-
Continuous-variable quantum key distribution with noisy squeezed states
Authors:
Akash nag Oruganti,
Ivan Derkach,
Vladyslav C. Usenko
Abstract:
We address the role of noisy squeezing in security and performance of continuous-variable (CV) quantum key distribution (QKD) protocols. Squeezing has long been recognized for its numerous advantages in CV QKD, such as enhanced robustness against channel noise and loss, and improved secret key rates. However, the noise of the squeezed states, that unavoidably originates already from optical loss i…
▽ More
We address the role of noisy squeezing in security and performance of continuous-variable (CV) quantum key distribution (QKD) protocols. Squeezing has long been recognized for its numerous advantages in CV QKD, such as enhanced robustness against channel noise and loss, and improved secret key rates. However, the noise of the squeezed states, that unavoidably originates already from optical loss in the source, raises concerns about its potential exploitation by an eavesdropper. This is particularly relevant if this noise is pessimistically assumed untrusted. We address the allocation of untrusted noise within a squeezed state and show that anti-squeezing noise is typically more harmful for security of the protocols, as it potentially provides more information to an eavesdropper. Although the anti-squeezing noise may not directly contribute to the generated key data, it is involved in parameter estimation and can in fact be harmful even if considered trusted. Our study covers the effects of anti-squeezing noise in both the asymptotic and finite-size regimes. We highlight the positive effects and limitations of imposing trust assumption on anti-squeezing noise. Additionally, we emphasize the detrimental impact of untrusted noise in both fiber and free-space fading links. Our findings offer essential insights for practical implementations and optimization of squeezed-state CV QKD protocols in realistic scenarios.
△ Less
Submitted 8 April, 2024;
originally announced April 2024.
-
Continuous-variable quantum passive optical network
Authors:
Adnan A. E. Hajomer,
Ivan Derkach,
Radim Filip,
Ulrik L. Andersen,
Vladyslav C. Usenko,
Tobias Gehring
Abstract:
Building scalable and secure quantum networks with many users has a high application potential but also holds many practical challenges. A significant stride in this pursuit involves extending quantum key distribution, an information-theoretically secure method for establishing cryptographic keys between two distant users, from a point-to-point protocol implemented on direct optical connections to…
▽ More
Building scalable and secure quantum networks with many users has a high application potential but also holds many practical challenges. A significant stride in this pursuit involves extending quantum key distribution, an information-theoretically secure method for establishing cryptographic keys between two distant users, from a point-to-point protocol implemented on direct optical connections to a quantum access network. Yet, realizations of quantum access networks have, so far, relied on probabilistic or time-sharing strategies. Here, we show theoretically and experimentally that a solution without these constraints can come from the exclusive features of continuous-variable systems. Based on coherent states, we propose continuous-variable quantum passive-optical-network (CV-QPON) protocols, enabling deterministic and simultaneous secret key generation among all network users. We achieve this by leveraging the inherent wave-like property of coherent states split at a beam splitter and electric-field quadrature measurements. We show two protocols with different trust levels assigned to the network users and experimentally demonstrate key generation in a quantum access network with 8 users, each with an 11 km span of access link. Depending on the trust assumptions about users, we reach 1.5 Mbits/s and 2.1 Mbits/s of total network key generation. Demonstrating the potential to expand the network's capacity to accommodate tens of users at a high rate, our CV-QPON protocols offer a pathway toward establishing low-cost, high-rate, and scalable quantum access networks using standard telecom technologies and directly exploiting the existing access network infrastructure.
△ Less
Submitted 25 February, 2024;
originally announced February 2024.
