-
Kramers-Kronig detection in the quantum regime
Authors:
Thomas Pousset,
Maxime Federico,
Romain Alléaume,
Nicolas Fabre
Abstract:
We investigate the quantization of the Kramers-Kronig (KK) detection technique, initially developed for classical coherent communications. This detection method involves combining the state of interest with a local oscillator on an unbalanced beamsplitter, followed by direct detection and digital signal processing. Intensity measurements in the case of spectrally engineered fields allow for the "d…
▽ More
We investigate the quantization of the Kramers-Kronig (KK) detection technique, initially developed for classical coherent communications. This detection method involves combining the state of interest with a local oscillator on an unbalanced beamsplitter, followed by direct detection and digital signal processing. Intensity measurements in the case of spectrally engineered fields allow for the "digital measurement" of the phase of classical and quantum fields. We show that, to the first order of the local oscillator's amplitude, KK detection is a Gaussian measurement that allows for the estimation of both quadratures of the electric field, similar to double homodyne detection. We study in detail how KK detection operates in the case of bosonic coherent states, pure single-mode and mixed states, as well as the nature of the phase information it measures. Finally, we propose an alternative spectral tomography technique for single-photon states inspired by KK detection.
△ Less
Submitted 30 July, 2024;
originally announced July 2024.
-
Hybrid Quantum Cryptography from Communication Complexity
Authors:
Francesco Mazzoncini,
Balthazar Bauer,
Peter Brown,
Romain Alléaume
Abstract:
We introduce an explicit construction for a key distribution protocol in the Quantum Computational Timelock (QCT) security model, where one assumes that computationally secure encryption may only be broken after a time much longer than the coherence time of available quantum memories.
Taking advantage of the QCT assumptions, we build a key distribution protocol called HM-QCT from the Hidden Matc…
▽ More
We introduce an explicit construction for a key distribution protocol in the Quantum Computational Timelock (QCT) security model, where one assumes that computationally secure encryption may only be broken after a time much longer than the coherence time of available quantum memories.
Taking advantage of the QCT assumptions, we build a key distribution protocol called HM-QCT from the Hidden Matching problem for which there exists an exponential gap in one-way communication complexity between classical and quantum strategies.
We establish that the security of HM-QCT against arbitrary i.i.d. attacks can be reduced to the difficulty of solving the underlying Hidden Matching problem with classical information. Legitimate users, on the other hand, can use quantum communication, which gives them the possibility of sending multiple copies of the same quantum state while retaining an information advantage. This leads to an everlasting secure key distribution scheme over $n$ bosonic modes. Such a level of security is unattainable with purely classical techniques. Remarkably, the scheme remains secure with up to $\mathcal{O}\big( \frac{\sqrt{n}}{\log(n)}\big)$ input photons for each channel use, extending the functionalities and potentially outperforming QKD rates by several orders of magnitudes.
△ Less
Submitted 27 November, 2023; v1 submitted 15 November, 2023;
originally announced November 2023.
