-
100 Gbps Quantum-safe IPsec VPN Tunnels over 46 km Deployed Fiber
Authors:
Obada Alia,
Albert Huang,
Huan Luo,
Omar Amer,
Marco Pistoia,
Charles Lim
Abstract:
We demonstrated for the first time quantum-safe high-speed 100 Gbps site-to-site IPsec tunnels secured using Quantum Key Distribution (QKD) technology. The demonstration was conducted between two JPMorgan Chase Data Centers (DCs) in an air-gapped environment over 46 km of deployed telecom fiber across Singapore achieving 45 days of continuous operation. Two different Virtual Private Network (VPN)…
▽ More
We demonstrated for the first time quantum-safe high-speed 100 Gbps site-to-site IPsec tunnels secured using Quantum Key Distribution (QKD) technology. The demonstration was conducted between two JPMorgan Chase Data Centers (DCs) in an air-gapped environment over 46 km of deployed telecom fiber across Singapore achieving 45 days of continuous operation. Two different Virtual Private Network (VPN) tunnel configurations were tested: (1) a QKD-secured VPN tunnel configuration with a maximum throughput of 80 Gbps and (2) a multi-VPN tunnel configuration exhibiting 12 QKD-secured VPN tunnels with a throughput of 8.39 Gbps per tunnel resulting in an aggregated throughput of 99.62 Gbps for all tunnels. For the QKD system performance, we achieved an average Secret Key Rate (SKR) of 7.4 kbps (about 29 AES-256 keys per second), an average Quantum Bit Error Rate (QBER) of 0.8% and an average visibility of 98.6%. We utilized the ETSI-QKD-014 REST-based Application Programming Interface (API) to exchange the QKD generated keys between the key management server in the QKD system and the next-generation firewalls in order to encrypt and decrypt the data. The data was encrypted by the quantum-safe keys using the AES-256-GCM cipher suite with a key refresh rate of 120 seconds without affecting the VPN tunnel connectivity and performance
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Randomised benchmarking for characterizing and forecasting correlated processes
Authors:
Xinfang Zhang,
Zhihao Wu,
Gregory A. L. White,
Zhongcheng Xiang,
Shun Hu,
Zhihui Peng,
Yong Liu,
Dongning Zheng,
Xiang Fu,
Anqi Huang,
Dario Poletti,
Kavan Modi,
Junjie Wu,
Mingtang Deng,
Chu Guo
Abstract:
The development of fault-tolerant quantum processors relies on the ability to control noise. A particularly insidious form of noise is temporally correlated or non-Markovian noise. By combining randomized benchmarking with supervised machine learning algorithms, we develop a method to learn the details of temporally correlated noise. In particular, we can learn the time-independent evolution opera…
▽ More
The development of fault-tolerant quantum processors relies on the ability to control noise. A particularly insidious form of noise is temporally correlated or non-Markovian noise. By combining randomized benchmarking with supervised machine learning algorithms, we develop a method to learn the details of temporally correlated noise. In particular, we can learn the time-independent evolution operator of system plus bath and this leads to (i) the ability to characterize the degree of non-Markovianity of the dynamics and (ii) the ability to predict the dynamics of the system even beyond the times we have used to train our model. We exemplify this by implementing our method on a superconducting quantum processor. Our experimental results show a drastic change between the Markovian and non-Markovian regimes for the learning accuracies.
△ Less
Submitted 10 December, 2023;
originally announced December 2023.
-
Preparing a commercial quantum key distribution system for certification against implementation loopholes
Authors:
Vadim Makarov,
Alexey Abrikosov,
Poompong Chaiwongkhot,
Aleksey K. Fedorov,
Anqi Huang,
Evgeny Kiktenko,
Mikhail Petrov,
Anastasiya Ponosova,
Daria Ruzhitskaya,
Andrey Tayduganov,
Daniil Trefilov,
Konstantin Zaitsev
Abstract:
A commercial quantum key distribution (QKD) system needs to be formally certified to enable its wide deployment. The certification should include the system's robustness against known implementation loopholes and attacks that exploit them. Here we ready a fiber-optic QKD system for this procedure. The system has a prepare-and-measure scheme with decoy-state BB84 protocol, polarisation encoding, qu…
▽ More
A commercial quantum key distribution (QKD) system needs to be formally certified to enable its wide deployment. The certification should include the system's robustness against known implementation loopholes and attacks that exploit them. Here we ready a fiber-optic QKD system for this procedure. The system has a prepare-and-measure scheme with decoy-state BB84 protocol, polarisation encoding, qubit source rate of 312.5 MHz, and is manufactured by QRate in Russia. We detail its hardware and post-processing. We analyse the hardware for any possible implementation loopholes and discuss countermeasures. We then amend the system design to address the highest-risk loopholes identified. We also work out technical requirements on the certification lab and outline its possible structure.
△ Less
Submitted 30 October, 2023;
originally announced October 2023.
