Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 110
Filtrar
Mais filtros








Base de dados
Intervalo de ano de publicação
1.
Front Optoelectron ; 17(1): 33, 2024 Sep 29.
Artigo em Inglês | MEDLINE | ID: mdl-39342550

RESUMO

In recent years, quantum computing has made significant strides, particularly in light-based technology. The introduction of quantum photonic chips has ushered in an era marked by scalability, stability, and cost-effectiveness, paving the way for innovative possibilities within compact footprints. This article provides a comprehensive exploration of photonic quantum computing, covering key aspects such as encoding information in photons, the merits of photonic qubits, and essential photonic device components including light squeezers, quantum light sources, interferometers, photodetectors, and waveguides. The article also examines photonic quantum communication and internet, and its implications for secure systems, detailing implementations such as quantum key distribution and long-distance communication. Emerging trends in quantum communication and essential reconfigurable elements for advancing photonic quantum internet are discussed. The review further navigates the path towards establishing scalable and fault-tolerant photonic quantum computers, highlighting quantum computational advantages achieved using photons. Additionally, the discussion extends to programmable photonic circuits, integrated photonics and transformative applications. Lastly, the review addresses prospects, implications, and challenges in photonic quantum computing, offering valuable insights into current advancements and promising future directions in this technology.

2.
Sensors (Basel) ; 24(16)2024 Aug 11.
Artigo em Inglês | MEDLINE | ID: mdl-39204899

RESUMO

In recent research, there has been a significant focus on establishing robust quantum cryptography using the continuous-variable quantum key distribution (CV-QKD) protocol based on Gaussian modulation of coherent states (GMCS). Unlike more stable fiber channels, one challenge faced in free-space quantum channels is the complex transmittance characterized by varying atmospheric turbulence. This complexity poses difficulties in achieving high transmission rates and long-distance communication. In this article, we thoroughly evaluate the performance of the CV-QKD/GMCS system under the effect of individual attacks, considering homodyne detection with both direct and reverse reconciliation techniques. To address the issue of limited detector efficiency, we incorporate the phase-sensitive amplifier (PSA) as a compensating measure. The results show that the CV-QKD/GMCS system with PSA achieves a longer secure distance and a higher key rate compared to the system without PSA, considering both direct and reverse reconciliation algorithms. With an amplifier gain of 10, the reverse reconciliation algorithm achieves a secure distance of 5 km with a secret key rate of 10-1 bits/pulse. On the other hand, direct reconciliation reaches a secure distance of 2.82 km.

3.
Network ; : 1-24, 2024 Jul 16.
Artigo em Inglês | MEDLINE | ID: mdl-39014986

RESUMO

Quantum key distribution (QKD) is a secure communication method that enables two parties to securely exchange a secret key. The secure key rate is a crucial metric for assessing the efficiency and practical viability of a QKD system. There are several approaches that are utilized in practice to calculate the secure key rate. In this manuscript, QKD and error rate optimization based on optimized multi-head self-attention and gated-dilated convolutional neural network (QKD-ERO-MSGCNN) is proposed. Initially, the input signals are gathered from 6G wireless networks which face obstacles to channel. For extending maximum transmission distances and improving secret key rates, the signals are fed to the variable velocity strategy particle swarm optimization algorithm, then the signals are fed to MSGCNN for analysing the quantum bit error rate reduction. The MSGCNN is optimized by intensified sand cat swarm optimization. The performance of the QKD-ERO-MSGCNN approach attains 15.57%, 23.89%, and 31.75% higher accuracy when analysed with existing techniques, like device-independent QKD utilizing random quantum states, practical continuous-variable QKD and feasible optimization parameters, entanglement and teleportation in QKD for secure wireless systems, and QKD for large scale networks methods, respectively.

