36 research outputs found
High-rate quantum cryptography in untrusted networks
We extend the field of continuous-variable quantum cryptography to a network
formulation where two honest parties connect to an untrusted relay by insecure
quantum links. To generate secret correlations, they transmit coherent states
to the relay where a continuous-variable Bell detection is performed and the
outcome broadcast. Even though the detection could be fully corrupted and the
links subject to optimal coherent attacks, the honest parties can still extract
a secret key, achieving high rates when the relay is proximal to one party, as
typical in public networks with access points or proxy servers. Our theory is
confirmed by an experiment generating key-rates which are orders of magnitude
higher than those achievable with discrete-variable protocols. Thus, using the
cheapest possible quantum resources, we experimentally show the possibility of
high-rate quantum key distribution in network topologies where direct links are
missing between end-users and intermediate relays cannot be trusted.Comment: Theory and Experiment. Main article (6 pages) plus Supplementary
Information (additional 13 pages
Quantum key distribution with hacking countermeasures and long term field trial
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered
Multimode interferometry for entangling atoms in quantum networks
We bring together a cavity-enhanced light–matter interface with a multimode interferometer (MMI) integrated onto a photonic chip and demonstrate the potential of such hybrid systems to tailor distributed entanglement in a quantum network. The MMI is operated with pairs of narrowband photons produced a priori deterministically from a single 87Rb atom strongly coupled to a high-finesse optical cavity. Non-classical coincidences between photon detection events show no loss of coherence when interfering pairs of these photons through the MMI in comparison to the two-photon visibility directly measured using Hong–Ou–Mandel interference on a beam splitter. This demonstrates the ability of integrated multimode circuits to mediate the entanglement of remote stationary nodes in a quantum network interlinked by photonic qubits
Quantum logic with cavity photons from single atoms
We demonstrate quantum logic using narrow linewidth photons that are produced with an a-priory non-probabilistic scheme from a single 87Rb atom strongly coupled to a high- nesse cavity. We use a controlled-NOT gate integrated into a photonic chip to entangle these photons, and we observe non-classical correlations between photon detection events separated by periods exceeding the travel time across the chip by three orders of magnitude. This enables quantum technology that will use the properties of both narrowband single photon sources and integrated quantum photonics.</p