-
Experimental quantum natural gradient optimization in photonics
Authors:
Yizhi Wang,
Shichuan Xue,
Yaxuan Wang,
Jiangfang Ding,
Weixu Shi,
Dongyang Wang,
Yong Liu,
Yingwen Liu,
Xiang Fu,
Guangyao Huang,
Anqi Huang,
Mingtang Deng,
Junjie Wu
Abstract:
Variational quantum algorithms (VQAs) combining the advantages of parameterized quantum circuits and classical optimizers, promise practical quantum applications in the Noisy Intermediate-Scale Quantum era. The performance of VQAs heavily depends on the optimization method. Compared with gradient-free and ordinary gradient descent methods, the quantum natural gradient (QNG), which mirrors the geom…
▽ More
Variational quantum algorithms (VQAs) combining the advantages of parameterized quantum circuits and classical optimizers, promise practical quantum applications in the Noisy Intermediate-Scale Quantum era. The performance of VQAs heavily depends on the optimization method. Compared with gradient-free and ordinary gradient descent methods, the quantum natural gradient (QNG), which mirrors the geometric structure of the parameter space, can achieve faster convergence and avoid local minima more easily, thereby reducing the cost of circuit executions. We utilized a fully programmable photonic chip to experimentally estimate the QNG in photonics for the first time. We obtained the dissociation curve of the He-H$^+$ cation and achieved chemical accuracy, verifying the outperformance of QNG optimization on a photonic device. Our work opens up a vista of utilizing QNG in photonics to implement practical near-term quantum applications.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Quantum generative adversarial learning in photonics
Authors:
Yizhi Wang,
Shichuan Xue,
Yaxuan Wang,
Yong Liu,
Jiangfang Ding,
Weixu Shi,
Dongyang Wang,
Yingwen Liu,
Xiang Fu,
Guangyao Huang,
Anqi Huang,
Mingtang Deng,
Junjie Wu
Abstract:
Quantum Generative Adversarial Networks (QGANs), an intersection of quantum computing and machine learning, have attracted widespread attention due to their potential advantages over classical analogs. However, in the current era of Noisy Intermediate-Scale Quantum (NISQ) computing, it is essential to investigate whether QGANs can perform learning tasks on near-term quantum devices usually affecte…
▽ More
Quantum Generative Adversarial Networks (QGANs), an intersection of quantum computing and machine learning, have attracted widespread attention due to their potential advantages over classical analogs. However, in the current era of Noisy Intermediate-Scale Quantum (NISQ) computing, it is essential to investigate whether QGANs can perform learning tasks on near-term quantum devices usually affected by noise and even defects. In this Letter, using a programmable silicon quantum photonic chip, we experimentally demonstrate the QGAN model in photonics for the first time, and investigate the effects of noise and defects on its performance. Our results show that QGANs can generate high-quality quantum data with a fidelity higher than 90\%, even under conditions where up to half of the generator's phase shifters are damaged, or all of the generator and discriminator's phase shifters are subjected to phase noise up to 0.04$π$. Our work sheds light on the feasibility of implementing QGANs on NISQ-era quantum hardware.
△ Less
Submitted 1 October, 2023;
originally announced October 2023.
-
High-rate discretely-modulated continuous-variable quantum key distribution using quantum machine learning
Authors:
Qin Liao,
Jieyu Liu,
Anqi Huang,
Lei Huang,
Zhuoying Fei,
Xiquan Fu
Abstract:
We propose a high-rate scheme for discretely-modulated continuous-variable quantum key distribution (DM CVQKD) using quantum machine learning technologies, which divides the whole CVQKD system into three parts, i.e., the initialization part that is used for training and estimating quantum classifier, the prediction part that is used for generating highly correlated raw keys, and the data-postproce…
▽ More
We propose a high-rate scheme for discretely-modulated continuous-variable quantum key distribution (DM CVQKD) using quantum machine learning technologies, which divides the whole CVQKD system into three parts, i.e., the initialization part that is used for training and estimating quantum classifier, the prediction part that is used for generating highly correlated raw keys, and the data-postprocessing part that generates the final secret key string shared by Alice and Bob. To this end, a low-complexity quantum k-nearest neighbor (QkNN) classifier is designed for predicting the lossy discretely-modulated coherent states (DMCSs) at Bob's side. The performance of the proposed QkNN-based CVQKD especially in terms of machine learning metrics and complexity is analyzed, and its theoretical security is proved by using semi-definite program (SDP) method. Numerical simulation shows that the secret key rate of our proposed scheme is explicitly superior to the existing DM CVQKD protocols, and it can be further enhanced with the increase of modulation variance.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
Automated verification of countermeasure against detector-control attack in quantum key distribution
Authors:
Polina Acheva,
Konstantin Zaitsev,
Vladimir Zavodilenko,
Anton Losev,
Anqi Huang,
Vadim Makarov
Abstract:
Attacks that control single-photon detectors in quantum key distribution using tailored bright illumination are capable of eavesdrop** the secret key. Here we report an automated testbench that checks the detector's vulnerabilities against these attacks. We illustrate its performance by testing a free-running detector that includes a rudimentary countermeasure measuring an average photocurrent.…
▽ More
Attacks that control single-photon detectors in quantum key distribution using tailored bright illumination are capable of eavesdrop** the secret key. Here we report an automated testbench that checks the detector's vulnerabilities against these attacks. We illustrate its performance by testing a free-running detector that includes a rudimentary countermeasure measuring an average photocurrent. While our testbench automatically finds the detector to be controllable in a continuous-blinding regime, the countermeasure registers photocurrent significantly exceeding that in a quantum regime, thus revealing the attack. We then perform manually a pulsed blinding attack, which controls the detector intermittently. This attack is missed by the countermeasure in a wide range of blinding pulse durations and powers, still allowing to eavesdrop the key. We make recommendations for improvement of both the testbench and countermeasure.
△ Less
Submitted 29 May, 2023;
originally announced May 2023.
-
Security boundaries of an optical power limiter for protecting quantum key distribution systems
Authors:
Qingquan Peng,
Binwu Gao,
Konstantin Zaitsev,
Dongyang Wang,
Jiangfang Ding,
Yingwen Liu,
Qin Liao,
Ying Guo,
Anqi Huang,
Junjie Wu
Abstract:
Unauthorized light injection has always been a vital threat to the practical security of a quantum key distribution (QKD) system. An optical power limiter (OPL) based on the thermo-optical defocusing effect has been proposed and implemented, limiting the injected hacking light. As a hardware countermeasure, the performance of the OPL under various light-injection attacks shall be tested to clarify…
▽ More
Unauthorized light injection has always been a vital threat to the practical security of a quantum key distribution (QKD) system. An optical power limiter (OPL) based on the thermo-optical defocusing effect has been proposed and implemented, limiting the injected hacking light. As a hardware countermeasure, the performance of the OPL under various light-injection attacks shall be tested to clarify the security boundary before being widely deployed. To investigate the OPL's security boundary in quantum cryptography, we comprehensively test and analyse the behavior of OPL under continuous-wave (c.w.) light-injection attacks and pulse illumination attacks with pulses' repetition rate at $0.5$-$\hertz$, $40$-$\mega\hertz$, and $1$-$\giga\hertz$. The testing results illuminate the security boundary of the OPL, which allows one to properly employ the OPL in the use cases. The methodology of testing and analysis proposed here is applicable to other power-limitation components in a QKD system.
△ Less
Submitted 22 December, 2023; v1 submitted 22 March, 2023;
originally announced March 2023.
