This poster session takes place on Thu, 26 Aug, 11:00 - 13:00 on meetanyway.
Click link for instructions for authors of accepted posters
Download a zip-archive of all posters.
Posters presented in this session
- Classically Verifiable (Dual-Mode) NIZK for QMA with PreprocessingTomoyuki Morimae (Kyoto University); Takashi Yamakawa (NTT)[abstract]Abstract: We propose three constructions of classically verifiable non-interactive proofs (CV-NIP) and non-interactive zero-knowledge proofs and arguments (CV-NIZK) for QMA in various preprocessing models.Poster presented by: Tomoyuki Morimae
- Bell nonlocality is not sufficient for the security of standard device-independent quantum key distribution protocolsMáté Farkas (ICFO); Maria Balanzó-Juandó (ICFO); Karol Łukanowski (University of Warsaw); Jan Kołodyński (University of Warsaw); Antonio Acín (ICFO)[abstract]Abstract: Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key, while putting minimal trust in their devices. Most of the existing protocols have the following structure: First, a bipartite nonlocal quantum state is distributed between the honest users, who perform local projective measurements to establish nonlocal correlations. Then, they announce the implemented measurements and extract a secure key by post-processing their measurement outcomes. We show that no protocol of this form allows for establishing a secret key when implemented on certain entangled nonlocal states, namely on a range of entangled two-qubit Werner states. To prove this result, we introduce a technique for upper-bounding the asymptotic key rate of device-independent quantum key distribution protocols, based on a simple eavesdropping attack. Our results imply that either different tools---such as different reconciliation techniques or non-projective measurements---are needed for device-independent quantum key distribution in the large-noise regime, or Bell nonlocality is not sufficient for this task.
- Certified Quantum Random Numbers from Untrusted LightDavid Drahi (University of Oxford); Nathan Walk (Freie Universität); Matty J Hoban (Goldsmiths, University of London); Aleksey K Federov (Russian Quantum Center); Roman Shakhovoy (Russian Quantum Center); Yury Kurochkin (Russian Quantum Center); Akky Feimov (Russian Quantum Center); W Steven Kolthammer (Imperial College); Joshua Nunn (University of Bath); Jonathan Barrett (University of Oxford); Ian A Walmsley (Imperial College)[abstract]Abstract: A remarkable aspect of quantum theory is that certain measurement outcomes are entirely unpredictable to all possible observers. Such quantum events can be harnessed to generate numbers whose randomness is asserted based upon the underlying physical processes. We formally introduce, design, and experimentally demonstrate an ultrafast optical quantum random number generator that uses a totally untrusted photonic source. While considering completely general quantum attacks and using dedicated FPGA hardware for post-processing, we certify and generate in real time random numbers at a rate of 8.05 Gb/s with a composable security parameter of 10^{−10}. Composable security is the most stringent and useful security paradigm because any given protocol remains secure even if arbitrarily combined with other instances of the same, or other, protocols, thereby allowing the generated randomness to be utilized for arbitrary applications in cryptography and beyond. This work achieves the fastest generation of composably secure quantum random numbers ever reported.
- A model for optimizing quantum key distribution with continuous-wave-pumped entangled-photon sourcesSebastian Philipp Neumann (IQOQI Vienna, Austria); Thomas Scheidl (IQOQI Vienna, Austria); Mirela Selimovic (IQOQI Vienna, Austria); Matej Pivoluska (IQOQI Vienna, Austria); Bo Liu (College of Advanced Interdisciplinary Studies, NUDT, Changsha, China); Martin Bohmann (IQOQI Vienna, Austria); Rupert Ursin (IQOQI Vienna, Austria)[abstract]Abstract: Quantum Key Distribution (QKD) allows unconditionally secure communication based on the laws of quantum mechanics rather then assumptions about computational hardness. Optimizing the operation parameters of a given QKD implementation is indispensable in order to achieve high secure key rates. So far, there exists no model that accurately describes entanglement-based QKD with continuous-wave pump lasers. For the first time, we analyze the underlying mechanisms for QKD with temporally uniform pair-creation probabilities and develop a simple but accurate model to calculate optimal trade-offs for maximal secure key rates. In particular, we find an optimization strategy of the source brightness for given losses and detection-time resolution. All experimental parameters utilized by the model can be inferred directly in standard QKD implementations, and no additional assessment of device performance is required. Comparison with experimental data shows the validity of our model. Our results yield a tool to determine optimal operation parameters for already existing QKD systems, to plan a full QKD implementation from scratch, and to determine fundamental key rate and distance limits of given connections.
- A Cryptographic approach to Quantum MetrologyNathan Shettell (LIP6); Elham Kashefi (LIP6); Damian Markham (LIP6)[abstract]Abstract: We derive a general framework for a quantum metrology scheme where the quantum probes are exchanged via an unsecured quantum channel. We construct two protocols for this task which offer a trade-off between difficulty of implementation and efficiency. We show that, for both protocols, a malicious eavesdropper cannot access any information regarding the unknown parameter. We further derive general inequalities regarding how the uncertainty in a resource state for quantum metrology can bias the estimate and the precision. From this, we link the effectiveness of the cryptographic part of the protocol to the effectiveness of the metrology scheme with a (potentially) malicious probe resource state.
- Remote synchronization of multiple ultrafast multi-channel time taggersTorsten Langer (PicoQuant GmbH); Tino Roehlicke (PicoQuant GmbH); Maximilian Diedrich (PicoQuant GmbH); Max Tillmann (PicoQuant GmbH); Michael Wahl (PicoQuant GmbH)[abstract]Abstract: Time-Correlated Single Photon Counting (TCSPC) and continuous time tagging of photon arrival times are very powerful tools in many areas of applied physics [1]. In optical quantum science, they are widely used for the characterization of non-classical light emitters and the detection of coincident photon arrival events. In light of the recent quantum technology initiatives, these timing devices play a central role as crucial technological building blocks. Here, we present a new scalable concept of multi-channel event timers with up to 64 channels, 5 ps digital resolution and accurate long-distance synchronization capabilities using the White Rabbit fiber network protocol [2]. We demonstrate a relative timing precision of about 40 ps to 50 ps r.m.s. over several kilometers distance in network topologies of different complexity and with different fiber lengths, with and without additional network traffic. One set of results measuring across 5 different devices in a simple star-topology using one White Rabbit switch is shown in Fig. 1 as an example. The new event timers have an extremely short dead time of <650 ps, which keeps up with the quick progress of development in the area of superconducting nanowires and other single photon detectors with short recovery times. The event timers feature two data interfaces to the host: a USB interface and a low-latency interface to external FPGAs, on which custom algorithms for real-time data processing can be implemented. In particular, the FPGA interface is presently being employed in a demonstrator of a high speed QKD system as part of the QuPAD project, funded by the German Federal Ministry of Eduaction and research, contract number 13N14953. The new design also provides several valuable features such as adjustable timing offsets for each input channel at full resolution, four external marker inputs for imaging and other synchronization tasks, as well as in/outputs for hardware driven experiment control, as established in various trendsetting instruments developed earlier [3-4]. References [1] P. Kapusta, M. Wahl, and R. Erdmann (eds.), Advanced Photon Counting - Applications, Methods, Instrumentation, (Springer International Publishing, 2015) [2] J. Serrano, P. Alvarez, M. Cattin, E. G. Cota, P. M. J. H. Lewis, T. Włostowski et al., "The White Rabbit Project", Proc. ICALEPCS TUC004, Kobe, Japan (2009). [3] M. Wahl, T. Roehlicke, S. Kulisch, S. Rohilla, B. Kraemer and A.C. Hocke, "Photon arrival time tagging with many channels, sub-nanosecond deadtime, very high throughput, and fiber optic remote synchronization", Rev. Sci. Instrum. 91, 013108 (2020). [4] M. Wahl, H.-J. Rahn, T. Roehlicke, R. Erdmann, G. Kell, A. Ahlrichs, M. Kernbach, A.W. Schell, and O. Benson, "Integrated multichannel photon timing instrument with very short dead time and high throughput ", Rev. Sci. Instrum. 84, 043102 (2013).Poster presented by: Torsten Langer
- Finite-key analysis of loss-tolerant quantum key distribution based on random sampling theoryGuillermo Currás-Lorenzo (University of Leeds); Álvaro Navarrete (University of Vigo); Margarida Pereira (University of Vigo); Kiyoshi Tamaki (University of Toyama)[abstract]Abstract: The core of security proofs of quantum key distribution (QKD) is the estimation of a parameter that determines the amount of privacy amplification that the users need to apply in order to distil a secret key. To estimate this parameter using the observed data, one needs to apply concentration inequalities, such as random sampling theory or Azuma’s inequality. The latter can be straightforwardly employed in a wider class of QKD protocols, including those that do not rely on mutually unbiased encoding bases, such as the loss-tolerant (LT) protocol. However, when applied to real-life finite-length QKD experiments, Azuma’s inequality typically results in substantially lower secret-key rates. Here, we propose an alternative security analysis of the LT protocol against general attacks, for both its prepare-and-measure and measure-device-independent versions, that is based on random sampling theory. Consequently, our security proof provides considerably higher secret-key rates than the previous finite-key analysis based on Azuma’s inequality. This work opens up the possibility of using random sampling theory to provide alternative security proofs for other QKD protocols.
