-
Measurement-device-independent quantum key distribution: from idea towards application
Authors:
Raju Valivarthi,
Itzel Lucio-Martinez,
Philip Chan,
Allison Rubenok,
Caleb John,
Daniel Korchinski,
Cooper Duffin,
Francesco Marsili,
Varun Verma,
Mathew D. Shaw,
Jeffrey A. Stern,
Sae Woo Nam,
Daniel Oblak,
Qiang Zhou,
Joshua A. Slater,
Wolfgang Tittel
Abstract:
We assess the overall performance of our quantum key distribution (QKD) system implementing the measurement-device-independent (MDI) protocol using components with varying capabilities such as different single photon detectors and qubit preparation hardware. We experimentally show that superconducting nanowire single photon detectors allow QKD over a channel featuring 60 dB loss, and QKD with more…
▽ More
We assess the overall performance of our quantum key distribution (QKD) system implementing the measurement-device-independent (MDI) protocol using components with varying capabilities such as different single photon detectors and qubit preparation hardware. We experimentally show that superconducting nanowire single photon detectors allow QKD over a channel featuring 60 dB loss, and QKD with more than 600 bits of secret key per second (not considering finite key effects) over a 16 dB loss channel. This corresponds to 300 km and 80 km of standard telecommunication fiber, respectively. We also demonstrate that the integration of our QKD system into FPGA-based hardware (instead of state-of-the-art arbitrary waveform generators) does not impact on its performance. Our investigation allows us to acquire an improved understanding of the trade-offs between complexity, cost and system performance, which is required for future customization of MDI-QKD. Given that our system can be operated outside the laboratory over deployed fiber, we conclude that MDI-QKD is a promising approach to information-theoretic secure key distribution.
△ Less
Submitted 28 January, 2015;
originally announced January 2015.
-
Efficient Bell state analyzer for time-bin qubits with fast-recovery WSi superconducting single photon detectors
Authors:
Raju Valivarthi,
Itzel Lucio-Martinez,
Allison Rubenok,
Philip Chan,
Francesco Marsili,
Varun B. Verma,
Matthew D. Shaw,
J. A. Stern,
Joshua A. Slater,
Daniel Oblak,
Sae Woo Nam,
Wolfgang Tittel
Abstract:
We experimentally demonstrate a high-efficiency Bell state measurement for time-bin qubits that employs two superconducting nanowire single-photon detectors with short dead-times, allowing projections onto two Bell states, |Psi>- and |Psi+>. Compared to previous implementations for time-bin qubits, this yields an increase in the efficiency of Bell state analysis by a factor of thirty.
We experimentally demonstrate a high-efficiency Bell state measurement for time-bin qubits that employs two superconducting nanowire single-photon detectors with short dead-times, allowing projections onto two Bell states, |Psi>- and |Psi+>. Compared to previous implementations for time-bin qubits, this yields an increase in the efficiency of Bell state analysis by a factor of thirty.
△ Less
Submitted 21 October, 2014; v1 submitted 17 October, 2014;
originally announced October 2014.
-
Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks
Authors:
Allison Rubenok,
Joshua A. Slater,
Philip Chan,
Itzel Lucio-Martinez,
Wolfgang Tittel
Abstract:
Several vulnerabilities of single photon detectors have recently been exploited to compromise the security of quantum key distribution (QKD) systems. In this letter we report the first proof-of-principle implementation of a new quantum key distribution protocol that is immune to any such attack. More precisely, we demonstrated this new approach to QKD in the laboratory over more than 80 km of spoo…
▽ More
Several vulnerabilities of single photon detectors have recently been exploited to compromise the security of quantum key distribution (QKD) systems. In this letter we report the first proof-of-principle implementation of a new quantum key distribution protocol that is immune to any such attack. More precisely, we demonstrated this new approach to QKD in the laboratory over more than 80 km of spooled fiber, as well as across different locations within the city of Calgary. The robustness of our fibre-based implementation, together with the enhanced level of security offered by the protocol, confirms QKD as a realistic technology for safeguarding secrets in transmission. Furthermore, our demonstration establishes the feasibility of controlled two-photon interference in a real-world environment, and thereby removes a remaining obstacle to realizing future applications of quantum communication, such as quantum repeaters and, more generally, quantum networks.
