-
Versatile Quantum-Safe Hybrid Key Exchange and Its Application to MACsec
Authors:
Jaime S. Buruaga,
Augustine Bugler,
Juan P. Brito,
Vicente Martin,
Christoph Striecks
Abstract:
Advancements in quantum computing pose a significant threat to most of the cryptography currently deployed. Fortunately, cryptographic building blocks to mitigate the threat are already available; mostly based on post-quantum and quantum cryptography, but also on symmetric cryptography techniques. Notably, quantum-safe building blocks must be deployed as soon as possible due to the ``harvest-now d…
▽ More
Advancements in quantum computing pose a significant threat to most of the cryptography currently deployed. Fortunately, cryptographic building blocks to mitigate the threat are already available; mostly based on post-quantum and quantum cryptography, but also on symmetric cryptography techniques. Notably, quantum-safe building blocks must be deployed as soon as possible due to the ``harvest-now decrypt-later'' attack scenario, which is already challenging our sensitive and encrypted data today.
Following an agile defense-in-depth approach, Hybrid Authenticated Key Exchange (HAKE) protocols have recently been gaining significant attention. Such protocols modularly combine conventional, post-quantum, and quantum cryptography to achieve confidentiality, authenticity, and integrity guarantees for network channels. Unfortunately, only a few protocols have yet been proposed (mainly Muckle and Muckle+) with different flexibility guarantees.
Looking at available standards in the network domain (especially at the Media Access Control Security (MACsec) standard), we believe that HAKE protocols could already bring strong security benefits to MACsec today. MACsec is a standard designed to secure communication at the data link layer in Ethernet networks by providing security for all traffic between adjacent entities. In addition, MACsec establishes secure channels within a Local Area Network (LAN), ensuring that data remain protected from eavesdropping, tampering, and unauthorized access, while operating transparently to higher layer protocols. Currently, MACsec does not offer enough protection in the event of cryptographically relevant quantum computers.
In this work, we tackle the challenge and propose a new versatile HAKE protocol, dubbed VMuckle, which is sufficiently flexible for the use in MACsec to provide LAN participants with hybrid key material ensuring secure communication.
△ Less
Submitted 21 May, 2025; v1 submitted 20 May, 2025;
originally announced May 2025.
-
Quantum-Safe integration of TLS in SDN networks
Authors:
Jaime S. Buruaga,
Ruben B. Méndez,
Juan P. Brito,
Vicente Martin
Abstract:
Shor's algorithm efficiently solves factoring and discrete logarithm problems using quantum computers, compromising all public key schemes used today. These schemes rely on assumptions on their computational complexity, which quantum computers can easily bypass. The solutions have to come from new algorithms - called Post-Quantum Cryptography (PQC) - or from new methods, such as Quantum Key Distri…
▽ More
Shor's algorithm efficiently solves factoring and discrete logarithm problems using quantum computers, compromising all public key schemes used today. These schemes rely on assumptions on their computational complexity, which quantum computers can easily bypass. The solutions have to come from new algorithms - called Post-Quantum Cryptography (PQC) - or from new methods, such as Quantum Key Distribution (QKD). The former replicate the computational security ideas of classical public key algorithms, while the latter recurs to use the quantum properties of nature, which also brings a mathematical security proof, potentially offering Information-Theoretic Security. To secure data in the future, we must adopt these paradigms. With the speed of quantum computing advancements, the transition to quantum-safe cryptography within the next decade is critical. Delays could expose long-lived confidential data, as current encryption may be broken before its value expires. However, the shift must balance the adoption of new technologies with maintaining proven systems to protect against present and future threats. In this work, we have selected Transport Layer Security, one of the most widely used protocols, as the foundation to hybridize classical, quantum, and post-quantum cryptography in a way suitable for broad adoption in Software-Defined Networking, the most flexible networking paradigm that has been used to deploy integrated quantum-classical networks. To this end, we use standards for QKD key extraction and SDN integration. The purposed implementation is based on the latest version of TLS and demonstrates advanced capabilities such as rekeying and key transport across a large QKD network, while supporting crypto-agility and maintaining backward compatibility through the use of ciphersuites. The performance of this approach has been demonstrated using a deployed production infrastructure.
△ Less
Submitted 24 February, 2025;
originally announced February 2025.
-
A blueprint for large-scale quantum-network deployments
Authors:
Alberto Sebastián-Lombraña,
Hans H. Brunner,
Juan P. Brito,
Rubén B. Méndez,
Rafael J. Vicente,
Jaime S. Buruaga,
Laura Ortiz,
Chi-Hang Fred Fung,
Momtchil Peev,
José M. Rivas-Moscoso,
Felipe Jiménez,
Antonio Pastor,
Diego R. López,
Jesús Folgueira,
Vicente Martín
Abstract:
Quantum Communications is a field that promises advances in cryptography, quantum computing and clock synchronisation, among other potential applications. However, communication based on quantum phenomena requires an extreme level of isolation from external disturbances, making the transmission of quantum signals together with classical ones difficult. A range of techniques has been tested to intr…
▽ More
Quantum Communications is a field that promises advances in cryptography, quantum computing and clock synchronisation, among other potential applications. However, communication based on quantum phenomena requires an extreme level of isolation from external disturbances, making the transmission of quantum signals together with classical ones difficult. A range of techniques has been tested to introduce quantum communications in already deployed optical networks which also carry legacy traffic. This comes with challenges, not only at the physical layer but also at the operations and management layer. To achieve a broad acceptance among network operators, the joint management and operation of quantum and classical resources, compliance with standards, and quality and legal assurance need to be addressed. This article presents a detailed account of solutions to the above issues, deployed and evaluated in the MadQCI (Madrid Quantum Communication Infrastructure) testbed. This network is designed to integrate quantum communications in the telecommunications ecosystem by installing quantum-key-distribution modules from multiple providers in production nodes of two different operators. The modules were connected through an optical-switched network with more than 130 km of deployed optical fibre. The tests were done in compliance with strict service level agreements that protected the legacy traffic of the pre-existing classical network. The goal was to achieve full quantum-classical compatibility at all levels, while limiting the modifications of optical transport and encryption and complying with as many standards as possible. This effort was intended to serve as a blueprint, which can be used as the foundation of large-scale quantum network deployments. To demonstrate the capabilities of MadQCI, end-to-end encryption services were deployed and a variety of use-cases were showcased.
