1
|
Koniorczyk M, Naszvadi P, Bodor A, Hanyecz O, Adam P, Pintér M. Implementing no-signaling correlations as a service. Sci Rep 2024; 14:10756. [PMID: 38729978 PMCID: PMC11087468 DOI: 10.1038/s41598-024-59492-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/08/2023] [Accepted: 04/11/2024] [Indexed: 05/12/2024] Open
Abstract
We deal with no-signaling correlations that include Bell-type quantum nonlocality. We consider a logical implementation using a trusted central server with encrypted connections to clients. We show that in this way it is possible to implement two-party no-signaling correlations in an asynchronous manner. While from the point of view of physics our approach can be considered as the computer emulation of the results of measurements on entangled particles, from the software engineering point of view it introduces a primitive in communication protocols that can be capable of coordinating agents without revealing the details of their actions. We present an actual implementation in the form of a Web-based application programming interface (RESTful Web API). We demonstrate the use of the API via the simple implementation of the Clauser-Horne-Shimony-Holt game.
Collapse
Affiliation(s)
- Mátyás Koniorczyk
- Department of Quantum Optics and Quantum Information, Institute for Solid State Physics and Optics, HUN-REN Wigner Research Centre for Physics, Budapest, Hungary.
| | - Péter Naszvadi
- Department of Quantum Optics and Quantum Information, Institute for Solid State Physics and Optics, HUN-REN Wigner Research Centre for Physics, Budapest, Hungary
- Faculty of Informatics, Eötvös Loránd University, Budapest, Hungary
| | - András Bodor
- Department of Quantum Optics and Quantum Information, Institute for Solid State Physics and Optics, HUN-REN Wigner Research Centre for Physics, Budapest, Hungary
| | - Ottó Hanyecz
- Department of Quantum Optics and Quantum Information, Institute for Solid State Physics and Optics, HUN-REN Wigner Research Centre for Physics, Budapest, Hungary
- Faculty of Informatics, Eötvös Loránd University, Budapest, Hungary
| | - Peter Adam
- Department of Quantum Optics and Quantum Information, Institute for Solid State Physics and Optics, HUN-REN Wigner Research Centre for Physics, Budapest, Hungary
- Institute of Physics, University of Pécs, Pecs, Hungary
| | - Miklós Pintér
- Corvinus Center for Operational Research, Institute of Advanced Studies, Corvinus University of Budapest, Budapest, Hungary
| |
Collapse
|
2
|
Chapman JC, Alshowkan M, Qi B, Peters NA. Entanglement-based quantum digital signatures over a deployed campus network. OPTICS EXPRESS 2024; 32:7521-7539. [PMID: 38439431 DOI: 10.1364/oe.510787] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2023] [Accepted: 02/02/2024] [Indexed: 03/06/2024]
Abstract
The quantum digital signature protocol offers a replacement for most aspects of public-key digital signatures ubiquitous in today's digital world. A major advantage of a quantum-digital-signatures protocol is that it can have information-theoretic security, whereas public-key cryptography cannot. Here we demonstrate and characterize hardware to implement entanglement-based quantum digital signatures over our campus network. Over 25 hours, we collect measurements on our campus network, where we measure sufficiently low quantum bit error rates (<5% in most cases) which in principle enable quantum digital signatures at over 50 km as shown through rigorous simulation accompanied by a noise model developed specifically for our implementation. These results show quantum digital signatures can be successfully employed over deployed fiber. Moreover, our reported method provides great flexibility in the number of users, but with reduced entanglement rate per user. Finally, while the current implementation of our entanglement-based approach has a low signature rate, feasible upgrades would significantly increase the signature rate.
