Advances in Quantum Cryptography

Total Page:16

File Type:pdf, Size:1020Kb

Advances in Quantum Cryptography Advances in Quantum Cryptography S. Pirandola1,2, U. L. Andersen3, L. Banchi4, M. Berta5, D. Bunandar2, R. Colbeck6, D. Englund2, T. Gehring3, C. Lupo7, C. Ottaviani1, J. Pereira1, M. Razavi8, J. S. Shaari9,10, M. Tomamichel11, V. C. Usenko12, G. Vallone13, P. Villoresi13, P. Wallden14 1Computer Science and York Centre for Quantum Technologies, University of York, York YO10 5GH, UK 2Research Laboratory of Electronics, Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts 02139, USA 3Center for Macroscopic Quantum States (bigQ), Department of Physics, Technical University of Denmark, Fysikvej, 2800 Kgs. Lyngby, Denmark 4Department of Physics and Astronomy, University of Florence, via G. Sansone 1, I-50019 Sesto Fiorentino (FI), Italy 5Department of Computing, Imperial College, Kensington, London SW7 2AZ, UK 6Department of Mathematics, University of York, York YO10 5DD, UK 7Department of Physics and Astronomy, University of Sheffield, Sheffield S3 7RH, UK 8School of Electronic and Electrical Engineering, University of Leeds, Leeds, LS2 9JT, UK 9Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, 25200 Kuantan, Pahang, Malaysia 10Institute of Mathematical Research (INSPEM), University Putra Malaysia, 43400 UPM Serdang, Selangor, Malaysia 11Centre for Quantum Software and Information, School of Software, University of Technology Sydney, Sydney NSW 2007, Australia 12Department of Optics, Palacky University, 17. listopadu 50, 772 07 Olomouc, Czech Republic 13Dipartimento di Ingegneria dell’Informazione, Universit´adegli Studi di Padova, via Gradenigo 6B, 35131 Padova, Italy and 14School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8 9AB, UK Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improv- ing, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this review, we provide both a general introduc- tion and a state of the art description of the recent advances in the field, both theoretically and experimentally. We start by reviewing protocols of quantum key distribution based on discrete variable systems. Next we consider aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems. We will then discuss the ultimate limits of point-to-point private communications and how quantum repeaters and networks may overcome these restrictions. Finally, we will discuss some aspects of quantum cryptography beyond standard quantum key distribution, including quantum data locking and quantum digital signatures. CONTENTS 1.E91protocol 14 2.BBM92protocol 14 I. Introduction 3 E. Two-way quantum communication 15 1.Pingpongprotocol 15 II. Basic notions in quantum key distribution 4 2.Two-wayQKDprotocols 16 A. GenericaspectsofaQKDprotocol 4 3.Intercept-resendstrategy 16 B. Asymptotic security and eavesdropping 4. Non-orthogonalattack strategies 16 arXiv:1906.01645v1 [quant-ph] 4 Jun 2019 strategies 5 5. Further considerations 17 C. Finite-size effects 5 D.ComposablesecurityofQKD 5 IV.Device-independentQKD 17 A. Introduction 17 III.OverviewofDV-QKD 7 B. The link between Bell violation and A. Preliminary notions 7 unpredictability 17 B.Prepareandmeasureprotocols 8 C. Quantitative bounds 19 1.BB84protocol 8 D.ProtocolsforDI-QKD 20 2.Six-stateprotocol 10 1.ThesetupforDI-QKD 20 3.B92protocol 11 2. The spot-checking CHSH QKD protocol 20 C. Practical imperfections and E.Historicalremarks 21 countermeasures 12 F. Putting DI-QKD protocols into practice 21 1.PNSattacks 12 G. Measurement device independence (MDI) 22 2. Decoy States 13 H. Twin-field QKD 24 3. SARG04 protocol 13 D. Entanglement-based QKD 14 V. ExperimentalDV-QKDprotocols 25 2 A. Detector technology 25 2. Guaranteeing large smooth min-entropy 52 B.DecoystateBB84 25 C. Uncertainty principle versus entanglement: C. Differential phase shift QKD 26 an intuitive approach to QKD security 53 D.Coherentone-way 27 