-
Large-scale full-programmable quantum walk and its applications
Authors:
Yizhi Wang,
Yingwen Liu,
Junwei Zhan,
Shichuan Xue,
Yuzhen Zheng,
Ru Zeng,
Zhihao Wu,
Zihao Wang,
Qilin Zheng,
Dongyang Wang,
Weixu Shi,
Xiang Fu,
** Xu,
Yang Wang,
Yong Liu,
Jiangfang Ding,
Guangyao Huang,
Chunlin Yu,
Anqi Huang,
Xiaogang Qiang,
Mingtang Deng,
Weixia Xu,
Kai Lu,
Xuejun Yang,
Junjie Wu
Abstract:
With photonics, the quantum computational advantage has been demonstrated on the task of boson sampling. Next, develo** quantum-enhanced approaches for practical problems becomes one of the top priorities for photonic systems. Quantum walks are powerful kernels for develo** new and useful quantum algorithms. Here we realize large-scale quantum walks using a fully programmable photonic quantum…
▽ More
With photonics, the quantum computational advantage has been demonstrated on the task of boson sampling. Next, develo** quantum-enhanced approaches for practical problems becomes one of the top priorities for photonic systems. Quantum walks are powerful kernels for develo** new and useful quantum algorithms. Here we realize large-scale quantum walks using a fully programmable photonic quantum computing system. The system integrates a silicon quantum photonic chip, enabling the simulation of quantum walk dynamics on graphs with up to 400 vertices and possessing full programmability over quantum walk parameters, including the particle property, initial state, graph structure, and evolution time. In the 400-dimensional Hilbert space, the average fidelity of random entangled quantum states after the whole on-chip circuit evolution reaches as high as 94.29$\pm$1.28$\%$. With the system, we demonstrated exponentially faster hitting and quadratically faster mixing performance of quantum walks over classical random walks, achieving more than two orders of magnitude of enhancement in the experimental hitting efficiency and almost half of the reduction in the experimental evolution time for mixing. We utilize the system to implement a series of quantum applications, including measuring the centrality of scale-free networks, searching targets on Erdös-Rényi networks, distinguishing non-isomorphic graph pairs, and simulating the topological phase of higher-order topological insulators. Our work shows one feasible path for quantum photonics to address applications of practical interests in the near future.
△ Less
Submitted 28 August, 2022;
originally announced August 2022.
-
Characterisation of state-preparation uncertainty in quantum key distribution
Authors:
Anqi Huang,
Akihiro Mizutani,
Hoi-Kwong Lo,
Vadim Makarov,
Kiyoshi Tamaki
Abstract:
To achieve secure quantum key distribution, all imperfections in the source unit must be incorporated in a security proof and measured in the lab. Here we perform a proof-of-principle demonstration of the experimental techniques for characterising the source phase and intensity fluctuation in commercial quantum key distribution systems. When we apply the measured phase fluctuation intervals to the…
▽ More
To achieve secure quantum key distribution, all imperfections in the source unit must be incorporated in a security proof and measured in the lab. Here we perform a proof-of-principle demonstration of the experimental techniques for characterising the source phase and intensity fluctuation in commercial quantum key distribution systems. When we apply the measured phase fluctuation intervals to the security proof that takes into account fluctuations in the state preparation, it predicts a key distribution distance of over 100 km of fiber. The measured intensity fluctuation intervals are however so large that the proof predicts zero key, indicating a source improvement may be needed. Our characterisation methods pave the way for a future certification standard.
△ Less
Submitted 9 January, 2023; v1 submitted 24 May, 2022;
originally announced May 2022.
-
Strong pulse illumination hacks self-differencing avalanche photodiode detectors in a high-speed quantum key distribution system
Authors:
Binwu Gao,
Zhihai Wu,
Weixu Shi,
Yingwen Liu,
Dongyang Wang,
Chunlin Yu,
Anqi Huang,
Junjie Wu
Abstract:
Implementation of high-speed quantum key distribution~(QKD) has become one of the major focus in the field, which produces high key-generation rate for applications. To achieve high-speed QKD, tailored techniques are developed and employed to quickly generate and detect quantum states. However, these techniques may introduce unique loopholes to compromise the security of QKD systems. In this paper…
▽ More
Implementation of high-speed quantum key distribution~(QKD) has become one of the major focus in the field, which produces high key-generation rate for applications. To achieve high-speed QKD, tailored techniques are developed and employed to quickly generate and detect quantum states. However, these techniques may introduce unique loopholes to compromise the security of QKD systems. In this paper, we investigate the loopholes of self-differencing~(SD) avalanche photodiode~(APD) detector, typically used for high-speed detection in a QKD system, and demonstrate experimental testing of SD APD detector under strong pulse illumination attack. This attack presents blinding stability and helps an eavesdropper to learn the secret key without introducing extra QBER. Based on this testing, we propose a set of criteria for protecting SD APD detectors from the strong pulse illumination attack.
△ Less
Submitted 9 May, 2022;
originally announced May 2022.
-
Protecting fiber-optic quantum key distribution sources against light-injection attacks
Authors:
Anastasiya Ponosova,
Daria Ruzhitskaya,
Poompong Chaiwongkhot,
Vladimir Egorov,
Vadim Makarov,
Anqi Huang
Abstract:
A well-protected and characterised source in a quantum key distribution system is needed for its security. Unfortunately, the source is vulnerable to light-injection attacks, such as Trojan-horse, laser-seeding, and laser-damage attacks, in which an eavesdropper actively injects bright light to hack the source unit. The hacking laser could be a high-power one that can modify properties of componen…
▽ More
A well-protected and characterised source in a quantum key distribution system is needed for its security. Unfortunately, the source is vulnerable to light-injection attacks, such as Trojan-horse, laser-seeding, and laser-damage attacks, in which an eavesdropper actively injects bright light to hack the source unit. The hacking laser could be a high-power one that can modify properties of components via the laser-damage attack and also further help the Trojan-horse and other light-injection attacks. Here we propose a countermeasure against the light-injection attacks, consisting of an additional sacrificial component placed at the exit of the source. This component should either withstand high-power incoming light while attenuating it to a safe level that cannot modify the rest of the source, or get destroyed into a permanent high-attenuation state that breaks up the line. We demonstrate experimentally that off-the-shelf fiber-optic isolators and circulators have these desired properties, at least under attack by a continuous-wave high-power laser.
△ Less
Submitted 24 September, 2022; v1 submitted 16 January, 2022;
originally announced January 2022.