Collapse
|
3
|
Cao XY, Li BH, Wang Y, Fu Y, Yin HL, Chen ZB. Experimental quantum e-commerce. SCIENCE ADVANCES 2024; 10:eadk3258. [PMID: 38215202 DOI: 10.1126/sciadv.adk3258] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/15/2023] [Accepted: 12/15/2023] [Indexed: 01/14/2024]
Abstract
E-commerce, a type of trading that occurs at a high frequency on the internet, requires guaranteeing the integrity, authentication, and nonrepudiation of messages through long distance. As current e-commerce schemes are vulnerable to computational attacks, quantum cryptography, ensuring information-theoretic security against adversary's repudiation and forgery, provides a solution to this problem. However, quantum solutions generally have much lower performance compared to classical ones. Besides, when considering imperfect devices, the performance of quantum schemes exhibits a notable decline. Here, we demonstrate the whole e-commerce process of involving the signing of a contract and payment among three parties by proposing a quantum e-commerce scheme, which shows resistance of attacks from imperfect devices. Results show that with a maximum attenuation of 25 dB among participants, our scheme can achieve a signature rate of 0.82 times per second for an agreement size of approximately 0.428 megabit. This proposed scheme presents a promising solution for providing information-theoretic security for e-commerce.
Collapse
Affiliation(s)
- Xiao-Yu Cao
- National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- Department of Physics and Beijing Key Laboratory of Opto-electronic Functional Materials and Micro-nano Devices, Key Laboratory of Quantum State Construction and Manipulation (Ministry of Education), Renmin University of China, Beijing 100872, China
| | - Bing-Hong Li
- National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- Department of Physics and Beijing Key Laboratory of Opto-electronic Functional Materials and Micro-nano Devices, Key Laboratory of Quantum State Construction and Manipulation (Ministry of Education), Renmin University of China, Beijing 100872, China
| | - Yang Wang
- National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China
| | - Yao Fu
- Beijing National Laboratory for Condensed Matter Physics and Institute of Physics, Chinese Academy of Sciences, Beijing 100190, China
| | - Hua-Lei Yin
- National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- Department of Physics and Beijing Key Laboratory of Opto-electronic Functional Materials and Micro-nano Devices, Key Laboratory of Quantum State Construction and Manipulation (Ministry of Education), Renmin University of China, Beijing 100872, China
| | - Zeng-Bing Chen
- National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
- MatricTime Digital Technology Co. Ltd., Nanjing 211899, China
| |
Collapse
|
4
|
Choi JW, Park CH, Lim NH, Woo MK, Kang MS, Han SW. Measurement device hacking-free mutual quantum identity authentication over a deployed optical fiber. OPTICS EXPRESS 2023; 31:39261-39278. [PMID: 38018009 DOI: 10.1364/oe.504224] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/30/2023] [Accepted: 10/29/2023] [Indexed: 11/30/2023]
Abstract
Quantum identity authentication serves as a crucial technology for secure quantum communication, but its security often faces challenges due to quantum hacking of measurement devices. This study introduces a measurement-device-independent mutual quantum identity authentication (MDI MQIA) scheme capable of ensuring secure user authentication, despite the use of measurement devices vulnerable to quantum hacking. To realize the MDI MQIA scheme, we proposed and applied a modified Bell state measurement based on linear optics, enabling the probabilistic measurement of all Bell states. Furthermore, the proposed experimental setup adopted a plug-and-play architecture, thus efficiently establishing the indistinguishability of two photons prepared by the communication members. Finally, we successfully performed a proof-of-principle experimental demonstration of the proposed scheme using a field-deployed fiber, achieving quantum bit error rates of less than 3%.