D.CVprotocols 53 E.DVMDI-QKD 27 E.ExtensionsandOutlook 54 F. High-dimensional QKD 29 G. Photonic integrated circuits 30 X. Quantum hacking 54 A. Hacking DV-QKD protocols 55 VI. Satellite quantum communications 32 1. PNS and intensity-based attacks 55 A. Introduction 32 2.Trojanhorseattacks 56 B. The satellite opportunity 33 3.Backflashattacks 57 C. Type of orbits and applications 33 4. Faked states and detector efficiency 1. Space-link losses 33 mismatch 57 2.Low-Earth-orbit(LEO) 34 B.HackingCV-QKDprotocols 58 3. Higher Earth orbits (MEO and GEO) 35 1. Attacks on the local oscillator 59 4. Night and day use of the link 35 2. Saturationattacksondetectors 59 D. Beyond satellite QKD 35 3.Trojanhorseattacks 60 1.Otherprotocols 35 C.Generalconsiderations 60 2. Tests of quantum mechanics in space 36 D. Device-independence as a solution? 60 E.Concludingremarks 37 XI. Limits of point-to-point QKD 61 VII. Continuous-variable QKD 37 A.Overview 61 A. BriefintroductiontoCVsystems 37 B. Adaptive protocols and two-way assisted B. Historical outline 37 capacities 62 C.One-wayCV-QKDprotocols 38 C. General weak-converseupper bound 64 D. Computation of the key rate 38 D. LOCC simulation of quantum channels 64 E. Ideal performances in a thermal-loss E. Teleportation covariance and simulability 65 channel 39 F. Strong and uniform convergence 65 F. Finite-size aspects 40 G. Stretching of an adaptive protocol 66 G.Two-wayCV-QKDprotocols 40 H. Single-letter upper bound for two-way 1. Asymptotic security of two-way assisted capacities 66 CV-QKD 41 I. Bounds for teleportation-covariant 2. Asymptotic key rates 41 channels 67 3. Further considerations 42 J. Capacities for distillable channels 68 H.Thermal-stateQKD 42 K.Openproblems 69 1. One-way thermal communication 42 2. Two-way thermal communication 43 XII. Repeater chains and quantum networks 69 I. Unidimensional protocol 43 A.Overview 69 J. CV-QKD with discrete modulation 44 B. Idealchainsofquantumrepeaters 70 K.CVMDI-QKD 44 C. Quantum communication networks 70 1.Basicconceptsandprotocol 44 D. Practical designs for quantum repeaters 71 2.Securityandkeyrates 44 1. Probabilistic quantum repeaters 72 3.VariantsofCVMDI-QKD 46 2. Deterministic quantum repeaters 73 4. Multipartite CV MDI-QKD 46 3. Memory-lessquantumrepeaters 74 VIII.ExperimentalCV-QKD 46 XIII. QKD against a bounded quantum memory 75 A. Introduction 46 A. Introduction 75 B.Point-to-pointCV-QKD 46 B. Entropic uncertainty relations 75 1.Coherentstateencoding 47 C. Bounded quantum storage model 76 2.Detection 47 D. Quantum data locking 76 3.Post-processing 50 E. Quantum data locking for communication: C. Implementation of advanced CV-QKD 50 the quantum enigma machine 77 1.Squeezed-stateprotocols 51 F. Practical quantum data locking 78 2.CVMDI-QKD 51 G. Experimental demonstrations 78 IX.Theoreticalsecurityaspects 51 XIV. Quantum random number generation 78 A. Finite-size analysis in QKD 51 A. Introduction 78 B. Finite-size statistical analysis 52 B.ProtocolsforDI-QRE 80 1. Privacy amplification 52 1.ThesetupforDI-QRE 80 3 2. The spot-checking CHSH QRE protocol 80 integers by using Shor’s algorithm [22, 23]. The threat C. Historical remarks and further reading 81 for the Rivest-Shamir-Adleman (RSA) protocol [24] and D. Implementations 81 the other public key cryptosystems not only comes from E. Randomness amplification 81 quantum computing but also from potential advances in number theory, where an efficient factorization al- XV. Quantum Digital Signatures 82 gorithm might be found for classical Turing machines A. Introduction 82 (e.g., already in 2004 the test of primality has become B. Definitions and security properties 82 polynomial, thanks to the Agrawal-Kayal-Saxena algo- C. What is a quantum digital signature scheme rithm [25]). and why it is useful? 