-
A blueprint for large-scale quantum-network deployments
Authors:
Alberto Sebastián-Lombraña,
Hans H. Brunner,
Juan P. Brito,
Rubén B. Méndez,
Rafael J. Vicente,
Jaime S. Buruaga,
Laura Ortiz,
Chi-Hang Fred Fung,
Momtchil Peev,
José M. Rivas-Moscoso,
Felipe Jiménez,
Antonio Pastor,
Diego R. López,
Jesús Folgueira,
Vicente Martín
Abstract:
Quantum Communications is a field that promises advances in cryptography, quantum computing and clock synchronisation, among other potential applications. However, communication based on quantum phenomena requires an extreme level of isolation from external disturbances, making the transmission of quantum signals together with classical ones difficult. A range of techniques has been tested to intr…
▽ More
Quantum Communications is a field that promises advances in cryptography, quantum computing and clock synchronisation, among other potential applications. However, communication based on quantum phenomena requires an extreme level of isolation from external disturbances, making the transmission of quantum signals together with classical ones difficult. A range of techniques has been tested to introduce quantum communications in already deployed optical networks which also carry legacy traffic. This comes with challenges, not only at the physical layer but also at the operations and management layer. To achieve a broad acceptance among network operators, the joint management and operation of quantum and classical resources, compliance with standards, and quality and legal assurance need to be addressed. This article presents a detailed account of solutions to the above issues, deployed and evaluated in the MadQCI (Madrid Quantum Communication Infrastructure) testbed. This network is designed to integrate quantum communications in the telecommunications ecosystem by installing quantum-key-distribution modules from multiple providers in production nodes of two different operators. The modules were connected through an optical-switched network with more than 130 km of deployed optical fibre. The tests were done in compliance with strict service level agreements that protected the legacy traffic of the pre-existing classical network. The goal was to achieve full quantum-classical compatibility at all levels, while limiting the modifications of optical transport and encryption and complying with as many standards as possible. This effort was intended to serve as a blueprint, which can be used as the foundation of large-scale quantum network deployments. To demonstrate the capabilities of MadQCI, end-to-end encryption services were deployed and a variety of use-cases were showcased.
△ Less
Submitted 26 December, 2024; v1 submitted 2 September, 2024;
originally announced September 2024.
-
MadQCI: a heterogeneous and scalable SDN QKD network deployed in production facilities
Authors:
V. Martin,
J. P. Brito,
L. Ortiz,
R. B. Mendez,
J. S. Buruaga,
R. J. Vicente,
A. Sebastián-Lombraña,
D. Rincon,
F. Perez,
C. Sanchez,
M. Peev,
H. H. Brunner,
F. Fung,
A. Poppe,
F. Fröwis,
A. J. Shields,
R. I. Woodward,
H. Griesser,
S. Roehrich,
F. De La Iglesia,
C. Abellan,
M. Hentschel,
J. M. Rivas-Moscoso,
A. Pastor,
J. Folgueira
, et al. (1 additional authors not shown)
Abstract:
Current quantum key distribution (QKD) networks focus almost exclusively on transporting secret keys with the highest possible rate. Consequently, they are built as mostly fixed, ad hoc, logically, and physically isolated infrastructures designed to avoid any penalty to the quantum channel. This architecture is neither scalable nor cost-effective and future, real-world deployments will differ cons…
▽ More
Current quantum key distribution (QKD) networks focus almost exclusively on transporting secret keys with the highest possible rate. Consequently, they are built as mostly fixed, ad hoc, logically, and physically isolated infrastructures designed to avoid any penalty to the quantum channel. This architecture is neither scalable nor cost-effective and future, real-world deployments will differ considerably. The structure of the MadQCI QKD network presented here is based on disaggregated components and modern paradigms especially designed for flexibility, upgradability, and facilitating the integration of QKD in the security and telecommunications-networks ecosystem. These underlying ideas have been tested by deploying many QKD systems from several manufacturers in a real-world, multi-tenant telecommunications network, installed in production facilities and sharing the infrastructure with commercial traffic. Different technologies have been used in different links to address the variety of situations and needs that arise in real networks, exploring a wide range of possibilities. Finally, a set of realistic use cases have been implemented to demonstrate the validity and performance of the network. The testing took place during a period close to three years, where most of the nodes were continuously active.
△ Less
Submitted 3 December, 2023; v1 submitted 21 November, 2023;
originally announced November 2023.
