in linear optics. Subsequently, we provide a detailed analysis on the realization of this MB-EPP using spontaneous parametric down conversion (SPDC) sources. By delicately designing the optical circuits, the double-pair emission noise caused by SPDC sources can be eliminated automatically. Combined with suitable quantum memory and entanglement swapping, this MB-EPP may have application potential in the implementation of a practical measurement-based quantum repeater.
Collapse
|
30
|
Yu Y, Chen Y, Wang C, Wang J, Sun Z, Cao M, Gao H, Li F. Optical storage of Ince-Gaussian modes in warm atomic vapor. OPTICS LETTERS 2021; 46:1021-1024. [PMID: 33649647 DOI: 10.1364/ol.414762] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/11/2020] [Accepted: 01/25/2021] [Indexed: 06/12/2023]
Abstract
We report on the optical storage of Ince-Gaussian modes in a warm rubidium vapor cell based on electromagnetically induced transparency protocol, and we also qualitatively analyze how atomic diffusion affects the retrieved beams after storage. Ince-Gaussian modes possess very complex and abundant spatial structures and form a complete infinite-dimensional Hilbert space. Successfully storing such modes could open up possibilities for fundamental high-dimensional optical communication experiments.
Collapse
|
31
|
Gyongyosi L, Imre S. Scalable distributed gate-model quantum computers. Sci Rep 2021; 11:5172. [PMID: 33637770 PMCID: PMC7910494 DOI: 10.1038/s41598-020-76728-5] [Citation(s) in RCA: 16] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/18/2020] [Accepted: 10/30/2020] [Indexed: 11/08/2022] Open
Abstract
A scalable model for a distributed quantum computation is a challenging problem due to the complexity of the problem space provided by the diversity of possible quantum systems, from small-scale quantum devices to large-scale quantum computers. Here, we define a model of scalable distributed gate-model quantum computation in near-term quantum systems of the NISQ (noisy intermediate scale quantum) technology era. We prove that the proposed architecture can maximize an objective function of a computational problem in a distributed manner. We study the impacts of decoherence on distributed objective function evaluation.
Collapse
Affiliation(s)
- Laszlo Gyongyosi
- Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, 1117, Hungary.
- MTA-BME Information Systems Research Group, Hungarian Academy of Sciences, Budapest, 1051, Hungary.
| | - Sandor Imre
- Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, 1117, Hungary
| |
Collapse
|
32
|
Yan PS, Zhou L, Zhong W, Sheng YB. Feasible time-bin entanglement purification based on sum-frequency generation. OPTICS EXPRESS 2021; 29:571-583. [PMID: 33726290 DOI: 10.1364/oe.409931] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/10/2020] [Accepted: 12/07/2020] [Indexed: 06/12/2023]
Abstract
High quality time-bin entanglement is widely exploited to achieve the purposes of fundamental tests of physics and the implementation of quantum communication protocols both in free space and optical fiber propagation. However, the imperfect approaches of generating time-bin entangled state will degrade its quality and limit its practical application. Entanglement purification is to distill high quality entangled states from low quality entangled states. In this paper, we present the first entanglement purification protocol (EPP) for time-bin entanglement. We first explain this EPP for two-photon time-bin entangled state and then extend it to the system of multi-photon time-bin entangled state. We also design a possible realization of this EPP with practical spontaneous parametric down conversion (SPDC) source. Differ from the conventional EPPs, this EPP does not require the sophisticated controlled-not (CNOT) gate or similar operations, and it uses the feasible sum-frequency generation (SFG) to perform the purification. Moreover, the double-pair noise emitted from the SPDC source can be eliminated automatically which is the other advantage of this EPP. If we combine with the faithful entanglement swapping, this EPP may have potential to be a part of full quantum repeaters.
Collapse
|
33
|
Liu HY, Tian XH, Gu C, Fan P, Ni X, Yang R, Zhang JN, Hu M, Guo J, Cao X, Hu X, Zhao G, Lu YQ, Gong YX, Xie Z, Zhu SN. Optical-Relayed Entanglement Distribution Using Drones as Mobile Nodes. PHYSICAL REVIEW LETTERS 2021; 126:020503. [PMID: 33512193 DOI: 10.1103/physrevlett.126.020503] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/06/2020] [Accepted: 12/01/2020] [Indexed: 06/12/2023]
Abstract
Entanglement distribution has been accomplished using a flying drone, and this mobile platform can be generalized for multiple mobile nodes with optical relay among them. Here we develop the first optical relay to reshape the wave front of photons for their low diffraction loss in free-space transmission. Using two drones, where one distributes the entangled photons and the other serves as relay node, we achieve entanglement distribution with Clauser-Horne-Shimony-Holt S parameter of 2.59±0.11 at 1 km distance. Key components for entangled source, tracking, and relay are developed with high performance and are lightweight, constructing a scalable airborne system for multinode connectio and toward mobile quantum networks.
