Protocols and Resources for New Generation Continuous Variable Quantum Key Distribution

Quantum optics has been developing into a promising platform for future generation communications protocols. Much of this promise so far has come from the development of quantum key distribution (QKD). The majority of the development of QKD is done with discrete variables (DV), i.e. qubits with the underlying system of single photons. This is one interpretation of an optical field. Alternatively an optical field can be interpreted as wave with the continuous variable (CV) observables of phase and amplitude. This interpretation comes with the advantage of access to high efficiency detection at room temperature and deterministic sources at the cost of susceptibility to noise in lossy channels. This thesis presents an investigation of protocols and resources for the next generation of CV QKD protocols with two directions, the development of quantum state resources and the development of QKD protocols.This thesis starts with the details on the on going development of a low loss squeezed state resource using OPA for use in future communication and estimation experiments. So far the OPA has produced 11dB of squeezing with 13dB predicted with reasonable improvements to losses and locking. Being able to perform a Bell test with a CV Bell state is also key for future CV QKD protocols. Originally developed for DV systems the Bell test is a fundamental test of quantum mechanics. Here the first experimental demonstration of an optical CV bell test is presented. The experiment violated a CHSH Bell inequality with |B| = 2.31. This violation holds promise for being able to realise new device or source independent CV protocols. The second half of this thesis proposes a channel parameter estimation protocol based on the method of moments and presents the results of a one side device independent CV QKD demonstration based on the family of Gaussian QKD protocols. The proposed channel parameter estimation protocol through the use of the method of moments is able to use information usually disregarded for estimation of an adversaries information. The result does not allow for an increase in range of a fully optimised protocol but can increase the key rate by an order of magnitude with high loss channels. Using a newly found entroptic uncertainty relation for CV tripartite states a new security proof was applied to the family of Gaussian CV QKD protocols. This resulted in the discovery of six new protocols with the special property of being one side device independent. Using the new security proof three of the protocols were demonstrated with a positive key rate.

[1]  W. Graham Richards,et al.  Art of electronics , 1983, Nature.

[2]  Helen Mary Chrzanowski Extracting quantum correlations from gaussian states , 2014 .

[3]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[4]  A. Falcon Physics I.1 , 2018 .

[5]  Simon Singh,et al.  The code book : the secret history of codes and codebreaking , 2000 .

[6]  Margarita A. Man’ko,et al.  Journal of Optics B: Quantum and Semiclassical Optics , 2003 .

[7]  B. Buchler Electro-optic control of quantum measurements , 2001 .

[8]  C. Read,et al.  Handbook of the normal distribution , 1982 .

[9]  A. Zeilinger,et al.  Speakable and Unspeakable in Quantum Mechanics , 1989 .

[10]  J. Janousek,et al.  Investigation of non-classical light and its application in ultrasensitive measurements , 2008 .

[11]  W. Bowen Experiments towards a quantum information network with squeezed light and entanglement , 2003 .

[12]  Maira Amezcua,et al.  Quantum Optics , 2012 .

[13]  J. Y. Haw Continuous Variable Optimisation of Quantum Randomness and Probabilistic Linear Amplification , 2018 .

[14]  William IEEE TRANSACTIONS ON INFORMATION THEORY VOL XX NO Y MONTH Signal Propagation and Noisy Circuits , 2019 .

[15]  Francisco Rodríguez-Henríquez,et al.  Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields , 2018, IACR Cryptol. ePrint Arch..

[16]  V. Barnett,et al.  Applied Linear Statistical Models , 1975 .

[17]  Timothy C. Ralph,et al.  A Guide to Experiments in Quantum Optics , 1998 .

[18]  Agnes Ferenczi,et al.  Security proof methods for quantum key distribution protocols , 2013 .

[19]  N. Cerf,et al.  Quantum information with optical continuous variables: from Bell tests to key distribution , 2007 .

[20]  H. Paul,et al.  Measuring the quantum state of light , 1997 .

[21]  M. Stefszky Generation and Detection of Low-Frequency Squeezing for Gravitational-Wave Detection , 2012 .

[22]  J. S. Meditch,et al.  Estimation Theory , 1977, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[23]  R. Renner,et al.  New Journal of Physics Composability in quantum cryptography , 2009 .

[24]  N. Grosse Harmonic entanglement & photon anti-bunching , 2009 .