-
Linking QKD testbeds across Europe
Authors:
Max Brauer,
Rafael J. Vicente,
Jaime S. Buruaga,
Ruben B. Mendez,
Ralf-Peter Braun,
Marc Geitz,
Piotr Rydlichkowski,
Hans H. Brunner,
Fred Fung,
Momtchil Peev,
Antonio Pastor,
Diego Lopez,
Vicente Martin,
Juan P. Brito
Abstract:
Quantum-key-distribution (QKD) networks are gaining importance and it has become necessary to analyze the most appropriate methods for their long-distance interconnection. In this paper, four different methods of interconnecting remote QKD networks are proposed. The methods are used to link three different QKD testbeds in Europe, located in Berlin, Madrid, and Poznan. Although long-distance QKD li…
▽ More
Quantum-key-distribution (QKD) networks are gaining importance and it has become necessary to analyze the most appropriate methods for their long-distance interconnection. In this paper, four different methods of interconnecting remote QKD networks are proposed. The methods are used to link three different QKD testbeds in Europe, located in Berlin, Madrid, and Poznan. Although long-distance QKD links are only emulated, the used methods can serve as a blueprint for a secure interconnection of distant QKD networks in the future. Specifically, the presented approaches combine, in a transparent way, different fiber and satellite physical media, as well as common standards of key-delivery interfaces. The testbed interconnections are designed to increase the security by utilizing multipath techniques and multiple hybridizations of QKD and post quantum cryptography (PQC) algorithms.
△ Less
Submitted 10 January, 2024; v1 submitted 14 November, 2023;
originally announced November 2023.
-
A Dynamical Yukawa$_{2}$ Model
Authors:
Ajay Chandra,
Martin Hairer,
Martin Peev
Abstract:
We prove local (in space and time) well-posedness for a mildly regularised version of the stochastic quantisation of the Yukawa$_{2}$ Euclidean field theory with a self-interacting boson. Our regularised dynamic is still singular but avoids non-local divergences, allowing us to use a version of the Da Prato--Debussche argument. This model is a test case for a non-commutative probability framework…
▽ More
We prove local (in space and time) well-posedness for a mildly regularised version of the stochastic quantisation of the Yukawa$_{2}$ Euclidean field theory with a self-interacting boson. Our regularised dynamic is still singular but avoids non-local divergences, allowing us to use a version of the Da Prato--Debussche argument. This model is a test case for a non-commutative probability framework for formulating the kind of singular SPDEs arising in the stochastic quantisation of field theories mixing both bosons and fermions.
△ Less
Submitted 6 March, 2024; v1 submitted 12 May, 2023;
originally announced May 2023.
-
Towards European Standards for Quantum Technologies
Authors:
O. van Deventer,
N. Spethmann,
M. Loeffler,
M. Amoretti,
R. van den Brink,
N. Bruno,
P. Comi,
N. Farrugia,
M. Gramegna,
B. Kassenberg,
W. Kozlowski,
T. Länger,
T. Lindstrom,
V. Martin,
N. Neumann,
H. Papadopoulos,
S. Pascazio,
M. Peev,
R. Pitwon,
M. A. Rol,
P. Traina,
P. Venderbosch,
F. K. Wilhelm-Mauch,
A. Jenet
Abstract:
The Second Quantum Revolution facilitates the engineering of new classes of sensors, communication technologies, and computers with unprecedented capabilities. Supply chains for quantum technologies are emerging, some focussed on commercially available components for enabling technologies and/or quantum-technologies research infrastructures, others with already higher technology-readiness levels,…
▽ More
The Second Quantum Revolution facilitates the engineering of new classes of sensors, communication technologies, and computers with unprecedented capabilities. Supply chains for quantum technologies are emerging, some focussed on commercially available components for enabling technologies and/or quantum-technologies research infrastructures, others with already higher technology-readiness levels, near to the market.
In 2018, the European Commission has launched its large-scale and long-term Quantum Flagship research initiative to support and foster the creation and development of a competitive European quantum technologies industry, as well as the consolidation and expansion of leadership and excellence in European quantum technology research. One of the measures to achieve an accelerated development and uptake has been identified by the Quantum Flagship in its Strategic Research Agenda: the promotion of coordinated, dedicated standardisation and certification efforts. Standardisation is indeed of paramount importance to facilitate the growth of new technologies, and the development of efficient and effective supply chains. The harmonisation of technologies, methodologies, and interfaces enables interoperable products, innovation, and competition, all leading to structuring and hence growth of markets. As quantum technologies are maturing, time has come to start thinking about further standardisation needs.
This article presents insights on standardisation for quantum technologies from the perspective of the CEN-CENELEC Focus Group on Quantum Technologies (FGQT), which was established in June 2020 to coordinate and support the development of standards relevant for European industry and research.
△ Less
Submitted 3 October, 2022; v1 submitted 3 March, 2022;
originally announced March 2022.
