1
|
Brauer M, Vicente RJ, Buruaga JS, Méndez RB, Braun RP, Geitz M, Rydlichkowski P, Brunner HH, Fung F, Peev M, Pastor A, Lopez DR, Martin V, Brito JP. Linking QKD Testbeds across Europe. Entropy (Basel) 2024; 26:123. [PMID: 38392378 PMCID: PMC10888270 DOI: 10.3390/e26020123] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/09/2023] [Revised: 12/22/2023] [Accepted: 01/24/2024] [Indexed: 02/24/2024]
Abstract
Quantum-key-distribution (QKD) networks are gaining importance and it has become necessary to analyze the most appropriate methods for their long-distance interconnection. In this paper, four different methods of interconnecting remote QKD networks are proposed. The methods are used to link three different QKD testbeds in Europe, located in Berlin, Madrid, and Poznan. Although long-distance QKD links are only emulated, the methods used can serve as a blueprint for the secure interconnection of distant QKD networks in the future. Specifically, the presented approaches combine, in a transparent way, different fiber and satellite physical media, as well as common standards of key delivery interfaces. The testbed interconnections are designed to increase the security by utilizing multipath techniques and multiple hybridizations of QKD and post-quantum cryptography (PQC) algorithms.
Collapse
Affiliation(s)
- Max Brauer
- T-Labs, Deutsche Telekom AG, 10781 Berlin, Germany
| | - Rafael J Vicente
- DLSIIS and Center for Computational Simulation, Universidad Politécnica de Madrid, 28660 Madrid, Spain
| | - Jaime S Buruaga
- DLSIIS and Center for Computational Simulation, Universidad Politécnica de Madrid, 28660 Madrid, Spain
| | - Rubén B Méndez
- DLSIIS and Center for Computational Simulation, Universidad Politécnica de Madrid, 28660 Madrid, Spain
| | | | - Marc Geitz
- T-Labs, Deutsche Telekom AG, 10781 Berlin, Germany
| | | | - Hans H Brunner
- Munich Research Center, Huawei Technologies Duesseldorf GmbH, 80992 Munich, Germany
| | - Fred Fung
- Munich Research Center, Huawei Technologies Duesseldorf GmbH, 80992 Munich, Germany
| | - Momtchil Peev
- Munich Research Center, Huawei Technologies Duesseldorf GmbH, 80992 Munich, Germany
| | | | | | - Vicente Martin
- DLSIIS and Center for Computational Simulation, Universidad Politécnica de Madrid, 28660 Madrid, Spain
| | - Juan P Brito
- DLSIIS and Center for Computational Simulation, Universidad Politécnica de Madrid, 28660 Madrid, Spain
| |
Collapse
|
2
|
Varvelis E, Biswas D, DiVincenzo DP. The photonic content of a transmission-line pulse. Proc Natl Acad Sci U S A 2024; 121:e2314846121. [PMID: 38227653 PMCID: PMC10823225 DOI: 10.1073/pnas.2314846121] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/27/2023] [Accepted: 12/13/2023] [Indexed: 01/18/2024] Open
Abstract
We develop a photonic description of short, one-dimensional electromagnetic pulses, specifically in the language of electrical transmission lines. Current practice in quantum technology, using arbitrary waveform generators, can readily produce very short, few-cycle pulses in a very-low-noise, low-temperature setting. We argue that these systems attain the limit of producing pure coherent quantum states, in which the vacuum has been displaced for a short time, and therefore over a short spatial extent. When the pulse is bipolar, that is, the integrated voltage of the pulse is zero, then the state can be described by the finite displacement of a single mode. Therefore there is a definite mean number of photons, but which have neither a well-defined frequency nor position. Due to the Paley-Wiener theorem, the two-component photon "wavefunction" of this mode, while somewhat localized, is not strictly bounded in space even if the vacuum displacement that defines it is bounded. When the pulse is unipolar, no photonic description is possible-the photon number can be considered to be divergent. We consider properties that photon counters and quantum non-demolition detectors must have to optimally convert and detect the photons in several example pulses. We develop a conceptual test system for implementing short-pulse quantum key distribution, building on the design of a recently achieved Bell's theorem test in a cryogenic microwave setup.
Collapse
Affiliation(s)
- Evangelos Varvelis
- Institute for Quantum Information, Rheinish-Westfälisch Technische Hochschule (RWTH) Aachen University, 52056Aachen, Germany
| | - Debjyoti Biswas
- Department of Physics, Indian Institute of Technology (IIT) Madras, Chennai600036, India
| | - David P. DiVincenzo
- Institute for Quantum Information, Rheinish-Westfälisch Technische Hochschule (RWTH) Aachen University, 52056Aachen, Germany
- Jülich-Aachen Research Alliance, Fundamentals of Future Information Technologies, 52425Jülich, Germany
- Peter Grünberg Institute, Theoretical Nanoelectronics, Forschungszentrum Jülich, 52425Jülich, Germany
| |
Collapse
|
3
|
Lu Y, Ding G. Quantum Secure Multi-Party Summation with Graph State. Entropy (Basel) 2024; 26:80. [PMID: 38248205 PMCID: PMC10814682 DOI: 10.3390/e26010080] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/13/2023] [Revised: 01/12/2024] [Accepted: 01/13/2024] [Indexed: 01/23/2024]
Abstract
Quantum secure multi-party summation (QSMS) is a fundamental problem in quantum secure multi-party computation (QSMC), wherein multiple parties compute the sum of their data without revealing them. This paper proposes a novel QSMS protocol based on graph state, which offers enhanced security, usability, and flexibility compared to existing methods. The protocol leverages the structural advantages of graph state and employs random graph state structures and random encryption gate operations to provide stronger security. Additionally, the stabilizer of the graph state is utilized to detect eavesdroppers and channel noise without the need for decoy bits. The protocol allows for the arbitrary addition and deletion of participants, enabling greater flexibility. Experimental verification is conducted to demonstrate the security, effectiveness, and practicality of the proposed protocols. The correctness and security of the protocols are formally proven. The QSMS method based on graph state introduces new opportunities for QSMC. It highlights the potential of leveraging quantum graph state technology to securely and efficiently solve various multi-party computation problems.
Collapse
|
4
|
Lubotzky B, Nazarov A, Abudayyeh H, Antoniuk L, Lettner N, Agafonov V, Bennett AV, Majumder S, Chandrasekaran V, Bowes EG, Htoon H, Hollingsworth JA, Kubanek A, Rapaport R. Room-Temperature Fiber-Coupled Single-Photon Sources based on Colloidal Quantum Dots and SiV Centers in Back-Excited Nanoantennas. Nano Lett 2024; 24:640-648. [PMID: 38166209 DOI: 10.1021/acs.nanolett.3c03672] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/04/2024]
Abstract
We demonstrate an important step toward on-chip integration of single-photon sources at room temperature. Excellent photon directionality is achieved with a hybrid metal-dielectric bullseye antenna, while back-excitation is permitted by placement of the emitter in a subwavelength hole positioned at its center. The unique design enables a direct back-excitation and very efficient front coupling of emission either to a low numerical aperture (NA) optics or directly to an optical fiber. To show the versatility of the concept, we fabricate devices containing either a colloidal quantum dot or a nanodiamond containing silicon-vacancy centers, which are accurately positioned using two different nanopositioning methods. Both of these back-excited devices display front collection efficiencies of ∼70% at NAs as low as 0.5. The combination of back-excitation with forward directionality enables direct coupling of the emitted photons into a proximal optical fiber without any coupling optics, thereby facilitating and simplifying future integration.
