Research Trend in Quantum Network

Total Page:16

File Type:pdf, Size:1020Kb

Research Trend in Quantum Network Moonshot international symposium December 18,2019 @ Kyoto, Japan Topic 3 Research Trend in Quantum Network Hideo Kosaka Yokohama National University, Japan 1 CONTENTS 1. Quantum Internet 2. Quantum Repeater 3. Quantum Computer Network 2 Quantum Internet 3 Quantum Internet Quantum Communication Blind Quantum Quantum Sensor Computing Network Quantum Repeater Quantum Quantum Computers Sensors Quantum Diagnostics 4 Quantum Key Distribution (QKD) Network By Courtesy of NICT 2004 DARPA Quantum Network Europe 2008 SECOQC Network USA (Boston) (Vienna) M. Peev et al., New J. Phys. 11, 075011 (2009) C. Elliot et al., arXiv:quant-ph/0503058 UK quantum network ( 2010~ Tokyo QKD Network Cambridge-Bristol, Japan ) (Tokyo) under construction 2017~ Quantum Backbone China Network (Beijing-Shanghai) Quantum Satellite 2500km Quantum Backbone 2016,17,18 Micro Satellite 2000km QKD sender and receiver (NEC, 2017) Quantum repeaters2014 are not usedCourtesy by Qiang yet!Zhang (USTC) 5 with quantum repeaters http://quantum-internet.team/ 6 Netherlands Quantum Internet Project Amsterdam Quantum Leiden repeater Hague Delft Quantum loop 50km connecting 4cities 100km in total Ronald Hanson Stephanie Wehner Quantum Sci. Technol. 2 (2017) 034002 https://labs.ripe.net/Members/becha/introduction-to-the-quantum-internet 7 Japan Quantum Internet Task Force Quantum Repeater platforms Diamond Ion/Atom All-photon 8 Development Steps for Quantum Internet 1. Trusted node QKD system ➢ Quantum enhanced security but not absolutely secure < 100km < 100km Classical 2. Quantum repeater–based QKD system ➢ Absolutely secure quantum network ➢ Long-distance & multiparty connections Quantum 3. Quantum computer network ➢ Quantum media converter at end nodes Quantum Quantum Quantum 9 Quantum Repeater 1. Required functions 2. Promising qubits 3. Diamond repeater 4. Current status and prospects 10 Required functions • Remote Entanglement ➢ can be probabilistic but should be heralded • Local Bell Measurement ➢ should be deterministic • Quantum Gate operation ➢ allows not only swapping but also distillation • Quantum Memory ➢ allows scalable quantum network Remote Remote Entanglement Entanglement Quantum Local Bell Measure Memory Swap Quantum gate End-to-end Entanglement operation Distill 11 Promising Qubits Requirements: Gate speed, Gate fidelity, Memory time 99.9999% Diamond NV Hybrid System 99.999% Ion trap 99.99% ~1min ~1min Super- 99.9% conducting m Diamond ~100circuits 99% NV Si Gate fidelity Gate Cold ~100ms center quantum ~10ms ~1min ~1ms atom ~1min dot 90% ~10ms (memory) ~1ms 1kHz 10kHz 100kHz 1MHz 10MHz 100MHz 1GHz Gate speed Based on JST-CRDS report 2019 12 Ion/Atom UK 2014 (ion) China 2017 (atom) High-Fidelity Preparation, Gates, Memory, Experimental realization of a multiplexed quantum and Readout of a Trapped-Ion Quantum Bit memory with 225 individually accessible memory cells T. P. Harty, D. T. C. Allcock, C. J. Ballance, L. Guidoni, H. A. Janacek, Y.-F. Pu, N. Jiang, W. Chang, H.-X. Yang, C. Li & L.-M. Duan N. M. Linke, D. N. Stacey, and D. M. Lucas Preparation&readout: 99.93% An ion 2D optical lattice Single-qubit gate: 99.9999% US 2019 (ion) Germany 2019 (atom) Benchmarking an 11-qubit quantum computer Long-distance distribution of atom-photon entanglement K. Wright, K. M. Beck, S. Debnath, J. M. Amini, Y. Nam, N. Grzesiak, J.-S. Chen, at telecom wavelength N. C. Pisenti, M. Chmielewski, C. CollinsK. M. Hudek, J. Mizrahi, Tim van Leent, Matthias Bock, Robert Garthoff, Kai Redeker, Wei Zhang, J. D. Wong-Campos, S. Allen, J. Apisdorf, P. Solomon, M. Williams, A. M. Ducore, A. Blinov, S. M. Kreikemeier, V. Chaplin, M.Keesan, C. Monroe & J. Kim Tobias Bauer, Wenjamin Rosenfeld, Christoph Becher, Harald Weinfurter Atom 20km Ion chain Quantum wavelength converter Gate speed has to be increased! 