△ Less
Submitted 26 December, 2024; v1 submitted 2 September, 2024;
originally announced September 2024.
-
Experimental Implementation of A Quantum Zero-Knowledge Proof for User Authentication
Authors:
Marta I. Garcia-Cid,
Dileepsai Bodanapu,
Alberto Gatto,
Paolo Martelli,
Vicente Martin,
Laura Ortiz
Abstract:
A new interactive quantum zero-knowledge protocol for identity authentication implementable in currently available quantum cryptographic devices is proposed and demonstrated. The protocol design involves a verifier and a prover knowing a pre-shared secret, and the acceptance or rejection of the proof is determined by the quantum bit error rate. It has been implemented in modified Quantum Key Distr…
▽ More
A new interactive quantum zero-knowledge protocol for identity authentication implementable in currently available quantum cryptographic devices is proposed and demonstrated. The protocol design involves a verifier and a prover knowing a pre-shared secret, and the acceptance or rejection of the proof is determined by the quantum bit error rate. It has been implemented in modified Quantum Key Distribution devices executing two fundamental cases. In the first case, all players are honest, while in the second case, one of the users is a malicious player. We demonstrate an increase of the quantum bit error rate around 25% in the latter case compared to the case of honesty. The protocol has also been validated for distances from a back-to-back setup to more than 60 km between verifier and prover. The security and robustness of the protocol has been analysed, demonstrating its completeness, soundness and zero-knowledge properties.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Strategies for the Integration of quantum networks for a future quantum internet
Authors:
M. I. Garcia-Cid,
L. Ortiz,
J. Saez,
V. Martin
Abstract:
The great scientific and technological advances that are being carried out in the field of quantum communications, accompanied by large investment programs such as EuroQCI, are driving the deployment of quantum network throughout the world. One of the final long-term objectives is to achieve the development of a quantum internet that provides greater security in its services and new functionalitie…
▽ More
The great scientific and technological advances that are being carried out in the field of quantum communications, accompanied by large investment programs such as EuroQCI, are driving the deployment of quantum network throughout the world. One of the final long-term objectives is to achieve the development of a quantum internet that provides greater security in its services and new functionalities that the current internet does not have. This article analyzes the possible integration strategies of already deployed networks or in the process of being deployed in order to reach a future global quantum network. Two strategies based on the SDN paradigm are proposed, based on a hierarchical controller scheme and on a distributed model. Each of these approaches shows pros and cons and could be applicable in different use cases. To define these strategies, the most relevant deployments of quantum communications networks carried out to date has been analyzed, as well as the different approaches for a quantum network architecture and topology, and the various proposed definitions of what quantum internet is and what are the components that would make it up in an ideal scenario. Finally, several detected opportunities and challenges regarding security and technological aspects are presented.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
MadQCI: a heterogeneous and scalable SDN QKD network deployed in production facilities
Authors:
V. Martin,
J. P. Brito,
L. Ortiz,
R. B. Mendez,
J. S. Buruaga,
R. J. Vicente,
A. Sebastián-Lombraña,
D. Rincon,
F. Perez,
C. Sanchez,
M. Peev,
H. H. Brunner,
F. Fung,
A. Poppe,
F. Fröwis,
A. J. Shields,
R. I. Woodward,
H. Griesser,
S. Roehrich,
F. De La Iglesia,
C. Abellan,
M. Hentschel,
J. M. Rivas-Moscoso,
A. Pastor,
J. Folgueira
, et al. (1 additional authors not shown)
Abstract:
Current quantum key distribution (QKD) networks focus almost exclusively on transporting secret keys with the highest possible rate. Consequently, they are built as mostly fixed, ad hoc, logically, and physically isolated infrastructures designed to avoid any penalty to the quantum channel. This architecture is neither scalable nor cost-effective and future, real-world deployments will differ cons…
▽ More
Current quantum key distribution (QKD) networks focus almost exclusively on transporting secret keys with the highest possible rate. Consequently, they are built as mostly fixed, ad hoc, logically, and physically isolated infrastructures designed to avoid any penalty to the quantum channel. This architecture is neither scalable nor cost-effective and future, real-world deployments will differ considerably. The structure of the MadQCI QKD network presented here is based on disaggregated components and modern paradigms especially designed for flexibility, upgradability, and facilitating the integration of QKD in the security and telecommunications-networks ecosystem. These underlying ideas have been tested by deploying many QKD systems from several manufacturers in a real-world, multi-tenant telecommunications network, installed in production facilities and sharing the infrastructure with commercial traffic. Different technologies have been used in different links to address the variety of situations and needs that arise in real networks, exploring a wide range of possibilities. Finally, a set of realistic use cases have been implemented to demonstrate the validity and performance of the network. The testing took place during a period close to three years, where most of the nodes were continuously active.
