Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled Light

Similar documents
Continuous-variable quantum key distribution with a locally generated local oscillator

High rate quantum cryptography with untrusted relay: Theory and experiment

0.5 atoms improve the clock signal of 10,000 atoms

Continuous Variable Quantum Key Distribution with a Noisy Laser

QCRYPT Saturation Attack on Continuous-Variable Quantum Key Distribution System. Hao Qin*, Rupesh Kumar, and Romain Alléaume

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

D. Bouwmeester et. al. Nature (1997) Joep Jongen. 21th june 2007

Einstein-Podolsky-Rosen entanglement t of massive mirrors

Practical quantum-key. key- distribution post-processing

Deterministic secure communications using two-mode squeezed states

Multipartite Einstein Podolsky Rosen steering and genuine tripartite entanglement with optical networks

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016

1 1D Schrödinger equation: Particle in an infinite box

arxiv: v3 [quant-ph] 10 Feb 2015

Continuous-Variable Quantum Key Distribution Protocols Over Noisy Channels

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

High-fidelity continuous-variable quantum teleportation toward multistep quantum operations

Einstein-Podolsky-Rosen-like correlation on a coherent-state basis and Continuous-Variable entanglement

Squeezed Light for Gravitational Wave Interferometers

Practical Quantum Key Distribution

1 1D Schrödinger equation: Particle in an infinite box

Schemes to generate entangled photon pairs via spontaneous parametric down conversion

LECTURE NOTES ON Quantum Cryptography

A Guide to Experiments in Quantum Optics

Fundamental rate-loss tradeoff for optical quantum key distribution

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Ping Pong Protocol & Auto-compensation

Introduction to Quantum Key Distribution

SUPPLEMENTARY INFORMATION

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

SUPPLEMENTARY INFORMATION

A Superluminal communication solution based on Four-photon entanglement

APPLICATIONS. Quantum Communications

Ab-initio Quantum Enhanced Optical Phase Estimation Using Real-time Feedback Control

Analog quantum error correction with encoding a qubit into an oscillator

Quantum Cryptography

arxiv:quant-ph/ v1 25 Dec 2006

Experimental realization of quantum cryptography communication in free space

arxiv:quant-ph/ v2 2 Jan 2007

Quantum Information Transfer and Processing Miloslav Dušek

Quantum information and quantum computing

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

Applications of Quantum Key Distribution (QKD)

Quantum key distribution with 2-bit quantum codes

Entanglement and information

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

Quantum Correlations as Necessary Precondition for Secure Communication

Security of Quantum Key Distribution with Imperfect Devices

Quantum Key Distribution. The Starting Point

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

Practical aspects of QKD security

INTRODUCTION TO QUANTUM COMPUTING

Quantum mechanics and reality

10 - February, 2010 Jordan Myronuk

Quantum key distribution for the lazy and careless

arxiv:quant-ph/ v2 7 Nov 2001

Realization of B92 QKD protocol using id3100 Clavis 2 system

Beyond Heisenberg uncertainty principle in the negative mass reference frame. Eugene Polzik Niels Bohr Institute Copenhagen

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

Experimental continuous-variable cloning of partial quantum information

Quantum cryptography and quantum hacking. Dr. Lars Lydersen

Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution

Quantum Cryptography

Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

A semi-device-independent framework based on natural physical assumptions

Continuous-Variable Quantum Key Distribution with Gaussian Modulation The Theory of Practical Implementations

Labs 3-4: Single-photon Source

Calculation of the Key Length for Quantum Key Distribution

Security and implementation of differential phase shift quantum key distribution systems

Secure heterodyne-based QRNG at 17 Gbps

EPR paradox, Bell inequality, etc.

arxiv:quant-ph/ v1 30 May 2006

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Full polarization control for fiber optical quantum communication systems using polarization encoding

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

TWO-LAYER QUANTUM KEY DISTRIBUTION

Quantum Steerability for Entangled Coherent States

Fundamental Security Issues in Continuous Variable Quantum Key Distribution

Introduction to Quantum Cryptography

arxiv:quant-ph/ v1 13 Jan 2003

QUANTUM ENTANGLEMENT AND ITS ASPECTS. Dileep Dhakal Masters of Science in Nanomolecular Sciences

Title Experimental long-distance quantum secure direct communication

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

Quantum threat...and quantum solutions

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Security bounds for the eavesdropping collective attacks on general CV-QKD protocols

Light Sources and Interferometer Topologies - Introduction -

Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

arxiv:quant-ph/ v2 3 Oct 2000

arxiv: v2 [quant-ph] 17 Apr 2018

arxiv:quant-ph/ v1 10 Sep 2004

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Research, Development and Simulation of Quantum Cryptographic Protocols

Do we need quantum light to test quantum memory? M. Lobino, C. Kupchak, E. Figueroa, J. Appel, B. C. Sanders, Alex Lvovsky

arxiv: v2 [quant-ph] 4 Sep 2007

The Gouy phase shift in nonlinear interactions of waves

Transcription:

