-
Advantage of multi-partite entanglement for quantum cryptography over long and short ranged networks
Authors:
Janka Memmen,
Jens Eisert,
Nathan Walk
Abstract:
The increasing sophistication of available quantum networks has seen a corresponding growth in the pursuit of multi-partite cryptographic protocols. Whilst the use of multi-partite entanglement is known to offer an advantage in certain abstractly motivated contexts, the quest to find practical advantage scenarios is ongoing and substantial difficulties in generalising some bi-partite security proo…
▽ More
The increasing sophistication of available quantum networks has seen a corresponding growth in the pursuit of multi-partite cryptographic protocols. Whilst the use of multi-partite entanglement is known to offer an advantage in certain abstractly motivated contexts, the quest to find practical advantage scenarios is ongoing and substantial difficulties in generalising some bi-partite security proofs still remain. We present rigorous results that address both these challenges at the same time. First, we prove the security of a variant of the GHZ state based secret sharing protocol against general attacks, including participant attacks which break the security of the original GHZ state scheme. We then identify parameters for a performance advantage over realistic bottleneck networks. We show that whilst channel losses limit the advantage region to short distances over direct transmission networks, the addition of quantum repeaters unlocks the performance advantage of multi-partite entanglement over point-to-point approaches for long distance quantum cryptography.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
Simplified intensity- and phase-modulated transmitter for modulator-free decoy-state quantum key distribution
Authors:
Y. S. Lo,
R. I. Woodward,
N. Walk,
M. Lucamarini,
I. De Marco,
T. K. Paraïso,
M. Pittaluga,
T. Roger,
M. Sanzaro,
Z. L. Yuan,
A. J. Shields
Abstract:
Quantum key distribution (QKD) allows secret key exchange between two users with unconditional security. For QKD to be widely deployed, low cost and compactness are crucial requirements alongside high performance. Currently, the majority of QKD systems demonstrated rely on bulk intensity and phase modulators to generate optical pulses with precisely defined amplitude and relative phase difference…
▽ More
Quantum key distribution (QKD) allows secret key exchange between two users with unconditional security. For QKD to be widely deployed, low cost and compactness are crucial requirements alongside high performance. Currently, the majority of QKD systems demonstrated rely on bulk intensity and phase modulators to generate optical pulses with precisely defined amplitude and relative phase difference i.e., to encode information as signal states and decoy states. However, these modulators are expensive and bulky, thereby limiting the compactness of QKD systems. Here, we present and experimentally demonstrate a novel optical transmitter design to overcome this disadvantage by generating intensity- and phase-tunable pulses at GHz clock speeds. Our design removes the need for bulk modulators by employing directly modulated lasers in combination with optical injection locking and coherent interference. This scheme is, therefore, well suited to miniaturization and photonic integration, and we implement a proof-of-principle QKD demonstration to highlight potential applications.
△ Less
Submitted 2 April, 2023;
originally announced April 2023.
-
ReQuSim: Faithfully simulating near-term quantum repeaters
Authors:
Julius Wallnöfer,
Frederik Hahn,
Fabian Wiesner,
Nathan Walk,
Jens Eisert
Abstract:
Quantum repeaters have long been established to be essential for distributing entanglement over long distances. Consequently, their experimental realization constitutes a core challenge of quantum communication. However, there are numerous open questions about implementation details for realistic, near-term experimental setups. In order to assess the performance of realistic repeater protocols, we…
▽ More
Quantum repeaters have long been established to be essential for distributing entanglement over long distances. Consequently, their experimental realization constitutes a core challenge of quantum communication. However, there are numerous open questions about implementation details for realistic, near-term experimental setups. In order to assess the performance of realistic repeater protocols, we here present ReQuSim, a comprehensive Monte-Carlo based simulation platform for quantum repeaters that faithfully includes loss and models a wide range of imperfections such as memories with time-dependent noise. Our platform allows us to perform an analysis for quantum repeater setups and strategies that go far beyond known analytic results: This refers to being able to both capture more realistic noise models and analyse more complex repeater strategies. We present a number of findings centered around the combination of strategies for improving performance, such as entanglement purification and the use of multiple repeater stations, and demonstrate that there exist complex relationships between them. We stress that numerical tools such as ours are essential to model complex quantum communication protocols aimed at contributing to the quantum internet.
△ Less
Submitted 3 April, 2024; v1 submitted 7 December, 2022;
originally announced December 2022.
-
Anonymous conference key agreement in linear quantum networks
Authors:
Jarn de Jong,
Frederik Hahn,
Jens Eisert,
Nathan Walk,
Anna Pappa
Abstract:
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA), an extension of key distribution to multiple parties, has received much attention recently. Interestingly, CKA can also be performed in a way that protects the identities of the participating parties, therefore providing anonymity. In…
▽ More
Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA), an extension of key distribution to multiple parties, has received much attention recently. Interestingly, CKA can also be performed in a way that protects the identities of the participating parties, therefore providing anonymity. In this work, we propose an anonymous CKA protocol for three parties that is implemented in a highly practical network setting. Specifically, a line of quantum repeater nodes is used to build a linear cluster state among all nodes, which is then used to anonymously establish a secret key between any three of them. The nodes need only share maximally entangled pairs with their neighbours, therefore avoiding the necessity of a central server sharing entangled states. This repeater setup makes our protocol an excellent candidate for implementation in future quantum networks. We explicitly prove that our protocol protects the identities of the participants from one another and perform an analysis of the key rate in the finite regime, contributing to the quest of identifying feasible quantum communication tasks for network architectures beyond point-to-point.