13 All-Photon No Memory! UK 2019 A trusted-node-free eight-user metropolitan quantum communication network Siddarth Koduru Joshi, Djeylan Aktas, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Canada 2016 Bo Liu, Thomas Scheidl, Željko Samec, Laurent Kling, Alex Qiu, Mario Stipčević, John G. Rarity, Rupert Ursin Quantum teleportation over 13km Beam splitter 8 users (28 pairings) Entangled photons China 2016 Quantum teleportation over 30km Wavelength multiplex network China 2019 Japan 2019 Experimental quantum repeater without quantum memory Experimental time-reversed adaptive Bell measurement Zheng-Da Li, Rui Zhang, Xu-Fei Yin, Li-Zheng Liu, Yi Hu, Yu-Qiang Fang, Yue-Yang Fei, towards all-photonic quantum repeaters Xiao Jiang, Jun Zhang, Li Li, Nai-Le Liu, Feihu Xu, Yu-Ao Chen & Jian-Wei Pan Yasushi Hasegawa, Rikizo Ikuta, Nobuyuki Matsuda, Kiyoshi Tamaki, 4 uses (6 photon pairs) Hoi-Kwong Lo, Takashi Yamamoto, Koji Azuma & Nobuyuki Imoto Proposal for implementation Multiple photon entanglement Scalable quantum network is challenging! 14 Diamond All-Solid QR with memory replace ion trap with electron trap in an vacancy in diamond Netherlands 2015 Japan 2019 Entanglement distribution Quantum teleportation-based state transfer of between diamonds 1.3km apart photon polarization into a carbon spin in diamond Kazuya Tsurumoto, Ryota Kuroiwa, Hiroki Kano, Yuhei Sekiguchi & Hideo Kosaka Heralded quantum media conversion Memory • Gate fidelity > 99.99% 1.3km apart • Memory time >1 min • 10-qubit resisters Register • Wavelength conversion 39Hz doi.org/10.1038/s41586-018-0200-5 • Teleportation • Error correction UK 2015 • Distillation US 2019 Tunable cavity coupling of the zero phonon line Quantum network nodes based on diamond qubits of a nitrogen vacancy defect in diamond with an efficient nanophotonic interface C. T. Nguyen, D. D. Sukachev, M. K. Bhaskar, B. Machielse, D. S. Levonian, S Johnson, P R Dolan, T Grange, A A P Trichet, G Hornecker, E. N. Knall, P. Stroganov, R. Riedinger, H. Park, M. Lončar, M. D. Lukin Y C Chen, L Weng, G M Hughes, A A R Watt, A Auffèves and J M Smith Nano photonic structure Nearly deterministic interface with SiV 19% light extraction (estimate) https://doi.org/10.1117/12.2306650 All of these are still component level. 15 Diamond Remote Entanglement Generation SSPD Emission Emission Emission High B e e e 13C 13 13C 13C 13C 13 Spin 1/2 C C Local Bell Measurement Emission Absorption e e e 13 13 13 13 13 13 B = 0 C C C C C C + No need of SSPD in the middle of nodes Spin 1 + 30 times higher efficiency without high-Q cavity + No need of magnetic field allows integration with superconductor 16 Current Status & Prospects Required functions for QR Current Short-term Mid-term goal goal Single-qubit gate operation fidelity ≳99.4% >99.99% >99.999% (gate speed) @3MHz @10MHz @100MHz Preparation and readout fidelity ≳98% >99.9% >99.99% Electron-photon entanglement generation ≳90% >99% >99.9% Photon-to-memory heralded transfer ≳90% >99% >99.9% Bell state measurement ≳90% >99% >99.9% Quantum error correction (distillation) ≳74% >90% >99% Individually accessible qubits ≳10 >20 >100 Photon polarization control 1 mm in radius Diamond SIL with NV in center ×7 emission enhance Microwave polarization control Nature Photonics, 10,507-511(2016) Optics Letters, 43, 2380-2383 (2018) Nature Communications, 7, 11668 (2016) Communictions Physics, 2, 74 (2019) Nature Photonics, 11, 309-314 (2017) Physical Review Applied, 