Design and Implementation of High-Performance Devices for Continuous-Variable Quantum Key Distribution Luis Trigo Vidarte

Total Page:16

File Type:pdf, Size:1020Kb

Design and Implementation of High-Performance Devices for Continuous-Variable Quantum Key Distribution Luis Trigo Vidarte Design and implementation of high-performance devices for continuous-variable quantum key distribution Luis Trigo Vidarte To cite this version: Luis Trigo Vidarte. Design and implementation of high-performance devices for continuous-variable quantum key distribution. Optics [physics.optics]. Université Paris Saclay (COmUE), 2019. English. NNT : 2019SACLO021. tel-02516921 HAL Id: tel-02516921 https://pastel.archives-ouvertes.fr/tel-02516921 Submitted on 24 Mar 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Design and implementation of high-performance devices for continuous-variable quantum key distribution These` de doctorat de l’Universite´ Paris-Saclay prepar´ ee´ a` l’Institut d’Optique Graduate School NNT : 2019SACL0021 Ecole´ doctorale n◦572 Ondes et Matiere` (EDOM) Specialit´ e´ de doctorat : Physique These` present´ ee´ et soutenue a` Palaiseau, le 20 decembre´ 2019, par LUIS TRIGO VIDARTE Composition du Jury : Delphine MORRIS-MORINI Prof., Centre de Nanosciences et de Nanotechnologies (C2N) President´ Virginia D’AURIA MCF, Universite´ Nice Sophia Antipolis Rapporteur Valerio PRUNERI Prof., Institut de Ciencies` Fotoniques` (ICFO) Rapporteur Romain ALLEAUME´ MCF, Tel´ ecom´ Paris Examinateur Thierry DEBUISSCHERT Ing. de recherche, Thales Research and Technology Examinateur Philippe GRANGIER DRCE, Institut d’Optique Graduate School; CNRS Directeur de these` Eleni DIAMANTI DR, Sorbonne Universite;´ CNRS Co-directeur de these` ` ese de doctorat Th Manuscript Conception et réalisation de dispositifs de distribution de clé quantique à variables continues à haute performance Design and implementation of high-performance devices for continuous-variable quantum key distribution Luis TRIGO VIDARTE Laboratoire Charles Fabry (Institut d’Optique Graduate School) - Laboratoire d’Informatique de Paris 6 (Sorbonne Université) Text Acknowledgements These initial words intend to express my gratitude to the people that have, in one way or another, contributed to the completion of this manuscript and my doctoral studies. The list is long, but I think all the names mentioned deserve to be here. I would like to start by thanking all the members of the Jury for their dedication, reviewing effort and useful comments. I want to dedicate particular attention to my thesis directors, Eleni and Philippe, a team that is bigger than the sum of the parts and a gracious combination of research excellence and humanity. I had the opportunity to work in different projects, where I was lucky to collaborate with many different people, in several institutions. I find it difficult to follow a particu- lar acknowledge sequence so I will begin by thanking my fellow PhD companions in the CV-QKD adventure, with whom I had the chance to spend more time in the lab. My first lab partner was Mauro Persechino and I must say that it is a pleasure to interact with him, inside and outside the lab. Later I had the opportunity to work with François Roumestan, a very insightful engineer and engaging person. Víctor Román Rodríguez of course cannot be unnoticed, thank you for the work and the Spanish laughs. Almost at the end of my PhD Damien Fruleux and Adam Raptakis started theirs, but I foresee a successful PhD path for both of them. At long distance, but with fruitful results was the collaboration with Nathan Abrams and David Álvarez Outerelo, which gave me the opportunity to learn many things about integrated optics. Not PhD students, but already CV-QKD experts by now are Adrien Cavaillès and Matteo Schiavon, as well as Amine Rhouni, our electronics expert that has a lot of patience