△ Less
Submitted 3 December, 2023; v1 submitted 21 November, 2023;
originally announced November 2023.
-
Stabilization of approximate GHZ state with quasi-local couplings
Authors:
Vincent Martin,
Alain Sarlette
Abstract:
We propose a reservoir design, composed of fixed dissipation operators acting each on few local subsystems, to stabilize an approximate GHZ state on n qubits. The main idea is to work out how a previously proposed sequence of two stabilization steps can be applied instead in appropriate (probabilistic) superposition. We examine alternatives to synchronize the superposition using local couplings on…
▽ More
We propose a reservoir design, composed of fixed dissipation operators acting each on few local subsystems, to stabilize an approximate GHZ state on n qubits. The main idea is to work out how a previously proposed sequence of two stabilization steps can be applied instead in appropriate (probabilistic) superposition. We examine alternatives to synchronize the superposition using local couplings only, thanks to a chain of "clock" ancillas or to additional levels on the data subsystems. The practical value of these alternatives depends on experimental constraints. They all feature a design tradeoff between approximate stabilization fidelity and protection against perturbations. These proposals illustrate how simple autonomous automata can be implemented in quantum reservoir engineering to replace sequential state preparation procedures. Encoding automaton actions via additional data levels only, appears particularly efficient in this context. Our analysis method, reducing the Lindblad master equation to a Markov chain on virtual output signals, may be of independent interest.
△ Less
Submitted 8 June, 2023;
originally announced June 2023.
-
Teaching quantum communications through a hands-on laboratory
Authors:
Alberto Sebastián-Lombraña,
Laura Ortiz,
Juan P. Brito,
Jaime Sáez de Buruaga,
Rafael J. Vicente,
Ruben B. Mendez,
Rafael Artiñano,
Vicente Martín
Abstract:
Teaching quantum communication is a challenging task when involving different technical and engineering backgrounds. The use of an approach that exploits the knowledge of these profiles, as well as other technological resources available for demonstrations or exercises, enhances this teaching. This paper presents as an example the "Quantum Communications Lab" that took place at the 6th INFIERI Sum…
▽ More
Teaching quantum communication is a challenging task when involving different technical and engineering backgrounds. The use of an approach that exploits the knowledge of these profiles, as well as other technological resources available for demonstrations or exercises, enhances this teaching. This paper presents as an example the "Quantum Communications Lab" that took place at the 6th INFIERI Summer School in 2021. In this lab, the access to the Madrid Quantum Communication Infrastructure (MadQCI) was an important resource available.
△ Less
Submitted 3 May, 2023; v1 submitted 1 March, 2023;
originally announced March 2023.
-
STE-QUEST -- Space Time Explorer and QUantum Equivalence principle Space Test: The 2022 medium-class mission concept
Authors:
Naceur Gaaloul,
Holger Ahlers,
Leonardo Badurina,
Angelo Bassi,
Baptiste Battelier,
Quentin Beaufils,
Kai Bongs,
Philippe Bouyer,
Claus Braxmaier,
Oliver Buchmueller,
Matteo Carlesso,
Eric Charron,
Maria Luisa Chiofalo,
Robin Corgier,
Sandro Donadi,
Fabien Droz,
John Ellis,
Frédéric Estève,
Enno Giese,
Jens Grosse,
Aurélien Hees,
Thomas A. Hensel,
Waldemar Herr,
Philippe Jetzer,
Gina Kleinsteinberg
, et al. (23 additional authors not shown)
Abstract:
Space-borne quantum technologies, particularly those based on atom interferometry, are heralding a new era of strategic and robust space exploration. The unique conditions of space, characterized by low noise and low gravity environments, open up diverse possibilities for applications ranging from precise time and frequency transfer to Earth Observation and the search of new Physics. In this paper…
▽ More
Space-borne quantum technologies, particularly those based on atom interferometry, are heralding a new era of strategic and robust space exploration. The unique conditions of space, characterized by low noise and low gravity environments, open up diverse possibilities for applications ranging from precise time and frequency transfer to Earth Observation and the search of new Physics. In this paper, we summarise the M-class mission proposal in response to the 2022 call in ESA's science program: Space-Time Explorer and Quantum Equivalence Principle Space Test (STE-QUEST). It consists in a satellite mission featuring a dual-species atom interferometer operating over extended durations. This mission aims to tackle three of the most fundamental questions in Physics: (i) testing the universality of free fall with an accuracy better than one part in $10^{-17}$, (ii) exploring various forms of Ultra-Light Dark Matter, and (iii) scrutinizing the foundations of Quantum Mechanics.
△ Less
Submitted 19 May, 2025; v1 submitted 28 November, 2022;
originally announced November 2022.
-
Long-Range QKD without Trusted Nodes is Not Possible with Current Technology
Authors:
Bruno Huttner,
Romain Alléaume,
Eleni Diamanti,
Florian Fröwis,
Philippe Grangier,
Hannes Hübel,
Vicente Martin,
Andreas Poppe,
Joshua A. Slater,
Tim Spiller,
Wolfgang Tittel,
Benoit Tranier,
Adrian Wonfor,
Hugo Zbinden
Abstract:
A recently published patent (https://www.ipo.gov.uk/p-ipsum/Case/PublicationNumber/GB2590064) has claimed the development of a novel quantum key distribution protocol purporting to achieve long-range quantum security without trusted nodes and without use of quantum repeaters. Here we present a straightforward analysis of this claim, and reach the conclusion that it is largely unfounded.
