-
Boosting end-to-end entanglement fidelity in quantum repeater networks via hybridized strategies
Authors:
Poramet Pathumsoot,
Theerapat Tansuwannont,
Naphan Benchasattabuse,
Ryosuke Satoh,
Michal Hajdušek,
Poompong Chaiwongkhot,
Sujin Suwanna,
Rodney Van Meter
Abstract:
Quantum networks are expected to enhance distributed quantum computing and quantum communication over long distances while providing security dependent upon physical effects rather than mathematical assumptions. Through simulation, we show that a quantum network utilizing only entanglement purification or only quantum error correction as error management strategies cannot create Bell pairs with fi…
▽ More
Quantum networks are expected to enhance distributed quantum computing and quantum communication over long distances while providing security dependent upon physical effects rather than mathematical assumptions. Through simulation, we show that a quantum network utilizing only entanglement purification or only quantum error correction as error management strategies cannot create Bell pairs with fidelity that exceeds the requirement for a secured quantum key distribution protocol for a broad range of hardware parameters. We propose hybrid strategies utilizing quantum error correction on top of purification and show that they can produce Bell pairs of sufficiently high fidelity. We identify the error parameter regime for gate and measurement errors in which these hybrid strategies are applicable.
△ Less
Submitted 16 May, 2024;
originally announced June 2024.
-
Preparing a commercial quantum key distribution system for certification against implementation loopholes
Authors:
Vadim Makarov,
Alexey Abrikosov,
Poompong Chaiwongkhot,
Aleksey K. Fedorov,
Anqi Huang,
Evgeny Kiktenko,
Mikhail Petrov,
Anastasiya Ponosova,
Daria Ruzhitskaya,
Andrey Tayduganov,
Daniil Trefilov,
Konstantin Zaitsev
Abstract:
A commercial quantum key distribution (QKD) system needs to be formally certified to enable its wide deployment. The certification should include the system's robustness against known implementation loopholes and attacks that exploit them. Here we ready a fiber-optic QKD system for this procedure. The system has a prepare-and-measure scheme with decoy-state BB84 protocol, polarisation encoding, qu…
▽ More
A commercial quantum key distribution (QKD) system needs to be formally certified to enable its wide deployment. The certification should include the system's robustness against known implementation loopholes and attacks that exploit them. Here we ready a fiber-optic QKD system for this procedure. The system has a prepare-and-measure scheme with decoy-state BB84 protocol, polarisation encoding, qubit source rate of 312.5 MHz, and is manufactured by QRate. We detail its hardware and post-processing. We analyse the hardware for known implementation loopholes, search for possible new loopholes, and discuss countermeasures. We then amend the system design to address the highest-risk loopholes identified. We also work out technical requirements on the certification lab and outline its possible structure.
△ Less
Submitted 11 October, 2024; v1 submitted 30 October, 2023;
originally announced October 2023.
-
Hybrid Error-Management Strategies in Quantum Repeater Networks
Authors:
Poramet Pathumsoot,
Theerapat Tansuwannont,
Naphan Benchasattabuse,
Ryosuke Satoh,
Michal Hajdušek,
Poompong Chaiwongkhot,
Sujin Suwanna,
Rodney Van Meter
Abstract:
A quantum network is expected to enhance distributed quantum computing and quantum communication over a long distance while providing unconditional security. As quantum entanglement is essential for a quantum network, major issues from various types of noise and decoherence prevent it from being realized, and research has been intensively active to obtain optimal configurations for a quantum netwo…
▽ More
A quantum network is expected to enhance distributed quantum computing and quantum communication over a long distance while providing unconditional security. As quantum entanglement is essential for a quantum network, major issues from various types of noise and decoherence prevent it from being realized, and research has been intensively active to obtain optimal configurations for a quantum network. In this work, we address the performance of a quantum network capable of quantum error correction and entanglement purification. Our results show that one should distribute Bell pairs as fast as possible while balancing the deployment of fidelity enhancement. We also show suitable hybrid strategies in quantum cryptography tasks under some noise regimes that need to use purification and quantum error correction together. Our results suggest that using purification to distribute high fidelity Bell pairs and preserving them for application using quantum error correction is a promising way to achieve a near-term quantum network for secure communication.
△ Less
Submitted 17 March, 2023;
originally announced March 2023.