with me. Special thoughts to the interns I had the chance to interact with, Alexandre Maïnos and Meriem Kemache. All my gratefulness for them. Regarding my brief incursion in the world of quantum money I had the pleasure to work with Mathieu Bozzio, Adeline Orieux and Iordanis Kerenidis. I was introduced to quantum communication complexity by Niraj Kumar and Federico Centrone, and to more fundamental quantum optics by Simon Neves. Shouvik Ghorai gave the necessary support in the theoretical part of CV-QKD. Thanks a lot! Coming back to integrated photonics my first collaboration was with C2N in the ANR QRYPTOS project, working with Paul Crozat, Delphine Marris-Morini, Mauro Persechino, Laurent Vivien and André Villing. Under the CRYSP project I could visit Keren Bergman’s Lightwave Research Laboratory in Columbia University, New York. There I had the opportunity to work with two fantastic PhD students, Nathan Abrams and Christine Chen. At Nokia Bell Labs in Nozay, I could work with Amirhossein "Amir" Ghazisaeidi, Jérémie Renaudier, François Roumestan and Christian Simonneau. I would like to thank them and the rest of the team for hosting me during the time I spent there. The free-space section could not have been possible without the persistence of Daniele Dequal at ASI and the help of Víctor Román Rodríguez and Anthony Leverrier, as well as the support of Giuseppe Vallone and Paolo Villoresi. It was special to collaborate with people from University of Vigo, my home university, David Álvarez Outerelo and Francisco Javier Díaz Otero in the design of chips dedi- cated to quantum information tasks (with the help of Valentina Moskalenko). I would also like to thank Carlos Mosquera Nartallo and Marcos Curty, who introduced me to digital communications and quantum key distribution respectively, for the discussions related to my work. A considerable time effort has been dedicated to the development of the electronics and cannot be neglected. In that sense I am deeply grateful to André Villing and Frédéric Moron at IOGS, Gérard Mouret at Télécom Paris, and Amine Rhouni at LIP6. Particular thanks to the IOGS mechanical workshop for providing us with reliable mechanical components. I could dedicate part of my time to teach at IOGS in which was a very rewarding experience. I would like to thank all the students and the people who helped me during this task: Denis Boiron, Julien Villemejane, Fabienne Bernard, Julien Moreau, Franck Delmotte, Pierre Dussarrat, Remy Juvenal, Thibault Harlé, Anaïs Molineri, Thierry Avignon, Cedric Lejeune, Ilan Schlesinger, Matthieu Boffety, François Goudail, Vincent Lienhard, Clémence Briosne-Fréjaville, Julien Desprès and Yvan Sortais. I was also involved in the organization of different events related to research, maybe the most intense was the participation in the local organizing committee of ICIQP 2018. I would like to thank the rest of the team: Eleni Diamanti, Pascale Senellart-Mandon, Sara Ducci, Maria Amanti, Carlos Antón Solanas and Florent Baboux, as well as the other people who helped in the event. Sara was also the organizer of the master that introduced me to research in France, so I am specially thankful for that and I use the occasion to remember my cohort colleagues and teachers. I consider that the environment is a very important factor for successful research and I had nothing but good experiences in the different groups I participated. Thank you optique quantique group at LCF (IOGS): Daniel Barredo, Rajiv Boddeda, Guillaume Boucher, Martin Bouillard, Ludovic Brossard, Antoine Browaeys, Senka Cuk,´ Sylvain De Léséleuc, Júlia Ferrer Ortas, Igor Ferrier-Barbut, Yara Hodroj, Thierry Lahaye, Florence Nogrette, Benjamin Pointard, Pascal Scholl, Kai-Niklas Schymik, Rosa Tualle-Brouri and Imam Usmani. Thank you Philippe Delaye for organizing the group seminars. Thanks to everyone in the exponentially