• ### On the security of two-way quantum key distribution(1805.01651)

May 8, 2018 quant-ph
An author (arXiv:1709.09262 [quant-ph], 2017) has recently questioned the security of two-way quantum key distribution schemes by referring to attack strategies which leave no errors in the (raw) key shared by the legitimate parties. We argue that the article is based on a flawed understanding of the actual workings of a two-way protocol, thus the erroneous conclusions drawn thereof.
• ### Decoy-state quantum key distribution with a leaky source(1803.06045)

March 16, 2018 quant-ph
In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.
• ### Manipulating photon coherence to enhance the security of practical quantum key distribution(1709.04214)

Sept. 13, 2017 quant-ph
Quantum key distribution (QKD) allows two users to communicate with theoretically provable secrecy by encoding information on photonic qubits. Current encoders are complex, however, which reduces their appeal for practical use and introduces potential vulnerabilities to quantum attacks. Distributed-phase-reference (DPR) systems were introduced as a simpler alternative, but have not yet been proven practically secure against all classes of attack. Here we demonstrate the first DPR QKD system with information-theoretic security. Using a novel light source, where the coherence between pulses can be controlled on a pulse-by-pulse basis, we implement a secure DPR system based on the differential quadrature phase shift protocol. The system is modulator-free, does not require active stabilization or a complex receiver, and also offers megabit per second key rates, almost three times higher than the standard Bennett-Brassard 1984 (BB84) protocol. This enhanced performance and security highlights the potential for DPR protocols to be adopted for real-world applications.
• ### Modulator-free coherent-one-way quantum key distribution(1707.04425)

July 18, 2017 quant-ph
Time-bin encoding is an attractive method for transmitting photonic qubits over long distances with minimal decoherence. It allows a simple receiver for quantum key distribution (QKD) that extracts a key by measuring time of arrival of photons and detects eavesdropping by measuring interference of pulses in different time bins. In the past, coherent pulses have been generated using a CW laser and an intensity modulator. A greatly simplified transmitter is proposed and demonstrated here that works by directly modulating the laser diode. Coherence between pulses is maintained by a weak seed laser. The modulator-free source creates time-bin encoded pulses with a high extinction ratio (29.4 dB) and an interference visibility above 97 %. The resulting QKD transmitter gives estimated secure key rates up to 4.57 Mbit/s, the highest yet reported for coherent-one-way QKD, and can be programmed for all protocols using weak coherent pulses.
• ### Long-distance quantum key distribution secure against coherent attacks(1701.07252)

Jan. 25, 2017 quant-ph
Quantum key distribution (QKD) permits information-theoretically secure transmission of digital encryption keys, assuming that the behaviour of the devices employed for the key exchange can be reliably modelled and predicted. Remarkably, no assumptions have to be made on the capabilities of an eavesdropper other than that she is bounded by the laws of Nature, thus making the security of QKD "unconditional". However, unconditional security is hard to achieve in practice. For example, any experimental realisation can only collect finite data samples, leading to vulnerabilities against coherent attacks, the most general class of attacks, and for some protocols the theoretical proof of robustness against these attacks is still missing. For these reasons, in the past many QKD experiments have fallen short of implementing an unconditionally secure protocol and have instead considered limited attacking capabilities by the eavesdropper. Here, we explore the security of QKD against coherent attacks in the most challenging environment: the long-distance transmission of keys. We demonstrate that the BB84 protocol can provide positive key rates for distances up to 240 km without multiplexing of conventional signals, and up to 200 km with multiplexing. Useful key rates can be achieved even for the longest distances, using practical thermo-electrically cooled single-photon detectors.
• ### Ultra-high bandwidth quantum secured data transmission(1610.04072)

Oct. 13, 2016 quant-ph
Quantum key distribution (QKD) provides an attractive means for securing communications in optical fibre networks. However, deployment of the technology has been hampered by the frequent need for dedicated dark fibres to segregate the very weak quantum signals from conventional traffic. Up until now the coexistence of QKD with data has been limited to bandwidths that are orders of magnitude below those commonly employed in fibre optic communication networks. Using an optimised wavelength divisional multiplexing scheme, we transport QKD and the prevalent 100 Gb/s data format in the forward direction over the same fibre for the first time. We show a full quantum encryption system operating with a bandwidth of 200 Gb/s over a 100 km fibre. Exploring the ultimate limits of the technology by experimental measurements of the Raman noise, we demonstrate it is feasible to combine QKD with 10 Tb/s of data over a 50 km link. These results suggest it will be possible to integrate QKD and other quantum photonic technologies into high bandwidth data communication infrastructures, thereby allowing their widespread deployment.
• ### Quantum secured gigabit optical access networks(1509.03496)

Sept. 11, 2015 quant-ph, physics.optics
Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON). The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future.
• ### Practical security bounds against the Trojan-horse attack in quantum key distribution(1506.01989)

Aug. 3, 2015 quant-ph
In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security.
• ### Security bounds for efficient decoy-state quantum key distribution(1503.07335)

March 25, 2015 quant-ph
Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.
• ### GHz-gated InGaAs/InP single-photon detector with detection efficiency exceeding 55% at 1550 nm(1412.1586)