- An integrated heterogeneous superconducting–silicon-photonic platform for measurement-device-independent quantum key distributionXiaodong Zheng (Nanjing University); Peiyu Zhang (Nanjing University); Renyou Ge (Sun Yat-sen University); Liangliang Lu (Nanjing University); Guanglong He (Nanjing University); Qi Chen (Nanjing University); Fangchao Qu (Nanjing University); Labao Zhang (Nanjing University); Xinlun Cai (Sun Yat-sen University); Yanqing Lu (Nanjing University); Shining Zhu (Nanjing University); Peiheng Wu (Nanjing University); Xiao-Song Ma (Nanjing University)[abstract]Abstract: Integrated photonics provides a route both to miniaturize quantum key distribution (QKD) devices and to enhance their performance. A key element for discrete-variable QKD is single-photon detector. It is necessary to integrate such device onto a photonic chip to enable the realization of practical and scalable quantum networks. Here, we report a successful interfacing of Complementary Metal-Oxide-Semiconductor (CMOS)-compatible silicon nanophotonics with optical waveguide-integrated superconducting nanowire single-photon detector (SNSPD). We perform the first optimal Bell-state measurement (BSM) of time-bin encoded qubits generated from two independent lasers benefited from the reduced dead time of SNSPD ∼3.4 ns. The optimal BSM enables an increased key rate of measurement-device-independent QKD, which is immune to all attacks against the detection system and hence provides the basis for a QKD network with untrusted relays. Together with the time-multiplexed technique, we have enhanced the sifted key rate by almost one order of magnitude. Combined with integrated QKD transmitters, a scalable, chip-based and cost-effective QKD network should become realizable in the near future.Poster presented by: Xiaodong Zheng
- A simple low-latency real-time certifiable quantum random number generatorYanbao Zhang (NTT Basic Research Lab); Hsin-Pin Lo (NTT Basic Research Lab); Alan Mink (NIST); Takuya Ikuta (NTT Basic Research Lab); Toshimori Honjo (NTT Basic Research Lab); Hiroki Takesue (NTT Basic Research Lab); William J. Munro (NTT Basic Research Lab)[abstract]Abstract: Quantum random numbers distinguish themselves from others by their intrinsic unpredictability arising from the principles of quantum mechanics. As such they are extremely useful in many scientific and real-world applications with considerable efforts going into their realizations. Most demonstrations focus on high asymptotic generation rates. For this goal, a large number of repeated trials are required to accumulate a significant store of certifiable randomness, resulting in a high latency between the initial request and the delivery of the requested random bits. Here we demonstrate low-latency real-time certifiable quantum randomness generation from measurements on photonic time-bin states. For this, we develop methods to efficiently certify randomness taking into account adversarial imperfections in both the state preparation and the measurement apparatus. Every 0.12 seconds we generate a block of 8192 random bits which are certified against all quantum adversaries with an error bounded by 2^{-64}. Our quantum random number generator is thus well suited for realizing a continuously operating, high-security, and high-speed quantum randomness beacon.Poster presented by: Yanbao Zhang
- Impossibility of composable Oblivious Transfer in relativistic quantum cryptographyLorenzo Laneve (Department of Computer Science, ETH Zurich); Lidia del Rio (Institute for Theoretical Physics, ETH Zurich)[abstract]Abstract: We prove impossibility of composable oblivious transfer in relativistic and quantum settings, and provide constructions between different versions of oblivious transfer and bit commitment. We do so in the abstract cryptography framework, with cryptographic resources instantiated as causal boxes in Minkowski space. This paper can be seen as an application of Vilasini et al’s approach to other cryptographic primitives.Poster presented by: Lorenzo Laneve
- QEnclave - A composable treatment of quantum trusted execution environmentsYao Ma (LIP6, Sorbonne Université and VeriQloud); Elham Kashefi (LIP6, Sorbonne Université and School of Informatics, University of Edinburgh); Myrto Arapinis (School of Informatics, University of Edinburgh); Kaushik Chakraborty (School of Informatics, University of Edinburgh); Marc Kaplan (VeriQloud)[abstract]Abstract: We introduce a secure hardware device named a QEnclave that can secure the remote execution of quantum operations while only using classical controls. This device extends to quantum computing the classical concept of a secure enclave which isolates a computation from its environment to provide privacy and tamper-resistance. Remarkably, our QEnclave only performs single-qubit rotations, but can nevertheless be used to secure an arbitrary quantum computation even if the qubit source is controlled by an adversary. More precisely, attaching a QEnclave to a quantum computer, a remote client controlling the QEnclave can securely delegate its computation to the server solely using classical communication. We investigate the security of our QEnclave by modeling it as an ideal functionality named Remote State Rotation. We show that this resource allows blind delegated quantum computing with perfect security. Our proof relies on standard tools from delegated quantum computing. Working in the Abstract Cryptography framework, we show a construction of remote state preparation from remote state rotation preserving the security. An immediate consequence is the weakening of the requirements for blind delegated computation. While previous delegated protocols were relying on a client that can either generate or measure quantum states, we show that this same functionality can be achieved with a client that only transforms quantum states without generating or measuring them. Combined with known impossibility results for implementing remote state preparation with classical communication, our construction suggests a new way for blind secure delegated computation. Computational assumptions that circumvent this impossibility induce large overheads that prevent their practical use. But our approach does not increase the complexity of the problem, and relies on hardware assumptions that are already used in practice for classical computations. It hence provides a better way of implementing blind remote delegation on real quantum computing systems.
- Quantum Secure Direct Communication with Mutual Authentication using a Single BasisNayana Das` (Indian Statistical Institute, Kolkata); Goutam Paul (Indian Statistical Institute, Kolkata); Ritajit Majumdar (Indian Statistical Institute, Kolkata)[abstract]Abstract: In this paper, we propose a new theoretical scheme for quantum secure direct communication (QSDC) with user authentication. Different from the previous QSDC protocols, the present protocol uses only one orthogonal basis of single-qubit states to encode the secret message. Moreover, this is a one-time and one-way communication protocol, which uses qubits prepared in a randomly chosen arbitrary basis, to transmit the secret message. We discuss the security of the proposed protocol against some common attacks and show that no eavesdropper can get any information from the quantum and classical channels. We have also studied the performance of this protocol under realistic device noise. We have executed the protocol in the IBMQ Armonk device and proposed a repetition code-based protection scheme that requires minimal overhead.Poster presented by: Nayana Das
- Multi-photon and side-channel attacks in mistrustful quantum cryptographyMathieu Bozzio (University of Vienna); Adrien Cavailles (Sorbonne Université); Eleni Diamanti (Sorbonne Université); Adrian Kent (University of Cambridge); Damián Pitalúa-García (University of Cambridge)[abstract]Abstract: Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens. Practical quantum implementations presently use photonic setups. In many such implementations, Alice sends photon pulses encoding quantum states and Bob chooses measurements on these states. In practice, Bob generally uses single photon threshold detectors, which cannot distinguish the number of photons in detected pulses. Also, losses and other imperfections require Bob to report the detected pulses. Thus, malicious Alice can send and track multi-photon pulses and thereby gain information about Bob's measurement choices, violating the protocols' security. Here, we provide a theoretical framework for analysing such multi-photon attacks, and present known and new attacks. We illustrate the power of these attacks with an experiment, and study their application to earlier experimental demonstrations of mistrustful quantum cryptography. We analyse countermeasures based on selective reporting and prove them inadequate. We also discuss side-channel attacks where Alice controls further degrees of freedom or sends other physical systems.
- Imperfect quantum oblivious transfer with one-sided securityDavid Reichmuth (IPaQS, Heriot-Watt University, Edinburgh, UK); Ittoop V. Puthoor (IPaQS, Heriot-Watt University, Edinburgh, UK); Petros Wallden (School of Informatics, University of Edinburgh, Edinburgh, UK); Erika Andersson (IPaQS, Heriot-Watt University, Edinburgh, UK)[abstract]Abstract: Oblivious transfer (OT) is a cryptographic primitive which is universal for multiparty computation. Unfortunately, perfect information-theoretically (IT) secure quantum oblivious transfer is impossible (except with restrictions on cheating parties). Imperfect IT secure quantum oblivious transfer remains possible, but the smallest possible cheating probabilities are not known. Informally, in 1-out-of-2 oblivious transfer, a sender Alice has two bits x0, x1. A receiver Bob obtains one of these, xb, where b= 0 or b= 1. Alice should not be able to guess b, and Bob should not be able to guess the bit value he did not obtain. Bounds on cheating probabilities in quantum oblivious transfer have previously been investigated for complete protocols. “Complete” means that if sender Alice and receiver Bob both follow the protocol, the bit value Bob obtains correctly matches Alice’s bit value. Here we instead investigate incomplete protocols, where Bob obtains an incorrect bit value with probability pf. For complete protocols, both “classical” and quantum, it holds that if one party can cheat no better than with a random guess, then the other party can cheat perfectly. For incomplete protocols, in contrast, even with no restrictions on cheating parties, and when one party can cheat no better than with random guess, it is possible that the other party still cannot cheat perfectly; their cheating probability can be lower than in complete protocols. We find the optimal non-interactive protocols where Alice’s bit values are represented by four symmetric pure quantum states, and where Alice cannot cheat better than with a random guess. “Optimal” means that for a given pf, Bob’s cheating probability pr is as low as possible, and vice versa. We also show that quantum protocols can outperform classical non-interactive protocols. Our results also provide a lower bound on Bob’s cheating probability in interactive quantum protocols. An advantage of the non-interactive protocols we investigate is that they require neither entanglement nor quantum memory. The optimal protocols could be readily implemented using standard optical components.