-
Parallelizable Synthesis of Arbitrary Single-Qubit Gates with Linear Optics and Time-Frequency Encoding
Authors:
Antoine Henry,
Ravi Raghunathan,
Guillaume Ricard,
Baptiste Lefaucher,
Filippo Miatto,
Nadia Belabas,
Isabelle Zaquine,
Romain Alléaume
Abstract:
We propose novel methods for the exact synthesis of single-qubit unitaries with high success probability and gate fidelity, considering both time-bin and frequency-bin encodings. The proposed schemes are experimentally implementable with a spectral linear-optical quantum computation (S- LOQC) platform, composed of electro-optic phase modulators and phase-only programmable filters (pulse shapers).…
▽ More
We propose novel methods for the exact synthesis of single-qubit unitaries with high success probability and gate fidelity, considering both time-bin and frequency-bin encodings. The proposed schemes are experimentally implementable with a spectral linear-optical quantum computation (S- LOQC) platform, composed of electro-optic phase modulators and phase-only programmable filters (pulse shapers). We assess the performances in terms of fidelity and probability of the two simplest 3-components configurations for arbitrary gate generation in both encodings and give an exact analytical solution for the synthesis of an arbitrary single-qubit unitary in the time-bin encoding, using a single-tone Radio Frequency (RF) driving of the EOMs. We further investigate the parallelization of arbitrary single-qubit gates over multiple qubits with a compact experimental setup, both for spectral and temporal encodings. We systematically evaluate and discuss the impact of the RF bandwidth - that conditions the number of tones driving the modulators - and of the choice of encoding for different targeted gates. We moreover quantify the number of high fidelity Hadamard gates that can be synthesized in parallel, with minimal and increasing resources in terms of driving RF tones in a realistic system. Our analysis positions spectral S-LOQC as a promising platform to conduct massively parallel single qubit operations, with potential applications to quantum metrology and quantum tomography.
△ Less
Submitted 21 October, 2022;
originally announced October 2022.
-
Long-Range QKD without Trusted Nodes is Not Possible with Current Technology
Authors:
Bruno Huttner,
Romain Alléaume,
Eleni Diamanti,
Florian Fröwis,
Philippe Grangier,
Hannes Hübel,
Vicente Martin,
Andreas Poppe,
Joshua A. Slater,
Tim Spiller,
Wolfgang Tittel,
Benoit Tranier,
Adrian Wonfor,
Hugo Zbinden
Abstract:
A recently published patent (https://www.ipo.gov.uk/p-ipsum/Case/PublicationNumber/GB2590064) has claimed the development of a novel quantum key distribution protocol purporting to achieve long-range quantum security without trusted nodes and without use of quantum repeaters. Here we present a straightforward analysis of this claim, and reach the conclusion that it is largely unfounded.
A recently published patent (https://www.ipo.gov.uk/p-ipsum/Case/PublicationNumber/GB2590064) has claimed the development of a novel quantum key distribution protocol purporting to achieve long-range quantum security without trusted nodes and without use of quantum repeaters. Here we present a straightforward analysis of this claim, and reach the conclusion that it is largely unfounded.
△ Less
Submitted 16 December, 2022; v1 submitted 4 October, 2022;
originally announced October 2022.
-
Symbiotic joint operation of quantum and classical coherent communications
Authors:
Raphaël Aymeric,
Yves Jaouën,
Cédric Ware,
Romain Alléaume
Abstract:
We report successful joint operation of quantum and classical communications with shared hardware. Leveraging information learned from the classical DSP, low-noise quantum communications (0.009 SNU at 15 km) compatible with 15 Mbit/s QKD is demonstrated.
We report successful joint operation of quantum and classical communications with shared hardware. Leveraging information learned from the classical DSP, low-noise quantum communications (0.009 SNU at 15 km) compatible with 15 Mbit/s QKD is demonstrated.
△ Less
Submitted 14 February, 2022;
originally announced February 2022.
-
Experimental vulnerability analysis of QKD based on attack ratings
Authors:
Rupesh Kumar,
Francesco Mazzoncini,
Hao Qin,
Romain Alléaume
Abstract:
Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of CV-QKD against saturation attacks, for two different attack strategies. The first strategy relies on inducing detector saturation by performing a l…
▽ More
Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of CV-QKD against saturation attacks, for two different attack strategies. The first strategy relies on inducing detector saturation by performing a large coherent displacement. This strategy is experimentally challenging and therefore translates into a high attack rating. We also propose and experimentally demonstrate a second attack strategy that simply consists in saturating the detector with an external laser. The low rating we obtain indicates that this attack constitutes a primary threat for practical CV-QKD systems. These results highlight the benefits of combining theoretical security considerations with vulnerability analysis based on attack ratings, in order to guide the design and engineering of practical QKD systems towards the highest possible security standards.