Collapse
Affiliation(s)
- Boaz Lubotzky
- Racah Institute of Physics, The Hebrew University of Jerusalem, Jerusalem 9190401, Israel
| | - Alexander Nazarov
- Racah Institute of Physics, The Hebrew University of Jerusalem, Jerusalem 9190401, Israel
- The Center for Nanoscience and Nanotechnology, The Hebrew University of Jerusalem, Jerusalem 9190401, Israel
| | - Hamza Abudayyeh
- Racah Institute of Physics, The Hebrew University of Jerusalem, Jerusalem 9190401, Israel
| | - Lukas Antoniuk
- Institute for Quantum Optics, University of Ulm, Albert-Einstein-Allee 11, 89081 Ulm, Germany
| | - Niklas Lettner
- Institute for Quantum Optics, University of Ulm, Albert-Einstein-Allee 11, 89081 Ulm, Germany
- Center for Integrated Quantum Science and Technology (IQst), Ulm University, Albert-Einstein-Allee 11, D-89081 Ulm, Germany
| | | | - Anastasia V Bennett
- Materials Physics & Applications Division: Center for Integrated Nanotechnologies, Los Alamos National Laboratory, Los Alamos New Mexico 87545, United States
| | - Somak Majumder
- Materials Physics & Applications Division: Center for Integrated Nanotechnologies, Los Alamos National Laboratory, Los Alamos New Mexico 87545, United States
| | - Vigneshwaran Chandrasekaran
- Materials Physics & Applications Division: Center for Integrated Nanotechnologies, Los Alamos National Laboratory, Los Alamos New Mexico 87545, United States
| | - Eric G Bowes
- Materials Physics & Applications Division: Center for Integrated Nanotechnologies, Los Alamos National Laboratory, Los Alamos New Mexico 87545, United States
| | - Han Htoon
- Materials Physics & Applications Division: Center for Integrated Nanotechnologies, Los Alamos National Laboratory, Los Alamos New Mexico 87545, United States
| | - Jennifer A Hollingsworth
- Materials Physics & Applications Division: Center for Integrated Nanotechnologies, Los Alamos National Laboratory, Los Alamos New Mexico 87545, United States
| | - Alexander Kubanek
- Institute for Quantum Optics, University of Ulm, Albert-Einstein-Allee 11, 89081 Ulm, Germany
- Center for Integrated Quantum Science and Technology (IQst), Ulm University, Albert-Einstein-Allee 11, D-89081 Ulm, Germany
| | - Ronen Rapaport
- Racah Institute of Physics, The Hebrew University of Jerusalem, Jerusalem 9190401, Israel
- The Center for Nanoscience and Nanotechnology, The Hebrew University of Jerusalem, Jerusalem 9190401, Israel
| |
Collapse
|
5
|
Jiang Y, Shang T, Tang Y, Liu J. Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient. Entropy (Basel) 2023; 25:1524. [PMID: 37998216 PMCID: PMC10670539 DOI: 10.3390/e25111524] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/28/2023] [Revised: 11/04/2023] [Accepted: 11/06/2023] [Indexed: 11/25/2023]
Abstract
Quantum obfuscation is one of the important primitives in quantum cryptography that can be used to enhance the security of various quantum cryptographic schemes. The research on quantum obfuscation focuses mainly on the obfuscatability of quantum functions. As a primary quantum function, the quantum power function has led to the development of quantum obfuscation because it is applicable to construct new obfuscation applications such as quantum encryption schemes. However, the previous definition of quantum power functions is constrained and cannot be beneficial to the further construction of other quantum functions. Thus, it is essential to extend the definition of the basic quantum power function in a more general manner. In this paper, we provide a formal definition of two quantum power functions called generalized quantum power functions with coefficients, each of which is characterized by a leading coefficient and an exponent that corresponds to either a quantum or classical state, indicating the generality. The first is the quantum power function with a leading coefficient, and the second is the quantum n-th power function, which are both fundamental components of quantum polynomial functions. In addition, obfuscation schemes for the functions are constructed by quantum teleportation and quantum superdense coding, and demonstrations of their obfuscatability are also provided in this paper. This work establishes the fundamental basis for constructing more quantum functions that can be utilized for quantum obfuscation, therefore contributing to the theory of quantum obfuscation.
Collapse
Affiliation(s)
| | - Tao Shang
- School of Cyber Science and Technology, Beihang University, Beijing 100083, China; (Y.J.); (Y.T.); (J.L.)
| | | | | |
Collapse
|
6
|
Zawadzki P. Insecurity of Quantum Blockchains Based on Entanglement in Time. Entropy (Basel) 2023; 25:1344. [PMID: 37761643 PMCID: PMC10529257 DOI: 10.3390/e25091344] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/17/2023] [Revised: 09/07/2023] [Accepted: 09/14/2023] [Indexed: 09/29/2023]
Abstract
In this study, the security implications of utilizing the concept of entanglement in time in the quantum representation of a blockchain data structure are investigated. The analysis reveals that the fundamental idea underlying this representation relies on an uncertain interpretation of experimental results. A different perspective is provided by adopting the Copenhagen interpretation, which explains the observed correlations in the experiment without invoking the concept of entanglement in time. According to this interpretation, the qubits responsible for these correlations are not entangled, posing a challenge to the security foundation of the data structure. The study incorporates theoretical analysis, numerical simulations, and experiments using real quantum hardware. By employing a dedicated circuit for detecting genuine entanglement, the existence of entanglement in the process of generating a quantum blockchain is conclusively excluded.
Collapse
Affiliation(s)
- Piotr Zawadzki
- Department of Telecommunications and Teleinformatics, Silesian University of Technology, Akademicka 16, 44-100 Gliwice, Poland
| |
Collapse
|
7
|
Li J, Wang Z, Yang J, Ye C, Che F. A Semi-Quantum Private Comparison Base on W-States. Entropy (Basel) 2023; 25:1269. [PMID: 37761568 PMCID: PMC10529718 DOI: 10.3390/e25091269] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/27/2023] [Revised: 08/21/2023] [Accepted: 08/23/2023] [Indexed: 09/29/2023]
Abstract
Privacy comparison is an important research topic in secure multi-party computing, widely used in e-commerce, secret ballots, and other fields. However, the development of quantum computing power poses a growing potential security threat to secure multi-party algorithms based on mathematically tricky problems, and most of the proposed quantum privacy comparison schemes could be more efficient. Therefore, based on the W-state, we offer a more efficient semi-quantum privacy comparison method. The security analysis shows that the scheme can resist third-party, measurement, and entanglement attacks. Compared with the previous work, the scheme significantly improves communication efficiency and has stronger practicability.