- Quantum Computing Chip with Error-Correction EncodingLingxiao Wan (Nanyang Technological University); Hui Zhang (Nanyang Technological University); Stefano Paesani (University of Bristol); Huihui Zhu (Nanyang Technological University); Bo Wang (Nanyang Technological University); Anthony Laing (University of Bristol); Leong Chuan Kwek (National University of Singapore); Ai-Qun Liu (Nanyang Technological University)[abstract]Abstract: We design and fabricate a quantum photonic circuit to generate a 4-qubit state to load single qubit information and implement a quantum error correction code to demonstrate its capability of detecting and correcting a single-bit error. The encoded quantum information can be reconstructed from different types of errors and achieve an average state fidelity of 86%. We further extend the scheme to demonstrate fault-tolerant measurement-based quantum computing that allows us to redo the qubit operation against the failure of the teleportation process.Poster presented by: Lingxiao Wan
- A Boson Sampling Chip for Graph Perfect MatchingLingxiao Wan (Nanyang Technological University); Zhu Huihui (Nanyang Technological University); Bo Wang (Nanyang Technological University); Hui Zhang (Nanyang Technological University); Leong Chuan Kwek (National University of Singapore); Ai-Qun Liu (Nanyang Technological University)[abstract]Abstract: We map the perfect matching problem in graph theory to a reconfigurable GBS model with the connection of the Hafnian of a matrix. We configure the linear optical circuit and squeeze parameter of the GBS model according to the decomposed unitary matrix and diagonal matrix of the graph’s adjacency matrix. The perfect matching numbers can be directly acquired from the 4-photon coincidence counts with a distribution similarity of 0.9304.Poster presented by: Lingxiao Wan
- Fast and Simple One-Way High-Dimensional Quantum Key DistributionKfir Sulimany (The Hebrew University of Jerusalem); Rom Dudkiewicz (The Hebrew University of Jerusalem); Simcha Korenblit (The Hebrew University of Jerusalem); Hagai S. Eisenberg (The Hebrew University of Jerusalem); Yaron Bromberg (The Hebrew University of Jerusalem); Michael Ben-Or (The Hebrew University of Jerusalem)[abstract]Abstract: High-dimensional quantum key distribution (QKD) provides ultimate secure communication with secure key rates that cannot be obtained by QKD protocols with binary encoding. However, so far the proposed protocols required additional experimental resources, thus raising the cost of practical high-dimensional systems and limiting their use. Here, we analyze and demonstrate a novel scheme for fiber-based arbitrary-dimensional QKD, based on the most popular commercial hardware for binary time bins encoding. Quantum state transmission is tested over 40 km channel length of standard single-mode fiber, exhibiting a two-fold enhancement of the secret key rate in comparison to the binary Coherent One Way (COW) protocol, without introducing any hardware modifications. This work holds a great potential to enhance the performance of already installed QKD systems by software update alone.Poster presented by: Fast and Simple One-Way High-Dimensional Quantum Key Distribution
- Noise-Tolerant Quantum Tokens for MACAmit Behera (Ben-Gurion University); Or Sattath (Ben-Gurion University); Uriel Shinar (Ben-Gurion University)[abstract]Abstract: Message Authentication Code or MAC, is a well-studied cryptographic primitive that is used in order to authenticate communication between two parties sharing a secret key. A Tokenized MAC or TMAC is a related cryptographic primitive, introduced by Ben-David & Sattath (QCrypt'17) which allows to delegate limited signing authority to third parties via the use of single-use quantum signing tokens. These tokens can be issued using the secret key, such that each token can be used to sign at most one document. We provide an elementary construction for TMAC based on BB84 states. Our construction can tolerate up to 14% noise, making it the first noise-tolerant TMAC construction. The simplicity of the quantum states required for our construction combined with the noise-tolerance, makes it practically more feasible than the previous TMAC construction. The TMAC is existentially unforgeable against adversaries with signing and verification oracles (i.e., analogous to EUF-CMA security for MAC), assuming post-quantum collision-resistant hash functions exist.
- Quantum magic rectangles: Characterization and application to certified randomness expansionSean Adamson (University of Edinburgh); Petros Wallden (University of Edinburgh)[abstract]Abstract: We study a generalization of the Mermin–Peres magic square game to arbitrary rectangular dimensions. After exhibiting some general properties, these rectangular games are fully characterized in terms of their optimal win probabilities for quantum strategies. We find that for $m \times n$ rectangular games of dimensions $m,n \geq 3$, there are quantum strategies that win with certainty, while for dimensions $1 \times n$ quantum strategies do not outperform classical strategies. The final case of dimensions $2 \times n$ is richer, and we give upper and lower bounds that both outperform the classical strategies. Finally, we apply our findings to quantum certified randomness expansion to find the noise tolerance and rates for all magic rectangle games. To do this, we use our previous results to obtain the winning probability of games with a distinguished input for which the devices give a deterministic outcome and follow the analysis of C. A. Miller and Y. Shi (2017).
- Practical Semi-Device Independent Randomness Generation Based on Quantum State's IndistinguishabilityHamid Tebyanian (University of Padova); Mujtaba Zahidy (University of Padova); Marco Avesani (University of Padova); Andrea Stanco (University of Padova); Paolo Villoresi (University of Padova); Giuseppe Vallone (University of Padova)[abstract]Abstract: Semi-device independent (Semi-DI) quantum random number generators (QRNG) gained attention for security applications, offering an excellent trade-off between security and generation rate. This paper presents a proof-of-principle time-bin encoding semi-DI QRNG experiments based on a prepare-and-measure scheme. The protocol requires two simple assumptions and a measurable condition: an upper-bound on the prepared pulses' energy. We lower-bound the conditional min-entropy from the energy-bound and the input-output correlation, determining the amount of genuine randomness that can be certified. Moreover, we present a generalized optimization problem for bounding the min-entropy in the case of multiple input and outcomes, in the form of a semidefinite program (SDP). The protocol is tested with a simple experimental setup, capable of realizing two configurations for the ternary time-bin encoding scheme. The experimental setup is easy-to-implement and comprises commercially available off-the-shelf (COTS) components at the telecom wavelength, granting a secure and certifiable entropy source. The combination of ease-of-implementation, scalability, high security level and output-entropy, make our system a promising candidate for commercial QRNGs.Poster presented by: Hamid Tebyanian
- The “quantum annoying” property of password-authenticated key exchange protocolsEdward Eaton (University of Waterloo); Douglas Stebila (University of Waterloo)[abstract]Abstract: During the Crypto Forum Research Group (CFRG)'s standardization of password-authenticated key exchange (PAKE) protocols, a novel property emerged: a PAKE scheme is said to be ``quantum-annoying'' if a quantum computer can compromise the security of the scheme, but only by solving one discrete logarithm for each guess of a password. Considering that early quantum computers will likely take quite long to solve even a single discrete logarithm, a quantum-annoying PAKE, combined with a large password space, could delay the need for a post-quantum replacement by years, or even decades. In this paper, we make the first steps towards formalizing the quantum-annoying property. We consider a classical adversary in an extension of the generic group model in which the adversary has access to an oracle that solves discrete logarithms. While this idealized model does not fully capture the range of operations available to an adversary with a general-purpose quantum computer, this model does allow us to quantify security in terms of the number of discrete logarithms solved. We apply this approach to the CPace protocol, a balanced PAKE advancing through the CFRG standardization process, and show that the CPaceBase variant is secure in the generic group model with a discrete logarithm oracle.
- Quantum key distribution over quantum repeaters with encodingYumang Jing (University of Leeds); Mohsen Razavi (University of Leeds)[abstract]Abstract: We study the implementation of quantum-key-distribution (QKD) systems over quantum-repeater infrastructures. We particularly consider quantum repeaters with encoding and compare them with probabilistic quantum repeaters. To that end, we propose two decoder structures for encoded repeaters that not only improve system performance but also make the implementation aspects easier by removing two-qubit gates from the QKD decoder. By developing several scalable numerical and analytical techniques, we then identify the resilience of the setup to various sources of error in gates, measurement modules, and initialization of the setup. We apply our techniques to three- and five-qubit repetition codes and obtain the normalized secret key generation rate per memory per second for encoded and probabilistic quantum repeaters. We quantify the regimes of operation, where one class of repeater outperforms the other, and find that there are feasible regimes of operation where encoded repeaters—based on simple three-qubit repetition codes—could offer practical advantages.
- Metrology for Quantum Communication: results and perspectives in the context of the EURAMET European Metrology Network for Quantum TechnologiesMarco Gramegna (INRIM | EMN-Q); Ivo Pietro Degiovanni (INRIM Istituto Nazionale di Ricerca Metrologica)[abstract]Abstract: The second quantum revolution is underway and the deployment of Quantum Technologies (QT) keeps pace with it. This technological paradigm-switch creates opportunities and challenges for industry, innovation and society. Several large companies, as well as start-ups, have started to develop and engineer quantum devices or begun to integrate them into their products: the commercial success of QT, together with progress in research and development, relies on certification and reliability built upon internationally agreed standards and metrological traceability. In this scenario, a group of European National Metrology Institutes (NMIs) and Delegated Institutes (DIs) have recently created a European Metrology Network for Quantum Technologies (EMN-Q) under the auspices of EURAMET, the European association of NMIs and the regional metrology organisation (RMO) of Europe. In this talk, a short overview of the EMN-Q organization will be provided, together with a report about the current status of the Strategic Research Agenda and on the Technological Roadmaps. Afterwards, the discussion will be focused on QKD and how the EMN-Q has started to answer to the metrology needs of the QKD community.
- A Unified Framework For Quantum UnforgeabilityMina Doosti (University of Edinburgh); Mahshid Delavar (University of Edinburgh); Elham Kashefi (University of Edinburgh, CNRS, Sorbonne University); Myrto Arapinis (University of Edinburgh)[abstract]Abstract: In this paper, we continue the line of work initiated by Boneh and Zhandry at CRYPTO 2013 and EUROCRYPT 2013 in which they formally define the notion of unforgeability against quantum adversaries. We develop a general and parameterised quantum game-based security model unifying unforgeability for both classical and quantum constructions allowing us for the first time to present a complete quantum cryptanalysis framework for unforgeability. In particular, we prove how our definitions subsume previous ones while considering more fine-grained adversarial models, capturing the full spectrum of superposition attacks. The subtlety here resides in the characterisation of a forgery. We show that the strongest level of unforgeability in our framework, namely existential unforgeability, can only be achieved if only orthogonal to previously queried messages are considered to be forgeries. We further show that deterministic constructions can only achieve the weaker notion of unforgeability, that is selective unforgeability, against such adversaries, but that selective unforgeability breaks if more general quantum adversaries (capable of general superposition attacks) are considered. On the other hand, we show that PRF is sufficient for constructing a selective unforgeable classical primitive against full quantum adversaries. Moreover, we show similar positive results relying on Pseudorandom Unitaries (PRU) for quantum primitives. \\ These results demonstrate the generality of our framework that could be applicable to other primitives beyond the cases analysed in this paper.
- Catalytic EntanglementTulja Varun Kondra (Centre for Quantum Optical Technologies, Centre of New Technologies, University of Warsaw); Chandan Datta (Centre for Quantum Optical Technologies, Centre of New Technologies, University of Warsaw); Alexander Streltsov (Centre for Quantum Optical Technologies, Centre of New Technologies, University of Warsaw)[abstract]Abstract: Quantum entanglement of pure states is usually quantified via the entanglement entropy, the von Neumann entropy of the reduced state. Entanglement entropy is closely related to entanglement distillation, a process for converting quantum states into singlets, which can then be used for various quantum technological tasks. The relation between entanglement entropy and entanglement distillation has been known only for the asymptotic setting, and the meaning of entanglement entropy in the single- copy regime has so far remained open. Here we close this gap by considering entanglement catalysis. We prove that entanglement entropy completely characterizes state transformations in the presence of entangled catalysts. Our results suggest that catalysis is useful for a broad range of quantum information protocols, giving asymptotic results an operational meaning also in the single-copy setup.