△ Less
Submitted 5 September, 2023; v1 submitted 18 May, 2022;
originally announced May 2022.
-
Quantum simulation of thermodynamics in an integrated quantum photonic processor
Authors:
F. H. B. Somhorst,
R. van der Meer,
M. Correa Anguita,
R. Schadow,
H. J. Snijders,
M. de Goede,
B. Kassenberg,
P. Venderbosch,
C. Taballione,
J. P. Ep**,
H. H. van den Vlekkert,
J. Timmerhuis,
J. F. F. Bulmer,
J. Lugani,
I. A. Walmsley,
P. W. H. Pinkse,
J. Eisert,
N. Walk,
J. J. Renema
Abstract:
One of the core questions of quantum physics is how to reconcile the unitary evolution of quantum states, which is information-preserving and time-reversible, with evolution following the second law of thermodynamics, which, in general, is neither. The resolution to this paradox is to recognize that global unitary evolution of a multi-partite quantum state causes the state of local subsystems to e…
▽ More
One of the core questions of quantum physics is how to reconcile the unitary evolution of quantum states, which is information-preserving and time-reversible, with evolution following the second law of thermodynamics, which, in general, is neither. The resolution to this paradox is to recognize that global unitary evolution of a multi-partite quantum state causes the state of local subsystems to evolve towards maximum-entropy states. In this work, we experimentally demonstrate this effect in linear quantum optics by simultaneously showing the convergence of local quantum states to a generalized Gibbs ensemble constituting a maximum-entropy state under precisely controlled conditions, while introducing an efficient certification method to demonstrate that the state retains global purity. Our quantum states are manipulated by a programmable integrated quantum photonic processor, which simulates arbitrary non-interacting Hamiltonians, demonstrating the universality of this phenomenon. Our results show the potential of photonic devices for quantum simulations involving non-Gaussian states.
△ Less
Submitted 31 August, 2023; v1 submitted 31 December, 2021;
originally announced January 2022.
-
Experimental demonstration of an efficient, semi-device-independent photonic indistinguishability witness
Authors:
Reinier van der Meer,
Peter Hooijschuur,
Franciscus H. B. Somhorst,
Pim Venderbosch,
Michiel de Goede,
Ben Kassenberg,
Henk Snijders,
Caterina Taballione,
Jorn Ep**,
Hans van den Vlekkert,
Nathan Walk,
Pepijn W. H. Pinkse,
Jelmer J. Renema
Abstract:
Efficient and reliable measurements of photonic indistinguishability are crucial to solidify claims of a quantum advantage in photonics. Existing indistinguishability witnesses may be vulnerable to implementation loopholes, showing the need for a measurement which depends on as few assumptions as possible. Here, we introduce a semi-device-independent witness of photonic indistinguishability and me…
▽ More
Efficient and reliable measurements of photonic indistinguishability are crucial to solidify claims of a quantum advantage in photonics. Existing indistinguishability witnesses may be vulnerable to implementation loopholes, showing the need for a measurement which depends on as few assumptions as possible. Here, we introduce a semi-device-independent witness of photonic indistinguishability and measure it on an integrated photonic processor, certifying three-photon indistinguishability in a way that is insensitive to implementation errors in our processor.
△ Less
Submitted 30 November, 2021;
originally announced December 2021.
-
Simulating quantum repeater strategies for multiple satellites
Authors:
Julius Wallnöfer,
Frederik Hahn,
Mustafa Gündoğan,
Jasminder S. Sidhu,
Fabian Wiesner,
Nathan Walk,
Jens Eisert,
Janik Wolters
Abstract:
A global quantum repeater network involving satellite-based links is likely to have advantages over fiber-based networks in terms of long-distance communication, since the photon losses in free space scale only polynomially with the distance -- compared to the exponential losses in optical fibers. To simulate the performance of such networks, we have introduced a scheme of large-scale event-based…
▽ More
A global quantum repeater network involving satellite-based links is likely to have advantages over fiber-based networks in terms of long-distance communication, since the photon losses in free space scale only polynomially with the distance -- compared to the exponential losses in optical fibers. To simulate the performance of such networks, we have introduced a scheme of large-scale event-based Monte Carlo simulation of quantum repeaters with multiple memories that can faithfully represent loss and imperfections in these memories. In this work, we identify the quantum key distribution rates achievable in various satellite and ground station geometries for feasible experimental parameters. The power and flexibility of the simulation toolbox allows us to explore various strategies and parameters, some of which only arise in these more complex, multi-satellite repeater scenarios. As a primary result, we conclude that key rates in the kHz range are reasonably attainable for intercontinental quantum communication with three satellites, only one of which carries a quantum memory.