4.
Entropy (Basel) ; 26(7)2024 Jul 15.
Artigo em Inglês | MEDLINE | ID: mdl-39056963

RESUMO

In this paper, we investigate the impact of classical optical communications in quantum key distribution (QKD) over hollow-core fiber (HCF), multi-core fiber (MCF) and single-core fiber (SCF) and propose wavelength allocation schemes to enhance QKD performance. Firstly, we theoretically analyze noise interference in QKD over HCF, MCF and SCF, such as spontaneous Raman scattering (SpRS) and four-wave mixing (FWM). To mitigate these noise types and optimize QKD performance, we propose a joint noise suppression wavelength allocation (JSWA) scheme. FWM noise suppression wavelength allocation and Raman noise suppression wavelength allocation are also proposed for comparison. The JSWA scheme indicates a significant enhancement in extending the simultaneous transmission distance of classical signals and QKD, reaching approximately 100 km in HCF and 165 km in MCF under a classical power per channel of 10 dBm. Therefore, MCF offers a longer secure transmission distance compared with HCF when classical signals and QKD coexist in the C-band. However, when classical signals are in the C-band and QKD operates in the O-band, the performance of QKD in HCF surpasses that in MCF. This research establishes technical foundations for the design and deployment of QKD optical networks.

5.
Entropy (Basel) ; 26(6)2024 May 26.
Artigo em Inglês | MEDLINE | ID: mdl-38920455

RESUMO

This study introduces a novel approach to bolstering quantum key distribution (QKD) security by implementing swift classical channel authentication within the SARG04 and BB84 protocols. We propose mono-authentication, a pioneering paradigm employing quantum-resistant signature algorithms-specifically, CRYSTALS-DILITHIUM and RAINBOW-to authenticate solely at the conclusion of communication. Our numerical analysis comprehensively examines the performance of these algorithms across various block sizes (128, 192, and 256 bits) in both block-based and continuous photon transmission scenarios. Through 100 iterations of simulations, we meticulously assess the impact of noise levels on authentication efficacy. Our results notably highlight CRYSTALS-DILITHIUM's consistent outperformance of RAINBOW, with signature overheads of approximately 0.5% for the QKD-BB84 protocol and 0.4% for the QKD-SARG04 one, when the quantum bit error rate (QBER) is augmented up to 8%. Moreover, our study unveils a correlation between higher security levels and increased authentication times, with CRYSTALS-DILITHIUM maintaining superior efficiency across all key rates up to 10,000 kb/s. These findings underscore the substantial cost and complexity reduction achieved by mono-authentication, particularly in noisy environments, paving the way for more resilient and efficient quantum communication systems.

6.
Entropy (Basel) ; 26(6)2024 May 31.
Artigo em Inglês | MEDLINE | ID: mdl-38920497

RESUMO

Secret key exchange relies on the creation of correlated signals, serving as the raw resource for secure communication. Thermal states exhibit Hanbury Brown and Twiss correlations, which offer a promising avenue for generating such signals. In this paper, we present an experimental implementation of a central broadcast thermal-state quantum key distribution (QKD) protocol in the microwave region. Our objective is to showcase a straightforward method of QKD utilizing readily available broadcasting equipment. Unlike conventional approaches to thermal-state QKD, we leverage displaced thermal states. These states enable us to share the output of a thermal source among Alice, Bob, and Eve via both waveguide channels and free space. Through measurement and conversion into bit strings, our protocol produces key-ready bit strings without the need for specialized equipment. By harnessing the inherent noise in thermal broadcasts, our setup facilitates the recovery of distinct bit strings by all parties involved.

7.
Entropy (Basel) ; 26(6)2024 Jun 14.
Artigo em Inglês | MEDLINE | ID: mdl-38920524

RESUMO

The wavelength attack utilizes the dependence of beam splitters (BSs) on wavelength to cause legitimate users Alice and Bob to underestimate their excess noise so that Eve can steal more secret keys without being detected. Recently, the wavelength attack on Gaussian-modulated continuous-variable quantum key distribution (CV-QKD) has been researched in both fiber and atmospheric channels. However, the wavelength attack may also pose a threat to the case of ocean turbulent channels, which are vital for the secure communication of both ocean sensor networks and submarines. In this work, we propose two wavelength attack schemes on underwater discrete modulated (DM) CV-QKD protocol, which is effective for the case with and without local oscillator (LO) intensity monitor, respectively. In terms of the transmittance properties of the fused biconical taper (FBT) BS, two sets of wavelengths are determined for Eve's pulse manipulation, which are all located in the so-called blue-green band. The derived successful criterion shows that both attack schemes can control the estimated excess noise of Alice and Bob close to zero by selecting the corresponding condition parameters based on channel transmittance. Additionally, our numerical analysis shows that Eve can steal more bits when the wavelength attack controls the value of the estimated excess noise closer to zero.