- Limitations on Uncloneable Encryption and Simultaneous One-Way-to-HidingChristian Majenz (CWI, QuSoft); Christian Schaffner (University of Amsterdam, QuSoft); Mehrdad Tahmasbi (University of Amsterdam, QuSoft)[abstract]Abstract: We study uncloneable quantum encryption schemes for classical messages as recently proposed by Broadbent and Lord. We focus on the information-theoretic setting and give several limitations on the structure and security of these schemes: Concretely, 1) We give an explicit cloning-indistinguishable attack that succeeds with probability 12+μ/16 where μ is related to the largest eigenvalue of the resulting quantum ciphertexts. 2) The *simultaneous* one-way-to-hiding (O2H) lemma is an important technique in recent works on uncloneable encryption and quantum copy protection. We give an explicit example which shatters the hope of reducing the multiplicative "security loss" constant in this lemma to below 9/8. 3) For a uniform message distribution, we partially characterize the scheme with the minimal success probability for cloning attacks. 4) Under natural symmetry conditions, we prove that the rank of the ciphertext density operators has to grow at least logarithmically in the number of messages to ensure uncloneable security.
- A resource-effective QKD field-trial in Padua with the iPOGNAC encoderMarco Avesani (Università degli Studi di Padova); Luca Calderaro (Università degli Studi di Padova); Giulio Foletto (Università degli Studi di Padova); Costantino Agnesi (Università degli Studi di Padova); Francesco Picciariello (Università degli Studi di Padova); Francesco Santagiustina (Università degli Studi di Padova); Alessia Scriminich (Università degli Studi di Padova); Andrea Stanco (Università degli Studi di Padova); Francesco Vedovato (Università degli Studi di Padova); Mujtaba Zahidy (Università degli Studi di Padova); Giuseppe Vallone (Università degli Studi di Padova); Paolo Villoresi (Università degli Studi di Padova)[abstract]Abstract: We describe a QKD field trial running on urban fibers deployed in Padua, Italy. This is the first validation outside of the laboratory environment of a new low-error and calibration-free polarization encoder, called iPOGNAC, which we also present here. Our system is resource- and cost-effective, and can be installed quickly in an existing fiber network.Poster presented by: Giulio Foletto
- Education aspects to create QKD industryYury Kurochkin (Russian Quantum Center); Vadim Rodimin (QRate); Vladimir Kurochkin (National University of Science and Technology MISiS); Evgeniy Krivoshein (QRate)[abstract]Abstract: QKD is an emerging industry. Numbers of forecasts indicate rapid growth making it more and more affordable not only to large companies also with the use of service models. At the same time information security is very conservative industry. Digital information security specialists usually do not study quantum mechanics and it cause sense of magic dealing with QKD. The only way to close this gap is education. Most available education solutions focus its efforts on theoretical explanation. Meanwhile if we look at education of telecommunication industry specialists there are a lot of workshops dealing with signal processing equipment. In this work we want to share our experience of creating new competence on World Skills specialists competition. We believe that explanation of QKD via workshops where students can touch by hands optics, electronics and software can change specialist perception from magic to telecommunication equipment.
- Fading channel estimation for free-space continuous-variable secure quantum communicationLászló Ruppert (Palacky University Olomouc); Christian Peuntinger (Max-Planck-Institut für die Physik des Lichts); Bettina Heim (Max-Planck-Institut für die Physik des Lichts); Kevin Günthner (Max-Planck-Institut für die Physik des Lichts); Vladyslav C. Usenko (Palacky University Olomouc); Dominique Elser (Max-Planck-Institut für die Physik des Lichts); Gerd Leuchs (Max-Planck-Institut für die Physik des Lichts); Radim Filip (Palacky University Olomouc); Christoph Marquardt (Max-Planck-Institut für die Physik des Lichts)[abstract]Abstract: We investigate estimation of fluctuating channels and its effect on security of continuous-variable quantum key distribution. We propose a novel estimation scheme which is based on the clusterization of the estimated transmittance data. We show that uncertainty about whether the transmittance is fixed or not results in a lower key rate. However, if the total number of measurements is large, one can obtain using our method a key rate similar to the non-fluctuating channel even for highly fluctuating channels. We also verify our theoretical assumptions using experimental data from an atmospheric quantum channel. Our method is therefore promising for secure quantum communication over strongly fluctuating turbulent atmospheric channels.
- Fully device-independent quantum key distribution using synchronous correlationsNishant Rodrigues (University of Maryland); Brad Lackey (Microsoft Quantum)[abstract]Abstract: We derive a device-independent quantum key distribution protocol based on synchronous correlations and their Bell inequalities. This protocol offers several advantages over other device-independent schemes including symmetry between the two users and no need for preshared randomness. We close a "synchronicity" loophole by showing an almost synchronous correlation inherits the self-testing property of the associated synchronous correlation. We also pose a new security assumption that closes the "locality" (or "causality") loophole: an unbounded adversary with even a small uncertainty about the users' choice of measurement bases cannot produce any almost synchronous correlation that approximately maximally violates a synchronous Bell inequality.
- A framework for efficient entanglement distribution with cavity QED systemsSachi Tamechika (NTT Secure Platform Laboratories); Yasunari Suzuki (NTT Secure Platform Laboratories); Yuuki Tokunaga (NTT Secure Platform Laboratories); Takao Aoki (Department of Applied Physics, Waseda University)[abstract]Abstract: To demonstrate quantum protocols on a global scale, a quantum repeater is a vital technology to improve the efficiency of entanglement distribution. Entanglement distribution consists of two steps; share entanglements between neighboring quantum repeaters, and perform entanglement distillation and swapping. In this paper, we propose a framework for the first step, efficient Bell measurement between adjacent quantum repeaters, using quantum memories based on cavity quantum electrodynamics (QED) systems. Our framework maximizes a distillable entanglement rate of the protocol by optimizing the parameters of a cavity QED system and pulse length of photons according to the number of available memories at repeater nodes. We demonstrate our theory with a nanofiber cavity QED system with trapped atoms, which is one of the most promising quantum devices for the quantum network. We show that with practical parameters, Bell measurements with quantum memories can outperform those without memories, and we show several trade-off relations between accessible parameters in experiments. Our results extend the limits of entanglement distribution with quantum repeaters using available technology, and reveal that the multiplexing of the cavity QED systems is effective for improving the performance of entanglement distribution.
- Practical Quantum Cryptanalysis by Variational Quantum CloningBrian Coyle (University of Edinburgh); Mina Doosti (University of Edinburgh); Elham Kashefi (University of Edinburgh, CNRS, LIP6, Sorbonne University); Niraj Kumar (University of Edinburgh)[abstract]Abstract: Cryptanalysis of quantum cryptographic systems generally involves finding optimal adversarial attack strategies on the underlying protocols. The core principle of modeling quantum attacks often reduces to the ability of the adversary to clone unknown quantum states and to extract thereby meaningful secret information. Explicit optimal attack strategies typically require high computational resources due to large circuit depths or, in many cases, are unknown. Here we introduce variational quantum cloning (VarQlone), a cryptanalysis algorithm based on quantum machine learning, which allows an adversary to obtain optimal approximate cloning strategies with short depth quantum circuits, trained using hybrid classical-quantum techniques. The algorithm contains operationally meaningful cost functions with theoretical guarantees, quantum circuit structure learning and gradient-descent-based optimization. Our approach enables the end-to-end discovery of hardware-efficient quantum circuits to clone specific families of quantum states, which we demonstrate in implementation on the Rigetti Aspen quantum hardware. We connect these results to quantum cryptographic primitives and derive explicit attacks facilitated by VarQlone. We expect that quantum machine learning will serve as a resource for improving attacks on current and future quantum cryptographic protocols.
- Dense-wavelength division multiplexing of quantum and classical communication over a deployed fiber link enabled by up-conversion assisted detectorsIlaria Vagniluca (CNR - Istituto Nazionale di Ottica and University of Naples); Domenico Ribezzo (CNR - Istituto Nazionale di Ottica and University of Naples); Davide Bacco (Technical University of Denmark); Alessandro Zavatta (CNR - Istituto Nazionale di Ottica)[abstract]Abstract: The coexistence of classical and quantum communication within the same fiber optics infrastructure is still an open challenge to be solved. In fact, most of the practical implementations of quantum key distribution (QKD) are accomplished by taking advantage of dark fiber channels, i.e. fiber-optics links totally dedicated to the transmission of quantum signals. This prevents the intense classical light to affect the qubit error rate, but strongly reduces the possibilities for a full deployment of QKD technologies in large-scale and realistic applications. Looking for a solution several approaches have been tested, generally based on multiplexing of different degrees of freedom of photons. In our work we combined a dense-wavelength-division-multiplexing scheme with two different home-made single photon detection stages able to convert C-band photons into photons detectable by a silicon photon counter, by exploiting sum-frequency-generation process in nonlinear crystals. We compared the results with an off-the-shelf InGaAs single-photon detector, equipping it with polarization and wavelength filters, that was tested under the same experimental conditions. Injecting an intense light laser into a different DWDM channel to simulate a real-worl QKD scenario, we demonstrated that our up-conversion based detector makes QKD feasible with a classical launch power of 4 dB higher than the one affordable by the InGaAs detector. This result paves the way to the employment of quantum communication in many realistic situations, by enabling the usage of already existing telecom infrastructures, where the noise levels are not manageable by current single photon avalanche detectors.Poster presented by: Domenico Ribezzo
- Refined finite-size security analysis of discrete-modulation continuous variable quantum key distribution based on reverse reconciliationTakaya Matsuura (The University of Tokyo); Shinichiro Yamano (The University of Tokyo); Yui Kuramochi (The University of Tokyo); Toshihiko Sasaki (The University of Tokyo); Masato Koashi (The University of Tokyo)[abstract]Abstract: The finite-size security of a discrete-modulation continuous variable (CV) quantum key distribution (QKD) protocol was recently reported, but the obtained key rate of the protocol was low compared to the recent asymptotic analyses. In this work, we significantly improve the performance of the protocol by refining the finite-size security analysis based on a reverse reconciliation. The idea of the refinement is motivated by the recently established equivalence of the privacy amplification and the phase error correction. Our refined analysis is a step towards complete security proof of high-performance discrete-modulation CV QKD.Poster presented by: Takaya Matsuura
- New Protocols and Ideas Towards Practical Quantum Position VerificationRene Allerstorfer (QuSoft/CWI); Harry Buhrman (QuSoft/CWI); Florian Speelman (QuSoft and University of Amsterdam); Philip Verduyn Lunel (QuSoft/CWI)[abstract]Abstract: In this work, we study loss-tolerant quantum position verification (QPV) protocols. We propose a new fully loss-tolerant protocol, based on the SWAP test, with several desirable properties. The task of the protocol, which can be implemented using only a single beam splitter and two detectors, is to estimate the overlap between two input states. By formulating possible attacks as a semi-definite program (SDP), we prove full loss tolerance against unentangled attackers restricted to local operations and classical communication (LOCC), and additionally show that the attack probability decays exponentially under parallel repetition of rounds. Furthermore, we investigate the role of loss and quantum communication attacks in QPV in general. A protocol that is provably secure against unentangled attackers restricted to LOCC, but can be perfectly attacked by local operations and a single round of simultaneous quantum communication, is constructed. However, we show that any protocol secure against classical communication can be transformed into a protocol secure against quantum communication. Finally, we observe that any QPV protocol can be attacked with a linear amount of entanglement if the loss is high enough.
