-
An Overview of CV-MDI-QKD
Authors:
Alasdair I. Fletcher,
Cillian Harney,
Masoud Ghalaii,
Panagiotis Papanastasiou,
Alexandros Mountogiannakis,
Gaetana Spedalieri,
Adnan A. E. Hajomer,
Tobias Gehring,
Stefano Pirandola
Abstract:
As quantum key distribution (QKD) emerges as a robust defense against quantum computer threats, significant advancements have been realized by researchers. A pivotal focus has been the development of protocols that not only simplify hardware implementation like the use of continuous-variable (CV) systems, but also negate the necessity for trusted nodes, as seen with the measurement-device independ…
▽ More
As quantum key distribution (QKD) emerges as a robust defense against quantum computer threats, significant advancements have been realized by researchers. A pivotal focus has been the development of protocols that not only simplify hardware implementation like the use of continuous-variable (CV) systems, but also negate the necessity for trusted nodes, as seen with the measurement-device independent (MDI) approach. This paper delves into the integration of these methodologies in the CV-MDI-QKD protocol, offering an in-depth exploration of its evolution, primary characteristics, and the latest advancements in both theory and experiment.
△ Less
Submitted 16 January, 2025;
originally announced January 2025.
-
Continuous-Variable Measurement-Device-Independent Quantum Key Distribution in Free-Space Channels
Authors:
Masoud Ghalaii,
Stefano Pirandola
Abstract:
The field of space communications is the realm of communication technologies where diffraction and atmospheric effects, both of which contribute to loss and noise, become overriding. The pertinent questions here are how and at which rate information (secret keys) can be securely transferred (shared) among users under such supposedly severe circumstances. In the present work we study continuous-var…
▽ More
The field of space communications is the realm of communication technologies where diffraction and atmospheric effects, both of which contribute to loss and noise, become overriding. The pertinent questions here are how and at which rate information (secret keys) can be securely transferred (shared) among users under such supposedly severe circumstances. In the present work we study continuous-variable (CV) quantum key distribution (QKD) in a measurement-device-independent (MDI) configuration over free-space optical (FSO) links. We assess the turbulence regime and provide a composable finite-size key rate analysis of the protocol for FSO links. We study both short-range, horizontal communication links as well as slant paths to, e.g., high-altitude platform station (HAPS) systems.
△ Less
Submitted 13 December, 2022;
originally announced December 2022.
-
Satellite-Based Quantum Key Distribution in the Presence of Bypass Channels
Authors:
Masoud Ghalaii,
Sima Bahrani,
Carlo Liorni,
Federico Grasselli,
Hermann Kampermann,
Lewis Wooltorton,
Rupesh Kumar,
Stefano Pirandola,
Timothy P. Spiller,
Alexander Ling,
Bruno Huttner,
Mohsen Razavi
Abstract:
The security of prepare-and-measure satellite-based quantum key distribution (QKD), under restricted eavesdropping scenarios, is addressed. We particularly consider cases where the eavesdropper, Eve, has limited access to the transmitted signal by Alice, and/or Bob's receiver station. This restriction is modeled by lossy channels between Alice/Bob and Eve, where the transmissivity of such channels…
▽ More
The security of prepare-and-measure satellite-based quantum key distribution (QKD), under restricted eavesdropping scenarios, is addressed. We particularly consider cases where the eavesdropper, Eve, has limited access to the transmitted signal by Alice, and/or Bob's receiver station. This restriction is modeled by lossy channels between Alice/Bob and Eve, where the transmissivity of such channels can, in principle, be bounded by monitoring techniques. An artefact of such lossy channels is the possibility of having {\it bypass} channels, those which are not accessible to Eve, but may not necessarily be characterized by the users either. This creates interesting, unexplored, scenarios for analyzing QKD security. In this paper, we obtain generic bounds on the key rate in the presence of bypass channels and apply them to continuous-variable QKD protocols with Gaussian encoding with direct and reverse reconciliation. We find regimes of operation in which the above restrictions on Eve can considerably improve system performance. We also develop customised bounds for several protocols in the BB84 family and show that, in certain regimes, even the simple protocol of BB84 with weak coherent pulses is able to offer positive key rates at high channel losses, which would otherwise be impossible under an unrestricted Eve. In this case the limitation on Eve would allow Alice to send signals with larger intensities than the optimal value under an ideal Eve, which effectively reduces the effective channel loss. In all these cases, the part of the transmitted signal that does not reach Eve can play a non-trivial role in specifying the achievable key rate. Our work opens up new security frameworks for spaceborne quantum communications systems.
