WO2019182514A1 - Quantum key distribution network and method - Google Patents

Quantum key distribution network and method Download PDF

Info

Publication number
WO2019182514A1
WO2019182514A1 PCT/SG2019/050149 SG2019050149W WO2019182514A1 WO 2019182514 A1 WO2019182514 A1 WO 2019182514A1 SG 2019050149 W SG2019050149 W SG 2019050149W WO 2019182514 A1 WO2019182514 A1 WO 2019182514A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
nodes
photons
source
splitter
Prior art date
Application number
PCT/SG2019/050149
Other languages
French (fr)
Inventor
Euk Jin Alexander LING
Christian Kurtsiefer
Original Assignee
National University Of Singapore
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University Of Singapore filed Critical National University Of Singapore
Priority to SG11202009205WA priority Critical patent/SG11202009205WA/en
Publication of WO2019182514A1 publication Critical patent/WO2019182514A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0855Quantum cryptography involving additional nodes, e.g. quantum relays, repeaters, intermediate nodes or remote nodes

Definitions

  • the present invention relates broadly to a quantum key distribution network and method.
  • QKD Quantum Key Distribution
  • QKD in its most mature form is hence a point-to-point method for delivering automated private encryption keys. This works well for two-party communication, but sometimes it is necessary to have multiple parties on a small network being able to communicate with each other using keys delivered via QKD.
  • QKD is often marketed with a central co-ordinating centre or common node that manages keys between all parties.
  • the common node actively manages keys between all the nodes.
  • This common node is also known as the“trusted-node”.
  • the use of trusted-nodes can be disadvantageous because:
  • An alternative approach to network QKD is to equip each node with a transmitter, and then ensure that the node has an optical connection to every other node on the network. While this avoids the challenge of“trusted- nodes” it greatly increases the requirements on the optical network.
  • Embodiments of the present invention seek to address at least one of the above problems.
  • a quantum key distribution network comprising:
  • a source configured to generate photon pairs based on spontaneous parametric downconversion
  • a splitter configured for splitting photons generated by the source into different optical links
  • a communication link between the nodes for exchanging timing information about the reception of the photons between the nodes to determine photons of one pair being received by two of the nodes.
  • a method of quantum key distribution in a network comprising the steps of:
  • splitting photons generated by the source into different optical links using a splitter providing a plurality of nodes configured to receive the photons via respective ones of the optical links
  • Figure 1 shows a schematic drawing illustrating an asynchronous entangled photon pair source for a network according to example embodiments.
  • Figure 2 shows a schematic diagram illustrating photon pairs emitted by the source in a network with N nodes being subjected to a passive l/N splitter, according to an example embodiment.
  • Each photon experiences a l/N probability of being directed to a single node.
  • the probability that both photons in the pair end up at a single node, and are not useful for QKD is l/N/N.
  • Each node carries out the conventional QKD protocol with every other node according to an example embodiment.
  • the splitter can be built completely out of passive components according to example embodiment, such as, but not limited to, partially silvered mirrors, partially transmitting beamsplitters, or even spatial demodulators.
  • the routing of the photons to the nodes can also be built entirely out of passive components according to example embodiments.
  • Figure 3(a) shows a graph illustrating the key rate fraction for the entire network and for any two parties according to example embodiments, relative to a standard 2-node QKD network. As the number of parties increases, the overall network becomes more efficient but any two nodes will have a lower key rate.
  • Figure 3(b) shows a graph illustrating the increase in network overhead according to example embodiments, assuming that all parties carry out the standard QKD protocol in those embodiments.
  • Figure 4 shows a schematic drawing illustrating the QKD process performed in a network according to an example embodiment.
  • Figure 5 shows a flowchart illustrating a method of quantum key distribution in a network, according to an example embodiment.
  • Embodiments of the present invention provide a solution to end-users who require a small network to be able to perform encryption tasks using keys delivered via quantum key distribution (QKD).
  • QKD quantum key distribution
  • Embodiments of the present invention work by having all parties on the network sharing a centralized source of entangled photon-pairs.
  • the central source uses a passive splitter to distribute photons with l/N probability to the N nodes in the network.
  • each node will always share entangled photons with every other node, advantageously enabling, for example, the conventional two-party QKD protocol to be carried out but in a network environment.
  • the network architecture according to example embodiments advantageously does not require a classical key management scheme. Instead all parties on the network can derive a key with every other party.
  • the network according to example embodiments is powered by a single centralized source of entangled photon-pairs. Each party, or node, on the network requires only a single optical link to the centralized source. By making this a direct optical link, the need for intermediate“trusted-nodes” is advantageously removed.