83 An important point to understand is that the fragility D. The Lamport one-time signature scheme 84 of current classical cryptosystems not only is a poten- E. The Gottesman-Chuang QDS 84 tial threat for the present, but a more serious and re- 1.Theprotocol 84 alistic threat for the future. Today, eavesdroppers may 2. Security intuition 85 intercept cryptograms that they are not able to decrypt. 3.Remarks 85 However, they may store these encrypted communica- 4. Practical limitations of GC-QDS 86 tions and wait for their decryption once a sufficiently F. Practical QDS: Lifting the limitations 86 large quantum computer is technologically available (or 1. Simplifying state comparison 86 a new classical algorithm is discovered). This means that 2. No quantum memory requirement 87 the confidentiality of messages may have a very limited 3.QDSfromQKDtechnology 87 lifespan. Following Michele Mosca [26], we may write 4. Insecure quantum channels 88 a simple inequality. Let us call x the security shelf-life G. AgenericmodernQDSprotocol 88 which is the length of time (in years) we need the classi- 1. Description 88 cal cryptographic keys to be secure. Then, let us call y 2. Security intuition and performance 89 the migration time which is the time (in years) needed to H. Extending QDS: Multiple parties, longer adapt the current classical infrastructure with quantum- messages,andMDI 89 secure encryption. Finally, let us call z the collapse time I. Experimental QDS realizations 90 which is the time (in years) for a large quantum computer 1. Proof-of-principle 90 to be built. If x + y>z then “worry” [26]. 2. Kilometer-range and fully-secure QDS 90 It is therefore clear that suitably countermeasures are J. Classical unconditional secure signatures 90 necessary. One approach is known as post-quantum cryp- K. Summary and outlook 91 tography. This is the development of novel classical cryp- tosystems which are robust to factorization and other XVI. Conclusions 91 quantum algorithms. This is certainly one option but Acknowledgments 92 it does not completely solve the problem. The point is that there may be undiscovered quantum algorithms (or A. Formulas for Gaussian states 92 undiscovered classical ones) that might easily break the 1. Symplectic action and its computation 93 security of the new cryptosystems. In other words, post- 2.
Recommended publications
  • Programm 5 Layout 1
    SPONSORS Pauli Center for Theoretical Studies QAP European Project PAULI CENTER for Theoretical Studies Sandia National Laboratories The Swiss National Science Foundation Institute for Quantum Computing ETH Zurich (Computer Science and Physics Department) id Quantique Quantum Science and Technology (ETH) CQT Singapore VENUE W-LAN ETH Zürich, Rämistrasse 101, CH-8092 Zürich 1. Check available WLAN’s Main building / Hauptgebäude 2. Connect to WLAN „public“ Conference Helpline 0041 (0)79 770 84 29 3. Open browser 4.Login at welcome page with Login: qip2010 Password: 2010qipconf Main entrance FLOOR E Registration/Information desk Poster session Computer room E 26.3 Main entrance Registration desk Information Computer room E 26.3 Poster session 1 FLOOR E. 0 Poster session FLOOR F Auditorium F 5: Tutorial (January 15 – 17, 2010) Auditorium maximum F 30: Scientific programme (January 18 – 22, 2010) F 33.1: Congress-Office, F 33.2: Cloak room Foyer and “Uhrenhalle”: Coffee breaks, Poster session Auditorium Maximum F 30 Scientific programmme January 18 – 22, 2010 F 33.1: Congress-Office Foyer: F 33.2 Cloak room Coffee breaks Poster session Auditorium F 5 Tutorial January 15 – 17, 2010 Uhrenhalle: Coffee breaks 2 RUMP SESSION StuZ, ETH Zürich, Universitätsstrasse 6, CH-8092 Zürich CAB Building room No. CAB F21 to CAB F27 18.30 – 23.00 h (January 20, 2010) Entry ETH CAB Building ETH Main Building 3 CONFERENCE DINNER Thursday, January 21, 2010, 19.00h Restaurant Lake Side Bellerivestrasse 170 CH-8008 Zürich Phone: +41 (0) 44 385 86 00 Directions from ETH main building • (Tram No. 9 to “Bellevue” (direction “Triemli”).