△ Less
Submitted 18 December, 2020; v1 submitted 15 October, 2020;
originally announced October 2020.
-
Technology Trends for Mixed QKD/WDM Transmission up to 80 km
Authors:
Romain Alléaume,
Raphaël Aymeric,
Cédric Ware,
Yves Jaouën
Abstract:
We give a survey of some of the recent progress made in deploying quantum and classical communications over a shared fiber, focusing in particular on results obtained using continuous-variable QKD.
We give a survey of some of the recent progress made in deploying quantum and classical communications over a shared fiber, focusing in particular on results obtained using continuous-variable QKD.
△ Less
Submitted 5 May, 2020;
originally announced May 2020.
-
Everlasting Secure Key Agreement with performance beyond QKD in a Quantum Computational Hybrid security model
Authors:
Nilesh Vyas,
Romain Alleaume
Abstract:
Extending the functionality and overcoming the performance limitation under which QKD can operate requires either quantum repeaters or new security models. Investigating the latter option, we introduce the \textit{Quantum Computational Hybrid} (QCH) security model, where we assume that computationally secure encryption may only be broken after time much longer than the coherence time of available…
▽ More
Extending the functionality and overcoming the performance limitation under which QKD can operate requires either quantum repeaters or new security models. Investigating the latter option, we introduce the \textit{Quantum Computational Hybrid} (QCH) security model, where we assume that computationally secure encryption may only be broken after time much longer than the coherence time of available quantum memories. We propose an explicit $d$-dimensional key distribution protocol, that we call MUB-\textit{Quantum Computational Timelock} (MUB-QCT) where one bit is encoded on a qudit state chosen among $d+1$ mutually unbiased bases (MUBs). Short-term-secure encryption is used to share the basis information with legitimate users while keeping it unknown from Eve until after her quantum memory decoheres. This allows reducing Eve's optimal attack to an immediate measurement followed by post-measurement decoding. \par We demonstrate that MUB-QCT enables everlasting secure key distribution with input states containing up to $O(\sqrt{d})$ photons. This leads to a series of important improvements when compared to QKD: on the functional side, the ability to operate securely between one sender and many receivers, whose implementation can moreover be untrusted; significant performance increase, characterized by a $O(\sqrt{d})$ multiplication of key rates and an extension by $25 {\rm} km \times \log(d)$ of the attainable distance over fiber. Implementable with a large number of modes with current or near-term multimode photonics technologies, the MUB-QCT construction has the potential to provide a radical shift to the performance and practicality of quantum key distribution.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
Homodyne-detector-blinding attack in continuous-variable quantum key distribution
Authors:
Hao Qin,
Rupesh Kumar,
Vadim Makarov,
Romain Alléaume
Abstract:
We propose an efficient strategy to attack a continuous-variable quantum key distribution (CV-QKD) system, that we call homodyne detector blinding. This attack strategy takes advantage of a generic vulnerability of homodyne receivers: a bright light pulse sent on the signal port can lead to a saturation of the detector electronics. While detector saturation has already been proposed to attack CV-Q…
▽ More
We propose an efficient strategy to attack a continuous-variable quantum key distribution (CV-QKD) system, that we call homodyne detector blinding. This attack strategy takes advantage of a generic vulnerability of homodyne receivers: a bright light pulse sent on the signal port can lead to a saturation of the detector electronics. While detector saturation has already been proposed to attack CV-QKD, the attack we study in this paper has the additional advantage of not requiring an eavesdropper to be phase locked with the homodyne receiver. We show that under certain conditions, an attacker can use a simple laser, incoherent with the homodyne receiver, to generate bright pulses and bias the excess noise to arbitrary small values, fully comprising CV-QKD security. These results highlight the feasibility and the impact of the detector blinding attack. We finally discuss how to design countermeasures in order to protect against this attack.
△ Less
Submitted 5 July, 2018; v1 submitted 4 May, 2018;
originally announced May 2018.
