Implementation and security analysis of practical quantum secure direct communication

Rapid development of supercomputers and the prospect of quantum computers are posing increasingly serious threats to the security of communication. Using the principles of quantum mechanics, quantum communication offers provable security of communication and is a promising solution to counter such threats. Quantum secure direct communication (QSDC) is one important branch of quantum communication. In contrast to other branches of quantum communication, it transmits secret information directly. Recently, remarkable progress has been made in proof-of-principle experimental demonstrations of QSDC. However, it remains a technical feat to bring QSDC into a practical application. Here, we report the implementation of a practical quantum secure communication system. The security is analyzed in the Wyner wiretap channel theory. The system uses a coding scheme of concatenation of low-density parity-check (LDPC) codes and works in a regime with a realistic environment of high noise and high loss. The present system operates with a repetition rate of 1 MHz at a distance of 1.5 kilometers. The secure communication rate is 50 bps, sufficient to effectively send text messages and reasonably sized files of images and sounds.Quantum communication: Security despite noiseA quantum communication system demonstrated by researchers in China can transfer information securely in a realistic noisy environment. Emerging supercomputers and quantum computers may soon break the classical encryption methods that protect our information, highlighting the need for new cryptographic techniques based on quantum mechanics. Gui-Lu Long at Tsinghua University, Beijing, and co-workers have demonstrated a form of quantum secure direct communication (QSDC) that transfers information directly without the need to distribute keys, which are vulnerable to attacks. The team used a laser to generate single photons, which could carry secure quantum information such as text messages and image files over a distance of 1.5 kilometers. The information was decoded successfully by the receiver, even when the situation was made realistic by causing high photon loss or introducing errors due to noise.

[1]  Liuguo Yin,et al.  Measurement-device-independent quantum communication without encryption. , 2018, Science bulletin.

[2]  A. Holevo Bounds for the quantity of information transmitted by a quantum communication channel , 1973 .

[3]  Charles H. Bennett,et al.  WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .

[4]  Wei Zhang,et al.  Experimental long-distance quantum secure direct communication. , 2017, Science bulletin.

[5]  Jianhua Lu,et al.  CodeHop: physical layer error correction and encryption with LDPC-based code hopping , 2016, Science China Information Sciences.

[6]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[7]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[8]  Gui-Lu Long,et al.  Experimental quantum secure direct communication with single photons , 2015, Light: Science & Applications.

[9]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[10]  N. Gisin,et al.  “Plug and play” systems for quantum cryptography , 1996, quant-ph/9611042.

[11]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[12]  Shi-Hai Sun,et al.  Quantum key distribution based on phase encoding in long-distance communication fiber. , 2010, Optics letters.

[13]  Normand J. Beaudry,et al.  Security of two-way quantum key distribution , 2013, 1301.3138.

[14]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[15]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[16]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[17]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[18]  Richard Jozsa,et al.  Distinguishability of states and von Neumann entropy , 2000 .

[19]  Jianhua Lu,et al.  Efficient helicopter−satellite communication scheme based on check-hybrid LDPC coding , 2018, Tsinghua Science and Technology.

[20]  Wei Zhang,et al.  Quantum Secure Direct Communication with Quantum Memory. , 2016, Physical review letters.

[21]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[22]  E. Bach Discrete Logarithms and Factoring , 1984 .

[23]  S. Pirandola,et al.  Confidential Direct Communications: A Quantum Approach Using Continuous Variables , 2009, IEEE Journal of Selected Topics in Quantum Electronics.

[24]  Sellami Ali,et al.  DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .

[25]  Stefano Mancini,et al.  Deterministic quantum distribution of a d-ary key , 2009, Quantum Inf. Comput..

[26]  Charles F. Hockett,et al.  A mathematical theory of communication , 1948, MOCO.

[27]  M. Martinelli A universal compensator for polarization changes induced by birefringence on a retracing beam , 1989 .

[28]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[29]  Fuguo Deng,et al.  Bidirectional quantum key distribution protocol with practical faint laser pulses , 2004 .

[30]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[31]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[32]  N. Gisin,et al.  Pulsed Energy-Time Entangled Twin-Photon Source for Quantum Communication , 1999 .

[33]  Marco Lucamarini,et al.  Secure deterministic communication without entanglement. , 2005, Physical review letters.

[34]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[35]  Gui-Lu Long,et al.  Measurement-device-independent quantum secure direct communication , 2018, Science China Physics, Mechanics & Astronomy.

[36]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[37]  Ajay Dholakia,et al.  Efficient implementations of the sum-product algorithm for decoding LDPC codes , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[38]  Himanshu Tyagi,et al.  Universal Hashing for Information-Theoretic Security , 2014, Proceedings of the IEEE.

[39]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[40]  Mikael Skoglund,et al.  Performance Analysis and Design of Two Edge-Type LDPC Codes for the BEC Wiretap Channel , 2013, IEEE Transactions on Information Theory.

[41]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.