growing LIP6 QI team (and collaborators): Hossein Aghababa, Francesco Arzani, Robert Booth, Cyril Castagnet, Ulysse Chabaud, Léo Colisson, Ellen Derbyshire, Tom Douce, Pierre Emmanuel Emeriau, Frédéric Grosshans, Elham Kashefi, Dominik Leichtle, Yao Ma, Shane Mansfield, Atul Mantri, Damian Markham, Natansh Mathur, Clément Meignant, Rawad Mezher, Luka Mu- sic, Andrea Olivo, Harold Ollivier, Rhea Parekh, Alisa Russanova, Nathan Shettell, Shraddha Singh, Anu Unnikrishnan and Raja Yehia. A little bit more distant in time, but still with a good impression in my memory, remains my period at Télécom ParisTech, where I could meet (and work with) Romain Alléaume, Martin Cordier, Leonardo Disilvestro, Masoud Ghalaii, Marc Kaplan, Niraj Kumar, Rupesh Kumar, Adrien Marie, Bill Plick, Hao Qin, Adel Sohbi, Julien Trapateau and Isabelle Zaquine. My attention also for non-quantum people: Danilo, Karel, Mario, Kasia, Jon, Andrea, Dalia, Leonardo, Michele, Mircea, Maura and Serena. I would also like to thank the work done by PCQC that facilitated the interaction with researchers like André Chailloux, Kaushik Chakraborty, Ruben Cohen, Alex Grillo, Antoine Grospellier and Vivien Londe. On the administrative side I would like to thank the teams of EDOM, Télécom Paris- Tech and LIP6, but very specially to all the people in human resources at IOGS, as well as the people in reception and reprography. They have been very efficient, professional and helpful at all times. The same can be said for the direction of LCF: thank you Patrick George and Maïké Seychelles. Turning to less professional recognitions I would like to warmly thank Adel, Anambar, Danilo, Kate, Kaushik, Mylène, Niraj and Venkat for all the moments spent together during the last few years. I cannot forget the people who made the effort to visit me and are always welcome wherever I go: Alessandra, Alicia, Ana P, Ana SA, Anna, Claire, David, Eliana, Emily, Fran, Giorgio, Julia, Jurgita, Ola, Marine, Miguel, Monika, Sumit, Tamara, Typhaine, Thomas, Thuy, Viti, Yaiza, and of course Mery and Lucía! Many thanks also to my hosts in Paris: Evelyn, Pascale, Christina, Emmanuel and especially Anne-Solange. Por último, pero non menos importante, gustaríame agradecer á miña familia todo o seu apoio e cariño ó longo de todos estes anos.
Recommended publications
  • Security of Quantum Key Distribution with Entangled Qutrits
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CERN Document Server Security of Quantum Key Distribution with Entangled Qutrits. Thomas Durt,1 Nicolas J. Cerf,2 Nicolas Gisin,3 and Marek Zukowski˙ 4 1 Toegepaste Natuurkunde en Fotonica, Theoeretische Natuurkunde, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium 2 Ecole Polytechnique, CP 165, Universit´e Libre de Bruxelles, 1050 Brussels, Belgium 3 Group of Applied Physics - Optique, Universit´e de Gen`eve, 20 rue de l’Ecole de M´edecine, Gen`eve 4, Switzerland, 4Instytut Fizyki Teoretycznej i Astrofizyki Uniwersytet, Gda´nski, PL-80-952 Gda´nsk, Poland July 2002 Abstract The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a general- isation of Ekert's cryptographic protocol[20] where qubits are replaced by qutrits. The security of this protocol is related to non-locality, in analogy with Ekert's protocol. In order to study its robustness against the optimal individual attacks, we derive the infor- mation gained by a potential eavesdropper applying a cloning-based attack. Introduction Quantum cryptography aims at transmitting a random key in such a way that the presence of an eavesdropper that monitors the communication is revealed by disturbances in the transmission of the key (for a review, see e.g. [21]). Practically, it is enough in order to realize a crypto- graphic protocol that the key signal is encoded into quantum states that belong to incompatible bases, as in the original protocol of Bennett and Brassard[4].