    [Show full text]
  • Security of Quantum Key Distribution with Entangled Qutrits
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CERN Document Server Security of Quantum Key Distribution with Entangled Qutrits. Thomas Durt,1 Nicolas J. Cerf,2 Nicolas Gisin,3 and Marek Zukowski˙ 4 1 Toegepaste Natuurkunde en Fotonica, Theoeretische Natuurkunde, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium 2 Ecole Polytechnique, CP 165, Universit´e Libre de Bruxelles, 1050 Brussels, Belgium 3 Group of Applied Physics - Optique, Universit´e de Gen`eve, 20 rue de l’Ecole de M´edecine, Gen`eve 4, Switzerland, 4Instytut Fizyki Teoretycznej i Astrofizyki Uniwersytet, Gda´nski, PL-80-952 Gda´nsk, Poland July 2002 Abstract The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a general- isation of Ekert's cryptographic protocol[20] where qubits are replaced by qutrits. The security of this protocol is related to non-locality, in analogy with Ekert's protocol. In order to study its robustness against the optimal individual attacks, we derive the infor- mation gained by a potential eavesdropper applying a cloning-based attack. Introduction Quantum cryptography aims at transmitting a random key in such a way that the presence of an eavesdropper that monitors the communication is revealed by disturbances in the transmission of the key (for a review, see e.g. [21]). Practically, it is enough in order to realize a crypto- graphic protocol that the key signal is encoded into quantum states that belong to incompatible bases, as in the original protocol of Bennett and Brassard[4].
    [Show full text]
  • CLEO/Europe-EQEC 2021 Advance Programme
    2021 Conference on Lasers and Electro-Optics Europe & European Quantum Electronics Conference Advance Programme Virtual Meeting CEST time zone 21 - 25 June 2021 www.cleoeurope.org Sponsored by • European Physical Society / Quantum Electronics and Optics Division • IEEE Photonics Society • The Optical Society 25th International Congress on Photonics in Europe Collocated with Laser World of Photonics Industry Days https://world-of-photonics.com/en/ 10th EPS-QEOD Europhoton Conference EUROPHOTON SOLID-STATE, FIBRE, AND WAVEGUIDE COHERENT LIGHT SOURCES 28 August – 02 September 2022 Hannover, Germany www.europhoton.org Fotos: © HMTG - Lars Gerhardts Fotos: © HMTG Table of contents TABLE OF CONTENTS Welcome and Foreword 02 Days at a Glance 04 Sessions at a Glance 14 How to Read the Session Codes? 15 How to Find the Room? 17 Topics 20 General Information 24 Technical Programme 28 01 Welcome and foreword Welcome to the 2021 Conference CLEO®/Europe will showcase the latest Particular highlights of the 2021 programme 2021 Conference on Lasers and on Lasers and Electro-Optics developments in a wide range of laser and will be a series of symposia: Electro-Optics Europe & European Europe & European Quantum photonics areas including solid-state lasers, Nanophononics, High-Field THz Genera- Quantum Electronics Conference Electronics Conference (hereafter semiconductor lasers, terahertz sources and tion and Applications, Attochemistry, Deep CLEO®/Europe-EQEC) at the World applications, applications of nonlinear op- learning in Photonics and Flexible Photonics. CLEO®/Europe - EQEC 2021 of Photonics Congress 2021 tics, optical materials, optical fabrication and Additionally, two joint sessions (EC- characterization, ultrafast optical technologies, BO-CLEO®/Europe and LiM-CLEO®/Europe) Virtual Meeting high-field laser and attosecond science, optical will be held.
