Papers
Topics
Authors
Recent
Search
2000 character limit reached

Continuous-variable quantum passive optical network

Published 25 Feb 2024 in quant-ph | (2402.16044v1)

Abstract: Building scalable and secure quantum networks with many users has a high application potential but also holds many practical challenges. A significant stride in this pursuit involves extending quantum key distribution, an information-theoretically secure method for establishing cryptographic keys between two distant users, from a point-to-point protocol implemented on direct optical connections to a quantum access network. Yet, realizations of quantum access networks have, so far, relied on probabilistic or time-sharing strategies. Here, we show theoretically and experimentally that a solution without these constraints can come from the exclusive features of continuous-variable systems. Based on coherent states, we propose continuous-variable quantum passive-optical-network (CV-QPON) protocols, enabling deterministic and simultaneous secret key generation among all network users. We achieve this by leveraging the inherent wave-like property of coherent states split at a beam splitter and electric-field quadrature measurements. We show two protocols with different trust levels assigned to the network users and experimentally demonstrate key generation in a quantum access network with 8 users, each with an 11 km span of access link. Depending on the trust assumptions about users, we reach 1.5 Mbits/s and 2.1 Mbits/s of total network key generation. Demonstrating the potential to expand the network's capacity to accommodate tens of users at a high rate, our CV-QPON protocols offer a pathway toward establishing low-cost, high-rate, and scalable quantum access networks using standard telecom technologies and directly exploiting the existing access network infrastructure.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (30)
  1. S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani et al., “Advances in quantum cryptography,” \JournalTitleAdvances in optics and photonics 12, 1012–1236 (2020).
  2. M. Peev, C. Pacher, R. Alléaume, C. Barreiro, J. Bouda, W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati, J. Dynes et al., “The secoqc quantum key distribution network in vienna,” \JournalTitleNew Journal of Physics 11, 075001 (2009).
  3. M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka et al., “Field test of quantum key distribution in the tokyo qkd network,” \JournalTitleOptics express 19, 10387–10409 (2011).
  4. S. Wang, W. Chen, Z.-Q. Yin, H.-W. Li, D.-Y. He, Y.-H. Li, Z. Zhou, X.-T. Song, F.-Y. Li, D. Wang et al., “Field and long-term demonstration of a wide area quantum key distribution network,” \JournalTitleOptics express 22, 21739–21756 (2014).
  5. P. D. Townsend, “Quantum cryptography on multiuser optical fibre networks,” \JournalTitleNature 385, 47–49 (1997).
  6. B. Fröhlich, J. F. Dynes, M. Lucamarini, A. W. Sharpe, Z. Yuan, and A. J. Shields, “A quantum access network,” \JournalTitleNature 501, 69–72 (2013).
  7. X. Wang, Z. Chen, Z. Li, D. Qi, S. Yu, and H. Guo, “Experimental upstream transmission of continuous variable quantum key distribution access network,” \JournalTitleOptics Letters 48, 3327–3330 (2023).
  8. M. Takeoka, K. P. Seshadreesan, and M. M. Wilde, “Unconstrained capacities of quantum key distribution and entanglement distillation for pure-loss bosonic broadcast channels,” \JournalTitlePhysical review letters 119, 150501 (2017).
  9. F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” \JournalTitleNature 421, 238–241 (2003).
  10. I. Devetak and A. Winter, “Distillation of secret key and entanglement from quantum states,” \JournalTitleProceedings of the Royal Society A: Mathematical, Physical and engineering sciences 461, 207–235 (2005).
  11. C. Weedbrook, A. M. Lance, W. P. Bowen, T. Symul, T. C. Ralph, and P. K. Lam, “Quantum cryptography without switching,” \JournalTitlePhysical review letters 93, 170504 (2004).