    [Show full text]
  • Large Scale Quantum Key Distribution: Challenges and Solutions
    Large scale quantum key distribution: challenges and solutions QIANG ZHANG,1,2 FEIHU XU,1,2 YU-AO CHEN,1,2 CHENG-ZHI PENG1,2 AND JIAN-WEI PAN1,2,* 1Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai, 201315, China 2CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, P. R. China *[email protected], [email protected] Abstract: Quantum key distribution (QKD) together with one time pad encoding can provide information-theoretical security for communication. Currently, though QKD has been widely deployed in many metropolitan fiber networks, its implementation in a large scale remains experimentally challenging. This letter provides a brief review on the experimental efforts towards the goal of global QKD, including the security of practical QKD with imperfect devices, QKD metropolitan and backbone networks over optical fiber and satellite-based QKD over free space. 1. Introduction Quantum key distribution (QKD) [1,2], together with one time pad (OTP) [3] method, provides a secure means of communication with information-theoretical security based on the basic principle of quantum mechanics. Light is a natural and optimal candidate for the realization of QKD due to its flying nature and its compatibility with today’s fiber-based telecom network. The ultimate goal of the field is to realize a global QKD network for worldwide applications. Tremendous efforts have been put towards this goal [4–6]. Despite significant progresses over the past decades, there are still two major challenges for large-scale QKD network.
    [Show full text]
  • Machine Learning Aided Carrier Recovery in Continuous-Variable Quantum Key Distribution
    Machine Learning Aided Carrier Recovery in Continuous-Variable Quantum Key Distribution T Gehring1, H-M Chin1,2, N Jain1, D Zibar2, and U L Andersen1 1Department of Physics, Technical University of Denmark, Lyngby, Denmark 2Department of Photonics, Technical University of Denmark, Lyngby, Denmark Contact Email: [email protected] Continuous-variable quantum key distribution (CV-QKD) makes use of in-phase and quadrature mod- ulation and coherent detection to distribute secret keys between two parties for data encryption with future proof security. The secret key rate of such CV-QKD systems is limited by excess noise, which is attributed to an eavesdropper. A key issue typical to all modern CV-QKD systems implemented with a reference or pilot signal and an independent local oscillator is controlling the excess noise generated from the fre- quency and phase noise accrued by the transmitter and receiver. Therefore accurate phase estimation and compensation, so-called carrier recovery, is a critical subsystem of CV-QKD. Here, we present the implementation of a machine learning framework based on Bayesian inference, namely an unscented Kalman filter (UKF), for estimation of phase noise and compare it to a standard reference method. Experimental results obtained over a 20 km fiber-optic link indicate that the UKF can ensure very low excess noise even at low pilot powers. The measurements exhibited low variance and high stability in excess noise over a wide range of pilot signal to noise ratios. The machine learning framework may enable CV-QKD systems with low implementation complexity, which can seamlessly work on diverse transmission lines, and it may have applications in the implemen- tation of other cryptographic protocols, cloud-based photonic quantum computing, as well as in quantum sensing..
    [Show full text]
  • SECURING CLOUDS – the QUANTUM WAY 1 Introduction
    SECURING CLOUDS – THE QUANTUM WAY Marmik Pandya Department of Information Assurance Northeastern University Boston, USA 1 Introduction Quantum mechanics is the study of the small particles that make up the universe – for instance, atoms et al. At such a microscopic level, the laws of classical mechanics fail to explain most of the observed phenomenon. At such a state quantum properties exhibited by particles is quite noticeable. Before we move forward a basic question arises that, what are quantum properties? To answer this question, we'll look at the basis of quantum mechanics – The Heisenberg's Uncertainty Principle. The uncertainty principle states that the more precisely the position is determined, the less precisely the momentum is known in this instant, and vice versa. For instance, if you measure the position of an electron revolving around the nucleus an atom, you cannot accurately measure its velocity. If you measure the electron's velocity, you cannot accurately determine its position. Equation for Heisenberg's uncertainty principle: Where σx standard deviation of position, σx the standard deviation of momentum and ħ is the reduced Planck constant, h / 2π. In a practical scenario, this principle is applied to photons. Photons – the smallest measure of light, can exist in all of their possible states at once and also they don’t have any mass. This means that whatever direction a photon can spin in -- say, diagonally, vertically and horizontally -- it does all at once. This is exactly the same as if you constantly moved east, west, north, south, and up-and-down at the same time.
    [Show full text]
  • Lecture 12: Quantum Key Distribution. Secret Key. BB84, E91 and B92 Protocols. Continuous-Variable Protocols. 1. Secret Key. A
    Lecture 12: Quantum key distribution. Secret key. BB84, E91 and B92 protocols. Continuous-variable protocols. 1. Secret key. According to the Vernam theorem, any message (for instance, consisting of binary symbols, 01010101010101), can be encoded in an absolutely secret way if the one uses a secret key of the same length. A key is also a sequence, for instance, 01110001010001. The encoding is done by adding the message and the key modulo 2: 00100100000100. The one who knows the key can decode the encoded message by adding the key to the message modulo 2. The important thing is that the key should be used only once. It is exactly this way that classical cryptography works. Therefore the only task of quantum cryptography is to distribute the secret key between just two users (conventionally called Alice and Bob). This is Quantum Key Distribution (QKD). 2. BB84 protocol, proposed in 1984 by Bennett and Brassard – that’s where the name comes from. The idea is to encode every bit of the secret key into the polarization state of a single photon. Because the polarization state of a single photon cannot be measured without destroying this photon, this information will be ‘fragile’ and not available to the eavesdropper. Any eavesdropper (called Eve) will have to detect the photon, and then she will either reveal herself or will have to re-send this photon. But then she will inevitably send a photon with a wrong polarization state. This will lead to errors, and again the eavesdropper will reveal herself. The protocol then runs as follows.
    [Show full text]
  • Gr Qkd 003 V2.1.1 (2018-03)
    ETSI GR QKD 003 V2.1.1 (2018-03) GROUP REPORT Quantum Key Distribution (QKD); Components and Internal Interfaces Disclaimer The present document has been produced and approved by the Group Quantum Key Distribution (QKD) ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. 2 ETSI GR QKD 003 V2.1.1 (2018-03) Reference RGR/QKD-003ed2 Keywords interface, quantum key distribution ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Scalable Quantum Cryptography Network for Protected Automation Communication Making Quantum Key Distribution (QKD) Available to Critical Energy Infrastructure
    Scalable Quantum Cryptography Network for Protected Automation Communication Making quantum key distribution (QKD) available to critical energy infrastructure Background changes the key in an immediate and Benefits measurable way, reducing the risk that The power grid is increasingly more reliant information thought to be securely • QKD lets the operator know, in real- on a distributed network of automation encrypted has actually been compromised. time, if a secret key has been stolen components such as phasor measurement units (PMUs) and supervisory control and Objectives • Reduces the risk that a “man-in-the- data acquisition (SCADA) systems, to middle” cyber-attack might allow In the past, QKD solutions have been unauthorized access to energy manage the generation, transmission and limited to point-to-point communications sector data distribution of electricity. As the number only. To network many devices required of deployed components has grown dedicated QKD systems to be established Partners rapidly, so too has the need for between every client on the network. This accompanying cybersecurity measures that resulted in an expensive and complex • Qubitekk, Inc. (lead) enable the grid to sustain critical functions network of multiple QKD links. To • Oak Ridge National Laboratory even during a cyber-attack. To protect achieve multi-client communications over (ORNL) against cyber-attacks, many aspects of a single quantum channel, Oak Ridge cybersecurity must be addressed in • Schweitzer Engineering Laboratories National Laboratory (ORNL) developed a parallel. However, authentication and cost-effective solution that combined • EPB encryption of data communication between commercial point-to-point QKD systems • University of Tennessee distributed automation components is of with a new, innovative add-on technology particular importance to ensure resilient called Accessible QKD for Cost-Effective energy delivery systems.