Collapse
|
5
|
Kuang R, Perepechaenko M. Optimization of the multivariate polynomial public key for quantum safe digital signature. Sci Rep 2023; 13:6363. [PMID: 37076506 PMCID: PMC10115866 DOI: 10.1038/s41598-023-32461-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/08/2022] [Accepted: 03/28/2023] [Indexed: 04/21/2023] Open
Abstract
Kuang, Perepechaenko, and Barbeau recently proposed a novel quantum-safe digital signature algorithm called Multivariate Polynomial Public Key or MPPK/DS. The key construction originated with two univariate polynomials and one base multivariate polynomial defined over a ring. The variable in the univariate polynomials represents a plain message. All but one variable in the multivariate polynomial refer to noise used to obscure private information. These polynomials are then used to produce two multivariate product polynomials, while excluding the constant term and highest order term with respect to the message variable. The excluded terms are used to create two noise functions. Then four produced polynomials, masked with two randomly chosen even numbers over the ring, form the Public Key. The two univariate polynomials and two randomly chosen numbers, behaving as an encryption key to obscure public polynomials, form the Private Key. The verification equation is derived from multiplying all of the original polynomials together. MPPK/DS uses a special safe prime to prevent private key recovery attacks over the ring, forcing adversaries to solve for private values over a sub-prime field and lift the solutions to the original ring. Lifting entire solutions from the sub-prime field to the ring is designed to be difficult based on security requirements. This paper intends to optimize MPPK/DS to reduce the signature size by a fifth. We added extra two private elements to further increase the complexity of the private key recovery attack. However, we show in our newly identified optimal attack that these extra private elements do not have any effect on the complexity of the private recovery attack due to the intrinsic feature of MPPK/DS. The optimal key-recovery attack reduces to a Modular Diophantine Equation Problem or MDEP with more than one unknown variables for a single equation. MDEP is a well-known NP-complete problem, producing a set with many equally-likely solutions, so the attacker would have to make a decision to choose the correct solution from the entire list. By purposely choosing the field size and the order of the univariate polynomials, we can achieve the desired security level. We also identified a new deterministic attack on the coefficients of two univariate private polynomials using intercepted signatures, which forms a overdetermined set of homogeneous cubic equations. To the best of our knowledge, the solution to such a problem is to brute force search all unknown variables and verify the obtained solutions. With those optimizations, MPPK/DS can offer extra security of 384 bit entropy at 128 bit field with a public key size being 256 bytes and signature size 128 or 256 bytes using SHA256 or SHA512 as the hash function respectively.
Collapse
|
6
|
Twin-Field Quantum Digital Signature with Fully Discrete Phase Randomization. ENTROPY 2022; 24:e24060839. [PMID: 35741559 PMCID: PMC9222926 DOI: 10.3390/e24060839] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/16/2022] [Revised: 06/14/2022] [Accepted: 06/16/2022] [Indexed: 02/04/2023]
Abstract
Quantum digital signatures (QDS) are able to verify the authenticity and integrity of a message in modern communication. However, the current QDS protocols are restricted by the fundamental rate-loss bound and the secure signature distance cannot be further improved. We propose a twin-field quantum digital signature (TF-QDS) protocol with fully discrete phase randomization and investigate its performance under the two-intensity decoy-state setting. For better performance, we optimize intensities of the signal state and the decoy state for each given distance. Numerical simulation results show that our TF-QDS with as few as six discrete random phases can give a higher signature rate and a longer secure transmission distance compared with current quantum digital signatures (QDSs), such as BB84-QDS and measurement-device-independent QDS (MDI-QDS). Moreover, we provide a clear comparison among some possible TF-QDSs constructed by different twin-field key generation protocols (TF-KGPs) and find that the proposed TF-QDS exhibits the best performance. Conclusively, the advantages of the proposed TF-QDS protocol in signature rate and secure transmission distance are mainly due to the single-photon interference applied in the measurement module and precise matching of discrete phases. Besides, our TF-QDS shows the feasibility of experimental implementation with current devices in practical QDS system.
Collapse
|
7
|
Jiang C, Zhou F, Wang XB. Four-intensity measurement-device-independent quantum key distribution protocol with modified coherent state sources. OPTICS EXPRESS 2022; 30:10684-10693. [PMID: 35473029 DOI: 10.1364/oe.454026] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/21/2022] [Accepted: 03/07/2022] [Indexed: 06/14/2023]
Abstract
We propose a scheme of double-scanning 4-intensity MDI-QKD protocol with the modified coherent state (MCS) sources. The MCS sources can be characterized by two positive parameters, ξ and c. In all prior works, c was set to be the same for all sources. We show that the source parameter c can be different for the sources in the X basis and those in the Z basis. Numerical results show that removing such a constraint can greatly improve the key rates of the protocol with MCS sources. In the typical experiment conditions, comparing with the key rates of WCS sources, the key rates of MCS sources can be improved by several orders of magnitude, and the secure distance is improved by about 40 km. Our results show that MCS sources have the potential to improve the practicality of the MDI-QKD protocol.