△ Less
Submitted 8 August, 2022; v1 submitted 29 October, 2021;
originally announced October 2021.
-
Rate limits in quantum networks with lossy repeaters
Authors:
Riccardo Laurenza,
Nathan Walk,
Jens Eisert,
Stefano Pirandola
Abstract:
The derivation of ultimate limits to communication over certain quantum repeater networks have provided extremely valuable benchmarks for assessing near-term quantum communication protocols. However, these bounds are usually derived in the limit of ideal devices and leave questions about the performance of practical implementations unanswered. To address this challenge, we quantify how the presenc…
▽ More
The derivation of ultimate limits to communication over certain quantum repeater networks have provided extremely valuable benchmarks for assessing near-term quantum communication protocols. However, these bounds are usually derived in the limit of ideal devices and leave questions about the performance of practical implementations unanswered. To address this challenge, we quantify how the presence of loss in repeater stations affect the maximum attainable rates for quantum communication over linear repeater chains and more complex quantum networks. Extending the framework of node splitting, we model the loss introduced at the repeater stations and then prove the corresponding limits. In the linear chain scenario we show that, by increasing the number of repeater stations, the maximum rate cannot overcome a quantity which solely depends on the loss of a single station. We introduce a way of adapting the standard machinery for obtaining bounds to this realistic scenario. The difference is that whilst ultimate limits for any strategy can be derived given a fixed channel, when the repeaters introduce additional decoherence, then the effective overall channel is itself a function of the chosen repeater strategy (e.g., one-way versus two-way classical communication). Classes of repeater strategies can be analysed using additional modelling and the subsequent bounds can be interpreted as the optimal rate within that class.
△ Less
Submitted 6 March, 2022; v1 submitted 19 October, 2021;
originally announced October 2021.
-
Sharing classical secrets with continuous-variable entanglement: Composable security and network coding advantage
Authors:
Nathan Walk,
Jens Eisert
Abstract:
Secret sharing is a multi-party cryptographic primitive that can be applied to a network of partially distrustful parties for encrypting data that is both sensitive (it must remain secure) and important (it must not be lost or destroyed). When sharing classical secrets (as opposed to quantum states), one can distinguish between protocols that leverage bi-partite quantum key distribution (QKD) and…
▽ More
Secret sharing is a multi-party cryptographic primitive that can be applied to a network of partially distrustful parties for encrypting data that is both sensitive (it must remain secure) and important (it must not be lost or destroyed). When sharing classical secrets (as opposed to quantum states), one can distinguish between protocols that leverage bi-partite quantum key distribution (QKD) and those that exploit multi-partite entanglement. The latter class are known to be vulnerable to so-called participant attacks and, while progress has been made recently, there is currently no analysis that quantifies their performance in the composable, finite-size regime which has become the gold standard for QKD security. Given this - and the fact that distributing multi-partite entanglement is typically challenging - one might well ask: Is there any virtue in pursuing multi-partite entanglement based schemes? Here, we answer this question in the affirmative for a class of secret sharing protocols based on continuous variable graph states. We establish security in a composable framework and identify a network topology, specifically a bottleneck network of lossy channels, and parameter regimes within the reach of present day experiments for which a multi-partite scheme outperforms the corresponding QKD based method in the asymptotic and finite-size setting. Finally, we establish experimental parameters where the multi-partite schemes outperform any possible QKD based protocol. This one of the first concrete compelling examples of multi-partite entangled resources achieving a genuine advantage over point-to-point protocols for quantum communication and represents a rigorous, operational benchmark to assess the usefulness of such resources.
△ Less
Submitted 25 February, 2022; v1 submitted 21 April, 2021;
originally announced April 2021.
-
Composable finite-size effects in free-space CV-QKD systems
Authors:
Nedasadat Hosseinidehaj,
Nathan Walk,
Timothy C. Ralph
Abstract:
Free-space channels provide the possibility of establishing continuous-variable quantum key distribution (CV-QKD) in global communication networks. However, the fluctuating nature of transmissivity in these channels introduces an extra noise which reduces the achievable secret key rate. We consider two classical post-processing strategies, post-selection of high-transmissivity data and data cluste…
▽ More
Free-space channels provide the possibility of establishing continuous-variable quantum key distribution (CV-QKD) in global communication networks. However, the fluctuating nature of transmissivity in these channels introduces an extra noise which reduces the achievable secret key rate. We consider two classical post-processing strategies, post-selection of high-transmissivity data and data clusterization, to reduce the fluctuation-induced noise of the channel. We undertake the first investigation of such strategies utilising a composable security proof in a realistic finite-size regime against both collective and individual attacks. We also present an efficient parameter estimation approach to estimate the effective Gaussian parameters over the post-selected data or the clustered data. Although the composable finite-size effects become more significant with the post-selection and clusterization both reducing the size of the data, our results show that these strategies are still able to enhance the finite-size key rate against both individual and collective attacks with a remarkable improvement against collective attacks--even moving the protocol from an insecure regime to a secure regime under certain conditions.
△ Less
Submitted 9 February, 2020;
originally announced February 2020.