Collapse
Affiliation(s)
- Hua-Ying Liu
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Xiao-Hui Tian
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Changsheng Gu
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Pengfei Fan
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Xin Ni
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Ran Yang
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Ji-Ning Zhang
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Mingzhe Hu
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Jian Guo
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Xun Cao
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Xiaopeng Hu
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Gang Zhao
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Yan-Qing Lu
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Yan-Xiao Gong
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Zhenda Xie
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| | - Shi-Ning Zhu
- National Laboratory of Solid State Microstructures, School of Electronic Science and Engineering, School of Physics, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
| |
Collapse
|
34
|
|
35
|
Quantum secure direct communication: Intersection of communication and cryptography. FUNDAMENTAL RESEARCH 2021. [DOI: 10.1016/j.fmre.2021.01.002] [Citation(s) in RCA: 41] [Impact Index Per Article: 13.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022] Open
|
36
|
Gyongyosi L, Imre S. Resource prioritization and balancing for the quantum internet. Sci Rep 2020; 10:22390. [PMID: 33372180 PMCID: PMC7770047 DOI: 10.1038/s41598-020-78960-5] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/23/2020] [Accepted: 12/02/2020] [Indexed: 11/21/2022] Open
Abstract
The quantum Internet enables networking based on the fundamentals of quantum mechanics. Here, methods and procedures of resource prioritization and resource balancing are defined for the quantum Internet. We define a model for resource consumption optimization in quantum repeaters, and a strongly-entangled network structure for resource balancing. We study the resource-balancing efficiency of the strongly-entangled structure. We prove that a strongly-entangled quantum network is two times more efficient in a resource balancing problem than a full-mesh network of the traditional Internet.
Collapse
Affiliation(s)
- Laszlo Gyongyosi
- Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, 1117, Hungary.
- MTA-BME Information Systems Research Group, Hungarian Academy of Sciences, Budapest, 1051, Hungary.
| | - Sandor Imre
- Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, 1117, Hungary
| |
Collapse
|
37
|
Sagona-Stophel S, Shahrokhshahi R, Jordaan B, Namazi M, Figueroa E. Conditional π-Phase Shift of Single-Photon-Level Pulses at Room Temperature. PHYSICAL REVIEW LETTERS 2020; 125:243601. [PMID: 33412068 DOI: 10.1103/physrevlett.125.243601] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/28/2019] [Accepted: 10/15/2020] [Indexed: 06/12/2023]
Abstract
The development of useful photon-photon interactions can trigger numerous breakthroughs in quantum information science, however, this has remained a considerable challenge spanning several decades. Here, we demonstrate the first room-temperature implementation of large phase shifts (≈π) on a single-photon level probe pulse (1.5 μs) triggered by a simultaneously propagating few-photon-level signal field. This process is mediated by Rb^{87} vapor in a double-Λ atomic configuration. We use homodyne tomography to obtain the quadrature statistics of the phase-shifted quantum fields and perform maximum-likelihood estimation to reconstruct their quantum state in the Fock state basis. For the probe field, we have observed input-output fidelities higher than 90% for phase-shifted output states, and high overlap (over 90%) with a theoretically perfect coherent state. Our noise-free, four-wave-mixing-mediated photon-photon interface is a key milestone toward developing quantum logic and nondemolition photon detection using schemes such as coherent photon conversion.
