Practical Phase-Modulation Stabilization in Quantum Key Distribution via Machine Learning

In practical implementation of quantum key distributions (QKD), it requires efficient, real-time feedback control to maintain system stability when facing disturbance from either external environment or imperfect internal components. Usually, a "scanning-and-transmitting" program is adopted to compensate physical parameter variations of devices, which can provide accurate compensation but may cost plenty of time in stopping and calibrating processes, resulting in reduced efficiency in key transmission. Here we for the first propose to employ a well known machine learning model, i.e., the Long Short-Term Memory Network (LSTM), to predict those physical parameter variations in advance and actively perform real-time control on corresponding QKD devices. Experimentally, we take the phase-coding scheme as an example and run the LSTM model based QKD system for more than 10 days. Experimental results show that we can keep the same level of quantum-bit error rate as the traditional "scanning-and-transmitting" program by employing our new machine learning method, but dramatically reducing the scanning time and resulting in significantly enhanced key transmission efficiency. Furthermore, our present machine learning model should also be applicable to any other QKD systems using any coding scheme or QKD protocols, and thus seems a very promising candidate in large-scale application of quantum communication network in the near future.

[1]  Shuang Wang,et al.  Practical gigahertz quantum key distribution robust against channel disturbance. , 2018, Optics letters.

[2]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[3]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[4]  J. F. Dynes,et al.  Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.

[5]  Bing Zhu,et al.  Intrinsic-Stabilization Uni-Directional Quantum Key Distribution Between Beijing and Tianjin , 2004, quant-ph/0412023.

[6]  G. Guo,et al.  Stability of phase-modulated quantum key distribution systems , 2004, quant-ph/0408031.

[7]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[8]  Tanja Lange,et al.  Post-quantum cryptography , 2008, Nature.

[9]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[10]  Y.-H. Zhou,et al.  Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.

[11]  J F Dynes,et al.  Experimental measurement-device-independent quantum digital signatures , 2017, Nature Communications.

[12]  Wei Chen,et al.  Practical quantum digital signature with a gigahertz BB84 quantum key distribution system. , 2019, Optics letters.

[13]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[14]  Tao Zhang,et al.  Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.

[15]  Les E. Atlas,et al.  Recurrent neural networks and robust time series prediction , 1994, IEEE Trans. Neural Networks.

[16]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[17]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[18]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[19]  G. Guo,et al.  Active phase compensation of quantum key distribution system , 2008 .

[20]  Yoshua Bengio,et al.  Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.

[21]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[22]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[23]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[24]  J. F. Dynes,et al.  Overcoming the rate-distance barrier of quantum key distribution without using quantum repeaters , 2018 .

[25]  Qin Wang,et al.  Proof-of-Principle Demonstration of Passive Decoy-State Quantum Digital Signatures Over 200 km , 2018, Physical Review Applied.

[26]  G. Guo,et al.  Faraday-Michelson system for quantum cryptography. , 2005, Optics letters.