-
Certified randomness using a trapped-ion quantum processor
Authors:
Minzhao Liu,
Ruslan Shaydulin,
Pradeep Niroula,
Matthew DeCross,
Shih-Han Hung,
Wen Yu Kon,
Enrique Cervero-Martín,
Kaushik Chakraborty,
Omar Amer,
Scott Aaronson,
Atithi Acharya,
Yuri Alexeev,
K. Jordan Berg,
Shouvanik Chakrabarti,
Florian J. Curchod,
Joan M. Dreiling,
Neal Erickson,
Cameron Foltz,
Michael Foss-Feig,
David Hayes,
Travis S. Humble,
Niraj Kumar,
Jeffrey Larson,
Danylo Lykov,
Michael Mills
, et al. (7 additional authors not shown)
Abstract:
While quantum computers have the potential to perform a wide range of practically important tasks beyond the capabilities of classical computers, realizing this potential remains a challenge. One such task is to use an untrusted remote device to generate random bits that can be certified to contain a certain amount of entropy. Certified randomness has many applications but is fundamentally impossi…
▽ More
While quantum computers have the potential to perform a wide range of practically important tasks beyond the capabilities of classical computers, realizing this potential remains a challenge. One such task is to use an untrusted remote device to generate random bits that can be certified to contain a certain amount of entropy. Certified randomness has many applications but is fundamentally impossible to achieve solely by classical computation. In this work, we demonstrate the generation of certifiably random bits using the 56-qubit Quantinuum H2-1 trapped-ion quantum computer accessed over the internet. Our protocol leverages the classical hardness of recent random circuit sampling demonstrations: a client generates quantum "challenge" circuits using a small randomness seed, sends them to an untrusted quantum server to execute, and verifies the server's results. We analyze the security of our protocol against a restricted class of realistic near-term adversaries. Using classical verification with measured combined sustained performance of $1.1\times10^{18}$ floating-point operations per second across multiple supercomputers, we certify $71,313$ bits of entropy under this restricted adversary and additional assumptions. Our results demonstrate a step towards the practical applicability of today's quantum computers.
△ Less
Submitted 26 March, 2025;
originally announced March 2025.
-
Quantum Authenticated Key Expansion with Key Recycling
Authors:
Wen Yu Kon,
Jefferson Chu,
Kevin Han Yong Loh,
Obada Alia,
Omar Amer,
Marco Pistoia,
Kaushik Chakraborty,
Charles Lim
Abstract:
Data privacy and authentication are two main security requirements for remote access and cloud services. While QKD has been explored to address data privacy concerns, oftentimes its use is separate from the client authentication protocol despite implicitly providing authentication. Here, we present a quantum authentication key expansion (QAKE) protocol that (1) integrates both authentication and k…
▽ More
Data privacy and authentication are two main security requirements for remote access and cloud services. While QKD has been explored to address data privacy concerns, oftentimes its use is separate from the client authentication protocol despite implicitly providing authentication. Here, we present a quantum authentication key expansion (QAKE) protocol that (1) integrates both authentication and key expansion within a single protocol, and (2) provides key recycling property -- allowing all authentication keys to be reused. We analyse the security of the protocol in a QAKE framework adapted from a classical authentication key exchange (AKE) framework, providing separate security conditions for authentication and data privacy. An experimental implementation of the protocol, with appropriate post-selection, was performed to demonstrate its feasibility.
△ Less
Submitted 24 September, 2024;
originally announced September 2024.
-
On the Relativistic Zero Knowledge Quantum Proofs of Knowledge
Authors:
Kaiyan Shi,
Kaushik Chakraborty,
Wen Yu Kon,
Omar Amer,
Marco Pistoia,
Charles Lim
Abstract:
We initiate the study of relativistic zero-knowledge quantum proof of knowledge systems with classical communication, formally defining a number of useful concepts and constructing appropriate knowledge extractors for all the existing protocols in the relativistic setting which satisfy a weaker variant of the special soundness property due to Unruh (EUROCRYPT 2012). We show that there exists quant…
▽ More
We initiate the study of relativistic zero-knowledge quantum proof of knowledge systems with classical communication, formally defining a number of useful concepts and constructing appropriate knowledge extractors for all the existing protocols in the relativistic setting which satisfy a weaker variant of the special soundness property due to Unruh (EUROCRYPT 2012). We show that there exists quantum proofs of knowledge with knowledge error 1/2 + negl(η) for all relations in NP via a construction of such a system for the Hamiltonian cycle relation using a general relativistic commitment scheme exhibiting the fairly-binding property due to Fehr and Fillinger (EUROCRYPT 2016). We further show that one can construct quantum proof of knowledge extractors for proof systems which do not exhibit special soundness, and therefore require an extractor to rewind multiple times. We develop a new multi-prover quantum rewinding technique by combining ideas from monogamy of entanglement and gentle measurement lemmas that can break the quantum rewinding barrier. Finally, we prove a new bound on the impact of consecutive measurements and use it to significantly improve the soundness bound of some existing relativistic zero knowledge proof systems, such as the one due to Chailloux and Leverrier (EUROCRYPT 2017).
