43,128 research outputs found

    Implementation of Quantum Key Distribution Protocols

    Get PDF
    As a wide spectrum of the human activity rapidly transitions to a digital environment, the need for secure and efficient communication intensifies. The currently used public key distribution cryptosystems, such as the Rivest-Shamir-Adleman (RSA) protocol, source their security from the computational difficulty of certain mathematical problems. While widely successful, the security these cryptosystems offer remains heuristic and the development of Quantum computers may render them obsolete. The security that Quantum Key Distribution (QKD) guarantees, stems not from the mathematical complexity of the encryption algorithms but from the laws of Quantum Physics. Implementations of QKD protocols, however, rely on imperfect instruments and devices for information encoding, transmission and detection. Device imperfections limit the rate of information exchange and introduce vulnerabilities which can be exploited by a potential eavesdropper. This work explores practical aspects of QKD as it matures beyond proof-of-principle experiments, focusing on the Measurement Device Independent - QKD, a novel Quantum Communication protocol that offers an exceptional balance between security and efficiency. At the heart of the MDI-QKD lies the Hong-Ou-Mandel (HOM) interference which characterizes the indistinguishability of the photon states that the communicating parties independently send. This study examines the HOM interference in a realistic lab environment and concludes that exceptional interference visibility can be achieved using typical commercially available optical devices and detectors, further demonstrating the applicability of the MDI-QKD protocol. An important limiting factor for every Quantum Communication protocol is the transmission medium. Fiber - based optical networks suffer significant losses that prohibit Quantum Communication beyond metropolitan scales. While Free Space communication is an attractive alternative for long distance communication, is susceptible to losses due to the atmospheric Turbulence of the channel. As a means to improve the key generation efficiency, this work examines and experimentally demonstrates the Prefixed-Threshold Real Time Selection (P-RTS) scheme, which improves the free-space communication efficiency by rejecting detections that occur while the channel transmittance drops below a predetermined threshold

    Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

    Full text link
    The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.Comment: 21 pages, 2 figures, 1 tabl

    Energy efficient mining on a quantum-enabled blockchain using light

    Full text link
    We outline a quantum-enabled blockchain architecture based on a consortium of quantum servers. The network is hybridised, utilising digital systems for sharing and processing classical information combined with a fibre--optic infrastructure and quantum devices for transmitting and processing quantum information. We deliver an energy efficient interactive mining protocol enacted between clients and servers which uses quantum information encoded in light and removes the need for trust in network infrastructure. Instead, clients on the network need only trust the transparent network code, and that their devices adhere to the rules of quantum physics. To demonstrate the energy efficiency of the mining protocol, we elaborate upon the results of two previous experiments (one performed over 1km of optical fibre) as applied to this work. Finally, we address some key vulnerabilities, explore open questions, and observe forward--compatibility with the quantum internet and quantum computing technologies.Comment: 25 pages, 5 figure
    • …
    corecore