-
Architectural considerations in the design of a third-generation superconducting quantum annealing processor
Authors:
Kelly Boothby,
Colin Enderud,
Trevor Lanting,
Reza Molavi,
Nicholas Tsai,
Mark H. Volkmann,
Fabio Altomare,
Mohammad H. Amin,
Michael Babcock,
Andrew J. Berkley,
Catia Baron Aznar,
Martin Boschnak,
Holly Christiani,
Sara Ejtemaee,
Bram Evert,
Matthew Gullen,
Markus Hager,
Richard Harris,
Emile Hoskinson,
Jeremy P. Hilton,
Kais Jooya,
Ann Huang,
Mark W. Johnson,
Andrew D. King,
Eric Ladizinsky
, et al. (24 additional authors not shown)
Abstract:
Early generations of superconducting quantum annealing processors have provided a valuable platform for studying the performance of a scalable quantum computing technology. These studies have directly informed our approach to the design of the next-generation processor. Our design priorities for this generation include an increase in per-qubit connectivity, a problem Hamiltonian energy scale simil…
▽ More
Early generations of superconducting quantum annealing processors have provided a valuable platform for studying the performance of a scalable quantum computing technology. These studies have directly informed our approach to the design of the next-generation processor. Our design priorities for this generation include an increase in per-qubit connectivity, a problem Hamiltonian energy scale similar to previous generations, reduced Hamiltonian specification errors, and an increase in the processor scale that also leaves programming and readout times fixed or reduced. Here we discuss the specific innovations that resulted in a processor architecture that satisfies these design priorities.
△ Less
Submitted 4 August, 2021;
originally announced August 2021.
-
Magnetoconductance modulations due to interlayer tunneling in radial superlattices
Authors:
Yu-Jie Zhong,
Angus Huang,
Hui Liu,
Xuan-Fu Huang,
Horng-Tay Jeng,
Jhih-Shih You,
Carmine Ortix,
Ching-Hao Chang
Abstract:
Radial superlattices are nanostructured materials obtained by rolling-up thin solid films into spiral-like tubular structures. The formation of these "high-order" superlattices from two-dimensional crystals or ultrathin films is expected to result in a transition of transport characteristics from two-dimensional to one-dimensional. Here, we show that a transport hallmark of radial superlattices is…
▽ More
Radial superlattices are nanostructured materials obtained by rolling-up thin solid films into spiral-like tubular structures. The formation of these "high-order" superlattices from two-dimensional crystals or ultrathin films is expected to result in a transition of transport characteristics from two-dimensional to one-dimensional. Here, we show that a transport hallmark of radial superlattices is the appearance of magnetoconductance modulations in the presence of externally applied axial magnetic fields. This phenomenon critically relies on electronic interlayer tunneling processes that activates an unconventional Aharonov-Bohm-like effect. Using a combination of density functional theory calculations and low-energy continuum models, we determine the electronic states of a paradigmatic single-material radial superlattice -- a two-winding carbon nanoscroll -- and indeed show momentum-dependent oscillations of the magnetic states in axial configuration, which we demonstrate to be entirely due to hop** between the two windings of the spiral-shaped scroll.
△ Less
Submitted 9 December, 2021; v1 submitted 24 April, 2021;
originally announced April 2021.
-
Faking photon number on a transition-edge sensor
Authors:
Poompong Chaiwongkhot,
Jiaqiang Zhong,
Anqi Huang,
Hao Qin,
Sheng-cai Shi,
Vadim Makarov
Abstract:
We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In a simple experiment, we show that an adversary could fake a photon number result at a certain wavelength by sending a larger number of photons at a longer wavelength. In another experiment, we show that the detector can be blinded by bright continuous-wave light and then, a c…
▽ More
We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In a simple experiment, we show that an adversary could fake a photon number result at a certain wavelength by sending a larger number of photons at a longer wavelength. In another experiment, we show that the detector can be blinded by bright continuous-wave light and then, a controlled response simulating single-photon detection can be produced by applying a bright light pulse. We model an intercept-and-resend attack on a quantum key distribution system that exploits the latter vulnerability and, under certain assumptions, succeeds to steal the key.
△ Less
Submitted 19 February, 2021; v1 submitted 17 February, 2021;
originally announced February 2021.
-
The quantum kinetic equation and dynamical mass generation in 2+1 Dimensions
Authors:
An** Huang,
Shuzhe Shi,
Xianglei Zhu,
Lianyi He,
**feng Liao,
Pengfei Zhuang
Abstract:
In this work, we study the relativistic quantum kinetic equations in 2+1 dimensions from Wigner function formalism by carrying out a systematic semi-classical expansion up to $\hbar$ order. The derived equations allow us to explore interesting transport phenomena in 2+1 dimensions. Within this framework, the parity-odd transport current induced by the external electromagnetic field is self-consist…
▽ More
In this work, we study the relativistic quantum kinetic equations in 2+1 dimensions from Wigner function formalism by carrying out a systematic semi-classical expansion up to $\hbar$ order. The derived equations allow us to explore interesting transport phenomena in 2+1 dimensions. Within this framework, the parity-odd transport current induced by the external electromagnetic field is self-consistently derived. We also examine the dynamical mass generation by implementing four-fermion interaction with mean-field approximation. In this case, a new kind of transport current is found to be induced by the gradient of the mean-field condensate. Finally, we also utilize this framework to study the dynamical mass generation in an external magnetic field for the 2+1 dimensional system under equilibrium.
△ Less
Submitted 2 March, 2021; v1 submitted 6 July, 2020;
originally announced July 2020.
