The instant application claims priority to European Patent Application No. 23216095.2, filed Dec. 13, 2023, which is incorporated herein in its entirety by reference.
The present disclosure generally relates to methods and systems for quantum key distribution and, more particularly, to techniques for encoding classical information into quantum signals and decoding classical information from quantum signals.
A typical quantum key distribution (QKD) protocol comprises two main stages: quantum communication and classical post-processing. In principle, in a transmitter device (“Alice”) a random bit sequence is generated, encoded into quantum states and sent to a receiver device (“Bob”) via a quantum channel. The encoding regularly comprises generating coherent states (e.g., by a laser) and applying optical elements such as phase shifters, attenuators, or beam-splitters. The transmitted states are measured in the receiver device, after which classical post-processing is performed for establishing a shared secret key.
In practical optical QKD setups, classical information can be encoded into physical systems using:
UK patent application GB 2,529,228 A relates to interference methods for quantum communication systems. Reference is made to time varying gain modulation comprising arbitrary pulse shapes. However, encoding of classical information is carried out using a conventional BB84 method with setting phases for entire bit-carrying signals.
U.S. Pat. No. 10,153,848 B2 pertains to a transmitter for a continuous variable quantum communication system. Sequences of light pulses are created such that subsequent light pulses have a different phase or intensity with respect to each other.
Chinese patent application CN 110,620,655 A discloses intensity modulation of light pulses and subsequent phase modulation in the context of quantum key distribution. Intensity modulation (of entire pulses) is carried out to create decoy states. In CN 205,961,140 U, a light intensity modulator is described, which acts on the optical signal before encoding or after phase encoding. Intensity is not connected with encoding, but for decoy states.
The present disclosure generally describes improved techniques for encoding classical information into quantum signals and decoding classical information from quantum signals in quantum key distribution.
For solving the problem, an encoding method, a decoding method, a method for quantum key distribution, a transmitter device, a receiver device, and a system for quantum key distribution are provided.
According to an aspect of the invention, an encoding method for quantum key distribution is provided, the method being carried out in a transmitter device having a classical processor and means for preparing and transmitting quantum signals, the method comprising:
According to another aspect, a decoding method for quantum key distribution is provided, the method being carried out in a receiver device having a classical processor and means for receiving and measuring quantum signals, the method comprising:
According to another aspect, a method for quantum key distribution is provided, the method being carried out in a system comprising a transmitter device having a classical processor and means for preparing and transmitting quantum signals and a receiver device having a further classical processor and means for receiving and measuring quantum signals. The method comprises:
According to another aspect, a transmitter device for quantum key distribution is provided, comprising a classical processor and means for preparing and transmitting quantum signals and being configured to carry out the following steps:
According to another aspect, a receiver device for quantum key distribution is provided, comprising a classical processor and means for receiving and measuring quantum signals and being configured to carry out the following steps:
According to another aspect, a system for quantum key distribution is provided, the system comprising a transmitter device having a classical processor and means for preparing and transmitting quantum signals and a receiver device having a further classical processor and means for receiving and measuring quantum signals. The system is configured to carry out the following steps:
In one embodiment, modulating the intensity profile of each optical pulse particularly depends on the first encoder value of the at least one first bit of the encoder initial bit sequence. Further, modulating the phase profile of each optical pulse depends on the second encoder value of the at least one second bit of the encoder initial bit sequence.
As a result, a shared key may be determined in a more robust manner, in particular for increased values of possible information leakage to an eavesdropper. High intensity quantum states with comparably weak distinguishability may be employed. In contrast, conventional quantum cryptography assumes that a potential eavesdropper may obtain all losses occurring in the quantum channel between the legitimate parties. Thus, weak coherent states with only few photons per signal are generally used.
In
The transmitter device 11 may comprise a (classical) processor 11a and a (classical) memory 11b and the receiver device 12 may comprise a further (classical) processor 12a and a further (classical) memory 12b. The transmitter device 11 and the receiver device 12 may be part of the system. The transmitter device 11 and the receiver device 12 are connected to the quantum channel.
The eavesdropper device 13 with an eavesdropping processor 13a and an eavesdropping memory 13b represents a device outside the system with potential access to quantum channel 10. The eavesdropper device 13 may be arranged at the transmission line 10 such that the optical signals transmitted via the transmission line 10 are at least partially received and/or retransmitted by the eavesdropper device 13. The eavesdropper device 13 may also access the further communication channels.