  • Such a network according to example embodiments can advantageously be built entirely out of passive optical components removing the need for active control over switches, relays or circulators.
  • An advantage of passive components in an entangled photon distribution network is that these components (e.g.
  • the centralized source of entangled photon-pairs is operated asynchronously, so that the photon-pairs are generated at random times.
  • the nodes can generate a timing synchronization signal, as will be described in more detail below for example embodiments. This advantageously removes the need for an additional time service common to all nodes within the network.
  • the entangled photons themselves are used to provide a time-synchronization service.
  • the use of entanglement allows a 3rd party service provider to operate the photon source on behalf of end-users who are operating the nodes, without having to be a“trusted provider”.
  • Embodiments of the present invention can be implemented very simply, and do not require any active control over the bandwidth.
  • the photons are in the general transmission window of the optical channel, e.g. in the C or O band for fiber based networks.
  • The“splitter” for distributing photons to the user nodes can be built out of any passive light splitting element in various embodiments. Examples are semi- silvered mirrors, partially transmitting beamsplitters or spatial demodulators.
  • The“splitter” is not tied to any specific switching technology such as wavelength division multiplexers (WDM).
  • WDM wavelength division multiplexers
  • the network will be serviced only by a centralized source of entangled photon-pairs.
  • Each node on the network will have only one optical link to the central source.
  • the centralized source is operated asynchronously with the photon-pairs generated at random times. This is achieved by using a pump laser operating in continuous-wave (CW) mode in an example embodiment.
  • CW continuous-wave
  • the intrinsic timing between photon-pairs (which is on the order of a few femto-seconds) enables any two nodes to achieve timing synchronization for performing QKD. This removes the need for an additional timing service within the network.
  • this feature can be used as a time synchronization service.
  • optical link between source and node is direct and can be built entirely out of passive components.
  • the quality of the quantum correlations between the photon pair is used to quantify the security of the derived key.
  • the quality of the correlations for entanglement is checked against a mathematical expression known as the Bell Inequality. This enables a 3rd party to make commercial provision of the photon pairs because any tampering by the 3rd party or any other eavesdropper will affect the quantum correlations, resulting in a drop in quality, and unveils the tampering efforts.
  • the asynchronous operation of the photon-pair source 100 for a network follows a photon-pair generation process, known as Spontaneous Parametric Downconversion (SPDC), and can be achieved when a signal 102 from a pump laser 104 passes through a nonlinear medium 106 with chi-2 nonlinearity. These media 106 are typically crystals of some kind.
  • SPDC Spontaneous Parametric Downconversion
  • a single pump photon is sometimes split into two lower energy photons l07a, b obeying energy and momentum conservation.
  • the pump laser 104 is operating continuously, in CW-mode, the time interval between the generation of one photon-pair and the next is random.
  • N is greater than 2
  • the probability that both photons end up at the same node (and being unuseable) is l/N 2 leading to a network yield of 1- l/N.
  • Any pair of nodes e.g. 1, 2 within the network 204 will have a key rate of 2/N 2 .
  • each individual photon will be subjected to a 1/4 splitter. So, for both signal and idler photons to end up at the same node (and be of no use to QKD), the probability is 1/16. This is true for all four nodes, so the total unuseable fraction is 1/4. Conversely, the total useful fraction is 1- l/4 (l-l/N), or 3/4.
  • FIG. 4 shows a schematic diagram illustrating the QKD process in a network 400 according to an example embodiment.
  • the asynchronous operation of a photon-pair source 402 for the network 400 according to an example embodiment follows a photon-pair e.g. 404, 406 generation process, SPDC.
  • SPDC photon-pair
  • the timing synchronization between the photons of each pair is on the order of a few femto- seconds.
  • the generated photon pairs e.g. 404, 406 are transmitted to an l/N splitter 408 of the network 400 via an optical link 409, which can be direct and entirely built from passive components in a preferred embodiment.
  • the photons are randomly directed via the l/N splitter 408 to the nodes of the network 400, including to the node 410 labelled Alice and the node 412 labelled Bob, via respective optical links 414, 416, which can also be direct and entirely built from passive components in a preferred embodiment.
  • Also shown in Figure 4 is one of the other nodes 418 of the N nodes of the network 400, with its corresponding optical link 420 to the l/N splitter 408.
  • the network 400 thus provides direct optical links between the source 402 and each of the nodes e.g. 410, i.e. via link 409 and e.g. link 414.
  • two photons 421, 422 of one correlated pair 424 generated by the source 402 are arriving at Alice’s node 410 and at Bob’s node 412, respectively.
  • the detected presence of one of the photons 421, 422 at nodes 410, 412 indicates the presence of its twin to within a very precise time.
  • an alternative communication channel 424 such as, but not limited to, a wired or wireless local area network (LAN) network.
  • LAN local area network
  • Alice and Bob carry out the conventional postprocessing steps of QKD, namely: basis sifting, error correction and privacy amplification. These steps enable Alice and Bob, or any other pair of nodes on the network, to derive a secure key from the quantum signals, as will be appreciated by a person skilled in the art..
