Practical aspects of QKD security
|
|
- Dustin Lambert
- 5 years ago
- Views:
Transcription
1 Practical aspects of QKD security Alexei Trifonov Audrius Berzanskis MagiQ Technologies, Inc.
2 Secure quantum communication Protected environment Alice apparatus Optical channel (insecure) Protected environment Bob apparatus Quantum cryptographic apparatus is located in the secure environment The task for the quantum cryptography is to protect the channel from the eavesdropping Quantum Cryptography Cryptography Security
3 Mutual information, key distillation criterion IAB (, ) 1 εlog ε 1 ε log 1 ε = ( ) 2( ) Bob information gain, ε - quantum bit error rate IAE (, ) = 1 + ξlog ξ + 1 ξ log 1 ξ ( ) ( ) 2 2 Eve information gain by Eve, ξ - error rate by Eve SAB (, E) max ( IAB (, ) IAE (, ), IAB (, ) IBE (, ))
4 Quantum channel Alice detector U1 U2 RNG EPR source E91 or BBM92 RNG Bob detector Alice source t U U2 1 RNG RNG BB84 Bob detector 1 2Φ + = t Φ + U U U U ( ) ( )
5 State estimation A B State distinguishability D ρ ρ + Likelihood of guessing correctly 1 + D L = max { w+, w } = 2 D = 1 p p ψ ψ + + Helstrom bound 2 Mutual information Likelihood of error 1 D ε = 1 L = 2 IAB (, ) = 1 + εlog ε + 1 ε log 1 ε ( ) ( ) 2 2
6 Mach-Zehnder interferometer 1 Relative phase shifter Eve detector 1 ξ = 1 D AE 2 0 Eve detector 2 φ Detector 1 ϕ = 0, π 1 ε = Detector 2 D AB 2 DAB = V
7 Complementarity relations A E B ε = 1 V 2 The main task is to break the symmetry in mutual information Quantum physics provides us with solution Bob Error rates 1 D ξ = 2 Alice D V 1 Complementarity relation Keeping V high enough we can make sure that IAB (, ) > max{ IAE (, ), IBE (, )} IAB (, ) = IAE (, ) D = V ε 1 2 = ξ = 15% 2 Error rate threshold for key distribution
8 What is good about QKD? Does not depend on mathematical complexity or any type of unproven computational algorithm Works as intrusion detector Unclonable leaves no copy of the information sent
9 What is bad about QKD? Intrinsically based upon single photon interferometry very sensitive to loss and decoherence Incompatible with optical amplifiers distance limitation! Uses single photon counters slow!
10 Major components affecting the Source performance of QKD system Ideally true single photon source really weak laser pulse, nonzero probability for more than one photon in a pulse Interferometer visibility up to 30 db is real Apparatus loss progress in telecom made it simple! Fiber loss typically db/km, affects the rate and distance - beyond the control Detector quantum efficiency and dark current noise rate and distance
11 The questions to the designer of the QKD system How to adjust average photon number? How to tune the performance of the single photon counter? Probability, log Photon number
12 Outline detector problem The main parameters of the detector of interest Requirements from security of QKD system Real detector characterization Comparison of true single photon and weak coherent pulse QKD Summary
13 Detector problem Good silicon detector for the first telecom window 830nm or free-space QKD Second and third telecom window are much more transparent: typical losses are db/km for 830nm, db/km for 1310nm, and db/km for 1550nm. Long-haul system (10+ km) can be built only with 1310 or 1550, the later is preferable. Ge detector can be used only for 1310nm (cooling -> > band gap shift). InGaAS detectors have huge afterpulsing -> > decrease in capacity. Solution: careful detector selection, short pulse gating, plus electronic e suppression of the gating pulses after the event.