Collapse
Affiliation(s)
- Steven Sagona-Stophel
- Department of Physics and Astronomy, Stony Brook University, Stony Brook, New York 11794-3800, USA
| | - Reihaneh Shahrokhshahi
- Department of Physics and Astronomy, Stony Brook University, Stony Brook, New York 11794-3800, USA
| | - Bertus Jordaan
- Department of Physics and Astronomy, Stony Brook University, Stony Brook, New York 11794-3800, USA
| | - Mehdi Namazi
- Department of Physics and Astronomy, Stony Brook University, Stony Brook, New York 11794-3800, USA
| | - Eden Figueroa
- Department of Physics and Astronomy, Stony Brook University, Stony Brook, New York 11794-3800, USA
| |
Collapse
|
38
|
Jeong YC, Ji SW, Hong C, Park HS, Jang J. Deterministic Secure Quantum Communication on the BB84 System. ENTROPY (BASEL, SWITZERLAND) 2020; 22:E1268. [PMID: 33287036 PMCID: PMC7711499 DOI: 10.3390/e22111268] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/23/2020] [Revised: 10/30/2020] [Accepted: 11/06/2020] [Indexed: 11/16/2022]
Abstract
In this paper, we propose a deterministic secure quantum communication (DSQC) protocol based on the BB84 system. We developed this protocol to include quantum entity authentication in the DSQC procedure. By first performing quantum entity authentication, it was possible to prevent third-party intervention. We demonstrate the security of the proposed protocol against the intercept-and-re-send attack and the entanglement-and-measure attack. Implementation of this protocol was demonstrated for quantum channels of various lengths. Especially, we propose the use of the multiple generation and shuffling method to prevent a loss of message in the experiment.
Collapse
Affiliation(s)
- Youn-Chang Jeong
- The Affiliated Institute of Electronics and Telecommunications Research Institute, P.O.Box 1, Yuseong Daejeon 34188, Korea; (Y.-C.J.); (S.-W.J.); (C.H.)
| | - Se-Wan Ji
- The Affiliated Institute of Electronics and Telecommunications Research Institute, P.O.Box 1, Yuseong Daejeon 34188, Korea; (Y.-C.J.); (S.-W.J.); (C.H.)
| | - Changho Hong
- The Affiliated Institute of Electronics and Telecommunications Research Institute, P.O.Box 1, Yuseong Daejeon 34188, Korea; (Y.-C.J.); (S.-W.J.); (C.H.)
| | - Hee Su Park
- Korea Research Institute of Standards and Science, Daejeon 43113, Korea;
| | - Jingak Jang
- The Affiliated Institute of Electronics and Telecommunications Research Institute, P.O.Box 1, Yuseong Daejeon 34188, Korea; (Y.-C.J.); (S.-W.J.); (C.H.)
| |
Collapse
|
39
|
Correlation dynamics of nitrogen vacancy centers located in crystal cavities. Sci Rep 2020; 10:16640. [PMID: 33024197 PMCID: PMC7538931 DOI: 10.1038/s41598-020-73697-7] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/14/2020] [Accepted: 09/16/2020] [Indexed: 11/09/2022] Open
Abstract
In this contribution, we investigate the bipartite non-classical correlations (NCCs) of a system formed by two nitrogen-vacancy (N-V) centers placed in two spatially separated single-mode nanocavities inside a planar photonic crystal (PC). The physical system is mathematically modeled by time-dependent Schrödinger equation and analytically solved. The bipartite correlations of the two N-V centers and the two-mode cavity have been analyzed by skew information, log-negativity, and Bell function quantifiers. We explore the effects of the coupling strength between the N-V-centers and the cavity fields as well as the cavity-cavity hopping constant and the decay rate on the generated correlation dynamics. Under some specific parameter values, a large amount of quantum correlations is obtained. This shows the possibility to control the dynamics of the correlations for the NV-centers and the cavity fields.
Collapse
|
40
|
Gong B, Tu T, Zhu XY, Guo AL, Zhou ZQ, Guo GC, Li CF. A noise-resisted scheme of dynamical decoupling pulses for quantum memories. Sci Rep 2020; 10:15089. [PMID: 32934301 PMCID: PMC7494898 DOI: 10.1038/s41598-020-72071-x] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/26/2020] [Accepted: 08/25/2020] [Indexed: 11/30/2022] Open
Abstract
Stable quantum memories that capable of storing quantum information for long time scales are an essential building block for an array of potential applications. The long memory time are usually achieved via dynamical decoupling technique involving decoupling of the memory states from its local environment. However, because this process is strongly limited by the errors in the pulses, an noise-protected scheme remains challenging in the field of quantum memories. Here we propose a scheme to design a noise-resisted [Formula: see text] pulse, which features high fidelity exceeding [Formula: see text] under realistic situations. Using this [Formula: see text] pulse we can generate different dynamical decoupling sequences that preserve high fidelity for long time scales. The versatility, robustness, and potential scalability of this method may allow for various applications in quantum memories technology.