A recently published patent (https://www.ipo.gov.uk/p-ipsum/Case/PublicationNumber/GB2590064) has claimed the development of a novel quantum key distribution protocol purporting to achieve long-range quantum security without trusted nodes and without use of quantum repeaters. Here we present a straightforward analysis of this claim, and reach the conclusion that it is largely unfounded.
△ Less
Submitted 16 December, 2022; v1 submitted 4 October, 2022;
originally announced October 2022.
-
Analysis of quantum correlations within the ground state of a three level Lipkin model
Authors:
Javier Faba,
Vicente Martín,
Luis Robledo
Abstract:
The performance of beyond mean field methods in solving the quantum many body problem for fermions is usually characterized by the correlation energy measured with respect to the underlying mean field value. In this paper we address the issue of characterizing the amount of correlations associated to different approximations from a quantum information perspective. With this goal in mind, we analyz…
▽ More
The performance of beyond mean field methods in solving the quantum many body problem for fermions is usually characterized by the correlation energy measured with respect to the underlying mean field value. In this paper we address the issue of characterizing the amount of correlations associated to different approximations from a quantum information perspective. With this goal in mind, we analyze the traditional Hartree-Fock (HF) method with spontaneous symmetry breaking, the HF with symmetry restoration and the generator coordinate method (GCM) in a exactly solvable fermion model known as the three-level Lipkin model. To characterize correlations including entanglement and beyond we use the quantum discord between different partition orbitals. We find that for physically motivated partitions, the quantum discord of the exact ground state is reasonably well reproduced by the different approximations. However, other partitions create "fake quantum correlations" in order to capture quantum correlations corresponding to partitions for which the Hartree-Fock solution fails. Those are removed and redistributed through a symmetry restoration process.
△ Less
Submitted 16 June, 2022; v1 submitted 17 March, 2022;
originally announced March 2022.
-
Towards European Standards for Quantum Technologies
Authors:
O. van Deventer,
N. Spethmann,
M. Loeffler,
M. Amoretti,
R. van den Brink,
N. Bruno,
P. Comi,
N. Farrugia,
M. Gramegna,
B. Kassenberg,
W. Kozlowski,
T. Länger,
T. Lindstrom,
V. Martin,
N. Neumann,
H. Papadopoulos,
S. Pascazio,
M. Peev,
R. Pitwon,
M. A. Rol,
P. Traina,
P. Venderbosch,
F. K. Wilhelm-Mauch,
A. Jenet
Abstract:
The Second Quantum Revolution facilitates the engineering of new classes of sensors, communication technologies, and computers with unprecedented capabilities. Supply chains for quantum technologies are emerging, some focussed on commercially available components for enabling technologies and/or quantum-technologies research infrastructures, others with already higher technology-readiness levels,…
▽ More
The Second Quantum Revolution facilitates the engineering of new classes of sensors, communication technologies, and computers with unprecedented capabilities. Supply chains for quantum technologies are emerging, some focussed on commercially available components for enabling technologies and/or quantum-technologies research infrastructures, others with already higher technology-readiness levels, near to the market.
In 2018, the European Commission has launched its large-scale and long-term Quantum Flagship research initiative to support and foster the creation and development of a competitive European quantum technologies industry, as well as the consolidation and expansion of leadership and excellence in European quantum technology research. One of the measures to achieve an accelerated development and uptake has been identified by the Quantum Flagship in its Strategic Research Agenda: the promotion of coordinated, dedicated standardisation and certification efforts. Standardisation is indeed of paramount importance to facilitate the growth of new technologies, and the development of efficient and effective supply chains. The harmonisation of technologies, methodologies, and interfaces enables interoperable products, innovation, and competition, all leading to structuring and hence growth of markets. As quantum technologies are maturing, time has come to start thinking about further standardisation needs.
This article presents insights on standardisation for quantum technologies from the perspective of the CEN-CENELEC Focus Group on Quantum Technologies (FGQT), which was established in June 2020 to coordinate and support the development of standards relevant for European industry and research.
△ Less
Submitted 3 October, 2022; v1 submitted 3 March, 2022;
originally announced March 2022.
-
Numerical investigation of the logarithmic Schrödinger model of quantum decoherence
Authors:
Rory van Geleuken,
Andrew V. Martin
Abstract:
A logarithmic Schrödinger equation with time-dependent coupling to the non-linearity is presented as a model of collisional decoherence of the wavefunction of a quantum particle in position-space. The particular mathematical form of the logarithmic Schrödinger equation has been shown to follow from conditional wave theory, but the validity of the logarithmic Schrödinger equation has not yet been i…
▽ More
A logarithmic Schrödinger equation with time-dependent coupling to the non-linearity is presented as a model of collisional decoherence of the wavefunction of a quantum particle in position-space. The particular mathematical form of the logarithmic Schrödinger equation has been shown to follow from conditional wave theory, but the validity of the logarithmic Schrödinger equation has not yet been investigated numerically for general initial conditions. Using an operator-splitting approach, we solve the non-linear equation of motion for the wavefunction numerically and compare it it to the solution of the standard Joos-Zeh master equation for the density matrix. We find good agreement for the time-dependent behaviour of the ensemble widths between the two approaches, but note curious `zero-pinning' behaviour of the logarithmic Schrödinger equation, whereby the zeros of the wavefunction are not erased by continued propagation. By examining the derivation of the logarithmic Schrödinger equation from conditional wave theory, we indicate possible avenues of resolution to this zero-pinning problem.