Collapse
|
8
|
Weng CX, Lu YS, Gao RQ, Xie YM, Gu J, Li CL, Li BH, Yin HL, Chen ZB. Secure and practical multiparty quantum digital signatures. OPTICS EXPRESS 2021; 29:27661-27673. [PMID: 34615178 DOI: 10.1364/oe.433656] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/09/2021] [Accepted: 07/28/2021] [Indexed: 06/13/2023]
Abstract
Quantum digital signatures (QDSs) promise information-theoretic security against repudiation and forgery of messages. Compared with currently existing three-party QDS protocols, multiparty protocols have unique advantages in the practical case of more than two receivers when sending a mass message. However, complex security analysis, numerous quantum channels and low data utilization efficiency make it intractable to expand three-party to multiparty scenario. Here, based on six-state non-orthogonal encoding protocol, we propose an effective multiparty QDS framework to overcome these difficulties. The number of quantum channels in our protocol only linearly depends on the number of users. The post-matching method is introduced to enhance data utilization efficiency and make it linearly scale with the probability of detection events even for five-party scenario. Our work compensates for the absence of practical multiparty protocols, which paves the way for future QDS networks.
Collapse
|
9
|
Zhang CH, Zhou X, Zhang CM, Li J, Wang Q. Twin-field quantum digital signatures. OPTICS LETTERS 2021; 46:3757-3760. [PMID: 34329274 DOI: 10.1364/ol.426369] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/14/2021] [Accepted: 06/30/2021] [Indexed: 06/13/2023]
Abstract
Digital signature is a key technique in information security, especially for identity authentications. Compared to classical correspondence, quantum digital signatures (QDSs) provide a considerably higher level of security. At present, its performance is limited by key generation protocols, which are fundamentally limited in terms of channel capacity. Based on the idea of twin-field quantum key distribution, this Letter presents a twin-field QDS protocol and details a corresponding security analysis. In its distribution stage, a specific key generation protocol, the sending-or-not-sending twin-field protocol, has been adopted. Besides, we present a systematic model to evaluate the performance of a QDS protocol and compare the performance of our protocol to other typical QDS protocols. Numerical simulation results show that the new protocol exhibits outstanding security and practicality compared to other existing protocols. Therefore, our protocol paves the way toward real-world applications of QDSs.
Collapse
|
10
|
Lu YS, Cao XY, Weng CX, Gu J, Xie YM, Zhou MG, Yin HL, Chen ZB. Efficient quantum digital signatures without symmetrization step. OPTICS EXPRESS 2021; 29:10162-10171. [PMID: 33820149 DOI: 10.1364/oe.420667] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/02/2023]
Abstract
Quantum digital signatures (QDS) exploit quantum laws to guarantee non-repudiation, unforgeability and transferability of messages with information-theoretic security. Current QDS protocols face two major restrictions, including the requirement of the symmetrization step with additional secure classical channels and the quadratic scaling of the signature rate with the probability of detection events. Here, we present an efficient QDS protocol to overcome these issues by utilizing the classical post-processing operation called post-matching method. Our protocol does not need the symmetrization step, and the signature rate scales linearly with the probability of detection events. Simulation results show that the signature rate is three orders of magnitude higher than the original protocol in a 100-km-long fiber. This protocol is compatible with existing quantum communication infrastructure, therefore we anticipate that it will play a significant role in providing digital signatures with unconditional security.
Collapse
|
11
|
Ding HJ, Chen JJ, Ji L, Zhou XY, Zhang CH, Zhang CM, Wang Q. 280-km experimental demonstration of a quantum digital signature with one decoy state. OPTICS LETTERS 2020; 45:1711-1714. [PMID: 32235980 DOI: 10.1364/ol.389848] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/02/2023]
Abstract
A quantum digital signature (QDS) guarantees the unforgeability, nonrepudiation, and transferability of signature messages with information-theoretic security, and hence has attracted much attention recently. However, most previous implementations of QDS showed relatively low signature rates and/or short transmission distance. In this Letter, we report a proof-of-principle phase-encoding QDS demonstration using only one decoy state. First, such a method avoids the modulation of the vacuum state, thus reducing experimental complexity and random number consumption. Moreover, incorporated with low-loss asymmetric Mach-Zehnder interferometers and a real-time polarization calibration technique, we have successfully achieved a higher signature rate, e.g., 0.98 bit/s at 103 km, and to date, a record-breaking, to the best of our knowledge, transmission distance of over 280-km installed fibers. Our work represents a significant step towards real-world applications of QDS.