8.
Entropy (Basel) ; 26(5)2024 Apr 29.
Artigo em Inglês | MEDLINE | ID: mdl-38785631

RESUMO

Quantum Key Distribution (QKD) has garnered significant attention due to its unconditional security based on the fundamental principles of quantum mechanics. While QKD has been demonstrated by various groups and commercial QKD products are available, the development of a fully chip-based QKD system, aimed at reducing costs, size, and power consumption, remains a significant technological challenge. Most researchers focus on the optical aspects, leaving the integration of the electronic components largely unexplored. In this paper, we present the design of a fully integrated electrical control chip for QKD applications. The chip, fabricated using 28 nm CMOS technology, comprises five main modules: an ARM processor for digital signal processing, delay cells for timing synchronization, ADC for sampling analog signals from monitors, OPAMP for signal amplification, and DAC for generating the required voltage for phase or intensity modulators. According to the simulations, the minimum delay is 11ps, the open-loop gain of the operational amplifier is 86.2 dB, the sampling rate of the ADC reaches 50 MHz, and the DAC achieves a high rate of 100 MHz. To the best of our knowledge, this marks the first design and evaluation of a fully integrated driver chip for QKD, holding the potential to significantly enhance QKD system performance. Thus, we believe our work could inspire future investigations toward the development of more efficient and reliable QKD systems.

9.
Entropy (Basel) ; 26(3)2024 Feb 27.
Artigo em Inglês | MEDLINE | ID: mdl-38539719

RESUMO

Building an underwater quantum network is necessary for various applications such as ocean exploration, environmental monitoring, and national defense. Motivated by characteristics of the oceanic turbulence channel, we suggest a machine learning approach to predicting the channel characteristics of continuous variable (CV) quantum key distribution (QKD) in challenging seawater environments. We consider the passive continuous variable (CV) measurement-device-independent (MDI) QKD in oceanic scenarios, since the passive-state preparation scheme offers simpler linear elements for preparation, resulting in reduced interaction with the practical environment. To provide a practical reference for underwater quantum communications, we suggest a prediction of transmittance for the ocean quantum links with a given neural network as an example of machine learning algorithms. The results have a good consistency with the real data within the allowable error range; this makes the passive CVQKD more promising for commercialization and implementation.

10.
Sci Rep ; 14(1): 3638, 2024 Feb 13.
Artigo em Inglês | MEDLINE | ID: mdl-38351081

RESUMO

The processes of evaluation and comparison play a vital role in the development of a scientific field. In the field of quantum cryptography (especially quantum key distribution, QKD), the so-called secret key rate is used for characterizing the performance of a protocol (scheme). However the current definition of this quantity is incomplete. It does not consider the classical communication process taking place in a QKD protocol. There exists a quantity that involves all the procedures (resources) in a communication process: it is the efficiency (total efficiency). This paper reports a definition of this parameter. Also the relation between the total efficiency and key rate is found. By means of this relation, the total secret key rate of a QKD protocol is expressed. An application of the total key rate is demonstrated: the original twin-field QKD (TF-QKD) is evaluated in terms of this rate. The paper also shows a comparison between the total key rate and the standard key rate of a TF-QKD.

11.
Nano Lett ; 24(2): 640-648, 2024 Jan 17.
Artigo em Inglês | MEDLINE | ID: mdl-38166209

RESUMO

We demonstrate an important step toward on-chip integration of single-photon sources at room temperature. Excellent photon directionality is achieved with a hybrid metal-dielectric bullseye antenna, while back-excitation is permitted by placement of the emitter in a subwavelength hole positioned at its center. The unique design enables a direct back-excitation and very efficient front coupling of emission either to a low numerical aperture (NA) optics or directly to an optical fiber. To show the versatility of the concept, we fabricate devices containing either a colloidal quantum dot or a nanodiamond containing silicon-vacancy centers, which are accurately positioned using two different nanopositioning methods. Both of these back-excited devices display front collection efficiencies of ∼70% at NAs as low as 0.5. The combination of back-excitation with forward directionality enables direct coupling of the emitted photons into a proximal optical fiber without any coupling optics, thereby facilitating and simplifying future integration.