  • Embodiments of the present invention can have a number of advantages over active switching of photon pairs via time-division multiplexing or wavelength-division multiplexing in previous proposed QKD networks.
  • the instrument cost is substantially reduced and the network overhead is further reduced as there is no need for active synchronisation across parties.
  • the synchronisation is derived directly from the timing correlation (down to 0.25 ns given typical detector timing jitter) born out of the photon pair production process and folded into the existing QKD backend protocol.
  • embodiments of the present invention can provide a technological leap over prepare-and-send systems that are already on the market.
  • Prepare and send systems are systems which do not employ entanglement, in contrast to embodiments of the present invention..
  • Such systems have the disadvantage of needing to prepare the state of the photon in well defined state before transmission, see for example https://www.idquantique.eom/quantum-safe-security/products/#quantum key distribution Cerberis or Clavis systems from IDQ.
  • the QKD service achievable in embodiments of the present invention is delivered via a very fundamental quantum process.
  • the QKD network according to example embodiments is driven by true quantum processes that can be mathematically quantified leading to security that is absolutely secure from an information-theoretic standpoint. Coupled together with existing expertise in side-channel attacks (for example as described in in“Full-field implementation of a perfect eavesdropper on a quantum cryptography system"; Ilja Gerhardt, Qin Liu, Antia Lamas-Linares, Johannes Skaary Christian Kurtsiefer, Vadim Makarov. Nature Communications, 2, 349 (2011)), embodiments of the present invention can deliver an attractive solution for QKD over networks., in particular over small networks (compare discussion of Figures 3(a) and (b) above.
  • a quantum key distribution network comprises a source configured to generate photon pairs based on spontaneous parametric downconversion; a splitter configured for splitting photons generated by the source into different optical links; a plurality of nodes configured to receive the photons via respective ones of the optical links; and a communication link between the nodes for exchanging timing information about the reception of the photons between the nodes to determine photons of one pair being received by two of the nodes.
  • the source may be configured to generate the photon pairs at random times.
  • the source may comprise a pump laser for passing a laser beam through a nonlinear medium with chi-2 nonlinearity.
  • the pump laser may be configured for operating continuously, in CW-mode.
  • the network may be configured to provide the timing information about the reception of the photons as a time synchronization service.
  • optical links between the splitter and the nodes may be direct.
  • the optical links may be built entirely out of passive components.
  • An optical source link between the source and the splitter may be direct.
  • the optical source link may be built entirely out of passive components.
  • FIG. 5 shows a flowchart 500 illustrating a method of quantum key distribution in a network, according to an example embodiment.
  • photon pairs are generated based on spontaneous parametric downconversion using a source.
  • photons generated by the source are split into different optical links using a splitter.
  • a plurality of nodes configured to receive the photons via respective ones of the optical links are provided.
  • a communication link is provided between the nodes for exchanging timing information about the reception of the photons between the nodes to determine photons of one pair being received by two of the nodes.
  • the method may comprise generating the photon pairs at random times using the source.
  • the method may comprise passing a pump laser beam through a nonlinear medium with chi- 2 nonlinearity.
  • the pump laser beam may be operated continuously, in CW-mode.
  • the method may comprise provide the timing information about the reception of the photons as a time synchronization service.
  • optical links between the splitter and the nodes may be direct.
  • the optical links may be built entirely out of passive components.
  • An optical source link between the source and the splitter may be direct.
  • the optical source link may be built entirely out of passive components.
  • Embodiments of the present invention can have one or more of the following features and associated benefits/advantages:
  • Embodiments of the present invention can solve the problem when end-users require a network for QKD, in particular small networks for QKD, to be provided by 3rd party service providers.
  • PLDs programmable logic devices
  • FPGAs field programmable gate arrays
  • PAL programmable array logic
  • ASICs application specific integrated circuits
  • microcontrollers with memory such as electronically erasable programmable read only memory (EEPROM)
  • EEPROM electronically erasable programmable read only memory
  • embedded microprocessors firmware, software, etc.
  • aspects of the system may be embodied in microprocessors having software -based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types.
  • the underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor (MOSFET) technologies like complementary metal-oxide semiconductor (CMOS), bipolar technologies like emitter-coupled logic (ECL), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, etc.
  • MOSFET metal-oxide semiconductor field-effect transistor
  • CMOS complementary metal-oxide semiconductor
  • bipolar technologies like emitter-coupled logic (ECL)
  • polymer technologies e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures
  • mixed analog and digital etc.

