A quantum access network

The theoretically proven security of quantum key distribution (QKD) could revolutionize the way in which information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, until now no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we introduce and experimentally demonstrate the concept of a ‘quantum access network’: based on simple and cost-effective telecommunication technologies, the scheme can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We show that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realizing multi-user QKD networks with efficient use of resources, and brings QKD closer to becoming a widespread technology.

[1]  Raymond Thorson Newell,et al.  Network-Centric Quantum Communications , 2013 .

[2]  October I Physical Review Letters , 2022 .

[3]  Sellami Ali,et al.  DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .

[4]  Jane E. Nordholt,et al.  Network-Centric Quantum Communications with Application to Critical Infrastructure Protection , 2013, ArXiv.

[5]  Kathy P. Wheeler,et al.  Reviews of Modern Physics , 2013 .

[6]  Christoph Pacher,et al.  The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.

[7]  Renato Renner,et al.  Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.

[8]  Renato Renner,et al.  Security Bounds for Quantum Cryptography with Finite Resources , 2008, TQC.

[9]  Richard J. Hughes,et al.  Optical networking for quantum key distribution and quantum communications , 2009 .

[10]  David P. DiVincenzo,et al.  Quantum information and computation , 2000, Nature.

[11]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[12]  A. R. Dixon,et al.  Gigahertz quantum key distribution with InGaAs avalanche photodiodes , 2008 .

[13]  L. Zhang,et al.  Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.

[14]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[15]  Tamar Frankel [The theory and the practice...]. , 2001, Tijdschrift voor diergeneeskunde.

[16]  J. Koenderink Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.

[17]  A R Dixon,et al.  Continuous operation of high bit rate quantum key distribution , 2010, 1005.4573.

[18]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[19]  R. Rosenfeld Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[20]  Masahito Hayashi Erratum: Upper bounds of eavesdropper's performances in finite-length code with the decoy method [Phys. Rev. A 76, 012329 (2007)] , 2009 .

[21]  Chip Elliott,et al.  Current status of the DARPA quantum network (Invited Paper) , 2005, SPIE Defense + Commercial Sensing.

[22]  Physical Review , 1965, Nature.

[23]  Kai Chen,et al.  Metropolitan all-pass and inter-city quantum communication network. , 2010, Optics express.

[24]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[25]  Richard J. Hughes,et al.  Experimental investigation of quantum key distribution through transparent optical switch elements , 2003, IEEE Photonics Technology Letters.

[26]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[27]  A. W. Sharpe,et al.  Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber , 2012, 1212.0033.

[28]  A R Dixon,et al.  Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.

[29]  James F. Dynes,et al.  Practical treatment of quantum bugs , 2012, Optics/Photonics in Security and Defence.

[30]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[31]  S. M. Barnett,et al.  Securing a quantum key distribution relay network using secret sharing , 2011, 2011 IEEE GCC Conference and Exhibition (GCC).

[32]  Paul D. Townsend,et al.  Quantum cryptography on multiuser optical fibre networks , 1997, Nature.

[33]  Tao Zhang,et al.  Field test of wavelength-saving quantum key distribution network. , 2010, Optics letters.

[34]  A. Shields,et al.  Focus on Quantum Cryptography: Theory and Practice , 2009 .

[35]  H. Weinfurter,et al.  Entanglement-based quantum communication over 144km , 2007 .

[36]  M. Hayashi Upper bounds of eavesdropper’s performances in finite-length code with the decoy method , 2007, quant-ph/0702250.

[37]  A. W. Sharpe,et al.  High speed single photon detection in the near-infrared , 2007, 0707.4307.

[38]  H. Weinfurter,et al.  Free-Space distribution of entanglement and single photons over 144 km , 2006, quant-ph/0607182.

[39]  Valerio Scarani,et al.  Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.

[40]  Benjamin Göhler,et al.  Electro-Optical Remote Sensing, Photonic Technologies, and Applications IV , 2011 .

[41]  H. Weinfurter,et al.  Air-to-ground quantum communication , 2013, Nature Photonics.