-
Self-coherent phase reference sharing for continuous-variable quantum key distribution
Authors:
Adrien Marie,
Romain Alléaume
Abstract:
Generating "locally" the local oscillator is a fundamental requirement for continous-variable quantum key distribution (CV-QKD), both for performance and security reasons. As a consequence, next-generation CV- QKD systems will have to be implemented with a local local oscillator (LLO). This issue has been explicitly tackled in recent works, where the proposed and implemented approach, that we call…
▽ More
Generating "locally" the local oscillator is a fundamental requirement for continous-variable quantum key distribution (CV-QKD), both for performance and security reasons. As a consequence, next-generation CV- QKD systems will have to be implemented with a local local oscillator (LLO). This issue has been explicitly tackled in recent works, where the proposed and implemented approach, that we call LLO-sequential, consists in sequentially (temporally) multiplexing quantum signal optical pulses with phase reference pilot tones optical pulses. We develop a comprehensive analysis of the noise model and the hardware requirements in order to perform LLO CV-QKD. This analysis allows to quantitatively understand one of the limits of CV-QKD implemented with the LLO-sequential approach: such systems, unless operated at very high speed, have very strong requirements in terms of tolerable laser phase noise. LLO-sequential CV-QKD can thus in practice only be implemented with expensive, low phase noise lasers, such as ECL lasers. The main contribution of this work is to introduce designs for LLO CV-QKD based on self-coherence phase sharing, in which the phase reference information and the quantum information are coherently obtained from a single optical wavefront. We propose in particular a design, called LLO-displacement, where the phase reference information is encoded in the displacement of the standard CV-QKD Gaussian modulated coherent state (GMCS) protocol. We analyze the performance and the hardware requirements of the LLO-displacement design and our results indicate that it can be used to perform CV-QKD over distances up to 100 km with realistic and affordable hardware, in particular with standard telecom equipment and low cost DFB lasers. This opens a practical path towards the development of coherent quantum communications systems compatible with next-generation networks requirements.
△ Less
Submitted 30 August, 2016; v1 submitted 11 May, 2016;
originally announced May 2016.
-
Quantum hacking: saturation attack on practical continuous-variable quantum key distribution
Authors:
Hao Qin,
Rupesh Kumar,
Romain Alléaume
Abstract:
We identify and study a new security loophole in continuous-variable quantum key distribution (CV-QKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent state CV-QKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on…
▽ More
We identify and study a new security loophole in continuous-variable quantum key distribution (CV-QKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent state CV-QKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CV-QKD.We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criteria imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible counter-measures against the saturation attack and propose a new counter- measure based on Gaussian post-selection that can be implemented by classical post-processing and may allow to distill secret key when the raw measurement data is partly saturated.
△ Less
Submitted 3 November, 2015;
originally announced November 2015.
-
Coexistence of continuous variable QKD with intense DWDM classical channels
Authors:
Rupesh Kumar,
Hao Qin,
Romain Alléaume
Abstract:
We demonstrate experimentally the feasibility of continuous variable quantum key distribution (CV-QKD) in dense-wavelength-division multiplexing networks (DWDM), where QKD will typically have to coexist with several co- propagating (forward or backward) C-band classical channels whose launch power is around 0dBm. We have conducted experimental tests of the coexistence of CV-QKD multiplexed with an…
▽ More
We demonstrate experimentally the feasibility of continuous variable quantum key distribution (CV-QKD) in dense-wavelength-division multiplexing networks (DWDM), where QKD will typically have to coexist with several co- propagating (forward or backward) C-band classical channels whose launch power is around 0dBm. We have conducted experimental tests of the coexistence of CV-QKD multiplexed with an intense classical channel, for different input powers and different DWDM wavelengths. Over a 25km fiber, a CV-QKD operated over the 1530.12nm channel can tolerate the noise arising from up to 11.5dBm classical channel at 1550.12nm in forward direction (9.7dBm in backward). A positive key rate (0.49kb/s) can be obtained at 75km with classical channel power of respectively -3dBm and -9dBm in forward and backward. Based on these measurements, we have also simulated the excess noise and optimized channel allocation for the integration of CV-QKD in some access networks. We have, for example, shown that CV-QKD could coexist with 5 pairs of channels (with nominal input powers: 2dBm forward and 1dBm backward) over a 25km WDM-PON network. The obtained results demonstrate the outstanding capacity of CV-QKD to coexist with classical signals of realistic intensity in optical networks.