Collapse
Affiliation(s)
- Jian Li
- School of Information Engineering, Ningxia University, Yinchuan 750021, China; (J.L.); (J.Y.)
- School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
| | - Zhuo Wang
- School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing 100876, China; (C.Y.); (F.C.)
| | - Jun Yang
- School of Information Engineering, Ningxia University, Yinchuan 750021, China; (J.L.); (J.Y.)
| | - Chongqiang Ye
- School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing 100876, China; (C.Y.); (F.C.)
| | - Fanting Che
- School of Artificial Intelligence, Beijing University of Posts and Telecommunications, Beijing 100876, China; (C.Y.); (F.C.)
| |
Collapse
|
8
|
Katariya V, Bhusal N, You C. Experimental Guesswork with Quantum Side Information Using Twisted Light. Sensors (Basel) 2023; 23:6570. [PMID: 37514864 PMCID: PMC10383366 DOI: 10.3390/s23146570] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/30/2023] [Revised: 07/17/2023] [Accepted: 07/18/2023] [Indexed: 07/30/2023]
Abstract
Guesswork is an information-theoretic quantity which can be seen as an alternate security criterion to entropy. Recent work has established the theoretical framework for guesswork in the presence of quantum side information, which we extend both theoretically and experimentally. We consider guesswork when the side information consists of the BB84 states and their higher-dimensional generalizations. With this side information, we compute the guesswork for two different scenarios for each dimension. We then performed a proof-of-principle experiment using Laguerre-Gauss modes to experimentally compute the guesswork for higher-dimensional generalizations of the BB84 states. We find that our experimental results agree closely with our theoretical predictions. This work shows that guesswork can be a viable security criterion in cryptographic tasks and is experimentally accessible in a number of optical setups.
Collapse
Affiliation(s)
- Vishal Katariya
- Hearne Institute for Theoretical Physics, Department of Physics & Astronomy, and Center for Computation & Technology, Louisiana State University, Baton Rouge, LA 70803, USA
| | - Narayan Bhusal
- Quantum Photonics Laboratory, Department of Physics & Astronomy, Louisiana State University, Baton Rouge, LA 70803, USA
| | - Chenglong You
- Quantum Photonics Laboratory, Department of Physics & Astronomy, Louisiana State University, Baton Rouge, LA 70803, USA
| |
Collapse
|
9
|
Tian Y, Bian G, Chang J, Tang Y, Li J, Ye C. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity. Entropy (Basel) 2023; 25:e25050742. [PMID: 37238497 DOI: 10.3390/e25050742] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/09/2023] [Revised: 04/16/2023] [Accepted: 04/25/2023] [Indexed: 05/28/2023]
Abstract
Semi-quantum cryptography communication stipulates that the quantum user has complete quantum capabilities, and the classical user has limited quantum capabilities, only being able to perform the following operations: (1) measuring and preparing qubits with a Z basis and (2) returning qubits without any processing. Secret sharing requires participants to work together to obtain complete secret information, which ensures the security of the secret information. In the semi-quantum secret sharing (SQSS) protocol, the quantum user Alice divides the secret information into two parts and gives them to two classical participants. Only when they cooperate can they obtain Alice's original secret information. The quantum states with multiple degrees of freedom (DoFs) are defined as hyper-entangled states. Based on the hyper-entangled single-photon states, an efficient SQSS protocol is proposed. The security analysis proves that the protocol can effectively resist well-known attacks. Compared with the existing protocols, this protocol uses hyper-entangled states to expand the channel capacity. The transmission efficiency is 100% higher than that of single-degree-of-freedom (DoF) single-photon states, providing an innovative scheme for the design of the SQSS protocol in quantum communication networks. This research also provides a theoretical basis for the practical application of semi-quantum cryptography communication.
Collapse
Affiliation(s)
- Yuan Tian
- College of Information and Control Engineering, Xi'an University of Architecture and Technology, Xi'an 710055, China
| | - Genqing Bian
- College of Information and Control Engineering, Xi'an University of Architecture and Technology, Xi'an 710055, China
| | - Jinyong Chang
- College of Information and Control Engineering, Xi'an University of Architecture and Technology, Xi'an 710055, China
| | - Ying Tang
- College of Information and Control Engineering, Xi'an University of Architecture and Technology, Xi'an 710055, China
| | - Jian Li
- School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
| | - Chongqiang Ye
- School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
| |
Collapse
|
10
|
Wu WQ, Xie MZ. Quantum Secure Multi-Party Summation Using Single Photons. Entropy (Basel) 2023; 25:e25040590. [PMID: 37190378 PMCID: PMC10137604 DOI: 10.3390/e25040590] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/27/2023] [Revised: 03/24/2023] [Accepted: 03/27/2023] [Indexed: 05/17/2023]
Abstract
In this paper, we propose a secure multi-party summation based on single photons. With the help of a semi-honest third party, n participants can simultaneously obtain the summation result without revealing their secret inputs. Our protocol uses single photon states as the information carriers. In addition, each participant with secret input only performs simple single-particle operators rather than particle preparation and any complex quantum measurements. These features make our protocol more feasible to implement. We demonstrate the correctness and security of the proposed protocol, which is resistant to participant attack and outside attack. In the end, we compare in detail the performance of the quantum summation protocol in this paper with other schemes in terms of different indicators. By comparison, our protocol is efficient and easy to implement.
Collapse
Affiliation(s)
- Wan-Qing Wu
- School of Cyber Security and Computers, Hebei University, Baoding 071002, China
- Key Laboratory on High Trusted Information System in Hebei Province, Hebei University, Baoding 071002, China
| | - Ming-Zhe Xie
- School of Cyber Security and Computers, Hebei University, Baoding 071002, China
- Key Laboratory on High Trusted Information System in Hebei Province, Hebei University, Baoding 071002, China
| |
Collapse
|
11
|
Carrier S, Labrecque-Dias M, Tannous R, Gendron P, Nolet F, Roy N, Rossignol T, Vachon F, Parent S, Jennewein T, Charlebois S, Pratte JF. Towards a Multi-Pixel Photon-to-Digital Converter for Time-Bin Quantum Key Distribution. Sensors (Basel) 2023; 23:3376. [PMID: 37050435 PMCID: PMC10097401 DOI: 10.3390/s23073376] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/10/2023] [Revised: 03/10/2023] [Accepted: 03/15/2023] [Indexed: 06/19/2023]
Abstract
We present an integrated single-photon detection device custom designed for quantum key distribution (QKD) with time-bin encoded single photons. We implemented and demonstrated a prototype photon-to-digital converter (PDC) that integrates an 8 × 8 single-photon avalanche diode (SPAD) array with on-chip digital signal processing built in TSMC 65 nm CMOS. The prototype SPADs are used to validate the QKD functionalities with an array of time-to-digital converters (TDCs) to timestamp and process the photon detection events. The PDC uses window gating to reject noise counts and on-chip processing to sort the photon detections into respective time-bins. The PDC prototype achieved a 22.7 ps RMS timing resolution and demonstrated operation in a time-bin setup with 158 ps time-bins at an optical wavelength of 410 nm. This PDC can therefore be an important building block for a QKD receiver and enables compact and robust time-bin QKD systems with imaging detectors.