△ Less
Submitted 10 October, 2021;
originally announced October 2021.
-
Conditional wave theory of environmental interactions with a quantum particle
Authors:
Rory van Geleuken,
Andrew V. Martin
Abstract:
We present an alternative formulation of quantum decoherence theory using conditional wave theory (CWT), which was originally developed in molecular physics (also known as exact factorisation methods). We formulate a CWT of a classic model of collisional decoherence of a free particle with environmental particles treated in a long-wavelength limit. In general, the CWT equation of motion for the pa…
▽ More
We present an alternative formulation of quantum decoherence theory using conditional wave theory (CWT), which was originally developed in molecular physics (also known as exact factorisation methods). We formulate a CWT of a classic model of collisional decoherence of a free particle with environmental particles treated in a long-wavelength limit. In general, the CWT equation of motion for the particle is non-linear, where the non-linearity enters via the CWT gauge fields. For Gaussian wave packets the analytic solutions of the CWT equations are in exact agreement with those from the density matrix formalism. We show that CWT gauge terms that determine the dynamics of the particle's marginal wave function are related to a Taylor series expansion of the particle's reduced density matrix. Approximate solutions to these equations lead to a linear-time approximation that reproduces the ensemble width in the limits of both short and long times, in addition to reproducing the long-term behaviour of the coherence length. With this approximation, the non-linear equation of motion for the particle's marginal wave function can be written in the form of the logarithmic Schrödinger equation. The CWT formalism may lead to computationally efficient calculations of quantum decoherence, since it involves working with wave-function level terms instead of evolving a density matrix via a master equation.
△ Less
Submitted 1 October, 2021;
originally announced October 2021.
-
Quantum Technologies in the Telecommunications Industry
Authors:
Vicente Martin,
Juan Pedro Brito,
Carmen Escribano,
Marco Menchetti,
Catherine White,
Andrew Lord,
Felix Wissel,
Matthias Gunkel,
Paulette Gavignet,
Naveena Genay,
Olivier Le Moult,
Carlos Abellán,
Antonio Manzalini,
Antonio Pastor-Perales,
Victor López,
Diego López
Abstract:
Quantum based technologies have been fundamental in our world. After producing the laser and the transistor, the devices that have shaped our modern information society, the possibilities enabled by the ability to create and manipulate individual quantum states opens the door to a second quantum revolution. In this paper we explore the possibilities that these new technologies bring to the Telecom…
▽ More
Quantum based technologies have been fundamental in our world. After producing the laser and the transistor, the devices that have shaped our modern information society, the possibilities enabled by the ability to create and manipulate individual quantum states opens the door to a second quantum revolution. In this paper we explore the possibilities that these new technologies bring to the Telecommu-nications industry
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
Correlation energy and quantum correlations in a solvable model
Authors:
Javier Faba,
Vicente Martín,
Luis Robledo
Abstract:
Typically in many-body systems the correlation energy, which is defined as the difference between the exact ground state energy and the mean-field solution, has been a measure of the system's total correlations. However, under the quantum information context, it is possible to define some quantities in terms of the system's constituents that measure the classical and quantum correlations, such as…
▽ More
Typically in many-body systems the correlation energy, which is defined as the difference between the exact ground state energy and the mean-field solution, has been a measure of the system's total correlations. However, under the quantum information context, it is possible to define some quantities in terms of the system's constituents that measure the classical and quantum correlations, such as the entanglement entropy, mutual information, quantum discord, one-body entropy, etc. In this work, we apply concepts of quantum information in fermionic systems in order to study traditional correlation measures (the relative correlation energy) from a novel approach. Concretely, we analyze the two and three level Lipkin models, which are exactly solvable (but non trivial) models very used in the context of the many-body problem.
△ Less
Submitted 15 July, 2021; v1 submitted 30 June, 2021;
originally announced June 2021.
-
Two-orbital quantum discord in fermion systems
Authors:
Javier Faba,
Vicente Martín,
Luis Robledo
Abstract:
A simple expression to compute the quantum discord between two orbitals in fermion systems is derived using the parity superselection rule. As the correlation between orbitals depends on the basis chosen, we discuss a special orbital basis, the natural one. We show that quantum correlations between natural orbital pairs disappear when the pairing tensor is zero, i.e. the particle number symmetry i…
▽ More
A simple expression to compute the quantum discord between two orbitals in fermion systems is derived using the parity superselection rule. As the correlation between orbitals depends on the basis chosen, we discuss a special orbital basis, the natural one. We show that quantum correlations between natural orbital pairs disappear when the pairing tensor is zero, i.e. the particle number symmetry is preserved. The Hartree-Fock orbitals within a Slater determinant state, a Hartree-Fock-Bogoliubov quasiparticle orbitals in a quasiparticle vacuum, or the ground state of a Hamiltonian with particle symmetry and their corresponding natural orbitals are some relevant examples of natural basis and their corresponding states. Since natural orbitals have that special property, we seek for the quantum discord in non-natural orbital basis. We analyze our findings in the context of the Lipkin-Meshkov-Glick and Agassi models.
△ Less
Submitted 22 March, 2021; v1 submitted 2 December, 2020;
originally announced December 2020.