At least one of, preferably each of the transmitter device 11, the receiver device 12, and the eavesdropper device 13 may comprise means to at least one of prepare, transmit, receive, and measure quantum states, in particular optical quantum states. In particular, the transmitter device 11 may comprise means for preparing and transmitting quantum signals and/or quantum states, e.g., a (quantum state) preparation device 11c. Further, the receiver device 12 may comprise means for receiving and measuring quantum signals and/or quantum states, e.g., a (quantum state) measurement device 12c. The eavesdropper device 13 may likewise comprise a preparation and/or measurement device 13c. The transmitter device 11 and the receiver device 12 may each comprise means for receiving and transmitting (further) classical information (e.g., via the classical channel).
The first memory 11b, the second memory 12b, and the eavesdropping memory 13b may each comprise a quantum memory that is configured to store quantum signals and a classical memory that is configured to store classical signals. The quantum memory may be provided using optical delay lines, controlled reversible inhomogeneous broadening (CRIB), a Duan-Lukin-Cirac-Zoller (DLCZ) scheme, revival of silenced echo (ROSE), and/or hybrid photon echo rephasing (HYPER).
In the following, the steps for determining a shared key by quantum key distribution will be briefly described. In
Certain steps will be explained in more detail in the subsequent sections, in particular, loss control of the transmission line (transmission line control) (step 21, section b), encoding (step 23, section c), decoding (step 25, section d), and post-processing (steps 26 to 28, section e).
The transmitter device 11 and the receiver device 12 are connected via an authenticated (public) classical channel and the optical fiber(s) of the transmission line 10 serve as a quantum channel 10a.
In an initial step 20, an initial inner loss profile of the transmission line 10 (in particular its optical fiber segments) is determined, which essentially represents the natural signal losses in the transmission line 10. At this preliminary step, it should be ensured that no eavesdropper is accessing the transmission line 10. The initial loss profile may be shared between the transmitter device 11 and the receiver device 12 via the authenticated classical communication channel.
In a first step 21, physical loss control of the transmission line 10 is carried out by the transmitter device 11 and the receiver device 12 by transmitting optical test pulses. In particular, a loss profile is determined and, preferably, shared between the transmitter device 11 and the receiver device 12 via the classical channel.
By comparing the thus updated inner loss profile with the initial inner loss profile, a fraction rE of the signal possibly seized by the eavesdropper may be determined. For example, if, in a section of the transmission line 10, the natural signal losses in this section are represented by r0 and the eavesdropper intercepts an intercepted fraction rE of the signal, then the intercepted fraction rE can be derived from total losses rt via the relation (1−rt)=(1−rE) (1−r0).
If the intercepted fraction rE grows too large, so that the legitimate users lose their informational advantage over the eavesdropper, the protocol is terminated. Termination of the protocol depends on the length of the transmission line 10. The protocol may in particular be terminated if an effective key rate is below a target key rate value.
Based on the loss profile, protocol settings such as signal shapes, post-selection parameters, error-correction codes may be determined. Physical loss control including transmission of optical test pulses may be carried out in parallel with the transmission of the optical (signal) pulses for determining the shared key. If a change in rE is detected, the protocol settings may be adapted.
In a second step 22, using a random number generator, a bit sequence is determined in the transmitter device 11.
In a third step 23, the encoder initial bit sequence is encoded into the respective intensity profiles and/or phase profiles of a plurality of optical (signal) pulses.
In a fourth step 24, the optical pulses are transmitted to the receiver device 12 via the quantum channel 10a.
In a fifth step 25, the optical pulses are received and measured by the receiver device 12. A corresponding decoder initial bit sequence is determined in the receiver device 12. Due to quantum and classical noise, quantum states of certain optical pulses corresponding to different bit values cannot be determined accurately. Thus, the second initial bit string may contain additional errors.
In a sixth step 26, inconclusive bits, which correspond to quantum measurements in the receiver device 12 determined as inconclusive, are discarded from the encoder initial bit sequence in the transmitter device 11 and the decoder initial bit sequence in the receiver device 12 (post-selection). This results in a first raw key in the transmitter device and a second raw key in the receiver device. In order to discard the inconclusive bits, bit positions of the inconclusive signal bits (as part of the further classical information) may be transmitted via the classical channel from the receiver device 12 to the transmitter device 11.