△ Less
Submitted 9 April, 2013;
originally announced April 2013.
-
Performing private database queries in a real-world environment using a quantum protocol
Authors:
Philip Chan,
Itzel Lucio-Martinez,
Xiaofan Mo,
Christoph Simon,
Wolfgang Tittel
Abstract:
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of…
▽ More
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that database cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.
△ Less
Submitted 15 October, 2013; v1 submitted 4 March, 2013;
originally announced March 2013.
-
Modeling a measurement-device-independent quantum key distribution system
Authors:
Philip Chan,
Joshua A. Slater,
Itzel Lucio-Martinez,
Allison Rubenok,
Wolfgang Tittel
Abstract:
We present a detailed description of a widely applicable mathematical model for quantum key distribution (QKD) systems implementing the measurement-device-independent (MDI) protocol. The model is tested by comparing its predictions with data taken using a proof-of-principle, time-bin qubit-based QKD system in a secure laboratory environment (i.e. in a setting in which eavesdropping can be excluded…
▽ More
We present a detailed description of a widely applicable mathematical model for quantum key distribution (QKD) systems implementing the measurement-device-independent (MDI) protocol. The model is tested by comparing its predictions with data taken using a proof-of-principle, time-bin qubit-based QKD system in a secure laboratory environment (i.e. in a setting in which eavesdropping can be excluded). The good agreement between the predictions and the experimental data allows the model to be used to optimize mean photon numbers per attenuated laser pulse, which are used to encode quantum bits. This in turn allows optimization of secret key rates of existing MDI-QKD systems, identification of rate-limiting components, and projection of future performance. In addition, we also performed measurements over deployed fiber, showing that our system's performance is not affected by environment-induced perturbations.
△ Less
Submitted 20 May, 2014; v1 submitted 3 April, 2012;
originally announced April 2012.
-
Quantum Key Distribution
Authors:
Philip Chan,
Itzel Lucio-MartÃnez,
Xiaofan Mo,
Wolfgang Tittel
Abstract:
This chapter describes the application of lasers, specifically diode lasers, in the area of quantum key distribution (QKD). First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduction to QKD assuming the reader has no or very little knowledge about cryptography, and briefly present the state-of-the-art of QKD. In the second hal…
▽ More
This chapter describes the application of lasers, specifically diode lasers, in the area of quantum key distribution (QKD). First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduction to QKD assuming the reader has no or very little knowledge about cryptography, and briefly present the state-of-the-art of QKD. In the second half of the chapter we describe, as an example of a real-world QKD system, the system deployed between the University of Calgary and SAIT Polytechnic. We conclude the chapter with a brief discussion of quantum networks and future steps.
△ Less
Submitted 18 November, 2011;
originally announced November 2011.
-
Characterization of an InGaAs/InP single-photon detector at 200 MHz gate rate
Authors:
Chris Healey,
Itzel Lucio-Martinez,
Michael R. E. Lamont,
Xiaofan Mo,
Wolfgang Tittel
Abstract:
We characterize a near-infrared single-photon detector based on an InGaAs/InP avalanche photodiode and the self-differencing post-processing technique. It operates at gate rates of 200 MHz and higher. The compact, integrated design employs printed circuit boards and features a semiconductor-based self-differencing subtraction implemented with a fully differential amplifier. At a single-photon dete…
▽ More
We characterize a near-infrared single-photon detector based on an InGaAs/InP avalanche photodiode and the self-differencing post-processing technique. It operates at gate rates of 200 MHz and higher. The compact, integrated design employs printed circuit boards and features a semiconductor-based self-differencing subtraction implemented with a fully differential amplifier. At a single-photon detection efficiency of 6.4%, the detector has a dark count probability of 9x10^-7 per gate, an afterpulse probability of 6.3% per detection event, a detection time jitter of 150 ps, and a dead time of 5 ns (equivalent to one gate period). Furthermore, it can be operated as a standard photodiode, which benefits applications that require detecting single photons as well as strong light signals.
△ Less
Submitted 18 May, 2011;
originally announced May 2011.