Collapse
Affiliation(s)
- Simon Carrier
- Département de Génie Électrique et de Génie Informatique, Université de Sherbrooke, Sherbrooke, QC J1K 2R1, Canada
| | - Michel Labrecque-Dias
- Département de Génie Électrique et de Génie Informatique, Université de Sherbrooke, Sherbrooke, QC J1K 2R1, Canada
| | - Ramy Tannous
- Institute for Quantum Computing, Department of Physics & Astronomy, University of Waterloo, Waterloo, ON N2L 3G1, Canada
| | - Pascal Gendron
- Département de Génie Électrique et de Génie Informatique, Université de Sherbrooke, Sherbrooke, QC J1K 2R1, Canada
| | - Frédéric Nolet
- Département de Génie Électrique et de Génie Informatique, Université de Sherbrooke, Sherbrooke, QC J1K 2R1, Canada
| | - Nicolas Roy
- Département de Génie Électrique et de Génie Informatique, Université de Sherbrooke, Sherbrooke, QC J1K 2R1, Canada
| | - Tommy Rossignol
- Département de Génie Électrique et de Génie Informatique, Université de Sherbrooke, Sherbrooke, QC J1K 2R1, Canada
| | - Frédéric Vachon
- Département de Génie Électrique et de Génie Informatique, Université de Sherbrooke, Sherbrooke, QC J1K 2R1, Canada
| | - Samuel Parent
- Département de Génie Électrique et de Génie Informatique, Université de Sherbrooke, Sherbrooke, QC J1K 2R1, Canada
| | - Thomas Jennewein
- Institute for Quantum Computing, Department of Physics & Astronomy, University of Waterloo, Waterloo, ON N2L 3G1, Canada
| | - Serge Charlebois
- Département de Génie Électrique et de Génie Informatique, Université de Sherbrooke, Sherbrooke, QC J1K 2R1, Canada
| | - Jean-François Pratte
- Département de Génie Électrique et de Génie Informatique, Université de Sherbrooke, Sherbrooke, QC J1K 2R1, Canada
| |
Collapse
|
12
|
Yang CW, Lin J, Tsai CW, Cheng CL. Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States. Entropy (Basel) 2022; 24:1408. [PMID: 37420428 DOI: 10.3390/e24101408] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/09/2022] [Revised: 09/23/2022] [Accepted: 09/29/2022] [Indexed: 07/09/2023]
Abstract
Recently, Zhao et al. proposed a semi-quantum bi-signature (SQBS) scheme based on W states with two quantum signers and just one classical verifier. In this study, we highlight three security issues with Zhao et al.'s SQBS scheme. In Zhao et al.'s SQBS protocol, an insider attacker can perform an impersonation attack in the verification phase and an impersonation attack in the signature phase to capture the private key. In addition, an eavesdropper can perform a man-in-the-middle attack to obtain all of the signer's secret information. All of the above three attacks can pass the eavesdropping check. Without considering these security issues, the SQBS protocol could fail to ensure the signer's secret information.
Collapse
Grants
- NSTC 111-2221-E-039-014, NSTC 110-2221-E-143-003, NSTC 110-2221-E-259-001, NSTC 110-2221-E-143-004, NSTC 110-2222-E-005-006, NSTC 110-2634-F-005-006, NSTC 111-2218-E-005-007-MBK, NSTC 111-2221-E-005-048, and NSTC 111-2221-E-025-010 National Science and Technology Council, Taiwan, R.O.C.
- CMU110-S-21 and CMU111-MF-112 China Medical University, Taiwan
Collapse
Affiliation(s)
- Chun-Wei Yang
- Master Program for Digital Health Innovation, College of Humanities and Sciences, China Medical University, No. 100, Sec. 1, Jingmao Rd., Beitun Dist., Taichung 406040, Taiwan
| | - Jason Lin
- Department of Computer Science and Engineering, National Chung Hsing University, No. 145, Xingda Rd., South Dist., Taichung 40227, Taiwan
| | - Chia-Wei Tsai
- Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, No. 129, Sec. 3, Sanmin Rd., North Dist., Taichung 40401, Taiwan
| | - Ching-Lin Cheng
- Master Program for Digital Health Innovation, College of Humanities and Sciences, China Medical University, No. 100, Sec. 1, Jingmao Rd., Beitun Dist., Taichung 406040, Taiwan
| |
Collapse
|
13
|
Pitalúa-García D. Unconditionally secure relativistic multi-party biased coin flipping and die rolling. Proc Math Phys Eng Sci 2022; 477:20210203. [PMID: 35153573 PMCID: PMC8385382 DOI: 10.1098/rspa.2021.0203] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/06/2021] [Accepted: 07/22/2021] [Indexed: 11/30/2022] Open
Abstract
We introduce relativistic multi-party biased die-rolling protocols, generalizing coin flipping to M≥2 parties and to N≥2 outcomes for any chosen outcome biases and show them unconditionally secure. Our results prove that the most general random secure multi-party computation, where all parties receive the output and there is no secret input by any party, can be implemented with unconditional security. Our protocols extend Kent’s (Kent A. 1999 Phys. Rev. Lett.83, 5382) two-party unbiased coin-flipping protocol, do not require any quantum communication, are practical to implement with current technology and to our knowledge are the first multi-party relativistic cryptographic protocols.
Collapse
Affiliation(s)
- Damián Pitalúa-García
- Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA, UK
| |
Collapse
|
14
|
Ye M, Wang Y, Gao P, Xu L, Huang G. Experimental Hong-Ou-Mandel interference using two independent heralded single-photon sources. Front Optoelectron 2021; 14:360-364. [PMID: 36637726 PMCID: PMC9743834 DOI: 10.1007/s12200-020-0986-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/30/2019] [Accepted: 12/10/2019] [Indexed: 06/17/2023]
Abstract
Hong-Ou-Mandel (HOM) interference is one of the most important experimental phenomena in quantum optics. It has drawn considerable attention with respect to quantum cryptography and quantum communication because of the advent of the measurement device independent (MDI) quantum key distribution (QKD) protocol. Here, we realize HOM interference, having a visibility of approximately 38.1%, using two independent heralded single-photon sources (HSPSs). The HOM interference between two independent HSPSs is a core technology for realizing the long-distance MDI QKD protocol, the quantum coin-tossing protocol, and other quantum cryptography protocols.