In a seventh step 27, by disclosing a part of the encoder initial bit sequence (in particular, the first/encoder raw key) and/or the decoder initial bit sequence (in particular, the second/decoder raw key) via the classical channel (as part of the classical information and/or the further classical information), an error rate may be determined and error correction may be performed on the first raw key and the second raw key by the transmitter device 11 and the receiver device 12, respectively. The error correction maybe carried out employing an error correction code, e.g., a low-density parity-check (LDPC) code, a Hamming code, or a cascade protocol. As a result, an error corrected bit sequence is determined in the transmitter device 11 from the first raw key and in the receiver device 12 from the second raw key.
In an eighth step 28, an amplified key sequence is determined from the error corrected bit sequence using privacy amplification. Known privacy amplification methods may be employed during which (further) classical information is exchanged. The amplified key sequence is shorter than the error corrected bit sequence and any potential eavesdropper has none or negligibly small information on the amplified key sequence. The amplified key sequence represents a shared key sequence between the transmitter device 11 and the receiver device 12 as a result of quantum key distribution. The privacy amplification may be based on the determined value of rE.
The steps from the first step 21 to the eighth step 28 may be repeated (arrow 29) and the amplified key sequences concatenated to a (total) shared key until a total length of the shared key is as large as required by the application at hand.
During all steps 21 to 28, the transmission line 10 may be continuously controlled (arrow 20a). Hence, a signal loss profile is determined and, preferably, shared between the transmitter device 11 and the receiver device 12 via the classical channel. In case where the integrity of the transmission line 10 is compromised to the extent of a considerable risk that the eavesdropper would decipher the scattering losses, the protocol may be terminated.
In the following, the first step 21 of physical loss control of the transmission line 10 will be explained in more detail.
The reflectogram shows the logarithmic power of backscattered optical test pulses as a function of distance between a reflectometer and the corresponding discontinuity. The reflectometer may be arranged within or close to the transmitter device 11 and/or the receiver device 12.
The natural signal losses along the quantum channel 10a/the transmission line 10 are due to homogenous scattering and result in an exponential decay of power corresponding to linear regions 30. Reflectogram features 31 to 34 comprising deviations from the exponential decay of the reflectogram curve, in particular sharp peaks and/or drops in the reflectogram curve allow for classifying the signal losses at the corresponding position of the transmission line 10. This is especially useful at the initial step 20, where identifying and mitigating local losses is important for comparison with determined losses during key exchange.
The reflectogram features 31 to 34 generally correspond to imperfections of the transmission line 10 and may, e.g., represent low-quality splices, bends and different connectors. Scattering losses from such regions are localized with respect to the transmission line 10. Peaks in the reflectogram features 31 to 34 may result from an excessive scattering which in the case of physical connectors are due to the test pulses undergoing Fresnel reflection. Noisy region 35 at the right-hand side of the reflectogram represents the end of the backscattered signal.
Additionally or alternatively, the transmission line control may comprise transmittometry, i.e., intensities of the optical test pulses transmitted by the transmitter device 11 and received by the receiver device 12 are analyzed for classifying the signal losses at respective positions of the transmission line 10. Classification by analyzing received optical signals in the receiver device 12 may also be carried out in the receiver device 12. The transmitter device 11 may also be configured to carry out classification, in particular by combining measurements of backscattered test pulse components and of optical test pulses received in the receiver device 12.
For increased precision, optical test pulses with highest intensity, in particular with intensity greater than the intensity of the optical (signal) pulses. Parameters of the transmitted optical test pulses, such as intensity, phase, length, and shape, are determined randomly in the transmitter device 11. The parameters remain secret until the quantum measurements are completed by the receiver device 12. Next, the transmitter device 11 announces the employed parameters and the transmitter device 11 and the receiver device 12 perform a cross-check of the parameters and determine the losses in the transmission line 10. The time intervals between the optical test pulses transmission may be determined according to a pre-shared secret bit sequence. This ensures that a potential eavesdropper cannot discern optical test pulses from optical (signal) pulses. As a result, it is impossible for the eavesdropper to create an additional permanent leakage constant or a leakage targeting for certain optical signal pulses and optical test pulses. By analyzing the optical test pulses, the eavesdropper's knowledge about the optical signal pulses can be assessed.
Below, the third step 23 of encoding the encoder initial bit sequence into the respective intensity profiles and/or phase profiles of the plurality of optical (signal) pulses will be described in more detail.