-
Hacking single-photon avalanche detector in quantum key distribution via pulse illumination
Authors:
Zhihao Wu,
Anqi Huang,
Huan Chen,
Shi-Hai Sun,
Jiangfang Ding,
Xiaogang Qiang,
Xiang Fu,
** Xu,
Junjie Wu
Abstract:
Quantum key distribution (QKD) has been proved to be information-theoretically secure in theory. Unfortunately, the imperfect devices in practice compromise its security. Thus, to improve the security property of practical QKD systems, a commonly used method is to patch the loopholes in the existing QKD systems. However, in this work, we show an adversary's capability of exploiting the imperfectio…
▽ More
Quantum key distribution (QKD) has been proved to be information-theoretically secure in theory. Unfortunately, the imperfect devices in practice compromise its security. Thus, to improve the security property of practical QKD systems, a commonly used method is to patch the loopholes in the existing QKD systems. However, in this work, we show an adversary's capability of exploiting the imperfection of the patch itself to bypass the patch. Specifically, we experimentally demonstrate that, in the detector under test, the patch of photocurrent monitor against the detector blinding attack can be defeated by the pulse illumination attack proposed in this paper. We also analyze the secret key rate under the pulse illumination attack, which theoretically confirmed that Eve can conduct the attack to learn the secret key. This work indicates the importance of inspecting the security loopholes in a detection unit to further understand their impacts on a QKD system. The method of pulse illumination attack can be a general testing item in the security evaluation standard of QKD.
△ Less
Submitted 3 August, 2020; v1 submitted 21 February, 2020;
originally announced February 2020.
-
General Quantum Bernoulli Factory: Framework Analysis and Experiments
Authors:
Yong Liu,
Jiaqing Jiang,
**yu Zhu,
Dongyang Wang,
Jiangfang Ding,
Xiaogang Qiang,
Anqi Huang,
** Xu,
Jialin Zhang,
Guo**g Tian,
Xiang Fu,
Mingtang Deng,
Chunqing Wu,
Xiaoming Sun,
Xuejun Yang,
Junjie Wu
Abstract:
The unremitting pursuit for quantum advantages gives rise to the discovery of a quantum-enhanced randomness processing named quantum Bernoulli factory (QBF). This quantum enhanced process can show its priority over the corresponding classical process through readily available experimental resources, thus in the near term it may be capable of accelerating the applications of classical Bernoulli fac…
▽ More
The unremitting pursuit for quantum advantages gives rise to the discovery of a quantum-enhanced randomness processing named quantum Bernoulli factory (QBF). This quantum enhanced process can show its priority over the corresponding classical process through readily available experimental resources, thus in the near term it may be capable of accelerating the applications of classical Bernoulli factories, such as the widely used sampling algorithms. In this work, we provide the framework analysis of the QBF. We thoroughly analyze the quantum state evolution in this process, discovering the field structure of the constructible quantum states. Our framework analysis shows that naturally, the previous works can be described as specific instances of this framework. Then, as a proof of principle, we experimentally demonstrate this framework via an entangled two-photon source along with a reconfigurable photonic logic, and show the advantages of the QBF over the classical model through a classically infeasible instance. These results may stimulate the discovery of advantages of the quantum randomness processing in a wider range of tasks, as well as its potential applications.
△ Less
Submitted 27 September, 2021; v1 submitted 7 February, 2020;
originally announced February 2020.
-
Variational Quantum Circuits for Quantum State Tomography
Authors:
Yong Liu,
Dongyang Wang,
Shichuan Xue,
Anqi Huang,
Xiang Fu,
Xiaogang Qiang,
** Xu,
He-Liang Huang,
Mingtang Deng,
Chu Guo,
Xuejun Yang,
Junjie Wu
Abstract:
Quantum state tomography is a key process in most quantum experiments. In this work, we employ quantum machine learning for state tomography. Given an unknown quantum state, it can be learned by maximizing the fidelity between the output of a variational quantum circuit and this state. The number of parameters of the variational quantum circuit grows linearly with the number of qubits and the circ…
▽ More
Quantum state tomography is a key process in most quantum experiments. In this work, we employ quantum machine learning for state tomography. Given an unknown quantum state, it can be learned by maximizing the fidelity between the output of a variational quantum circuit and this state. The number of parameters of the variational quantum circuit grows linearly with the number of qubits and the circuit depth, so that only polynomial measurements are required, even for highly-entangled states. After that, a subsequent classical circuit simulator is used to transform the information of the target quantum state from the variational quantum circuit into a familiar format. We demonstrate our method by performing numerical simulations for the tomography of the ground state of a one-dimensional quantum spin chain, using a variational quantum circuit simulator. Our method is suitable for near-term quantum computing platforms, and could be used for relatively large-scale quantum state tomography for experimentally relevant quantum states.
△ Less
Submitted 11 April, 2020; v1 submitted 16 December, 2019;
originally announced December 2019.
-
Optical control of single-photon negative-feedback avalanche diode detector
Authors:
Gaëtan Gras,
Nigar Sultana,
Anqi Huang,
Thomas Jennewein,
Félix Bussières,
Vadim Makarov,
Hugo Zbinden
Abstract:
We experimentally demonstrate optical control of negative-feedback avalanche diode (NFAD) detectors using bright light. We deterministically generate fake single-photon detections with a better timing precision than normal operation. This could potentially open a security loophole in quantum cryptography systems. We then show how monitoring the photocurrent through the avalanche photodiode can be…
▽ More
We experimentally demonstrate optical control of negative-feedback avalanche diode (NFAD) detectors using bright light. We deterministically generate fake single-photon detections with a better timing precision than normal operation. This could potentially open a security loophole in quantum cryptography systems. We then show how monitoring the photocurrent through the avalanche photodiode can be used to reveal the detector is being blinded.
△ Less
Submitted 10 March, 2020; v1 submitted 28 November, 2019;
originally announced November 2019.
-
An approach for security evaluation and certification of a complete quantum communication system
Authors:
Shihan Sajeed,
Poompong Chaiwongkhot,
Anqi Huang,
Hao Qin,
Vladimir Egorov,
Anton Kozubov,
Andrei Gaidash,
Vladimir Chistiakov,
Artur Vasiliev,
Artur Gleim,
Vadim Makarov
Abstract:
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises…
▽ More
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.
△ Less
Submitted 18 May, 2021; v1 submitted 17 September, 2019;
originally announced September 2019.