Collapse
Affiliation(s)
- Bo Gong
- Key Laboratory of Quantum Information, University of Science and Technology of China, Chinese Academy of Sciences, Hefei, 230026, People's Republic of China.
| | - Tao Tu
- Key Laboratory of Quantum Information, University of Science and Technology of China, Chinese Academy of Sciences, Hefei, 230026, People's Republic of China.
- Department of Physics and Astronomy, University of California at Los Angeles, Los Angeles, CA, 90095, USA.
| | - Xing-Yu Zhu
- Key Laboratory of Quantum Information, University of Science and Technology of China, Chinese Academy of Sciences, Hefei, 230026, People's Republic of China
- Department of Physics and Astronomy, University of California at Los Angeles, Los Angeles, CA, 90095, USA
| | - Ao-Lin Guo
- Key Laboratory of Quantum Information, University of Science and Technology of China, Chinese Academy of Sciences, Hefei, 230026, People's Republic of China
- Department of Physics and Astronomy, University of California at Los Angeles, Los Angeles, CA, 90095, USA
| | - Zong-Quan Zhou
- Key Laboratory of Quantum Information, University of Science and Technology of China, Chinese Academy of Sciences, Hefei, 230026, People's Republic of China
| | - Guang-Can Guo
- Key Laboratory of Quantum Information, University of Science and Technology of China, Chinese Academy of Sciences, Hefei, 230026, People's Republic of China
| | - Chuan-Feng Li
- Key Laboratory of Quantum Information, University of Science and Technology of China, Chinese Academy of Sciences, Hefei, 230026, People's Republic of China
| |
Collapse
|
41
|
Kumar A, Haddadi S, Pourkarimi MR, Behera BK, Panigrahi PK. Experimental realization of controlled quantum teleportation of arbitrary qubit states via cluster states. Sci Rep 2020; 10:13608. [PMID: 32788670 PMCID: PMC7423956 DOI: 10.1038/s41598-020-70446-8] [Citation(s) in RCA: 17] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/13/2020] [Accepted: 06/16/2020] [Indexed: 11/30/2022] Open
Abstract
Controlled quantum teleportation involves a third party as a controller for the teleportation of state. Here, we present the novel protocols for controlling teleportation of the arbitrary two-qubit and three-qubit states through five-qubit and seven-qubit cluster states respectively. In these schemes, Alice sends the arbitrary qubit states to the remote receiver Bob through the cluster states as quantum channels under the control of Charlie. Bob can recover the mentioned states by making appropriate unitary operations, and we point out that the efficiency in our schemes is 100%. In the process of our analysis, we find the classical communication cost in our protocols is remarkably reduced when compared to the previous protocols. We perform the experimental realization of the above protocols on "IBM 16 Melbourne" quantum computer and "IBM quantum simulator" and we calculate the fidelity. We also examine the security analysis against Charlie, and these schemes which we considered here are secure against Charlie's attacks.
Collapse
Affiliation(s)
- Abhijeet Kumar
- Department of Physics, Central University of Jharkhand, Ranchi, Jharkhand, 835205, India
| | - Saeed Haddadi
- Faculty of Physics, Semnan University, P.O. Box 35195-363, Semnan, Iran
| | | | - Bikash K Behera
- Bikash's Quantum (OPC) Pvt. Ltd., Balindi, Mohanpur, Nadia, West Bengal, 741246, India.
- Department of Physical Sciences, Indian Institute of Science Education and Research Kolkata, Mohanpur, West Bengal, 741246, India.
| | - Prasanta K Panigrahi
- Department of Physical Sciences, Indian Institute of Science Education and Research Kolkata, Mohanpur, West Bengal, 741246, India
| |
Collapse
|
42
|
Gyongyosi L. Dynamics of entangled networks of the quantum Internet. Sci Rep 2020; 10:12909. [PMID: 32737328 PMCID: PMC7395178 DOI: 10.1038/s41598-020-68498-x] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/16/2020] [Accepted: 06/26/2020] [Indexed: 11/23/2022] Open
Abstract
Entangled quantum networks are a fundamental of any global-scale quantum Internet. Here, a mathematical model is developed to quantify the dynamics of entangled network structures and entanglement flow in the quantum Internet. The analytical solutions of the model determine the equilibrium states of the entangled quantum networks and characterize the stability, fluctuation attributes, and dynamics of entanglement flow in entangled network structures. We demonstrate the results of the model through various entangled structures and quantify the dynamics.
