-
Demonstration of quantum-digital payments
Authors:
Peter Schiansky,
Julia Kalb,
Esther Sztatecsny,
Marie-Christine Roehsner,
Tobias Guggemos,
Alessandro Trenti,
Mathieu Bozzio,
Philip Walther
Abstract:
Digital payments have replaced physical banknotes in many aspects of our daily lives. Similarly to banknotes, they should be easy to use, unique, tamper-resistant and untraceable, but additionally withstand digital attackers and data breaches. Current technology substitutes customers' sensitive data by randomized tokens, and secures the payment's uniqueness with a cryptographic function, called a…
▽ More
Digital payments have replaced physical banknotes in many aspects of our daily lives. Similarly to banknotes, they should be easy to use, unique, tamper-resistant and untraceable, but additionally withstand digital attackers and data breaches. Current technology substitutes customers' sensitive data by randomized tokens, and secures the payment's uniqueness with a cryptographic function, called a cryptogram. However, computationally powerful attacks violate the security of these functions. Quantum technology comes with the potential to protect even against infinite computational power. Here, we show how quantum light can secure daily digital payments by generating inherently unforgeable quantum cryptograms. We implement the scheme over an urban optical fiber link, and show its robustness to noise and loss-dependent attacks. Unlike previously proposed protocols, our solution does not depend on long-term quantum storage or trusted agents and authenticated channels. It is practical with near-term technology and may herald an era of quantum-enabled security.
△ Less
Submitted 8 January, 2024; v1 submitted 23 May, 2023;
originally announced May 2023.
-
Telecom-band quantum interference of frequency-converted photons from remote detuned NV centers
Authors:
Arian Stolk,
Kian L. van der Enden,
Marie-Christine Roehsner,
Annick Teepe,
Stein O. J. Faes,
Sidney Cadot,
Joris van Rantwijk,
Ingmar te Raa,
Ronald Hagen,
Ad Verlaan,
Benjamin Biemond,
Andrey Khorev,
Jaco Morits,
René Vollmer,
Matthew Markham,
Andrew M. Edmonds,
Erwin van Zwet,
Ronald Hanson
Abstract:
Entanglement distribution over quantum networks has the promise of realizing fundamentally new technologies. Entanglement between separated quantum processing nodes has been achieved on several experimental platforms in the past decade. To move towards metropolitan-scale quantum network test beds, the creation and transmission of indistinguishable single photons over existing telecom infrastructur…
▽ More
Entanglement distribution over quantum networks has the promise of realizing fundamentally new technologies. Entanglement between separated quantum processing nodes has been achieved on several experimental platforms in the past decade. To move towards metropolitan-scale quantum network test beds, the creation and transmission of indistinguishable single photons over existing telecom infrastructure is key. Here we report the interference of photons emitted by remote, spectrally detuned NV center-based network nodes, using quantum frequency conversion to the telecom L-band. We find a visibility of 0.79$\pm$0.03 and an indistinguishability between converted NV photons around 0.9 over the full range of the emission duration, confirming the removal of the spectral information present. Our approach implements fully separated and independent control over the nodes, time-multiplexing of control and quantum signals, and active feedback to stabilize the output frequency. Our results demonstrate a working principle that can be readily employed on other platforms and shows a clear path towards generating metropolitan scale, solid-state entanglement over deployed telecom fibers.
△ Less
Submitted 31 January, 2022;
originally announced February 2022.
-
Probabilistic one-time programs using quantum entanglement
Authors:
Marie-Christine Roehsner,
Joshua A. Kettlewell,
Joseph Fitzsimons,
Philip Walther
Abstract:
It is well known that quantum technology allows for an unprecedented level of data and software protection for quantum computers as well as for quantum-assisted classical computers. To exploit these properties, probabilistic one-time programs have been developed, where the encoding of classical software in small quantum states enables computer programs that can be used only once. Such self-destruc…
▽ More
It is well known that quantum technology allows for an unprecedented level of data and software protection for quantum computers as well as for quantum-assisted classical computers. To exploit these properties, probabilistic one-time programs have been developed, where the encoding of classical software in small quantum states enables computer programs that can be used only once. Such self-destructing one-time programs facilitate a variety of new applications reaching from software distribution to one-time delegation of signature authority. Whereas first proof-of-principle experiments demonstrated the feasibility of such schemes, the practical applications were limited due to the requirement of using the software on-the-fly combined with technological challenges due to the need for active optical switching and a large amount of classical communication. Here we present an improved protocol for one-time programs that resolves major drawbacks of previous schemes, by employing entangled qubit pairs. This results in four orders of magnitude higher count rates as well the ability to execute a program long after the quantum information exchange has taken place. We demonstrate our protocol over an underground fiber link between university buildings in downtown Vienna. Finally, together with our implementation of a one-time delegation of signature authority this emphasizes the compatibility of our scheme with prepare-and-measure quantum internet networks.