-
Finite-size effects in continuous-variable QKD with Gaussian post-selection
Authors:
Nedasadat Hosseinidehaj,
Andrew M. Lance,
Thomas Symul,
Nathan Walk,
Timothy C. Ralph
Abstract:
In a continuous-variable quantum key distribution (CV-QKD) protocol, which is based on heterodyne detection at the receiver, the application of a noiseless linear amplifier (NLA) on the received signal before the detection can be emulated by the post-selection of the detection outcome. Such a post-selection, which is also called a measurement-based NLA, requires a cut-off to produce a normalisable…
▽ More
In a continuous-variable quantum key distribution (CV-QKD) protocol, which is based on heterodyne detection at the receiver, the application of a noiseless linear amplifier (NLA) on the received signal before the detection can be emulated by the post-selection of the detection outcome. Such a post-selection, which is also called a measurement-based NLA, requires a cut-off to produce a normalisable filter function. Increasing the cut-off with respect to the received signals results in a more faithful emulation of the NLA and nearly Gaussian output statistics at the cost of discarding more data. While recent works have shown the benefits of post-selection via an asymptotic security analysis, we undertake the first investigation of such a post-selection utilising a composable security proof in the realistic finite-size regime, where this trade-off is extremely relevant. We show that this form of post-selection can improve the secure range of a CV-QKD over lossy thermal channels if the finite block size is sufficiently large and that the optimal value for the filter cut-off is typically in the non-Gaussian regime. The relatively modest improvement in the finite-size regime as compared to the asymptotic case highlights the need for new tools to prove the security of non-Gaussian cryptographic protocols. These results also represent a quantitative assessment of a measurement-based NLA with an entangled-state input in both the Gaussian and non-Gaussian regime.
△ Less
Submitted 19 December, 2019;
originally announced December 2019.
-
Stationary optomechanical entanglement between a mechanical oscillator and its measurement apparatus
Authors:
C. Gut,
K. Winkler,
J. Hoelscher-Obermaier,
S. G. Hofer,
R. Moghadas Nia,
N. Walk,
A. Steffens,
J. Eisert,
W. Wieczorek,
J. A. Slater,
M. Aspelmeyer,
K. Hammerer
Abstract:
We provide an argument to infer stationary entanglement between light and a mechanical oscillator based on continuous measurement of light only. We propose an experimentally realizable scheme involving an optomechanical cavity driven by a resonant, continuous-wave field operating in the non-sideband-resolved regime. This corresponds to the conventional configuration of an optomechanical position o…
▽ More
We provide an argument to infer stationary entanglement between light and a mechanical oscillator based on continuous measurement of light only. We propose an experimentally realizable scheme involving an optomechanical cavity driven by a resonant, continuous-wave field operating in the non-sideband-resolved regime. This corresponds to the conventional configuration of an optomechanical position or force sensor. We show analytically that entanglement between the mechanical oscillator and the output field of the optomechanical cavity can be inferred from the measurement of squeezing in (generalized) Einstein-Podolski-Rosen quadratures of suitable temporal modes of the stationary light field. Squeezing can reach levels of up to 50% of noise reduction below shot noise in the limit of large quantum cooperativity. Remarkably, entanglement persists even in the opposite limit of small cooperativity. Viewing the optomechanical device as a position sensor, entanglement between mechanics and light is an instance of object-apparatus entanglement predicted by quantum measurement theory.
△ Less
Submitted 13 August, 2020; v1 submitted 3 December, 2019;
originally announced December 2019.
-
Quantum certification and benchmarking
Authors:
J. Eisert,
D. Hangleiter,
N. Walk,
I. Roth,
D. Markham,
R. Parekh,
U. Chabaud,
E. Kashefi
Abstract:
Concomitant with the rapid development of quantum technologies, challenging demands arise concerning the certification and characterization of devices. The promises of the field can only be achieved if stringent levels of precision of components can be reached and their functioning guaranteed. This review provides a brief overview of the known characterization methods of certification, benchmarkin…
▽ More
Concomitant with the rapid development of quantum technologies, challenging demands arise concerning the certification and characterization of devices. The promises of the field can only be achieved if stringent levels of precision of components can be reached and their functioning guaranteed. This review provides a brief overview of the known characterization methods of certification, benchmarking, and tomographic recovery of quantum states and processes, as well as their applications in quantum computing, simulation, and communication.
△ Less
Submitted 29 February, 2020; v1 submitted 14 October, 2019;
originally announced October 2019.
