-
Long-range Quantum Cryptography: Amplified Quantum Key Distribution (AQKD)
Authors:
Richard J. Hughes,
Jane E. Nordholt
Abstract:
Recently, Takeoka, Guha and Wilde have established a new (loose) upper bound on the secret key capacity of a pure-loss bosonic channel that is several times larger than an error-free BB84 QKD channel with same transmittance. This suggests that new QKD protocols may exist with higher secret key rates and effective ranges larger than the metro-area limits of BB84 QKD over optical fiber. In this pape…
▽ More
Recently, Takeoka, Guha and Wilde have established a new (loose) upper bound on the secret key capacity of a pure-loss bosonic channel that is several times larger than an error-free BB84 QKD channel with same transmittance. This suggests that new QKD protocols may exist with higher secret key rates and effective ranges larger than the metro-area limits of BB84 QKD over optical fiber. In this paper we illustrate such a possibility with a new protocol called Amplified Quantum Key Distribution (AQKD), which will be compatible with the optical amplification typically encountered on inter-city fiber spans. We analyze one instantiation of AQKD, in which the transmitter enclave contains an optical amplifier (OA), with security against passive optical tap**. For this scenario AQKD is shown to: give three times the secret key rate of BB84 at spans up to 100km, increasing to more than a ten-fold gain at 140km; and double the maximum single-span optical fiber transmission range to inter-city distances (300km). Essential to these performance gains is a new information-theoretic protocol post-processing stage called generalized advantage distillation (GAD). AQKD could be implemented with commercial off-the-shelf (COTS) hardware as an augmentation of present-day BB84 QKD. AQKD avoids the expense, complexity and resource duplication of "trusted relay" approaches to QKD range extension. We expect AQKD to be compatible with fiber spans containing intermediate OAs, which will facilitate its deployment as an overlay on existing fiber networks.
△ Less
Submitted 26 June, 2014;
originally announced June 2014.
-
Network-Centric Quantum Communications with Application to Critical Infrastructure Protection
Authors:
Richard J. Hughes,
Jane E. Nordholt,
Kevin P. McCabe,
Raymond T. Newell,
Charles G. Peterson,
Rolando D. Somma
Abstract:
Network-centric quantum communications (NQC) - a new, scalable instantiation of quantum cryptography providing key management with forward security for lightweight encryption, authentication and digital signatures in optical networks - is briefly described. Results from a multi-node experimental test-bed utilizing integrated photonics quantum communications components, known as QKarDs, include: qu…
▽ More
Network-centric quantum communications (NQC) - a new, scalable instantiation of quantum cryptography providing key management with forward security for lightweight encryption, authentication and digital signatures in optical networks - is briefly described. Results from a multi-node experimental test-bed utilizing integrated photonics quantum communications components, known as QKarDs, include: quantum identification; verifiable quantum secret sharing; multi-party authenticated key establishment, including group keying; and single-fiber quantum-secured communications that can be applied as a security retrofit/upgrade to existing optical fiber installations. A demonstration that NQC meets the challenging simultaneous latency and security requirements of electric grid control communications, which cannot be met without compromises using conventional cryptography, is described.
△ Less
Submitted 1 May, 2013;
originally announced May 2013.
-
Practical long-distance quantum key distribution system using decoy levels
Authors:
D. Rosenberg,
C. G. Peterson,
J. W. Harrington,
P. R. Rice,
N. Dallmann,
K. T. Tyagi,
K. P. McCabe,
S. Nam,
B. Baek,
R. H. Hadfield,
R. J. Hughes,
J. E. Nordholt
Abstract:
Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully automated, robust QKD system based on t…
▽ More
Quantum key distribution (QKD) has the potential for widespread real-world applications. To date no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from the laboratory to the real world due largely to limitations in synchronization and poor detector performance. Here we report results obtained using a fully automated, robust QKD system based on the Bennett Brassard 1984 protocol (BB84) with low-noise superconducting nanowire single-photon detectors (SNSPDs) and decoy levels. Secret key is produced with unconditional security over a record 144.3 km of optical fibre, an increase of more than a factor of five compared to the previous record for unconditionally secure key generation in a practical QKD system.
△ Less
Submitted 18 June, 2008;
originally announced June 2008.