Collapse
Affiliation(s)
- Laszlo Gyongyosi
- School of Electronics and Computer Science, University of Southampton, Southampton, SO17 1BJ, UK.
- Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, 1117, Hungary.
- MTA-BME Information Systems Research Group, Hungarian Academy of Sciences, Budapest, 1051, Hungary.
| |
Collapse
|
43
|
Gyongyosi L, Imre S. Routing space exploration for scalable routing in the quantum Internet. Sci Rep 2020; 10:11874. [PMID: 32681034 PMCID: PMC7367878 DOI: 10.1038/s41598-020-68354-y] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/26/2019] [Accepted: 06/19/2020] [Indexed: 11/09/2022] Open
Abstract
The entangled network structure of the quantum Internet formulates a high complexity routing space that is hard to explore. Scalable routing is a routing method that can determine an optimal routing at particular subnetwork conditions in the quantum Internet to perform a high-performance and low-complexity routing in the entangled structure. Here, we define a method for routing space exploration and scalable routing in the quantum Internet. We prove that scalable routing allows a compact and efficient routing in the entangled networks of the quantum Internet.
Collapse
Affiliation(s)
- Laszlo Gyongyosi
- School of Electronics and Computer Science, University of Southampton, Southampton, SO17 1BJ, UK.
- Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, 1117, Hungary.
- MTA-BME Information Systems Research Group, Hungarian Academy of Sciences, Budapest, 1051, Hungary.
| | - Sandor Imre
- Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, 1117, Hungary
| |
Collapse
|
44
|
Naresh VS, Nasralla MM, Reddi S, García-Magariño I. Quantum Diffie-Hellman Extended to Dynamic Quantum Group Key Agreement for e-Healthcare Multi-Agent Systems in Smart Cities. SENSORS 2020; 20:s20143940. [PMID: 32679823 PMCID: PMC7412309 DOI: 10.3390/s20143940] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/05/2020] [Revised: 06/27/2020] [Accepted: 07/11/2020] [Indexed: 11/16/2022]
Abstract
Multi-Agent Systems can support e-Healthcare applications for improving quality of life of citizens. In this direction, we propose a healthcare system architecture named smart healthcare city. First, we divide a given city into various zones and then we propose a zonal level three-layered system architecture. Further, for effectiveness we introduce a Multi-Agent System (MAS) in this three-layered architecture. Protecting sensitive health information of citizens is a major security concern. Group key agreement (GKA) is the corner stone for securely sharing the healthcare data among the healthcare stakeholders of the city. For establishing GKA, many efficient cryptosystems are available in the classical field. However, they are yet dependent on the supposition that some computational problems are infeasible. In light of quantum mechanics, a new field emerges to share a secret key among two or more members. The unbreakable and highly secure features of key agreement based on fundamental laws of physics allow us to propose a Quantum GKA (QGKA) technique based on renowned Quantum Diffie-Hellman (QDH). In this, a node acts as a Group Controller (GC) and forms 2-party groups with remaining nodes, establishing a QDH-style shared key per each two-party. It then joins these keys into a single group key by means of a XOR-operation, acting as a usual group node. Furthermore, we extend the QGKA to Dynamic QGKA (DQGKA) by adding join and leave protocol. Our protocol performance was compared with existing QGKA protocols in terms of Qubit efficiency (QE), unitary operation (UO), unitary operation efficiency (UOE), key consistency check (KCC), security against participants attack (SAP) and satisfactory results were obtained. The security analysis of the proposed technique is based on unconditional security of QDH. Moreover, it is secured against internal and external attack. In this way, e-healthcare Multi-Agent System can be robust against future quantum-based attacks.