△ Less
Submitted 27 July, 2023; v1 submitted 9 December, 2022;
originally announced December 2022.
-
Composable end-to-end security of Gaussian quantum networks with untrusted relays
Authors:
Masoud Ghalaii,
Panagiotis Papanastasiou,
Stefano Pirandola
Abstract:
Gaussian networks are fundamental objects in network information theory. Here many senders and receivers are connected by physically motivated Gaussian channels while auxiliary Gaussian components, such as Gaussian relays, are entailed. Whilst the theoretical backbone of classical Gaussian networks is well established, the quantum analogue is yet immature. Here, we theoretically tackle composable…
▽ More
Gaussian networks are fundamental objects in network information theory. Here many senders and receivers are connected by physically motivated Gaussian channels while auxiliary Gaussian components, such as Gaussian relays, are entailed. Whilst the theoretical backbone of classical Gaussian networks is well established, the quantum analogue is yet immature. Here, we theoretically tackle composable security of arbitrary Gaussian quantum networks (quantum networks), with generally untrusted nodes, in the finite-size regime. We put forward a general methodology for parameter estimation, which is only based on the data shared by the remote end-users. Taking a chain of identical quantum links as an example, we further demonstrate our study. Additionally, we find that the key rate of a quantum amplifier-assisted chain can ideally beat the fundamental repeaterless limit with practical block sizes. However, this objective is practically questioned leading the way to new network/chain designs.
△ Less
Submitted 20 July, 2022; v1 submitted 22 March, 2022;
originally announced March 2022.
-
Noiseless linear amplification in quantum target detection using Gaussian states
Authors:
Athena Karsa,
Masoud Ghalaii,
Stefano Pirandola
Abstract:
Quantum target detection aims to utilise quantum technologies to achieve performances in target detection not possible through purely classical means. Quantum illumination is an example of this, based on signal-idler entanglement, promising a potential 6 dB advantage in error exponent over its optimal classical counterpart. So far, receiver designs achieving this optimal reception remain elusive w…
▽ More
Quantum target detection aims to utilise quantum technologies to achieve performances in target detection not possible through purely classical means. Quantum illumination is an example of this, based on signal-idler entanglement, promising a potential 6 dB advantage in error exponent over its optimal classical counterpart. So far, receiver designs achieving this optimal reception remain elusive with many proposals based on Gaussian processes appearing unable to utilise quantum information contained within Gaussian state sources. This paper considers the employment of a noiseless linear amplifier at the detection stage of a quantum illumination-based quantum target detection protocol. Such a non-Gaussian amplifier offers a means of probabilistically amplifying an incoming signal without the addition of noise. Considering symmetric hypothesis testing, the quantum Chernoff bound is derived and limits on detection error probability is analysed for both the two-mode squeezed vacuum state and the coherent state classical benchmark. Our findings show that in such a scheme the potential quantum advantage is amplified even in regimes where quantum illumination alone offers no advantage, thereby extending its potential use. The same cannot be said for coherent states, whose performances are generally bounded by that without amplification.
△ Less
Submitted 14 June, 2022; v1 submitted 7 January, 2022;
originally announced January 2022.