Collapse
|
12
|
Kumar R, Wonfor A, Penty R, Spiller T, White I. Experimental demonstration of single-shot quantum and classical signal transmission on single wavelength optical pulse. Sci Rep 2019; 9:11190. [PMID: 31371765 PMCID: PMC6671983 DOI: 10.1038/s41598-019-47699-z] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/30/2019] [Accepted: 07/22/2019] [Indexed: 11/09/2022] Open
Abstract
Advances in highly sensitive detection techniques for classical coherent communication systems have reduced the received signal power requirements to a few photons per bit. At this level one can take advantage of the quantum noise to create secure communication, using continuous variable quantum key distribution (CV-QKD). In this work therefore we embed CV-QKD signals within classical signals and transmit classical data and secure keys simultaneously over 25 km of optical fibre. This is achieved by using a novel coherent displacement state generator, which has the potential for being used in a wide range of quantum optical experiments. This approach removes the need for separate channels for quantum communication systems and allows reduced system bandwidth for a given communications specification. This demonstration therefore demonstrates a way of implementing direct quantum physical layer security within a conventional classical communications system, offering a major advance in term of practical and low cost implementation.
Collapse
Affiliation(s)
- Rupesh Kumar
- Quantum Communications Hub, Department of Physics, University of York, York, YO10 5DD, UK. .,Centre for Photonic Systems, Department of Engineering, University of Cambridge, Cambridge, CB3 0FA, UK.
| | - Adrian Wonfor
- Centre for Photonic Systems, Department of Engineering, University of Cambridge, Cambridge, CB3 0FA, UK
| | - Richard Penty
- Centre for Photonic Systems, Department of Engineering, University of Cambridge, Cambridge, CB3 0FA, UK
| | - Tim Spiller
- Quantum Communications Hub, Department of Physics, University of York, York, YO10 5DD, UK
| | - Ian White
- Centre for Photonic Systems, Department of Engineering, University of Cambridge, Cambridge, CB3 0FA, UK.,University of Bath, Claverton Down, Bath, BA2 7AY, UK
| |
Collapse
|
13
|
Liu H, Wang W, Wei K, Fang XT, Li L, Liu NL, Liang H, Zhang SJ, Zhang W, Li H, You L, Wang Z, Lo HK, Chen TY, Xu F, Pan JW. Experimental Demonstration of High-Rate Measurement-Device-Independent Quantum Key Distribution over Asymmetric Channels. PHYSICAL REVIEW LETTERS 2019; 122:160501. [PMID: 31075015 DOI: 10.1103/physrevlett.122.160501] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/06/2018] [Indexed: 06/09/2023]
Abstract
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate all detector side channels and it is practical with current technology. Previous implementations of MDI-QKD all used two symmetric channels with similar losses. However, the secret key rate is severely limited when different channels have different losses. Here we report the results of the first high-rate MDI-QKD experiment over asymmetric channels. By using the recent 7-intensity optimization approach, we demonstrate>10×higher key rate than the previous best-known protocols for MDI-QKD in the situation of large channel asymmetry, and extend the secure transmission distance by more than 20-50 km in standard telecom fiber. The results have moved MDI-QKD towards widespread applications in practical network settings, where the channel losses are asymmetric and user nodes could be dynamically added or deleted.