In
Each optical pulse is generated from a laser pulse of a laser 40 and using a Mach-Zehnder (MZ) interferometer 41. The laser pulse (as generated by the laser 40) has a time length Ts and a constant input optical power Pγ=ℏΩ|γ|2, wherein Ω is a carrier frequency and γ a (complex) pulse amplitude.
The MZ interferometer 41 may comprise a first phase modulator 43, a second phase modulator 45, a first beam splitter 42, and a second beam splitter 44. The laser pulse may pass through the first beam splitter 42, the first phase modulator 43, the second beam splitter 44, and the second phase modulator 45.
The first beam splitter 42 and the second beam splitter 44 are 50:50 beam splitters. The laser pulse is split at the first beam splitter 42 into a first part and a second part and recombined at the second beam splitter 44. The laser pulse is again split at the second beam splitter 44 into a third part and a fourth part. The first part passes the first phase modulator 43. The second part passes directly to the second beam splitter 44. The third part is transmitted to a control detector 46. The fourth part passes the second phase modulator 45 and is subsequently transmitted to the quantum channel 10a (as one optical pulse of the plurality of optical pulses). By detector 46, the proper preparation of the optical pulses can be monitored.
The parameters of both phase modulators 43, 45 may be controlled in time for modulating the intensity profile and/or phase profile of the optical pulses.
The transformation of an input state (0, γ)T (vacuum on one port and pulse with complex amplitude γ on another) via the MZ interferometer 41 can be represented by
ÛBS(1,2) denotes the transformation corresponding to the first and the second beam splitter 42, 44. Further, Ûφ denotes the transformation corresponding to a first phase shift φ via the first phase modulator 43 and Ûψ denotes the transformation corresponding to a second phase shift ψ via the second phase modulator 45. The first phase shift φ(t) and the second phase shift ψ(t) are time-dependent functions and determine the intensity profile profiles and the phase profile of the output optical pulse, respectively. The optical pulse is represented by the following quantum state:
The intensity profile Pline(t) (in terms of optical power) and the phase profile ϕline(t) can be represented as follows:
Pγ denotes the (constant) input optical power from the laser 40. For an intensity profile Pline(t)=ℏΩ|F(t)|2 (in terms of optical power) with intensity profile |F(t)|2 in terms of intensity, the corresponding first phase shift φ(t) may be determined as
by using that
Since |cos(φ(t))|≤1, for the input optical power Pγ applies: Pγ≥ℏΩ|F(t)|2. The input optical power Pγ is thus greater than the intensity profile (in power terms) for each time t.
The first phase shift φ(t) may be compensated and a desirable phase profile Pline(t) be prepared by controlling the second phase shift ψ(t).
In a particular example, the classical (first) bits of the encoder initial bit sequence are encoded only in the intensity profiles. In this case, the phase profile can be time-dependent for each optical pulse but be the same for each first encoder value (i.e., be independent from the first encoder value). Moreover, a single first bit is encoded per optical pulse. Hence, for each optical pulse, the intensity function depends on a first encoder value of a (single) first bit of the encoder initial bit sequence).
The intensity profile in terms of optical power for a first (bit) value a can be written as:
where ξa(t) is a time-dependent function and depending on/determined by a, P′ is constant (optical power) component and P″ is an amplitude of a modulation component, here: an oscillatory component. The function P′+P″·cos(ξa(t)) may be considered (up to a constant factor) to be the intensity function according to which the intensity profile is modulated. By combining Eq. (4) und Eq. (7), i.e.,
the employed first phase shift φ(t) (depending on the first encoder value a) may be determined as:
where Pγ≥P′+P″ (since |cos(φa(t))|≤1).
In
For a=0, the intensity profile can be represented by
and for a=1 by
wherein P′=10−8 W, P″=10−9 W, Ts=100 ns, ƒ0=90 MHZ, and ƒ1=110 MHz. As can be seen from curves 50, 51, for a=0, the instantaneous frequency increases with time, while for a=1, the instantaneous frequency decreases with time. The factors
may be understood as a first chirp rate and a second chirp rate, respectively.
In the following, the measuring and decoding of optical pulses received in the receiver device 12 (step 25) is described in more detail.