-
Continuous-Variable Quantum Key Distribution at 10 GBaud using an Integrated Photonic-Electronic Receiver
Authors:
Adnan A. E. Hajomer,
Cedric Bruynsteen,
Ivan Derkach,
Nitin Jain,
Axl Bomhals,
Sarah Bastiaens,
Ulrik L. Andersen,
Xin Yin,
Tobias Gehring
Abstract:
Quantum key distribution (QKD) is a well-known application of quantum information theory that guarantees information-theoretically secure key exchange. As QKD becomes more and more commercially viable, challenges such as scalability, network integration, and high production costs need to be addressed. Photonic and electronic integrated circuits that can be produced in large volumes at low cost hol…
▽ More
Quantum key distribution (QKD) is a well-known application of quantum information theory that guarantees information-theoretically secure key exchange. As QKD becomes more and more commercially viable, challenges such as scalability, network integration, and high production costs need to be addressed. Photonic and electronic integrated circuits that can be produced in large volumes at low cost hold the key to large-scale deployment of next-generation QKD systems. Here, we present a continuous-variable (CV) QKD system using an integrated photonic-electronic receiver that combines a silicon photonic integrated circuit implementing a phase-diverse receiver with custom-designed GaAs pHEMT transimpedance amplifiers. The QKD system operates at a classical telecom symbol rate of 10 GBaud, generating high secret key rates exceeding 0.7 Gb/s over a distance of 5 km and 0.3 Gb/s over a distance of 10 km. The secret keys are secure against collective attacks with finite-size effects taken into account. Well-designed digital signal processing enabled the high-speed operation. Our experiment sets a new record for secure quantum communication and paves the way for the next generation of CV-QKD systems.
△ Less
Submitted 31 May, 2023;
originally announced May 2023.
-
Long-distance continuous-variable quantum key distribution over 100 km fiber with local local oscillator
Authors:
Adnan A. E. Hajomer,
Ivan Derkach,
Nitin Jain,
Hou-Man Chin,
Ulrik L. Andersen,
Tobias Gehring
Abstract:
Quantum key distribution (QKD) enables two remote parties to share encryption keys with security based on the laws of physics. Continuous variable (CV) QKD with coherent states and coherent detection integrates well with existing telecommunication networks. However, thus far, long-distance CV-QKD has only been demonstrated using a highly complex scheme where the local oscillator is transmitted, op…
▽ More
Quantum key distribution (QKD) enables two remote parties to share encryption keys with security based on the laws of physics. Continuous variable (CV) QKD with coherent states and coherent detection integrates well with existing telecommunication networks. However, thus far, long-distance CV-QKD has only been demonstrated using a highly complex scheme where the local oscillator is transmitted, opening security loopholes for eavesdroppers and limiting its potential applications. Here, we report a long-distance CV-QKD experiment with a locally generated local oscillator over a 100 km fiber channel with a total loss of 15.4 dB. This record-breaking distance is achieved by controlling the phase-noise-induced excess noise through a machine-learning framework for carrier recovery and optimizing the modulation variance. We implement the full CV-QKD protocol and demonstrate the generation of keys secure against collective attacks in the finite-size regime. Our results mark a significant milestone for realizing CV quantum access networks with a high loss budget, and pave the way for large-scale deployment of secure QKD.
△ Less
Submitted 16 May, 2023; v1 submitted 14 May, 2023;
originally announced May 2023.
-
Quantum Physics in Space
Authors:
Alessio Belenchia,
Matteo Carlesso,
Ömer Bayraktar,
Daniele Dequal,
Ivan Derkach,
Giulio Gasbarri,
Waldemar Herr,
Ying Lia Li,
Markus Rademacher,
Jasminder Sidhu,
Daniel KL Oi,
Stephan T. Seidel,
Rainer Kaltenbaek,
Christoph Marquardt,
Hendrik Ulbricht,
Vladyslav C. Usenko,
Lisa Wörner,
André Xuereb,
Mauro Paternostro,
Angelo Bassi
Abstract:
Advances in quantum technologies are giving rise to a revolution in the way fundamental physics questions are explored at the empirical level. At the same time, they are the seeds for future disruptive technological applications of quantum physics. Remarkably, a space-based environment may open many new avenues for exploring and employing quantum physics and technologies. Recently, space missions…
▽ More
Advances in quantum technologies are giving rise to a revolution in the way fundamental physics questions are explored at the empirical level. At the same time, they are the seeds for future disruptive technological applications of quantum physics. Remarkably, a space-based environment may open many new avenues for exploring and employing quantum physics and technologies. Recently, space missions employing quantum technologies for fundamental or applied studies have been proposed and implemented with stunning results. The combination of quantum physics and its space application is the focus of this review: we cover both the fundamental scientific questions that can be tackled with quantum technologies in space and the possible implementation of these technologies for a variety of academic and commercial purposes.
△ Less
Submitted 29 January, 2023; v1 submitted 3 August, 2021;
originally announced August 2021.
