12 research outputs found
Continuous Variable Quantum Key Distribution over Long Distances
Quantum key distribution (QKD) is fundamentally different from most classical key distribution schemes, such as Diffie-Hellman key exchange, in the sense that no computational complexity assumption is required on the power of adversaries to prove its security. QKD relies on basic laws of quantum physics and it is proven that it can enable highly secure data communication. Such achievements, however, are facing technological problems that have to be resolved in order to provide a viable solution to a large group of customers. While there are discrete-variable QKD schemes, which rely on encoding data in discrete degrees of freedom, such as polarization of single photons, in this thesis, we focus on the continuous-variable QKD (CV-QKD) protocols, in which data is encoded on the quadratures of light. Currently, one of the major drawbacks of CV-QKD is its poor performance at long distances. Nevertheless, such a limitation in CV-QKD can be overcome with the assistance of quantum repeaters that rely on entanglement distillation via noiseless linear amplifiers (NLAs). Such systems can, in principle, offer large secret key rates over long distances. In this thesis, we aim to provide a realistic analysis of a CV-QKD protocol running over quantum scissors (QSs) as realistic NLAs. We will report the obstacles that one could face in realizing CV-QKD in such a scenario. A review of CV-QKD and QS-based NLAs will be given, based on which QS-assisted CV-QKD is proposed. We, particularly, focus on the modelling of the QSs' structure and their effect on the secret key rate aiming to find operational regimes where the performance of the QKD scheme is enhanced. This study paves the way for implementing long-distance CV-QKD protocols that rely on QS/NLA devices over CV quantum repeaters.
In this thesis, we also consider and account for a realistic analysis of a CV-QKD protocol with non-Gaussian modulation, which is assisted by the means of QSs. We will show that, while we have to deal with similar obstacles as in the Gaussian modulation, we can potentially improve performance of the non-Gaussian modulation protocol.
As an alternative approach to extend the secure distance of CV-QKD protocols, the last part of this thesis is devoted to presenting realistic threat models for satellite QKD, wherein we consider several eavesdropping scenarios by limiting eavesdroppers' access to the trusted ground and/or satellite stations. In such scenarios, the eavesdropper has only limited access to the sender and/or receiver stations.
For example, we will explore the case where an eavesdropper can only receive an attenuated version of the transmitted signals. As well, we will focus on the case where Eve's signals would reach the receiver via a lossy channel inaccessible to the eavesdropper. We show that, in the case of both Gaussian and non-Gaussian protocols, this limitation would allow trusted parties to achieve higher key rates than what can be achieved when unrestricted eavesdropping is possible
Capacity-approaching quantum repeaters for quantum communications
In present-day quantum communications, one of the main problems is the lack of a quantum repeater design that can simultaneously secure high rates and long distances. Recent literature has established the end-to-end capacities that are achievable by the most general protocols for quantum and private communication within a quantum network, encompassing the case of a quantum repeater chain. However, whether or not a physical design exists to approach such capacities remains a challenging objective. Driven by this motivation, in this work, we put forward a design for continuous-variable quantum repeaters and show that it can actually achieve the feat. We also show that even in a noisy regime our rates surpass the Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound. Our repeater setup is developed upon using noiseless linear amplifiers, quantum memories, and continuous-variable Bell measurements. We, furthermore, propose a non-ideal model for continuous-variable quantum memories that we make use of in our design. We then show that potential quantum communications rates would deviate from the theoretical capacities, as one would expect, if the quantum link is too noisy and/or low-quality quantum memories and amplifiers are employed
Continuous-Variable Measurement-Device-Independent Quantum Key Distribution in Free-Space Channels
The field of space communications is the realm of communication technologies where diffraction and atmospheric effects, both of which contribute to loss and noise, become overriding. The pertinent questions here are how and at which rate information (secret keys) can be securely transferred (shared) among users under such supposedly severe circumstances. In the present work we study continuous-variable (CV) quantum key distribution (QKD) in a measurement-device-independent (MDI) configuration over free-space optical (FSO) links. We assess the turbulence regime and provide a composable finite-size key rate analysis of the protocol for FSO links. We study both short-range, horizontal communication links as well as slant paths to, e.g., high-altitude platform station (HAPS) systems
Discrete-modulation continuous-variable quantum key distribution enhanced by quantum scissors
It is known that quantum scissors, as non-deterministic amplifiers, can enhance the performance of Gaussian-modulated continuous-variable quantum key distribution (CV-QKD) in noisy and long-distance regimes of operation. Here, we extend this result to a {\em non-Gaussian} CV-QKD protocol with discrete modulation. We show that, by using a proper setting, the use of quantum scissors in the receiver of such discrete-modulation CV-QKD protocols would allow us to achieve positive secret key rates at high loss and high excess noise regimes of operation, which would have been otherwise impossible. This also keeps the prospect of running discrete-modulation CV-QKD over CV quantum repeaters alive
Noiseless linear amplification in quantum target detection using Gaussian states
Quantum target detection aims to utilise quantum technologies to achieve performances in target detection not possible through purely classical means. Quantum illumination is an example of this, based on signal-idler entanglement, promising a potential 6 dB advantage in error exponent over its optimal classical counterpart. So far, receiver designs achieving this optimal reception remain elusive with many proposals based on Gaussian processes appearing unable to utilise quantum information contained within Gaussian state sources. This paper considers the employment of a noiseless linear amplifier at the detection stage of a quantum illumination-based quantum target detection protocol. Such a non-Gaussian amplifier offers a means of probabilistically amplifying an incoming signal without the addition of noise. Considering symmetric hypothesis testing, the quantum Chernoff bound is derived and limits on detection error probability is analysed for both the two-mode squeezed vacuum state and the coherent state classical benchmark. Our findings show that in such a scheme the potential quantum advantage is amplified even in regimes where quantum illumination alone offers no advantage, thereby extending its potential use. For coherent states, the performance in such a scheme is bounded by one without amplification except for a few specific regimes which are defined