-
Protecting fiber-optic quantum key distribution sources against light-injection attacks
Authors:
Anastasiya Ponosova,
Daria Ruzhitskaya,
Poompong Chaiwongkhot,
Vladimir Egorov,
Vadim Makarov,
Anqi Huang
Abstract:
A well-protected and characterised source in a quantum key distribution system is needed for its security. Unfortunately, the source is vulnerable to light-injection attacks, such as Trojan-horse, laser-seeding, and laser-damage attacks, in which an eavesdropper actively injects bright light to hack the source unit. The hacking laser could be a high-power one that can modify properties of componen…
▽ More
A well-protected and characterised source in a quantum key distribution system is needed for its security. Unfortunately, the source is vulnerable to light-injection attacks, such as Trojan-horse, laser-seeding, and laser-damage attacks, in which an eavesdropper actively injects bright light to hack the source unit. The hacking laser could be a high-power one that can modify properties of components via the laser-damage attack and also further help the Trojan-horse and other light-injection attacks. Here we propose a countermeasure against the light-injection attacks, consisting of an additional sacrificial component placed at the exit of the source. This component should either withstand high-power incoming light while attenuating it to a safe level that cannot modify the rest of the source, or get destroyed into a permanent high-attenuation state that breaks up the line. We demonstrate experimentally that off-the-shelf fiber-optic isolators and circulators have these desired properties, at least under attack by a continuous-wave high-power laser.
△ Less
Submitted 24 September, 2022; v1 submitted 16 January, 2022;
originally announced January 2022.
-
Hybrid Quantum-Classical Algorithms for Loan Collection Optimization with Loan Loss Provisions
Authors:
Jirawat Tangpanitanon,
Jirawat Saiphet,
Pantita Palittapongarnpim,
Poompong Chaiwongkhot,
Pinn Prugsanapan,
Nuntanut Raksasri,
Yarnvith Raksri,
Pairash Thajchayapong,
Thiparat Chotibut
Abstract:
Banks are required to set aside funds in their income statement, known as a loan loss provision (LLP), to account for potential loan defaults and expenses. By treating the LLP as a global constraint, we propose a hybrid quantum-classical algorithm to solve Quadratic Constrained Binary Optimization (QCBO) models for loan collection optimization. The objective is to find a set of optimal loan collec…
▽ More
Banks are required to set aside funds in their income statement, known as a loan loss provision (LLP), to account for potential loan defaults and expenses. By treating the LLP as a global constraint, we propose a hybrid quantum-classical algorithm to solve Quadratic Constrained Binary Optimization (QCBO) models for loan collection optimization. The objective is to find a set of optimal loan collection actions that maximizes the expected net profit presented to the bank as well as the financial welfare in the financial network of loanees, while keeping the LLP at its minimum. Our algorithm consists of three parts: a classical divide-and-conquer algorithm to enable a large-scale optimization, a quantum alternating operator ansatz (QAOA) algorithm to maximize the objective function, and a classical sampling algorithm to handle the LLP. We apply the algorithm to a real-world data set with 600 loanees and 5 possible collection actions. The QAOA is performed using up to 35 qubits on a classical computer. We show that the presence of the QAOA can improve the expected net profit by approximately $70\%$, compared to when the QAOA is absent from the hybrid algorithm. Our work illustrates the use of near-term quantum devices to tackle real-world optimization problems.
△ Less
Submitted 27 January, 2022; v1 submitted 29 October, 2021;
originally announced October 2021.
-
Faking photon number on a transition-edge sensor
Authors:
Poompong Chaiwongkhot,
Jiaqiang Zhong,
Anqi Huang,
Hao Qin,
Sheng-cai Shi,
Vadim Makarov
Abstract:
We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In a simple experiment, we show that an adversary could fake a photon number result at a certain wavelength by sending a larger number of photons at a longer wavelength. In another experiment, we show that the detector can be blinded by bright continuous-wave light and then, a c…
▽ More
We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In a simple experiment, we show that an adversary could fake a photon number result at a certain wavelength by sending a larger number of photons at a longer wavelength. In another experiment, we show that the detector can be blinded by bright continuous-wave light and then, a controlled response simulating single-photon detection can be produced by applying a bright light pulse. We model an intercept-and-resend attack on a quantum key distribution system that exploits the latter vulnerability and, under certain assumptions, succeeds to steal the key.
△ Less
Submitted 19 February, 2021; v1 submitted 17 February, 2021;
originally announced February 2021.