△ Less
Submitted 17 December, 2024; v1 submitted 5 September, 2024;
originally announced September 2024.
-
Discrete-modulated continuous-variable quantum key distribution secure against general attacks
Authors:
Ignatius William Primaatmaja,
Wen Yu Kon,
Charles Lim
Abstract:
In recent years, discrete-modulated continuous-variable quantum key distribution (DM-CV-QKD) has gained traction due to its practical advantages: cost-effectiveness, simple state preparation, and compatibility with existing communication technologies. This work presents a security analysis of DM-CV-QKD against general sequential attacks, including finite-size effects. Remarkably, our proof conside…
▽ More
In recent years, discrete-modulated continuous-variable quantum key distribution (DM-CV-QKD) has gained traction due to its practical advantages: cost-effectiveness, simple state preparation, and compatibility with existing communication technologies. This work presents a security analysis of DM-CV-QKD against general sequential attacks, including finite-size effects. Remarkably, our proof considers attacks that are neither independent nor identical, and makes no assumptions about the Hilbert space dimension of the receiver. To analyse the security, we leverage the recent generalised entropy accumulation theorem and the numerical methods based on quasi-relative entropy. We also develop a novel dimension reduction technique which is compatible with the entropy accumulation framework. While our analysis reveals significant finite-size corrections to the key rate, the protocol might still offer advantages in specific scenarios due to its practical merits. Our work also offers some insights on how future security proofs can improve the security bounds derived in this work.
△ Less
Submitted 19 October, 2024; v1 submitted 4 September, 2024;
originally announced September 2024.
-
Sampled sub-block hashing for large input randomness extraction
Authors:
Hong Jie Ng,
Wen Yu Kon,
Ignatius William Primaatmaja,
Chao Wang,
Charles Lim
Abstract:
Randomness extraction is an essential post-processing step in practical quantum cryptography systems. When statistical fluctuations are taken into consideration, the requirement of large input data size could heavily penalise the speed and resource consumption of the randomness extraction process, thereby limiting the overall system performance. In this work, we propose a sampled sub-block hashing…
▽ More
Randomness extraction is an essential post-processing step in practical quantum cryptography systems. When statistical fluctuations are taken into consideration, the requirement of large input data size could heavily penalise the speed and resource consumption of the randomness extraction process, thereby limiting the overall system performance. In this work, we propose a sampled sub-block hashing approach to circumvent this problem by randomly dividing the large input block into multiple sub-blocks and processing them individually. Through simulations and experiments, we demonstrate that our method achieves an order-of-magnitude improvement in system throughput while keeping the resource utilisation low. Furthermore, our proposed approach is applicable to a generic class of quantum cryptographic protocols that satisfy the generalised entropy accumulation framework, presenting a highly promising and general solution for high-speed post-processing in quantum cryptographic applications such as quantum key distribution and quantum random number generation.
△ Less
Submitted 5 August, 2023;
originally announced August 2023.
-
Experimental symmetric private information retrieval with measurement-device-independent quantum network
Authors:
Chao Wang,
Wen Yu Kon,
Hong Jie Ng,
Charles C. -W. Lim
Abstract:
Secure information retrieval is an essential task in today's highly digitised society. In some applications, it may be necessary that user query's privacy and database content's security are enforced. For these settings, symmetric private information retrieval (SPIR) could be employed, but its implementation is known to be demanding, requiring a private key-exchange network as the base layer. Here…
▽ More
Secure information retrieval is an essential task in today's highly digitised society. In some applications, it may be necessary that user query's privacy and database content's security are enforced. For these settings, symmetric private information retrieval (SPIR) could be employed, but its implementation is known to be demanding, requiring a private key-exchange network as the base layer. Here, we report for the first time a realisation of provably-secure SPIR supported by a quantum-secure key-exchange network. The SPIR scheme looks at biometric security, offering secure retrieval of 582-byte fingerprint files from a database with 800 entries. Our experimental results clearly demonstrate the feasibility of SPIR with quantum secure communications, thereby opening up new possibilities in secure distributed data storage and cloud computing over the future Quantum Internet.
△ Less
Submitted 5 October, 2021; v1 submitted 27 September, 2021;
originally announced September 2021.