Collapse
Affiliation(s)
- Meng Ye
- CSG Power Generation Company Information Communication Branch, Guangzhou, 510070 China
| | - Yong Wang
- CSG Power Generation Company Information Communication Branch, Guangzhou, 510070 China
| | - Peng Gao
- CSG Power Generation Company Information Communication Branch, Guangzhou, 510070 China
| | - Likun Xu
- CSG Power Generation Company Information Communication Branch, Guangzhou, 510070 China
| | - Guanjin Huang
- CSG Power Generation Company Information Communication Branch, Guangzhou, 510070 China
| |
Collapse
|
15
|
Costa B, Branco P, Goulão M, Lemus M, Mateus P. Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting. Entropy (Basel) 2021; 23:1001. [PMID: 34441141 PMCID: PMC8394280 DOI: 10.3390/e23081001] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/14/2021] [Revised: 07/22/2021] [Accepted: 07/22/2021] [Indexed: 11/16/2022]
Abstract
Secure computation is a powerful cryptographic tool that encompasses the evaluation of any multivariate function with arbitrary inputs from mutually distrusting parties. The oblivious transfer primitive serves is a basic building block for the general task of secure multi-party computation. Therefore, analyzing the security in the universal composability framework becomes mandatory when dealing with multi-party computation protocols composed of oblivious transfer subroutines. Furthermore, since the required number of oblivious transfer instances scales with the size of the circuits, oblivious transfer remains as a bottleneck for large-scale multi-party computation implementations. Techniques that allow one to extend a small number of oblivious transfers into a larger one in an efficient way make use of the oblivious transfer variant called randomized oblivious transfer. In this work, we present randomized versions of two known oblivious transfer protocols, one quantum and another post-quantum with ring learning with an error assumption. We then prove their security in the quantum universal composability framework, in a common reference string model.
Collapse
Affiliation(s)
- Bruno Costa
- Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisbon, Portugal; (B.C.); (P.B.); (M.G.); (M.L.)
- Capgemini Engineering, Av. D. João II, Lote 1.07.2.1, Piso 2, 1990-096 Lisbon, Portugal
| | - Pedro Branco
- Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisbon, Portugal; (B.C.); (P.B.); (M.G.); (M.L.)
- Instituto de Telecomunicações, IST Av. Rovisco Pais, 1049-001 Lisbon, Portugal
| | - Manuel Goulão
- Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisbon, Portugal; (B.C.); (P.B.); (M.G.); (M.L.)
- Instituto de Telecomunicações, IST Av. Rovisco Pais, 1049-001 Lisbon, Portugal
| | - Mariano Lemus
- Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisbon, Portugal; (B.C.); (P.B.); (M.G.); (M.L.)
| | - Paulo Mateus
- Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisbon, Portugal; (B.C.); (P.B.); (M.G.); (M.L.)
- Instituto de Telecomunicações, IST Av. Rovisco Pais, 1049-001 Lisbon, Portugal
| |
Collapse
|
16
|
Ampatzis M, Andronikos T. QKD Based on Symmetric Entangled Bernstein-Vazirani. Entropy (Basel) 2021; 23:870. [PMID: 34356411 DOI: 10.3390/e23070870] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/09/2021] [Revised: 07/04/2021] [Accepted: 07/05/2021] [Indexed: 11/16/2022]
Abstract
This paper introduces a novel entanglement-based QKD protocol, that makes use of a modified symmetric version of the Bernstein-Vazirani algorithm, in order to achieve secure and efficient key distribution. Two variants of the protocol, one fully symmetric and one semi-symmetric, are presented. In both cases, the spatially separated Alice and Bob share multiple EPR pairs, each one qubit of the pair. The fully symmetric version allows both parties to input their tentative secret key from their respective location and acquire in the end a totally new and original key, an idea which was inspired by the Diffie-Hellman key exchange protocol. In the semi-symmetric version, Alice sends her chosen secret key to Bob (or vice versa). The performance of both protocols against an eavesdroppers attack is analyzed. Finally, in order to illustrate the operation of the protocols in practice, two small scale but detailed examples are given.
Collapse
|
17
|
Jia ZY, Gu J, Li BH, Yin HL, Chen ZB. Differential Phase Shift Quantum Secret Sharing Using a Twin Field with Asymmetric Source Intensities. Entropy (Basel) 2021; 23:716. [PMID: 34199849 DOI: 10.3390/e23060716] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/04/2021] [Revised: 05/31/2021] [Accepted: 06/01/2021] [Indexed: 11/17/2022]
Abstract
As an essential application of quantum mechanics in classical cryptography, quantum secret sharing has become an indispensable component of quantum internet. Recently, a differential phase shift quantum secret sharing protocol using a twin field has been proposed to break the linear rate-distance boundary. However, this original protocol has a poor performance over channels with asymmetric transmittances. To make it more practical, we present a differential phase shift quantum secret sharing protocol with asymmetric source intensities and give the security proof of our protocol against individual attacks. Taking finite-key effects into account, our asymmetric protocol can theoretically obtain the key rate two orders of magnitude higher than that of the original protocol when the difference in length between Alice's channel and Bob's is fixed at 14 km. Moreover, our protocol can provide a high key rate even when the difference is quite large and has great robustness against finite-key effects. Therefore, our work is meaningful for the real-life applications of quantum secret sharing.
Collapse
|
18
|
Pavičić M. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? Entropy (Basel) 2021; 23:163. [PMID: 33573044 DOI: 10.3390/e23020163] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/18/2020] [Revised: 01/18/2021] [Accepted: 01/20/2021] [Indexed: 11/17/2022]
Abstract
We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages in the message mode, while being undetectable in the mode. Under the attack there is therefore no disturbance in the message mode and the mutual information between the sender and the receiver is always constant and equal to one and messages copied by the eavesdropper are always genuine. An attack can only be detected in the control mode but the level of detection at which the protocol should be aborted is not defined. We examine steps of the protocol to evaluate its security and find that the protocol should be redesigned. We also compare it with the security of a one-way asymmetric BB84-like protocol in which one basis serves as the message mode and the other as the control mode but which does have the level of detection at which the protocol should be aborted defined.
Collapse
|
19
|
Kon WY, Lim CCW. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography. Entropy (Basel) 2020; 23:E54. [PMID: 33396236 PMCID: PMC7823359 DOI: 10.3390/e23010054] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/01/2020] [Revised: 12/27/2020] [Accepted: 12/28/2020] [Indexed: 11/30/2022]
Abstract
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. Unconditionally secure SPIR solutions with multiple databases are known classically, but are unrealistic because they require long shared secret keys between the parties for secure communication and shared randomness in the protocol. Here, we propose using quantum key distribution (QKD) instead for a practical implementation, which can realise both the secure communication and shared randomness requirements. We prove that QKD maintains the security of the SPIR protocol and that it is also secure against any external eavesdropper. We also show how such a classical-quantum system could be implemented practically, using the example of a two-database SPIR protocol with keys generated by measurement device-independent QKD. Through key rate calculations, we show that such an implementation is feasible at the metropolitan level with current QKD technology.