-
Enhancing secure key rates of satellite QKD using a quantum dot single-photon source
Authors:
Poompong Chaiwongkhot,
Sara Hosseini,
Arash Ahmadi,
Brendon L. Higgins,
Dan Dalacu,
Philip J. Poole,
Robin L. Williams,
Michael E. Reimer,
Thomas Jennewein
Abstract:
Global quantum secure communication can be achieved using quantum key distribution (QKD) with orbiting satellites. Established techniques use attenuated lasers as weak coherent pulse (WCP) sources, with so-called decoy-state protocols, to generate the required single-photon-level pulses. While such approaches are elegant, they come at the expense of attainable final key due to inherent multi-photo…
▽ More
Global quantum secure communication can be achieved using quantum key distribution (QKD) with orbiting satellites. Established techniques use attenuated lasers as weak coherent pulse (WCP) sources, with so-called decoy-state protocols, to generate the required single-photon-level pulses. While such approaches are elegant, they come at the expense of attainable final key due to inherent multi-photon emission, thereby constraining secure key generation over the high-loss, noisy channels expected for satellite transmissions. In this work we improve on this limitation by using true single-photon pulses generated from a semiconductor quantum dot (QD) embedded in a nanowire, possessing low multi-photon emission ($<10^{-6}$) and an extraction system efficiency of -15 dB (or 3.1%). Despite the limited efficiency, the key generated by the QD source is greater than that generated by a WCP source under identical repetition rate and link conditions representative of a satellite pass. We predict that with realistic improvements of the QD extraction efficiency to -4.0 dB (or 40%), the quantum-dot QKD protocol outperforms WCP-decoy-state QKD by almost an order of magnitude. Consequently, a QD source could allow generation of a secure key in conditions where a WCP source would simply fail, such as in the case of high channel losses. Our demonstration is the first specific use case that shows a clear benefit for QD-based single-photon sources in secure quantum communication, and has the potential to enhance the viability and efficiency of satellite-based QKD networks.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
An approach for security evaluation and certification of a complete quantum communication system
Authors:
Shihan Sajeed,
Poompong Chaiwongkhot,
Anqi Huang,
Hao Qin,
Vladimir Egorov,
Anton Kozubov,
Andrei Gaidash,
Vladimir Chistiakov,
Artur Vasiliev,
Artur Gleim,
Vadim Makarov
Abstract:
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises…
▽ More
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.
△ Less
Submitted 18 May, 2021; v1 submitted 17 September, 2019;
originally announced September 2019.
-
Laser seeding attack in quantum key distribution
Authors:
Anqi Huang,
Álvaro Navarrete,
Shi-Hai Sun,
Poompong Chaiwongkhot,
Marcos Curty,
Vadim Makarov
Abstract:
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure distribution of secret keys over an insecure channel. Unfortunately, imperfect implementations of QKD compromise its information-theoretical security. Measurement-device-independent quantum key distribution (MDI-QKD) is a promising approach to remove all side channels from the measurement unit, which is regarded…
▽ More
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure distribution of secret keys over an insecure channel. Unfortunately, imperfect implementations of QKD compromise its information-theoretical security. Measurement-device-independent quantum key distribution (MDI-QKD) is a promising approach to remove all side channels from the measurement unit, which is regarded as the "Achilles' heel" of QKD. An essential assumption in MDI-QKD is however that the sources are trusted. Here we experimentally demonstrate that a practical source based on a semiconductor laser diode is vulnerable to a laser seeding attack, in which light injected from the communication line into the laser results in an increase of the intensities of the prepared states. The unnoticed increase of intensity may compromise the security of QKD, as we show theoretically for the prepare-and-measure decoy-state BB84 and MDI-QKD protocols. Our theoretical security analysis is general and can be applied to any vulnerability that increases the intensity of the emitted pulses. Moreover, a laser seeding attack might be launched as well against decoy-state based quantum cryptographic protocols beyond QKD.
△ Less
Submitted 27 November, 2019; v1 submitted 26 February, 2019;
originally announced February 2019.
-
Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence
Authors:
Poompong Chaiwongkhot,
Katanya B. Kuntz,
Yanbao Zhang,
Anqi Huang,
Jean-Philippe Bourgoin,
Shihan Sajeed,
Norbert Lütkenhaus,
Thomas Jennewein,
Vadim Makarov
Abstract:
The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an attack could be ineffective in the presence of atmospheric turbulence due to beam wander and spatial mode aberrations induced by the air's varying index o…
▽ More
The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an attack could be ineffective in the presence of atmospheric turbulence due to beam wander and spatial mode aberrations induced by the air's varying index of refraction. We experimentally investigate the impact turbulence has on Eve's attack on a free-space polarization-encoding QKD receiver by emulating atmospheric turbulence with a spatial light modulator. Our results identify how well Eve would need to compensate for turbulence to perform a successful attack by either reducing her distance to the receiver, or using beam wavefront correction via adaptive optics. Furthermore, we use an entanglement-breaking scheme to find a theoretical limit on the turbulence strength that hinders Eve's attack.
△ Less
Submitted 20 June, 2019; v1 submitted 4 February, 2019;
originally announced February 2019.