-
The Engineering of Software-Defined Quantum Key Distribution Networks
Authors:
Alejandro Aguado,
Victor Lopez,
Diego Lopez,
Momtchil Peev,
Andreas Poppe,
Antonio Pastor,
Jesus Folgueira,
Vicente Martiin
Abstract:
Quantum computers will change the cryptographic panorama. A technology once believed to lay far away into the future is increasingly closer to real world applications. Quantum computers will break the algorithms used in our public key infrastructure and in our key exchange protocols, forcing a complete retooling of the cryptography as we know it. Quantum Key distribution is a physical layer techno…
▽ More
Quantum computers will change the cryptographic panorama. A technology once believed to lay far away into the future is increasingly closer to real world applications. Quantum computers will break the algorithms used in our public key infrastructure and in our key exchange protocols, forcing a complete retooling of the cryptography as we know it. Quantum Key distribution is a physical layer technology immune to quantum or classical computational threats. However, it requires a physical substrate, and optical fiber has been the usual choice. Most of the time used just as a point to point link for the exclusive transport of the delicate quantum signals. Its integration in a real-world shared network has not been attempted so far. Here we show how the new programmable software network architectures, together with specially designed quantum systems can be used to produce a network that integrates classical and quantum communications, including management, in a single, production-level infrastructure. The network can also incorporate new quantum-safe algorithms and use the existing security protocols, thus bridging the gap between today's network security and the quantum-safe network of the future. This can be done in an evolutionary way, without zero-day migrations and the corresponding upfront costs. We also present how the technologies have been deployed in practice using a production network.
△ Less
Submitted 29 June, 2019;
originally announced July 2019.
-
A Novel Approach to Quality of Service Provisioning in Trusted Relay Quantum Key Distribution Networks
Authors:
Miralem Mehic,
Peppino Fazio,
Stefan Rass,
Oliver Maurhart,
Momtchil Peev,
Andreas Poppe,
Jan Rozhon,
Marcin Niemiec,
Miroslav Voznak
Abstract:
In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity between mobile ad-hoc networks and QKD technology, we pr…
▽ More
In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many practical difficulties still need to be resolved. Inspired by the significant similarity between mobile ad-hoc networks and QKD technology, we propose a novel quality of service (QoS) model including new metrics for determining the states of public and quantum channels as well as a comprehensive metric of the QKD link. We also propose a novel routing protocol to achieve high-level scalability and minimize consumption of cryptographic keys. Given the limited mobility of nodes in QKD networks, our routing protocol uses the geographical distance and calculated link states to determine the optimal route. It also benefits from a caching mechanism and detection of returning loops to provide effective forwarding while minimizing key consumption and achieving the desired utilization of network links. Simulation results are presented to demonstrate the validity and accuracy of the proposed solutions.
△ Less
Submitted 10 October, 2018; v1 submitted 9 October, 2018;
originally announced October 2018.
-
Pilot-assisted intradyne reception for high-speed continuous-variable quantum key distribution with true local oscillator
Authors:
Fabian Laudenbach,
Bernhard Schrenk,
Christoph Pacher,
Michael Hentschel,
Chi-Hang Fred Fung,
Fotini Karinou,
Andreas Poppe,
Momtchil Peev,
Hannes Hübel
Abstract:
We present a pilot-assisted coherent intradyne reception methodology for CV-QKD with true local oscillator. An optically phase-locked reference tone, prepared using carrier-suppressed optical single-sideband modulation, is multiplexed in polarisation and frequency to the 250 Mbaud quantum signal in order to provide optical frequency- and phase matching between quantum signal and local oscillator.…
▽ More
We present a pilot-assisted coherent intradyne reception methodology for CV-QKD with true local oscillator. An optically phase-locked reference tone, prepared using carrier-suppressed optical single-sideband modulation, is multiplexed in polarisation and frequency to the 250 Mbaud quantum signal in order to provide optical frequency- and phase matching between quantum signal and local oscillator. Our concept allows for high symbol rates and can be operated at an extremely low excess-noise level, as validated by experimental measurements.
△ Less
Submitted 3 October, 2019; v1 submitted 29 December, 2017;
originally announced December 2017.