Abstract

A method of quantum key distribution in a network, and a quantum key distribution network. The method comprises the steps of generating photon pairs based on spontaneous parametric down conversion using a source; splitting photons generated by the source into different optical links using a splitter; providing a plurality of nodes configured to receive the photons via respective ones of the optical links; and providing a communication link between the nodes for exchanging timing information about the reception of the photons between the nodes to determine photons of one pair being received by two of the nodes.

Description

QUANTUM KEY DISTRIBUTION NETWORK AND METHOD
FIELD OF INVENTION
The present invention relates broadly to a quantum key distribution network and method.
BACKGROUND
Any mention and/or discussion of prior art throughout the specification should not be considered, in any way, as an admission that this prior art is well known or forms part of common general knowledge in the field.
Quantum Key Distribution (QKD) is an optical technology that enables the generation of correlated but private keys at distant locations sharing an optical link. QKD is primarily a point-to-point technology and is often marketed as such.
QKD in its most mature form is hence a point-to-point method for delivering automated private encryption keys. This works well for two-party communication, but sometimes it is necessary to have multiple parties on a small network being able to communicate with each other using keys delivered via QKD.
QKD networks based on a single source of entangled photon pairs have been discussed in the literature previously. However, this requires engineering the source to have a specific bandwidth, and then using wavelength division multiplexing techniques to actively route photons to different parties. The installation problems are challenging with this approach.
For small networks, QKD is often marketed with a central co-ordinating centre or common node that manages keys between all parties. The common node actively manages keys between all the nodes. This common node is also known as the“trusted-node”. The use of trusted-nodes can be disadvantageous because:
a. long term storage of keys for the entire network is located at a central location. This creates a high value target with a single point of failure.
b. when using prepare-and-send QKD, crucial elements such as the light source must be located within a trusted node. This makes it difficult to outsource the QKD service to 3rd party service providers.
An alternative approach to network QKD is to equip each node with a transmitter, and then ensure that the node has an optical connection to every other node on the network. While this avoids the challenge of“trusted- nodes” it greatly increases the requirements on the optical network.
Embodiments of the present invention seek to address at least one of the above problems. SUMMARY
In accordance with a first aspect of the present invention, there is provided a quantum key distribution network comprising:
a source configured to generate photon pairs based on spontaneous parametric downconversion;
a splitter configured for splitting photons generated by the source into different optical links;
a plurality of nodes configured to receive the photons via respective ones of the optical links; and
a communication link between the nodes for exchanging timing information about the reception of the photons between the nodes to determine photons of one pair being received by two of the nodes.
In accordance with a second aspect of the present invention, there is provided a method of quantum key distribution in a network, comprising the steps of:
generating photon pairs based on spontaneous parametric downconversion using a source;
splitting photons generated by the source into different optical links using a splitter; providing a plurality of nodes configured to receive the photons via respective ones of the optical links; and
providing a communication link between the nodes for exchanging timing information about the reception of the photons between the nodes to determine photons of one pair being received by two of the nodes.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the invention will be better understood and readily apparent to one of ordinary skill in the art from the following written description, by way of example only, and in conjunction with the drawings, in which:
Figure 1 shows a schematic drawing illustrating an asynchronous entangled photon pair source for a network according to example embodiments.
Figure 2 shows a schematic diagram illustrating photon pairs emitted by the source in a network with N nodes being subjected to a passive l/N splitter, according to an example embodiment. Each photon experiences a l/N probability of being directed to a single node. The probability that both photons in the pair end up at a single node, and are not useful for QKD is l/N/N. Each node carries out the conventional QKD protocol with every other node according to an example embodiment. The splitter can be built completely out of passive components according to example embodiment, such as, but not limited to, partially silvered mirrors, partially transmitting beamsplitters, or even spatial demodulators. Furthermore, the routing of the photons to the nodes can also be built entirely out of passive components according to example embodiments.
Figure 3(a) shows a graph illustrating the key rate fraction for the entire network and for any two parties according to example embodiments, relative to a standard 2-node QKD network. As the number of parties increases, the overall network becomes more efficient but any two nodes will have a lower key rate.
Figure 3(b) shows a graph illustrating the increase in network overhead according to example embodiments, assuming that all parties carry out the standard QKD protocol in those embodiments.
Figure 4 shows a schematic drawing illustrating the QKD process performed in a network according to an example embodiment.
Figure 5 shows a flowchart illustrating a method of quantum key distribution in a network, according to an example embodiment.
DETAILED DESCRIPTION
Embodiments of the present invention provide a solution to end-users who require a small network to be able to perform encryption tasks using keys delivered via quantum key distribution (QKD).
Embodiments of the present invention work by having all parties on the network sharing a centralized source of entangled photon-pairs. The central source uses a passive splitter to distribute photons with l/N probability to the N nodes in the network. In this way, each node will always share entangled photons with every other node, advantageously enabling, for example, the conventional two-party QKD protocol to be carried out but in a network environment.
The network architecture according to example embodiments advantageously does not require a classical key management scheme. Instead all parties on the network can derive a key with every other party. In addition, the network according to example embodiments is powered by a single centralized source of entangled photon-pairs. Each party, or node, on the network requires only a single optical link to the centralized source. By making this a direct optical link, the need for intermediate“trusted-nodes” is advantageously removed. Such a network according to example embodiments can advantageously be built entirely out of passive optical components removing the need for active control over switches, relays or circulators. An advantage of passive components in an entangled photon distribution network is that these components (e.g. beamsplitters) do not need to be trusted, further simplifying the network requirements. Furthermore, the centralized source of entangled photon-pairs is operated asynchronously, so that the photon-pairs are generated at random times. By using the intrinsic timing between the photon-pairs, the nodes can generate a timing synchronization signal, as will be described in more detail below for example embodiments. This advantageously removes the need for an additional time service common to all nodes within the network. In some embodiments of the network, the entangled photons themselves are used to provide a time-synchronization service. Finally, the use of entanglement allows a 3rd party service provider to operate the photon source on behalf of end-users who are operating the nodes, without having to be a“trusted provider”.