12, 051001 (2019) Nature Communications, 9, 3227 (2018) 17 Modeled Entanglement Distribution Rate Independent of node number 1000 Mid-term goal Fiber loss: 0.2dB/km NV-outcoupling efficiency: 0.6 100 NV-absorption efficiency: 0.25 NV array Frequency-conversion efficiency: 0.3 Multiplex NV-carbon swap-gate time: 200ms Memory number at each node: 2 10 Short-term goal 1 Optical Cavity 0.1 Current Based on Dam et al., Quantum Sci. Technol. (2017) 18 Quantum Computer Network 19 Quantum Computer Network • Quantum media converter ➢ Interface Quantum Computer to Network ➢ Distributed Quantum Computer could be built • NV center in diamond under a zero magnetic field ➢ Interface optical & microwave photons with memory ➢ Other candidates are magnon, surface acoustic wave … Network Optical Network Photon Quantum Media Converter Quantum Quantum Media Computer Converter NV Microwave Photon Superconducting Memory Qubit 20 Roadmap Present (2019) In 5 years (2024) In 10 years (2029) In 20 years (2039) Field demonstration of quantum repeater Entanglement distribution Quantum Entanglement distribution b/w 3 parties > 500 km via Key rate > 1kbps entanglement via a quantum repeater quantum repeater via entanglement distribution Remote entanglement Entanglement with Multi-party distribution generation b/w memories communication-band entanglement via by emission & absorption photon quantum memories · Single-qubit gate Two-qubit gate Individual access · Single-shot measurement fidelity > 99.9% memories Quantum · Quantum error correction 100∼1000 bits Scalable memory Multiple memories ∼10 Complete Bell state Fault-tolerant reconfigurable memory time > 1 min measurement on memories logical memory quantum repeater transferred from photons with quantum coding Quantum media conversion Quantum media conversion b/w photon & b/w superconducting qubit Quantum quantum memory & quantum memory interface Quantum wavelength conversion Wavelength division Distributed Quantum wavelength multiplexing quantum Single photon fiber coupling conversion module communication quantum computer and Photon Single photon source All-photonic quantum sensor source Entangled photon source quantum repeater Based on the draft final report of the "Quantum Technology and Innovation Strategy" 21 Fault-tolerant
Recommended publications
  • Framework for Wireless Network Security Using Quantum Cryptography-Journal
    FRAMEWORK FOR WIRELESS NETWORK SECURITY USING QUANTUM CRYPTOGRAPHY Priyanka Bhatia1 and Ronak Sumbaly2 1, 2 Department of Computer Science, BITS Pilani Dubai, United Arab Emirates ABSTRACT Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding information as polarized photons, which can be sent through the air. This paper explores on the aspect of application of quantum cryptography in wireless networks. In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys. KEYWORDS IEEE 802.11, Key Distribution, Network Security, Quantum Cryptography, Wireless Network. 1. INTRODUCTION Wireless Networks are becoming increasing widespread, and majority of coffee shops, airports, hotels, offices, universities and other public places are making use of these for a means of communication today. They’re convenient due to their portability and high-speed information exchange in homes, offices and enterprises. The advancement in modern wireless technology has led users to switch to a wireless network as compared to a LAN based network connected using Ethernet cables. Unfortunately, they often aren’t secure and security issues have become a great concern. If someone is connected to a Wi-Fi network, and sends information through websites or mobile apps, it is easy for someone else to access this information.