    [Show full text]
  • Quantum Communication, Sensing and Measurement in Space
    Quantum Communication, Sensing and Measurement in Space Study start date: June 25, 2012 Study end date: December 14, 2012 Final Report submission date: December 14, 2012 Team Leads: Baris I. Erkmen Jet Propulsion Laboratory, California Institute of Technology [email protected] Jeffrey H. Shapiro Massachusetts Institute of Technology [email protected] Keith Schwab California Institute of Technology [email protected] © 2012. All rights reserved. 2 Core Participants of Study Program and Co-authors Name Affiliation E-mail 1 Adhikari, Rana California Institute of [email protected] Technology 2 Aspelmeyer, University of Vienna [email protected] Markus 3 Baumgartel, University of Southern [email protected] Lukas California 4 Birnbaum, Kevin Jet Propulsion [email protected] Laboratory 5 Boroson, Don MIT Lincoln Laboratory [email protected] 6 Caves, Carlton University of New [email protected] Mexico 7 Chen, Yanbei California Institute of [email protected] Technology 8 Combes, Joshua University of New [email protected] Mexico 9 Dixon, Ben Massachusetts [email protected] Institute of Technology 10 Dolinar, Sam Jet Propulsion [email protected] Laboratory 11 Durkin, Gabriel NASA Ames Research [email protected] Center 12 Erkmen, Baris Jet Propulsion [email protected] Laboratory 13 Giovannetti, Scuola Normale [email protected] Vittorio Superiore 14 Guha, Saikat Raytheon BBN [email protected] Technologies 15 Hindi, Munther NASA SCaN/ASRC [email protected] 16 Hughes, Richard Los Alamos
    [Show full text]
  • S Theorem by Quantifying the Asymmetry of Quantum States
    ARTICLE Received 9 Dec 2013 | Accepted 7 Apr 2014 | Published 13 May 2014 DOI: 10.1038/ncomms4821 Extending Noether’s theorem by quantifying the asymmetry of quantum states Iman Marvian1,2,3 & Robert W. Spekkens1 Noether’s theorem is a fundamental result in physics stating that every symmetry of the dynamics implies a conservation law. It is, however, deficient in several respects: for one, it is not applicable to dynamics wherein the system interacts with an environment; furthermore, even in the case where the system is isolated, if the quantum state is mixed then the Noether conservation laws do not capture all of the consequences of the symmetries. Here we address these deficiencies by introducing measures of the extent to which a quantum state breaks a symmetry. Such measures yield novel constraints on state transitions: for non- isolated systems they cannot increase, whereas for isolated systems they are conserved. We demonstrate that the problem of finding non-trivial asymmetry measures can be solved using the tools of quantum information theory. Applications include deriving model-independent bounds on the quantum noise in amplifiers and assessing quantum schemes for achieving high-precision metrology. 1 Perimeter Institute for Theoretical Physics, 31 Caroline St. N, Waterloo, Ontario, Canada N2L 2Y5. 2 Institute for Quantum Computing, University of Waterloo, 200 University Ave. W, Waterloo, Ontario, Canada N2L 3G1. 3 Center for Quantum Information Science and Technology, Department of Physics and Astronomy, University of Southern California, Los Angeles, California 90089, USA. Correspondence and requests for materials should be addressed to I.M. (email: [email protected]).
    [Show full text]
  • Quantum Cryptography: from Theory to Practice
    Quantum cryptography: from theory to practice by Xiongfeng Ma A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto Copyright °c 2008 by Xiongfeng Ma Abstract Quantum cryptography: from theory to practice Xiongfeng Ma Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto 2008 Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics to guarantee secure communication. The security of quantum cryptog- raphy was proven in the last decade. Many security analyses are based on the assumption that QKD system components are idealized. In practice, inevitable device imperfections may compromise security unless these imperfections are well investigated. A highly attenuated laser pulse which gives a weak coherent state is widely used in QKD experiments. A weak coherent state has multi-photon components, which opens up a security loophole to the sophisticated eavesdropper. With a small adjustment of the hardware, we will prove that the decoy state method can close this loophole and substantially improve the QKD performance. We also propose a few practical decoy state protocols, study statistical fluctuations and perform experimental demonstrations. Moreover, we will apply the methods from entanglement distillation protocols based on two-way classical communication to improve the decoy state QKD performance. Fur- thermore, we study the decoy state methods for other single photon sources, such as triggering parametric down-conversion (PDC) source. Note that our work, decoy state protocol, has attracted a lot of scienti¯c and media interest. The decoy state QKD becomes a standard technique for prepare-and-measure QKD schemes.