-
Harnessing symmetry-protected topological order for quantum memories
Authors:
Marcel Goihl,
Nathan Walk,
Jens Eisert,
Nicolas Tarantino
Abstract:
Spin chains with symmetry-protected edge modes are promising candidates to realize intrinsically robust physical qubits that can be used for the storage and processing of quantum information. In any experimental realization of such physical systems, weak perturbations in the form of induced interactions and disorder are unavoidable and can be detrimental to the stored information. At the same time…
▽ More
Spin chains with symmetry-protected edge modes are promising candidates to realize intrinsically robust physical qubits that can be used for the storage and processing of quantum information. In any experimental realization of such physical systems, weak perturbations in the form of induced interactions and disorder are unavoidable and can be detrimental to the stored information. At the same time, the latter may in fact be beneficial; for instance by deliberately inducing disorder which causes the system to localize. In this work, we explore the potential of using an $XZX$ cluster Hamiltonian to encode quantum information into the local edge modes and comprehensively investigate the influence of both many-body interactions and disorder on their stability over time, adding substance to the narrative that many-body localization may stabilize quantum information. We recover the edge state at each time step, allowing us to reconstruct the quantum channel that captures the locally constrained out of equilibrium time evolution. With this representation in hand, we analyze how well classical and quantum information are preserved over time as a function of disorder and interactions. We find that the performance of the edge qubits varies dramatically between disorder realizations. Whereas some show a smooth decoherence over time, a sizeable fraction are rapidly rendered unusable as memories. We also find that the stability of the classical information -- a precursor for the usefulness of the chain as a quantum memory -- depends strongly on the direction in which the bit is encoded. When employing the chain as a genuine quantum memory, encoded qubits are most faithfully recovered for low interaction and high disorder.
△ Less
Submitted 30 August, 2019; v1 submitted 28 August, 2019;
originally announced August 2019.
-
Teleportation-based collective attacks in Gaussian quantum key distribution
Authors:
Spyros Tserkis,
Nedasadat Hosseinidehaj,
Nathan Walk,
Timothy C. Ralph
Abstract:
In Gaussian quantum key distribution eavesdrop** attacks are conventionally modeled through the universal entangling cloner scheme, which is based on the premise that the whole environment is under control of the adversary, i.e., the eavesdropper purifies the system. This assumption implies that the eavesdropper has either access to an identity (noiseless) channel or infinite amount of entanglem…
▽ More
In Gaussian quantum key distribution eavesdrop** attacks are conventionally modeled through the universal entangling cloner scheme, which is based on the premise that the whole environment is under control of the adversary, i.e., the eavesdropper purifies the system. This assumption implies that the eavesdropper has either access to an identity (noiseless) channel or infinite amount of entanglement in order to simulate such an identity channel. In this work, we challenge the necessity of this assumption, and we propose a teleportation-based eavesdrop** attack, where the eavesdropper is not assumed to have access to the shared channel, that represents the unavoidable noise due to the environment. Under collective measurements, this attack reaches optimality in the limit of infinite amount of entanglement, while for finite entanglement resources it outperforms the corresponding optimal individual attack. We also calculate the minimum amount of distributed entanglement that is necessary for this eavesdrop** scheme, since we consider it as the operationally critical quantity capturing the limitations of a realistic attack. We conclude that the fact that infinite amount of entanglement is required for an optimal collective eavesdrop** attack signifies the robustness of Gaussian quantum key distribution.
△ Less
Submitted 22 January, 2020; v1 submitted 20 August, 2019;
originally announced August 2019.
-
Certified Quantum Random Numbers from Untrusted Light
Authors:
David Drahi,
Nathan Walk,
Matty J. Hoban,
Aleksey K. Fedorov,
Roman Shakhovoy,
Akky Feimov,
Yury Kurochkin,
W. Steven Kolthammer,
Joshua Nunn,
Jonathan Barrett,
Ian A. Walmsley
Abstract:
A remarkable aspect of quantum theory is that certain measurement outcomes are entirely unpredictable to all possible observers. Such quantum events can be harnessed to generate numbers whose randomness is asserted based upon the underlying physical processes. We formally introduce, design and experimentally demonstrate an ultrafast optical quantum random number generator that uses a totally untru…
▽ More
A remarkable aspect of quantum theory is that certain measurement outcomes are entirely unpredictable to all possible observers. Such quantum events can be harnessed to generate numbers whose randomness is asserted based upon the underlying physical processes. We formally introduce, design and experimentally demonstrate an ultrafast optical quantum random number generator that uses a totally untrusted photonic source. While considering completely general quantum attacks, we certify and generate in real-time random numbers at a rate of $8.05\,$Gb/s with a rigorous security parameter of $10^{-10}$. Our security proof is entirely composable, thereby allowing the generated randomness to be utilised for arbitrary applications in cryptography and beyond. To our knowledge, this represents the fastest composably secure source of quantum random numbers ever reported.
△ Less
Submitted 17 August, 2020; v1 submitted 23 May, 2019;
originally announced May 2019.
-
Optimal realistic attacks in continuous-variable quantum key distribution
Authors:
Nedasadat Hosseinidehaj,
Nathan Walk,
Timothy C. Ralph
Abstract:
Quantum cryptographic protocols are typically analysed by assuming that potential opponents can carry out all physical operations, an assumption which grants capabilities far in excess of present technology. Adjusting this assumption to reflect more realistic capabilities is an attractive prospect, but one that can only be justified with a rigorous, quantitative framework that relates adversarial…
▽ More
Quantum cryptographic protocols are typically analysed by assuming that potential opponents can carry out all physical operations, an assumption which grants capabilities far in excess of present technology. Adjusting this assumption to reflect more realistic capabilities is an attractive prospect, but one that can only be justified with a rigorous, quantitative framework that relates adversarial restrictions to the protocols security and performance. We investigate the effect of limitations on the eavesdropper's (Eve's) ability to make a coherent attack on the security of continuous-variable quantum key distribution (CV-QKD). We consider a realistic attack, in which the total decoherence induced during the attack is modelled by a Gaussian channel. Based on our decoherence model we propose an optimal hybrid attack, which allows Eve to perform a combination of both coherent and individual attacks simultaneously. We evaluate the asymptotic and composable finite-size security of a heterodyne CV-QKD protocol against such hybrid attacks in terms of Eve's decoherence. We show that when the decoherence is greater than a threshold value, Eve's most effective strategy is reduced to the individual attack. Thus, if we are willing to assume that the decoherence caused by the memory and the collective measurement is large enough, it is sufficient to analyse the security of the protocol only against individual attacks, which significantly improves the CV-QKD performance in terms of both the key rate and the maximum secure transmission distance.