Collapse
Affiliation(s)
- Wen Yu Kon
- Department of Electrical & Computer Engineering, National University of Singapore, Singapore 119077, Singapore;
| | - Charles Ci Wen Lim
- Department of Electrical & Computer Engineering, National University of Singapore, Singapore 119077, Singapore;
- Centre for Quantum Technologies, National University of Singapore, Singapore 119077, Singapore
| |
Collapse
|
20
|
Derkach I, Usenko VC. Applicability of Squeezed- and Coherent-State Continuous-Variable Quantum Key Distribution over Satellite Links. Entropy (Basel) 2020; 23:E55. [PMID: 33396248 DOI: 10.3390/e23010055] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/13/2020] [Revised: 12/27/2020] [Accepted: 12/29/2020] [Indexed: 11/16/2022]
Abstract
We address the applicability of quantum key distribution with continuous-variable coherent and squeezed states over long-distance satellite-based links, considering low Earth orbits and taking into account strong varying channel attenuation, atmospheric turbulence and finite data ensemble size effects. We obtain tight security bounds on the untrusted excess noise on the channel output, which suggest that substantial efforts aimed at setup stabilization and reduction of noise and loss are required, or the protocols can be realistically implemented over satellite links once either individual or passive collective attacks are assumed. Furthermore, splitting the satellite pass into discrete segments and extracting the key from each rather than from the overall single pass allows one to effectively improve robustness against the untrusted channel noise and establish a secure key under active collective attacks. We show that feasible amounts of optimized signal squeezing can substantially improve the applicability of the protocols allowing for lower system clock rates and aperture sizes and resulting in higher robustness against channel attenuation and noise compared to the coherent-state protocol.
Collapse
|
21
|
Jeong YC, Ji SW, Hong C, Park HS, Jang J. Deterministic Secure Quantum Communication on the BB84 System. Entropy (Basel) 2020; 22:E1268. [PMID: 33287036 PMCID: PMC7711499 DOI: 10.3390/e22111268] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/23/2020] [Revised: 10/30/2020] [Accepted: 11/06/2020] [Indexed: 11/16/2022]
Abstract
In this paper, we propose a deterministic secure quantum communication (DSQC) protocol based on the BB84 system. We developed this protocol to include quantum entity authentication in the DSQC procedure. By first performing quantum entity authentication, it was possible to prevent third-party intervention. We demonstrate the security of the proposed protocol against the intercept-and-re-send attack and the entanglement-and-measure attack. Implementation of this protocol was demonstrated for quantum channels of various lengths. Especially, we propose the use of the multiple generation and shuffling method to prevent a loss of message in the experiment.
Collapse
Affiliation(s)
- Youn-Chang Jeong
- The Affiliated Institute of Electronics and Telecommunications Research Institute, P.O.Box 1, Yuseong Daejeon 34188, Korea; (Y.-C.J.); (S.-W.J.); (C.H.)
| | - Se-Wan Ji
- The Affiliated Institute of Electronics and Telecommunications Research Institute, P.O.Box 1, Yuseong Daejeon 34188, Korea; (Y.-C.J.); (S.-W.J.); (C.H.)
| | - Changho Hong
- The Affiliated Institute of Electronics and Telecommunications Research Institute, P.O.Box 1, Yuseong Daejeon 34188, Korea; (Y.-C.J.); (S.-W.J.); (C.H.)
| | - Hee Su Park
- Korea Research Institute of Standards and Science, Daejeon 43113, Korea;
| | - Jingak Jang
- The Affiliated Institute of Electronics and Telecommunications Research Institute, P.O.Box 1, Yuseong Daejeon 34188, Korea; (Y.-C.J.); (S.-W.J.); (C.H.)
| |
Collapse
|
22
|
Cao WF, Zhen YZ, Zheng YL, Zhao S, Xu F, Li L, Chen ZB, Liu NL, Chen K. Open-Destination Measurement-Device-Independent Quantum Key Distribution Network. Entropy (Basel) 2020; 22:E1083. [PMID: 33286852 PMCID: PMC7597171 DOI: 10.3390/e22101083] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/16/2020] [Revised: 09/22/2020] [Accepted: 09/22/2020] [Indexed: 11/23/2022]
Abstract
Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities. Most existing QKD network schemes and demonstrations are based on trusted relays or limited to point-to-point scenario. Here, we propose a flexible and extensible scheme named as open-destination measurement-device-independent QKD network. The scheme enjoys security against untrusted relays and all detector side-channel attacks. Particularly, any users can accomplish key distribution under assistance of others in the network. As an illustration, we show in detail a four-user network where two users establish secure communication and present realistic simulations by taking into account imperfections of both sources and detectors.
Collapse
Affiliation(s)
- Wen-Fei Cao
- Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei 230026, China; (W.-F.C.); (Y.-Z.Z.); (Y.-L.Z.); (S.Z.)
- CAS Center for Excellence and Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Yi-Zheng Zhen
- Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei 230026, China; (W.-F.C.); (Y.-Z.Z.); (Y.-L.Z.); (S.Z.)
- CAS Center for Excellence and Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Yu-Lin Zheng
- Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei 230026, China; (W.-F.C.); (Y.-Z.Z.); (Y.-L.Z.); (S.Z.)
- CAS Center for Excellence and Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Shuai Zhao
- Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei 230026, China; (W.-F.C.); (Y.-Z.Z.); (Y.-L.Z.); (S.Z.)
- CAS Center for Excellence and Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Feihu Xu
- Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei 230026, China; (W.-F.C.); (Y.-Z.Z.); (Y.-L.Z.); (S.Z.)
- CAS Center for Excellence and Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Li Li
- Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei 230026, China; (W.-F.C.); (Y.-Z.Z.); (Y.-L.Z.); (S.Z.)
- CAS Center for Excellence and Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Zeng-Bing Chen
- National Laboratory of Solid State Microstructures and School of Physics, Nanjing University, Nanjing 210093, China
| | - Nai-Le Liu
- Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei 230026, China; (W.-F.C.); (Y.-Z.Z.); (Y.-L.Z.); (S.Z.)
- CAS Center for Excellence and Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| | - Kai Chen
- Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei 230026, China; (W.-F.C.); (Y.-Z.Z.); (Y.-L.Z.); (S.Z.)
- CAS Center for Excellence and Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
| |
Collapse
|
23
|
Pawłowski M. Entropy in Foundations of Quantum Physics. Entropy (Basel) 2020; 22:e22030371. [PMID: 33286145 PMCID: PMC7516842 DOI: 10.3390/e22030371] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/18/2020] [Accepted: 03/19/2020] [Indexed: 06/12/2023]
Abstract
Entropy can be used in studies on foundations of quantum physics in many different ways, each of them using different properties of this mathematical object [...].