Long-distance continuous-variable quantum key distribution with quantum scissors
The use of quantum scissors, as candidates for non-deterministic amplifiers, in continuous-variable quantum key distribution systems is investigated. Such devices rely on single-photon sources for their operation and as such, they do not necessarily preserve the Guassianity of the channel. Using exact analytical modeling for system components, we bound the secret key generation rate for the system that uses quantum scissors. We find that for non-zero values of excess noise such a system can reach longer distances than the system with no amplification. The prospect of using quantum scissors in continuous-variable quantum repeaters is therefore emboldened
Realistic Threat Models for Satellite-Based Quantum Key Distribution
The security of prepare-and-measure satellite-based quantum key distribution
(QKD), under restricted eavesdropping scenarios, is addressed. We particularly
consider cases where the eavesdropper, Eve, has limited access to the
transmitted signal by Alice, and/or Bob's receiver station. This restriction is
modeled by lossy channels between Alice/Bob and Eve, where the transmissivity
of such channels can, in principle, be bounded by monitoring techniques. An
artefact of such lossy channels is the possibility of having bypass channels,
those which are not accessible to Eve, but may not necessarily be characterized
by the users either. This creates interesting, {\it unexplored}, scenarios for
analyzing QKD security. In this paper, we obtain generic bounds on the key rate
in the presence of bypass channels and apply them to continuous-variable QKD
protocols with Gaussian encoding with direct and reverse reconciliation. We
find regimes of operation in which the above restrictions on Eve can
considerably improve system performance. We also develop customised bounds for
several protocols in the BB84 family and show that, in certain regimes, even
the simple protocol of BB84 with weak coherent pulses is able to offer positive
key rates at high channel losses, which would otherwise be impossible under an
unrestricted Eve. In this case the limitation on Eve would allow Alice to send
signals with larger intensities than the optimal value under an ideal Eve,
which effectively reduces the effective channel loss. In all these cases, the
part of the transmitted signal that does not reach Eve can play a non-trivial
role in specifying the achievable key rate. Our work opens up new security
frameworks for spaceborne quantum communications systems.Comment: 39 pages, 17 figure
Quantum-classical access networks with embedded optical wireless links
We examine the applicability of wireless indoor quantum key distribution (QKD) in hybrid quantum-classical networks. We propose practical configurations that would enable wireless access to such networks. The proposed setups would allow an indoor wireless user, equipped with a QKD-enabled mobile device, to communicate securely with a remote party on the other end of the access network. QKD signals, sent through wireless indoor channels, are combined with classical ones and sent over shared fiber links to the remote user. Dense wavelength-division multiplexing would enable the simultaneous transmission of quantum and classical signals over the same fiber. We consider the adverse effects of the background noise induced by Raman-scattered light on the QKD receivers due to such an integration. In addition, we consider the loss and the background noise that arise from indoor environments. We consider a number of discrete and continuous-variable QKD protocols and study their performance in different scenarios
Quantum communications in a moderate-to-strong turbulent space
Since the invention of the laser in the 60s, one of the most fundamental communication channels has been the free-space optical channel. For this type of channel, a number of effects generally need to be considered, including diffraction, refraction, atmospheric extinction, pointing errors and, most importantly, turbulence. Because of all these adverse features, the free-space channel is more difficult to study than a stable fiber-based link. For the same reasons, only recently it has been possible to establish the ultimate performances achievable in quantum communications via free-space channels, together with practical rates for continuous variable (CV) quantum key distribution (QKD). Differently from previous literature, mainly focused on the regime of weak turbulence, this work considers the free-space optical channel in the more challenging regime of moderate-to-strong turbulence, where effects of beam widening and breaking are more important than beam wandering. This regime may occur in long-distance free-space links on the ground, in uplink to high-altitude platform systems (HAPS) and, more interestingly, in downlink from near-horizon satellites. In such a regime we rigorously investigate ultimate limits for quantum communications and show that composable keys can be extracted using CV-QKD. In particular, we apply our results to downlink from satellites at large zenith angles, for which not only turbulence is strong but also refraction causes non-trivial effects in terms of trajectory elongation
Composable end-to-end security of Gaussian quantum networks with untrusted relays
Gaussian networks are fundamental objects in network information theory. Here many senders and receivers are connected by physically motivated Gaussian channels while auxiliary Gaussian components, such as Gaussian relays, are entailed. Whilst the theoretical backbone of classical Gaussian networks is well established, the quantum analogue is yet immature. Here, we theoretically tackle composable security of arbitrary Gaussian quantum networks (quantum networks), with generally untrusted nodes, in the finite-size regime. We put forward a general methodology for parameter estimation, which is only based on the data shared by the remote end-users. Taking a chain of identical quantum links as an example, we further demonstrate our study. Additionally, we find that the key rate of a quantum amplifier-assisted chain can ideally beat the fundamental repeaterless limit with practical block sizes. However, this objective is practically questioned leading the way to new network/chain designs