△ Less
Submitted 13 November, 2018;
originally announced November 2018.
-
Composably secure time-frequency quantum key distribution
Authors:
Nathan Walk,
Jonathan Barrett,
Joshua Nunn
Abstract:
We present a composable security proof, valid against arbitrary attacks and including finite-size effects, for a high dimensional time-frequency quantum key distribution (TFQKD) protocol based upon spectrally entangled photons. Previous works have focused on TFQKD schemes as it combines the impressive loss tolerance of single-photon QKD with the large alphabets of continuous variable (CV) schemes,…
▽ More
We present a composable security proof, valid against arbitrary attacks and including finite-size effects, for a high dimensional time-frequency quantum key distribution (TFQKD) protocol based upon spectrally entangled photons. Previous works have focused on TFQKD schemes as it combines the impressive loss tolerance of single-photon QKD with the large alphabets of continuous variable (CV) schemes, which enables the potential for more than one bit of secret key per transmission. However, the finite-size security of such schemes has only been proven under the assumption of collective Gaussian attacks. Here, by combining recent advances in entropic uncertainty relations for CVQKD with decoy state analysis, we derive a composable security proof that predicts key rates on the order of Mbits/s over metropolitan distances (40km or less) and maximum transmission distances of up to 140km.
△ Less
Submitted 29 September, 2016;
originally announced September 2016.
-
Models of reduced-noise, probabilistic linear amplifiers
Authors:
Joshua Combes,
Nathan Walk,
A. P. Lund,
T. C. Ralph,
Carlton M. Caves
Abstract:
We construct an amplifier that interpolates between a nondeterministic, immaculate linear amplifier and a deterministic, ideal linear amplifier and beyond to nonideal linear amplifiers. The construction involves cascading an immaculate linear amplifier that has amplitude gain $g_1$ with a (possibly) nonideal linear amplifier that has gain $g_2$. With respect to normally ordered moments, the device…
▽ More
We construct an amplifier that interpolates between a nondeterministic, immaculate linear amplifier and a deterministic, ideal linear amplifier and beyond to nonideal linear amplifiers. The construction involves cascading an immaculate linear amplifier that has amplitude gain $g_1$ with a (possibly) nonideal linear amplifier that has gain $g_2$. With respect to normally ordered moments, the device has output noise $μ^2(G^2-1)$ where $G=g_1 g_2$ is the overall amplitude gain and $μ^2$ is a noise parameter. When $μ^2\ge1$, our devices realize ideal ($μ^2=1$) and nonideal ($μ^2>1$) linear amplifiers. When $0\leμ^2<1$, these devices work effectively only over a restricted region of phase space and with some subunity success probability $p_{\checkmark}$. We investigate the performance of our $μ^2$-amplifiers in terms of a gain-corrected probability-fidelity product and the ratio of input to output signal-to-noise ratios corrected for success probability.
△ Less
Submitted 10 March, 2016;
originally announced March 2016.
-
Observation of genuine one-way Einstein-Podolsky-Rosen steering
Authors:
Sabine Wollmann,
Nathan Walk,
Adam J. Bennet,
Howard M. Wiseman,
G. J. Pryde
Abstract:
Within the hierarchy of inseparable quantum correlations, Einstein-Podolsky-Rosen steering is distinguished from both entanglement and Bell nonlocality by its asymmetry -- there exist conditions where the steering phenomenon changes from being observable to not observable, simply by exchanging the role of the two measuring parties. Whilst this one-way steering feature has been previously demonstra…
▽ More
Within the hierarchy of inseparable quantum correlations, Einstein-Podolsky-Rosen steering is distinguished from both entanglement and Bell nonlocality by its asymmetry -- there exist conditions where the steering phenomenon changes from being observable to not observable, simply by exchanging the role of the two measuring parties. Whilst this one-way steering feature has been previously demonstrated for the restricted class of Gaussian measurements, for the general case of positive-operator-valued measures even its theoretical existence has only recently been settled. Here, we prove, and then experimentally observe, the one-way steerability of an experimentally practical class of entangled states in this general setting. As well as its foundational significance, the demonstration of fundamentally asymmetric nonlocality also has practical implications for the distribution of the trust in quantum communication networks.
△ Less
Submitted 4 November, 2015;
originally announced November 2015.