Embodiments of the present invention can be implemented very simply, and do not require any active control over the bandwidth. In example embodiments the photons are in the general transmission window of the optical channel, e.g. in the C or O band for fiber based networks. The“splitter” for distributing photons to the user nodes can be built out of any passive light splitting element in various embodiments. Examples are semi- silvered mirrors, partially transmitting beamsplitters or spatial demodulators. The“splitter” is not tied to any specific switching technology such as wavelength division multiplexers (WDM).
The features of an example embodiment of the present invention can include the following:
1. The network will be serviced only by a centralized source of entangled photon-pairs.
2. Each node on the network will have only one optical link to the central source.
3. The centralized source is operated asynchronously with the photon-pairs generated at random times. This is achieved by using a pump laser operating in continuous-wave (CW) mode in an example embodiment.
4. The intrinsic timing between photon-pairs (which is on the order of a few femto-seconds) enables any two nodes to achieve timing synchronization for performing QKD. This removes the need for an additional timing service within the network.
5. In some embodiments of the network, this feature can be used as a time synchronization service.
6. The optical link between source and node is direct and can be built entirely out of passive components.
As mentioned above, no active devices are needed according to example embodiments. This is highly advantageous in a security context as the command signals sent to active components such as circulators, switches or relays must also be secured. The passive components in our networks according to example embodiments (such as beamsplitters or connectors), do not need to be trusted. Embodiments of the present invention enables 3rd party network operators who do not have to satisfy a“trusted” arrangement to provide photons as a service to end-users.
When using an entangled photon pair source for the carrier photons according to example embodiments, the quality of the quantum correlations between the photon pair is used to quantify the security of the derived key. The quality of the correlations for entanglement is checked against a mathematical expression known as the Bell Inequality. This enables a 3rd party to make commercial provision of the photon pairs because any tampering by the 3rd party or any other eavesdropper will affect the quantum correlations, resulting in a drop in quality, and unveils the tampering efforts.
With reference to Figure 1, the asynchronous operation of the photon-pair source 100 for a network according to example embodiments follows a photon-pair generation process, known as Spontaneous Parametric Downconversion (SPDC), and can be achieved when a signal 102 from a pump laser 104 passes through a nonlinear medium 106 with chi-2 nonlinearity. These media 106 are typically crystals of some kind. During SPDC a single pump photon is sometimes split into two lower energy photons l07a, b obeying energy and momentum conservation. When the pump laser 104 is operating continuously, in CW-mode, the time interval between the generation of one photon-pair and the next is random. However, for each photon-pair l07a, b the timing synchronization between the photons of each pair is on the order of a few femto- seconds. For this reason, the pair-production process is said to be asynchronous. However, the detected presence of one photon indicates the presence of its twin to within a very precise time. With reference to Figure 2, if the photon-pairs generated within the central source 100 were distributed across different nodes 1, ..., N equally, this enables each node to perform timing synchronization with every other node. This advantageously removes the need for the QKD network 200 to rely on an external timing service.
To use the entangled photon pair source 100 in the network 200 with N nodes (where N is greater than 2), one only has to pass the photon pairs through a l/N splitter 202. After this splitter 202, the probability that both photons end up at the same node (and being unuseable) is l/N2 leading to a network yield of 1- l/N. Any pair of nodes e.g. 1, 2 within the network 204 will have a key rate of 2/N2.
Consider a network of four nodes and let us label the photons within a pair as the signal and idler photons.
Each individual photon will be subjected to a 1/4 splitter. So, for both signal and idler photons to end up at the same node (and be of no use to QKD), the probability is 1/16. This is true for all four nodes, so the total unuseable fraction is 1/4. Conversely, the total useful fraction is 1- l/4 (l-l/N), or 3/4.
Now consider two different nodes 1 and 2 out of the four nodes. The probability that the signal photon ends up at node 1 is 1/4, while the probability that the idler photon ends up at node 2 is 1/4. This combined probability is again 1/16. The same combined probability holds for idler at node 1 and signal at node 2. So the total fraction of useful photon pairs between nodes 1 and 2 is 1/8 (2/N2).
Figure 3(a) shows the effect of the network size on the key rates for the overall network according to example embodiments (curve 300) and any 2-party yield within the network according to example embodiments (curve 302) , relative to the conventional two-node QKD connection (key rate = 1), while Figure 3(b) shows the impact of the network size on communication overheads for the network according to example embodiments (curve 304), relative to the conventional two-node, point-to-point QKD connection (overhead = 1). As it is assumed that all parties carry out the conventional two-party protocol for QKD within the network according to example embodiments as illustrated in Figure 3(b), the overhead scales linearly with the number of links in the network according to example embodiments (link number = N(N-l)/2). There are a few ways to mitigate this increased overhead, e.g. by having a sequential communication sequence or improving the two-way protocol according to preferred example embodiments. What is unavoidable, however, is the drop in key rate for any two nodes in the network according to example embodiments, see curve 302. Putting the information in the two graphs in Figures 3(a) and (b) together a network size of not more than 15 is recommended for example embodiments, but can be pushed up further depending on the ability of the end-user to manage network overhead, or tolerance for a lower key rate according to various embodiments.
Figure 4 shows a schematic diagram illustrating the QKD process in a network 400 according to an example embodiment. As described above, the asynchronous operation of a photon-pair source 402 for the network 400 according to an example embodiment follows a photon-pair e.g. 404, 406 generation process, SPDC. For each photon-pair e.g. 404, 406 the timing synchronization between the photons of each pair is on the order of a few femto- seconds. The generated photon pairs e.g. 404, 406 are transmitted to an l/N splitter 408 of the network 400 via an optical link 409, which can be direct and entirely built from passive components in a preferred embodiment. The photons are randomly directed via the l/N splitter 408 to the nodes of the network 400, including to the node 410 labelled Alice and the node 412 labelled Bob, via respective optical links 414, 416, which can also be direct and entirely built from passive components in a preferred embodiment. Also shown in Figure 4 is one of the other nodes 418 of the N nodes of the network 400, with its corresponding optical link 420 to the l/N splitter 408. As will be appreciated by a person skilled in the art, the network 400 thus provides direct optical links between the source 402 and each of the nodes e.g. 410, i.e. via link 409 and e.g. link 414.
In the scenario illustrated in Figure 4, two photons 421, 422 of one correlated pair 424 generated by the source 402 are arriving at Alice’s node 410 and at Bob’s node 412, respectively. As described above, the detected presence of one of the photons 421, 422 at nodes 410, 412 indicates the presence of its twin to within a very precise time. This enables Alice and Bob to perform timing synchronization with each other by exchanging timing information on the detected arrival via an alternative communication channel 424, such as, but not limited to, a wired or wireless local area network (LAN) network. This advantageously removes the need Alice and Bob to rely on an external timing service, since only relative timing information is required. It is noted that for identification of pairs as such, there is no need to invoke Bell Inequality. Furthermore, to derive a secret key, the Bell Inequality is not the only way to do so - one can, for example just use the Quantum Bit Error Rate (QBER), as will be appreciated by a person skilled in the art.