-
Continuous-Variable Quantum Key Distribution with Gaussian Modulation -- The Theory of Practical Implementations
Authors:
Fabian Laudenbach,
Christoph Pacher,
Chi-Hang Fred Fung,
Andreas Poppe,
Momtchil Peev,
Bernhard Schrenk,
Michael Hentschel,
Philip Walther,
Hannes Hübel
Abstract:
Quantum key distribution using weak coherent states and homodyne detection is a promising candidate for practical quantum-cryptographic implementations due to its compatibility with existing telecom equipment and high detection efficiencies. However, despite the actual simplicity of the protocol, the security analysis of this method is rather involved compared to discrete-variable QKD. In this art…
▽ More
Quantum key distribution using weak coherent states and homodyne detection is a promising candidate for practical quantum-cryptographic implementations due to its compatibility with existing telecom equipment and high detection efficiencies. However, despite the actual simplicity of the protocol, the security analysis of this method is rather involved compared to discrete-variable QKD. In this article we review the theoretical foundations of continuous-variable quantum key distribution (CV-QKD) with Gaussian modulation and rederive the essential relations from scratch in a pedagogical way. The aim of this paper is to be as comprehensive and self-contained as possible in order to be well intelligible even for readers with little pre-knowledge on the subject. Although the present article is a theoretical discussion of CV-QKD, its focus lies on practical implementations, taking into account various kinds of hardware imperfections and suggesting practical methods to perform the security analysis subsequent to the key exchange. Apart from a review of well known results, this manuscript presents a set of new original noise models which are helpful to get an estimate of how well a given set of hardware will perform in practice.
△ Less
Submitted 10 May, 2018; v1 submitted 27 March, 2017;
originally announced March 2017.
-
Space QUEST mission proposal: Experimentally testing decoherence due to gravity
Authors:
Siddarth Koduru Joshi,
Jacques Pienaar,
Timothy C. Ralph,
Luigi Cacciapuoti,
Will McCutcheon,
John Rarity,
Dirk Giggenbach,
Jin Gyu Lim,
Vadim Makarov,
Ivette Fuentes,
Thomas Scheidl,
Erik Beckert,
Mohamed Bourennane,
David Edward Bruschi,
Adan Cabello,
Jose Capmany,
Alberto Carrasco-Casado,
Eleni Diamanti,
Miloslav Duusek,
Dominique Elser,
Angelo Gulinatti,
Robert H. Hadfield,
Thomas Jennewein,
Rainer Kaltenbaek,
Michael A. Krainak
, et al. (20 additional authors not shown)
Abstract:
Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph,…
▽ More
Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph, G J Milburn, and T Downes, Phys. Rev. A, 79(2):22121, 2009, T C Ralph and J Pienaar, New Journal of Physics, 16(8):85008, 2014], a bipartite entangled system could decohere if each particle traversed through a different gravitational field gradient. We propose to study this effect in a ground to space uplink scenario. We extend the above theoretical predictions of Ralph and coworkers and discuss the scientific consequences of detecting/failing to detect the predicted gravitational decoherence. We present a detailed mission design of the European Space Agency's (ESA) Space QUEST (Space - Quantum Entanglement Space Test) mission, and study the feasibility of the mission schema.
△ Less
Submitted 9 January, 2018; v1 submitted 23 March, 2017;
originally announced March 2017.
-
A Differential Phase Shift Scheme for Quantum Key Distribution in Passive Optical Networks
Authors:
Michael Hentschel,
Andreas Poppe,
Bernhard Schrenk,
Momtchil Peev,
Edwin Querasser,
Roland Lieger
Abstract:
We propose a scheme for quantum key distribution (QKD) in a passive optical network (PON) based on differential phase shift (DPS) coding. A centralized station including all expensive components serves many users, making it suitable for a true multi-user network in a local environment with moderate distances on the order of a few kilometers. The emphasis lies on an asymmetric design for cost effec…
▽ More
We propose a scheme for quantum key distribution (QKD) in a passive optical network (PON) based on differential phase shift (DPS) coding. A centralized station including all expensive components serves many users, making it suitable for a true multi-user network in a local environment with moderate distances on the order of a few kilometers. The emphasis lies on an asymmetric design for cost effective implementation of network end points.
△ Less
Submitted 19 December, 2014;
originally announced December 2014.
-
Entanglement Distribution in Optical Networks
Authors:
Alex Ciurana,
Vicente Martin,
Jesus Martinez-Mateo,
Bernhard Schrenk,
Momtchil Peev,
Andreas Poppe
Abstract:
The ability to generate entangled photon-pairs over a broad wavelength range opens the door to the simultaneous distribution of entanglement to multiple users in a network by using centralized sources and flexible wavelength-division multiplexing schemes. Here we show the design of a metropolitan optical network consisting of tree-type access networks whereby entangled photon-pairs are distributed…
▽ More
The ability to generate entangled photon-pairs over a broad wavelength range opens the door to the simultaneous distribution of entanglement to multiple users in a network by using centralized sources and flexible wavelength-division multiplexing schemes. Here we show the design of a metropolitan optical network consisting of tree-type access networks whereby entangled photon-pairs are distributed to any pair of users, independent of their location. The network is constructed employing commercial off-the-shelf components and uses the existing infrastructure, which allows for moderate deployment costs. We further develop a channel plan and a network-architecture design to provide a direct optical path between any pair of users, thus allowing classical and one-way quantum communication as well as entanglement distribution. This allows the simultaneous operation of multiple quantum information technologies. Finally, we present a more flexible backbone architecture that pushes away the load limitations of the original network design by extending its reach, number of users and capabilities.