-
Quantum communications in a moderate-to-strong turbulent space
Authors:
Masoud Ghalaii,
Stefano Pirandola
Abstract:
Since the invention of the laser in the 60s, one of the most fundamental communication channels has been the free-space optical channel. For this type of channel, a number of effects generally need to be considered, including diffraction, refraction, atmospheric extinction, pointing errors and, most importantly, turbulence. Because of all these adverse features, the free-space optical (FSO) channe…
▽ More
Since the invention of the laser in the 60s, one of the most fundamental communication channels has been the free-space optical channel. For this type of channel, a number of effects generally need to be considered, including diffraction, refraction, atmospheric extinction, pointing errors and, most importantly, turbulence. Because of all these adverse features, the free-space optical (FSO) channel is more difficult to study than a stable fiber-based link. For the same reasons, only recently it has been possible to establish the ultimate performances achievable in quantum communications via free-space channels, together with practical rates for continuous variable (CV) quantum key distribution (QKD). Differently from previous literature, mainly focused on the regime of weak turbulence, this work considers the FSO channel in the more challenging regime of moderate-to-strong turbulence, where effects of beam widening and breaking are more important than beam wandering. This regime may occur in long-distance free-space links on the ground, in uplink to high-altitude platform systems (HAPS) and, more interestingly, in downlink from near-horizon satellites. In such a regime we rigorously investigate ultimate limits for quantum communications and show that composable keys can be extracted using CV-QKD.
△ Less
Submitted 3 February, 2022; v1 submitted 26 July, 2021;
originally announced July 2021.
-
Capacity-approaching quantum repeaters for quantum communications
Authors:
Masoud Ghalaii,
Stefano Pirandola
Abstract:
In present-day quantum communications, one of the main problems is the lack of a quantum repeater design that can simultaneously secure high rates and long distances. Recent literature has established the end-to-end capacities that are achievable by the most general protocols for quantum and private communication within a quantum network, encompassing the case of a quantum repeater chain. However,…
▽ More
In present-day quantum communications, one of the main problems is the lack of a quantum repeater design that can simultaneously secure high rates and long distances. Recent literature has established the end-to-end capacities that are achievable by the most general protocols for quantum and private communication within a quantum network, encompassing the case of a quantum repeater chain. However, whether or not a physical design exists to approach such capacities remains a challenging objective. Driven by this motivation, in this work, we put forward a design for continuous-variable quantum repeaters and show that it can actually achieve the feat. We also show that even in a noisy regime our rates surpass the Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound. Our repeater setup is developed upon using noiseless linear amplifiers, quantum memories, and continuous-variable Bell measurements. We, furthermore, propose a non-ideal model for continuous-variable quantum memories that we make use of in our design. We then show that potential quantum communications rates would deviate from the theoretical capacities, as one would expect, if the quantum link is too noisy and/or low-quality quantum memories and amplifiers are employed.
△ Less
Submitted 8 September, 2020; v1 submitted 14 July, 2020;
originally announced July 2020.
-
Discrete-modulation continuous-variable quantum key distribution enhanced by quantum scissors
Authors:
Masoud Ghalaii,
Carlo Ottaviani,
Rupesh Kumar,
Stefano Pirandola,
Mohsen Razavi
Abstract:
It is known that quantum scissors, as non-deterministic amplifiers, can enhance the performance of Gaussian-modulated continuous-variable quantum key distribution (CV-QKD) in noisy and long-distance regimes of operation. Here, we extend this result to a non-Gaussian CV-QKD protocol with discrete modulation. We show that, by using a proper setting, the use of quantum scissors in the receiver of suc…
▽ More
It is known that quantum scissors, as non-deterministic amplifiers, can enhance the performance of Gaussian-modulated continuous-variable quantum key distribution (CV-QKD) in noisy and long-distance regimes of operation. Here, we extend this result to a non-Gaussian CV-QKD protocol with discrete modulation. We show that, by using a proper setting, the use of quantum scissors in the receiver of such discrete-modulation CV-QKD protocols would allow us to achieve positive secret key rates at high loss and high excess noise regimes of operation, which would have been otherwise impossible. This also keeps the prospect of running discrete-modulation CV-QKD over CV quantum repeaters alive.
△ Less
Submitted 7 January, 2020; v1 submitted 31 July, 2019;
originally announced July 2019.