△ Less
Submitted 12 March, 2015; v1 submitted 3 December, 2014;
originally announced December 2014.
-
Simple performance evaluation of pulsed spontaneous parametric down-conversion sources for quantum communications
Authors:
Jean-Loup Smirr,
Sylvain Guilbaud,
Joe Ghalbouni,
Robert Frey,
Eleni Diamanti,
Romain Alleaume,
Isabelle Zaquine
Abstract:
Fast and complete characterization of pulsed spontaneous parametric down conversion (SPDC) sources is important for applications in quantum information processing and communications. We propose a simple method to perform this task, which only requires measuring the counts on the two output channels and the coincidences between them, as well as modeling the filter used to reduce the source bandwidt…
▽ More
Fast and complete characterization of pulsed spontaneous parametric down conversion (SPDC) sources is important for applications in quantum information processing and communications. We propose a simple method to perform this task, which only requires measuring the counts on the two output channels and the coincidences between them, as well as modeling the filter used to reduce the source bandwidth. The proposed method is experimentally tested and used for a complete evaluation of SPDC sources (pair emission probability, total losses, and fidelity) of different bandwidths. This method can find applications in the setting up of SPDC sources and in the continuous verification of the quality of quantum communication links.
△ Less
Submitted 4 October, 2012;
originally announced October 2012.
-
Field Test of Classical Symmetric Encryption with Continuous Variable Quantum Key Distribution
Authors:
Paul Jouguet,
Sébastien Kunz-Jacques,
Thierry Debuisschert,
Simon Fossier,
Eleni Diamanti,
Romain Alléaume,
Rosa Tualle-Brouri,
Philippe Grangier,
Anthony Leverrier,
Philippe Pache,
Philippe Painchault
Abstract:
We report on the design and performance of a point-to-point classical symmetric encryption link with fast key renewal provided by a Continuous Variable Quantum Key Distribution (CVQKD) system. Our system was operational and able to encrypt point-to-point communications during more than six months, from the end of July 2010 until the beginning of February 2011. This field test was the first demonst…
▽ More
We report on the design and performance of a point-to-point classical symmetric encryption link with fast key renewal provided by a Continuous Variable Quantum Key Distribution (CVQKD) system. Our system was operational and able to encrypt point-to-point communications during more than six months, from the end of July 2010 until the beginning of February 2011. This field test was the first demonstration of the reliability of a CVQKD system over a long period of time in a server room environment. This strengthens the potential of CVQKD for information technology security infrastructure deployments.
△ Less
Submitted 13 March, 2012; v1 submitted 18 January, 2012;
originally announced January 2012.
-
Optimal eavesdropping on QKD without quantum memory
Authors:
Aurélien Bocquet,
Anthony Leverrier,
Romain Alléaume
Abstract:
We consider the security of the BB84, six-state and SARG04 quantum key distribution protocols when the eavesdropper doesn't have access to a quantum memory. In this case, Eve's most general strategy is to measure her ancilla with an appropriate POVM designed to take advantage of the post-measurement information that will be released during the sifting phase of the protocol. After an optimization o…
▽ More
We consider the security of the BB84, six-state and SARG04 quantum key distribution protocols when the eavesdropper doesn't have access to a quantum memory. In this case, Eve's most general strategy is to measure her ancilla with an appropriate POVM designed to take advantage of the post-measurement information that will be released during the sifting phase of the protocol. After an optimization on all the parameters accessible to Eve, our method provides us with new bounds for the security of six-state and SARG04 against a memoryless adversary. In particular, for the six-state protocol we show that the maximum QBER for which a secure key can be extracted is increased from 12.6% (for collective attacks) to 20.4% with the memoryless assumption.