△ Less
Submitted 21 September, 2014;
originally announced September 2014.
-
A simple and robust method for characterization of afterpulsing in single photon detectors
Authors:
Gerhard Humer,
Momtchil Peev,
Christoph Schaeff,
Sven Ramelow,
Mario Stipčević,
Rupert Ursin
Abstract:
Single photon detectors are important for a wide range of applications each with their own specific requirements, which makes necessary the precise characterization of detectors. Here, we present a simple and accurate methodology of characterizing dark count rate, detection efficiency, and after-pulsing in single photon detectors purely based on their counting statistics. We demonstrate our new me…
▽ More
Single photon detectors are important for a wide range of applications each with their own specific requirements, which makes necessary the precise characterization of detectors. Here, we present a simple and accurate methodology of characterizing dark count rate, detection efficiency, and after-pulsing in single photon detectors purely based on their counting statistics. We demonstrate our new method on a custom-made, free-running single photon detector based on an InGaAs based avalanche photo diode (APD), though the methodology presented here is applicable for any type of single photon detector.
△ Less
Submitted 22 September, 2014; v1 submitted 7 September, 2014;
originally announced September 2014.
-
Demystifying the Information Reconciliation Protocol Cascade
Authors:
Jesus Martinez-Mateo,
Christoph Pacher,
Momtchil Peev,
Alex Ciurana,
Vicente Martin
Abstract:
Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and,…
▽ More
Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and, although its efficiency is not optimal, it has become the de-facto standard for practical implementations of information reconciliation in quantum key distribution. The aim of this work is to analyze the performance of Cascade, to discuss its strengths, weaknesses and optimization possibilities, comparing with some of the modified versions that have been proposed in the literature. When looking at all design trade-offs, a new view emerges that allows to put forward a number of guidelines and propose near optimal parameters for the practical implementation of Cascade improving performance significantly in comparison with all previous proposals.
△ Less
Submitted 22 December, 2014; v1 submitted 11 July, 2014;
originally announced July 2014.
-
Quantum Metropolitan Optical Network based on Wavelength Division Multiplexing
Authors:
Alex Ciurana,
Jesus Martinez-Mateo,
Momtchil Peev,
Andreas Poppe,
Nino Walenta,
Hugo Zbinden,
Vicente Martin
Abstract:
Quantum Key Distribution (QKD) is maturing quickly. However, the current approaches to its application in optical networks make it an expensive technology. QKD networks deployed to date are designed as a collection of point-to-point, dedicated QKD links where non-neighboring nodes communicate using the trusted repeater paradigm. We propose a novel optical network model in which QKD systems share t…
▽ More
Quantum Key Distribution (QKD) is maturing quickly. However, the current approaches to its application in optical networks make it an expensive technology. QKD networks deployed to date are designed as a collection of point-to-point, dedicated QKD links where non-neighboring nodes communicate using the trusted repeater paradigm. We propose a novel optical network model in which QKD systems share the communication infrastructure by wavelength multiplexing their quantum and classical signals. The routing is done using optical components within a metropolitan area which allows for a dynamically any-to-any communication scheme. Moreover, it resembles a commercial telecom network, takes advantage of existing infrastructure and utilizes commercial components, allowing for an easy, cost-effective and reliable deployment.
△ Less
Submitted 16 September, 2013;
originally announced September 2013.
-
Attacks on quantum key distribution protocols that employ non-ITS authentication
Authors:
Christoph Pacher,
Aysajan Abidin,
Thomas Lorünser,
Momtchil Peev,
Rupert Ursin,
Anton Zeilinger,
Jan-Åke Larsson
Abstract:
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a s…
▽ More
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols.
In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity.
Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD-postprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
△ Less
Submitted 31 August, 2015; v1 submitted 3 September, 2012;
originally announced September 2012.