Once the photon pairs between Alice and Bob have been identified from their timing correlations, Alice and Bob carry out the conventional postprocessing steps of QKD, namely: basis sifting, error correction and privacy amplification. These steps enable Alice and Bob, or any other pair of nodes on the network, to derive a secure key from the quantum signals, as will be appreciated by a person skilled in the art..
Embodiments of the present invention can have a number of advantages over active switching of photon pairs via time-division multiplexing or wavelength-division multiplexing in previous proposed QKD networks. By using completely passive elements, the instrument cost is substantially reduced and the network overhead is further reduced as there is no need for active synchronisation across parties. The synchronisation is derived directly from the timing correlation (down to 0.25 ns given typical detector timing jitter) born out of the photon pair production process and folded into the existing QKD backend protocol.
In addition, embodiments of the present invention can provide a technological leap over prepare-and-send systems that are already on the market. Prepare and send systems are systems which do not employ entanglement, in contrast to embodiments of the present invention.. Such systems have the disadvantage of needing to prepare the state of the photon in well defined state before transmission, see for example https://www.idquantique.eom/quantum-safe-security/products/#quantum key distribution Cerberis or Clavis systems from IDQ.
The QKD service achievable in embodiments of the present invention is delivered via a very fundamental quantum process. In this sense, the QKD network according to example embodiments is driven by true quantum processes that can be mathematically quantified leading to security that is absolutely secure from an information-theoretic standpoint. Coupled together with existing expertise in side-channel attacks (for example as described in in“Full-field implementation of a perfect eavesdropper on a quantum cryptography system"; Ilja Gerhardt, Qin Liu, Antia Lamas-Linares, Johannes Skaary Christian Kurtsiefer, Vadim Makarov. Nature Communications, 2, 349 (2011)), embodiments of the present invention can deliver an attractive solution for QKD over networks., in particular over small networks (compare discussion of Figures 3(a) and (b) above.
In one embodiment, a quantum key distribution network comprises a source configured to generate photon pairs based on spontaneous parametric downconversion; a splitter configured for splitting photons generated by the source into different optical links; a plurality of nodes configured to receive the photons via respective ones of the optical links; and a communication link between the nodes for exchanging timing information about the reception of the photons between the nodes to determine photons of one pair being received by two of the nodes.
The source may be configured to generate the photon pairs at random times.
The source may comprise a pump laser for passing a laser beam through a nonlinear medium with chi-2 nonlinearity.
The pump laser may be configured for operating continuously, in CW-mode.
The network may be configured to provide the timing information about the reception of the photons as a time synchronization service.
The optical links between the splitter and the nodes may be direct.
The optical links may be built entirely out of passive components.
An optical source link between the source and the splitter may be direct.
The optical source link may be built entirely out of passive components.
Figure 5 shows a flowchart 500 illustrating a method of quantum key distribution in a network, according to an example embodiment. At step 502, photon pairs are generated based on spontaneous parametric downconversion using a source. At step 504 photons generated by the source are split into different optical links using a splitter. At step 506, a plurality of nodes configured to receive the photons via respective ones of the optical links are provided. At step 508, a communication link is provided between the nodes for exchanging timing information about the reception of the photons between the nodes to determine photons of one pair being received by two of the nodes.
The method may comprise generating the photon pairs at random times using the source.
The method may comprise passing a pump laser beam through a nonlinear medium with chi- 2 nonlinearity.
The pump laser beam may be operated continuously, in CW-mode.
The method may comprise provide the timing information about the reception of the photons as a time synchronization service.
The optical links between the splitter and the nodes may be direct.
The optical links may be built entirely out of passive components.
An optical source link between the source and the splitter may be direct.
The optical source link may be built entirely out of passive components. Embodiments of the present invention can have one or more of the following features and associated benefits/advantages:
Figure imgf000011_0001
Embodiments of the present invention can solve the problem when end-users require a network for QKD, in particular small networks for QKD, to be provided by 3rd party service providers.
Aspects of the systems and methods described herein may be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (PLDs), such as field programmable gate arrays (FPGAs), programmable array logic (PAL) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits (ASICs). Some other possibilities for implementing aspects of the system include: microcontrollers with memory (such as electronically erasable programmable read only memory (EEPROM)), embedded microprocessors, firmware, software, etc. Furthermore, aspects of the system may be embodied in microprocessors having software -based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types. Of course the underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor (MOSFET) technologies like complementary metal-oxide semiconductor (CMOS), bipolar technologies like emitter-coupled logic (ECL), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, etc.
The above description of illustrated embodiments of the systems and methods is not intended to be exhaustive or to limit the systems and methods to the precise forms disclosed. While specific embodiments of, and examples for, the systems components and methods are described herein for illustrative purposes, various equivalent modifications are possible within the scope of the systems, components and methods, as those skilled in the relevant art will recognize. The teachings of the systems and methods provided herein can be applied to other processing systems and methods, not only for the systems and methods described above.
The elements and acts of the various embodiments described above can be combined to provide further embodiments. These and other changes can be made to the systems and methods in light of the above detailed description.
In general, in the following claims, the terms used should not be construed to limit the systems and methods to the specific embodiments disclosed in the specification and the claims, but should be construed to include all processing systems that operate under the claims. Accordingly, the systems and methods are not limited by the disclosure, but instead the scope of the systems and methods is to be determined entirely by the claims.
Unless the context clearly requires otherwise, throughout the description and the claims, the words "comprise," "comprising," and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of "including, but not limited to." Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words "herein," "hereunder," "above," "below," and words of similar import refer to this application as a whole and not to any particular portions of this application. When the word "or" is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.