Collapse
Affiliation(s)
- Marcin Pawłowski
- International Centre for Theory of Quantum Technologies, University of Gdańsk, 80-952 Gdańsk, Poland
| |
Collapse
|
24
|
Zhang C, Razavi M, Sun Z, Huang Q, Situ H. Multi-Party Quantum Summation Based on Quantum Teleportation. Entropy (Basel) 2019; 21:e21070719. [PMID: 33267433 PMCID: PMC7515234 DOI: 10.3390/e21070719] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/27/2019] [Revised: 07/06/2019] [Accepted: 07/09/2019] [Indexed: 11/16/2022]
Abstract
We present a secure multi-party quantum summation protocol based on quantum teleportation, in which a malicious, but non-collusive, third party (TP) helps compute the summation. In our protocol, TP is in charge of entanglement distribution and Bell states are shared between participants. Users encode the qubits in their hand according to their private bits and perform Bell-state measurements. After obtaining participants' measurement results, TP can figure out the summation. The participants do not need to send their encoded states to others, and the protocol is therefore congenitally free from Trojan horse attacks. In addition, our protocol can be made secure against loss errors, because the entanglement distribution occurs only once at the beginning of our protocol. We show that our protocol is secure against attacks by the participants as well as the outsiders.
Collapse
Affiliation(s)
- Cai Zhang
- College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, China
- School of Electronic and Electrical Engineering, University of Leeds, Leeds LS2 9JT, UK
- Correspondence: (C.Z.); (M.R.); (Z.S.)
| | - Mohsen Razavi
- School of Electronic and Electrical Engineering, University of Leeds, Leeds LS2 9JT, UK
- Correspondence: (C.Z.); (M.R.); (Z.S.)
| | - Zhiwei Sun
- School of Artificial Intelligence, Shenzhen Polytechnic, Shenzhen 518055, China
- Center for Quantum Computing, Peng Cheng Laboratory, Shenzhen 513055, China
- Correspondence: (C.Z.); (M.R.); (Z.S.)
| | - Qiong Huang
- College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, China
| | - Haozhen Situ
- College of Mathematics and Informatics, South China Agricultural University, Guangzhou 510642, China
| |
Collapse
|
25
|
Abstract
We propose definitions and implementations of 'S-money'-virtual tokens designed for high-value fast transactions on networks with relativistic or other trusted signalling constraints, defined by inputs that in general are made at many network points, some or all of which may be space-like separated. We argue that one significant way of characterizing types of money in space-time is via the 'summoning' tasks they can solve: that is, how flexibly the money can be propagated to a desired space-time point in response to relevant information received at various space-time points. We show that S-money is more flexible than standard quantum or classical money in the sense that it can solve deterministic summoning tasks that they cannot. It requires the issuer and user to have networks of agents with classical data storage and communication, but no long-term quantum state storage, and is feasible with current technology. User privacy can be incorporated by secure bit commitment and zero-knowledge proof protocols. The level of privacy feasible in given scenarios depends on efficiency and composable security questions that remain to be systematically addressed.
Collapse
Affiliation(s)
- Adrian Kent
- Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA, UK.,Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, Ontario, Canada N2L 2Y5
| |
Collapse
|
26
|
Kent A. Summoning, No-Signalling and Relativistic Bit Commitments. Entropy (Basel) 2019; 21:e21050534. [PMID: 33267248 PMCID: PMC7515023 DOI: 10.3390/e21050534] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/22/2019] [Revised: 05/13/2019] [Accepted: 05/18/2019] [Indexed: 06/12/2023]
Abstract
Summoning is a task between two parties, Alice and Bob, with distributed networks of agents in space-time. Bob gives Alice a random quantum state, known to him but not her, at some point. She is required to return the state at some later point, belonging to a subset defined by communications received from Bob at other points. Many results about summoning, including the impossibility of unrestricted summoning tasks and the necessary conditions for specific types of summoning tasks to be possible, follow directly from the quantum no-cloning theorem and the relativistic no-superluminal-signalling principle. The impossibility of cloning devices can be derived from the impossibility of superluminal signalling and the projection postulate, together with assumptions about the devices' location-independent functioning. In this qualified sense, known summoning results follow from the causal structure of space-time and the properties of quantum measurements. Bounds on the fidelity of approximate cloning can be similarly derived. Bit commitment protocols and other cryptographic protocols based on the no-summoning theorem can thus be proven secure against some classes of post-quantum but non-signalling adversaries.
Collapse
Affiliation(s)
- Adrian Kent
- Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA, UK;
- Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, ON N2L 2Y5, Canada
| |
Collapse
|
27
|
Vergoossen T, Bedington R, Grieve JA, Ling A. Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded. Entropy (Basel) 2019; 21:E387. [PMID: 33267101 PMCID: PMC7514874 DOI: 10.3390/e21040387] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/15/2019] [Revised: 04/08/2019] [Accepted: 04/09/2019] [Indexed: 11/16/2022]
Abstract
An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e. it provides forward security and is thus attractive for secure communications. In this paper we argue that for free-space quantum communications, especially with satellites, if one assumes that man-in-the-middle attacks can be detected by classical channel monitoring techniques, simplified quantum communications protocols and hardware systems can be implemented that offer improved key rates. We term these protocols photon key distribution (PKD) to differentiate them from the standard QKD protocols. We identify three types of photon sources and calculate asymptotic secret key rates for PKD protocols and compare them to their QKD counterparts. PKD protocols use only one measurement basis which we show roughly doubles the key rates. Furthermore, with the relaxed security assumptions one can establish keys at very high losses, in contrast to QKD where at the same losses privacy amplification would make key generation impossible.