△ Less
Submitted 27 July, 2011; v1 submitted 1 June, 2011;
originally announced June 2011.
-
Controlling single diamond NV color center photoluminescence spectrum with a Fabry-Perot microcavity
Authors:
Yannick Dumeige,
Romain Alléaume,
Philippe Grangier,
François Treussart,
Jean-François Roch
Abstract:
We present both theoretical and experimental results on fluorescence of single defect centers in diamond nanocrystals embedded in a planar dielectric microcavity. From a theoretical point of view, we show that the overall fluorescence collection efficiency using moderate numerical aperture microscope objective can be enhanced by using a low quality factor microcavity. This could be used in particu…
▽ More
We present both theoretical and experimental results on fluorescence of single defect centers in diamond nanocrystals embedded in a planar dielectric microcavity. From a theoretical point of view, we show that the overall fluorescence collection efficiency using moderate numerical aperture microscope objective can be enhanced by using a low quality factor microcavity. This could be used in particular for low temperature applications where the numerical aperture of collection microscope objectives is limited due to the experimental constraints. We experimentally investigate the control of the fluorescence spectrum of the emitted light from a single center. We show the simultaneous narrowing of the room temperature broadband emission spectrum and the increase of the fluorescence spectral density.
△ Less
Submitted 5 October, 2010;
originally announced October 2010.
-
Security of Trusted Repeater Quantum Key Distribution Networks
Authors:
Louis Salvail,
Momtchil Peev,
Eleni Diamanti,
Romain Alleaume,
Norbert Lutkenhaus,
Thomas Laenger
Abstract:
A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security. In this paper we study security properties of QKD networks based on trusted repeater nodes. Such networks can already be deployed, based on current technology. We present an example of a trusted repeater QKD network, developed w…
▽ More
A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security. In this paper we study security properties of QKD networks based on trusted repeater nodes. Such networks can already be deployed, based on current technology. We present an example of a trusted repeater QKD network, developed within the SECOQC project.
The main focus is put on the study of secure key agreement over a trusted repeater QKD network, when some nodes are corrupted. We propose an original method, able to ensure the authenticity and privacy of the generated secret keys.
△ Less
Submitted 26 April, 2009;
originally announced April 2009.
-
Topological optimization of quantum key distribution networks
Authors:
Romain Alleaume,
Francois Roueff,
Eleni Diamanti,
Norbert Lutkenhaus
Abstract:
A Quantum Key Distribution (QKD) network is an infrastructure that allows the realization of the key distribution cryptographic primitive over long distances and at high rates with information-theoretic security. In this work, we consider QKD networks based on trusted repeaters from a topology viewpoint, and present a set of analytical models that can be used to optimize the spatial distribution…
▽ More
A Quantum Key Distribution (QKD) network is an infrastructure that allows the realization of the key distribution cryptographic primitive over long distances and at high rates with information-theoretic security. In this work, we consider QKD networks based on trusted repeaters from a topology viewpoint, and present a set of analytical models that can be used to optimize the spatial distribution of QKD devices and nodes in specific network configurations in order to guarantee a certain level of service to network users, at a minimum cost. We give details on new methods and original results regarding such cost minimization arguments applied to QKD networks. These results are likely to become of high importance when the deployment of QKD networks will be addressed by future quantum telecommunication operators. They will therefore have a strong impact on the design and requirements of the next generation of QKD devices.
△ Less
Submitted 4 March, 2009;
originally announced March 2009.