-
Modulation leakage vulnerability in continuous-variable quantum key distribution
Authors:
Nitin Jain,
Ivan Derkach,
Hou-Man Chin,
Radim Filip,
Ulrik L. Andersen,
Vladyslav C. Usenko,
Tobias Gehring
Abstract:
Flaws in the process of modulation, or encoding of key bits in the quadratures of the electromagnetic light field, can make continuous-variable quantum key distribution systems susceptible to leakage of secret information. Here, we report such a modulation leakage vulnerability in a system that uses an optical in-phase and quadrature modulator to implement a single sideband encoding scheme. The le…
▽ More
Flaws in the process of modulation, or encoding of key bits in the quadratures of the electromagnetic light field, can make continuous-variable quantum key distribution systems susceptible to leakage of secret information. Here, we report such a modulation leakage vulnerability in a system that uses an optical in-phase and quadrature modulator to implement a single sideband encoding scheme. The leakage arises from the limited suppression of a quantum-information-carrying sideband during modulation. Based on the results from a proof-of-concept experiment, we theoretically analyse the impact of this vulnerability. Our results indicate that the leakage reduces the range over which a positive secret key can be obtained, and can even lead to a security breach if not properly taken into account. We also study the effectiveness of additional trusted noise as a countermeasure to this vulnerability.
△ Less
Submitted 26 March, 2021;
originally announced March 2021.
-
Applicability of Squeezed-and Coherent-State Continuous-Variable Quantum Key Distribution over Satellite Links
Authors:
Ivan Derkach,
Vladyslav C Usenko
Abstract:
We address the applicability of quantum key distribution with continuous-variable coherent and squeezed states over long-distance satellite-based links, considering low Earth orbits and taking into account strong varying channel attenuation, atmospheric turbulence and finite data ensemble size effects. We obtain tight security bounds on the untrusted excess noise on the channel output, which sugge…
▽ More
We address the applicability of quantum key distribution with continuous-variable coherent and squeezed states over long-distance satellite-based links, considering low Earth orbits and taking into account strong varying channel attenuation, atmospheric turbulence and finite data ensemble size effects. We obtain tight security bounds on the untrusted excess noise on the channel output, which suggest that substantial efforts aimed at setup stabilization and reduction of noise and loss are required, or the protocols can be realistically implemented over satellite links once either individual or passive collective attacks are assumed. Furthermore, splitting the satellite pass into discrete segments and extracting the key from each rather than from the overall single pass allows one to effectively improve robustness against the untrusted channel noise and establish a secure key under active collective attacks. We show that feasible amounts of optimized signal squeezing can substantially improve the applicability of the protocols allowing for lower system clock rates and aperture sizes and resulting in higher robustness against channel attenuation and noise compared to the coherent-state protocol
△ Less
Submitted 22 January, 2021;
originally announced January 2021.
-
Stabilization of transmittance fluctuations caused by beam wandering in continuous-variable quantum communication over free-space atmospheric channels
Authors:
Vladyslav C. Usenko,
Christian Peuntinger,
Bettina Heim,
Kevin Günthner,
Ivan Derkach,
Dominique Elser,
Christoph Marquardt,
Radim Filip,
Gerd Leuchs
Abstract:
Transmittance fluctuations in turbulent atmospheric channels result in quadrature excess noise which limits applicability of continuous-variable quantum communication. Such fluctuations are commonly caused by beam wandering around the receiving aperture. We study the possibility to stabilize the fluctuations by expanding the beam, and test this channel stabilization in regard of continuous-variabl…
▽ More
Transmittance fluctuations in turbulent atmospheric channels result in quadrature excess noise which limits applicability of continuous-variable quantum communication. Such fluctuations are commonly caused by beam wandering around the receiving aperture. We study the possibility to stabilize the fluctuations by expanding the beam, and test this channel stabilization in regard of continuous-variable entanglement sharing and quantum key distribution. We perform transmittance measurements of a real free-space atmospheric channel for different beam widths and show that the beam expansion reduces the fluctuations of the channel transmittance by the cost of an increased overall loss. We also theoretically study the possibility to share an entangled state or to establish secure quantum key distribution over the turbulent atmospheric channels with varying beam widths. We show the positive effect of channel stabilization by beam expansion on continuous-variable quantum communication as well as the necessity to optimize the method in order to maximize the secret key rate or the amount of shared entanglement. Being autonomous and not requiring adaptive control of the source and detectors based on characterization of beam wandering, the method of beam expansion can be also combined with other methods aiming at stabilizing the fluctuating free-space atmospheric channels.
△ Less
Submitted 22 April, 2020;
originally announced April 2020.