-
Field test of quantum key distribution in the Tokyo QKD Network
Authors:
M. Sasaki,
M. Fujiwara,
H. Ishizuka,
W. Klaus,
K. Wakui,
M. Takeoka,
A. Tanaka,
K. Yoshino,
Y. Nambu,
S. Takahashi,
A. Tajima,
A. Tomita,
T. Domeki,
T. Hasegawa,
Y. Sakai,
H. Kobayashi,
T. Asai,
K. Shimizu,
T. Tokura,
T. Tsurumaru,
M. Matsui,
T. Honjo,
K. Tamaki,
H. Takesue,
Y. Tokura
, et al. (18 additional authors not shown)
Abstract:
A novel secure communication network with quantum key distribution in a metropolitan area is reported. Different QKD schemes are integrated to demonstrate secure TV conferencing over a distance of 45km, stable long-term operation, and application to secure mobile phones.
A novel secure communication network with quantum key distribution in a metropolitan area is reported. Different QKD schemes are integrated to demonstrate secure TV conferencing over a distance of 45km, stable long-term operation, and application to secure mobile phones.
△ Less
Submitted 18 March, 2011;
originally announced March 2011.
-
Quantum Interference between a Single-Photon Fock State and a Coherent State
Authors:
Armin Windhager,
Martin Suda,
Christoph Pacher,
Momtchil Peev,
Andreas Poppe
Abstract:
We derive analytical expressions for the single mode quantum field state at the individual output ports of a beam splitter when a single-photon Fock state and a coherent state are incident on the input ports. The output states turn out to be a statistical mixture between a displaced Fock state and a coherent state. Consequently we are able to find an analytical expression for the corresponding Wig…
▽ More
We derive analytical expressions for the single mode quantum field state at the individual output ports of a beam splitter when a single-photon Fock state and a coherent state are incident on the input ports. The output states turn out to be a statistical mixture between a displaced Fock state and a coherent state. Consequently we are able to find an analytical expression for the corresponding Wigner function. Because of the generality of our calculations the obtained results are valid for all passive and lossless optical four port devices. We show further how the results can be adapted to the case of the Mach-Zehnder interferometer. In addition we consider the case for which the single-photon Fock state is replaced with a general input state: a coherent input state displaces each general quantum state at the output port of a beam splitter with the displacement parameter being the amplitude of the coherent state.
△ Less
Submitted 16 February, 2011; v1 submitted 9 September, 2010;
originally announced September 2010.
-
Updating Quantum Cryptography Report ver. 1
Authors:
Donna Dodson,
Mikio Fujiwara,
Philippe Grangier,
Masahito Hayashi,
Kentaro Imafuku,
Ken-ichi Kitayama,
Prem Kumar,
Christian Kurtsiefer,
Gaby Lenhart,
Norbert Luetkenhaus,
Tsutomu Matsumoto,
William J. Munro,
Tsuyoshi Nishioka,
Momtchil Peev,
Masahide Sasaki,
Yutaka Sata,
Atsushi Takada,
Masahiro Takeoka,
Kiyoshi Tamaki,
Hidema Tanaka,
Yasuhiro Tokura,
Akihisa Tomita,
Morio Toyoshima,
Rodney van Meter,
Atsuhiro Yamagishi
, et al. (2 additional authors not shown)
Abstract:
Quantum cryptographic technology (QCT) is expected to be a fundamental technology for realizing long-term information security even against as-yet-unknown future technologies. More advanced security could be achieved using QCT together with contemporary cryptographic technologies. To develop and spread the use of QCT, it is necessary to standardize devices, protocols, and security requirements a…
▽ More
Quantum cryptographic technology (QCT) is expected to be a fundamental technology for realizing long-term information security even against as-yet-unknown future technologies. More advanced security could be achieved using QCT together with contemporary cryptographic technologies. To develop and spread the use of QCT, it is necessary to standardize devices, protocols, and security requirements and thus enable interoperability in a multi-vendor, multi-network, and multi-service environment. This report is a technical summary of QCT and related topics from the viewpoints of 1) consensual establishment of specifications and requirements of QCT for standardization and commercialization and 2) the promotion of research and design to realize New-Generation Quantum Cryptography.
△ Less
Submitted 27 May, 2009;
originally announced May 2009.
-
Security of Trusted Repeater Quantum Key Distribution Networks
Authors:
Louis Salvail,
Momtchil Peev,
Eleni Diamanti,
Romain Alleaume,
Norbert Lutkenhaus,
Thomas Laenger
Abstract:
A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security. In this paper we study security properties of QKD networks based on trusted repeater nodes. Such networks can already be deployed, based on current technology. We present an example of a trusted repeater QKD network, developed w…
▽ More
A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security. In this paper we study security properties of QKD networks based on trusted repeater nodes. Such networks can already be deployed, based on current technology. We present an example of a trusted repeater QKD network, developed within the SECOQC project.
The main focus is put on the study of secure key agreement over a trusted repeater QKD network, when some nodes are corrupted. We propose an original method, able to ensure the authenticity and privacy of the generated secret keys.
