An author (arXiv:1709.09262 [quant-ph], 2017) has recently questioned the
security of two-way quantum key distribution schemes by referring to attack
strategies which leave no errors in the (raw) key shared by the legitimate
parties. We argue that the article is based on a flawed understanding of the
actual workings of a two-way protocol, thus the erroneous conclusions drawn
In recent years, there has been a great effort to prove the security of
quantum key distribution (QKD) with a minimum number of assumptions. Besides
its intrinsic theoretical interest, this would allow for larger tolerance
against device imperfections in the actual implementations. However, even in
this device-independent scenario, one assumption seems unavoidable, that is,
the presence of a protected space devoid of any unwanted information leakage in
which the legitimate parties can privately generate, process and store their
classical data. In this paper we relax this unrealistic and hardly feasible
assumption and introduce a general formalism to tackle the information leakage
problem in most of existing QKD systems. More specifically, we prove the
security of optical QKD systems using phase and intensity modulators in their
transmitters, which leak the setting information in an arbitrary manner. We
apply our security proof to cases of practical interest and show key rates
similar to those obtained in a perfectly shielded environment. Our work
constitutes a fundamental step forward in guaranteeing implementation security
of quantum communication systems.
Quantum key distribution (QKD) allows two users to communicate with
theoretically provable secrecy by encoding information on photonic qubits.
Current encoders are complex, however, which reduces their appeal for practical
use and introduces potential vulnerabilities to quantum attacks.
Distributed-phase-reference (DPR) systems were introduced as a simpler
alternative, but have not yet been proven practically secure against all
classes of attack. Here we demonstrate the first DPR QKD system with
information-theoretic security. Using a novel light source, where the coherence
between pulses can be controlled on a pulse-by-pulse basis, we implement a
secure DPR system based on the differential quadrature phase shift protocol.
The system is modulator-free, does not require active stabilization or a
complex receiver, and also offers megabit per second key rates, almost three
times higher than the standard Bennett-Brassard 1984 (BB84) protocol. This
enhanced performance and security highlights the potential for DPR protocols to
be adopted for real-world applications.
Time-bin encoding is an attractive method for transmitting photonic qubits
over long distances with minimal decoherence. It allows a simple receiver for
quantum key distribution (QKD) that extracts a key by measuring time of arrival
of photons and detects eavesdropping by measuring interference of pulses in
different time bins. In the past, coherent pulses have been generated using a
CW laser and an intensity modulator. A greatly simplified transmitter is
proposed and demonstrated here that works by directly modulating the laser
diode. Coherence between pulses is maintained by a weak seed laser. The
modulator-free source creates time-bin encoded pulses with a high extinction
ratio (29.4 dB) and an interference visibility above 97 %. The resulting QKD
transmitter gives estimated secure key rates up to 4.57 Mbit/s, the highest yet
reported for coherent-one-way QKD, and can be programmed for all protocols
using weak coherent pulses.
Quantum key distribution (QKD) permits information-theoretically secure
transmission of digital encryption keys, assuming that the behaviour of the
devices employed for the key exchange can be reliably modelled and predicted.
Remarkably, no assumptions have to be made on the capabilities of an
eavesdropper other than that she is bounded by the laws of Nature, thus making
the security of QKD "unconditional". However, unconditional security is hard to
achieve in practice. For example, any experimental realisation can only collect
finite data samples, leading to vulnerabilities against coherent attacks, the
most general class of attacks, and for some protocols the theoretical proof of
robustness against these attacks is still missing. For these reasons, in the
past many QKD experiments have fallen short of implementing an unconditionally
secure protocol and have instead considered limited attacking capabilities by
the eavesdropper. Here, we explore the security of QKD against coherent attacks
in the most challenging environment: the long-distance transmission of keys. We
demonstrate that the BB84 protocol can provide positive key rates for distances
up to 240 km without multiplexing of conventional signals, and up to 200 km
with multiplexing. Useful key rates can be achieved even for the longest
distances, using practical thermo-electrically cooled single-photon detectors.