-
Sample caching Markov chain Monte Carlo approach to boson sampling simulation
Authors:
Yong Liu,
Min Xiong,
Chunqing Wu,
Dongyang Wang,
Yingwen Liu,
Jiangfang Ding,
Anqi Huang,
Xiang Fu,
Xiaogang Qiang,
** Xu,
Mingtang Deng,
Xuejun Yang,
Junjie Wu
Abstract:
Boson sampling is a promising candidate for quantum supremacy. It requires to sample from a complicated distribution, and is trusted to be intractable on classical computers. Among the various classical sampling methods, the Markov chain Monte Carlo method is an important approach to the simulation and validation of boson sampling. This method however suffers from the severe sample loss issue caus…
▽ More
Boson sampling is a promising candidate for quantum supremacy. It requires to sample from a complicated distribution, and is trusted to be intractable on classical computers. Among the various classical sampling methods, the Markov chain Monte Carlo method is an important approach to the simulation and validation of boson sampling. This method however suffers from the severe sample loss issue caused by the autocorrelation of the sample sequence. Addressing this, we propose the sample caching Markov chain Monte Carlo method that eliminates the correlations among the samples, and prevents the sample loss at the meantime, allowing more efficient simulation of boson sampling. Moreover, our method can be used as a general sampling framework that can benefit a wide range of sampling tasks, and is particularly suitable for applications where a large number of samples are taken.
△ Less
Submitted 24 April, 2020; v1 submitted 18 July, 2019;
originally announced July 2019.
-
Security analysis of practical continuous-variable quantum key distribution systems under laser seeding attack
Authors:
Yi Zheng,
Peng Huang,
Anqi Huang,
**ye Peng,
Guihua Zeng
Abstract:
Here, we investigate the security of the practical one-way CVQKD and CV-MDI-QKD systems under laser seeding attack. In particular, Eve can inject a suitable light into the laser diodes of the light source modules in the two kinds of practical CVQKD systems, which results in the increased intensity of the generated optical signal. The parameter estimation under the attack shows that the secret key…
▽ More
Here, we investigate the security of the practical one-way CVQKD and CV-MDI-QKD systems under laser seeding attack. In particular, Eve can inject a suitable light into the laser diodes of the light source modules in the two kinds of practical CVQKD systems, which results in the increased intensity of the generated optical signal. The parameter estimation under the attack shows that the secret key rates of these two schemes may be overestimated, which opens a security loophole for Eve to successfully perform an intercept-resend attack on these systems. To close this loophole, we propose a real-time monitoring scheme to precisely evaluate the secret key rates of these schemes. The analysis results indicate the implementation of the proposed monitoring scheme can effectively resist this potential attack.
△ Less
Submitted 1 July, 2019;
originally announced July 2019.
-
Laser damage attack against optical attenuators in quantum key distribution
Authors:
Anqi Huang,
Ruo** Li,
Vladimir Egorov,
Serguei Tchouragoulov,
Krtin Kumar,
Vadim Makarov
Abstract:
Many quantum key distribution systems employ a laser followed by an optical attenuator to prepare weak coherent states in the source. Their mean photon number must be pre-calibrated to guarantee the security of key distribution. Here we experimentally show that this calibration can be broken with a high-power laser attack. We have tested four fiber-optic attenuator types used in quantum key distri…
▽ More
Many quantum key distribution systems employ a laser followed by an optical attenuator to prepare weak coherent states in the source. Their mean photon number must be pre-calibrated to guarantee the security of key distribution. Here we experimentally show that this calibration can be broken with a high-power laser attack. We have tested four fiber-optic attenuator types used in quantum key distribution systems, and found that two of them exhibit a permanent decrease in attenuation after laser damage. This results in higher mean photon numbers in the prepared states and may allow an eavesdropper to compromise the key.
△ Less
Submitted 13 March, 2020; v1 submitted 26 May, 2019;
originally announced May 2019.
-
Controlling single-photon detector ID210 with bright light
Authors:
Vladimir Chistiakov,
Anqi Huang,
Vladimir Egorov,
Vadim Makarov
Abstract:
We experimentally demonstrate that a single-photon detector ID210 commercially available from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination. In quantum key distribution, this vulnerability can be exploited by an eavesdropper to perform a faked-state attack giving her full knowledge of the key without being noticed. We consider the attack on standard BB84…
▽ More
We experimentally demonstrate that a single-photon detector ID210 commercially available from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination. In quantum key distribution, this vulnerability can be exploited by an eavesdropper to perform a faked-state attack giving her full knowledge of the key without being noticed. We consider the attack on standard BB84 protocol and a subcarrier-wave scheme, and outline a possible countermeasure.
△ Less
Submitted 22 May, 2019;
originally announced May 2019.
-
General-purpose quantum circuit simulator with Projected Entangled-Pair States and the quantum supremacy frontier
Authors:
Chu Guo,
Yong Liu,
Min Xiong,
Shichuan Xue,
Xiang Fu,
Anqi Huang,
Xiaogang Qiang,
** Xu,
Junhua Liu,
Shenggen Zheng,
He-Liang Huang,
Mingtang Deng,
Dario Poletti,
Wan-Su Bao,
Junjie Wu
Abstract:
Recent advances on quantum computing hardware have pushed quantum computing to the verge of quantum supremacy. Random quantum circuits are outstanding candidates to demonstrate quantum supremacy, which could be implemented on a quantum device that supports nearest-neighbour gate operations on a two-dimensional configuration. Here we show that using the Projected Entangled-Pair States algorithm, a…
▽ More
Recent advances on quantum computing hardware have pushed quantum computing to the verge of quantum supremacy. Random quantum circuits are outstanding candidates to demonstrate quantum supremacy, which could be implemented on a quantum device that supports nearest-neighbour gate operations on a two-dimensional configuration. Here we show that using the Projected Entangled-Pair States algorithm, a tool to study two-dimensional strongly interacting many-body quantum systems, we can realize an effective general-purpose simulator of quantum algorithms. This technique allows to quantify precisely the memory usage and the time requirements of random quantum circuits, thus showing the frontier of quantum supremacy. With this approach we can compute the full wave-function of the system, from which single amplitudes can be sampled with unit fidelity. Applying this general quantum circuit simulator we measured amplitudes for a $7\times 7$ lattice of qubits with depth $1+40+1$ and double-precision numbers in 31 minutes using less than $93$ TB memory on the Tianhe-2 supercomputer.
△ Less
Submitted 4 November, 2019; v1 submitted 20 May, 2019;
originally announced May 2019.