-
Measurement-Based Noiseless Linear Amplification for Quantum Communication
Authors:
Helen M. Chrzanowski,
Nathan Walk,
Syed M. Assad,
Jiri Janousek,
Sara Hosseini,
Timothy C. Ralph,
Thomas Symul,
** Koy Lam
Abstract:
Entanglement distillation is an indispensable ingredient in extended quantum communication networks. Distillation protocols are necessarily non-deterministic and require advanced experimental techniques such as noiseless amplification. Recently it was shown that the benefits of noiseless amplification could be extracted by performing a post-selective filtering of the measurement record to improve…
▽ More
Entanglement distillation is an indispensable ingredient in extended quantum communication networks. Distillation protocols are necessarily non-deterministic and require advanced experimental techniques such as noiseless amplification. Recently it was shown that the benefits of noiseless amplification could be extracted by performing a post-selective filtering of the measurement record to improve the performance of quantum key distribution. We apply this protocol to entanglement degraded by transmission loss of up to the equivalent of 100km of optical fibre. We measure an effective entangled resource stronger than that achievable by even a maximally entangled resource passively transmitted through the same channel. We also provide a proof-of-principle demonstration of secret key extraction from an otherwise insecure regime. The measurement-based noiseless linear amplifier offers two advantages over its physical counterpart: ease of implementation and near optimal probability of success. It should provide an effective and versatile tool for a broad class of entanglement-based quantum communication protocols.
△ Less
Submitted 12 September, 2014; v1 submitted 9 September, 2014;
originally announced September 2014.
-
Quantum Key Distribution without sending a Quantum Signal
Authors:
T. C. Ralph,
N. Walk
Abstract:
Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are…
▽ More
Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. Whilst this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is considered we show it is possible to distribute an unconditionally secure secret key without sending a quantum signal, instead harnessing the intrinsic entanglement between different regions of space time. The protocol is practical in free space given horizon technology and might be testable in principle in the near term using microwave technology.
△ Less
Submitted 6 September, 2014;
originally announced September 2014.
-
Channel purification via continuous-variable quantum teleportation with Gaussian post-selection
Authors:
Rémi Blandino,
Nathan Walk,
Austin P. Lund,
Timothy C. Ralph
Abstract:
We present a protocol based on continuous-variable quantum teleportation and Gaussian post- selection that can be used to correct errors introduced by a lossy channel. We first show that the global transformation enacted by the protocol is equivalent to an effective system composed of a noiseless amplification (or attenuation), and an effective quantum channel, which can in theory have no loss and…
▽ More
We present a protocol based on continuous-variable quantum teleportation and Gaussian post- selection that can be used to correct errors introduced by a lossy channel. We first show that the global transformation enacted by the protocol is equivalent to an effective system composed of a noiseless amplification (or attenuation), and an effective quantum channel, which can in theory have no loss and an amount of thermal noise arbitrarily small, hence tending to an identity channel. An application of our protocol is the probabilistic purification of quantum non-Gaussian states using only Gaussian operations.
△ Less
Submitted 26 August, 2014;
originally announced August 2014.
-
Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution
Authors:
Nathan Walk,
Sara Hosseni,
Jiao Geng,
Oliver Thearle,
**g Yan Haw,
Seiji Armstrong,
Syed M Assad,
Jiri Janousek,
Timothy C Ralph,
Thomas Symul,
Howard M Wiseman,
** Koy Lam
Abstract:
Nonlocal correlations, a longstanding foundational topic in quantum information, have recently found application as a resource for cryptographic tasks where not all devices are trusted, for example in settings with a highly secure central hub, such as a bank or government department, and less secure satellite stations which are inherently more vulnerable to hardware "hacking" attacks. The asymmetr…
▽ More
Nonlocal correlations, a longstanding foundational topic in quantum information, have recently found application as a resource for cryptographic tasks where not all devices are trusted, for example in settings with a highly secure central hub, such as a bank or government department, and less secure satellite stations which are inherently more vulnerable to hardware "hacking" attacks. The asymmetric phenomena of Einstein-Podolsky-Rosen steering plays a key role in one-sided device-independent quantum key distribution (1sDI-QKD) protocols. In the context of continuous-variable (CV) QKD schemes utilizing Gaussian states and measurements, we identify all protocols that can be 1sDI and their maximum loss tolerance. Surprisingly, this includes a protocol that uses only coherent states. We also establish a direct link between the relevant EPR steering inequality and the secret key rate, further strengthening the relationship between these asymmetric notions of nonlocality and device independence. We experimentally implement both entanglement-based and coherent-state protocols, and measure the correlations necessary for 1sDI key distribution up to an applied loss equivalent to 7.5 km and 3.5 km of optical fiber transmission respectively. We also engage in detailed modelling to understand the limits of our current experiment and the potential for further improvements. The new protocols we uncover apply the cheap and efficient hardware of CVQKD systems in a significantly more secure setting.
△ Less
Submitted 16 June, 2016; v1 submitted 26 May, 2014;
originally announced May 2014.