12.
Heliyon ; 10(1): e23578, 2024 Jan 15.
Artigo em Inglês | MEDLINE | ID: mdl-38173502

RESUMO

Because the spectrum of services available in modern telecommunication networks is constantly expanding, security has become increasingly important. Simultaneously, in an era of constant progress in mathematics and computing, the security of existing cryptographic solutions becomes questionable. Quantum Key Distribution (QKD) is a promising secret key agreement primitive that enables long-awaited practical Information-Theoretical Secure (ITS) communications. The key generation rate, however, is one of the limitations of its widespread application to secure high throughput data flows. This paper addresses the aforementioned limitation by employing perfectly correlated bases selection defined by the output of Pseudo-Random Functions based on the keyed-Hash Message Authentication Code construction. In theory, the proposed variant of the BB84 scheme is ITS, reduces memory requirements, and reduces communication overhead during the post-processing stage. It can benefit QKD networks as a service by increasing capacity and accommodating users with varying security needs.

13.
Entropy (Basel) ; 26(1)2024 Jan 07.
Artigo em Inglês | MEDLINE | ID: mdl-38248179

RESUMO

An effective post-processing algorithm is essential for achieving high rates of secret key generation in quantum key distribution. This work introduces an approach to quantum key distribution post-processing by integrating the three main steps into a unified procedure: syndrome-based error estimation, rate-adaptive reconciliation, and subblock confirmation. The proposed scheme employs low-density parity-check codes to estimate the quantum bit error rate using the syndrome information, and to optimize the channel coding rates based on the Slepian-Wolf coding scheme for the rate-adaptive method. Additionally, this scheme incorporates polynomial-based hash verification in the subblock confirmation process. The numerical results show that the syndrome-based estimation significantly enhances the accuracy and consistency of the estimated quantum bit error rate, enabling effective code rate optimization for rate-adaptive reconciliation. The unified approach, which integrates rate-adaptive reconciliation with syndrome-based estimation and subblock confirmation, exhibits superior efficiency, minimizes practical information leakage, reduces communication rounds, and guarantees convergence to the identical key. Furthermore, the simulations indicate that the secret key throughput of this approach achieves the theoretical limit in the context of a BB84 quantum key distribution system.

14.
Sensors (Basel) ; 23(24)2023 Dec 14.
Artigo em Inglês | MEDLINE | ID: mdl-38139664

RESUMO

Hydropower facilities are often remotely monitored or controlled from a centralized remote control room. Additionally, major component manufacturers monitor the performance of installed components, increasingly via public communication infrastructures. While these communications enable efficiencies and increased reliability, they also expand the cyber-attack surface. Communications may use the internet to remote control a facility's control systems, or it may involve sending control commands over a network from a control room to a machine. The content could be encrypted and decrypted using a public key to protect the communicated information. These cryptographic encoding and decoding schemes become vulnerable as more advances are made in computer technologies, such as quantum computing. In contrast, quantum key distribution (QKD) and other quantum cryptographic protocols are not based upon a computational problem, and offer an alternative to symmetric cryptography in some scenarios. Although the underlying mechanism of quantum cryptogrpahic protocols such as QKD ensure that any attempt by an adversary to observe the quantum part of the protocol will result in a detectable signature as an increased error rate, potentially even preventing key generation, it serves as a warning for further investigation. In QKD, when the error rate is low enough and enough photons have been detected, a shared private key can be generated known only to the sender and receiver. We describe how this novel technology and its several modalities could benefit the critical infrastructures of dams or hydropower facilities. The presented discussions may be viewed as a precursor to a quantum cybersecurity roadmap for the identification of relevant threats and mitigation.

15.
Entropy (Basel) ; 25(12)2023 Nov 22.
Artigo em Inglês | MEDLINE | ID: mdl-38136452

RESUMO

The future quantum internet will leverage existing communication infrastructures, including deployed optical fibre networks, to enable novel applications that outperform current information technology. In this scenario, we perform a feasibility study of quantum communications over an industrial 224 km submarine optical fibre link deployed between Southport in the United Kingdom (UK) and Portrane in the Republic of Ireland (IE). With a characterisation of phase drift, polarisation stability and the arrival time of entangled photons, we demonstrate the suitability of the link to enable international UK-IE quantum communications for the first time.