-
Estimating the photon-number distribution of photonic channels with realistic devices and applications in photonic quantum information processing
Authors:
Emilien Lavie,
Ignatius William Primaatmaja,
Wen Yu Kon,
Chao Wang,
Charles Ci Wen Lim
Abstract:
Characterising the input-output photon-number distribution of an unknown optical quantum channel is an important task for many applications in quantum information processing. Ideally, this would require deterministic photon-number sources and photon-number-resolving detectors, but these technologies are still work-in-progress. In this work, we propose a general method to rigorously bound the input…
▽ More
Characterising the input-output photon-number distribution of an unknown optical quantum channel is an important task for many applications in quantum information processing. Ideally, this would require deterministic photon-number sources and photon-number-resolving detectors, but these technologies are still work-in-progress. In this work, we propose a general method to rigorously bound the input-output photon number distribution of an unknown optical channel using standard optical devices such as coherent light sources and non-photon-number-resolving detectors/homodyne detectors. To demonstrate the broad utility of our method, we consider the security analysis of practical quantum key distribution systems based on calibrated single-photon detectors and an experimental proposal to implement time-correlated single photon counting technology using homodyne detectors instead of single-photon detectors.
△ Less
Submitted 10 September, 2021; v1 submitted 16 February, 2021;
originally announced February 2021.
-
Provably-secure symmetric private information retrieval with quantum cryptography
Authors:
Wen Yu Kon,
Charles Ci Wen Lim
Abstract:
Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. U…
▽ More
Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. Unconditionally secure SPIR solutions with multiple databases are known classically, but are unrealistic because they require long shared secret keys between the parties for secure communication and shared randomness in the protocol. Here, we propose using quantum key distribution (QKD) instead for a practical implementation, which can realise both the secure communication and shared randomness requirements. We prove that QKD maintains the security of the SPIR protocol and that it is also secure against any external eavesdropper. We also show how such a classical-quantum system could be implemented practically, using the example of a two-database SPIR protocol with keys generated by measurement device-independent QKD. Through key rate calculations, we show that such an implementation is feasible at the metropolitan level with current QKD technology.
△ Less
Submitted 17 January, 2021; v1 submitted 28 April, 2020;
originally announced April 2020.
-
Non-classicality of spin structures in condensed matter: An analysis of Sr$_{14}$Cu$_{24}$O$_{41}$
Authors:
W. Y. Kon,
T. Krisnanda,
P. Sengupta,
T. Paterek
Abstract:
When two quantum systems are coupled via a mediator, their dynamics has traces of non-classical properties of the mediator. We show how this observation can be effectively utilised to study the quantum nature of materials without well-established structure. A concrete example considered is Sr$_{14}$Cu$_{24}$O$_{41}$. Measurements of low temperature magnetic and thermal properties of this compound…
▽ More
When two quantum systems are coupled via a mediator, their dynamics has traces of non-classical properties of the mediator. We show how this observation can be effectively utilised to study the quantum nature of materials without well-established structure. A concrete example considered is Sr$_{14}$Cu$_{24}$O$_{41}$. Measurements of low temperature magnetic and thermal properties of this compound were explained with long-range coupling of unpaired spins through dimerised spin chains. We first show that the required coupling is not provided by the spin chain alone and give alternative compact two-dimensional spin structures compatible with the experimental results. Then we argue that any mediator between the unpaired spins must share with them quantum correlations in the form of quantum discord and in many cases quantum entanglement. In conclusion, present data witnesses quantum mediators between unpaired spins in Sr$_{14}$Cu$_{24}$O$_{41}$.
△ Less
Submitted 2 December, 2019; v1 submitted 13 July, 2019;
originally announced July 2019.
-
High-intensity two-frequency photoassociation spectroscopy of a weakly bound molecular state: theory and experiment
Authors:
W. Y. Kon,
J. A. Aman,
J. C. Hill,
T. C. Killian,
Kaden R. A. Hazzard
Abstract:
We investigate two-frequency photoassociation of a weakly bound molecular state, focusing on a regime where the ac Stark shift is comparable to the halo-state energy. In this "high-intensity" regime, we observe features absent in low-intensity two-frequency photoassociation. We experimentally measure the spectra of $^{86}$Sr atoms coupled to the least bound state of the $^{86}$Sr$_2$ ground electr…
▽ More
We investigate two-frequency photoassociation of a weakly bound molecular state, focusing on a regime where the ac Stark shift is comparable to the halo-state energy. In this "high-intensity" regime, we observe features absent in low-intensity two-frequency photoassociation. We experimentally measure the spectra of $^{86}$Sr atoms coupled to the least bound state of the $^{86}$Sr$_2$ ground electronic channel through an intermediate electronically excited molecular state. We compare the spectra to a simple three-level model that includes a two-frequency drive on each leg of the transition. With numerical solution of the time-dependent Schrodinger equation, we show that this model accurately captures (1) the existence of experimentally observed satellite peaks that arise from nonlinear processes, (2) the locations of the two-photon peak in the spectrum, including ac Stark shifts, and (3) in some cases, spectral lineshapes. To better understand these numerical results, we develop an approximate treatment of this model, based on Floquet and perturbation theory, that gives simple formulas that accurately capture the halo-state energies. We expect these expressions to be valuable tools to analyze and guide future two-frequency photoassociation experiments.
△ Less
Submitted 15 July, 2019; v1 submitted 30 December, 2018;
originally announced December 2018.