    [Show full text]
  • Quantum Cryptography in Practice Chip Elliott Dr
    Quantum Cryptography in Practice Chip Elliott Dr. David Pearson Dr. Gregory Troxel BBN Technologies BBN Technologies BBN Technologies 10 Moulton Street 10 Moulton Street 10 Moulton Street Cambridge, MA 02138 Cambridge, MA 02138 Cambridge, MA 02138 [email protected] [email protected] [email protected] ABSTRACT BBN, Harvard, and Boston University are building the DARPA Alice Bob Quantum Network, the world’s first network that delivers end- (the sender) Eve (the receiver) to-end network security via high-speed Quantum Key plaintext (the eavesdropper) plaintext Distribution, and testing that Network against sophisticated eavesdropping attacks. The first network link has been up and encryption public channel decryption steadily operational in our laboratory since December 2002. It algorithm (i.e. telephone or internet) algorithm provides a Virtual Private Network between private enclaves, with user traffic protected by a weak-coherent implementation key key of quantum cryptography. This prototype is suitable for deployment in metro-size areas via standard telecom (dark) quantum state quantum channel quantum state fiber. In this paper, we introduce quantum cryptography, generator (i.e. optical fiber or free space) detector discuss its relation to modern secure networks, and describe its unusual physical layer, its specialized quantum cryptographic protocol suite (quite interesting in its own right), and our Figure 1. Quantum Key Distribution. extensions to IPsec to integrate it with quantum cryptography. authentication and establishment of secret “session” keys, and then protecting all or part of a traffic flow with these session Categories and Subject Descriptors keys. Certain other systems transport secret keys “out of C.2.1 [Network Architecture and Design]: quantum channel,” e.g.
    [Show full text]
  • Building a QKD Network out of Theories and Devices December 17, 2005
    Building the DARPA Quantum Network Building a QKD Network out of Theories and Devices December 17, 2005 David Pearson BBN Technologies [email protected] Building the DARPA Quantum Network Harvard Copyright © 2005 by BBN Technologies. University Why QKD? Why now? • Unconditional security, guaranteed by the laws of physics, is very compelling • Public-key cryptography gets weaker the more we learn – even for classical algorithms • If we had quantum computers tomorrow we’d have a disaster on our hands. • Future proofing – secrets that you transmit today using classical cryptography may become vulnerable next year (RSA ’78 predicted 4 x 10 9 years to factor a 200-digit key, but it was done last May) • The technology of QKD seems to be mature enough that we can start to create usable systems. Building the DARPA Quantum Network Harvard Copyright © 2005 by BBN Technologies. University 2 DARPA Quantum Network - Goals Encrypted Traffic Private via Internet Private Enclave Enclave End-to-End Key Distribution QKD Repeater QKD Switch QKD QKD Endpoint Endpoint QKD Switch QKD Switch Ultra-Long- Distance Fiber QKD Switch WeWe areare designingdesigning andand buildingbuilding thethe world’sworld’s firstfirst QuantumQuantum Network,Network,deliveringdelivering end-to-endend-to-end networknetwork securitysecurity viavia high-speedhigh-speed QuantumQuantum KeyKey Distribution,Distribution, andand testingtesting thatthat NetworkNetwork againstagainst sophisticated sophisticated eavesdroppingeavesdropping attacks.attacks. AsAs anan option,option, wewe willwill fieldfield thisthis ultra-high-securityultra-high-security networknetwork intointo commercicommercialal fiberfiber acrossacross thethe metrometro BostonBoston areaarea andand operateoperate itit betweenbetween BU,BU, Harvard,Harvard, andand BBN.BBN. Building the DARPA Quantum Network Harvard Copyright © 2005 by BBN Technologies.
    [Show full text]
  • Quantum Key Distribution In-Field Implementations
    Quantum Key Distribution in-field implementations Technology assessment of QKD deployments Travagnin, Martino Lewis, Adam, M. 2019 EUR 29865 EN This publication is a Technical report by the Joint Research Centre (JRC), the European Commission’s science and knowledge service. It aims to provide evidence-based scientific support to the European policymaking process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use that might be made of this publication. Contact information Name: Adam M. Lewis Address: Centro Comune di Ricerca, Via E. Fermi 2749, I-21027 Ispra (VA) ITALY Email: [email protected] Tel.: +39 0332 785786 EU Science Hub https://ec.europa.eu/jrc JRC118150 EUR 29865 EN PDF ISBN 978-92-76-11444-4 ISSN 1831-9424 doi:10.2760/38407 Luxembourg: Publications Office of the European Union, 2019 © European Union, 2019 The reuse policy of the European Commission is implemented by Commission Decision 2011/833/EU of 12 December 2011 on the reuse of Commission documents (OJ L 330, 14.12.2011, p. 39). Reuse is authorised, provided the source of the document is acknowledged and its original meaning or message is not distorted. The European Commission shall not be liable for any consequence stemming from the reuse. For any use or reproduction of photos or other material that is not owned by the EU, permission must be sought directly from the copyright holders. All content © European Union, 2019, except figures, where the sources are stated How to cite this report: Travagnin, Martino and Lewis, Adam, M., “Quantum Key Distribution in-field implementations: technology assessment of QKD deployments”, EUR 29865 EN, Publications Office of the European Union, Luxembourg, 2019, ISBN 978-92-76-11444-4, doi:10.2760/38407, JRC118150 Contents Abstract ..............................................................................................................