16.
Entropy (Basel) ; 25(11)2023 Nov 06.
Artigo em Inglês | MEDLINE | ID: mdl-37998210

RESUMO

True randomness is necessary for the security of any cryptographic protocol, including quantum key distribution (QKD). In QKD transceivers, randomness is supplied by one or more local, private entropy sources of quantum origin which can be either passive (e.g., a beam splitter) or active (e.g., an electronic quantum random number generator). In order to better understand the role of randomness in QKD, I revisit the well-known "detector blinding" attack on the BB84 QKD protocol, which utilizes strong light to achieve undetectable and complete recovery of the secret key. I present two findings. First, I show that the detector-blinding attack was in fact an attack on the receiver's local entropy source. Second, based on this insight, I propose a modified receiver station and a statistical criterion which together enable the robust detection of any bright-light attack and thus restore security.

17.
Entropy (Basel) ; 25(11)2023 Nov 17.
Artigo em Inglês | MEDLINE | ID: mdl-37998248

RESUMO

The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by the experimental characterization of intensity and phase distributions.

18.
Entropy (Basel) ; 25(9)2023 Aug 31.
Artigo em Inglês | MEDLINE | ID: mdl-37761585

RESUMO

Continuous-variable quantum key distribution (CV-QKD) is a promising protocol that can be easily integrated with classical optical communication systems. However, in the case of quantum-classical co-transmissions, such as dense wavelength division multiplexing with classical channels and time division multiplexing with large-power classical signal, a quantum signal is more susceptible to crosstalk caused by a classical signal, leading to signal distortion and key distribution performance reduction. To address this issue, we propose a noise-suppression scheme based on carrier frequency switching (CFS) that can effectively mitigate the influence of large-power random noise on the weak coherent state. In this noise-suppression scheme, a minimum-value window of the channel's noise power spectrum is searched for and the transmission signal frequency spectrum shifts to the corresponding frequency to avoid large-power channel noise. A digital filter is also utilized to filter out most of the channel noise. Simulation results show that compared to the traditional fixed carrier frequency scheme, the proposed noise-suppression scheme can reduce the excess noise to 1.8%, and the secret key rate can be increased by 1.43 to 2.86 times at different distances. This noise-suppression scheme is expected to be applied in scenarios like quantum-classical co-transmission and multi-QKD co-transmission to provide noise-suppression solutions.

19.
Entropy (Basel) ; 25(8)2023 Aug 07.
Artigo em Inglês | MEDLINE | ID: mdl-37628204

RESUMO

Measurement-device-independent quantum key distribution (MDI-QKD) completely closes the security loopholes caused by the imperfection of devices at the detection terminal. Commonly, a symmetric MDI-QKD model is widely used in simulations and experiments. This scenario is far from a real quantum network, where the losses of channels connecting each user are quite different. To adapt such a feature, an asymmetric MDI-QKD model is proposed. How to improve the performance of asymmetric MDI-QKD also becomes an important research direction. In this work, an advantage distillation (AD) method is applied to further improve the performance of asymmetric MDI-QKD without changing the original system structure. Simulation results show that the AD method can improve the secret key rate and transmission distance, especially in the highly asymmetric cases. Therefore, this scheme will greatly promote the development of future MDI-QKD networks.

20.
Entropy (Basel) ; 25(7)2023 Jul 12.
Artigo em Inglês | MEDLINE | ID: mdl-37509994

RESUMO

Quantum key distribution (QKD) is a promising technique to resist the threat against quantum computers. However, the high loss of quantum signals over a long-distance optical fiber is an obstacle for QKD in the intercontinental domain. In this context, the quantum satellite network is preferred over the terrestrial quantum optical network. Due to the mobility of satellites, the satellite topology is dynamic in the quantum satellite network, which remains a challenge for routing. In hybrid geostationary-earth-orbit (GEO)/low-earth-orbit (LEO) quantum satellite networks, the lack of an efficient scheduling scheme for GEO/LEO satellites also limits the construction of quantum satellite networks. Therefore, this paper provides a topology abstraction-based routing scheme for secret-key provisioning, where the dynamic physical topology is translated into a quasi-static abstracted topology. This scheme contributes to saving the precious secret key resources. In order to improve the success probability of long-distance QKD requests, three novel resource-scheduling heuristic algorithms are proposed in hybrid GEO/LEO quantum satellite networks. Simulation results indicate that the proposed algorithms can improve the success probability of QKD requests by 47% compared to the benchmark.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA