Continuous-variable quantum passive optical network
Abstract: Building scalable and secure quantum networks with many users has a high application potential but also holds many practical challenges. A significant stride in this pursuit involves extending quantum key distribution, an information-theoretically secure method for establishing cryptographic keys between two distant users, from a point-to-point protocol implemented on direct optical connections to a quantum access network. Yet, realizations of quantum access networks have, so far, relied on probabilistic or time-sharing strategies. Here, we show theoretically and experimentally that a solution without these constraints can come from the exclusive features of continuous-variable systems. Based on coherent states, we propose continuous-variable quantum passive-optical-network (CV-QPON) protocols, enabling deterministic and simultaneous secret key generation among all network users. We achieve this by leveraging the inherent wave-like property of coherent states split at a beam splitter and electric-field quadrature measurements. We show two protocols with different trust levels assigned to the network users and experimentally demonstrate key generation in a quantum access network with 8 users, each with an 11 km span of access link. Depending on the trust assumptions about users, we reach 1.5 Mbits/s and 2.1 Mbits/s of total network key generation. Demonstrating the potential to expand the network's capacity to accommodate tens of users at a high rate, our CV-QPON protocols offer a pathway toward establishing low-cost, high-rate, and scalable quantum access networks using standard telecom technologies and directly exploiting the existing access network infrastructure.
- S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani et al., “Advances in quantum cryptography,” \JournalTitleAdvances in optics and photonics 12, 1012–1236 (2020).
- M. Peev, C. Pacher, R. Alléaume, C. Barreiro, J. Bouda, W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati, J. Dynes et al., “The secoqc quantum key distribution network in vienna,” \JournalTitleNew Journal of Physics 11, 075001 (2009).
- M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka et al., “Field test of quantum key distribution in the tokyo qkd network,” \JournalTitleOptics express 19, 10387–10409 (2011).
- S. Wang, W. Chen, Z.-Q. Yin, H.-W. Li, D.-Y. He, Y.-H. Li, Z. Zhou, X.-T. Song, F.-Y. Li, D. Wang et al., “Field and long-term demonstration of a wide area quantum key distribution network,” \JournalTitleOptics express 22, 21739–21756 (2014).
- P. D. Townsend, “Quantum cryptography on multiuser optical fibre networks,” \JournalTitleNature 385, 47–49 (1997).
- B. Fröhlich, J. F. Dynes, M. Lucamarini, A. W. Sharpe, Z. Yuan, and A. J. Shields, “A quantum access network,” \JournalTitleNature 501, 69–72 (2013).
- X. Wang, Z. Chen, Z. Li, D. Qi, S. Yu, and H. Guo, “Experimental upstream transmission of continuous variable quantum key distribution access network,” \JournalTitleOptics Letters 48, 3327–3330 (2023).
- M. Takeoka, K. P. Seshadreesan, and M. M. Wilde, “Unconstrained capacities of quantum key distribution and entanglement distillation for pure-loss bosonic broadcast channels,” \JournalTitlePhysical review letters 119, 150501 (2017).
- F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” \JournalTitleNature 421, 238–241 (2003).
- I. Devetak and A. Winter, “Distillation of secret key and entanglement from quantum states,” \JournalTitleProceedings of the Royal Society A: Mathematical, Physical and engineering sciences 461, 207–235 (2005).
- C. Weedbrook, A. M. Lance, W. P. Bowen, T. Symul, T. C. Ralph, and P. K. Lam, “Quantum cryptography without switching,” \JournalTitlePhysical review letters 93, 170504 (2004).
- Y. Huang, T. Shen, X. Wang, Z. Chen, B. Xu, S. Yu, and H. Guo, “Realizing a downstream-access network using continuous-variable quantum key distribution,” \JournalTitlePhysical Review Applied 16, 064051 (2021).
- Y. Zhang, Z. Chen, S. Pirandola, X. Wang, C. Zhou, B. Chu, Y. Zhao, B. Xu, S. Yu, and H. Guo, “Long-distance continuous-variable quantum key distribution over 202.81 km of fiber,” \JournalTitlePhysical review letters 125, 010502 (2020).
- H. Mani, T. Gehring, P. Grabenweger, B. Ömer, C. Pacher, and U. L. Andersen, “Multiedge-type low-density parity-check codes for continuous-variable quantum key distribution,” \JournalTitlePhysical Review A 103, 062419 (2021).
- V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” \JournalTitleReviews of modern physics 81, 1301 (2009).
- P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfections in practical continuous-variable quantum key distribution,” \JournalTitlePhysical Review A 86, 032309 (2012).
- V. C. Usenko and R. Filip, “Trusted noise in continuous-variable quantum key distribution: a threat and a defense,” \JournalTitleEntropy 18, 20 (2016).
- Y. Bian, Y.-C. Zhang, C. Zhou, S. Yu, Z. Li, and H. Guo, “High-rate point-to-multipoint quantum key distribution using coherent states,” \JournalTitlearXiv preprint arXiv:2302.02391 (2023).
- L. Ruppert, V. C. Usenko, and R. Filip, “Long-distance continuous-variable quantum key distribution with efficient channel estimation,” \JournalTitlePhysical Review A 90, 062310 (2014).
- T. Gehring, C. Lupo, A. Kordts, D. Solar Nikolic, N. Jain, T. Rydberg, T. B. Pedersen, S. Pirandola, and U. L. Andersen, “Homodyne-based quantum random number generator at 2.9 Gbps secure against quantum side-information,” \JournalTitleNat, Commun. 12, 1–11 (2021).
- A. A. Hajomer, I. Derkach, N. Jain, H.-M. Chin, U. L. Andersen, and T. Gehring, “Long-distance continuous-variable quantum key distribution over 100-km fiber with local local oscillator,” \JournalTitleScience Advances 10, eadi9474 (2024).
- H.-M. Chin, N. Jain, D. Zibar, U. L. Andersen, and T. Gehring, “Machine learning aided carrier recovery in continuous-variable quantum key distribution,” \JournalTitlenpj Quantum Information 7, 20 (2021).
- A. Leverrier, R. Alléaume, J. Boutros, G. Zémor, and P. Grangier, “Multidimensional reconciliation for a continuous-variable quantum key distribution,” \JournalTitlePhysical Review A 77, 042325 (2008).
- X. Wang, Y. Zhang, S. Yu, B. Xu, Z. Li, and H. Guo, “Efficient rate-adaptive reconciliation for continuous-variable quantum key distribution,” \JournalTitleQuantum Information & Computation 17, 1123–1134 (2017).
- B.-Y. Tang, B. Liu, Y.-P. Zhai, C.-Q. Wu, and W.-R. Yu, “High-speed and large-scale privacy amplification scheme for quantum key distribution,” \JournalTitleScientific Reports 9, 15733 (2019).
- A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” \JournalTitlePhysical Review A 81, 062343 (2010).
- A. A. Hajomer, C. Bruynsteen, I. Derkach, N. Jain, A. Bomhals, S. Bastiaens, U. L. Andersen, X. Yin, and T. Gehring, “Continuous-variable quantum key distribution at 10 gbaud using an integrated photonic-electronic receiver,” \JournalTitlearXiv preprint arXiv:2305.19642 (2023).
- I. Derkach, V. C. Usenko, and R. Filip, “Preventing side-channel effects in continuous-variable quantum key distribution,” \JournalTitlePhysical Review A 93, 032309 (2016).
- N. Jain, I. Derkach, H.-M. Chin, R. Filip, U. L. Andersen, V. C. Usenko, and T. Gehring, “Modulation leakage vulnerability in continuous-variable quantum key distribution,” \JournalTitleQuantum Science and Technology 6, 045001 (2021).
- J. Martinez-Mateo, D. Elkouss, and V. Martin, “Blind reconciliation,” \JournalTitleQuantum Information & Computation 12, 791–812 (2012).
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.