From the optical pulses, a decoder initial bit sequence is determined in the receiver device 12. To this end, an approximate intensity profile of each optical pulse is determined by measuring intensity values of the optical pulse for a plurality of time bins. Using the approximate intensity profile, (first decoder) values of the decoder initial bit sequence can be determined. Further, an approximate phase profile of the optical pulse is determined by measuring phase values of the optical pulse for a plurality of time bins. From the approximate phase profile, further (second decoder) values of the decoder initial bit sequence can be determined.
Measuring the intensity values and/or the phase values may comprise carrying out heterodyne measurements for each time bin. The heterodyne measurements include splitting a received optical pulse into two beams which interfere with two further beams of local oscillators (LO) and measuring interference events using photo-diode detectors.
For matching a local oscillator phase with a phase of the laser (using which the optical pulses have been generated), unmodulated optical pulses (of constant intensity and phase) may be transmitted from the laser via an additional quantum channel (in parallel to the (modulated) optical pulses).
In the following example, an approximate intensity profile is determined without determining an approximate phase profile. Hence, the phases of the optical pulses can remain constant in time. Thus, there is no phase difference between different optical pulses and in-between one optical pulse. The intensity profile of each optical pulse of the plurality of optical pulses has been modulated in the transmitter device 11 according to an intensity function depending on time and on the first encoder value of one first bit of the encoder initial bit sequence. Further, the plurality of optical pulses has been transmitted via the quantum channel 10a and been received in the receiver device 12.
In the receiver device 12, a plurality of quantum measurements is carried out, such that a plurality of (average) photon numbers is determined for a plurality of time bins characterized by a time interval Δt. Once per time interval Δt, an intensity value (i.e., a number of photons received during the time interval Δt) is determined. Thus, a discrete set of time values and corresponding photon numbers is determined (approximate/discretized intensity profile). From the approximate intensity profile, the intensity profile as initially generated in the transmitter device 11 can be reconstructed with a certain accuracy and, thus, the corresponding bit value be estimated.
The intensity profiles may be generated such that their total energies remain constant for each of the plurality of optical pulses and for each possible bit value. That is, the total number of photons of each optical pulse is constant:
where Na(t) denotes the average number of photons of an optical pulse in the time interval [t, t+Δt] in case of the first (bit) value being a. Due to Poisson noise, the determined approximate intensity profiles will in general not coincide with the ideal ones. The measured number of photons in the time interval [t, t+Δt] for bit value a can be represented by
where na(t) is random variable associated with noise. For high signal intensities, na(t) may be treated as a Gaussian random variable at every time t. According to the bosonic model of optical amplifiers, the resulting mean value and variance can be written as:
where M is a number of optical amplifiers along the quantum channel 10a, G is an amplification factor of one optical amplifier. Thus, M=DAB/d and G=1/T, where DAB IS the distance between the transmitter device 11 and the receiver device 12, d is the distance between neighboring optical amplifiers and T=10−0.02·d is an attenuation parameter of an optical fiber. The number of photons and the optical power Pa(t) at time t with the time discretization Δt are related as follows:
wherein ℏΩ is the energy of one photon. In order to determine the (first decoder) value of one (first) bit of the decoder initial bit sequence in the receiver device 12, a first measured correlator difference ΔQ from the approximate intensity profile {Ñ(t)}t and ideal approximate intensity profiles {N0(t)}t and {N1(t)}t for first encoder value 0 and 1, respectively, is determined.