Feb. 26, 2015 quant-ph
We report on a gated single-photon detector based on InGaAs/InP avalanche photodiodes (APDs) with a single-photon detection efficiency exceeding 55% at 1550 nm. Our detector is gated at 1 GHz and employs the self-differencing technique for gate transient suppression. It can operate nearly dead time free, except for the one clock cycle dead time intrinsic to self-differencing, and we demonstrate a count rate of 500 Mcps. We present a careful analysis of the optimal driving conditions of the APD measured with a dead time free detector characterization setup. It is found that a shortened gate width of 360 ps together with an increased driving signal amplitude and operation at higher temperatures leads to improved performance of the detector. We achieve an afterpulse probability of 7% at 50% detection efficiency with dead time free measurement and a record efficiency for InGaAs/InP APDs of 55% at an afterpulse probability of only 10.2% with a moderate dead time of 10 ns.
• ### A quantum access network(1309.6431)

Sept. 2, 2014 quant-ph, physics.optics
The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realising multi-user QKD networks with resource efficiency and brings QKD closer to becoming the first widespread technology based on quantum physics.
• ### Security of two-way quantum key distribution(1301.3138)

Dec. 12, 2013 quant-ph
Quantum key distribution protocols typically make use of a one-way quantum channel to distribute a shared secret string to two distant users. However, protocols exploiting a two-way quantum channel have been proposed as an alternative route to the same goal, with the potential advantage of outperforming one-way protocols. Here we provide a strategy to prove security for two-way quantum key distribution protocols against the most general quantum attack possible by an eavesdropper. We utilize an entropic uncertainty relation, and only a few assumptions need to be made about the devices used in the protocol. We also show that a two-way protocol can outperform comparable one-way protocols.
• ### Device-independent entanglement-based Bennett 1992 protocol(1111.1997)

Oct. 5, 2012 quant-ph
In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date.
• ### Quantum Key Distribution and Communication using a Two-way Quantum Channel(1004.0157)

June 22, 2010 quant-ph
We review a communication protocol recently proposed by us that makes use of a two-way quantum channel. We provide a characterization of such a protocol from a practical perspective, and consider the most relevant eavesdropping strategies against it. This allows us to compare its potentialities with those of a standard protocol which uses a one-way quantum channel.
• ### Compensating the Noise of a Communication Channel via Asymmetric Encoding of Quantum Information(1001.5234)

Jan. 28, 2010 quant-ph
An asymmetric preparation of the quantum states sent through a noisy channel can enable a new way to monitor and actively compensate the channel noise. The paradigm of such an asymmetric treatment of quantum information is the Bennett 1992 protocol, in which the ratio between conclusive and inconclusive counts is in direct connection with the channel noise. Using this protocol as a guiding example, we show how to correct the phase drift of a communication channel without using reference pulses, interruptions of the quantum transmission or public data exchanges.
• ### Experimental inhibition of decoherence on flying qubits via bang-bang control(0811.2654)

July 7, 2009 quant-ph
Decoherence may significantly affect the polarization state of optical pulses propagating in dispersive media because of the unavoidable presence of more than a single frequency in the envelope of the pulse. Here we report on the suppression of polarization decoherence in a ring cavity obtained by properly retooling for photonic qubits the bang-bang'' protection technique already employed for nuclear spins and nuclear-quadrupole qubits. Our results show that bang-bang control can be profitably extended to quantum information processes involving flying polarization qubits.
• ### Robust Unconditionally Secure Quantum Key Distribution with Two Nonorthogonal and Uninformative States(0907.0493)

July 2, 2009 quant-ph
We introduce a novel form of decoy-state technique to make the single-photon Bennett 1992 protocol robust against losses and noise of a communication channel. Two uninformative states are prepared by the transmitter in order to prevent the unambiguous state discrimination attack and improve the phase-error rate estimation. The presented method does not require strong reference pulses, additional electronics or extra detectors for its implementation.
• ### Quantum-limited force measurement with an optomechanical device(quant-ph/0610236)

Oct. 27, 2006 quant-ph
We study the detection of weak coherent forces by means of an optomechanical device formed by a highly reflecting isolated mirror shined by an intense and highly monochromatic laser field. Radiation pressure excites a vibrational mode of the mirror, inducing sidebands of the incident field, which are then measured by heterodyne detection. We determine the sensitivity of such a scheme and show that the use of an entangled input state of the two sideband modes improves the detection, even in the presence of damping and noise acting on the mechanical mode.
• ### Eavesdropping on Blind Quantum Key Distribution through a Labeling Attack(quant-ph/0511072)

Nov. 8, 2005 quant-ph
I present an eavesdropping on the protocol proposed by W.-H. Kye, et al. [Phys. Rev. Lett. 95, 040501 (2005)]. I show how an undetectable Eve can steal the whole information by labeling and then measuring the photons prepared by the user Alice.
• ### Two qubits entanglement dynamics in a symmetry-broken environment(quant-ph/0402073)

Feb. 10, 2004 quant-ph
We study the temporal evolution of entanglement pertaining to two qubits interacting with a thermal bath. In particular we consider the simplest nontrivial spin bath models where symmetry breaking occurs and treat them by mean field approximation. We analytically find decoherence free entangled states as well as entangled states with an exponential decay of the quantum correlation at finite temperature.