-
Squeezing-enhanced quantum key distribution over atmospheric channels
Authors:
Ivan Derkach,
Vladyslav C. Usenko,
Radim Filip
Abstract:
We propose the Gaussian continuous-variable quantum key distribution using squeezed states in the composite channels including atmospheric propagation with transmittance fluctuations. We show that adjustments of signal modulation and use of optimal feasible squeezing can be sufficient to significantly overcome the coherent-state protocol and drastically improve the performance of quantum key distr…
▽ More
We propose the Gaussian continuous-variable quantum key distribution using squeezed states in the composite channels including atmospheric propagation with transmittance fluctuations. We show that adjustments of signal modulation and use of optimal feasible squeezing can be sufficient to significantly overcome the coherent-state protocol and drastically improve the performance of quantum key distribution in atmospheric channels, also in the presence of additional attenuating and noisy channels. Furthermore, we consider examples of atmospheric links of different lengths, and show that optimization of both squeezing and modulation is crucial for reduction of protocol downtime and increase of secure atmospheric channel distance. Our results demonstrate unexpected advantage of fragile squeezed states of light in the free-space quantum key distribution applicable in daylight and stable against atmospheric turbulence.
△ Less
Submitted 26 September, 2018;
originally announced September 2018.
-
Continuous-variable quantum key distribution with a leakage from state preparation
Authors:
Ivan Derkach,
Vladyslav C. Usenko,
Radim Filip
Abstract:
We address side-channel leakage in a trusted preparation station of continuous-variable quantum key distribution with coherent and squeezed states. We consider two different scenaria: multimode Gaussian modulation, directly accessible to an eavesdropper, or side-channel loss of the signal states prior to the modulation stage. We show the negative impact of excessive modulation on both the coherent…
▽ More
We address side-channel leakage in a trusted preparation station of continuous-variable quantum key distribution with coherent and squeezed states. We consider two different scenaria: multimode Gaussian modulation, directly accessible to an eavesdropper, or side-channel loss of the signal states prior to the modulation stage. We show the negative impact of excessive modulation on both the coherent- and squeezed-state protocols. The impact is more pronounced for squeezed-state protocols and may require optimization of squeezing in the case of noisy quantum channels. Further, we demonstrate that coherent-state protocol is immune to side-channel signal state leakage prior to modulation, while the squeezed-state protocol is vulnerable to such attacks, becoming more sensitive to the noise in the channel. In the general case of noisy quantum channels the signal squeezing can be optimized to provide best performance of the protocol in the presence of side-channel leakage prior to modulation. Our results demonstrate that leakage from the trusted source in continuous-variable quantum key distribution should not be underestimated and squeezing optimization is needed to overcome coherent state protocols.
△ Less
Submitted 12 December, 2017; v1 submitted 27 November, 2017;
originally announced November 2017.
-
Preventing side-channel effects in continuous-variable quantum key distribution
Authors:
Ivan Derkach,
Vladyslav C. Usenko,
Radim Filip
Abstract:
The role of the side channels in the continuous-variable quantum key distribution is studied. It is shown how the information leakage through a side channel from the trusted sender station increases the vulnerability of the protocols to the eavesdrop** in the main quantum communication channel. Moreover, the untrusted noise infusion by an eavesdropper on the trusted receiving side breaks the sec…
▽ More
The role of the side channels in the continuous-variable quantum key distribution is studied. It is shown how the information leakage through a side channel from the trusted sender station increases the vulnerability of the protocols to the eavesdrop** in the main quantum communication channel. Moreover, the untrusted noise infusion by an eavesdropper on the trusted receiving side breaks the security even for a purely attenuating main quantum channel. As a method to compensate for the effect of the side-channel leakage on the sender side, we suggest several types of manipulations on the side-channel input. It is shown that by applying the modulated coherent light on the input of the side channel that is optimally correlated to the modulation on the main signal and optionally, introducing additional squeezing in the case of the squeezed-state protocol, the negative influence of the lossy side channel on the sender side can be completely removed. For the trusted receiving side, the method of optimal monitoring of the residual noise from the side-channel noise infusion is suggested and shown to be able to completely eliminate the presence of the noisy side channel. We therefore prove that the side-channel effects can be completely removed using feasible operations if the trusted parties access the respective parts of the side channels.
△ Less
Submitted 9 March, 2016;
originally announced March 2016.