14 Main parameters of the single photon detector Quantum efficiency the probability of getting a response from a single quanta Dark current probability - the probability of the false click η p DC The speed of recharging the detector maximum rate Afterpulsing probability the increase probability of getting a subsequent false click
15 Performance of the QKD system with true single photon source Single photon source Gain per pulse 1e-1 1e-2 1e-3 1e-4 1e-5 1e-6 Parameters µ B 0.3 η = 10% p DC α = η B = = db / km = 0.5 1e Distance, km
16 Performance Dark current probability is high, solution fast gating + cooling. Detector is below the breakthrough voltage and is gated above only within the time window containing the photon Parameters Base voltage Gate pulse width Gate pulse amplitude Working temperature
17 Detector performance 1.E+05 T=-40degC pw=10ns 1.E+04 MaxC/DC 1.E+03 1.E+02 4V 5V 6V 8V 1.E Bias voltage Ratio of Max Count/ Dark count vs Bias voltage for 10ns gating pulse
18 Gating Amplitude Dependence -80deg C, Gating 2ns 1.00E E-03 T=-80degC, 2ns 4 V 6 V 8 V 1.00E-04 DCR 1.00E E E QE, %
19 Gating Pulse Width Dependence -60deg C, Gating amplitude 8V T = -60 degrees C, Vp = 8 V 1.00E E-04 Tp = 2 ns Tp = 4 ns Tp = 6 ns Tp = 10 ns DCR 1.00E E E QE (%)
20 Gating Pulse Width Dependence: normalized -60deg C, Gating amplitude 8V 1.00E-04 T = 60 degrees C, Vp = 8 V normalized /ns 1.00E-05 DCR 1.00E E-07 Tp = 2 ns Tp = 4 ns Tp = 6 ns Tp = 10 ns 1.00E QE (% )
21 Temperature Dependence Gating 2ns, 8V Tp = 2 ns Vp = 8 V 1.00E E-04 DCR 1.00E E E-07 0 degrees C -40 degrees C -60 degrees C -80 degrees C QE (%)
22 APD AfterPulsing Testing Parameters V gate: 8V T gate: 2ns Temperature: -80 and -40 deg C Laser λ=1553.4nm P into APD =-122dBm 1photon/pulse (@5kHz) Discriminator trigger pulse 200ns Delay APD Gating Laser Trigger
23 APD AfterPulsing Testing Afterpulsing -40deg C, 2ns, 8V, f=5khz\ 1photon/pulse 1e-2 Afterpulse probability 1e-3 1e-4 1e-5 QE=12.9% DCR=2.2e-5 QE=9.1% DCR=1.2e-5 QE=7% DCR=7e-6 1e Delay, µs Bias 47.5V Bias 47.0V Bias 46.75V
24 APD AfterPulsing Testing Afterpulsing -80deg C, 2ns, 8V, f=5khz 1e-1 1e-2 Afterpulse probability 1e-3 1e-4 1e-5 QE=13% DCR=4e-5 QE=11% DCR=3e-6 1e-6 QE=7.9% DCR=1.5e Delay, µs Bias 43.53V Bias 43.2V Bias 42.5V 2exp fit Fit parameters: f=y0+a*exp(-bx)+c*exp(-dx) B=1.7 D=0.3
25 Conclusion detector problem Both quantum efficiency and dark current are decreasing with cooling At the same time afterpulsing effect becomes significant at low temperature To maximize the system performance careful tweaking of the parameters must be done with respect to actual experimental conditions
26 Quantum Key Distribution: w/ Attempted Eavesdropper
27 Algorithms Authentication Sifting Error correction Privacy amplification Final key 1 psift = psignal 2 H = εlog2 ε 1 ε log2 1 ε ( 1 2 τ = 1+ log ) 2 + 2ε 2ε 2 G = p ( 1 τ f H ) sift ( ) ( ) ε - quantum bit error rate H - Shannon entropy
28 Performance of the QKD system with true single photon source Single photon source Gain per pulse 1e-1 1e-2 1e-3 1e-4 1e-5 1e-6 Parameters µ B 0.3 η = 10% p DC α = η B = = db / km = 0.5 1e Distance, km
29 Eavesdropping model Eve can perform POVM attack (cloning) Eve has QND apparatus to distinguish total photon number of the pulse Eve can use photon number splitting PNS attack (PNS + quantum memory) Eve can substitute the fiber with the loss-free channel or use quantum teleportation to deliver the (unknown) single photon state to Bob Probability, log Photon number
30 Photon number splitting attack Alice µ PNS Bob µ ( 1 L) Quantum memory Classical channel Eve can use only channel loss, not Bob apparatus loss or detector QE
31 How dangerous is the PNS attack?? Can Eve get use of all the loss in the system or she can modify and take advantage only upon the channel loss? Alice and Bob apparatus assume to be physically protected from intrusion, Eve cannot use any type of amplification Conclusion: only the channel loss should be taken into account
32 Gain per pulse 1e-1 1e-2 1e-3 1e-4 1e-5 WCP QKD performance Parameters µ B optimum! η = 10% 5 pdc = 10 α = 0.2 db / km η = 0.5 B 1e Distance, km Sifted bits After error correction After EC and privacy amplification Optimum photon number 1.0 Distance, km vs Optimum PN Distance, km
33 The influence of the dark current on the distance of QKD Gain per pulse / QE QE*DC=10^-2 QE*DC=10^-3 QE*DC=10^ Distance, km QE*DC=10^-5
34 Conclusion Secure QKD is possible with commercially available components Performance of the system depends on the combination of parameters and should be optimized for a certain experimental conditions Future progress in performance of QKD systems depends significantly on the progress in single photon counting technique, this is probably the most obvious and feasible source of improvement Thanks to Thanks to Norbert Luetkenhaus Darius Subacius Anton Zavriyev