-
Scaling up reservoir engineering for error-correcting codes
Authors:
Vincent Martin,
Alain Sarlette
Abstract:
Error-correcting codes are usually envisioned to counter errors by operating unitary corrections depending on the projective measurement results of some syndrome observables. We here propose a way to use them in a more integrated way, where the error correction is applied continuously and autonomously by an engineered environment. We focus on a proposal for the repetition code that counters bit-fl…
▽ More
Error-correcting codes are usually envisioned to counter errors by operating unitary corrections depending on the projective measurement results of some syndrome observables. We here propose a way to use them in a more integrated way, where the error correction is applied continuously and autonomously by an engineered environment. We focus on a proposal for the repetition code that counters bit-flip errors, and how to scale up the network encoding a logical quantum bit, towards stronger information protection. The challenge has been to devise a network architecture which allows to autonomously correct higher-order errors, while remaining realistic towards experimental realization by avoiding all-to-all or all-to-one coupling.
△ Less
Submitted 6 October, 2020;
originally announced October 2020.
-
Quantum Chaos and the Spectrum of Factoring
Authors:
Jose Luis Rosales,
Samira Briongos,
Vicente Martin
Abstract:
There exists a Hamiltonian formulation of the factorisation problem which also needs the definition of a factorisation ensemble (a set to which factorable numbers, $N'=x'y'$, having the same trivial factorisation algorithmic complexity, belong). For the primes therein, a function $E$, that may take only discrete values, should be the analogous of the energy from a confined system of charges in a m…
▽ More
There exists a Hamiltonian formulation of the factorisation problem which also needs the definition of a factorisation ensemble (a set to which factorable numbers, $N'=x'y'$, having the same trivial factorisation algorithmic complexity, belong). For the primes therein, a function $E$, that may take only discrete values, should be the analogous of the energy from a confined system of charges in a magnetic trap. This is the quantum factoring simulator hypothesis connecting quantum mechanics with number theory. In this work, we report numerical evidence of the existence of this kind of discrete spectrum from the statistical analysis of the values of $E$ in a sample of random OpenSSL n-bits moduli (which may be taken as a part of the factorisation ensemble). Here, we show that the unfolded distance probability of these $E$'s fits to a {\it Gaussian Unitary Ensemble}, consistently as required, if they actually correspond to the quantum energy levels spacing of a magnetically confined system that exhibits chaos. The confirmation of these predictions bears out the quantum simulator hypothesis and, thereby, it points to the existence of a liaison between quantum mechanics and number theory. Shor's polynomial time complexity of the quantum factorisation problem, from pure quantum simulation primitives, was obtained.
△ Less
Submitted 24 August, 2020;
originally announced August 2020.
-
Quantum simulation of the integer factorization problem: Bell states in a Penning trap
Authors:
Jose Luis Rosales,
Vicente Martin
Abstract:
The arithmetic problem of factoring an integer $N$ can be translated into the physics of a quantum device, a result that supports Pólya's and Hilbert's conjecture to prove Riemann's hypothesis. The energies of this system, being univocally related to the factors of $N$, are the eigenvalues of a bounded Hamiltonian. Here we solve the quantum conditions and show that the histogram of the discrete en…
▽ More
The arithmetic problem of factoring an integer $N$ can be translated into the physics of a quantum device, a result that supports Pólya's and Hilbert's conjecture to prove Riemann's hypothesis. The energies of this system, being univocally related to the factors of $N$, are the eigenvalues of a bounded Hamiltonian. Here we solve the quantum conditions and show that the histogram of the discrete energies, provided by the spectrum of the system, should be interpreted in number theory as the relative probability for a prime to be a factor candidate of $N$. This is equivalent to a quantum sieve that is demonstrated to require only $ o(\log \sqrt N)^3$ energy measurements to solve the problem, recovering Shor's complexity result. Hence, the outcome can be seen as a probability map that a pair of primes solve the given factorization problem. Furthermore, we show that a possible embodiment of this quantum simulator corresponds to two entangled particles in a Penning trap. The possibility to build the simulator experimentally is studied in detail. The results show that factoring numbers, many orders of magnitude larger than those computed with experimentally available quantum computers, is achievable using typical parameters in Penning traps.
△ Less
Submitted 12 February, 2018; v1 submitted 11 April, 2017;
originally announced April 2017.
-
Quantum Simulation of the Factorization Problem
Authors:
Jose Luis Rosales,
Vicente Martin
Abstract:
Feynman's prescription for a quantum simulator was to find a hamitonian for a system that could serve as a computer. Pólya and Hilbert conjecture was to demonstrate Riemann's hypothesis through the spectral decomposition of hermitian operators. Here we study the problem of decomposing a number into its prime factors, $N=xy$, using such a simulator. First, we derive the hamiltonian of the physical…
▽ More
Feynman's prescription for a quantum simulator was to find a hamitonian for a system that could serve as a computer. Pólya and Hilbert conjecture was to demonstrate Riemann's hypothesis through the spectral decomposition of hermitian operators. Here we study the problem of decomposing a number into its prime factors, $N=xy$, using such a simulator. First, we derive the hamiltonian of the physical system that simulate a new arithmetic function, formulated for the factorization problem, that represents the energy of the computer. This function rests alone on the primes below $\sqrt N$. We exactly solve the spectrum of the quantum system without resorting to any external ad-hoc conditions, also showing that it obtains, for $x\ll \sqrt{N}$, a prediction of the prime counting function that is almost identical to Riemann's $R(x)$ function. It has no counterpart in analytic number theory and its derivation is a consequence of the quantum theory of the simulator alone.
△ Less
Submitted 8 November, 2016; v1 submitted 19 January, 2016;
originally announced January 2016.