- Open Source LDPC-based error correctionAdomas Baliuka (LMU Munich, Munich Center for Quantum Science and Technology); Elsa Dupraz (IMT Atlantique); Harald Weinfurter (LMU Munich, Munich Center for Quantum Science and Technology, Max Planck Institute of Quantum Optics)[abstract]Abstract: Error correction is an essential step in the classical post-processing of all quantum key distribution (QKD) protocols. We present error correction methods optimized for discrete variable (DV) QKD and make them freely available as an ongoing open-source project (github.com/XQP-Munich/LDPC4QKD). Our methods are based on irregular quasi-cyclic (QC) low density parity check (LDPC) codes and state-of-the-art rate adaption techniques.Poster presented by: Adomas Baliuka
- Tight finite-key analysis for RRDPS protocolHang Liu (University of Science and Technology of China); Zhen-Qiang Yin (University of Science and Technology of China); Rong Wang (University of Science and Technology of China); Ze-Hao Wang (University of Science and Technology of China); Shuang Wang (University of Science and Technology of China); Wei Chen (University of Science and Technology of China); Guang-Can Guo (University of Science and Technology of China); Zheng-Fu Han (University of Science and Technology of China)[abstract]Abstract: Among all existing quantum key distribution (QKD) protocols, the round-robin-differential-phase-shift (RRDPS) protocol is one of the unique protocols. Because it can be running without monitoring signal disturbance, which improves its tolerance of error rate and does well in the finite-key scenario. Considering that a tight finite-key analysis with a practical phase-randomized source is still missing, we propose an improved security proof of RRDPS against the most general coherent attack based on the entropic uncertainty relation. We also introduce Azuma’s inequality into our proof, which can tackle finite-key effects. The results indicate experimentally acceptable numbers of pulses are sufficient to approach the asymptotic bound closely. This method may be the optimal one in the finite-key analysis for the RRDPS protocol.Poster presented by: Hang Liu
- Encoding a qubit into the continuous variables of a single photonNicolas Fabre (Centre of New technologies, Warsaw University)[abstract]Abstract: Encoding quantum information in continuous variables is intrinsically faulty. Nevertheless, redundant qubits can be used for error correction, as proposed in Phys. Rev. A 64, 012310 (2001). We show how to experimentally implement this encoding using time-frequency continuous degrees of freedom of photon pairs produced by spontaneous parametric down conversion. We illustrate our results using an integrated AlGaAs photon-pair source. We show how single qubit gates can be implemented and propose a theoretical scheme for correcting errors in a circuit-like and in a measurement-based architecture. Finally, I propose a teleportation-based quantum error correction protocol adapted for such grid states.Poster presented by: Nicolas Fabre
- Automated testbench for checking vulnerability of single-photon detectors to bright-light attackKonstantin Zaitsev (Russian Quantum Center); Polina Acheva (Russian Quantum Center); Vadim Makarov (Russian Quantum Center)[abstract]Abstract: Quantum attacks to single-photon detectors with bright-light are known for more than a decade. Many countermeasures were suggested to protect detectors, but the most of them can close some attacks with given parameters but not a whole attack group. To solve the problem we are developing automated testbench that emulates attacks by an eavesdropper Eve. It combines emission of pulse laser and continuous-wave laser and observes detector's response. In future we hope to automatically prepare reports on detectors' safety or show bright-light attacks that were not covered by detectors' countermeasures.
- Beam tracking system using pan-tilt module and MEMS-based fast steering mirror in quantum key distributionMinchul Kim (Electronics and Telecommunications Research Institute); Kyongchun Lim (Electronics and Telecommunications Research Institute); Byung-Seok Choi (Electronics and Telecommunications Research Institute); Joong-Seon Choe (Electronics and Telecommunications Research Institute); Kap-Joong Kim (Electronics and Telecommunications Research Institute); Young-Ho Ko (Electronics and Telecommunications Research Institute); Ju Hee Baek (Electronics and Telecommunications Research Institute); Chun Ju Youn (Electronics and Telecommunications Research Institute)[abstract]Abstract: Quantum key distribution (QKD) has been widely studied for its inherent security against eavesdropping. Among them, free-space QKD has been actively studied for its wide range of applications. For global-scale quantum network, satellite-to-ground quantum key distribution has been studied in major countries around the world. Also, due to recent progress on drone and autonomous vehicle technologies and applications, short to intermediate-range applications for small moving platforms are gaining more interests than before. For applying QKD on these platforms, one of the most challenging requirements is reducing the size and weight of the QKD system, including beam tracking components. In this study, we report a compact beam tracking system and its tracking performance on a moving transmitter. The coarse tracking part of the system consists of pan-tilt module and a CMOS camera. The fine tracking part consists of a MEMS-based fast steering mirror (FSM) and a quadrant-cell photodetector module. By using compact MEMS-based FSM, the size of the system was reduced to 15 × 15 × 30 cm and can be further reduced by using smaller optical components. For testing the tracking performance, transmitter on a moving platform was placed 1 m away from the fixed tracking system and moved at a constant speed along a circular track around the tracking system. A diverging 650 nm laser source on the transmitter was used as a tracking target for both coarse and fine tracking. When tracking the target moving at angular speed of 20 mrad/s, angular error was less than 0.12° and beam tracking induced optical loss into a multimode fiber was measured to be lower than 2.5 dB.
- Practical Quantum Key Distribution Secure Against Side ChannelsÁlvaro Navarrete (University of Vigo); Margarida Pereira (University of Vigo); Marcos Curty (University of Vigo); Kiyoshi Tamaki (University of Toyama)[abstract]Abstract: There is a large gap between theory and practice in quantum key distribution (QKD) because real devices do not satisfy the assumptions required by the security proofs. We close this gap by introducing a simple and practical measurement-device-independent-QKD type of protocol, based on the transmission of coherent light, for which we prove its security against any possible imperfection and/or side channel from the quantum communication part of the QKD devices. Our approach only requires to experimentally characterize an upper bound of one single parameter for each of the pulses sent, which describes the quality of the source. Moreover, unlike device-independent (DI) QKD, it can accommodate information leakage from the users’ laboratories, which is essential to guarantee the security of QKD implementations. In this sense, its security goes beyond that provided by DI QKD, yet it delivers a secret key rate that is various orders of magnitude greater than that of DI QKD.Poster presented by: Álvaro Navarrete
- Near-maximal Polarization Entanglement for Device-Independent Quantum Key Distribution at 2.1 μmAdetunmise Dada (University of Glasgow); Jędrzej Kaniewski (University of Warsaw); Corin Gawith (Covesion Limited & University of Southampton); Martin Lavery (University of Glasgow); Robert H. Hadfield (University of Glasgow); Daniele Faccio (University of Glasgow); Matteo Clerici (University of Glasgow)[abstract]Abstract: The ability to generate highly entangled states and access the full quantum state space is crucial for most advanced quantum information tasks. However, in the mid-infrared band, the capability for full state tomography or the demonstration of states that are sufficiently entangled, e.g., to allow positive secure key rates for entanglement-based quantum key distribution (QKD) have not been achieved to date. At a wavelength of 2.1 μm, we demonstrate full state tomography of two-photon states and show near-maximal violation of the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality with an order-of-magnitude improvement over the state of the art in terms of the number of standard deviations above the classical limit. We obtain a positive secure-key rate for the first time using mid-infrared photons (0.417 bits/pair, with a quantum bit error rate of 5.43%) in a proof-of-principle device-independent (DI) QKD scenario, demonstrating the viability of DIQKD at 2.1 μm. We further exploit the quality of the entangled state by obtaining (via computations on the measured state) the violation of a new Bell inequality tailored for a weak or less-rigid form of self-testing, which is of fundamental interest. These results at 2.1 μm pave the way for robust, DI quantum information applications in the mid-infrared region.
- Towards high-dimensional QKD in deployed multicore fiberMujtaba Zahidy (Technical University of Denmark); Nicola Biagi (Istituto Nazionale di Ottica (CNR-INO), Florence, Italy); Antonio Mecozzi (Department of Physical and Chemical Sciences, University of L’Aquila, L’Aquila, Italy); Cristian Antonelli (Department of Physical and Chemical Sciences, University of L’Aquila, L’Aquila, Italy); Leif K. Oxenløwe (Technical University of Denmark); Alessandro Zavatta (Istituto Nazionale di Ottica (CNR-INO), Florence, Italy); Davide Bacco (Technical University of Denmark)[abstract]Abstract: The demand for higher secret key rates, in conjunction with the need for extending the reach of quantum key distribution has led to the devising of multiple novel protocols. Most of these protocols make use of qubits, owing to the simplicity with which they can be encoded in quantum communication systems that are available today. On the other hand, high-dimensional quantum states, yet more challenging to generate and transmit, enable higher secret-key rates and are more robust against errors in the process of quantum key distribution. A promising implementation of high-dimensional QKD is the one based on path encoding in optical-fiber quantum channels [1], where the most straightforward choice would be the use of multiple fibers. This choice, however, is challenged by the intrinsic non-homogeneity of different fibers. A more practical alternative is the one offered by multi-core fiber (MCF) technology, which has matured in recent years in the context of space-division multiplexed classical optical communications. In both cases, a key requirement is that the relative phase between spatial paths is preserved, which requires some phase-stabilization procedure in the presence of propagation-induced random phase drift. High-dimensional QKD in MCFs has been recently investigated in [1], where 4-dimensional QKD on a 2-km-long MCF was demonstrated. This was possible thanks to a phase stabilization scheme in which the phase fluctuations of a co-propagating classical continuous-wave laser signal were monitored in order to compensate for the phase drift. The same stabilization system was successfully tested more recently in the unique SDM test-bed in L'Aquila [2], in Italy, on various strands of deployed MCFs, up to a total length of 26 km [2]. In this work, we aim at developing a real-time high-dimensional QKD system based on joint path and time-bin encoding in MCFs. By using two fiber cores and two time bins, we generate 4-dimensional states.