Collapse
Affiliation(s)
- Hui Liu
- Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai 201315, China
- CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, People's Republic of China
| | - Wenyuan Wang
- Centre for Quantum Information and Quantum Control (CQIQC), Department of Electrical & Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario M5S 3G4, Canada
| | - Kejin Wei
- Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai 201315, China
- CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, People's Republic of China
| | - Xiao-Tian Fang
- Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai 201315, China
- CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, People's Republic of China
| | - Li Li
- Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai 201315, China
- CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, People's Republic of China
| | - Nai-Le Liu
- Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai 201315, China
- CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, People's Republic of China
| | - Hao Liang
- Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai 201315, China
- CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, People's Republic of China
| | - Si-Jie Zhang
- Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai 201315, China
- CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, People's Republic of China
| | - Weijun Zhang
- State Key Laboratory of Functional Materials for Informatics, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 200050, China
| | - Hao Li
- State Key Laboratory of Functional Materials for Informatics, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 200050, China
| | - Lixing You
- State Key Laboratory of Functional Materials for Informatics, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 200050, China
| | - Zhen Wang
- State Key Laboratory of Functional Materials for Informatics, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 200050, China
| | - Hoi-Kwong Lo
- Centre for Quantum Information and Quantum Control (CQIQC), Department of Electrical & Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario M5S 3G4, Canada
| | - Teng-Yun Chen
- Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai 201315, China
- CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, People's Republic of China
| | - Feihu Xu
- Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai 201315, China
- CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, People's Republic of China
| | - Jian-Wei Pan
- Shanghai Branch, Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Shanghai 201315, China
- CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, People's Republic of China
| |
Collapse
|
14
|
A New Quantum Blind Signature Scheme with BB84-State. ENTROPY 2019; 21:e21040336. [PMID: 33267050 PMCID: PMC7514820 DOI: 10.3390/e21040336] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/21/2019] [Revised: 02/25/2019] [Accepted: 03/25/2019] [Indexed: 11/18/2022]
Abstract
The blind signature is widely used in cryptography applications because it can prevent the signer from gaining the original message. Owing to the unconditional security, the quantum blind signature is more advantageous than the classical one. In this paper, we propose a new provable secure quantum blind signature scheme with the nonorthogonal single-photon BB84-state and provide a new method to encode classical messages into quantum signature states. The message owner injects a randomizing factor into the original message and then strips the blind factor from the quantum blind signature signed by the blind signer. The verifier can validate the quantum signature and announce it publicly. At last, the analytical results show that the proposed scheme satisfies all of the security requirements of the blind signature: blindness, unforgeability, non-repudiation, unlinkability, and traceability. Due to there being no use of quantum entanglement states, the total feasibility and practicability of the scheme are obviously better than the previous ones.
Collapse
|
15
|
Yu ZW, Hu XL, Jiang C, Xu H, Wang XB. Sending-or-not-sending twin-field quantum key distribution in practice. Sci Rep 2019; 9:3080. [PMID: 30816159 PMCID: PMC6395628 DOI: 10.1038/s41598-019-39225-y] [Citation(s) in RCA: 50] [Impact Index Per Article: 10.0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/06/2018] [Accepted: 01/16/2019] [Indexed: 11/10/2022] Open
Abstract
Recently, the twin field quantum key distribution (TF-QKD) protocols have been investigated extensively. In particular, an efficient protocol for TF-QKD with sending or not sending the coherent state has been given in. Here in this paper, we present results of practical sending-or-not-sending (SNS) twin field quantum key distribution. In real-life implementations, we need consider the following three requirements, a few different intensities rather than infinite number of different intensities, a phase slice of appropriate size rather than infinitely small size and the statistical fluctuations. We first show the decoy-state method with only a few different intensities and a phase slice of appropriate size. We then give a statistical fluctuation analysis for the decoy-state method. Numerical simulation shows that, the performance of our method is comparable to the asymptotic case for which the key size is large enough. Our method can beat the PLOB bound on secret key capacity. Our results show that practical implementations of the SNS quantum key distribution can be both secure and efficient.
Collapse
Affiliation(s)
- Zong-Wen Yu
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China
- Data Communication Science and Technology Research Institute, Beijing, 100191, People's Republic of China
| | - Xiao-Long Hu
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China
| | - Cong Jiang
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China
| | - Hai Xu
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China
| | - Xiang-Bin Wang
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China.
- Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui, 230026, People's Republic of China.
- Shandong Academy of Information and Communication Technology, Jinan, 250101, People's Republic of China.
- Department of Physics, Southern University of Science and Technology, Shenzhen, 518055, People's Republic of China.
| |
Collapse
|
16
|
Yin HL, Zhu W, Fu Y. Phase self-aligned continuous-variable measurement-device-independent quantum key distribution. Sci Rep 2019; 9:49. [PMID: 30631116 PMCID: PMC6328570 DOI: 10.1038/s41598-018-36366-4] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/25/2018] [Accepted: 11/19/2018] [Indexed: 11/08/2022] Open
Abstract
Continuous-variable measurement-independent-device quantum key distribution (CV-MDI-QKD) can offer high secure key rate at metropolitan distance and remove all side channel loopholes of detection as well. However, there is no in-field experimental demonstration of CV-MDI-QKD due to the remote distance phase-locking techniques challenge. Here, we present a new optical scheme to overcome this difficulty and also removes the requirement of two identical independent lasers. Furthermore, we give an alternate but detailed proof of the minimized key rate condition to extract the secure key rate. We anticipate that our new scheme can be used to demonstrate the in-field CV-MDI-QKD experiment and build the CV-MDI-QKD network with untrusted source.
Collapse
Affiliation(s)
- Hua-Lei Yin
- Department of Physics, Zhejiang Institute of Modern Physics and ZJU-Phoenix Synergetic Innovation Center in Quantum Technology, Zhejiang University, Hangzhou, 310027, China.
| | - Wei Zhu
- Department of Physics, Zhejiang Institute of Modern Physics and ZJU-Phoenix Synergetic Innovation Center in Quantum Technology, Zhejiang University, Hangzhou, 310027, China
| | - Yao Fu
- Department of Physics, Zhejiang Institute of Modern Physics and ZJU-Phoenix Synergetic Innovation Center in Quantum Technology, Zhejiang University, Hangzhou, 310027, China.
| |
Collapse
|
17
|
An XB, Zhang H, Zhang CM, Chen W, Wang S, Yin ZQ, Wang Q, He DY, Hao PL, Liu SF, Zhou XY, Guo GC, Han ZF. Practical quantum digital signature with a gigahertz BB84 quantum key distribution system. OPTICS LETTERS 2019; 44:139-142. [PMID: 30645569 DOI: 10.1364/ol.44.000139] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/04/2018] [Accepted: 11/19/2018] [Indexed: 06/09/2023]
Abstract
Quantum digital signature (QDS) can guarantee message integrity and non-repudiation with information-theoretical security, and it has attracted more attention recently. Since proposed by Andersson et al. [Phys. Rev. A93, 032325 (2016)PLRAAN1050-294710.1103/PhysRevA.93.032325], a quantum digital signature protocol using an insecure channel has been realized with several different quantum key distribution (QKD) systems. Here we report an experimental QDS based on a BB84 QKD system. An asymmetric Faraday-Sagnac-Michelson interferometer structure has been designed in our system, which is intrinsically stable against channel disturbance. The innovatory structure supports the system to work at high speed and, in practice, the repetition rate is in gigahertz. A 0.044 bit/s signature rate has been attained with a 25 dB channel loss composed of a 25 km installed fiber with additional optical attenuation in a 10-10 security level. Thus, our QDS device is stable and highly efficient. This Letter provides a further step for the practical application of QDS.
Collapse
|
18
|
Flamini F, Spagnolo N, Sciarrino F. Photonic quantum information processing: a review. REPORTS ON PROGRESS IN PHYSICS. PHYSICAL SOCIETY (GREAT BRITAIN) 2019; 82:016001. [PMID: 30421725 DOI: 10.1088/1361-6633/aad5b2] [Citation(s) in RCA: 121] [Impact Index Per Article: 24.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/03/2023]
Abstract
Photonic quantum technologies represent a promising platform for several applications, ranging from long-distance communications to the simulation of complex phenomena. Indeed, the advantages offered by single photons do make them the candidate of choice for carrying quantum information in a broad variety of areas with a versatile approach. Furthermore, recent technological advances are now enabling first concrete applications of photonic quantum information processing. The goal of this manuscript is to provide the reader with a comprehensive review of the state of the art in this active field, with a due balance between theoretical, experimental and technological results. When more convenient, we will present significant achievements in tables or in schematic figures, in order to convey a global perspective of the several horizons that fall under the name of photonic quantum information.