-
Long distance decoy state quantum key distribution in optical fiber
Authors:
Danna Rosenberg,
Jim W. Harrington,
Patrick R. Rice,
Philip A. Hiskett,
Charles G. Peterson,
Richard J. Hughes,
Adriana E. Lita,
Sae Woo Nam,
Jane E. Nordholt
Abstract:
The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian appro…
▽ More
The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photodetectors, we have implemented the first version of a decoy-state protocol that incorporates finite statistics without the use of Gaussian approximations in a one-way QKD system, enabling the creation of secure keys immune to photon-number-splitting attacks and highly resistant to Trojan horse attacks over 107 km of optical fiber.
△ Less
Submitted 2 May, 2007; v1 submitted 26 July, 2006;
originally announced July 2006.
-
Long-distance quantum key distribution in optical fiber
Authors:
P. A. Hiskett,
D. Rosenberg,
C. G. Peterson,
R. J. Hughes,
S. Nam,
A. E. Lita,
A. J. Miller,
J. E. Nordholt
Abstract:
Use of low-noise detectors can both increase the secret bit rate of long-distance quantum key distribution (QKD) and dramatically extend the length of a fibre optic link over which secure key can be distributed. Previous work has demonstrated use of ultra-low-noise transition-edge sensors (TESs) in a QKD system with transmission over 50 km. In this work, we demonstrate the potential of the TESs…
▽ More
Use of low-noise detectors can both increase the secret bit rate of long-distance quantum key distribution (QKD) and dramatically extend the length of a fibre optic link over which secure key can be distributed. Previous work has demonstrated use of ultra-low-noise transition-edge sensors (TESs) in a QKD system with transmission over 50 km. In this work, we demonstrate the potential of the TESs by successfully generating error-corrected, privacy-amplified key over 148.7 km of dark optical fibre at a mean photon number mu = 0.1, or 184.6 km of dark optical fibre at a mean photon number of 0.5. We have also exchanged secret key over 67.5 km that is secure against powerful photon-number-splitting attacks.
△ Less
Submitted 25 July, 2006;
originally announced July 2006.
-
Quantum key distribution at telecom wavelengths with noise-free detectors
Authors:
Danna Rosenberg,
Sae Woo Nam,
Philip A. Hiskett,
Charles G. Peterson,
Richard J. Hughes,
Jane E. Nordholt,
Adriana E. Lita,
Aaron J. Miller
Abstract:
The length of a secure link over which a quantum key can be distributed depends on the efficiency and dark-count rate of the detectors used at the receiver. We report on the first demonstration of quantum key distribution using transition-edge sensors with high efficiency and negligible dark-count rates. Using two methods of synchronization, a bright optical pulse scheme and an electrical signal…
▽ More
The length of a secure link over which a quantum key can be distributed depends on the efficiency and dark-count rate of the detectors used at the receiver. We report on the first demonstration of quantum key distribution using transition-edge sensors with high efficiency and negligible dark-count rates. Using two methods of synchronization, a bright optical pulse scheme and an electrical signal scheme, we have successfully distributed key material at 1,550 nm over 50 km of optical fiber. We discuss how use of these detectors in a quantum key distribution system can result in dramatic increases in range and performance.
△ Less
Submitted 9 October, 2005;
originally announced October 2005.
-
Enhancing practical security of quantum key distribution with a few decoy states
Authors:
Jim W. Harrington,
J. Mark Ettinger,
Richard J. Hughes,
Jane E. Nordholt
Abstract:
Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an eavesdropper, but the decoy state method can detect this attack with current technology, yielding a high rate of secret bits. In this Letter, we develop rigorous security statements in the case of finite sta…
▽ More
Quantum key distribution establishes a secret string of bits between two distant parties. Of concern in weak laser pulse schemes is the especially strong photon number splitting attack by an eavesdropper, but the decoy state method can detect this attack with current technology, yielding a high rate of secret bits. In this Letter, we develop rigorous security statements in the case of finite statistics with only a few decoy states, and we present the results of simulations of an experimental setup of a decoy state protocol that can be simply realized with current technology.
△ Less
Submitted 1 March, 2005;
originally announced March 2005.