-
Entanglement Distribution in Optical Networks
Authors:
Alex Ciurana,
Vicente Martin,
Jesus Martinez-Mateo,
Bernhard Schrenk,
Momtchil Peev,
Andreas Poppe
Abstract:
The ability to generate entangled photon-pairs over a broad wavelength range opens the door to the simultaneous distribution of entanglement to multiple users in a network by using centralized sources and flexible wavelength-division multiplexing schemes. Here we show the design of a metropolitan optical network consisting of tree-type access networks whereby entangled photon-pairs are distributed…
▽ More
The ability to generate entangled photon-pairs over a broad wavelength range opens the door to the simultaneous distribution of entanglement to multiple users in a network by using centralized sources and flexible wavelength-division multiplexing schemes. Here we show the design of a metropolitan optical network consisting of tree-type access networks whereby entangled photon-pairs are distributed to any pair of users, independent of their location. The network is constructed employing commercial off-the-shelf components and uses the existing infrastructure, which allows for moderate deployment costs. We further develop a channel plan and a network-architecture design to provide a direct optical path between any pair of users, thus allowing classical and one-way quantum communication as well as entanglement distribution. This allows the simultaneous operation of multiple quantum information technologies. Finally, we present a more flexible backbone architecture that pushes away the load limitations of the original network design by extending its reach, number of users and capabilities.
△ Less
Submitted 21 September, 2014;
originally announced September 2014.
-
Demystifying the Information Reconciliation Protocol Cascade
Authors:
Jesus Martinez-Mateo,
Christoph Pacher,
Momtchil Peev,
Alex Ciurana,
Vicente Martin
Abstract:
Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and,…
▽ More
Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and, although its efficiency is not optimal, it has become the de-facto standard for practical implementations of information reconciliation in quantum key distribution. The aim of this work is to analyze the performance of Cascade, to discuss its strengths, weaknesses and optimization possibilities, comparing with some of the modified versions that have been proposed in the literature. When looking at all design trade-offs, a new view emerges that allows to put forward a number of guidelines and propose near optimal parameters for the practical implementation of Cascade improving performance significantly in comparison with all previous proposals.
△ Less
Submitted 22 December, 2014; v1 submitted 11 July, 2014;
originally announced July 2014.
-
Quantum Metropolitan Optical Network based on Wavelength Division Multiplexing
Authors:
Alex Ciurana,
Jesus Martinez-Mateo,
Momtchil Peev,
Andreas Poppe,
Nino Walenta,
Hugo Zbinden,
Vicente Martin
Abstract:
Quantum Key Distribution (QKD) is maturing quickly. However, the current approaches to its application in optical networks make it an expensive technology. QKD networks deployed to date are designed as a collection of point-to-point, dedicated QKD links where non-neighboring nodes communicate using the trusted repeater paradigm. We propose a novel optical network model in which QKD systems share t…
▽ More
Quantum Key Distribution (QKD) is maturing quickly. However, the current approaches to its application in optical networks make it an expensive technology. QKD networks deployed to date are designed as a collection of point-to-point, dedicated QKD links where non-neighboring nodes communicate using the trusted repeater paradigm. We propose a novel optical network model in which QKD systems share the communication infrastructure by wavelength multiplexing their quantum and classical signals. The routing is done using optical components within a metropolitan area which allows for a dynamically any-to-any communication scheme. Moreover, it resembles a commercial telecom network, takes advantage of existing infrastructure and utilizes commercial components, allowing for an easy, cost-effective and reliable deployment.
△ Less
Submitted 16 September, 2013;
originally announced September 2013.
-
Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters
Authors:
David Elkouss,
Jesus Martinez-Mateo,
Alex Ciurana,
Vicente Martin
Abstract:
In this paper we explore how recent technologies can improve the security of optical networks. In particular, we study how to use quantum key distribution (QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secret-key distribution that relies only on the fundamental principles of quant…
▽ More
In this paper we explore how recent technologies can improve the security of optical networks. In particular, we study how to use quantum key distribution (QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secret-key distribution that relies only on the fundamental principles of quantum physics. Point-to-point QKD devices have reached a mature industrial state; however, these devices are severely limited in distance, since signals at the quantum level (e.g. single photons) are highly affected by the losses in the communication channel and intermediate devices. To overcome this limitation, intermediate nodes (i.e. repeaters) are used. Both, quantum-regime and trusted, classical, repeaters have been proposed in the QKD literature, but only the latter can be implemented in practice. As a novelty, we propose here a new QKD network model based on the use of not fully trusted intermediate nodes, referred as weakly trusted repeaters. This approach forces the attacker to simultaneously break several paths to get access to the exchanged key, thus improving significantly the security of the network. We formalize the model using network codes and provide real scenarios that allow users to exchange secure keys over metropolitan optical networks using only passive components. Moreover, the theoretical framework allows to extend these scenarios not only to accommodate more complex trust constraints, but also to consider robustness and resiliency constraints on the network.
△ Less
Submitted 15 April, 2013;
originally announced April 2013.
-
Analysis of a rate-adaptive reconciliation protocol and the effect of the leakage on the secret key rate
Authors:
David Elkouss,
Jesus Martinez-Mateo,
Vicente Martin
Abstract:
Quantum key distribution performs the trick of growing a secret key in two distant places connected by a quantum channel. The main reason is that the legitimate users can bound the information gathered by the eavesdropper. In practical systems, whether because of finite resources or external conditions, the quantum channel is subject to fluctuations. A rate adaptive information reconciliation prot…
▽ More
Quantum key distribution performs the trick of growing a secret key in two distant places connected by a quantum channel. The main reason is that the legitimate users can bound the information gathered by the eavesdropper. In practical systems, whether because of finite resources or external conditions, the quantum channel is subject to fluctuations. A rate adaptive information reconciliation protocol, that adapts to the changes in the communication channel, is then required to minimize the leakage of information in the classical postprocessing.