Quantum Information Transfer and Processing Miloslav Dušek
Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the
More informationSecurity and implementation of differential phase shift quantum key distribution systems
Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006 Classical cryptography cryptography = κρυπτός +
More informationInvestigation of System Performance of Quantum Cryptography Key Distribution in Network Security
Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security Mehrdad Sepehri Sharbaf Senior IEEE Member California State University Dominguez Hills Computer Science
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationarxiv:quant-ph/ v1 25 Dec 2006
Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol Toyohiro Tsurumaru Mitsubishi Electric Corporation, Information Technology R&D Center 5-1-1
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More informationQuantum Key Distribution. The Starting Point
Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated
More informationCommunications Quantiques
Communications Quantiques Hugo Zbinden Groupe de Physique Appliquée Quantum Technologies Université de Genève Cryptographie Quantique Génération de nombres aléatoires Stéganographie basée sur du bruit
More informationarxiv:quant-ph/ v1 12 Nov 1999
Security Aspects of Practical Quantum Cryptography Gilles Brassard 1, Norbert Lütkenhaus 2, Tal Mor 1,3 and Barry C. Sanders 4 1 Département IRO, Université de Montréal, C.P. 6128, succ. centre ville,
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationProblem Set: TT Quantum Information
Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C
More information5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes
5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.
More informationApplications of Quantum Key Distribution (QKD)
Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,
More informationSecurity of Quantum Key Distribution with Imperfect Devices
Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo
More informationQuantum Cryptography. Marshall Roth March 9, 2007
Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and
More informationQuantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto
Quantum Hacking Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto 1 Outline Introduction Quantum Key Distribution (QKD) Practical QKD Quantum Hacking Fake-state & Time-shifted
More informationAPPLICATIONS. Quantum Communications
SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction
More informationSECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES
Quantum Information and Computation, Vol. 7, No. 5&6 (2007) 431 458 c Rinton Press SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES HOI-KWONG LO Center for Quantum
More informationPractical Quantum Key Distribution
Leopold-Franzens-Universität Innsbruck Institut für Experimentalphysik Technikerstrasse 25 http://www.uibk.ac.at Practical Quantum Key Distribution Gregor Weihs Contents QKD Protocols Implementations of
More informationDifferential Phase Shift Quantum Key Distribution and Beyond
Differential Phase Shift Quantum Key Distribution and Beyond Yoshihisa Yamamoto E. L. Ginzton Laboratory, Stanford University National Institute of Informatics (Tokyo, Japan) DPS-QKD system Protocol System
More informationQuantum key distribution
Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles
More informationTWO-LAYER QUANTUM KEY DISTRIBUTION
TWO-LAYER QUANTUM KEY DISTRIBUTION PAULO VINÍCIUS PEREIRA PINHEIRO and RUBENS VIANA RAMOS paulovpp@gmail.com rubens.viana@pq.cnpq.br Laboratory of Quantum Information Technology, Department of Teleinformatic
More informationEnigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski
1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every
More informationarxiv:quant-ph/ v1 26 Mar 2001
Performance of Photon-Pair Quantum Key Distribution Systems Z. Walton, 1 A. V. Sergienko, 1,2 M. Atatüre, 2 B. E. A. Saleh, 1 and M. C. Teich 1,2 1 Quantum Imaging Laboratory, Department of Electrical
More informationUnconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi
More informationQuantum cryptography and quantum hacking. Dr. Lars Lydersen
Quantum cryptography and quantum hacking Dr. Lars Lydersen GOVCERT.NL, Rotterdam 5. November 2 Quantum Hacking group NTNU, Trondheim & UNIK, Kjeller www.iet.ntnu.no/groups/optics/qcr/ Prof. Johannes Skaar
More informationarxiv:quant-ph/ v1 22 Mar 2002
Quantum Key Distribution over 67 km with a plug&play system arxiv:quant-ph/0203118v1 22 Mar 2002 I D. Stucki, N. Gisin, O. Guinnard*, G. Ribordy*, H. Zbinden GAP-Optique, University of Geneva, rue de l
More information+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1
Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction
More informationQuantum cryptography: from theory to practice
Quantum cryptography: from theory to practice by Xiongfeng Ma A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Thesis Graduate Department of Department of Physics