Collapse
Affiliation(s)
- Vankamamidi S. Naresh
- Department of Computer Science and Engineering, Sri Vasavi Engineering College, Tadepalligudeam 534101, India;
| | - Moustafa M. Nasralla
- Department of Communications and Networks Engineering, College of Engineering, Prince Sultan University, Riyadh 11586, Saudi Arabia;
| | - Sivaranjani Reddi
- Department of Computer Science and Engineering, Anil Neerukonda Institute of Technology & Science, Visakhapatnam 530003, India;
| | - Iván García-Magariño
- Department of Software Engineering and Artificial Intelligence, Faculty of Computer Science, Complutense University of Madrid, 28040 Madrid, Spain
- Instituto de Tecnología del Conocimiento, UCM, 28040 Madrid, Spain
- Correspondence:
| |
Collapse
|
45
|
Experimental demonstration of Einstein-Podolsky-Rosen entanglement in rotating coordinate space. Sci Bull (Beijing) 2020; 65:280-285. [PMID: 36659092 DOI: 10.1016/j.scib.2019.11.011] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/17/2019] [Revised: 10/22/2019] [Accepted: 10/31/2019] [Indexed: 01/21/2023]
Abstract
Einstein-Podolsky-Rosen (EPR) entanglement involving a pair of particles entangled in their positions and momenta is of special interest in the field of quantum information. Previously, EPR entanglement has been studied in different physical systems but in fixed coordinate spaces. Here, we demonstrate an experiment of ghost imaging and ghost interference in rotated position-momentum spaces by using position-momentum entangled photons generated from a hot atomic ensemble. By using different image objects, the measured position-momentum correlations exhibit intriguing dynamics, including gradual decrease and axis-independent EPR entanglement. The reported results on manipulating the EPR entanglement in rotating coordinate spaces hold promise in quantum communication and distant quantum image processing.
Collapse
|
46
|
Guo PL, Dong C, He Y, Jing F, He WT, Ren BC, Li CY, Deng FG. Efficient quantum key distribution against collective noise using polarization and transverse spatial mode of photons. OPTICS EXPRESS 2020; 28:4611-4624. [PMID: 32121695 DOI: 10.1364/oe.374292] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/06/2019] [Accepted: 01/06/2020] [Indexed: 06/10/2023]
Abstract
Channel noise is the main issue which reduces the efficiency of quantum communication. Here we present an efficient scheme for quantum key distribution against collective-rotation channel noise using polarization and transverse spatial mode of photons. Exploiting the two single-photon Bell states and two-photon hyperentangled Bell states in the polarization and the transverse spatial mode degrees of freedom (DOFs), the mutually unbiased bases can be encoded for logical qubits against the collective-rotation noise. Our scheme shows noiseless subspaces can be made up of two DOFs of two photons instead of multiple photons, which will reduce the resources required for noiseless subspaces and depress the photonic loss sensitivity. Moreover, the two single-photon Bell states and two-photon hyperentangled Bell states are symmetrical to the two photons, which means the relative order of the two photons is not required in our scheme, so the receiver only needs to measure the state of each photon, which makes our protocol easy to execute in experiment than the previous works.
Collapse
|
47
|
Gyongyosi L, Imre S. Theory of Noise-Scaled Stability Bounds and Entanglement Rate Maximization in the Quantum Internet. Sci Rep 2020; 10:2745. [PMID: 32066779 PMCID: PMC7026176 DOI: 10.1038/s41598-020-58200-6] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/11/2019] [Accepted: 01/06/2020] [Indexed: 11/27/2022] Open
Abstract
Crucial problems of the quantum Internet are the derivation of stability properties of quantum repeaters and theory of entanglement rate maximization in an entangled network structure. The stability property of a quantum repeater entails that all incoming density matrices can be swapped with a target density matrix. The strong stability of a quantum repeater implies stable entanglement swapping with the boundness of stored density matrices in the quantum memory and the boundness of delays. Here, a theoretical framework of noise-scaled stability analysis and entanglement rate maximization is conceived for the quantum Internet. We define the term of entanglement swapping set that models the status of quantum memory of a quantum repeater with the stored density matrices. We determine the optimal entanglement swapping method that maximizes the entanglement rate of the quantum repeaters at the different entanglement swapping sets as function of the noise of the local memory and local operations. We prove the stability properties for non-complete entanglement swapping sets, complete entanglement swapping sets and perfect entanglement swapping sets. We prove the entanglement rates for the different entanglement swapping sets and noise levels. The results can be applied to the experimental quantum Internet.
Collapse
Affiliation(s)
- Laszlo Gyongyosi
- School of Electronics and Computer Science, University of Southampton, Southampton, SO17 1BJ, UK.
- Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, H-1117, Hungary.
- MTA-BME Information Systems Research Group, Hungarian Academy of Sciences, Budapest, H-1051, Hungary.
| | - Sandor Imre
- Department of Networked Systems and Services, Budapest University of Technology and Economics, Budapest, H-1117, Hungary
| |
Collapse
|
48
|
Cao C, Zhang L, Han YH, Yin PP, Fan L, Duan YW, Zhang R. Complete and faithful hyperentangled-Bell-state analysis of photon systems using a failure-heralded and fidelity-robust quantum gate. OPTICS EXPRESS 2020; 28:2857-2872. [PMID: 32121965 DOI: 10.1364/oe.384360] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/27/2019] [Accepted: 01/11/2020] [Indexed: 06/10/2023]
Abstract
Hyperentangled-Bell-state analysis (HBSA) represents a key step in many quantum information processing schemes that utilize hyperentangled states. In this paper, we present a complete and faithful HBSA scheme for two-photon quantum systems hyperentangled in both the polarization and spatial-mode degrees of freedom, using a failure-heralded and fidelity-robust quantum swap gate for the polarization states of two photons (P-SWAP gate), constructed with a singly charged semiconductor quantum dot (QD) in a double-sided optical microcavity (double-sided QD-cavity system) and some linear-optical elements. Compared with the previously proposed complete HBSA schemes using different auxiliary tools such as parity-check quantum nondemonlition detectors or additional entangled states, our scheme significantly simplifies the analysis process and saves the quantum resource. Unlike the previous schemes based on the ideal optical giant circular birefringence induced by a single-electron spin in a double-sided QD-cavity system, our scheme guarantees the robust fidelity and relaxes the requirement on the QD-cavity parameters. These features indicate that our scheme may be more feasible and useful in practical applications based on the photonic hyperentanglement.
Collapse
|
49
|
Li T, Wang Z, Xia K. Multipartite quantum entanglement creation for distant stationary systems. OPTICS EXPRESS 2020; 28:1316-1329. [PMID: 32121845 DOI: 10.1364/oe.383152] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/14/2019] [Accepted: 12/26/2019] [Indexed: 06/10/2023]
Abstract
We present efficient protocols for creating multipartite Greenberger-Horne-Zeilinger (GHZ) and W states of distant stationary qubits. The system nonuniformity and/or the non-ideal single-photon scattering usually limit the performance of entanglement creation, and result in the decrease of the fidelity and the efficiency in practical quantum information processing. By using linear optical elements, errors caused by the system nonuniformity and non-ideal photon scattering can be converted into heralded loss in our protocols. Thus, the fidelity of generated multipartite entangled states keeps unchanged and only the efficiency decreases. The GHZ state of distant stationary qubits is created in a parallel way that its generation efficiency considerably increases. In the protocol for creating the W state of N distant stationary qubits, an input single photon is prepared in a superposition state and sent into N paths parallelly. We use the two-spatial-mode interferences to eliminate the "which path" single-photon scattering "knowledge". As a result, the efficiency of creating the N-qubit W state is independent of the number of stationary qubits rather than exponentially decreases.
Collapse
|
50
|
Zhou L, Zhong W, Sheng YB. Purification of the residual entanglement. OPTICS EXPRESS 2020; 28:2291-2301. [PMID: 32121922 DOI: 10.1364/oe.383499] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/18/2019] [Accepted: 12/31/2019] [Indexed: 06/10/2023]
Abstract
Entanglement purification is an indispensable ingredient in extended quantum communication networks and usually determines the efficiency and communication rate of quantum communication protocols. Different from all existing entanglement purification protocols (EPPs) where two or more copies of low quality mixed entangled states are selected from the same ensemble, here we describe a general and optimal EPP for arbitrary initial mixed states from different ensembles. We show that the successful operation of EPP may not obtain a higher fidelity mixed state, while the discarded source pair, which is usually regarded as a failure in existing EPPs, may have residual entanglement and can be reused to increase the yield of entanglement purification. We give the criterions of both the successful purification to obtain a higher fidelity mixed state and the existence of residual entanglement. Moreover, we reveal that entanglement purification procedure causes some entanglement loss. Finally, we provide an optimal approach to reduce the entanglement loss. This approach can also be used to increase the yield of entanglement purification. Our EPP may have potential application in long-distance quantum communications.
Collapse
|