-
Efficient reconciliation protocol for discrete-variable quantum key distribution
Authors:
David Elkouss,
Anthony Leverrier,
Romain Alléaume,
Joseph Boutros
Abstract:
Reconciliation is an essential part of any secret-key agreement protocol and hence of a Quantum Key Distribution (QKD) protocol, where two legitimate parties are given correlated data and want to agree on a common string in the presence of an adversary, while revealing a minimum amount of information.
In this paper, we show that for discrete-variable QKD protocols, this problem can be advantag…
▽ More
Reconciliation is an essential part of any secret-key agreement protocol and hence of a Quantum Key Distribution (QKD) protocol, where two legitimate parties are given correlated data and want to agree on a common string in the presence of an adversary, while revealing a minimum amount of information.
In this paper, we show that for discrete-variable QKD protocols, this problem can be advantageously solved with Low Density Parity Check (LDPC) codes optimized for the BSC. In particular, we demonstrate that our method leads to a significant improvement of the achievable secret key rate, with respect to earlier interactive reconciliation methods used in QKD.
△ Less
Submitted 14 January, 2009;
originally announced January 2009.
-
Multidimensional reconciliation for continuous-variable quantum key distribution
Authors:
Anthony Leverrier,
Romain Alléaume,
Joseph Boutros,
Gilles Zémor,
Philippe Grangier
Abstract:
We propose a method for extracting an errorless secret key in a continuous-variable quantum key distribution protocol, which is based on Gaussian modulation of coherent states and homodyne detection. The crucial feature is an eight-dimensional reconciliation method, based on the algebraic properties of octonions. Since the protocol does not use any postselection, it can be proven secure against…
▽ More
We propose a method for extracting an errorless secret key in a continuous-variable quantum key distribution protocol, which is based on Gaussian modulation of coherent states and homodyne detection. The crucial feature is an eight-dimensional reconciliation method, based on the algebraic properties of octonions. Since the protocol does not use any postselection, it can be proven secure against arbitrary collective attacks, by using well-established theorems on the optimality of Gaussian attacks. By using this new coding scheme with an appropriate signal to noise ratio, the distance for secure continuous-variable quantum key distribution can be significantly extended.
△ Less
Submitted 3 July, 2008; v1 submitted 21 December, 2007;
originally announced December 2007.
-
Using quantum key distribution for cryptographic purposes: a survey
Authors:
Romain Alléaume,
Cyril Branciard,
Jan Bouda,
Thierry Debuisschert,
Mehrdad Dianati,
Nicolas Gisin,
Mark Godfrey,
Philippe Grangier,
Thomas Langer,
Norbert Lutkenhaus,
Christian Monyk,
Philippe Painchault,
Momtchil Peev,
Andreas Poppe,
Thomas Pornin,
John Rarity,
Renato Renner,
Gregoire Ribordy,
Michel Riguidel,
Louis Salvail,
Andrew Shields,
Harald Weinfurter,
Anton Zeilinger
Abstract:
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the…
▽ More
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.
△ Less
Submitted 4 December, 2014; v1 submitted 23 January, 2007;
originally announced January 2007.
-
Quantum states characterization for the zero-error capacity
Authors:
Rex A C Medeiros,
Romain Alleaume,
Gerard Cohen,
Francisco M. de Assis
Abstract:
The zero-error capacity of quantum channels was defined as the least upper bound of rates at which classical information can be transmitted through a quantum channel with probability of error equal to zero. This paper investigates some properties of input states and measurements used to attain the quantum zero-error capacity. We start by reformulating the problem of finding the zero-error capaci…
▽ More
The zero-error capacity of quantum channels was defined as the least upper bound of rates at which classical information can be transmitted through a quantum channel with probability of error equal to zero. This paper investigates some properties of input states and measurements used to attain the quantum zero-error capacity. We start by reformulating the problem of finding the zero-error capacity in the language of graph theory. This alternative definition is used to prove that the zero-error capacity of any quantum channel can be reached by using tensor products of pure states as channel inputs, and projective measurements in the channel output. We conclude by presenting an example that illustrates our results.