-
Practical security of continuous-variable quantum key distribution with reduced optical attenuation
Authors:
Yi Zheng,
Peng Huang,
Anqi Huang,
**ye Peng,
Guihua Zeng
Abstract:
In a practical CVQKD system, the optical attenuator can adjust the Gaussian-modulated coherent states and the local oscillator signal to an optimal value for guaranteeing the security of the system and optimizing the performance of the system. However, the performance of the optical attenuator may deteriorate due to the intentional and unintentional damage of the device. In this paper, we investig…
▽ More
In a practical CVQKD system, the optical attenuator can adjust the Gaussian-modulated coherent states and the local oscillator signal to an optimal value for guaranteeing the security of the system and optimizing the performance of the system. However, the performance of the optical attenuator may deteriorate due to the intentional and unintentional damage of the device. In this paper, we investigate the practical security of a CVQKD system with reduced optical attenuation. We find that the secret key rate of the system may be overestimated based on the investigation of parameter estimation under the effects of reduced optical attenuation. This opens a security loophole for Eve to successfully perform an intercept-resend attack in a practical CVQKD system. To close this loophole, we add an optical fuse at Alice's output port and design a scheme to monitor the level of optical attenuation in real time, which can make the secret key rate of the system evaluated precisely. The analysis shows that these countermeasures can effectively resist this potential attack.
△ Less
Submitted 16 April, 2019;
originally announced April 2019.
-
Laser seeding attack in quantum key distribution
Authors:
Anqi Huang,
Álvaro Navarrete,
Shi-Hai Sun,
Poompong Chaiwongkhot,
Marcos Curty,
Vadim Makarov
Abstract:
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure distribution of secret keys over an insecure channel. Unfortunately, imperfect implementations of QKD compromise its information-theoretical security. Measurement-device-independent quantum key distribution (MDI-QKD) is a promising approach to remove all side channels from the measurement unit, which is regarded…
▽ More
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure distribution of secret keys over an insecure channel. Unfortunately, imperfect implementations of QKD compromise its information-theoretical security. Measurement-device-independent quantum key distribution (MDI-QKD) is a promising approach to remove all side channels from the measurement unit, which is regarded as the "Achilles' heel" of QKD. An essential assumption in MDI-QKD is however that the sources are trusted. Here we experimentally demonstrate that a practical source based on a semiconductor laser diode is vulnerable to a laser seeding attack, in which light injected from the communication line into the laser results in an increase of the intensities of the prepared states. The unnoticed increase of intensity may compromise the security of QKD, as we show theoretically for the prepare-and-measure decoy-state BB84 and MDI-QKD protocols. Our theoretical security analysis is general and can be applied to any vulnerability that increases the intensity of the emitted pulses. Moreover, a laser seeding attack might be launched as well against decoy-state based quantum cryptographic protocols beyond QKD.
△ Less
Submitted 27 November, 2019; v1 submitted 26 February, 2019;
originally announced February 2019.
-
Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence
Authors:
Poompong Chaiwongkhot,
Katanya B. Kuntz,
Yanbao Zhang,
Anqi Huang,
Jean-Philippe Bourgoin,
Shihan Sajeed,
Norbert Lütkenhaus,
Thomas Jennewein,
Vadim Makarov
Abstract:
The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an attack could be ineffective in the presence of atmospheric turbulence due to beam wander and spatial mode aberrations induced by the air's varying index o…
▽ More
The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an attack could be ineffective in the presence of atmospheric turbulence due to beam wander and spatial mode aberrations induced by the air's varying index of refraction. We experimentally investigate the impact turbulence has on Eve's attack on a free-space polarization-encoding QKD receiver by emulating atmospheric turbulence with a spatial light modulator. Our results identify how well Eve would need to compensate for turbulence to perform a successful attack by either reducing her distance to the receiver, or using beam wavefront correction via adaptive optics. Furthermore, we use an entanglement-breaking scheme to find a theoretical limit on the turbulence strength that hinders Eve's attack.
△ Less
Submitted 20 June, 2019; v1 submitted 4 February, 2019;
originally announced February 2019.
-
Comment on "Inherent security of phase coding quantum key distribution systems against detector blinding attacks" [Laser Phys. Lett. 15, 095203 (2018)]
Authors:
Aleksey Fedorov,
Ilja Gerhardt,
Anqi Huang,
Jonathan Jogenfors,
Yury Kurochkin,
Antía Lamas-Linares,
Jan-Åke Larsson,
Gerd Leuchs,
Lars Lydersen,
Vadim Makarov,
Johannes Skaar
Abstract:
This is a brief comment on the Letter by Balygin and his coworkers [Laser Phys. Lett. 15, 095203 (2018)]. We point out an error that invalidates the Letter's conclusions.
This is a brief comment on the Letter by Balygin and his coworkers [Laser Phys. Lett. 15, 095203 (2018)]. We point out an error that invalidates the Letter's conclusions.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Implementation vulnerabilities in general quantum cryptography
Authors:
Anqi Huang,
Stefanie Barz,
Erika Andersson,
Vadim Makarov
Abstract:
Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution (QKD). Here we apply experience from implementation sec…
▽ More
Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution (QKD). Here we apply experience from implementation security of QKD to several other quantum cryptographic primitives. We survey quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing. We propose how the eavesdropper could in principle exploit the loopholes to violate assumptions in these protocols, breaking their security properties. Applicable countermeasures are also discussed. It is important to consider potential implementation security issues early in protocol design, to shorten the path to future applications.
△ Less
Submitted 24 October, 2018; v1 submitted 17 May, 2018;
originally announced May 2018.
-
Carrier driven antiferromagnetism and exchange-bias in SrRuO3/CaRuO3 heterostructures
Authors:
Parul Pandey,
Ching-Hao Chang,
Angus Huang,
Rakesh Rana,
Changan Wang,
Chi Xu,
Horng-Tay Jeng,
Manfred Helm,
R. Ganesh,
Shengqiang Zhou
Abstract:
Oxide heterostructures exhibit a rich variety of magnetic and transport properties which arise due to contact at an interface. This can lead to surprising effects that are very different from the bulk properties of the materials involved. We report the magnetic properties of bilayers of SrRuO3, a well known ferromagnet, and CaRuO3, which is nominally a paramagnet. We find intriguing features that…
▽ More
Oxide heterostructures exhibit a rich variety of magnetic and transport properties which arise due to contact at an interface. This can lead to surprising effects that are very different from the bulk properties of the materials involved. We report the magnetic properties of bilayers of SrRuO3, a well known ferromagnet, and CaRuO3, which is nominally a paramagnet. We find intriguing features that are consistent with CaRuO3 develo** dual magnetic character, with both a net moment as well as antiferromagnetic order. We argue the ordered SrRuO3 layer induces an undulating polarization profile in the conduction electrons of CaRuO3, by a mechanism akin to Friedel oscillations. At low temperatures, this oscillating polarization is inherited by rigid local moments within CaRuO3, leading to a robust exchange bias. We present ab initio simulations in support of this picture. Our results demonstrate a new ordering mechanism and throw light on the magnetic character of CaRuO3 .