T. Eberle 1, V. Händchen 1, F. Furrer 2, T. Franz 3, J. Duhme 3, R.F. Werner 3, R. Schnabel 1 Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled Light (1) Institute for Gravitational Physics, Leibniz University Hannover and Max Planck Institute for Gravitational Physics (Albert Einstein Institute), Callinstr. 38, 30167 Hannover, Germany (2) Department of Physics, Graduate School of Science, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo, Japan, 113-0033 (3) Institute for Theoretical Physics, Leibniz University Hannover, Appelstraße 2, 30167 Hannover, Germany QCrypt 2013 August, 5th 2013

Continuous Variables QKD protocol requires two non-commuting observables Observables: Amplitude and Phase Quadrature of Light Fields Commutator: Wigner function of a vacuum state Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 2

Measurement of Field Quadratures Homodyne detection Phase of local oscillator with respect to signal determines measured quadrature Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 3

Entanglement based QKD Alice Entanglement Source Bob Simultaneous homodyne measurements at Alice and Bob Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 4

Why entanglement based CV QKD? Gaussian Modulation Only standard telecommunication components Amplitude, phase modulators, PIN photo diodes Security analysis for collective attacks includes finite-size effects Security analysis for arbitrary attacks including finite-size effects given in F. Furrer et al., Phys. Rev. Lett. 109, 100502 (2012). requires quadrature entanglement A. Leverrier et al., Phys.l Rev. A 81, 062343 (2010). 80 km distance reached P. Jouguet et al., Nature Photonics 7, 378 381 (2013). Compatibility with intense DWDM classical channels demonstrated Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 5

Outline Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled Light 1. Einstein-Podolsky Rosen (EPR) Entanglement 2. Continuous-Variable Quantum Key Distribution Generate a secure key under collective attacks Demonstrate the feasibility to have security under arbitrary attacks Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 6

Generation of Quadrature Entanglement Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 7

Experimental Setup > 10 db squeezing > 10 db squeezing Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 8

Results: EPR Entanglement Einstein-Podolsky-Rosen Entanglement: Reid, Phys. Rev. A 40, 913 (1989) Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 9

Results: EPR Entanglement Einstein-Podolsky-Rosen Entanglement: Reid, Phys. Rev. A 40, 913 (1989) Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 9

Outline Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled Light 1. Einstein-Podolsky Rosen (EPR) Entanglement 2. Continuous-Variable Quantum Key Distribution Generate a secure key under collective attacks Demonstrate the feasibility to have security under arbitrary attacks Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 10

Quantum Key Distribution Scheme Eve Entanglement Source Quantum Channel Bob Alice Alice Random choice of quadrature for each measurement Alice X X P X P P P X... Bob P P P X X P P X... Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 11

Random Quadrature Choice: Implementation Quantum part of QKD protocol: Measurement of 10 8-10 9 samples necessary Usual phase locks have unity gain frequencies < 1kHz How to achieve a rate of 100 khz? Fast phase actuator: Shifts phase by 0 or 90 with a rate of 100 khz Slow phase actuator: Compensates for drifts Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 12

Random Quadrature Choice: Implementation Low frequency lock averages over phase Problem: long sequences of X or P measurements Solution: Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 13

QKD Protocol 2) Sifting: Discard measurements in different quadratures 3) Binning Alice: Bob: 4) Channel Characterization Alice: Bob: 5) Error Correction Alice: N-k Bob: N-k bits disclosed to Eve N N N-k k N-k k Here: 64 bins Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 14

QKD Protocol 2) Sifting: Discard measurements in different quadratures 3) Binning Alice: Bob: 4) Channel Characterization Alice: Bob: 5) Error Correction Alice: N-k Bob: N-k bits disclosed to Eve N N N-k k N-k k Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 14

QKD Protocol 6) Calculate secure key length Use results from channel characterization Take into account 7) Privacy Amplification Alice: N-k Bob: N-k Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 15

Protocol Execution under Collective Attacks Measurement of 108 samples Bin measurement outcomes into 26 =64 intervals To use binary error correction a simple post selection technique was applied Generation of 1.5MB key using an error correction algorithm from AIT Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 16

Protocol Execution under Arbitrary Attacks Post selection not possible since it is not covered by the security proof Estimation of the necessary non-binary error correction efficiency Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 17

Protocol Execution under Arbitrary Attacks Post selection not possible since it is not covered by the security proof Estimation of the necessary non-binary error correction efficiency Error correction not implemented yet Poster: CV-QKD on Hannover campus: key generation and error correction Jörg Duhme, Kais Abdelkhalek, Rene Schwonnek, Fabian Furrer, and Reinhard F. Werner Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 17

Summary Einstein-Podolsky-Rosen Entanglement Generation of strong quadrature entanglement Quantum Key Distribution Generation of 1.5MB secret key under collective attacks Demonstrated feasibility of QKD under arbitrary attacks Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on EPR Entanglement Tobias Eberle 18