    [Show full text]
  • Pilot Quantum Error Correction for Global
    Pilot Quantum Error Correction for Global- Scale Quantum Communications Laszlo Gyongyosi*1,2, Member, IEEE, Sandor Imre1, Member, IEEE 1Quantum Technologies Laboratory, Department of Telecommunications Budapest University of Technology and Economics 2 Magyar tudosok krt, H-1111, Budapest, Hungary 2Information Systems Research Group, Mathematics and Natural Sciences Hungarian Academy of Sciences H-1518, Budapest, Hungary *[email protected] Real global-scale quantum communications and quantum key distribution systems cannot be implemented by the current fiber and free-space links. These links have high attenuation, low polarization-preserving capability or extreme sensitivity to the environment. A potential solution to the problem is the space-earth quantum channels. These channels have no absorption since the signal states are propagated in empty space, however a small fraction of these channels is in the atmosphere, which causes slight depolarizing effect. Furthermore, the relative motion of the ground station and the satellite causes a rotation in the polarization of the quantum states. In the current approaches to compensate for these types of polarization errors, high computational costs and extra physical apparatuses are required. Here we introduce a novel approach which breaks with the traditional views of currently developed quantum-error correction schemes. The proposed solution can be applied to fix the polarization errors which are critical in space-earth quantum communication systems. The channel coding scheme provides capacity-achieving communication over slightly depolarizing space-earth channels. I. Introduction Quantum error-correction schemes use different techniques to correct the various possible errors which occur in a quantum channel. In the first decade of the 21st century, many revolutionary properties of quantum channels were discovered [12-16], [19-22] however the efficient error- correction in quantum systems is still a challenge.
    [Show full text]
  • Arxiv:1803.04114V2 [Quant-Ph] 16 Nov 2018
    Learning the quantum algorithm for state overlap Lukasz Cincio,1 Yiğit Subaşı,1 Andrew T. Sornborger,2 and Patrick J. Coles1 1Theoretical Division, Los Alamos National Laboratory, Los Alamos, NM 87545, USA. 2Information Sciences, Los Alamos National Laboratory, Los Alamos, NM 87545, USA. Short-depth algorithms are crucial for reducing computational error on near-term quantum com- puters, for which decoherence and gate infidelity remain important issues. Here we present a machine-learning approach for discovering such algorithms. We apply our method to a ubiqui- tous primitive: computing the overlap Tr(ρσ) between two quantum states ρ and σ. The standard algorithm for this task, known as the Swap Test, is used in many applications such as quantum support vector machines, and, when specialized to ρ = σ, quantifies the Renyi entanglement. Here, we find algorithms that have shorter depths than the Swap Test, including one that has a constant depth (independent of problem size). Furthermore, we apply our approach to the hardware-specific connectivity and gate sets used by Rigetti’s and IBM’s quantum computers and demonstrate that the shorter algorithms that we derive significantly reduce the error - compared to the Swap Test - on these computers. I. INTRODUCTION hyperparameters, we optimize the algorithm in a task- oriented manner, i.e., by minimizing a cost function that quantifies the discrepancy between the algorithm’s out- Quantum supremacy [1] may be coming soon [2]. put and the desired output. The task is defined by a While it is an exciting time for quantum computing, de- training data set that exemplifies the desired computa- coherence and gate fidelity continue to be important is- tion.
    [Show full text]
  • Analysis of Quantum Error-Correcting Codes: Symplectic Lattice Codes and Toric Codes
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Caltech Theses and Dissertations Analysis of quantum error-correcting codes: symplectic lattice codes and toric codes Thesis by James William Harrington Advisor John Preskill In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute of Technology Pasadena, California 2004 (Defended May 17, 2004) ii c 2004 James William Harrington All rights Reserved iii Acknowledgements I can do all things through Christ, who strengthens me. Phillipians 4:13 (NKJV) I wish to acknowledge first of all my parents, brothers, and grandmother for all of their love, prayers, and support. Thanks to my advisor, John Preskill, for his generous support of my graduate studies, for introducing me to the studies of quantum error correction, and for encouraging me to pursue challenging questions in this fascinating field. Over the years I have benefited greatly from stimulating discussions on the subject of quantum information with Anura Abeyesinge, Charlene Ahn, Dave Ba- con, Dave Beckman, Charlie Bennett, Sergey Bravyi, Carl Caves, Isaac Chenchiah, Keng-Hwee Chiam, Richard Cleve, John Cortese, Sumit Daftuar, Ivan Deutsch, Andrew Doherty, Jon Dowling, Bryan Eastin, Steven van Enk, Chris Fuchs, Sho- hini Ghose, Daniel Gottesman, Ted Harder, Patrick Hayden, Richard Hughes, Deborah Jackson, Alexei Kitaev, Greg Kuperberg, Andrew Landahl, Chris Lee, Debbie Leung, Carlos Mochon, Michael Nielsen, Smith Nielsen, Harold Ollivier, Tobias Osborne, Michael Postol, Philippe Pouliot, Marco Pravia, John Preskill, Eric Rains, Robert Raussendorf, Joe Renes, Deborah Santamore, Yaoyun Shi, Pe- ter Shor, Marcus Silva, Graeme Smith, Jennifer Sokol, Federico Spedalieri, Rene Stock, Francis Su, Jacob Taylor, Ben Toner, Guifre Vidal, and Mas Yamada.
