Architectural Considerations in Hybrid Quantum-Classical Networks

Three network architectures, compatible with passive optical networks, for future hybrid quantum-classical networks are proposed and compared. These setups rely on three different schemes for quantum key distribution (QKD): BB84, entanglement-based QKD, and measurement-device-independent QKD (MDI-QKD). It turns out that, while for small-to-moderatesize networks BB84 supports the highest secret key generation rate, it may fail to support large numbers of users. Its cost implications are also expected to be higher than other setups. For large networks, MDI-QKD offers the highest key rate if fast single-photon detectors are employed. Entanglement-based networks offer the longest security distance among the three setups. MDI-QKD is, however, the only architecture resilient to detection loopholes and possibly the most favorable with its less demanding end-user technology. Entanglement-based and MDI-QKD setups can both be combined with quantum repeater systems to allow for long-distance QKD with no trust constraints on the service provider.

[1]  Tao Zhang,et al.  Field Experiment on a “Star Type” Metropolitan Quantum Key Distribution Network , 2009, IEEE Photonics Technology Letters.

[2]  P. Kumavor,et al.  Comparison of four multi-user quantum key distribution schemes over passive optical networks , 2004, Journal of Lightwave Technology.

[3]  H. Weinfurter,et al.  The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.

[4]  Richard J. Hughes,et al.  Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments , 2009 .

[5]  D.Z. Chen,et al.  In-band quantum key distribution (QKD) on fiber populated by high-speed classical data channels , 2006, 2006 Optical Fiber Communication Conference and the National Fiber Optic Engineers Conference.

[6]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[7]  Gilles Brassard,et al.  Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working] , 1989, SIGACT News.

[8]  Paul D. Townsend,et al.  Quantum information to the home , 2011, 2011 37th European Conference and Exhibition on Optical Communication.

[9]  P. Villoresi,et al.  Feasibility of satellite quantum key distribution , 2009, 0903.2160.

[10]  Richard J. Hughes,et al.  Optical networking for quantum key distribution and quantum communications , 2009 .

[11]  Mohsen Razavi,et al.  Quantum key distribution over probabilistic quantum repeaters , 2010 .

[12]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[13]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[14]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[15]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[16]  A. R. Dixon,et al.  Ultrashort dead time of photon-counting InGaAs avalanche photodiodes , 2009, 0905.2931.

[17]  M. Razavi,et al.  Long-distance quantum key distribution with imperfect devices , 2012, 1210.8042.

[18]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[19]  Jeffrey H. Shapiro,et al.  Nonadiabatic approach to entanglement distribution over long distances , 2007 .

[20]  Jeffrey H. Shapiro,et al.  Long-distance quantum communication with neutral atoms , 2005, SPIE International Symposium on Fluctuations and Noise.

[21]  Biham,et al.  Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[22]  Wei Chen,et al.  2 GHz clock quantum key distribution over 260 km of standard telecom fiber. , 2012, Optics letters.

[23]  Mohsen Razavi,et al.  Multiple-Access Quantum Key Distribution Networks , 2011, IEEE Transactions on Communications.

[24]  Vadim Makarov,et al.  Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..

[25]  N. Gisin,et al.  High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres , 2009, 0903.3907.

[26]  A. W. Sharpe,et al.  Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber , 2012, 1212.0033.

[27]  A R Dixon,et al.  Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.

[28]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[29]  Sae Woo Nam,et al.  Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.

[30]  G. Weihs,et al.  Coherence measures for heralded single-photon sources , 2008, 0807.1725.

[31]  Wolfgang Dür,et al.  Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .

[32]  J. Skaar,et al.  Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.

[33]  N. Lutkenhaus,et al.  Quantum repeaters with imperfect memories: Cost and scalability , 2008, 0810.5334.

[34]  E. Diamanti,et al.  Topological optimization of quantum key distribution networks , 2009, 0903.0839.

[35]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[36]  E. Diamanti,et al.  Experimental demonstration of continuous-variable quantum key distribution over 80 km of standard telecom fiber , 2013, CLEO: 2013.

[37]  H. Weinfurter,et al.  Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.

[38]  James F. Dynes,et al.  Practical gigahertz quantum key distribution based on avalanche photodiodes , 2009 .

[39]  Tao Zhang,et al.  Field test of wavelength-saving quantum key distribution network. , 2010, Optics letters.

[40]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[41]  Xiongfeng Ma,et al.  Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.

[42]  Christoph Simon,et al.  Long-Distance Entanglement Distribution with Single-Photon Sources , 2007, 0706.1924.

[43]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[44]  G. Weihs,et al.  Characterizing heralded single-photon sources with imperfect measurement devices , 2008, 0812.2445.