    [Show full text]
  • Quantum Key Distribution Networks: Challenges and Future Research Issues in Security
    applied sciences Article Quantum Key Distribution Networks: Challenges and Future Research Issues in Security Chia-Wei Tsai 1 , Chun-Wei Yang 2 , Jason Lin 3 , Yao-Chung Chang 1,* and Ruay-Shiung Chang 4 1 Department of Computer Science and Information Engineering, National Taitung University, No. 369, University Rd., Taitung 95092, Taiwan; [email protected] 2 Master Program for Digital Health Innovation, College of Humanities and Sciences, China Medical University, No. 100, Sec. 1, Jingmao Rd., Beitun Dist., Taichung 406040, Taiwan; [email protected] 3 Department of Computer Science and Engineering, National Chung Hsing University, No. 145, Xingda Rd., South District, Taichung 40227, Taiwan; [email protected] 4 Department of Institute of Information and Decision Sciences, National Taipei University of Business, No.321, Sec. 1, Jinan Rd., Jhongjheng Dist., Taipei City 100025, Taiwan; [email protected] * Correspondence: [email protected] Abstract: A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical problems. Numerous countries and research institutes have invested enormous resources to execute correlation studies on QKD networks. Thus, in this study, we surveyed existing QKD network studies and practical field experiments to summarize the research results (e.g., type and architecture of QKD networks, key generating rate, maximum communication distance, and routing protocol). Furthermore, we highlight the three challenges and future research issues in the security of QKD networks and then provide some feasible resolution strategies for these challenges.
    [Show full text]
  • Using Quantum Key Distribution for Cryptographic Purposes: Asurvey✩ ∗ R
    Theoretical Computer Science 560 (2014) 62–81 Contents lists available at ScienceDirect Theoretical Computer Science www.elsevier.com/locate/tcs Using quantum key distribution for cryptographic purposes: Asurvey✩ ∗ R. Alléaume a,b, , C. Branciard c, J. Bouda d, T. Debuisschert e, M. Dianati f, N. Gisin c, M. Godfrey g, P. Grangier h, T. Länger i, N. Lütkenhaus j, C. Monyk i, P. Painchault k, M. Peev i, A. Poppe i, T. Pornin l, J. Rarity g, R. Renner m, G. Ribordy n, M. Riguidel a, L. Salvail o, A. Shields p, H. Weinfurter q, A. Zeilinger r a Telecom ParisTech & CNRS LTCI, Paris, France b SeQureNet SARL, Paris, France c University of Geneva, Switzerland d Masaryk University, Brno, Czech Republic e Thales Research and Technology, Orsay, France f University of Surrey, Guildford, United Kingdom g University of Bristol, United Kingdom h CNRS, Institut d’Optique, Palaiseau, France i Austrian Research Center, Vienna, Austria j Institute for Quantum Computing, Waterloo, Canada k Thales Communications, Colombes, France l Cryptolog International, Paris, France m Eidgenössische Technische Hochschule Zürich, Switzerland n Id Quantique SA, Geneva, Switzerland o Université de Montréal, Canada p Toshiba Research Europe Ltd, Cambridge, United Kingdom q Ludwig-Maximilians-University Munich, Germany r University of Vienna, Austria a r t i c l e i n f o a b s t r a c t Article history: The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, Received 1 April 2009 is the ability to prove the information-theoretic security (ITS) of the established keys. As a Accepted 1 August 2013 key establishment primitive, QKD however does not provide a standalone security service Available online 17 September 2014 in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security Keywords: properties can vary.