For establishing the procedure to determine first decoder value a, the statistical properties of correlators Qa(0), Qa(1) between ideal approximate intensity profiles and noisy approximate intensity profiles are analyzed in the following. The correlators Qa(0), Qa(1) are defined as:
wherein ΣtN0(t)N1(t) is a normalization factor. The correlators may be treated as Gaussian random variables, since they can be represented as weighted sums of Gaussian variables. Hence, the difference between Qa(0) and Qa(1) (correlator difference for value a),
can be assumed to be normally distributed as well. Considering the relation between optical power and photon number according to Eq. (15), the mean value of the correlator difference ΔQa (correlator mean difference ea) is
The correlator mean difference ea can thus be explicitly represented as a sum of Gaussian random variables. Hence, using Eq. (15), the variance of the correlator difference ΔQa is also a weighted sum of variances:
In summary, the correlator difference ΔQa can be treated as a normally distributed random variable with mean value ea (Eq. (18)) and variance σa2 (Eq. (19)). Thus, the probability of a measurement result for the correlator difference ΔQ under the condition, that sent bit has first encoder value a, is as follows:
According to Bayes' rule, the probability that the sent bit had first encoder value a—under the condition that the measured correlator difference has value ΔQ—can be written as
For further post-selection and error correction procedures, a (first) threshold value
To provide an estimate of
For a determined threshold value
From the approximate intensity profile {Ñ(t)}t, i.e., from the measured intensity values Ñ(t), the (first) measured correlator difference ΔQ (which can be expressed as the difference from the correlators Q(0) and Q(1)) is determined by:
In case the measured correlator difference ΔQ is greater than the threshold value ΔQ, i.e., ΔQ>
In another example, in case an approximate phase profile {{tilde over (Π)}(t)}t is determined, a second measured correlator difference ΔR=R(0)−R(1) can analogously be determined from measured phase values {circumflex over (Π)}(t) by
and be compared with a second threshold value
In this section, certain aspects of the classical post-processing steps (including post-selection, error correction and privacy amplification—steps 26 to 28) carried out in the transmitter device 11 and/or the receiver device 12 will be described in more detail. During these steps, (further) classical information is exchanged between the transmitter device 11 and the receiver device 12.
At the post-selection stage (step 26), measurement results which do not lead to an information advantage with respect to the eavesdropping device 13 are discarded by the receiver device 12.
In particular, measurement results and/or value allocations of the at least one first (second bit) of the decoder initial bit sequence may be discarded based on the first (second) measured correlator difference ΔQ (ΔR) being greater or smaller than the first (second) threshold value
In case of a single first bit of the decoder initial bit sequence, allocating the first decoder value may thus be carried out as follows:
The four value may be allocated analogously. The first (second) post-selection parameter θ ({tilde over (θ)}) may be a non-negative value, and is preferably determined such that a resulting key generation rate is maximized.
The normalized key generation rate after error correction and privacy amplification may be expressed as
wherein L is the length of the encoder initial bit sequence generated in the transmitter device 11. The expression in Eq. (27) and its constituting terms will be derived in the following subsection.
The distance between the transmitter device 11 and the receiver device 12 is DAB=1000 km. The key generation rate is obtained by numerical optimization over the post-selection parameter θ. For the considered signal leakage values rE, the optimal post-selection parameter θ lies in the interval [0.08; 0.1]. These values are of the order of the difference between the correlator mean differences |e1−e0|.
For the mutual information I(A:B) between the transmitter device 11 and the receiver device 12, the conditional probabilities p(0|a), p(1|a) of obtaining bit value b∈{0,1} in case of bit a is sent are determined as follows:
Eq. (28) and Eq. (29) can be combined as
Hence, the mutual information I(A:B) between the transmitter device 11 and the receiver device 12 is:
and the probability for a conclusive result p(✓) is:
where H(X) is the Shannon entropy of a system X, h2(x)=−x·log2(x)−(1−x)·log2(1−x) is the binary entropy function.
LDPC codes provide a more efficient error correction if the error probability for each bit is estimated independently instead of a collective estimation of an average error. In such a case, the mutual information I(A:B) between the transmitter device 11 and the receiver device 12 according to Eq. (31) becomes:
By introducing, J0 and J1 with
the mutual information I(A:B) takes the form:
Physical loss control (step 21) further restricts possible eavesdropping attacks that may go unnoticed: the only option left for an eavesdropper is to create relatively small artificial signal leakages. In the case of one leakage position with factor rE at the quantum channel 10a in the vicinity of the transmitter device 11, the mutual information I(A: E) between the eavesdropping device 13 and the transmitter device 11 can be estimated as the i.e., Holevo quantity of the ensemble
i.e.,
wherein
From this, the final key generation rate Lƒ/L after error correction and privacy amplification procedures according to Eq (27) is obtained using the Devetak-Winter equation.
The scalar product |(α0|α1
may be determined as follows.