Quantum key distribution (QKD) provides an attractive means for securing
communications in optical fibre networks. However, deployment of the technology
has been hampered by the frequent need for dedicated dark fibres to segregate
the very weak quantum signals from conventional traffic. Up until now the
coexistence of QKD with data has been limited to bandwidths that are orders of
magnitude below those commonly employed in fibre optic communication networks.
Using an optimised wavelength divisional multiplexing scheme, we transport QKD
and the prevalent 100 Gb/s data format in the forward direction over the same
fibre for the first time. We show a full quantum encryption system operating
with a bandwidth of 200 Gb/s over a 100 km fibre. Exploring the ultimate limits
of the technology by experimental measurements of the Raman noise, we
demonstrate it is feasible to combine QKD with 10 Tb/s of data over a 50 km
link. These results suggest it will be possible to integrate QKD and other
quantum photonic technologies into high bandwidth data communication
infrastructures, thereby allowing their widespread deployment.
Optical access networks connect multiple endpoints to a common network node
via shared fibre infrastructure. They will play a vital role to scale up the
number of users in quantum key distribution (QKD) networks. However, the
presence of power splitters in the commonly used passive network architecture
makes successful transmission of weak quantum signals challenging. This is
especially true if QKD and data signals are multiplexed in the passive network.
The splitter introduces an imbalance between quantum signal and Raman noise,
which can prevent the recovery of the quantum signal completely. Here we
introduce a method to overcome this limitation and demonstrate coexistence of
multi-user QKD and full power data traffic from a gigabit passive optical
network (GPON). The dual feeder implementation is compatible with standard GPON
architectures and can support up to 128 users, highlighting that quantum
protected GPON networks could be commonplace in the future.
In the quantum version of a Trojan-horse attack, photons are injected into
the optical modules of a quantum key distribution system in an attempt to read
information direct from the encoding devices. To stop the Trojan photons, the
use of passive optical components has been suggested. However, to date, there
is no quantitative bound that specifies such components in relation to the
security of the system. Here, we turn the Trojan-horse attack into an
information leakage problem. This allows us quantify the system security and
relate it to the specification of the optical elements. The analysis is
supported by the experimental characterization, within the operation regime, of
reflectivity and transmission of the optical components most relevant to
Information-theoretical security of quantum key distribution (QKD) has been
convincingly proven in recent years and remarkable experiments have shown the
potential of QKD for real world applications. Due to its unique capability of
combining high key rate and security in a realistic finite-size scenario, the
efficient version of the BB84 QKD protocol endowed with decoy states has been
subject of intensive research. Its recent experimental implementation finally
demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber.
However the achieved rate holds under the restrictive assumption that the
eavesdropper performs collective attacks. Here, we review the protocol and
generalize its security. We exploit a map by Ahrens to rigorously upper bound
the Hypergeometric distribution resulting from a general eavesdropping. Despite
the extended applicability of the new protocol, its key rate is only marginally
smaller than its predecessor in all cases of practical interest.
We report on a gated single-photon detector based on InGaAs/InP avalanche
photodiodes (APDs) with a single-photon detection efficiency exceeding 55% at
1550 nm. Our detector is gated at 1 GHz and employs the self-differencing
technique for gate transient suppression. It can operate nearly dead time free,
except for the one clock cycle dead time intrinsic to self-differencing, and we
demonstrate a count rate of 500 Mcps. We present a careful analysis of the
optimal driving conditions of the APD measured with a dead time free detector
characterization setup. It is found that a shortened gate width of 360 ps
together with an increased driving signal amplitude and operation at higher
temperatures leads to improved performance of the detector. We achieve an
afterpulse probability of 7% at 50% detection efficiency with dead time free
measurement and a record efficiency for InGaAs/InP APDs of 55% at an afterpulse
probability of only 10.2% with a moderate dead time of 10 ns.
The theoretically proven security of quantum key distribution (QKD) could
revolutionise how information exchange is protected in the future. Several
field tests of QKD have proven it to be a reliable technology for cryptographic
key exchange and have demonstrated nodal networks of point-to-point links.