    [Show full text]
  • Reading for Week 13: Quantum Computing: Pages 139-167
    Reading for Week 13: Quantum computing: pages 139-167 Quantum communications: pages 189-193; 200-205; 217-223 Law and Policy for the Quantum Age Draft: Do not circulate without permission Chris Jay Hoofnagle and Simson Garfinkel April 2, 2021 Note to reviewers Thank you for taking the time to look through our draft! We are most interested finding and correcting text that is factually wrong, technically inaccurate, or misleading. Please do not concern yourself with typos or grammar errors. We will be focusing on those later when we have all of the text in its near-final form. (However, we are interest in word usage errors, or in misspelling that are the result of homophones, as they are much harder to detect and correct in editing.) You can find the current draft of this book (as well as previous PDFs)here: https://simson.net/quantum-2021-slgcjh/ Thank you again! Please email us at: [email protected] and [email protected] 5 (NEAR FINAL) Quantum Computing Applications “A good way of pumping funding into the building of an actual quantum computer would be to find an efficient quantum factoring algo- rithm!”1 The risk of wide-scale cryptanalysis pervades narratives about quantum com- puting. We argue in this chapter that Feynman’s vision for quantum computing will ultimately prevail, despite the discovery of Peter Shor’s factoring algorithm that generated excitement about a use of quantum computers that people could understand—and dread. Feynman’s vision of quantum devices that simulate com- plex quantum interactions is more exciting and strategically relevant, yet also more difficult to portray popular descriptions of technology.
    [Show full text]
  • PMG Phd Thesis FINAL
    Practical Free-Space Quantum Key Distribution Philip Michael Gorman B.Sc. (Hons), MInstP. Thesis submitted for the degree of Doctor of Philosophy Department of Physics Heriot-Watt University December 2010 The copyright in this thesis is owned by the author. Any quotation from the thesis or use of any of the information contained in it must acknowledge this thesis as the source of the quotation or information. ABSTRACT Within the last two decades, the world has seen an exponential increase in the quantity of data traffic exchanged electronically. Currently, the widespread use of classical encryption technology provides tolerable levels of security for data in day to day life. However, with one somewhat impractical exception these technologies are based on mathematical complexity and have never been proven to be secure. Significant advances in mathematics or new computer architectures could render these technologies obsolete in a very short timescale. By contrast, Quantum Key Distribution (or Quantum Cryptography as it is sometimes called) offers a theoretically secure method of cryptographic key generation and exchange which is guaranteed by physical laws. Moreover, the technique is capable of eavesdropper detection during the key exchange process. Much research and development work has been undertaken but most of this work has concentrated on the use of optical fibres as the transmission medium for the quantum channel. This thesis discusses the requirements, theoretical basis and practical development of a compact, free-space transmission quantum key distribution system from inception to system tests. Experiments conducted over several distances are outlined which verify the feasibility of quantum key distribution operating continuously over ranges from metres to intercity distances and finally to global reach via the use of satellites.
    [Show full text]
  • Industry-Academia Collaboration in Government-Funded Research and Development
    Industry-Academia Collaboration in Government-Funded Research and Development Talib Hussain and David Montana BBN Technologies for GECCO-2006: Evolutionary Computing in Practice (ECP): Technology Transfer from Academia to Industry Copyright © 2006 BBN Technologies www.bbn.com Contents • Overview of BBN Technologies • BBN’s Interactions with Academia • Industry-Academia Strengths • Aspects of I-A Collaboration • BBN and Evolutionary Computation • EC personnel at BBN Copyright © 2006 BBN Technologies www.bbn.com BBN Technologies • 650 employees, headquarters in Cambridge, MA • Perform R&D, technology transfer and systems development and integration activities in multiple areas that span the physical, computer, and information sciences • Primary focus is on developing state of the art solutions for military and security customers – Mostly 6.2 and 6.3 levels • Also develop solutions for commercial customers and transition inventions into commercially available products and services • Comprised of multiple departments covering variety of domains – Intelligent distributed computing, Internet research, Mobile networking systems, Decision and security technologies, High performance computing, Sensor systems, Speech and language processing, Applied physics and tactical sonar • Frequently work with university partners • Rated CMM Level 2 Copyright © 2006 BBN Technologies www.bbn.com BBN Interactions with Academia • As prime on a team with university (and industry) partners – e.g., POIROT, ADROIT, KineVis, Quantum Network • As partner on a team
    [Show full text]
  • Current Status of the DARPA Quantum Network
    Current status of the DARPA Quantum Network Chip Elliott1, Alexander Colvin, David Pearson, Oleksiy Pikalo, John Schlafer, Henry Yeh BBN Technologies, 10 Moulton Street, Cambridge MA 02138 ABSTRACT This paper reports the current status of the DARPA Quantum Network, which became fully operational in BBN’s laboratory in October 2003, and has been continuously running in 6 nodes operating through telecommunications fiber between Harvard University, Boston University, and BBN since June 2004. The DARPA Quantum Network is the world’s first quantum cryptography network, and perhaps also the first QKD systems providing continuous operation across a metropolitan area. Four more nodes are now being added to bring the total to 10 QKD nodes. This network supports a variety of QKD technologies, including phase-modulated lasers through fiber, entanglement through fiber, and freespace QKD. We provide a basic introduction and rational for this network, discuss the February 2005 status of the various QKD hardware suites and software systems in the network, and describe our operational experience with the DARPA Quantum Network to date. We conclude with a discussion of our ongoing work. Keywords: quantum cryptography, quantum key distribution, QKD, BB84, entanglement, Cascade 1. INTRODUCTION It now seems likely that Quantum Key Distribution (QKD) techniques can provide practical building blocks for highly secure networks, and in fact may offer valuable cryptographic services, such as unbounded secrecy lifetimes, that can be difficult to achieve by other techniques. Unfortunately, however, QKD’s impressive claims for information assurance have been to date at least partly offset by a variety of limitations. For example, traditional QKD is distance limited, can only be used across a single physical channel (e.g.
