Architectural considerations in hybrid quantum-classical networks (Invited Paper)

Three network architectures, compatible with passive optical networks, for future hybrid quantum-classical networks are proposed and compared. These setups rely on three different schemes for quantum key distribution (QKD): BB84, entanglement-based QKD, and measurement-device-independent QKD (MDI-QKD). It turns out that, while for small-to-moderatesize networks BB84 supports the highest secret key generation rate, it may fail to support large numbers of users. Its cost implications are also expected to be higher than other setups. For large networks, MDI-QKD offers the highest key rate if fast single-photon detectors are employed. Entanglement-based networks offer the longest security distance among the three setups. MDI-QKD is, however, the only architecture resilient to detection loopholes and possibly the most favorable with its less demanding end-user technology. Entanglement-based and MDI-QKD setups can both be combined with quantum repeater systems to allow for long-distance QKD with no trust constraints on the service provider.

[1]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[2]  Richard J. Hughes,et al.  Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments , 2009 .

[3]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[4]  Jeffrey H. Shapiro,et al.  Nonadiabatic approach to entanglement distribution over long distances , 2007 .

[5]  Sae Woo Nam,et al.  Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.

[6]  G. Weihs,et al.  Coherence measures for heralded single-photon sources , 2008, 0807.1725.

[7]  Tao Zhang,et al.  Field Experiment on a “Star Type” Metropolitan Quantum Key Distribution Network , 2009, IEEE Photonics Technology Letters.

[8]  A. R. Dixon,et al.  Ultrashort dead time of photon-counting InGaAs avalanche photodiodes , 2009, 0905.2931.

[9]  Jeffrey H. Shapiro,et al.  Long-distance quantum communication with neutral atoms , 2005, SPIE International Symposium on Fluctuations and Noise.

[10]  N. Lutkenhaus,et al.  Quantum repeaters with imperfect memories: Cost and scalability , 2008, 0810.5334.

[11]  E. Diamanti,et al.  Topological optimization of quantum key distribution networks , 2009, 0903.0839.

[12]  H. Weinfurter,et al.  The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.

[13]  A R Dixon,et al.  Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.

[14]  H. Weinfurter,et al.  Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.

[15]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[16]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[17]  P. Kumavor,et al.  Comparison of four multi-user quantum key distribution schemes over passive optical networks , 2004, Journal of Lightwave Technology.

[18]  D.Z. Chen,et al.  In-band quantum key distribution (QKD) on fiber populated by high-speed classical data channels , 2006, 2006 Optical Fiber Communication Conference and the National Fiber Optic Engineers Conference.

[19]  Tao Zhang,et al.  Field test of wavelength-saving quantum key distribution network. , 2010, Optics letters.

[20]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[21]  Biham,et al.  Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[22]  James F. Dynes,et al.  Practical gigahertz quantum key distribution based on avalanche photodiodes , 2009 .

[23]  Richard J. Hughes,et al.  Optical networking for quantum key distribution and quantum communications , 2009 .

[24]  N. Gisin,et al.  High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres , 2009, 0903.3907.

[25]  A. W. Sharpe,et al.  Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber , 2012, 1212.0033.

[26]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[27]  Paul D. Townsend,et al.  Quantum information to the home , 2011, 2011 37th European Conference and Exhibition on Optical Communication.

[28]  P. Villoresi,et al.  Feasibility of satellite quantum key distribution , 2009, 0903.2160.

[29]  Mohsen Razavi,et al.  Quantum key distribution over probabilistic quantum repeaters , 2010 .

[30]  Wolfgang Dür,et al.  Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .

[31]  J. Skaar,et al.  Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.

[32]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[33]  Xiongfeng Ma,et al.  Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.

[34]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[35]  Wei Chen,et al.  2 GHz clock quantum key distribution over 260 km of standard telecom fiber. , 2012, Optics letters.

[36]  Mohsen Razavi,et al.  Multiple-Access Quantum Key Distribution Networks , 2011, IEEE Transactions on Communications.

[37]  M. Razavi,et al.  Long-distance quantum key distribution with imperfect devices , 2012, 1210.8042.

[38]  Vadim Makarov,et al.  Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..

[39]  E. Diamanti,et al.  Experimental demonstration of continuous-variable quantum key distribution over 80 km of standard telecom fiber , 2013, CLEO: 2013.

[40]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[41]  Christoph Simon,et al.  Long-Distance Entanglement Distribution with Single-Photon Sources , 2007, 0706.1924.

[42]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[43]  G. Weihs,et al.  Characterizing heralded single-photon sources with imperfect measurement devices , 2008, 0812.2445.

[44]  Gilles Brassard,et al.  Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working] , 1989, SIGACT News.