However, so far no convincing answer has been given to the question of how to
extend the scope of QKD beyond niche applications in dedicated high security
networks. Here we show that adopting simple and cost-effective
telecommunication technologies to form a quantum access network can greatly
expand the number of users in quantum networks and therefore vastly broaden
their appeal. We are able to demonstrate that a high-speed single-photon
detector positioned at a network node can be shared between up to 64 users for
exchanging secret keys with the node, thereby significantly reducing the
hardware requirements for each user added to the network. This
point-to-multipoint architecture removes one of the main obstacles restricting
the widespread application of QKD. It presents a viable method for realising
multi-user QKD networks with resource efficiency and brings QKD closer to
becoming the first widespread technology based on quantum physics.
Quantum key distribution protocols typically make use of a one-way quantum
channel to distribute a shared secret string to two distant users. However,
protocols exploiting a two-way quantum channel have been proposed as an
alternative route to the same goal, with the potential advantage of
outperforming one-way protocols. Here we provide a strategy to prove security
for two-way quantum key distribution protocols against the most general quantum
attack possible by an eavesdropper. We utilize an entropic uncertainty
relation, and only a few assumptions need to be made about the devices used in
the protocol. We also show that a two-way protocol can outperform comparable
In this paper we set forth a novel connection between the Bennett 1992
protocol and a Bell inequality. This allows us to extend the usual
prepare-and-measure protocol to its entanglement-based formulation. We exploit
a recent result in the frame of device-independent quantum key distribution to
provide a simple, model-independent, security proof for the new protocol. The
minimum efficiency required for a practical implementation of the scheme is the
lowest reported to date.
We review a communication protocol recently proposed by us that makes use of
a two-way quantum channel. We provide a characterization of such a protocol
from a practical perspective, and consider the most relevant eavesdropping
strategies against it. This allows us to compare its potentialities with those
of a standard protocol which uses a one-way quantum channel.
An asymmetric preparation of the quantum states sent through a noisy channel
can enable a new way to monitor and actively compensate the channel noise. The
paradigm of such an asymmetric treatment of quantum information is the Bennett
1992 protocol, in which the ratio between conclusive and inconclusive counts is
in direct connection with the channel noise. Using this protocol as a guiding
example, we show how to correct the phase drift of a communication channel
without using reference pulses, interruptions of the quantum transmission or
public data exchanges.
Decoherence may significantly affect the polarization state of optical pulses
propagating in dispersive media because of the unavoidable presence of more
than a single frequency in the envelope of the pulse. Here we report on the
suppression of polarization decoherence in a ring cavity obtained by properly
retooling for photonic qubits the ``bang-bang'' protection technique already
employed for nuclear spins and nuclear-quadrupole qubits. Our results show that
bang-bang control can be profitably extended to quantum information processes
involving flying polarization qubits.
We introduce a novel form of decoy-state technique to make the single-photon
Bennett 1992 protocol robust against losses and noise of a communication
channel. Two uninformative states are prepared by the transmitter in order to
prevent the unambiguous state discrimination attack and improve the phase-error
rate estimation. The presented method does not require strong reference pulses,
additional electronics or extra detectors for its implementation.
We study the detection of weak coherent forces by means of an optomechanical
device formed by a highly reflecting isolated mirror shined by an intense and
highly monochromatic laser field. Radiation pressure excites a vibrational mode
of the mirror, inducing sidebands of the incident field, which are then
measured by heterodyne detection. We determine the sensitivity of such a scheme
and show that the use of an entangled input state of the two sideband modes
improves the detection, even in the presence of damping and noise acting on the
I present an eavesdropping on the protocol proposed by W.-H. Kye, et al.
[Phys. Rev. Lett. 95, 040501 (2005)]. I show how an undetectable Eve can steal
the whole information by labeling and then measuring the photons prepared by
the user Alice.
We study the temporal evolution of entanglement pertaining to two qubits
interacting with a thermal bath. In particular we consider the simplest
nontrivial spin bath models where symmetry breaking occurs and treat them by
mean field approximation. We analytically find decoherence free entangled
states as well as entangled states with an exponential decay of the quantum
correlation at finite temperature.