    [Show full text]
  • Detecting Itinerant Single Microwave Photons Sankar Raman Sathyamoorthy A, Thomas M
    Physics or Astrophysics/Header Detecting itinerant single microwave photons Sankar Raman Sathyamoorthy a, Thomas M. Stace b and G¨oranJohansson a aDepartment of Microtechnology and Nanoscience, MC2, Chalmers University of Technology, S-41296 Gothenburg, Sweden bCentre for Engineered Quantum Systems, School of Physical Sciences, University of Queensland, Saint Lucia, Queensland 4072, Australia Received *****; accepted after revision +++++ Abstract Single photon detectors are fundamental tools of investigation in quantum optics and play a central role in measurement theory and quantum informatics. Photodetectors based on different technologies exist at optical frequencies and much effort is currently being spent on pushing their efficiencies to meet the demands coming from the quantum computing and quantum communication proposals. In the microwave regime however, a single photon detector has remained elusive although several theoretical proposals have been put forth. In this article, we review these recent proposals, especially focusing on non-destructive detectors of propagating microwave photons. These detection schemes using superconducting artificial atoms can reach detection efficiencies of 90% with existing technologies and are ripe for experimental investigations. To cite this article: S.R. Sathyamoorthy, T.M. Stace ,G.Johansson, C. R. Physique XX (2015). R´esum´e La d´etection... Pour citer cet article : S.R. Sathyamoorthy, T.M. Stace , G.Johansson, C. R. Physique XX (2015). Key words: Single photon detection, quantum nondemolition, superconducting circuits, microwave photons Mots-cl´es: Mot-cl´e1; Mot-cl´e2; Mot-cl´e3 arXiv:1504.04979v1 [quant-ph] 20 Apr 2015 1. Introduction In 1905, his annus mirabilis, Einstein not only postulated the existence of light quanta (photons) while explaining the photoelectric effect but also gave a theory (arguably the first) of a photon detector [1].
    [Show full text]
  • Quantum Cryptography Using Quantum Key Distribution and Its Applications
    International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-3, Issue-4, April 2014 Quantum Cryptography using Quantum Key Distribution and its Applications N.Sasirekha, M.Hemalatha Abstract-Secure transmission of message between the sender and receiver is carried out through a tool called as cryptography. Traditional cryptographical methods use either public key which is known to everyone or on the private key. In either case the eavesdroppers are able to detect the key and hence find the message transmitted without the knowledge of the sender and receiver. Quantum cryptography is a special form of cryptography which uses the Quantum mechanics to ensure unconditional security towards the transmitted message. Quantum cryptography uses the distribution of random binary key known as the Quantum Key Distribution (QKD) and hence enables the communicating parties to detect the presence of potential eavesdropper. This paper also analyses few application areas of quantum cryptography and its limitations. Keywords- Classical Cryptography, Photon polarization, Qubit, Quantum Cryptography, Quantum entanglement, Quantum Key Fig 1: Communication in the presence of an Eavesdropper Distribution, Sifting key. I. INTRODUCTION Today, a technology known as Quantum key distribution (QKD) uses individual photons for the exchange of Cryptography is the practice and study of encoding and cryptographic key between the sender and the receiver. Each decoding secret messages to ensure secure communications. photon represents a single bit of data. The value of the bit, a 1 There are two main branches of cryptography: or a 0, is determined by states of the photon such as secret-(symmetric-) key cryptography and public- polarization or spin.