    [Show full text]
  • Progress in Satellite Quantum Key Distribution
    www.nature.com/npjqi REVIEW ARTICLE OPEN Progress in satellite quantum key distribution Robert Bedington 1, Juan Miguel Arrazola1 and Alexander Ling1,2 Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world. npj Quantum Information (2017) 3:30 ; doi:10.1038/s41534-017-0031-5 INTRODUCTION losses that increase exponentially with distance, greatly limiting Quantum key distribution (QKD) is a relatively new cryptographic the secure key rates that can be achieved over long ranges. primitive for establishing a private encryption key between two For any pure-loss channel with transmittance η, it has been parties. The concept has rapidly matured into a commercial shown that the secure key rate per mode of any QKD protocol 5, 6, 7 technology since the first proposal emerged in 1984,1 largely scales linearly with η for small η. This places a fundamental because of a very attractive proposition: the security of QKD is not limit to the maximum distance attainable by QKD protocols based on the computational hardness of solving mathematical relying on direct transmission.
    [Show full text]
  • Reconfigurable Optical Implementation of Quantum Complex Networks J Nokkala, F
    Reconfigurable optical implementation of quantum complex networks J Nokkala, F. Arzani, F Galve, R Zambrini, S Maniscalco, J Piilo, Nicolas Treps, V Parigi To cite this version: J Nokkala, F. Arzani, F Galve, R Zambrini, S Maniscalco, et al.. Reconfigurable optical implemen- tation of quantum complex networks. New Journal of Physics, Institute of Physics: Open Access Journals, 2018, 20, pp.053024. 10.1088/1367-2630/aabc77. hal-01798144 HAL Id: hal-01798144 https://hal.sorbonne-universite.fr/hal-01798144 Submitted on 23 May 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License PAPER • OPEN ACCESS Related content - An Introduction to the Formalism of Reconfigurable optical implementation of quantum Quantum Information with Continuous Variables: Quantum information with continuous variables complex networks C Navarrete-Benlloch - Spacetime replication of continuous To cite this article: J Nokkala et al 2018 New J. Phys. 20 053024 variable quantum information Patrick Hayden, Sepehr Nezami, Grant Salton et al. - Coupled harmonic systems as quantum buses in thermal environments View the article online for updates and enhancements. F Nicacio and F L Semião This content was downloaded from IP address 134.157.80.157 on 23/05/2018 at 09:58 New J.
    [Show full text]
  • Security of Quantum Key Distribution with Multiphoton Components
    Security of quantum key distribution with multiphoton components 1,2, 1,2, 1,2 1,2 Hua-Lei Yin ∗, Yao Fu ∗, Yingqiu Mao & Zeng-Bing Chen 1Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026, China 2The CAS Center for Excellence in QIQP and the Synergetic Innovation Center for QIQP, Uni- versity of Science and Technology of China, Hefei, Anhui 230026, China ∗ These authors contributed equally to this work. Correspondence and requests for materials should be addressed to H.-L.Y. (email: [email protected]) or Z.-B.C. (email: [email protected]) Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin- Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be ex- tracted from the two-photon component by modifying the classical post-processing proce- dure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four arXiv:1607.02366v1 [quant-ph] 8 Jul 2016 photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three- photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works.
    [Show full text]