skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Provably secure and high-rate quantum key distribution with time-bin qudits

Abstract

The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.

Authors:
ORCiD logo [1]; ORCiD logo [2]; ORCiD logo [1]; ORCiD logo [3]; ORCiD logo [4]
  1. Duke Univ., Durham, NC (United States)
  2. Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); National Univ. of Singapore (Singapore)
  3. Duke Univ., Durham, NC (United States); IonQ Inc., College Park, MD (United States)
  4. The Ohio State Univ., Columbus, OH (United States)
Publication Date:
Research Org.:
Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1410948
Grant/Contract Number:
AC05-00OR22725
Resource Type:
Journal Article: Accepted Manuscript
Journal Name:
Science Advances
Additional Journal Information:
Journal Volume: 3; Journal Issue: 11; Journal ID: ISSN 2375-2548
Publisher:
AAAS
Country of Publication:
United States
Language:
English
Subject:
71 CLASSICAL AND QUANTUM MECHANICS, GENERAL PHYSICS

Citation Formats

Islam, Nurul T., Lim, Charles Ci Wen, Cahall, Clinton, Kim, Jungsang, and Gauthier, Daniel J. Provably secure and high-rate quantum key distribution with time-bin qudits. United States: N. p., 2017. Web. doi:10.1126/sciadv.1701491.
Islam, Nurul T., Lim, Charles Ci Wen, Cahall, Clinton, Kim, Jungsang, & Gauthier, Daniel J. Provably secure and high-rate quantum key distribution with time-bin qudits. United States. doi:10.1126/sciadv.1701491.
Islam, Nurul T., Lim, Charles Ci Wen, Cahall, Clinton, Kim, Jungsang, and Gauthier, Daniel J. 2017. "Provably secure and high-rate quantum key distribution with time-bin qudits". United States. doi:10.1126/sciadv.1701491. https://www.osti.gov/servlets/purl/1410948.
@article{osti_1410948,
title = {Provably secure and high-rate quantum key distribution with time-bin qudits},
author = {Islam, Nurul T. and Lim, Charles Ci Wen and Cahall, Clinton and Kim, Jungsang and Gauthier, Daniel J.},
abstractNote = {The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.},
doi = {10.1126/sciadv.1701491},
journal = {Science Advances},
number = 11,
volume = 3,
place = {United States},
year = 2017,
month =
}

Journal Article:
Free Publicly Available Full Text
Publisher's Version of Record

Save / Share:
  • We demonstrate a quantum time distribution (QTD) method that combines the precision of optical timing techniques with the integrity of quantum key distribution (QKD). Critical infrastructure is dependent on microprocessor- and programmable logic-based monitoring and control systems. The distribution of timing information across the electric grid is accomplished by GPS signals which are known to be vulnerable to spoofing. We demonstrate a method for synchronizing remote clocks based on the arrival time of photons in a modifed QKD system. This has the advantage that the signal can be veried by examining the quantum states of the photons similar to QKD.
  • No abstract prepared.
  • We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions suchmore » an equivalence is generally no longer valid.« less
  • We investigate the error tolerance of quantum cryptographic protocols using d-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical communication. For arbitrary quantum channels, we obtain a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels, yields an analytic expression for the maximally tolerable error rate of the cryptographic protocols under consideration. The difference between the tolerable error rate and its theoretical upper bound tends slowly to zero for sufficiently large dimensions of the information carriers.
  • Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol,more » andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.« less