Optical pulses with time-dependent amplitude F(t)eiΩt∈ (with intensity profile F(t) and carrier frequency Ω) are generated, for instance, by the laser 40 with the frequency Ω and controlled attenuation and phase-shifts (see above section c). The normalized amplitude ƒ(t)eiΩt and the normalized intensity profile ƒ(t) can be expressed as follows:
where the integral is taken over or over the subspace {t|F(t)≠0}. Hence, ∫dt|ƒ(t)|2=1. The spectrum of the considered intensity profile can be found as the Fourier transform of the normalized amplitude ƒ(t)eiΩt, i.e.,
The normalized intensity profile ƒ(t) may define the light quantum mode. The creation operator associated with the mode is
By introducing the further operator
the creation operator can be written as:
The creation operator {circumflex over (b)}5† consists of photon creations for times t, described by the further operators ât†, with weights ƒ(t). The phase factor eiΩt appears due to time evolution of excited atoms in the laser medium. The commutation relation for new operators are as follows:
A coherent state |α> in the mode ƒ(t) is defined as an eigenstate of the corresponding annihilation operator:
α may a real non-negative number. Thus, all information about the time-dependent phase of the pulse is included in the complex-valued function ƒ(t):
The scalar product of Fock states in different modes ƒ(t) and g(t) is calculated as follows:
wherein the sum is taken over all permutations σ on a set {1, . . . , n}. After integration, each of the n! components, corresponding to different permutations, contributes equally to the overall sum, which results in the factor n!.
The scalar product of differently shaped coherent states (i.e., of coherent states in different modes) can be calculated as
Eq. (48) describes the most general case. Since each intensity profile F(t), G(t) for fixed time t is a complex number, they may be expressed in terms of absolute value and phase by F(t)=|F(t)|eiϕ
In the exemplary case of constant phases (ϕF(t)=ϕG(t)=const, i.e., only the intensity profiles |F(t)|2, |G(t)|2 are time-dependent functions), the scalar product is:
By expressing the intensity profile in terms of optical power PF(t) (energy density in time) as opposed to in terms of photon number density in time |F(t)|2 (wherein ℏΩ·|F(t)|2=PF(t) with the energy of one photon being ℏΩ, the scalar product can be expressed as:
Eq. (48) can be alternatively derived as follows. Using |α|2=∫dt|F(t)|2 and |β|2=§ dt|G(t)|2 with real α and β, the two coherent states can be written as
Similarly, |G=|β, g
=eβb
e−|β|
Using eX+Y=eXeYe−[X,Y]/2=eYeXe[X,Y]/2, the scalar product α, ƒ|β, g
is:
(e) Comparison with Phase Coding
To illustrate the effectiveness of the proposed intensity/phase profile coding method, the key generation rates of other coding methods may be compared.
A plot of the key generation rate for phase coding (for different values of input optical power P (0.05 nW and 0.1 nW)) and for the proposed method (“shape coding”) as a function of rE is shown in
In phase coding, optical pulses corresponding to different logical bits have phases differing by π or, alternatively, by some other value. Here, both optical pulses have identical arbitrary intensity profiles, which do not affect security analysis.
Thus, a constant (time-independent) intensity profile may be considered for comparison. To produce such states, no Mach-Zehnder interferometer needs to be employed but merely one controllable phase modulator. In the case of phase difference π, the scalar product (Eq. (50)) of the quantum states intercepted by the eavesdropper reads:
wherein the optical power terms are equal and do not depend on time: P0(t)=P1(t)=P. Here, the eavesdropping device 13 is assumed to be at the quantum channel 10a close to the transmitter device 11. Thus, there are no additional correlations between the subsystems of the eavesdropping device 13 and the receiver device 12, caused by the optical amplifiers. Hence, the Holevo value of the ensemble of pure states may be employed for estimating the intercepted information. The error probability perr and the probability p(✓) of a conclusive result at the receiver device are as follows:
wherein θ is the post-selection parameter and
(f) Comparison with Intensity Coding
In intensity coding, different logical bits get encoded into coherent states with differing mean numbers of photons (i.e., different mean optical powers). Thus, optical pulses corresponding to different bit values have the same time distribution of photons but a different average number of photons.