△ Less
Submitted 5 August, 2020;
originally announced August 2020.
-
Quantum advantage for probabilistic one-time programs
Authors:
Marie-Christine Roehsner,
Joshua A. Kettlewell,
Tiago B. Batalhão,
Joseph F. Fitzsimons,
Philip Walther
Abstract:
One-time programs, computer programs which self-destruct after being run only once, are a powerful building block in cryptography and would allow for new forms of secure software distribution. However, ideal one-time programs have been proved to be unachievable using either classical or quantum resources. Here we relax the definition of one-time programs to allow some probability of error in the o…
▽ More
One-time programs, computer programs which self-destruct after being run only once, are a powerful building block in cryptography and would allow for new forms of secure software distribution. However, ideal one-time programs have been proved to be unachievable using either classical or quantum resources. Here we relax the definition of one-time programs to allow some probability of error in the output and show that quantum mechanics offers security advantages over purely classical resources. We introduce a scheme for encoding probabilistic one-time programs as quantum states with prescribed measurement settings, explore their security, and experimentally demonstrate various one-time programs using measurements on single-photon states. These include classical logic gates, a program to solve Yao's millionaires problem, and a one-time delegation of a digital signature. By combining quantum and classical technology, we demonstrate that quantum techniques can enhance computing capabilities even before full-scale quantum computers are available.
△ Less
Submitted 19 July, 2018; v1 submitted 27 September, 2017;
originally announced September 2017.
-
Demonstration of measurement-only blind quantum computing
Authors:
Chiara Greganti,
Marie-Christine Roehsner,
Stefanie Barz,
Tomoyuki Morimae,
Philip Walther
Abstract:
Blind quantum computing allows for secure cloud networks of quasi-classical clients and a fully fledged quantum server. Recently, a new protocol has been proposed, which requires a client to perform only measurements. We demonstrate a proof-of-principle implementation of this measurement-only blind quantum computing, exploiting a photonic setup to generate four-qubit cluster states for computation…
▽ More
Blind quantum computing allows for secure cloud networks of quasi-classical clients and a fully fledged quantum server. Recently, a new protocol has been proposed, which requires a client to perform only measurements. We demonstrate a proof-of-principle implementation of this measurement-only blind quantum computing, exploiting a photonic setup to generate four-qubit cluster states for computation and verification. Feasible technological requirements for the client and the device-independent blindness make this scheme very applicable for future secure quantum networks.
△ Less
Submitted 12 January, 2016; v1 submitted 11 January, 2016;
originally announced January 2016.
-
Practical and efficient experimental characterization of multiqubit stabilizer states
Authors:
Chiara Greganti,
Marie-Christine Roehsner,
Stefanie Barz,
Mordecai Waegell,
Philip Walther
Abstract:
Vast developments in quantum technology have enabled the preparation of quantum states with more than a dozen entangled qubits. The full characterization of such systems demands distinct constructions depending on their specific type and the purpose of their use. Here we present a method that scales linearly with the number of qubits for characterizing stabilizer states. Our approach allows simult…
▽ More
Vast developments in quantum technology have enabled the preparation of quantum states with more than a dozen entangled qubits. The full characterization of such systems demands distinct constructions depending on their specific type and the purpose of their use. Here we present a method that scales linearly with the number of qubits for characterizing stabilizer states. Our approach allows simultaneous extraction of information about the fidelity, the entanglement, and the nonlocality of the state and thus is of high practical relevance. We demonstrate the efficient applicability of our method by performing an experimental characterization of a photonic four-qubit cluster state and three- and four-qubit Greenberger-Horne-Zeilinger states. Our scheme can be directly extended to larger-scale quantum information tasks.
△ Less
Submitted 23 February, 2015;
originally announced February 2015.