Skip to main content

Showing 1–15 of 15 results for author: Chaiwongkhot, P

Searching in archive quant-ph. Search in all archives.
.
  1. Boosting end-to-end entanglement fidelity in quantum repeater networks via hybridized strategies

    Authors: Poramet Pathumsoot, Theerapat Tansuwannont, Naphan Benchasattabuse, Ryosuke Satoh, Michal Hajdušek, Poompong Chaiwongkhot, Sujin Suwanna, Rodney Van Meter

    Abstract: Quantum networks are expected to enhance distributed quantum computing and quantum communication over long distances while providing security dependent upon physical effects rather than mathematical assumptions. Through simulation, we show that a quantum network utilizing only entanglement purification or only quantum error correction as error management strategies cannot create Bell pairs with fi… ▽ More

    Submitted 16 May, 2024; originally announced June 2024.

    Comments: 8 pages, 3 figures, 1 table. This manuscript has been accepted for publication in the QCNC 2024 Conference Proceedings. The technical manuscript of this work is available at arXiv:2303.10295

    Journal ref: In 2024 International Conference on Quantum Communications, Networking, and Computing (QCNC), pp. 49-56, 2024

  2. Preparing a commercial quantum key distribution system for certification against implementation loopholes

    Authors: Vadim Makarov, Alexey Abrikosov, Poompong Chaiwongkhot, Aleksey K. Fedorov, Anqi Huang, Evgeny Kiktenko, Mikhail Petrov, Anastasiya Ponosova, Daria Ruzhitskaya, Andrey Tayduganov, Daniil Trefilov, Konstantin Zaitsev

    Abstract: A commercial quantum key distribution (QKD) system needs to be formally certified to enable its wide deployment. The certification should include the system's robustness against known implementation loopholes and attacks that exploit them. Here we ready a fiber-optic QKD system for this procedure. The system has a prepare-and-measure scheme with decoy-state BB84 protocol, polarisation encoding, qu… ▽ More

    Submitted 11 October, 2024; v1 submitted 30 October, 2023; originally announced October 2023.

    Comments: 34 pages, 11 figures, 2 tables. Minor improvements after peer review. Accepted to Phys. Rev. Appl

    Journal ref: Phys. Rev. Applied 22, 044076 (2024)

  3. arXiv:2303.10295  [pdf, other

    quant-ph

    Hybrid Error-Management Strategies in Quantum Repeater Networks

    Authors: Poramet Pathumsoot, Theerapat Tansuwannont, Naphan Benchasattabuse, Ryosuke Satoh, Michal Hajdušek, Poompong Chaiwongkhot, Sujin Suwanna, Rodney Van Meter

    Abstract: A quantum network is expected to enhance distributed quantum computing and quantum communication over a long distance while providing unconditional security. As quantum entanglement is essential for a quantum network, major issues from various types of noise and decoherence prevent it from being realized, and research has been intensively active to obtain optimal configurations for a quantum netwo… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

    Comments: 22 pages, 7 figures

  4. Protecting fiber-optic quantum key distribution sources against light-injection attacks

    Authors: Anastasiya Ponosova, Daria Ruzhitskaya, Poompong Chaiwongkhot, Vladimir Egorov, Vadim Makarov, Anqi Huang

    Abstract: A well-protected and characterised source in a quantum key distribution system is needed for its security. Unfortunately, the source is vulnerable to light-injection attacks, such as Trojan-horse, laser-seeding, and laser-damage attacks, in which an eavesdropper actively injects bright light to hack the source unit. The hacking laser could be a high-power one that can modify properties of componen… ▽ More

    Submitted 24 September, 2022; v1 submitted 16 January, 2022; originally announced January 2022.

