Secure communication via quantum illumination

In the quantum illumination protocol for secure communication, Alice prepares entangled signal and idler beams via spontaneous parametric downconversion. She sends the signal beam to Bob, while retaining the idler. Bob imposes message modulation on the beam he receives from Alice, amplifies it, and sends it back to her. Alice then decodes Bob’s information by making a joint quantum measurement on the light she has retained and the light she has received from him. The basic performance analysis for this protocol—which demonstrates its immunity to passive eavesdropping, in which Eve can only listen to Alice and Bob’s transmissions—is reviewed, along with the results of its first proof-of-principle experiment. Further analysis is then presented, showing that secure data rates in excess of 1 Gbps may be possible over 20-km-long fiber links with technology that is available or under development. Finally, an initial scheme for thwarting active eavesdropping, in which Eve injects her own light into Bob’s terminal, is proposed and analyzed.

[1]  R. Gallager Information Theory and Reliable Communication , 1968 .

[2]  Jeffrey H. Shapiro,et al.  Defeating Active Eavesdropping with Quantum Illumination , 2009, 0904.2490.

[3]  H. Yuen,et al.  Secure communication using mesoscopic coherent states. , 2002, Physical review letters.

[4]  Patricia Bower,et al.  High speed converters and DSP for 100G and beyond , 2011 .

[5]  F. Marsili,et al.  Detecting single infrared photons with 93% system efficiency , 2012, 1209.5774.

[6]  Seth Lloyd,et al.  Quantum enigma machines and the locking capacity of a quantum channel , 2013, ArXiv.

[7]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[8]  C. C. Goodyear,et al.  Radiation and Noise in Quantum Electronics , 1965 .

[9]  E. Bagan,et al.  Quantum Chernoff bound as a measure of distinguishability between density matrices: Application to qubit and Gaussian states , 2007, 0708.2343.

[10]  D. Rosenberg,et al.  High-speed and high-efficiency superconducting nanowire single photon detector array. , 2013, Optics express.

[11]  S. Lloyd,et al.  Quantum illumination with Gaussian states. , 2008, Physical review letters.

[12]  J. Shapiro,et al.  Photon Information Efficient Communication Through Atmospheric Turbulence–Part I: Channel Model and Propagation Statistics , 2014, Journal of Lightwave Technology.

[13]  Seth Lloyd,et al.  Quantum enigma machines , 2013, 1307.0380.

[14]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[15]  Jeffrey H. Shapiro,et al.  Photon Information Efficient Communication Through Atmospheric Turbulence—Part II: Bounds on Ergodic Classical and Private Capacities , 2014, Journal of Lightwave Technology.

[16]  Saikat Guha,et al.  Gaussian-state quantum-illumination receivers for target detection , 2009, 0911.0950.

[17]  A R Dixon,et al.  Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.

[18]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[19]  S. Lloyd Enhanced Sensitivity of Photodetection via Quantum Illumination , 2008, Science.

[20]  Ranjith Nair,et al.  Discriminating quantum-optical beam-splitter channels with number-diagonal signal states: Applications to quantum reading and target detection , 2011, 1105.4063.

[21]  K. Audenaert,et al.  Discriminating States: the quantum Chernoff bound. , 2006, Physical review letters.

[22]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[23]  Jeffrey H. Shapiro,et al.  Defeating Active Eavesdropping with Quantum Illumination , 2011 .

[24]  Zheshen Zhang,et al.  Entanglement's benefit survives an entanglement-breaking channel. , 2013, Physical review letters.

[25]  Jeffrey H. Shapiro,et al.  Near-field turbulence effects on quantum-key distribution , 2003 .

[26]  H. Weinfurter,et al.  The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.

[27]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[28]  Jeffrey H. Shapiro Scintillation has minimal impact on far-field Bennett-Brassard 1984 protocol quantum key distribution , 2011 .

[29]  Seth Lloyd,et al.  Computable bounds for the discrimination of Gaussian states , 2008, 0806.1625.