More informationQuantum Cryptography
Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum
More informationPractical quantum-key. key- distribution post-processing
Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert
More informationBB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits
BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits (*) Yoshihiro NAMBU*, Takaaki HATANAKA, and Kazuo NAKAMURA (*) Corresponding author: E-mail address: y-nambu@ah.jp.nec.com
More informationQuantum Communication with Atomic Ensembles
Quantum Communication with Atomic Ensembles Julien Laurat jlaurat@caltech.edu C.W. Chou, H. Deng, K.S. Choi, H. de Riedmatten, D. Felinto, H.J. Kimble Caltech Quantum Optics FRISNO 2007, February 12, 2007
More informationLinear-optical quantum information processing: A few experiments
Linear-optical quantum information processing: A few experiments Miloslav Dušek Lucie Čelechovská, Karel Lemr, Michal Mičuda, Antonín Černoch, Jaromír Fiurášek, Miroslav Ježek, ek, Jan Soubusta, Radim
More informationQuantum key distribution: theory for application
Appl. Phys. B 69, 395 400 (1999) / Digital Object Identifier (DOI) 10.1007/s003409900167 Applied Physics B Lasers and Optics Springer-Verlag 1999 Quantum key distribution: theory for application N. Lütkenhaus
More informationHigh Fidelity to Low Weight. Daniel Gottesman Perimeter Institute
High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,
More informationStop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)
Journal of Computer Science 3 (6): 44-49, 7 ISSN 549-3636 7 Science Publications Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Iyed Ben Slimen, Olfa Trabelsi, Houria
More informationarxiv:quant-ph/ v2 17 Sep 2002
Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,
More informationCryptography: the science of secret communications
1 Quantum key distribution a new tool for the secure communications toolbox Richard Hughes Physics Division Los Alamos National Laboratory 505-667-3876; ; http://quantum.lanl.gov cryptographic key transfer
More informationHigh rate quantum cryptography with untrusted relay: Theory and experiment
High rate quantum cryptography with untrusted relay: Theory and experiment CARLO OTTAVIANI Department of Computer Science, The University of York (UK) 1st TWQI Conference Ann Arbor 27-3 July 2015 1 In
More informationA Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016
More informationKey distillation from quantum channels using two-way communication protocols
Key distillation from quantum channels using two-way communication protocols Joonwoo Bae and Antonio Acín ICFO-Institut de Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels, Barcelona,
More informationPhysics is becoming too difficult for physicists. David Hilbert (mathematician)
Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving
More informationQuantum Cryptography
http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationFundamental Security Issues in Continuous Variable Quantum Key Distribution
Fundamental Security Issues in Continuous Variable Quantum Key Distribution arxiv:1208.5827v1 [quant-ph] 29 Aug 2012 Horace P. Yuen Department of Electrical Engineering and Computer Science Department
More informationChapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution
Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation
More informationSimulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber
Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/06068v2 2 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum
More information10 - February, 2010 Jordan Myronuk
10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States
More informationQuantum Cryptography and Security of Information Systems
Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty
More informationError Reconciliation in QKD. Distribution
Error Reconciliation in Quantum Key Distribution Richard P. Brent MSI, ANU 1 October 2009 Abstract The problem of "error reconciliation" arises in Quantum Cryptography, which is more accurately described
More informationSquashing Models for Optical Measurements in Quantum Communication
Squashing Models for Optical Measurements in Quantum Communication by Normand James Beaudry A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master
More informationIntroduction to Quantum Cryptography
Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More informationAPPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD
2016/2500M-0054 ISSN 1797-3457 (verkkojulkaisu) ISBN (PDF) 978-951-25-2850-9 SUMMARY REPORT APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD Ilkka Tittonen, professor, Department of Micro- and
More informationDevice-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles
Device-independent Quantum Key Distribution and Randomness Generation Stefano Pironio Université Libre de Bruxelles Tropical QKD, Waterloo, June 14-17, 2010 Device-independent security proofs establish
More informationQuantum key distribution for the lazy and careless
Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center
More informationarxiv:quant-ph/ v6 6 Mar 2007
Phase-Remapping Attack in Practical Quantum Key Distribution Systems Chi-Hang Fred Fung, 1, Bing Qi, 1, Kiyoshi Tamaki, 2, and Hoi-Kwong Lo 1, 1 Center for Quantum Information and Quantum Control, Department
More informationarxiv:quant-ph/ v2 7 Nov 2001
Quantum key distribution using non-classical photon number correlations in macroscopic light pulses A.C. Funk and M.G. Raymer Oregon Center for Optics and Department of Physics, University of Oregon, Eugene,
More informationQuantum Information Processing and Diagrams of States
Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University
More informationNational Institute of Standards and Technology Gaithersburg, MD, USA
National Institute of Standards and Technology Gaithersburg, MD, USA Physics y Laboratoryy & Information Technology Laboratory J. C. Bienfang, A. Restelli, D. Rogers, J. Galang C. W. Clark, Carl J. Williams
More informationGround-Satellite QKD Through Free Space. Steven Taylor
Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution
More informationTalk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016
Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Vadim Makarov www.vad1.com/lab Security model of QKD Security proof.laws of physics & Model of equipment Hack Integrate
More informationSimulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber
Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/0601168 v2 12 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum
More informationNew schemes for manipulating quantum states using a Kerr cell. Istituto Elettrotecnico Nazionale Galileo Ferraris, Str. delle Cacce 91, I Torino
New schemes for manipulating quantum states using a Kerr cell Marco Genovese and C.Novero Istituto Elettrotecnico Nazionale Galileo Ferraris, Str. delle Cacce 91, I-10135 Torino Recently, Quantum Non Demolition
More informationDevice-Independent Quantum Information Processing
Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information
More informationSilicon avalanche photodiodes for satellite based quantum communication
Silicon avalanche photodiodes for satellite based quantum communication by Ian DSouza A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master
More informationSimulation of BB84 Quantum Key Distribution in depolarizing channel
Simulation of BB84 Quantum Key Distribution in depolarizing channel Hui Qiao, Xiao-yu Chen * College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China xychen@mail.zjgsu.edu.cn
More informationOptical Quantum Communication with Quantitative Advantage. Quantum Communication
Optical Quantum Communication with Quantitative Advantage Juan Miguel Arrazola Benjamin Lovitz Ashutosh Marwah Dave Touchette Norbert Lütkenhaus Institute for Quantum Computing & Department of Physics
More informationResearch Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract
Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement
More informationRealization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled Light
T. Eberle 1, V. Händchen 1, F. Furrer 2, T. Franz 3, J. Duhme 3, R.F. Werner 3, R. Schnabel 1 Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled
More informationPhotodetectors Read: Kasip, Chapter 5 Yariv, Chapter 11 Class Handout. ECE 162C Lecture #13 Prof. John Bowers
Photodetectors Read: Kasip, Chapter 5 Yariv, Chapter 11 Class Handout ECE 162C Lecture #13 Prof. John Bowers Definitions Quantum efficiency η: Ratio of the number of electrons collected to the number of
More informationQuantum Repeaters and Memories
Quantum Repeaters and Memories Nicolas Gisin and Mikael Afzelius Group of Applied Physics Geneva University, Switzerland Quantum Repeaters Quantum memories 1 click Quantum Entanglement 1 QKD over 307 km
More informationarxiv:quant-ph/ v1 13 Mar 2007
Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,
More informationFundamental rate-loss tradeoff for optical quantum key distribution
Fundamental rate-loss tradeoff for optical quantum key distribution Masahiro Takeoka (NICT) Saikat Guha (BBN) Mark M. Wilde (LSU) Quantum Krispy Kreme Seminar @LSU January 30, 2015 Outline Motivation Main
More informationContent of the lectures
Content of the lectures Lecture 1 Introduction to quantum noise, squeezed light and entanglement generation Quantization of light, Continuous-variable, Homodyne detection, Gaussian states, Optical parametric
More informationRapide Note. Highlight Paper THE EUROPEAN PHYSICAL JOURNAL D. S. Fasel, N. Gisin a, G. Ribordy, and H. Zbinden
Eur. Phys. J. D 30, 143 148 (2004) DOI: 10.1140/epjd/e2004-00080-8 THE EUROPEAN PHYSICAL JOURNAL D Quantum key distribution over 30 km of standard fiber using energy-time entangled photon pairs: a comparison
More informationQuantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer
Centre for Quantum Technologies, Singapore QUANTUM OPTICS Entanglement-based Free Space Quantum Cryptography in Full Daylight, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer
More informationQuantum Cryptography
Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145
More informationContinuous-variable quantum key distribution with a locally generated local oscillator
Continuous-variable quantum key distribution with a locally generated local oscillator Bing Qi, Pavel Lougovski, Raphael Pooser, Warren Grice, Miljko Bobrek, Charles Ci Wen Lim, and Philip G. Evans Quantum
More informationQUANTUM KEY DISTRIBUTION PROTOCOLS WITH HIGH RATES AND LOW COSTS
QUANTUM KEY DISTRIBUTION PROTOCOLS WITH HIGH RATES AND LOW COSTS A Thesis Presented to The Academic Faculty by Zheshen Zhang In Partial Fulfillment of the Requirements for the Degree Master of Science
More informationTrojan-horse attacks on quantum-key-distribution systems
Trojan-horse attacks on quantum-key-distribution systems N. Gisin, 1 S. Fasel, 1 B. Kraus, 1 H. Zbinden, 1 and G. Ribordy 2 1 Group of Applied Physics, University of Geneva, 1211 Geneva 4, Switzerland
More informationQuReP. Quantum Repeaters for Long Distance Fibre-Based Quantum Communication. Rob Thew. Coordinator: Nicolas Gisin
QuReP Quantum Repeaters for Long Distance Fibre-Based Quantum Communication Rob Thew Coordinator: Nicolas Gisin 1. Direct transmission Photon source Alice 2. Entanglement distribution: α Goal is to distribute
More informationQuantum Networks with Atomic Ensembles
Quantum Networks with Atomic Ensembles Daniel Felinto* dfelinto@df.ufpe.br C.W. Chou, H. Deng, K.S. Choi, H. de Riedmatten, J. Laurat, S. van Enk, H.J. Kimble Caltech Quantum Optics *Presently at Departamento
More informationMulti User Frequency Time Coded Quantum Key Distribution Network Using a Plug-and-Play System
ONDM 208 53 Multi User Frequency Time Coded Quantum Key Distribution Network Using a Plug-and-Play System Y.T. Aladadi, A.F. Abas, Abdulmalik Alwarafy, M.T. Alresheedi Department of Electrical Engineering,
More informationPractical security bounds against the Trojan-horse attack in quantum key distribution
Practical security bounds against the Trojan-horse attack in quantum key distribution M. Lucamarini 1,, I. Choi 1, M. B. Ward 1, J. F. Dynes 1,, Z. L. Yuan 1,, and A. J. Shields 1, 1 Toshiba Research Europe
More informationQuantum Correlations as Necessary Precondition for Secure Communication
Quantum Correlations as Necessary Precondition for Secure Communication Phys. Rev. Lett. 92, 217903 (2004) quant-ph/0307151 Marcos Curty 1, Maciej Lewenstein 2, Norbert Lütkenhaus 1 1 Institut für Theoretische
More informationarxiv:quant-ph/ v1 31 Dec 2002
Security of the Bennett 99 quantum-key distribution against individual attack over a realistic channel Kiyoshi amaki, Masato Koashi, Nobuyuki Imoto CRES Research eam for Interacting Carrier Electronics,
More informationMassachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.
More informationarxiv:quant-ph/ v2 18 Jan 1999
Estimates for practical quantum cryptography Norbert Lütkenhaus Helsinki Institute of Physics, PL 9, FIN-0004 Helsingin yliopisto, Finland (October 8, 208) In this article I present a protocol for quantum
More informationSummary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.
The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationExperimental realization of quantum cryptography communication in free space
Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao
More informationC. QUANTUM INFORMATION 99
C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)
More informationQuantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII
Quantum cryptography Part XIII Quantum cryptography Quantum cryptography has a potential to be cryptography of st century. An important new feature of quantum cryptography is that security of quantum cryptographic
More informationA New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)
A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationTrustworthiness of detectors in quantum key distribution with untrusted detectors
Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,
More informationOther Topics in Quantum Information
p. 1/23 Other Topics in Quantum Information In a course like this there is only a limited time, and only a limited number of topics can be covered. Some additional topics will be covered in the class projects.
More informationIntrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin
Intrinsic-Stabilization Uni-Directional Quantum Key Distribution Between Beijing and Tianjin Xiao-fan Mo 1, Bing Zhu 1, 2, Zheng-fu Han 1*, You-zhen Gui 1, Guang-can Guo 1 1 Key Lab of Quantum Information
More information