-
Entanglement distribution quantum networking within deployed telecommunications fibre-optic infrastructure
Authors:
Marcus J Clark,
Obada Alia,
Rui Wang,
Sima Bahrani,
Matej Peranic,
Djeylan Aktas,
George T Kanellos,
Martin Loncaric,
Zeljko Samec,
Anton Radman,
Mario Stipcevic,
Reza Nejabati,
Dimitra Simeonidou,
John G Rarity,
Siddarth K Joshi
Abstract:
Quantum networks have been shown to connect users with full-mesh topologies without trusted nodes. We present advancements on our scalable polarisation entanglement-based quantum network testbed, which has the ability to perform protocols beyond simple quantum key distribution. Our approach utilises wavelength multiplexing, which is ideal for quantum networks across local metropolitan areas due to…
▽ More
Quantum networks have been shown to connect users with full-mesh topologies without trusted nodes. We present advancements on our scalable polarisation entanglement-based quantum network testbed, which has the ability to perform protocols beyond simple quantum key distribution. Our approach utilises wavelength multiplexing, which is ideal for quantum networks across local metropolitan areas due to the ease of connecting additional users to the network without increasing the resource requirements per user. We show a 10 user fully connected quantum network with metropolitan scale deployed fibre links, demonstrating polarisation stability and the ability to generate secret keys over a period of 10.8 days with a network wide average-effective secret key rate of 3.38 bps.
△ Less
Submitted 10 February, 2023; v1 submitted 16 November, 2022;
originally announced November 2022.
-
Unconditionally secure digital signatures implemented in an 8-user quantum network
Authors:
Yoann Pelet,
Ittoop Vergheese Puthoor,
Natarajan Venkatachalam,
Sören Wengerowsky,
Martin Lončarić,
Sebastian Philipp Neumann,
Bo Liu,
Željko Samec,
Mario Stipčević,
Rupert Ursin,
Erika Andersson,
John G. Rarity,
Djeylan Aktas,
Siddarth Koduru Joshi
Abstract:
The ability to know and verifiably demonstrate the origins of messages can often be as important as encrypting the message itself. Here we present an experimental demonstration of an unconditionally secure digital signature (USS) protocol implemented for the first time, to the best of our knowledge, on a fully connected quantum network without trusted nodes. Our USS protocol is secure against forg…
▽ More
The ability to know and verifiably demonstrate the origins of messages can often be as important as encrypting the message itself. Here we present an experimental demonstration of an unconditionally secure digital signature (USS) protocol implemented for the first time, to the best of our knowledge, on a fully connected quantum network without trusted nodes. Our USS protocol is secure against forging, repudiation and messages are transferrable. We show the feasibility of unconditionally secure signatures using only bi-partite entangled states distributed throughout the network and experimentally evaluate the performance of the protocol in real world scenarios with varying message lengths.
△ Less
Submitted 10 February, 2022; v1 submitted 9 February, 2022;
originally announced February 2022.
-
Scalable authentication and optimal flooding in a quantum network
Authors:
Naomi R. Solomons,
Alasdair I. Fletcher,
Djeylan Aktas,
Natarajan Venkatachalam,
Sören Wengerowsky,
Martin Lončarić,
Sebastian P. Neumann,
Bo Liu,
Željko Samec,
Mario Stipčević,
Rupert Ursin,
Stefano Pirandola,
John G. Rarity,
Siddarth Koduru Joshi
Abstract:
The global interest in quantum networks stems from the security guaranteed by the laws of physics. Deploying quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network te…
▽ More
The global interest in quantum networks stems from the security guaranteed by the laws of physics. Deploying quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network test-bed, and discuss their usefulness with the aid of example use cases. First, an authentication transfer protocol to manage a fundamental limitation of quantum communication -- the need for a pre-shared key between every pair of users linked together on the quantum network. By temporarily trusting some intermediary nodes for a short period of time (<35 min in our network), we can generate and distribute these initial authentication keys with a very high level of security. Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.
△ Less
Submitted 21 June, 2023; v1 submitted 28 January, 2021;
originally announced January 2021.
-
Experimental implementation of secure anonymous protocols on an eight-user quantum network
Authors:
Zixin Huang,
Siddarth Koduru Joshi,
Djeylan Aktas,
Cosmo Lupo,
Armanda O. Quintavalle,
Natarajan Venkatachalam,
Sören Wengerowsky,
Martin Lončarić,
Sebastian Philipp Neumann,
Bo Liu,
Željko Samec,
Laurent Kling,
Mario Stipčević,
Rupert Ursin,
John G. Rarity
Abstract:
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications, often knowing who transmits a message to whom and when must also be kept hidden from an adversary. Here we experimentally demonstrate 5 information-theoretically secure anonymity protocols on an 8 user city-wide quantum network using polar…
▽ More
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications, often knowing who transmits a message to whom and when must also be kept hidden from an adversary. Here we experimentally demonstrate 5 information-theoretically secure anonymity protocols on an 8 user city-wide quantum network using polarisation-entangled photon pairs. At the heart of these protocols is anonymous broadcasting, which is a cryptographic primitive that allows one user to reveal one bit of information while keeping her identity anonymous. For a network of $n$ users, the protocols retain anonymity for the sender, given less than $n-2$ users are dishonest. This is one of the earliest implementations of genuine multi-user cryptographic protocols beyond standard QKD. Our anonymous protocols enhance the functionality of any fully-connected Quantum Key Distribution network without trusted nodes.
△ Less
Submitted 18 November, 2020;
originally announced November 2020.
-
A trusted-node-free eight-user metropolitan quantum communication network
Authors:
Siddarth Koduru Joshi,
Djeylan Aktas,
Sören Wengerowsky,
Martin Lončarić,
Sebastian Philipp Neumann,
Bo Liu,
Thomas Scheidl,
Guillermo Currás-Lorenzo,
Željko Samec,
Laurent Kling,
Alex Qiu,
Mohsen Razavi,
Mario Stipčević,
John G. Rarity,
Rupert Ursin
Abstract:
Quantum communication is rapidly gaining popularity due to its high security and technological maturity. However, most implementations are limited to just two communicating parties (users). Quantum communication networks aim to connect a multitude of users. Here we present a fully connected quantum communication network on a city wide scale without active switching or trusted nodes. We demonstrate…
▽ More
Quantum communication is rapidly gaining popularity due to its high security and technological maturity. However, most implementations are limited to just two communicating parties (users). Quantum communication networks aim to connect a multitude of users. Here we present a fully connected quantum communication network on a city wide scale without active switching or trusted nodes. We demonstrate simultaneous and secure connections between all 28 pairings of 8 users. Our novel network topology is easily scalable to many users, allows traffic management features and minimises the infrastructure as well as the user hardware needed.
△ Less
Submitted 11 September, 2020; v1 submitted 18 July, 2019;
originally announced July 2019.