    Comments: Abstract, Fig.5 and discussion section modified. Various minor corrections, including clarification and explanation about the experimental setup stability and its graphical representation; testing procedure; configuration of QKD systems with circulators; heating of isolators; testing results of circulators' port couples. New references added in the bibliography. 13 pages, 6 figures, 2 tables

    Journal ref: PRX Quantum 3, 040307 (2022)

  5. arXiv:2110.15870  [pdf, other

    quant-ph math.OC

    Hybrid Quantum-Classical Algorithms for Loan Collection Optimization with Loan Loss Provisions

    Authors: Jirawat Tangpanitanon, Jirawat Saiphet, Pantita Palittapongarnpim, Poompong Chaiwongkhot, Pinn Prugsanapan, Nuntanut Raksasri, Yarnvith Raksri, Pairash Thajchayapong, Thiparat Chotibut

    Abstract: Banks are required to set aside funds in their income statement, known as a loan loss provision (LLP), to account for potential loan defaults and expenses. By treating the LLP as a global constraint, we propose a hybrid quantum-classical algorithm to solve Quadratic Constrained Binary Optimization (QCBO) models for loan collection optimization. The objective is to find a set of optimal loan collec… ▽ More

    Submitted 27 January, 2022; v1 submitted 29 October, 2021; originally announced October 2021.

  6. Faking photon number on a transition-edge sensor

    Authors: Poompong Chaiwongkhot, Jiaqiang Zhong, Anqi Huang, Hao Qin, Sheng-cai Shi, Vadim Makarov

    Abstract: We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In a simple experiment, we show that an adversary could fake a photon number result at a certain wavelength by sending a larger number of photons at a longer wavelength. In another experiment, we show that the detector can be blinded by bright continuous-wave light and then, a c… ▽ More

    Submitted 19 February, 2021; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: Replacing incorrectly uploaded previous versions. 6 page, 5 figures

    Journal ref: EPJ Quantum Technol. 9, 23 (2022)

  7. arXiv:2009.11818  [pdf, other

    quant-ph

    Enhancing secure key rates of satellite QKD using a quantum dot single-photon source

    Authors: Poompong Chaiwongkhot, Sara Hosseini, Arash Ahmadi, Brendon L. Higgins, Dan Dalacu, Philip J. Poole, Robin L. Williams, Michael E. Reimer, Thomas Jennewein

    Abstract: Global quantum secure communication can be achieved using quantum key distribution (QKD) with orbiting satellites. Established techniques use attenuated lasers as weak coherent pulse (WCP) sources, with so-called decoy-state protocols, to generate the required single-photon-level pulses. While such approaches are elegant, they come at the expense of attainable final key due to inherent multi-photo… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

    Comments: 6 pages, 5 figures

  8. An approach for security evaluation and certification of a complete quantum communication system

    Authors: Shihan Sajeed, Poompong Chaiwongkhot, Anqi Huang, Hao Qin, Vladimir Egorov, Anton Kozubov, Andrei Gaidash, Vladimir Chistiakov, Artur Vasiliev, Artur Gleim, Vadim Makarov

    Abstract: Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises… ▽ More

    Submitted 18 May, 2021; v1 submitted 17 September, 2019; originally announced September 2019.

    Comments: Improved readability and minor updates, Published in Scientific Reports volume 11, Article number: 5110 (2021), 17 pages, 3 figures, 3 tables

    Journal ref: Sci Rep 11, 5110 (2021)

  9. Laser seeding attack in quantum key distribution

    Authors: Anqi Huang, Álvaro Navarrete, Shi-Hai Sun, Poompong Chaiwongkhot, Marcos Curty, Vadim Makarov

    Abstract: Quantum key distribution (QKD) based on the laws of quantum physics allows the secure distribution of secret keys over an insecure channel. Unfortunately, imperfect implementations of QKD compromise its information-theoretical security. Measurement-device-independent quantum key distribution (MDI-QKD) is a promising approach to remove all side channels from the measurement unit, which is regarded… ▽ More

    Submitted 27 November, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: 14 pages, 7 figures

    Journal ref: Phys. Rev. Applied 12, 064043 (2019)

  10. Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence

    Authors: Poompong Chaiwongkhot, Katanya B. Kuntz, Yanbao Zhang, Anqi Huang, Jean-Philippe Bourgoin, Shihan Sajeed, Norbert Lütkenhaus, Thomas Jennewein, Vadim Makarov

    Abstract: The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an attack could be ineffective in the presence of atmospheric turbulence due to beam wander and spatial mode aberrations induced by the air's varying index o… ▽ More

    Submitted 20 June, 2019; v1 submitted 4 February, 2019; originally announced February 2019.