- A generalized efficiency mismatch attack to bypass detection-scrambling countermeasureMd Abduhu Ruhul Fatin (Bangladesh Univ. of Engineering and Tech.); Shihan Sajeed (IQC, University of Waterloo)[abstract]Abstract: Imperfections in the receiver setup of quantum cryptography systems may allow an eavesdropper to use it as a control parameter to attack the system. Mismatch of sensitivity in the receiver's photodetectors is one of the imperfections that can potentially be exploited by an eavesdropper. Published researches have shown that scrambling the role of the photodetectors in the receiver can be one of the countermeasure strategies to protect the system. In this work, we show that the proposed countermeasure can be bypassed if the attack is generalized by including more attack variables. Using experimental results from existing publications, we show that detector randomization effectively prevents the initial attack but fails to do so when Eve generalizes her attack strategy. Thus, unless new techniques are proposed to strengthen the existing detector-scrambling countermeasure strategies, it cannot guarantee security against detector efficiency mismatch based attacks. Our result and methodology could be used to security-certify a free-space quantum communication receiver against all types of detector-efficiency-mismatch type attacks.Poster presented by: M A Ruhul Fatin
- High Dimensional Quantum Key Distribution System Using Structured Light.MUHAMMAD KAMRAN KAMI (NED UNIVERSITY OF ENGINEERING & TECHNOLOGY); Dr. Muhammad Mubashir Khan (NED UNIVERSITY OF ENGINEERING & TECHNOLOGY); Dr. Tahir Malik (NED UNIVERSITY OF ENGINEERING & TECHNOLOGY)[abstract]Abstract: When combined with well-established theories of contemporary physics, quantum key distribution (QKD) has emerged as a safe method for secret key distribution that may be used to protect sensitive information. Numerous fascinating and creative ideas have been suggested for QKD since its inception in 1984 to enhance the security and efficiency of the system while also taking into consideration its applications and practical implementation. To achieve longer communication distances in QKD without compromising its security, schemes with high error rates for long-distance communication have been developed. One such scheme is the so-called KMB09 protocol, which was developed to make use of higher dimensional photon states, which are not possible with the standard BB84 scheme. However, because of the unique architecture of the KMB09 protocol, no practical implementation of the protocol has yet been disclosed to the public. Here we present a framework for the realistic construction of a QKD system that operates in two or more dimensions of photon states and executes the KMB09 protocol with a decoy-state scheme. We describe the design of a KMB09 protocol-based QKD system and its simulation for practical implementation, which is based on the encoding of secret bits in higher-order Gaussian beam spatial modes, as well as the modeling of the system. We use orbital angular momentum (OAM) degree of freedom which is the most dynamic and easy handle feature that researchers utilize for the implementation of robust and state-of-the-art HD-QKD systems. Laguerre Gaussian, a higher-order Gaussian beam having special features associated with the OAM. Photons carrying OAM in Laguerre Gaussians beams can create several mutually unbiased basis (MUBs), which are extensively employed for protocol implementation. We constructed three MUBs in four-dimensional Hilbert space, one is reserved for a standard basis and the remaining two behave as a measurement basis. Besides this, we also used intensity variation for the generations of the qubits to employ the decoy-state scheme (vacuum plus weak coherent pulses), which relieves us from Photon Number Splitting (PNS) attack and also helped in the safe transfer of secret keys. The suggested framework is assessed particularly in terms of efficiency or success rate while dealing with photon states in two and four dimensions. Here we initially plot the number of iterations data on fixed qubits length in comparison with the efficiency of the HD protocol (KMB09) observed during simulation per iteration. We also plot the percentage error of the simulated efficiency and the efficiency of the analytical model of the KMB09 based system. We discover that the simulation results using our proposed framework are consistent with the numerical and analytical findings obtained using the same QKD model that was previously published. We have so far reached our first milestone that is the development of the HD-QKD system based on the KMB09 protocol. Now we are focusing on the error rates developed in the system due to intrusion and also handle attacks like intercept-resend-attacks. We will also incorporate losses due to turbulence in the quantum channel of our free space HD QKD system in the future.Poster presented by: Muhammad Kamran
- MIMO Terahertz Quantum Key DistributionNeel Kanth Kundu (Department of Electronic and Computer Engineering, The Hong Kong University of Science and Technology); Soumya P. Dash (School of Electrical Sciences, Indian Institute of Technology Bhubaneswar); Matthew R. McKay (Department of Electronic and Computer Engineering, The Hong Kong University of Science and Technology); Ranjan K. Mallik (Department of Electrical Engineering, Indian Institute of Technology Delhi)[abstract]Abstract: We propose a multiple-input multiple-output (MIMO) quantum key distribution (QKD) scheme for improving the secret key rates and increasing the maximum transmission distance for terahertz (THz) frequency range applications operating at room temperature. We propose a transmit beamforming and receive combining scheme that converts the rank-$r$ MIMO channel between Alice and Bob into $r$ parallel lossy quantum channels whose transmittances depend on the non-zero singular values of the MIMO channel. The MIMO transmission scheme provides a multiplexing gain of $r$, along with a beamforming and array gain equal to the product of the number of transmit and receive antennas. This improves the secret key rate and extends the maximum transmission distance. Our simulation results show that multiple antennas are necessary to overcome the high free-space path loss at THz frequencies. Positive key rates are achievable in the $10-30$ THz frequency range that can be used for both indoor and outdoor QKD applications for beyond fifth generation ultra-secure wireless communications systems.Poster presented by: Neel Kanth Kundu
- Code efficiency, frame error rate and secure key rateHossein Mani (Technical University of Denmark); Tobias Gehring (Technical University of Denmark); Ulrik L. Andersen (Technical University of Denmark); Bernhard Oemer (Austrian Institute of Technology); Christoph Pacher (Austrian Institute of Technology)[abstract]Abstract: See the short abstract in the attached file. In this poster, we present the finite length efficiency of some of our codes and show how it can improve the secret key rate. For this, the FER performance of some of these codes is plotted versus the efficiency and then we plot the secret key rate versus distance by replacing our codes with other existing codes in the literature.Poster presented by: Hossein Mani
- Genome Sequence Data Storage System using distributed storage system on QKD networkKazuaki Doi (toshiba corporation); Ririka Takahashi (toshiba corporation); Akira Murakami (toshiba corporation); Mamiko Kujiraoka (toshiba corporation); Alexander R. Dixon (toshiba corporation); Yoshimichi Tanizawa (toshiba corporation); Hideaki Sato (toshiba corporation); Muneaki Shimada (Tohoku University); Yasunobu Okamura (Tohoku University); Fuji Nagmi (Tohoku University); Mikio Fujiwara (NICT)[abstract]Abstract: We developed a genome sequence data storage system using a distributed storage system on a quantum key distribution (QKD) network and have successfully demonstrated secure storage and data reconstruction for genome sequence data. The proposed system thus has potential for use as a distributed storage system in genome analysis.
- High effective efficiency LDPC codes for CV-QKDThomas Symul (QuintessenceLabs); Andrew M. Lance (QuintessenceLabs); Sarah Johnson (University of Newcastle)[abstract]Abstract: High efficiency error reconciliation, typically achieved by using Multi Edge Low Density Parity Codes (ME-LDPC), is necessary for CV-QKD to reach large transmission distance. The commonly accepted definition of the efficiency, however, is problematic as it does not take into account the Frame Error Rate (FER) of LDPC, and therefore is theoretically and provably unbounded (i.e. can tend to infinity), if one can accept increasingly larger FER. Here we report new ME-LDPC code construction allowing high efficiency (>0.91) with very low FER (<0.008), allowing for a large effective efficiency, over a large continuous range of SNR (between -20.5dB to -6dB).
- Qubit-based clock synchronization for QKD systems using a Bayesian approachRoderick D. Cochran (The Ohio State University); Daniel J. Gauthier (Ohio State University)[abstract]Abstract: Quantum key distribution (QKD) provides a method for two users to exchange a provably secure key, which requires synchronizing the user’s clocks. Qubit-based synchronization protocols directly use the transmitted quantum states and thus avoid the need for additional classical synchronization hardware, but previous approaches sacrifice secure key either directly or indirectly. Here, we introduce a Bayesian probabilistic algorithm that incorporates all published information to efficiently find the clock offset without sacrificing any secure key [1]. Additionally, the output of the algorithm is a probability, which allows us to quantify our confidence in the synchronization. For demonstration purposes, we present a model system with accompanying simulations of an efficient three-state BB84 prepare-and-measure protocol with decoy states. Our algorithm exploits the correlations between Alice’s published basis and mean photon number choices (which must already be published for the protocol) and Bob’s measurement outcomes to probabilistically determine the most likely clock offset. We perform cross-correlations using Fast Fourier Transforms to count the number of each type of event pairing for each potential offset (e.g., how many times Alice sent a decoy state in the horizontal/vertical polarization basis and Bob registered a click in the horizontal detector). Taking these along with a lookup table for the probabilities of the different event pairings, we determine the synchronization probability of the different potential offsets using Bayesian analysis. In our simulations, we find that we can achieve a 95% synchronization confidence using a string length of only 4,140 communication bin widths, meaning we can tolerate clock drift approaching 1 part in 4,140 in this example when simulating this system with a dark count probability per communication bin width of 8⨉10-4 and a received mean photon number of 0.01. The relationship between the received mean photon number and the number of communication bin widths required to achieve a 95% synchronization confidence is shown in Fig. 1.
- Training a quantum workforce: Towards BB84 for engineering studentsLukas Mairhofer (FH Technikum Wien)[abstract]Abstract: In this poster we will present a truly quantum hands-on setup for training engineering students in quantum cryptography with the BB84 protocol. We supplement this setup with a web-based simulation of the protocol which will be available to the public.