  12. Y. Huang, T. Shen, X. Wang, Z. Chen, B. Xu, S. Yu, and H. Guo, “Realizing a downstream-access network using continuous-variable quantum key distribution,” \JournalTitlePhysical Review Applied 16, 064051 (2021).
  13. Y. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, B. Chu, Y. Zhao, B. Xu, S. Yu, and H. Guo, “Long-distance continuous-variable quantum key distribution over 202.81 km of fiber,” \JournalTitlePhysical review letters 125, 010502 (2020).
  14. H. Mani, T. Gehring, P. Grabenweger, B. Ömer, C. Pacher, and U. L. Andersen, “Multiedge-type low-density parity-check codes for continuous-variable quantum key distribution,” \JournalTitlePhysical Review A 103, 062419 (2021).
  15. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” \JournalTitleReviews of modern physics 81, 1301 (2009).
  16. P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfections in practical continuous-variable quantum key distribution,” \JournalTitlePhysical Review A 86, 032309 (2012).
  17. V. C. Usenko and R. Filip, “Trusted noise in continuous-variable quantum key distribution: a threat and a defense,” \JournalTitleEntropy 18, 20 (2016).
  18. Y. Bian, Y.-C. Zhang, C. Zhou, S. Yu, Z. Li, and H. Guo, “High-rate point-to-multipoint quantum key distribution using coherent states,” \JournalTitlearXiv preprint arXiv:2302.02391 (2023).
  19. L. Ruppert, V. C. Usenko, and R. Filip, “Long-distance continuous-variable quantum key distribution with efficient channel estimation,” \JournalTitlePhysical Review A 90, 062310 (2014).
  20. T. Gehring, C. Lupo, A. Kordts, D. Solar Nikolic, N. Jain, T. Rydberg, T. B. Pedersen, S. Pirandola, and U. L. Andersen, “Homodyne-based quantum random number generator at 2.9 Gbps secure against quantum side-information,” \JournalTitleNat, Commun. 12, 1–11 (2021).
  21. A. A. Hajomer, I. Derkach, N. Jain, H.-M. Chin, U. L. Andersen, and T. Gehring, “Long-distance continuous-variable quantum key distribution over 100-km fiber with local local oscillator,” \JournalTitleScience Advances 10, eadi9474 (2024).
  22. H.-M. Chin, N. Jain, D. Zibar, U. L. Andersen, and T. Gehring, “Machine learning aided carrier recovery in continuous-variable quantum key distribution,” \JournalTitlenpj Quantum Information 7, 20 (2021).
  23. A. Leverrier, R. Alléaume, J. Boutros, G. Zémor, and P. Grangier, “Multidimensional reconciliation for a continuous-variable quantum key distribution,” \JournalTitlePhysical Review A 77, 042325 (2008).
  24. X. Wang, Y. Zhang, S. Yu, B. Xu, Z. Li, and H. Guo, “Efficient rate-adaptive reconciliation for continuous-variable quantum key distribution,” \JournalTitleQuantum Information & Computation 17, 1123–1134 (2017).
  25. B.-Y. Tang, B. Liu, Y.-P. Zhai, C.-Q. Wu, and W.-R. Yu, “High-speed and large-scale privacy amplification scheme for quantum key distribution,” \JournalTitleScientific Reports 9, 15733 (2019).
  26. A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” \JournalTitlePhysical Review A 81, 062343 (2010).
  27. A. A. Hajomer, C. Bruynsteen, I. Derkach, N. Jain, A. Bomhals, S. Bastiaens, U. L. Andersen, X. Yin, and T. Gehring, “Continuous-variable quantum key distribution at 10 gbaud using an integrated photonic-electronic receiver,” \JournalTitlearXiv preprint arXiv:2305.19642 (2023).
  28. I. Derkach, V. C. Usenko, and R. Filip, “Preventing side-channel effects in continuous-variable quantum key distribution,” \JournalTitlePhysical Review A 93, 032309 (2016).
  29. N. Jain, I. Derkach, H.-M. Chin, R. Filip, U. L. Andersen, V. C. Usenko, and T. Gehring, “Modulation leakage vulnerability in continuous-variable quantum key distribution,” \JournalTitleQuantum Science and Technology 6, 045001 (2021).
  30. J. Martinez-Mateo, D. Elkouss, and V. Martin, “Blind reconciliation,” \JournalTitleQuantum Information & Computation 12, 791–812 (2012).
Citations (4)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 1 like about this paper.