△ Less
Submitted 26 April, 2009;
originally announced April 2009.
-
Space-QUEST: Experiments with quantum entanglement in space
Authors:
Rupert Ursin,
Thomas Jennewein,
Johannes Kofler,
Josep M. Perdigues,
Luigi Cacciapuoti,
Clovis J. de Matos,
Markus Aspelmeyer,
Alejandra Valencia,
Thomas Scheidl,
Alessandro Fedrizzi,
Antonio Acin,
Cesare Barbieri,
Giuseppe Bianco,
Caslav Brukner,
Jose Capmany,
Sergio Cova,
Dirk Giggenbach,
Walter Leeb,
Robert H. Hadfield,
Raymond Laflamme,
Norbert Lutkenhaus,
Gerard Milburn,
Momtchil Peev,
Timothy Ralph,
John Rarity
, et al. (14 additional authors not shown)
Abstract:
The European Space Agency (ESA) has supported a range of studies in the field of quantum physics and quantum information science in space for several years, and consequently we have submitted the mission proposal Space-QUEST (Quantum Entanglement for Space Experiments) to the European Life and Physical Sciences in Space Program. We propose to perform space-to-ground quantum communication tests f…
▽ More
The European Space Agency (ESA) has supported a range of studies in the field of quantum physics and quantum information science in space for several years, and consequently we have submitted the mission proposal Space-QUEST (Quantum Entanglement for Space Experiments) to the European Life and Physical Sciences in Space Program. We propose to perform space-to-ground quantum communication tests from the International Space Station (ISS). We present the proposed experiments in space as well as the design of a space based quantum communication payload.
△ Less
Submitted 5 June, 2008;
originally announced June 2008.
-
Outline of the SECOQC Quantum-Key-Distribution Network in Vienna
Authors:
Andreas Poppe,
Momtchil Peev,
Oliver Maurhart
Abstract:
A Quantum Key Distribution (QKD) network is currently implemented in Vienna by integrating seven QKD-Link devices that connect five subsidiaries of SIEMENS Austria. We give an architectural overview of the network and present the enabling QKD-technologies, as well as the novel QKD network protocols.
A Quantum Key Distribution (QKD) network is currently implemented in Vienna by integrating seven QKD-Link devices that connect five subsidiaries of SIEMENS Austria. We give an architectural overview of the network and present the enabling QKD-technologies, as well as the novel QKD network protocols.
△ Less
Submitted 1 April, 2008;
originally announced April 2008.
-
The Security of Practical Quantum Key Distribution
Authors:
Valerio Scarani,
Helle Bechmann-Pasquinucci,
Nicolas J. Cerf,
Miloslav Dusek,
Norbert Lutkenhaus,
Momtchil Peev
Abstract:
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on the eavesdropper's power.…
▽ More
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on the eavesdropper's power.
The first two sections provide a concise up-to-date review of QKD, biased toward the practical side. The rest of the paper presents the essential theoretical tools that have been developed to assess the security of the main experimental platforms (discrete variables, continuous variables and distributed-phase-reference protocols).
△ Less
Submitted 30 September, 2009; v1 submitted 28 February, 2008;
originally announced February 2008.
-
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
Authors:
I. Herbauts,
S. Bettelli,
H. Hübel,
M. Peev
Abstract:
It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found. Moreover, this attack fills Luetkenhaus bound, independently of whether error positions are leaked to Eve, proving that it is tight. In addition, we clarify why the existence…
▽ More
It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found. Moreover, this attack fills Luetkenhaus bound, independently of whether error positions are leaked to Eve, proving that it is tight. In addition, we clarify why the existence of such optimal attacks is not in contradiction with the established ``old-style'' theory of BB84 individual attacks, as incorrectly suggested recently in a news feature.
△ Less
Submitted 12 November, 2007;
originally announced November 2007.
-
Parameter Estimation in Biokinetic Degradation Models in Wastewater Treatment - A Novel Approach Relevant for Micro-pollutant Removal
Authors:
Monika Schoenerklee,
Momtchil Peev
Abstract:
In this paper we address a general parameter estimation methodology for an extended biokinetic degradation model [1] for poorly degradable micropollutants. In particular we concentrate on parameter estimation of the micropollutant degradation sub-model by specialised microorganisms. In this case we focus on the case when only substrate degradation data are available and prove the structural iden…
▽ More
In this paper we address a general parameter estimation methodology for an extended biokinetic degradation model [1] for poorly degradable micropollutants. In particular we concentrate on parameter estimation of the micropollutant degradation sub-model by specialised microorganisms. In this case we focus on the case when only substrate degradation data are available and prove the structural identifiability of the model. Further we consider the problem of practical identifiability and propose experimental and related numerical methods for unambiguous parameter estimation based on multiple substrate degradation curves with different initial concentrations. Finally by means of simulated pseudo-experiments we have found convincing indications that the proposed algorithm is stable and yields appropriate parameter estimates even in unfavourable regimes.