-
Comment on "Quantum key distribution with 1.25 Gbps clock synchronization" by J.C. Bienfang et al., quant-ph/0405097
Authors:
Richard J. Hughes,
Jane E. Nordholt
Abstract:
We analyze the significance for quantum key distribution (QKD) of free-space quantum communications results reported in a recent paper (J. C. Bienfang et al., quant-ph/0405097, hereafter referred to as "Bienfang et al."), who contrast the quantum communications rate of their partial QKD implementation (which does not produce cryptographically useful shared, secret keys) over a short transmission…
▽ More
We analyze the significance for quantum key distribution (QKD) of free-space quantum communications results reported in a recent paper (J. C. Bienfang et al., quant-ph/0405097, hereafter referred to as "Bienfang et al."), who contrast the quantum communications rate of their partial QKD implementation (which does not produce cryptographically useful shared, secret keys) over a short transmission distance, with the secret bit rates of previous full QKD implementations over much longer distances. We show that when a cryptographically relevant comparison with previous results is made, the system described by Bienfang et al. would offer no advantages for QKD, contrary to assertions in their paper and in spite of its high clock rate. Further, we show that the claim made by Bienfang et al. that "high transmission rates serve ... to extend the distance over which a QKD system can operate" is incorrect. Our analysis illustrates an important aspect of QKD that is too often overlooked in experiments: the sifted bit rate can be a highly misleading indicator of the performance of a QKD system.
△ Less
Submitted 6 July, 2004;
originally announced July 2004.
-
Practical free-space quantum key distribution over 10 km in daylight and at night
Authors:
Richard J. Hughes,
Jane E. Nordholt,
Derek Derkacs,
Charles G. Peterson
Abstract:
We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency…
▽ More
We have demonstrated quantum key distribution (QKD) over a 10-km, 1-airmass atmospheric range during daylight and at night. Secret random bit sequences of the quality required for the cryptographic keys used to initialize secure communications devices were transferred at practical rates with realistic security. By identifying the physical parameters that determine the system's secrecy efficiency, we infer that free-space QKD will be practical over much longer ranges under these and other atmospheric and instrumental conditions.
△ Less
Submitted 13 June, 2002;
originally announced June 2002.
-
Daylight quantum key distribution over 1.6 km
Authors:
W. T. Buttler,
R. J. Hughes,
S. K. Lamoreaux,
G. L. Morgan,
J. E. Nordholt,
C. G. Peterson
Abstract:
Quantum key distribution (QKD) has been demonstrated over a point-to-point $\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.
Quantum key distribution (QKD) has been demonstrated over a point-to-point $\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.
△ Less
Submitted 24 January, 2000;
originally announced January 2000.
-
Practical quantum cryptography for secure free-space communications
Authors:
Richard J. Hughes,
William T. Buttler,
Paul G. Kwiat,
Steve K. Lamoreaux,
George L. Morgan,
Jane E. Nordholt,
C. G. Peterson
Abstract:
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the qu…
▽ More
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.
△ Less
Submitted 4 May, 1999;
originally announced May 1999.
-
Practical free-space quantum key distribution over 1 km
Authors:
W. T. Buttler,
R. J. Hughes,
P. G. Kwiat,
S. K. Lamoreaux,
G. G. Luther,
G. L. Morgan,
J. E. Nordholt,
C. G. Peterson,
C. M. Simmons
Abstract:
A working free-space quantum key distribution (QKD) system has been developed and tested over an outdoor optical path of ~1 km at Los Alamos National Laboratory under nighttime conditions. Results show that QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.
A working free-space quantum key distribution (QKD) system has been developed and tested over an outdoor optical path of ~1 km at Los Alamos National Laboratory under nighttime conditions. Results show that QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, we examine the feasibility of surface to satellite QKD.
△ Less
Submitted 22 May, 1998;
originally announced May 1998.
-
Free-space quantum key distribution
Authors:
W. T. Buttler,
R. J. Hughes,
P. G. Kwiat,
G. G. Luther,
G. L. Morgan,
J. E. Nordholt,
C. G. Peterson,
C. M. Simmons
Abstract:
A working free-space quantum key distribution (QKD) system has been developed and tested over a 205-m indoor optical path at Los Alamos National Laboratory under fluorescent lighting conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly.
A working free-space quantum key distribution (QKD) system has been developed and tested over a 205-m indoor optical path at Los Alamos National Laboratory under fluorescent lighting conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly.
△ Less
Submitted 6 January, 1998;
originally announced January 1998.