    [Show full text]
  • Quantum Key Distribution (QKD); QKD Module Security Specification
    ETSI GS QKD 008 V1.1.1 (2010-12) Group Specification Quantum Key Distribution (QKD); QKD Module Security Specification Disclaimer This document has been produced and approved by the Quantum Key Distribution (QKD) ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership 2 ETSI GS QKD 008 V1.1.1 (2010-12) Reference DGS/QKD-0008 Keywords analysis, protocols, Quantum Key Distribution, security, system ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • Deterministic Secure Quantum Communication on the BB84 System
    entropy Article Deterministic Secure Quantum Communication on the BB84 System Youn-Chang Jeong 1, Se-Wan Ji 1, Changho Hong 1, Hee Su Park 2 and Jingak Jang 1,* 1 The Affiliated Institute of Electronics and Telecommunications Research Institute, P.O.Box 1, Yuseong Daejeon 34188, Korea; [email protected] (Y.-C.J.); [email protected] (S.-W.J.); [email protected] (C.H.) 2 Korea Research Institute of Standards and Science, Daejeon 43113, Korea; [email protected] * Correspondence: [email protected]; Tel.: +82-42-870-2134 Received: 23 September 2020; Accepted: 6 November 2020; Published: 7 November 2020 Abstract: In this paper, we propose a deterministic secure quantum communication (DSQC) protocol based on the BB84 system. We developed this protocol to include quantum entity authentication in the DSQC procedure. By first performing quantum entity authentication, it was possible to prevent third-party intervention. We demonstrate the security of the proposed protocol against the intercept-and-re-send attack and the entanglement-and-measure attack. Implementation of this protocol was demonstrated for quantum channels of various lengths. Especially, we propose the use of the multiple generation and shuffling method to prevent a loss of message in the experiment. Keywords: optical communication; quantum cryptography; quantum mechanics 1. Introduction By using the fundamental postulates of quantum mechanics, quantum cryptography ensures secure communication among legitimate users. Many quantum cryptography schemes have been developed since the introduction of the BB84 protocol in 1984 [1] by C. H. Bennett and G. Brassard. In the BB84 protocol, the sender uses a rectilinear or diagonal basis to encode information in single photons.
    [Show full text]
  • Quantum Key Distribution Over a 40-Db Channel Loss Using Superconducting Single-Photon Detectors
    Black plate (343,1) ARTICLES Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors HIROKI TAKESUE1*, SAE WOO NAM2,QIANGZHANG3,ROBERTH.HADFIELD2†, TOSHIMORI HONJO1, KIYOSHI TAMAKI1 AND YOSHIHISA YAMAMOTO3,4 1NTT Basic Research Laboratories, NTT Corporation, 3-1 Morinosato Wakamiya, Atsugi, Kanagawa 243-0198, Japan 2National Institute of Standards and Technology, 325 Broadway, Boulder, Colorado 80305, USA 3E. L. Ginzton Laboratory, Stanford University, 450 Via Palou, Stanford, California 94305-4088, USA 4National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan †Present address: Department of Physics, Heriot-Watt University, Edinburgh, EH14 4AS, United Kingdom *e-mail: [email protected] Published online: 1 June 2007; doi:10.1038/nphoton.2007.75 We report the first quantum key distribution (QKD) experiment to enable the creation of secure keys over 42 dB channel loss and 200 km of optical fibre. We used the differential phase shift QKD (DPS-QKD) protocol, implemented with a 10-GHz clock frequency and superconducting single-photon detectors (SSPD) based on NbN nanowires. The SSPD offers a very low dark count rate (a few Hz) and small timing jitter (60 ps, full width at half maximum, FWHM). These characteristics allowed us to achieve a 12.1 bit s21 secure key rate over 200 km of fibre, which is the longest terrestrial QKD over a fibre link yet demonstrated. Moreover, this is the first 10-GHz clock QKD system to enable secure key generation. The keys generated in our experiment are secure against both general collective attacks on individual photons and a specific collective attack on multiphotons, known as a sequential unambiguous state discrimination (USD) attack.
    [Show full text]