We consider here the leakage of a rate-adaptive information reconciliation protocol. The length of the exchanged messages is larger than that of an optimal protocol; however, we prove that the min-entropy reduction is limited. The simulation results, both on the asymptotic and in the finite-length regime, show that this protocol allows to increase the amount of distillable secret key.
△ Less
Submitted 11 April, 2013;
originally announced April 2013.
-
Blind Reconciliation
Authors:
Jesus Martinez-Mateo,
David Elkouss,
Vicente Martin
Abstract:
Information reconciliation is a crucial procedure in the classical post-processing of quantum key distribution (QKD). Poor reconciliation efficiency, revealing more information than strictly needed, may compromise the maximum attainable distance, while poor performance of the algorithm limits the practical throughput in a QKD device. Historically, reconciliation has been mainly done using close to…
▽ More
Information reconciliation is a crucial procedure in the classical post-processing of quantum key distribution (QKD). Poor reconciliation efficiency, revealing more information than strictly needed, may compromise the maximum attainable distance, while poor performance of the algorithm limits the practical throughput in a QKD device. Historically, reconciliation has been mainly done using close to minimal information disclosure but heavily interactive procedures, like Cascade, or using less efficient but also less interactive -just one message is exchanged- procedures, like the ones based in low-density parity-check (LDPC) codes. The price to pay in the LDPC case is that good efficiency is only attained for very long codes and in a very narrow range centered around the quantum bit error rate (QBER) that the code was designed to reconcile, thus forcing to have several codes if a broad range of QBER needs to be catered for. Real world implementations of these methods are thus very demanding, either on computational or communication resources or both, to the extent that the last generation of GHz clocked QKD systems are finding a bottleneck in the classical part. In order to produce compact, high performance and reliable QKD systems it would be highly desirable to remove these problems. Here we analyse the use of short-length LDPC codes in the information reconciliation context using a low interactivity, blind, protocol that avoids an a priori error rate estimation. We demonstrate that 2x10^3 bits length LDPC codes are suitable for blind reconciliation. Such codes are of high interest in practice, since they can be used for hardware implementations with very high throughput.
△ Less
Submitted 29 January, 2013; v1 submitted 25 May, 2012;
originally announced May 2012.
-
Information Reconciliation for Quantum Key Distribution
Authors:
David Elkouss,
Jesus Martinez-Mateo,
Vicente Martin
Abstract:
Quantum key distribution (QKD) relies on quantum and classical procedures in order to achieve the growing of a secret random string -the key- known only to the two parties executing the protocol. Limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping produce errors and information leakage from which the set of measured signals -the raw key- must be stripped in order to d…
▽ More
Quantum key distribution (QKD) relies on quantum and classical procedures in order to achieve the growing of a secret random string -the key- known only to the two parties executing the protocol. Limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping produce errors and information leakage from which the set of measured signals -the raw key- must be stripped in order to distill a final, information theoretically secure, key. The key distillation process is a classical one in which basis reconciliation, error correction and privacy amplification protocols are applied to the raw key. This cleaning process is known as information reconciliation and must be done in a fast and efficient way to avoid cramping the performance of the QKD system. Brassard and Salvail proposed a very simple and elegant protocol to reconcile keys in the secret-key agreement context, known as Cascade, that has become the de-facto standard for all QKD practical implementations. However, it is highly interactive, requiring many communications between the legitimate parties and its efficiency is not optimal, imposing an early limit to the maximum tolerable error rate. In this paper we describe a low-density parity-check reconciliation protocol that improves significantly on these problems. The protocol exhibits better efficiency and limits the number of uses of the communications channel. It is also able to adapt to different error rates while remaining efficient, thus reaching longer distances or higher secure key rate for a given QKD system.
△ Less
Submitted 1 April, 2011; v1 submitted 9 July, 2010;
originally announced July 2010.
-
QKD in Standard Optical Telecommunications Networks
Authors:
D. Lancho,
J. Martinez,
D. Elkouss,
M. Soto,
V. Martin
Abstract:
To perform Quantum Key Distribution, the mastering of the extremely weak signals carried by the quantum channel is required. Transporting these signals without disturbance is customarily done by isolating the quantum channel from any noise sources using a dedicated physical channel. However, to really profit from this technology, a full integration with conventional network technologies would be h…
▽ More
To perform Quantum Key Distribution, the mastering of the extremely weak signals carried by the quantum channel is required. Transporting these signals without disturbance is customarily done by isolating the quantum channel from any noise sources using a dedicated physical channel. However, to really profit from this technology, a full integration with conventional network technologies would be highly desirable. Trying to use single photon signals with others that carry an average power many orders of magnitude bigger while sharing as much infrastructure with a conventional network as possible brings obvious problems. The purpose of the present paper is to report our efforts in researching the limits of the integration of QKD in modern optical networks scenarios. We have built a full metropolitan area network testbed comprising a backbone and an access network. The emphasis is put in using as much as possible the same industrial grade technology that is actually used in already installed networks, in order to understand the throughput, limits and cost of deploying QKD in a real network.
△ Less
Submitted 18 June, 2010; v1 submitted 9 June, 2010;
originally announced June 2010.