- Certification of Random Number Generators using Machine LearningNg Hong Jie (National University of Singapore); Raymond Ho (National University of Singapore); Syed M Assad (The Australian National University); Ping Koy Lam (The Australian National University); Omid Kavehei (ARC Training Centre for Innovative BioEngineering, School of Biomedical Engineering, The University of Sydney); Wang Chao (National University of Singapore); Nhan Duy Truong (ARC Training Centre for Innovative BioEngineering, School of Biomedical Engineering, The University of Sydney); Jing Yan Haw (National University of Singapore)[abstract]Abstract: Two coveted qualities for a random number generator (RNG) are uniformity and unpredictability. A Pseudo-RNG (PRNG) produces a uniform output, but it is predictable when one has knowledge of the seed and implementation parameters. While a quantum-RNG (QRNG) produces an unpredictable output, it is not necessarily uniform and hence typically requires randomness extraction. We examine these two aspects in RNGs by utilizing a machine learning cryptanalysis, showing the applicability of the tool in uncovering hidden correlations and implementation failures.Poster presented by: Ng Hong Jie
- Postselection Strategies for Continuous-Variable Quantum Key Distribution Protocols with Quadrature Phase-Shift Keying ModulationFlorian Kanitschar (TU Wien / AIT - Austrian Institute of Technology); Christoph Pacher (AIT - Austrian Institute of Technology)[abstract]Abstract: Continuous-variable quantum key distribution with phase-shift keying modulation is a promising candidate for practical applications of quantum cryptography due to high compatibility with existing telecommunication infrastructure. It is known that postselection, i.e., omitting those parts of the raw key where an adversary might have gained more information than the communicating parties, can improve the secure key rate significantly. We introduce a new cross-shaped postselection strategy and use a recent numerical security proof framework to compare it to other existing postselection strategies. Furthermore, we provide novel analytical results for the operators that define the respective postselection regions in phase space for each of the postselection strategies, enabling a quicker evaluation without introducing additional numerical errors. Motivated by the high computatoinal effort for the error-correction phase, we point out how postselection can be used to reduce the raw key (so, the data that has to be error-corrected) significantly without lowering the secure key rate considerably. As therefore Bob uses his measurement outcomes directly without requiring any additional computations, the cross-shaped scheme can be implemented easily both in new and existing QKD systems.Poster presented by: Florian Kanitschar
- Quantum key distribution with a bright source of telecom single photons based on quantum frequency conversionChristopher L. Morrison (Heriot-Watt University); Francesco Graffitti (Heriot-Watt University); Zhe Xian Koong (Heriot-Watt University); Nick G. Stoltz (University of California, Santa Barbara); Roberto G. Pousa (University of Strathclyde); Dirk Bouwmeester (Leiden University); Luca Mazzarella (California Institute of Technology); John Jeffers (University of Strathclyde); Daniel K. L. Oi (University of Strathclyde); Alessandro Fedrizzi (Heriot-Watt University); Brian D. Gerardot (Heriot-Watt University)[abstract]Abstract: We demonstrate fibre-based quantum key distribution over 175 km using a bright frequency converted quantum dot single-photon source. The source is capable of producing count rates approaching 2 MHz at 1550 nm with second order correlations on the order of 3%. This allows for a measured key rate of 130 bps (100 kbps) at 175 km (50 km) in the asymptotic regime using static encoding and predicted positive key rate out to 188 km. This can be extended to 240 km using ultra-low loss fibre based on the measured source parameters.
- Single trusted qubit is necessary and sufficient for quantum realisation of extremal no-signaling statisticsMichał Banacki (University of Gdańsk, International Centre for Theory of Quantum Technologies, Faculty of Mathematics, Physics and Informatics); Ravishankar Ramanathan (The University of Hong Kong, Department of Computer Science); Ricard Ravell Rodriguez (University of Gdańsk, International Centre for Theory of Quantum Technologies); Paweł Horodecki (University of Gdańsk, International Centre for Theory of Quantum Technologies; Gdańsk University of Technology, Faculty of Applied Physics and Mathematics, National Quantum Information Centre)[abstract]Abstract: We consider quantum statistics from the perspective of post-quantum no-signaling theories in which either none or only a certain number of systems are trusted. These scenarios can be fully described by so-called no-signaling boxes or no-signaling assemblages respectively. It has been shown so far that in the usual Bell non-locality scenario with a single measurement run, quantum correlations can never reproduce an extremal non-local point within the set of no-signaling boxes. We provide here a general no-go rule showing that the latter stays true even if arbitrary sequential measurements are allowed. On the other hand, we prove a positive result showing that already a single trusted qubit is enough for quantum theory to produce a self-testable extremal point within the corresponding set of no-signaling assemblages. This result provides a tool that opens up possibilities for security proofs of cryptographic protocols against general no-signaling adversaries in semi-device-independent scenarios.Poster presented by: Michał Banacki
- Bounds on device-independent quantum key distribution rates for devices and channelsEneet (Kaur); Karol (Horodecki); Siddhartha Das (Université libre de Bruxelles)[abstract]Abstract: In this work, we develop upper bounds for key rates for device-independent key distribution protocols, devices, and channels. We study the reduced cc-squashed entanglement and show that it is a convex functional. As a result, we show that the convex hull of the currently known bounds is a tighter upper bound on the device-independent key rates of standard CHSH-based protocol. We further provide tighter bounds for DIQKD key rates achievable by any protocol applied to the CHSH-based device. This bound is based on reduced relative entropy of entanglement optimized over decompositions into local and non-local parts. In the scenario of quantum channels, we obtain upper bounds for device-independent private capacity for the CHSH based protocols. We show that the DI private capacity for the CHSH based protocols on depolarizing and erasure channels is limited by the secret key capacity of dephasing channels.
- Resource analysis for quantum-aided Byzantine agreementZoltán Guba (Budapest University of Technology and Economics, Budapest, Hungary); István Finta (Nokia Bell Labs, Budapest, Hungary); Ákos Budai (Budapest University of Technology and Economics, Budapest, Hungary); Lóránt Farkas (Nokia Bell Labs, Budapest, Hungary); Zoltán Zimborás (Budapest University of Technology and Economics, Budapest, Hungary); András Pályi (Budapest University of Technology and Economics, Budapest, Hungary)[abstract]Abstract: In distributed computing, a Byzantine fault is a condition where a component behaves inconsistently, showing different symptoms to different components of the system. Consensus among the correct components can be reached by appropriately crafted communication protocols, even in the presence of byzantine faults. Quantum-aided protocols built upon distributed entangled quantum states are worth considering, as they are more resilient than traditional ones. Based on earlier ideas, here we introduce a parameter-dependent family of quantum-aided weak broadcast protocols, and prove their security. We analyze the resource requirements as functions of the protocol parameters, and locate the parameter range where these requirements are minimal. Hence, our work illustrates the engineering aspects of future deployments of such protocols in practice. Following earlier work demonstrating the suitability of noisy intermediate-scale quantum (NISQ) devices for the study of quantum networks, we show how to prepare our resource quantum state on publicly available IBM quantum computers. We outline follow-up tasks toward practical quantum-aided byzantine fault tolerance.
- Resilient Chip‐Scale QKD with Integrated Hacking PreventionFriederike Jöhlinger (University of Bristol); Lawrence Rosenfeld (University of Bristol); Henry Semenenko (University of Bristol); Djeylan Aktas (University of Bristol); John Rarity (University of Bristol)[abstract]Abstract: Recently, the first integrated Measurement Device Independent Quantum Key Distribution (MDI QKD) system has been implemented here in Bristol (Semenenko, 2020). To build on this result and work towards improved security and key rates, a new indium phosphide (InP) transmitter chip has been designed for a second-generation MDI QKD implementation. The new chip contains two laser sources, including a distributed feedback laser to allow for faster pulsing and high-speed phase modulators with a bandwidth of up to 30 GHz. With the new lasers and phase modulators a higher pulse rate will be achieved, leading to better key rates. Additionally, an on-chip photodiode can be used to monitor incoming light. This makes the chip much more resilient against hacking attacks, such as a Trojan Horse or Laser Damage Attacks. Since MDI QKD is intrinsically protected against detector attacks, this means that this new MDI QKD system will show great security overall.
- Categorical composable cryptographyAnne Broadbent (University of Ottawa); Martti Karvonen (University of Ottawa)[abstract]Abstract: In arXiv:2105.05949, we initiate a categorical study of composable security definitions in cryptography. We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography. Our model is able to incorporate computational security, set-up assumptions and various attack models such as colluding or independently acting subsets of adversaries in a modular, flexible fashion. Amongst other benefits, the categorical language allows using string diagrams to prove results cryptographically: in particular, we can promote "figures illustrating the proof" found in the cryptographic literature into honest proofs.
- Actively-Stabilised Variable-Asymmetry Mach-Zehnder Interferometer for QKD Device CharacterisationSophie Albosh (University of York and National Physical Laboratory); T.P. Spiller (University of York); C.J. Chunnilall (National Physical Laboratory)[abstract]Abstract: Please see the attached pdf version of the extended abstract.
- Preparing Indistinguishable States for a Prepare-and-Measure BB84 Polarization-Based Decoy State QKD Protocol Using Three FPGA-Driven LEDsDaniel Sanchez-Rosales (Ohio State University); Roderick D. Cochran (Ohio State University); Daniel J. Gauthier (Ohio State University)[abstract]Abstract: Quantum key distribution (QKD) systems provide a method for two users to exchange a provably secure key that can be used to securely exchange a cryptographic key. In prepare-and-measure QKD protocols, the indistinguishability of states is an important aspect for preventing side-channel attacks. Here we consider the indistinguishability of states in a prepare-and-measure three-state BB84 polarization-based decoy state protocol using light-emitting diodes (LEDs). In addition, our system is designed to operate under size, weight, and power (SWaP) restrictions such as that needed for drone-based QKD. Our setup uses three separate LEDs driven by a field-programmable gate array (FPGA) that go through different optical paths that set the state of polarization. Each LED is connected to two GPIO pins via a different resistive path. By setting one pin to high impedance and driving the other with a nanosecond-scale electrical signal, we can choose between signal and decoy states. We can thus send 3 signal states, 3 decoy states, and 3 vacuum states, using only 3 separate sources driven by a single low-cost and light-weight FPGA. We must guarantee that these sources are indistinguishable from each other in the spatial, spectral, and temporal degrees-of-freedom on the photon. We make them nearly indistinguishable by passing the 3 photonic wavepackets through the same single-mode fiber and 1-nm-bandwith spectral filter, and use dynamic shifting of the FPGA phase-locked-loops to control the phase and the width of the electrical pulses that drive the LEDs, which allows us to control the optical pulses produced by the LEDs. We control the timing of the photonic wavepackets to a resolution of 250 ps. To quantify spectral indistinguishability, we measure filtered spectra for all states, which are overlaid in Fig. 1a, and find that their overlap is 94.6%. To measure the temporal indistinguishability, we drive a single LED with a 10 ns wide electrical signal at a repetition rate of 12.5 MHz. The resulting photonic wavepacket is measured by a single-photon detector whose electrical output is measured by a time-to-digital converter and histogrammed. The temporal waveforms of all 6 states are overlaid and shown in Fig. 1b with a measured overlap of 97.1%.