△ Less
Submitted 16 February, 2018;
originally announced February 2018.
-
Decoy state quantum key distribution with imperfect source
Authors:
Anqi Huang,
Shi-Hai Sun,
Zhihong Liu,
Vadim Makarov
Abstract:
The decoy state protocol has been considered to be one of the most important methods to protect the security of quantum key distribution (QKD) with a weak coherent source. Here we test two experimental approaches to generating the decoy states with different intensities: modulation of the pump current of a semiconductor laser diode, and external modulation by an optical intensity modulator. The fo…
▽ More
The decoy state protocol has been considered to be one of the most important methods to protect the security of quantum key distribution (QKD) with a weak coherent source. Here we test two experimental approaches to generating the decoy states with different intensities: modulation of the pump current of a semiconductor laser diode, and external modulation by an optical intensity modulator. The former approach shows a side-channel in the time domain that allows an attacker to distinguish s signal state from a decoy state, breaking a basic assumption in the protocol. We model a photon-number-splitting attack based on our experimental data, and show that it compromises the system's security. Then, based on the work of K. Tamaki et al. [New J. Phys. 18, 065008 (2016)], we obtain two analytical formulas to estimate the yield and the error rate of single-photon pulses when the signal and decoy states are distinguishable. The distinguishability reduces the secure key rate below that of a perfect decoy-state protocol. To mitigate this reduction, we propose to calibrate the transmittance of the receiver (Bob's) unit. We apply our method to three QKD systems and estimate their secure key rates.
△ Less
Submitted 17 September, 2018; v1 submitted 1 November, 2017;
originally announced November 2017.
-
Entropic uncertainty relations for Markovian and non-Markovian processes under a structured bosonic reservoir
Authors:
Dong Wang,
Ai-Jun Huang,
Ross D. Hoehn,
Fei Ming,
Wen-Yang Sun,
Jia-Dong Shi,
Liu Ye,
Sabre Kais
Abstract:
The uncertainty relation is a fundamental limit in quantum mechanics and is of great importance to quantum information processing as it relates to quantum precision measurement. Due to interactions with the surrounding environment, a quantum system will unavoidably suffer from decoherence. Here, we investigate the dynamic behaviors of the entropic uncertainty relation of an atom-cavity interacting…
▽ More
The uncertainty relation is a fundamental limit in quantum mechanics and is of great importance to quantum information processing as it relates to quantum precision measurement. Due to interactions with the surrounding environment, a quantum system will unavoidably suffer from decoherence. Here, we investigate the dynamic behaviors of the entropic uncertainty relation of an atom-cavity interacting system under a bosonic reservoir during the crossover between Markovian and non-Markovian regimes. Specifically, we explore the dynamic behavior of the entropic uncertainty relation for a pair of incompatible observables under the reservoir-induced atomic decay effect both with and without quantum memory. We find that the uncertainty dramatically depends on both the atom-cavity and the cavity-reservoir interactions, as well as the correlation time, $τ$, of the structured reservoir. Furthermore, we verify that the uncertainty is anti-correlated with the purity of the state of the observed qubit-system. We also propose a remarkably simple and efficient way to reduce the uncertainty by utilizing quantum weak measurement reversal. Therefore our work offers a new insight into the uncertainty dynamics for multi-component measurements within an open system, and is thus important for quantum precision measurements.
△ Less
Submitted 25 March, 2017;
originally announced March 2017.
-
Insecurity of detector-device-independent quantum key distribution
Authors:
Shihan Sajeed,
Anqi Huang,
Shihai Sun,
Feihu Xu,
Vadim Makarov,
Marcos Curty
Abstract:
Detector-device-independent quantum key distribution (ddiQKD) held the promise of being robust to detector side-channels, a major security loophole in QKD implementations. In contrast to what has been claimed, however, we demonstrate that the security of ddiQKD is not based on post-selected entanglement, and we introduce various eavesdrop** strategies that show that ddiQKD is in fact insecure ag…
▽ More
Detector-device-independent quantum key distribution (ddiQKD) held the promise of being robust to detector side-channels, a major security loophole in QKD implementations. In contrast to what has been claimed, however, we demonstrate that the security of ddiQKD is not based on post-selected entanglement, and we introduce various eavesdrop** strategies that show that ddiQKD is in fact insecure against detector side-channel attacks as well as against other attacks that exploit device's imperfections of the receiver. Our attacks are valid even when the QKD apparatuses are built by the legitimate users of the system themselves, and thus free of malicious modifications, which is a key assumption in ddiQKD.
△ Less
Submitted 20 July, 2016;
originally announced July 2016.
-
Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumption
Authors:
Anqi Huang,
Shihan Sajeed,
Poompong Chaiwongkhot,
Mathilde Soucarros,
Matthieu Legre,
Vadim Makarov
Abstract:
In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution (QKD). Implementable countermeasures are proposed to patch the discovered loopholes. However, certain countermeasures are not as robust as would be expected. In this paper, we present a concrete example of ID Quantique's random-detector-efficiency counte…
▽ More
In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution (QKD). Implementable countermeasures are proposed to patch the discovered loopholes. However, certain countermeasures are not as robust as would be expected. In this paper, we present a concrete example of ID Quantique's random-detector-efficiency countermeasure against detector blinding attacks. As a third-party tester, we have found that the first industrial implementation of this countermeasure is effective against the original blinding attack, but not immune to a modified blinding attack. Then, we implement and test a later full version of this countermeasure containing a security proof [C. C. W. Lim et al., IEEE Journal of Selected Topics in Quantum Electronics, 21, 6601305 (2015)]. We find that it is still vulnerable against the modified blinding attack, because an assumption about hardware characteristics on which the proof relies fails in practice.
△ Less
Submitted 17 October, 2016; v1 submitted 5 January, 2016;
originally announced January 2016.