△ Less
Submitted 8 November, 2006; v1 submitted 3 November, 2006;
originally announced November 2006.
-
Architecture of the Secoqc Quantum Key Distribution network
Authors:
Mehrdad Dianati,
Romain Alleaume
Abstract:
The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.
The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.
△ Less
Submitted 25 October, 2006; v1 submitted 23 October, 2006;
originally announced October 2006.
-
Experimental open air quantum key distribution with a single photon source
Authors:
Romain Alleaume,
Francois Treussart,
Gaetan Messin,
Yannick Dumeige,
Jean-Francois Roch,
Alexios Beveratos,
Rosa Brouri-Tualle,
Jean-Philippe Poizat,
Philippe Grangier
Abstract:
We present a full implementation of a quantum key distribution (QKD) system with a single photon source, operating at night in open air. The single photon source at the heart of the functional and reliable setup relies on the pulsed excitation of a single nitrogen-vacancy color center in diamond nanocrystal. We tested the effect of attenuation on the polarized encoded photons for inferring longe…
▽ More
We present a full implementation of a quantum key distribution (QKD) system with a single photon source, operating at night in open air. The single photon source at the heart of the functional and reliable setup relies on the pulsed excitation of a single nitrogen-vacancy color center in diamond nanocrystal. We tested the effect of attenuation on the polarized encoded photons for inferring longer distance performance of our system. For strong attenuation, the use of pure single photon states gives measurable advantage over systems relying on weak attenuated laser pulses. The results are in good agreement with theoretical models developed to assess QKD security.
△ Less
Submitted 17 February, 2004;
originally announced February 2004.
-
Photon statistics characterization of a single photon source
Authors:
Romain Alleaume,
Francois Treussart,
Jean-Michel Courty,
Jean-Francois Roch
Abstract:
n a recent experiment, we reported the time-domain intensity noise measurement of a single photon source relying on single molecule fluorescence control. In this article we present data processing, starting from photocount timestamps. The theoretical analytical expression of the time-dependent Mandel parameter Q(T) of an intermittent single photon source is derived from ON<->OFF dynamics . Final…
▽ More
n a recent experiment, we reported the time-domain intensity noise measurement of a single photon source relying on single molecule fluorescence control. In this article we present data processing, starting from photocount timestamps. The theoretical analytical expression of the time-dependent Mandel parameter Q(T) of an intermittent single photon source is derived from ON<->OFF dynamics . Finally, source intensity noise analysis using the Mandel parameter is quantitatively compared to the usual approach relying on the time autocorrelation function, both methods yielding the same molecular dynamical parameters.
△ Less
Submitted 9 December, 2003;
originally announced December 2003.
-
Direct Measurement of the Photon Statistics of a Triggered Single Photon Source
Authors:
F. Treussart,
R. Alleaume,
V. Le Floc'h,
L. T. Xiao,
J. -M Courty,
J. -F. Roch
Abstract:
We studied intensity fluctuations of a single photon source relying on the pulsed excitation of the fluorescence of a single molecule at room temperature. We directly measured the Mandel parameter Q(T) over 4 orders of magnitude of observation timescale T, by recording every photocount. On timescale of a few excitation periods, subpoissonian statistics is clearly observed and the probablility of…
▽ More
We studied intensity fluctuations of a single photon source relying on the pulsed excitation of the fluorescence of a single molecule at room temperature. We directly measured the Mandel parameter Q(T) over 4 orders of magnitude of observation timescale T, by recording every photocount. On timescale of a few excitation periods, subpoissonian statistics is clearly observed and the probablility of two-photons events is 10 times smaller than Poissonian pulses. On longer times, blinking in the fluorescence, due to the molecular triplet state, produces an excess of noise.
△ Less
Submitted 22 February, 2002;
originally announced February 2002.