-
Long-distance continuous-variable quantum key distribution with quantum scissors
Authors:
Masoud Ghalaii,
Carlo Ottaviani,
Rupesh Kumar,
Stefano Pirandola,
Mohsen Razavi
Abstract:
The use of quantum scissors, as candidates for non-deterministic amplifiers, in continuous-variable quantum key distribution systems is investigated. Such devices rely on single-photon sources for their operation and as such, they do not necessarily preserve the Guassianity of the channel. Using exact analytical modeling for system components, we bound the secret key generation rate for the system…
▽ More
The use of quantum scissors, as candidates for non-deterministic amplifiers, in continuous-variable quantum key distribution systems is investigated. Such devices rely on single-photon sources for their operation and as such, they do not necessarily preserve the Guassianity of the channel. Using exact analytical modeling for system components, we bound the secret key generation rate for the system that uses quantum scissors. We find that for non-zero values of excess noise such a system can reach longer distances than the system with no amplification. The prospect of using quantum scissors in continuous-variable quantum repeaters is therefore emboldened.
△ Less
Submitted 7 January, 2020; v1 submitted 5 August, 2018;
originally announced August 2018.
-
Quantum-Classical Access Networks with Embedded Optical Wireless Links
Authors:
Osama Elmabrok,
Masoud Ghalaii,
Mohsen Razavi
Abstract:
We examine the applicability of wireless indoor quantum key distribution (QKD) in hybrid quantum-classical networks. We propose practical configurations that would enable wireless access to such networks. The proposed setups would allow an indoor wireless user, equipped with a QKD-enabled mobile device, to communicate securely with a remote party on the other end of the access network. QKD signals…
▽ More
We examine the applicability of wireless indoor quantum key distribution (QKD) in hybrid quantum-classical networks. We propose practical configurations that would enable wireless access to such networks. The proposed setups would allow an indoor wireless user, equipped with a QKD-enabled mobile device, to communicate securely with a remote party on the other end of the access network. QKD signals, sent through wireless indoor channels, are combined with classical ones and sent over shared fiber links to the remote user. Dense wavelengthdivision multiplexing would enable the simultaneous transmission of quantum and classical signals over the same fiber. We consider the adverse effects of the background noise induced by Raman scattered light on the QKD receivers due to such an integration. In addition, we consider the loss and the background noise that arise from indoor environments. We consider a number of discrete and continuous-variable QKD protocols and study their performance in different scenarios.
△ Less
Submitted 27 January, 2018; v1 submitted 7 July, 2017;
originally announced July 2017.
-
Scheme for coherent-state quantum process tomography via normally-ordered moments
Authors:
M. Ghalaii,
A. T. Rezakhani
Abstract:
Using coherent states in optical quantum process tomography is a practically-relevant approach. Here, we develop a framework for complete characterization of quantum-optical processes in terms of normally-ordered moments by using coherent states as probes. We derive the associated superoperator tensors for several optical processes. We also show that our technique can be used to determine nonclass…
▽ More
Using coherent states in optical quantum process tomography is a practically-relevant approach. Here, we develop a framework for complete characterization of quantum-optical processes in terms of normally-ordered moments by using coherent states as probes. We derive the associated superoperator tensors for several optical processes. We also show that our technique can be used to determine nonclassicality features of quantum-optical states and processes. Furthermore, we investigate identification of multi-mode Gaussian processes and show that the number of necessary probe coherent states scales linearly with the number of modes.
△ Less
Submitted 10 April, 2017;
originally announced April 2017.
-
Quantum imaging with undetected photons as ancilla-assisted process tomography
Authors:
M. Ghalaii,
M. Afsary,
S. Alipour,
A. T. Rezakhani
Abstract:
We show that how a recent experiment of quantum imaging with undetected photons can basically be described as a (partial) ancilla-assisted process tomography. We propose a simplified quantum circuit version of this scenario, which also enables to recast quantum imaging in quantum computation language. Our analogy and analysis may help better understand the role of classical and/or quantum correlat…
▽ More
We show that how a recent experiment of quantum imaging with undetected photons can basically be described as a (partial) ancilla-assisted process tomography. We propose a simplified quantum circuit version of this scenario, which also enables to recast quantum imaging in quantum computation language. Our analogy and analysis may help better understand the role of classical and/or quantum correlations in imaging experiments.
△ Less
Submitted 11 August, 2016; v1 submitted 7 September, 2015;
originally announced September 2015.