    Comments: 10 pages, 5 figures

    Journal ref: Phys. Rev. A 99, 062315 (2019)

  11. Eavesdropping and countermeasures for backflash side channel in quantum cryptography

    Authors: Paulo Vinicius Pereira Pinheiro, Poompong Chaiwongkhot, Shihan Sajeed, Rolf T. Horn, Jean-Philippe Bourgoin, Thomas Jennewein, Norbert Lütkenhaus, Vadim Makarov

    Abstract: Quantum key distribution (QKD) promises information theoretic secure key as long as the device performs as assumed in the theoretical model. One of the assumptions is an absence of information leakage about individual photon detection outcomes of the receiver unit. Here we investigate the information leakage from a QKD receiver due to photon emission caused by detection events in single-photon det… ▽ More

    Submitted 1 August, 2018; v1 submitted 26 April, 2018; originally announced April 2018.

    Comments: 9 pages, 7 figures

    Journal ref: Opt. Express 26, 21020 (2018)

  12. Finite-key-size effect in commercial plug-and-play QKD system

    Authors: Poompong Chaiwongkhot, Shihan Sajeed, Lars Lydersen, Vadim Makarov

    Abstract: A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. We also derive a key-rate equation that is specific for this system. This equation provides bounds above the upper bound of secure key under… ▽ More

    Submitted 24 July, 2017; v1 submitted 21 October, 2016; originally announced October 2016.

    Comments: 6 pages, 3 figures, accepted for publication in Quantum Science and Technology

    Journal ref: Quantum Sci. Technol. 2, 044003 (2017)

  13. Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumption

    Authors: Anqi Huang, Shihan Sajeed, Poompong Chaiwongkhot, Mathilde Soucarros, Matthieu Legre, Vadim Makarov

    Abstract: In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution (QKD). Implementable countermeasures are proposed to patch the discovered loopholes. However, certain countermeasures are not as robust as would be expected. In this paper, we present a concrete example of ID Quantique's random-detector-efficiency counte… ▽ More

    Submitted 17 October, 2016; v1 submitted 5 January, 2016; originally announced January 2016.

    Comments: 12 pages, 12 figures

    Journal ref: IEEE J. Quantum Electron. 52, 8000211 (2016)

  14. Creation of backdoors in quantum communications via laser damage

    Authors: Vadim Makarov, Jean-Philippe Bourgoin, Poompong Chaiwongkhot, Mathieu Gagné, Thomas Jennewein, Sarah Kaiser, Raman Kashyap, Matthieu Legré, Carter Minshull, Shihan Sajeed

    Abstract: Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behaviour on-demand. We test it on two practical QC systems for key distribution and coin-tossing, and show that newly created de… ▽ More

    Submitted 18 September, 2016; v1 submitted 12 October, 2015; originally announced October 2015.

    Comments: Changed the title to match the journal version. 9 pages, 5 figures

    Journal ref: Phys. Rev. A 94, 030302 (2016)

  15. Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch

    Authors: Shihan Sajeed, Poompong Chaiwongkhot, Jean-Philippe Bourgoin, Thomas Jennewein, Norbert Lutkenhaus, Vadim Makarov

    Abstract: In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control the spatial mode to break security. We experimentally investigate a standard polarization QKD receiver, and identify sources of efficiency mismatch in its optical scheme. We model a practical intercep… ▽ More

    Submitted 10 June, 2015; v1 submitted 10 February, 2015; originally announced February 2015.

    Comments: 7 pages, 4 figures

    Journal ref: Phys. Rev. A 91, 062301 (2015)