-
Eavesdropping and countermeasures for backflash side channel in quantum cryptography
Authors:
Paulo Vinicius Pereira Pinheiro,
Poompong Chaiwongkhot,
Shihan Sajeed,
Rolf T. Horn,
Jean-Philippe Bourgoin,
Thomas Jennewein,
Norbert Lütkenhaus,
Vadim Makarov
Abstract:
Quantum key distribution (QKD) promises information theoretic secure key as long as the device performs as assumed in the theoretical model. One of the assumptions is an absence of information leakage about individual photon detection outcomes of the receiver unit. Here we investigate the information leakage from a QKD receiver due to photon emission caused by detection events in single-photon det…
▽ More
Quantum key distribution (QKD) promises information theoretic secure key as long as the device performs as assumed in the theoretical model. One of the assumptions is an absence of information leakage about individual photon detection outcomes of the receiver unit. Here we investigate the information leakage from a QKD receiver due to photon emission caused by detection events in single-photon detectors (backflash). We test commercial silicon avalanche photodiodes and a photomultiplier tube, and find that the former emit backflashes. We study the spectral, timing and polarization characteristics of these backflash photons. We experimentally demonstrate on a free-space QKD receiver that an eavesdropper can distinguish which detector has clicked inside it, and thus acquire secret information. A set of countermeasures both in theory and on the physical devices are discussed.
△ Less
Submitted 1 August, 2018; v1 submitted 26 April, 2018;
originally announced April 2018.
-
Finite-key-size effect in commercial plug-and-play QKD system
Authors:
Poompong Chaiwongkhot,
Shihan Sajeed,
Lars Lydersen,
Vadim Makarov
Abstract:
A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. We also derive a key-rate equation that is specific for this system. This equation provides bounds above the upper bound of secure key under…
▽ More
A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. We also derive a key-rate equation that is specific for this system. This equation provides bounds above the upper bound of secure key under finite-key-size analysis. From this equation and our experimental data, we show that the keys that have been distilled from the smaller sifted-key size fall above our bound. Thus, their security is not covered by finite-key-size analysis. Experimentally, we could consistently force the system to generate the key outside of the bound. We also test manufacturer's software update. Although all the keys after the patch fall under our bound, their security cannot be guaranteed under this analysis. Our methodology can be used for security certification and standardization of QKD systems.
△ Less
Submitted 24 July, 2017; v1 submitted 21 October, 2016;
originally announced October 2016.
-
Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumption
Authors:
Anqi Huang,
Shihan Sajeed,
Poompong Chaiwongkhot,
Mathilde Soucarros,
Matthieu Legre,
Vadim Makarov
Abstract:
In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution (QKD). Implementable countermeasures are proposed to patch the discovered loopholes. However, certain countermeasures are not as robust as would be expected. In this paper, we present a concrete example of ID Quantique's random-detector-efficiency counte…
▽ More
In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution (QKD). Implementable countermeasures are proposed to patch the discovered loopholes. However, certain countermeasures are not as robust as would be expected. In this paper, we present a concrete example of ID Quantique's random-detector-efficiency countermeasure against detector blinding attacks. As a third-party tester, we have found that the first industrial implementation of this countermeasure is effective against the original blinding attack, but not immune to a modified blinding attack. Then, we implement and test a later full version of this countermeasure containing a security proof [C. C. W. Lim et al., IEEE Journal of Selected Topics in Quantum Electronics, 21, 6601305 (2015)]. We find that it is still vulnerable against the modified blinding attack, because an assumption about hardware characteristics on which the proof relies fails in practice.
△ Less
Submitted 17 October, 2016; v1 submitted 5 January, 2016;
originally announced January 2016.
-
Creation of backdoors in quantum communications via laser damage
Authors:
Vadim Makarov,
Jean-Philippe Bourgoin,
Poompong Chaiwongkhot,
Mathieu Gagné,
Thomas Jennewein,
Sarah Kaiser,
Raman Kashyap,
Matthieu Legré,
Carter Minshull,
Shihan Sajeed
Abstract:
Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behaviour on-demand. We test it on two practical QC systems for key distribution and coin-tossing, and show that newly created de…
▽ More
Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behaviour on-demand. We test it on two practical QC systems for key distribution and coin-tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to existing QC systems, and necessitates their testing to guarantee security.
△ Less
Submitted 18 September, 2016; v1 submitted 12 October, 2015;
originally announced October 2015.
-
Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch
Authors:
Shihan Sajeed,
Poompong Chaiwongkhot,
Jean-Philippe Bourgoin,
Thomas Jennewein,
Norbert Lutkenhaus,
Vadim Makarov
Abstract:
In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control the spatial mode to break security. We experimentally investigate a standard polarization QKD receiver, and identify sources of efficiency mismatch in its optical scheme. We model a practical intercep…
▽ More
In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control the spatial mode to break security. We experimentally investigate a standard polarization QKD receiver, and identify sources of efficiency mismatch in its optical scheme. We model a practical intercept-and-resend attack and show that it would break security in most situations. We show experimentally that adding an appropriately chosen spatial filter at the receiver's entrance is an effective countermeasure.
△ Less
Submitted 10 June, 2015; v1 submitted 10 February, 2015;
originally announced February 2015.