△ Less
Submitted 13 September, 2007;
originally announced September 2007.
-
Vanishing Integral Relations and Expectation Values for Bloch Functions in Finite Domains
Authors:
C. Pacher,
M. Peev
Abstract:
Integral identities for particular Bloch functions in finite periodic systems are derived. All following statements are proven for a finite domain consisting of an integer number of unit cells. It is shown that matrix elements of particular Bloch functions with respect to periodic differential operators vanish identically. The real valuedness, the time-independence and a summation property of th…
▽ More
Integral identities for particular Bloch functions in finite periodic systems are derived. All following statements are proven for a finite domain consisting of an integer number of unit cells. It is shown that matrix elements of particular Bloch functions with respect to periodic differential operators vanish identically. The real valuedness, the time-independence and a summation property of the expectation values of periodic differential operators applied to superpositions of specific Bloch functions are derived.
△ Less
Submitted 28 March, 2007;
originally announced March 2007.
-
Using quantum key distribution for cryptographic purposes: a survey
Authors:
Romain Alléaume,
Cyril Branciard,
Jan Bouda,
Thierry Debuisschert,
Mehrdad Dianati,
Nicolas Gisin,
Mark Godfrey,
Philippe Grangier,
Thomas Langer,
Norbert Lutkenhaus,
Christian Monyk,
Philippe Painchault,
Momtchil Peev,
Andreas Poppe,
Thomas Pornin,
John Rarity,
Renato Renner,
Gregoire Ribordy,
Michel Riguidel,
Louis Salvail,
Andrew Shields,
Harald Weinfurter,
Anton Zeilinger
Abstract:
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the…
▽ More
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.
△ Less
Submitted 4 December, 2014; v1 submitted 23 January, 2007;
originally announced January 2007.
-
A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography
Authors:
M. Peev,
M. Nölle,
O. Maurhardt,
T. Lorünser,
M. Suda,
A. Poppe,
R. Ursin,
A. Fedrizzi,
A. Zeilinger
Abstract:
In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks. We further propose a modified authentication algorithm which features higher efficiency with respect to consumption of mutual secret bits.
In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks. We further propose a modified authentication algorithm which features higher efficiency with respect to consumption of mutual secret bits.
△ Less
Submitted 16 July, 2004;
originally announced July 2004.
-
New intensity and visibility aspects of a double loop neutron interferometer
Authors:
M. Suda,
H. Rauch,
M. Peev
Abstract:
Various phase shifters and absorbers can be put into the arms of a double loop neutron interferometer. The mean intensity levels of the forward and diffracted beams behind an empty four plate interferometer of this type have been calculated. It is shown that the intensities in the forward and diffracted direction can be made equal using certain absorbers. In this case the interferometer can be r…
▽ More
Various phase shifters and absorbers can be put into the arms of a double loop neutron interferometer. The mean intensity levels of the forward and diffracted beams behind an empty four plate interferometer of this type have been calculated. It is shown that the intensities in the forward and diffracted direction can be made equal using certain absorbers. In this case the interferometer can be regarded as a 50/50 beam splitter. Furthermore the visibilities of single and double loop interferometers are compared to each other by varying the transmission in the first loop using different absorbers. It can be shown that the visibility becomes exactly 1 using a phase shifter in the second loop. In this case the phase shifter in the second loop must be strongly correlated to the transmission coefficient of the absorber in the first loop. Using such a device homodyne-like measurements of very weak signals should become possible.
△ Less
Submitted 17 May, 2004;
originally announced May 2004.
-
Practical Quantum Key Distribution with Polarization-Entangled Photons
Authors:
A. Poppe,
A. Fedrizzi,
T. Loruenser,
O. Maurhardt,
R. Ursin,
H. R. Boehm,
M. Peev,
M. Suda,
C. Kurtsiefer,
H. Weinfurter,
T. Jennewein,
A. Zeilinger
Abstract:
We present an entangled-state quantum cryptography system that operated for the first time in a real world application scenario. The full key generation protocol was performed in real time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. The generated quantum key was immediately handed…
▽ More
We present an entangled-state quantum cryptography system that operated for the first time in a real world application scenario. The full key generation protocol was performed in real time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. The generated quantum key was immediately handed over and used by a secure communication application.
△ Less
Submitted 23 April, 2004; v1 submitted 20 April, 2004;
originally announced April 2004.