Claims

1. A quantum key distribution network comprising:
a source configured to generate photon pairs based on spontaneous parametric downconversion;
a splitter configured for splitting photons generated by the source into different optical links;
a plurality of nodes configured to receive the photons via respective ones of the optical links; and
a communication link between the nodes for exchanging timing information about the reception of the photons between the nodes to determine photons of one pair being received by two of the nodes.
2. The network of claim 1, wherein the source is configured to generate the photon pairs at random times.
3. The network of claim 2, wherein the source comprises a pump laser for passing a laser beam through a nonlinear medium with chi-2 nonlinearity.
4. The network of claim 3, wherein the pump laser is configured for operating continuously, in CW-mode.
5. The network of any one of claims 1 to 4, wherein the network is configured to provide the timing information about the reception of the photons as a time synchronization service.
6. The network of any one of claims 1 to 5, wherein the optical links between the splitter and the nodes are direct.
7. The network of claim 6, wherein the optical links are built entirely out of passive components.
8. The network of any one of claims 1 to 7, wherein an optical source link between the source and the splitter is direct.
9. The network of claim 8, wherein the optical source link is built entirely out of passive components.
10. A method of quantum key distribution in a network, comprising the steps of:
generating photon pairs based on spontaneous parametric downconversion using a source;
splitting photons generated by the source into different optical links using a splitter; providing a plurality of nodes configured to receive the photons via respective ones of the optical links; and
providing a communication link between the nodes for exchanging timing information about the reception of the photons between the nodes to determine photons of one pair being received by two of the nodes.
11. The method of claim 10, comprising generating the photon pairs at random times using the source.
12. The method of claim 11, comprising passing a pump laser beam through a nonlinear medium with chi-2 nonlinearity.
13. The method of claim 12, wherein the pump laser beam is operated continuously, in
CW-mode.
14. The method of any one of claims 10 to 13, comprising provide the timing information about the reception of the photons as a time synchronization service.
15. The method of any one of claims 10 to 14, wherein the optical links between the splitter and the nodes are direct.
16. The method of claim 15, wherein the optical links are built entirely out of passive components.
17. The method of any one of claims 10 to 16, wherein an optical source link between the source and the splitter is direct.
18. The method of claim 17, wherein the optical source link is built entirely out of passive components.
PCT/SG2019/050149 2018-03-20 2019-03-20 Quantum key distribution network and method WO2019182514A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
SG11202009205WA SG11202009205WA (en) 2018-03-20 2019-03-20 Quantum key distribution network and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SG10201802266U 2018-03-20
SG10201802266U 2018-03-20