- A Quantum Key Distribution Testbed using a Plug-and-Play Telecom-wavelength Single-Photon SourceTimm Kupko (TU Berlin); Lucas Rickert (TU Berlin); Felix Urban (TU Berlin); Jan Große (TU Berlin); Nicole Srocka (TU Berlin); Sven Rodt (TU Berlin); Anna Musial (Wroclaw University); Kinga Zolnacz (Wroclaw University); Pawel Mergo (Marie Curie Sklodowska University); Kamil Dybka (Fibrain Sp. z o.o.); Waclaw Urbanczyk (Wroclaw University); Grzegorz Sek (Wroclaw University); Sven Burger (Zuse Institute Berlin); Stephan Reitzenstein (TU Berlin); Tobias Heindel (TU Berlin)[abstract]Abstract: Deterministic solid-state quantum light sources are key building blocks in photonic quantum technologies. While several proof-of-principle experiments of quantum communication using such sources have been realized, all of them required bulky setups. Here, we evaluate for the first time the performance of a compact and stand-alone fiber-coupled single-photon source emitting in the telecom O-band (1321nm) for its application in quantum key distribution (QKD). For this purpose, we developed a compact 19” rack module including a deterministically fiber-coupled quantum dot single-photon source integrated into a Stirling cryocooler, a pulsed diode laser for driving the quantum dot, and a fiber-based spectral filter. We further employed this compact quantum light source in a QKD testbed designed for polarization coding via the BB84 protocol resulting in g20 = 0.10+\-0.01 and a raw key rate of up to 4.72(13)kHz using an external laser for excitation. In this setting we investigate the achievable performance expected in full implementations of QKD. Using 2D temporal filtering on receiver side, we evaluate optimal parameter settings for different QKD transmission scenarios taking also finite key size effects into account. Using optimized parameter sets for the temporal acceptance time window, we predict a maximal tolerable loss of 23.19dB. Finally, we compare our results to previous QKD systems using quantum dot single-photon sources. Our study represents an important step forward in the development of fiber-based quantum-secured communication networks exploiting sub-Poissonian quantum light sources.
- QuNet: Mobile Free-Space Quantum Communication SystemChristopher Spiess (Fraunhofer IOF); Sebastian Toepfer (Fraunhofer IOF); Sakshi Sharma (Fraunhofer IOF); Thomas Grafenauer (AIT Austrian Institute of Technology GmbH); Roland Lieger (AIT Austrian Institute of Technology GmbH); Bernhard Ömer (AIT Austrian Institute of Technology GmbH); Stefan Petscharnig (AIT Austrian Institute of Technology GmbH); Manuel Warum (AIT Austrian Institute of Technology GmbH); Christoph Pacher (AIT Austrian Institute of Technology GmbH); Andrej Krzic (Fraunhofer IOF); Gregor Sauer (Fraunhofer IOF); Matthias Goy (Fraunhofer IOF); René Berlich (Fraunhofer IOF); Teresa Kopf (Fraunhofer IOF); Thomas Peschel (Fraunhofer IOF); Christoph Damm (Fraunhofer IOF); Aoife Brady (Fraunhofer IOF); Daniel Rieländer (Fraunhofer IOF); Fabian Steinlechner (Fraunhofer IOF)[abstract]Abstract: We report on a portable quantum communication platform and its application in quantum key distribution over a terrestrial free-space link. We outline on the complete chain from an efficient field-ready entangled photon source and custom-made mirror telescopes with adaptive optics for efficient link transmission to autonomous timing synchronization of detection events and subsequent secure key extraction.
- Finite-Key Analysis of Quantum Key Distribution using Entropy AccumulationThomas Van Himbeeck (University of Toronto & Waterloo); Jie Lin (University of Waterloo); Ian George (University of Illinois); Kun Fang (Baidu Research); Norbert Lütkenhaus (University of Waterloo)[abstract]Abstract: The pursuit of tight finite-key analysis for general QKD protocols is an exciting but challenging task for theorists. Entropy accumulation theorem (EAT) was developed recently and been successfully applied to device-independent QKD protocols. In the present work, we use EAT to prove the security of a very large class of entanglement-based QKD protocols, covering most discrete-variable protocols as well as their optical implementations.
- A trustless decentralized protocol for distributed consensus of public quantum random numbersLac Nguyen (Physics Department, Stevens Institute of Technology, 1 Castle Point Terrace, Hoboken, NJ 07030, USA); Jeevanandha Ramanathan (Physics Department, Stevens Institute of Technology, 1 Castle Point Terrace, Hoboken, NJ 07030, USA); Michelle Mei Wang (Physics Department, Stevens Institute of Technology, 1 Castle Point Terrace, Hoboken, NJ 07030, USA); Yong Meng Sua (Physics Department, Stevens Institute of Technology, 1 Castle Point Terrace, Hoboken, NJ 07030, USA); Yuping Huang (Physics Department, Stevens Institute of Technology, 1 Castle Point Terrace, Hoboken, NJ 07030, USA)[abstract]Abstract: Quantum random number generators (QRNGs) provide intrinsic unpredictability originating from fundamental quantum mechanics. Most demonstrations focus on creating a self-tested, device-independent generator to retain genuineness from imperfect implementations. However, these efforts benefit only individual users, not beacon users. The difference is, QRNG users have physical access to their own trustless devices while beacon users only receive numbers broadcasted from a centralized source of randomness. Thus, in applications where multiple participants need a common set of RNs,they are obligated to trust the honesty of QRNG manufacturers, or a third party, and security of the communication. In this paper, we introduce the first consensus protocol that produces QRNs ina decentralized environment (dQRNG) where all N users can contribute in the generation process and verify the randomness of numbers they collect. Security of the protocol is guaranteed given(N-1) dishonest participants. We realize our protocol by performing a proof-of-principle experiment with four players.Poster presented by: Lac Nguyenb
- Towards a relationship between single photon nature and randomnessVardaan Mongia (Physical Research Laboratory); Satyajeet Patil (Physical Research Laboratory); Ayan Biswas (Physical Research Laboratory); RP Singh (Physical Research Laboratory)[abstract]Abstract: Quantum Random Number Generators (QRNGs) are an integral part of cryptography. In this work, we exploit the relationship between the quality of randomness of discrete variable QRNGs(min-entropy(X)) and the quality of single photon source from SPDC sources (second-order correlation: g(2)(0)). This work provides another stitch between the two fields of information theory and quantum optics. We show the variation of the two parameters (min-entropy(X)) and b(=1- g(2)(0)) on various grounds, say, variation with orbital angular momentum (OAM) of the spatial mode, with time delay, etc. We propose a relationship between min-entropy(X) and g(2)(0) and also give a physical significance to min-entropy(X).Poster presented by: Vardaan Mongia
- Building A Two-mode Squeezed Vacuum Source for Quantum CommunicationsIgor Konieczniak (University of York); Rupesh Kumar (University of York); Tim Spiller (University of York)[abstract]Abstract: Abstract A Two-Mode Squeezed Vacuum (TMSV) is a quantum resource proven useful in several aplications in Quantum Technology, one of them being Quantum Key Distribution (QKD). Here we report the building of a TMSV source for use in QKD. Our system will comprise of two OPO, with its squeezed vacuum outputs combined in a balanced beam splitters. Active controls are employed for cavities stabilization, squeezing phase lock and relative phase lock between squeezed fields. The new cavity for the first OPO was designed and is in operation. Our target is to obtain 13 dB of corrected squeezing for the amplitude quadrature and a combined Duan inequality violation of up to 10 dB. We will show the status and our more recent results towards those goals.
- An Open-source Software Platform for Numerical Key Rate Calculation of General Quantum Key Distribution ProtocolsWenyuan Wang (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Jie Lin (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Ian George (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Twesh Upadhyaya (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Adam Winick (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Shlok A. Nahar (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Kai-Hong Li (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Kun Fang (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Natansh Mathur (India Institute of Technology Roorkee); John Burniston (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Max Chemtov (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Shahabeddin M. Aslmarand (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Yanbao Zhang (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo; NTT Basic Research Laboratories and NTT Research Center for Theoretical Quantum Physics, NTT Corporation); Christopher Boehm (University of Freiburg); Patrick Coles (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Norbert Lütkenhaus (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo)[abstract]Abstract: In this work, we present an open-source software platform that calculates key rate for general QKD protocols, building upon the numerical framework proposed by our group that can perform automated security proof of QKD protocols. The software platform is fully modularized with mutually independent modules for descriptions of protocols/channels, solvers for bounding key rate, and parameter optimization algorithms. It currently supports BB84 and measurement-device-independent QKD (including decoy states), as well as discrete-modulated continuous variable QKD. It also supports finite-size analysis for non-decoy-state protocols. We hope that the open-sourcing can attract theorists to test new protocols and/or contribute to new solvers, as well as appeal to experimentalists who wish to analyze their data or optimize parameters for new experiments.
- Numerical Security Proof for Decoy-State BB84 and Measurement-Device-Independent QKD Resistant against Large Basis MisalignmentWenyuan Wang (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo); Norbert Lütkenhaus (Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo)[abstract]Abstract: In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we make use of "fine-grain statistics", a variation of existing QKD protocols to make use of originally discarded data and get better key rate. We show that such variations can grant protocols resilience against any unknown and slowly changing rotation along one axis, similar to reference-frame-independent QKD, but without the need for encoding physically in an additional rotation-invariant basis. Such an analysis can easily be applied to existing systems, or even data already recorded in previous experiments, to gain significantly higher key rate when considerable misalignment is present, extending the maximum distance for BB84 and MDI-QKD and reducing the need for manual alignment in an experiment.