Collapse
Affiliation(s)
- Fulvio Flamini
- Dipartimento di Fisica, Sapienza Università di Roma, Piazzale Aldo Moro 5, I-00185 Roma, Italy
| | | | | |
Collapse
|
19
|
Hu XL, Cao Y, Yu ZW, Wang XB. Measurement-Device-Independent Quantum Key Distribution over asymmetric channel and unstable channel. Sci Rep 2018; 8:17634. [PMID: 30518943 PMCID: PMC6281621 DOI: 10.1038/s41598-018-35507-z] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/06/2018] [Accepted: 11/07/2018] [Indexed: 12/02/2022] Open
Abstract
We show that a high key rate of Measurement-Device-Independent Quantum Key Distribution (MDIQKD) over asymmetric and unstable quantum channel can be obtained by full optimization and compensation. Employing a gradient optimization method, we make the full optimization taking both the global optimization for the 12 independent parameters and the joint constraints for statistical fluctuations. We present a loss-compensation method by monitoring the channel loss for an unstable channel. The numerical simulation shows that the method can produce high key rate for both the asymmetric channel and the unstable channel. Compared with the existing results of independent constraints, our result here improves the key rate by 1 to tens of times in typical experimental conditions.
Collapse
Affiliation(s)
- Xiao-Long Hu
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China
| | - Yuan Cao
- National Laboratory for Physical Sciences at the Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, 230026, China
- CAS Center for Exellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai, 201315, China
| | - Zong-Wen Yu
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China
- Data Communication Science and Technology Research Institute, Beijing, 100191, China
| | - Xiang-Bin Wang
- State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University, Beijing, 100084, People's Republic of China.
- Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui, 230026, China.
- Shenzhen Institute for Quantum Science and Engineering, and Department of Physics, Southern University of Science and Technology, Shenzhen, 518055, China.
| |
Collapse
|
20
|
Zhang Q, Xu F, Chen YA, Peng CZ, Pan JW. Large scale quantum key distribution: challenges and solutions [Invited]. OPTICS EXPRESS 2018; 26:24260-24273. [PMID: 30184911 DOI: 10.1364/oe.26.024260] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/01/2018] [Accepted: 07/31/2018] [Indexed: 06/08/2023]
Abstract
Quantum key distribution (QKD) together with one time pad encoding can provide information-theoretical security for communication. Currently, though QKD has been widely deployed in many metropolitan fiber networks, its implementation in a large scale remains experimentally challenging. This letter provides a brief review on the experimental efforts towards the goal of global QKD, including the security of practical QKD with imperfect devices, QKD metropolitan and backbone networks over optical fiber and satellite-based QKD over free space.
Collapse
|
21
|
Zhang CH, Zhang CM, Guo GC, Wang Q. Biased three-intensity decoy-state scheme on the measurement-device-independent quantum key distribution using heralded single-photon sources. OPTICS EXPRESS 2018; 26:4219-4229. [PMID: 29475274 DOI: 10.1364/oe.26.004219] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/27/2017] [Accepted: 01/17/2018] [Indexed: 06/08/2023]
Abstract
At present, most of the measurement-device-independent quantum key distributions (MDI-QKD) are based on weak coherent sources and limited in the transmission distance under realistic experimental conditions, e.g., considering the finite-size-key effects. Hence in this paper, we propose a new biased decoy-state scheme using heralded single-photon sources for the three-intensity MDI-QKD, where we prepare the decoy pulses only in X basis and adopt both the collective constraints and joint parameter estimation techniques. Compared with former schemes with WCS or HSPS, after implementing full parameter optimizations, our scheme gives distinct reduced quantum bit error rate in the X basis and thus show excellent performance, especially when the data size is relatively small.
Collapse
|