Publications (1)

Publication Number Publication Date
WO2019182514A1 true WO2019182514A1 (en) 2019-09-26

Family

ID=67988080

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2019/050149 WO2019182514A1 (en) 2018-03-20 2019-03-20 Quantum key distribution network and method

Country Status (2)

Country Link
SG (1) SG11202009205WA (en)
WO (1) WO2019182514A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113141252A (en) * 2020-01-20 2021-07-20 阿里巴巴集团控股有限公司 Quantum key distribution method, quantum communication method, device and system
WO2024012786A1 (en) * 2022-07-12 2024-01-18 British Telecommunications Public Limited Company Improvements to qkd arrangements

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050094818A1 (en) * 2002-12-04 2005-05-05 Kyo Inoue Quantum key distribution system and method using regulated single-photon source
US7536012B1 (en) * 2003-08-06 2009-05-19 The United States Of America As Represented By The Secretary Of The Army Entangled quantum communications and quantum imaging
US20090190759A1 (en) * 2007-11-07 2009-07-30 Austrian Research Centers Gmbh - Arc QKD Arrangement
US20130089206A1 (en) * 2011-10-05 2013-04-11 The Trustees Of Columbia University In The City Of New York Method and apparatus for distributing a quantum key
US20160234017A1 (en) * 2012-01-23 2016-08-11 The Trustees Of Columbia University In The City Of New York Systems and methods for telecommunication using high-dimensional temporal quantum key distribution

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050094818A1 (en) * 2002-12-04 2005-05-05 Kyo Inoue Quantum key distribution system and method using regulated single-photon source
US7536012B1 (en) * 2003-08-06 2009-05-19 The United States Of America As Represented By The Secretary Of The Army Entangled quantum communications and quantum imaging
US20090190759A1 (en) * 2007-11-07 2009-07-30 Austrian Research Centers Gmbh - Arc QKD Arrangement
US20130089206A1 (en) * 2011-10-05 2013-04-11 The Trustees Of Columbia University In The City Of New York Method and apparatus for distributing a quantum key
US20160234017A1 (en) * 2012-01-23 2016-08-11 The Trustees Of Columbia University In The City Of New York Systems and methods for telecommunication using high-dimensional temporal quantum key distribution

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113141252A (en) * 2020-01-20 2021-07-20 阿里巴巴集团控股有限公司 Quantum key distribution method, quantum communication method, device and system
CN113141252B (en) * 2020-01-20 2022-11-25 阿里巴巴集团控股有限公司 Quantum key distribution method, quantum communication method, device and system
WO2024012786A1 (en) * 2022-07-12 2024-01-18 British Telecommunications Public Limited Company Improvements to qkd arrangements

Also Published As

Publication number Publication date
SG11202009205WA (en) 2020-10-29

Similar Documents

Publication Publication Date Title
EP3243294B1 (en) Communication with everlasting security from short-term-secure encrypted quantum communication
Cao et al. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD)
US10014934B2 (en) Apparatus and method for providing eavesdropping detection of an optical fiber communication
AU678049B2 (en) System and method for quantum cryptography
US8683192B2 (en) Methods and apparatus for use in quantum key distribution
TWI472214B (en) Method and apparatus for data privacy in passive optical networks
JP2014086802A (en) Multi-terminal quantum key delivery system
JPH08505019A (en) System and method for key distribution using quantum cryptography
WO2023082600A1 (en) Quantum key-based blockchain network and data secure transmission method
US11616645B1 (en) Encrypted data transmission in optical- and radio-access networks based on quantum key distribution
WO2019182514A1 (en) Quantum key distribution network and method
US8428259B2 (en) Apparatus and method for all-optical encryption and decryption of an optical signal
EP4125238A1 (en) System and method using minimally trusted nodes over a qkd network
CN108540286A (en) A kind of changeable polymorphic type quantum terminal network communication system and method for distributing key
US11489670B2 (en) System and method for transmitting time information and quantum states on an optical medium
EP3625926B1 (en) Quantum key distribution network
CN114499838A (en) Central symmetry QKD annular multi-user system and key distribution method thereof
KR102047541B1 (en) Method for Quantum Cryptography for Network Combining Ring and Star Structure
Guo et al. Accelerated key distribution method for endogenously secure optical communication by synchronized chaotic system based on fiber channel feature
Metwaly et al. Architecture of decentralized multicast network using quantum key distribution and hybrid WDM-TDM
GB2605392A (en) Optical system and method
Razavi et al. Architectural considerations in hybrid quantum-classical networks
Djordjevic et al. Recent quantum-key distribution schemes
El Rifai et al. An IEEE 802.11 quantum handshake using the three-stage protocol
WANG et al. A Quantum Key Re-Transmission Mechanism for QKD-Based Optical Networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19770941

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19770941

Country of ref document: EP

Kind code of ref document: A1