Collapse
Affiliation(s)
- Tom Vergoossen
- Centre for Quantum Technologies, National University of Singapore, Singapore 117543, Singapore
| | - Robert Bedington
- Centre for Quantum Technologies, National University of Singapore, Singapore 117543, Singapore
| | - James A. Grieve
- Centre for Quantum Technologies, National University of Singapore, Singapore 117543, Singapore
| | - Alexander Ling
- Centre for Quantum Technologies, National University of Singapore, Singapore 117543, Singapore
- Department of Physics, National University of Singapore, Singapore 117543, Singapore
| |
Collapse
|
28
|
Wengerowsky S, Joshi SK, Steinlechner F, Zichi JR, Dobrovolskiy SM, van der Molen R, Los JWN, Zwiller V, Versteegh MAM, Mura A, Calonico D, Inguscio M, Hübel H, Bo L, Scheidl T, Zeilinger A, Xuereb A, Ursin R. Entanglement distribution over a 96-km-long submarine optical fiber. Proc Natl Acad Sci U S A 2019; 116:6684-8. [PMID: 30872476 DOI: 10.1073/pnas.1818752116] [Citation(s) in RCA: 22] [Impact Index Per Article: 4.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022] Open
Abstract
Entanglement, the existence of correlations in distant systems stronger than those allowed by classical physics, is one of the most astonishing features of quantum physics. By distributing entangled photon pairs over a 96-km-long submarine fiber, which is part of existing infrastructure carrying internet traffic, we demonstrate that polarization entanglement-based quantum key distribution (QKD) can be implemented in real-world scenarios. QKD facilitates secure communication links between two parties, whereby the security is guaranteed by the basic property of quantum mechanics that the quantum state of a photon cannot be duplicated. Quantum entanglement is one of the most extraordinary effects in quantum physics, with many applications in the emerging field of quantum information science. In particular, it provides the foundation for quantum key distribution (QKD), which promises a conceptual leap in information security. Entanglement-based QKD holds great promise for future applications owing to the possibility of device-independent security and the potential of establishing global-scale quantum repeater networks. While other approaches to QKD have already reached the level of maturity required for operation in absence of typical laboratory infrastructure, comparable field demonstrations of entanglement-based QKD have not been performed so far. Here, we report on the successful distribution of polarization-entangled photon pairs between Malta and Sicily over 96 km of submarine optical telecommunications fiber. We observe around 257 photon pairs per second, with a polarization visibility above 90%. Our results show that QKD based on polarization entanglement is now indeed viable in long-distance fiber links. This field demonstration marks the longest-distance distribution of entanglement in a deployed telecommunications network and demonstrates an international submarine quantum communication channel. This opens up myriad possibilities for future experiments and technological applications using existing infrastructure.
Collapse
|
29
|
Diazdelacruz J, Martin-Delgado MA. Quantum Information Remote Carnot Engines and Voltage Transformers. Entropy (Basel) 2019; 21:E127. [PMID: 33266843 DOI: 10.3390/e21020127] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/03/2019] [Revised: 01/24/2019] [Accepted: 01/28/2019] [Indexed: 11/17/2022]
Abstract
A physical system out of thermal equilibrium is a resource for obtaining useful work when a heat bath at some temperature is available. Information Heat Engines are the devices which generalize the Szilard cylinders and make use of the celebrated Maxwell demons to this end. In this paper, we consider a thermo-chemical reservoir of electrons which can be exchanged for entropy and work. Qubits are used as messengers between electron reservoirs to implement long-range voltage transformers with neither electrical nor magnetic interactions between the primary and secondary circuits. When they are at different temperatures, the transformers work according to Carnot cycles. A generalization is carried out to consider an electrical network where quantum techniques can furnish additional security.
Collapse
|
30
|
Jo Y, Park HS, Lee SW, Son W. Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding. Entropy (Basel) 2019; 21:E80. [PMID: 33266796 DOI: 10.3390/e21010080] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/26/2018] [Revised: 01/11/2019] [Accepted: 01/14/2019] [Indexed: 11/17/2022]
Abstract
We propose a schematic setup of quantum key distribution (QKD) with an improved secret key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single photon, orbital angular momentum modes, and multi-path modes, are used to encode secret key information. Its practical implementation consists of optical elements that are within the reach of current technologies such as a multiport interferometer. We show that the proposed feasible protocol has improved the secret key rate with much sophistication compared to the previous 2-dimensional protocol known as the detector-device-independent QKD.
Collapse
|
31
|
Zhong H, Wang Y, Wang X, Liao Q, Wu X, Guo Y. Enhancing of Self-Referenced Continuous-Variable Quantum Key Distribution with Virtual Photon Subtraction. Entropy (Basel) 2018; 20:E578. [PMID: 33265667 DOI: 10.3390/e20080578] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/28/2018] [Revised: 07/26/2018] [Accepted: 08/02/2018] [Indexed: 11/30/2022]
Abstract
The scheme of the self-referenced continuous-variable quantum key distribution (SR CV-QKD) has been experimentally demonstrated. However, because of the finite dynamics of Alice’s amplitude modulator, there will be an extra excess noise that is proportional to the amplitude of the reference pulse, while the maximal transmission distance of this scheme is positively correlated with the amplitude of the reference pulse. Therefore, there is a trade-off between the maximal transmission distance and the amplitude of the reference pulse. In this paper, we propose the scheme of SR CV-QKD with virtual photon subtraction, which not only has no need for the use of a high intensity reference pulse to improve the maximal transmission distance, but also has no demand of adding complex physical operations to the original self-referenced scheme. Compared to the original scheme, our simulation results show that a considerable extension of the maximal transmission distance can be obtained when using a weak reference pulse, especially for one-photon subtraction. We also find that our scheme is sensible with the detector’s electronic noise at reception. A longer maximal transmission distance can be achieved for lower electronic noise. Moreover, our scheme has a better toleration of excess noise compared to the original self-referenced scheme, which implies the advantage of using virtual photon subtraction to increase the maximal tolerable excess noise for distant users. These results suggest that our scheme can make the SR CV-QKD from the laboratory possible for practical metropolitan area application.
Collapse
|
32
|
Sasaki M, Endo H, Fujiwara M, Kitamura M, Ito T, Shimizu R, Toyoshima M. Quantum photonic network and physical layer security. Philos Trans A Math Phys Eng Sci 2017; 375:rsta.2016.0243. [PMID: 28652495 PMCID: PMC5487718 DOI: 10.1098/rsta.2016.0243] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 10/05/2016] [Indexed: 06/07/2023]
Abstract
Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel.This article is part of the themed issue 'Quantum technology for the 21st century'.
Collapse
Affiliation(s)
- Masahide Sasaki
- Quantum ICT Advanced Development Center, National Institute of Information and Communications Technology, 4-2-1, Nukuikitamachi, Koganei, Tokyo 184-8795, Japan
| | - Hiroyuki Endo
- Quantum ICT Advanced Development Center, National Institute of Information and Communications Technology, 4-2-1, Nukuikitamachi, Koganei, Tokyo 184-8795, Japan
| | - Mikio Fujiwara
- Quantum ICT Advanced Development Center, National Institute of Information and Communications Technology, 4-2-1, Nukuikitamachi, Koganei, Tokyo 184-8795, Japan
| | - Mitsuo Kitamura
- Quantum ICT Advanced Development Center, National Institute of Information and Communications Technology, 4-2-1, Nukuikitamachi, Koganei, Tokyo 184-8795, Japan
| | - Toshiyuki Ito
- Quantum ICT Advanced Development Center, National Institute of Information and Communications Technology, 4-2-1, Nukuikitamachi, Koganei, Tokyo 184-8795, Japan
| | - Ryosuke Shimizu
- Graduate School of Informatics and Engineering, The University of Electro-Communications, 1-5-1 Chofugaoka, Chofu, Tokyo 182-8585, Japan
| | - Morio Toyoshima
- Space Communications Laboratory, National Institute of Information and Communications Technology, 4-2-1, Nukuikitamachi, Koganei, Tokyo 184-8795, Japan
| |
Collapse
|