-
Non-deterministic noiseless amplification via non-symplectic phase space transformations
Authors:
Nathan Walk,
Austin P. Lund,
Timothy C. Ralph
Abstract:
We analyse the action of an ideal noiseless linear amplifier operator, $g^\hat{n}$, using the Wigner function phase space representation. In this setting we are able to clarify the gain $g$ for which a physical output is produced when this operator is acted upon inputs other than coherent states. We derive compact closed form expressions for the action of $N$ local amplifiers, with potentially dif…
▽ More
We analyse the action of an ideal noiseless linear amplifier operator, $g^\hat{n}$, using the Wigner function phase space representation. In this setting we are able to clarify the gain $g$ for which a physical output is produced when this operator is acted upon inputs other than coherent states. We derive compact closed form expressions for the action of $N$ local amplifiers, with potentially different gains, on arbitrary $N$-mode Gaussian states and provide several examples of the utility of this formalism for determining important quantities including amplification and the strength and purity of the distilled entanglement, and for optimising the use of the amplification in quantum information protocols.
△ Less
Submitted 20 November, 2012; v1 submitted 15 November, 2012;
originally announced November 2012.
-
Gaussian Post-selection for Continuous Variable Quantum Cryptography
Authors:
Nathan Walk,
Thomas Symul,
** Koy Lam,
Timothy C. Ralph
Abstract:
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdrop** attacks by employing the concept of an equivalent protocol where the post-selection is implemented as a series of quantum operations including a virtual distillation. We introduce a particular `Gaussian' post selection and demonstrate that the security…
▽ More
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdrop** attacks by employing the concept of an equivalent protocol where the post-selection is implemented as a series of quantum operations including a virtual distillation. We introduce a particular `Gaussian' post selection and demonstrate that the security can be calculated using only experimentally accessible quantities. Finally we explicitly evaluate the performance for the case of a noisy Gaussian channel in the limit of unbounded key length and find improvements over all pre-existing continuous variable protocols in realistic regimes.
△ Less
Submitted 5 June, 2012; v1 submitted 5 June, 2012;
originally announced June 2012.
-
Quantum Communication with an Accelerated Partner
Authors:
T. G. Downes,
T. C. Ralph,
N. Walk
Abstract:
An unsolved problem in relativistic quantum information research is how to model efficient, directional quantum communication between localised parties in a fully quantum field theoretical framework. We propose a tractable approach to this problem based on solving the Heisenberg evolution of localized field observables. We illustrate our approach by analysing, and obtaining approximate analytical…
▽ More
An unsolved problem in relativistic quantum information research is how to model efficient, directional quantum communication between localised parties in a fully quantum field theoretical framework. We propose a tractable approach to this problem based on solving the Heisenberg evolution of localized field observables. We illustrate our approach by analysing, and obtaining approximate analytical solutions to, the problem of communicating coherent states between an inertial sender, Alice and an accelerated receiver, Rob. We use these results to determine the efficiency with which continuous variable quantum key distribution could be carried out over such a communication channel.
△ Less
Submitted 28 October, 2012; v1 submitted 13 March, 2012;
originally announced March 2012.
-
Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks
Authors:
Nathan Walk,
Thomas Symul,
Timothy C. Ralph,
** Koy Lam
Abstract:
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdrop** attacks by employing the concept of an equiv- alent protocol where the post-selection is implemented as a projective quantum measurement. We demonstrate that the security can be calculated using only experimentally accessible quantities and finally exp…
▽ More
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdrop** attacks by employing the concept of an equiv- alent protocol where the post-selection is implemented as a projective quantum measurement. We demonstrate that the security can be calculated using only experimentally accessible quantities and finally explicitly evaluate the performance for the case of a noisy Gaussian channel in the limit of unbounded key length.
△ Less
Submitted 4 June, 2011;
originally announced June 2011.
-
Noiseless Linear Amplification and Distillation of Entanglement
Authors:
G. Y. Xiang,
T. C. Ralph,
A. P. Lund,
N. Walk,
G. J. Pryde
Abstract:
The idea of signal amplification is ubiquitous in the control of physical systems, and the ultimate performance limit of amplifiers is set by quantum physics. Increasing the amplitude of an unknown quantum optical field, or more generally any harmonic oscillator state, must introduce noise. This linear amplification noise prevents the perfect copying of the quantum state, enforces quantum limits…
▽ More
The idea of signal amplification is ubiquitous in the control of physical systems, and the ultimate performance limit of amplifiers is set by quantum physics. Increasing the amplitude of an unknown quantum optical field, or more generally any harmonic oscillator state, must introduce noise. This linear amplification noise prevents the perfect copying of the quantum state, enforces quantum limits on communications and metrology, and is the physical mechanism that prevents the increase of entanglement via local operations. It is known that non-deterministic versions of ideal cloning and local entanglement increase (distillation) are allowed, suggesting the possibility of non-deterministic noiseless linear amplification. Here we introduce, and experimentally demonstrate, such a noiseless linear amplifier for continuous-variables states of the optical field, and use it to demonstrate entanglement distillation of field-mode entanglement. This simple but powerful circuit can form the basis of practical devices for enhancing quantum technologies. The idea of noiseless amplification unifies approaches to cloning and distillation, and will find applications in quantum metrology and communications.
△ Less
Submitted 21 July, 2009;
originally announced July 2009.