    [Show full text]
  • This Paper Is Available in Adobe PDF Format
    Quantum Cryptography in Practice Chip Elliott Dr. David Pearson Dr. Gregory Troxel BBN Technologies BBN Technologies BBN Technologies 10 Moulton Street 10 Moulton Street 10 Moulton Street Cambridge, MA 02138 Cambridge, MA 02138 Cambridge, MA 02138 [email protected] [email protected] [email protected] ABSTRACT BBN, Harvard, and Boston University are building the Alice Bob DARPA Quantum Network, the world’s first network that (the sender) Eve (the receiver) delivers end-to-end network security via high-speed Quantum plaintext (the eavesdropper) plaintext Key Distribution, and testing that Network against sophisticated eavesdropping attacks. The first network link encryption public channel decryption has been up and steadily operational in our laboratory since algorithm (i.e. telephone or internet) algorithm December 2002. It provides a Virtual Private Network between private enclaves, with user traffic protected by a key key weak-coherent implementation of quantum cryptography. This prototype is suitable for deployment in metro-size areas quantum state quantum channel quantum state via standard telecom (dark) fiber. In this paper, we introduce generator (i.e. optical fiber or free space) detector quantum cryptography, discuss its relation to modern secure networks, and describe its unusual physical layer, its specialized quantum cryptographic protocol suite (quite Figure 1. Quantum Key Distribution. interesting in its own right), and our extensions to IPsec to keys. Certain other systems transport secret keys “out of integrate it with quantum cryptography. channel,” e.g. via courier, as in classical cryptography. Categories and Subject Descriptors Fundamental aspects of quantum physics – unitarity, the C.2.1 [Network Architecture and Design]: quantum uncertainty principle, and the Einstein-Podolsky-Rosen cryptography.
    [Show full text]
  • The Impact of Quantum Technologies on the EU's
    THE IMPACT OF QUANTUM TECHNOLOGIES ON THE EU’S FUTURE POLICIES PART 2 Quantum communications: from science to policies Adam M. Lewis, AML Martino Travagnin, MT 2018 EUR 29017 EN This publication is a Science for Policy report by the Joint Research Centre (JRC), the European Commission’s science and knowledge service. It aims to provide evidence-based scientific support to the European policymaking process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. Contact information Name: Adam Lewis Address: TP 186 Centro Comune di Ricerca, Via E. Fermi 2749, 21027 Ispra (VA), ITALY Email: [email protected] JRC Science Hub https://ec.europa.eu/jrc JRC107386 EUR 29017 EN PDF ISBN 978-92-79-77314-3 ISSN 1831-9424 doi:10.2760/881896 Ispra, Italy: European Commission, 2018 © European Union, 2018 Reproduction is authorised provided the source is acknowledged. How to cite: Author(s); title; EUR; doi All images © European Union 2018 Quantum communications: from science to policies Abstract Quantum physics yields cryptographic applications which are expected to contribute to communications security, in particular by providing protection against attacks by future quantum computers. Technology development programmes in quantum communications, including the deployment of quantum networks, are therefore being funded worldwide. Europe should accelerate the industrial uptake of its scientific knowledge in the field. Contents Acknowledgements ................................................................................................ 1 Executive summary ............................................................................................... 2 1. Introduction ................................................................................................. 4 2. Scientific background .................................................................................... 6 2.1.
    [Show full text]