To prepare quantum states with intensity coding, the transmitter device 11 may control only the first phase shift φ(t). For the purpose of security analysis, it is sufficient to consider rectangular pulses with constant phase value zero. After preparation, the pure quantum states pass through a quantum channel 11a comprising optical amplifiers. Hence, the resulting quantum states at the receiver device 12 are mixed:
wherein |αa are coherent states with αa∈
. To distinguish between the mixed states ρ0 and ρ1, simple intensity measurements can be carried out in the receiver device 12. The photon-number distributions may be approximated by Gaussian distributions. Thus, the random variable describing the outcomes of a measurement in the receiver device 12 with bit “a” has a normal distribution with the following parameters:
wherein M denotes the number of optical amplifiers along the quantum channel 10a and G denotes the amplification factor of each amplifier. The variables P0(1) denote the average optical powers of each signal. The discrete value N may be treated as a continuous value so that the probability density distributions describing the outcomes of the measurements may be expressed as follows:
which is equivalent to:
Assuming without loss of generality that e1>e0, the error probability can be expressed as
wherein
Including Eq. (58) yields:
Analogously to the preceding section, the resulting expression for the probability of a conclusive outcome is:
Corresponding to Eq. (31) and Eq. (32), the mutual information between the transmitter device 11 and the receiver device 12 can be calculated as:
Estimating the eavesdropper's information requires the scalar product of the seized quantum states, which for constant phase value and different average photon numbers is:
For
was optimized over the power difference |e0−e1|. The optimal difference for all the considered P was determined to be about |e0−e1|≈10−1·P.
The features disclosed in this specification, the figures and/or the claims may be material for the realization of various embodiments, taken in isolation or in various combinations thereof.
In the present disclosure, due to their (non-trivial) time-dependency, the intensity function and the phase function may be assumed to be non-constant in time. In other words, the intensity function and the phase function may be considered to vary with time. Analogously, the intensity function and the phase function may be considered to vary with the first encoder value and, respectively, second encoder value. Further, the modulating of the intensity profile and the modulating of the phase profile may be considered to depend on time and on the first encoder value and, respectively, the second encoder value.
The time-dependent intensity and/or phase profiles may vary fast in time, making information on the encoded logical bits contained in the scattered radiation very difficult to retrieve for an eavesdropper. Thus, security with respect to conventional encoding routines is substantially increased.
The quantum signal may comprise a plurality of quantum states. For example, each quantum state may correspond to one of the optical pulses. Each optical pulse may comprise a plurality of photons.
Each optical pulse may correspond to an optical wave-packet which starts and ends on a time scale when its (instant) intensity drops to zero and/or below a noise level, which may, e.g., be between 0.01% and 1.0% of the average peak value of the plurality of optical pulses. A pulse length of an optical pulse may correspond to the difference between its start and end on the time scale.
The intensity (time-) profile (shape) of an optical pulse may correspond to the intensity and/or photon number and/or optical power of the optical pulse depending on time. The phase (time-) profile of an optical pulse may correspond to its phase depending on time.
The encoder initial bit sequence may be randomly generated, preferably using a quantum random number generator (QRNG). Alternatively, a classical pseudo random number generator may be employed.
The at least one first bit of the encoder initial bit sequence may be different from the at least one second bit of the encoder initial bit sequence. Thus, more information can be encoded in the optical pulses.
Alternatively, the at least one first bit and the at least one second bit of the encoder initial bit sequence may be the same. In this case, the intensity function may depend on time and on a (first encoder) value of at least one (first) bit of the encoder initial bit sequence and the phase function may depend on time and the (first encoder) value of the at least one (first) bit of the encoder initial bit sequence. Hence, the same first bit or first bits may be encoded in both intensity and phase, resulting in increased redundancy and robustness (e.g., to noise).
The at least one first bit of the decoder initial bit sequence may be different from the at least one second bit of the decoder initial bit sequence. Alternatively, the at least one first bit and the at least one second bit of the decoder initial bit sequence may be the same.
At least one of the first encoder value, the second encoder value, the first decoder value, and the second decoder value may be a binary value. For example, in case the intensity function depends on a single first bit of the encoder initial bit sequence, the first encoder value may be a bit value, i.e., the first encoder value may be “0” or “1”. In case the intensity function depends on two first bits of the encoder initial bit sequence, the first encoder value may be one of “00”, “01”, “10”, and “11”.
The classical post-processing, transmitting classical information to the receiver device, and receiving further classical information from the receiver device may comprise classical post-processing, transmitting and receiving during at least one of bit reconciliation, post selection, error estimation, error correction, and privacy amplification. The classical post-processing, receiving classical information from the transmitter device, and transmitting further classical information to the transmitter device may comprise classical post-processing, transmitting and receiving during at least one of bit reconciliation, post selection, error estimation, error correction, and privacy amplification.
The total number of photons of each of the plurality of optical pulses and for each first encoder value may be constant.
The (each) optical pulse may be generated from a (pulsed) laser beam and/or using a Mach-Zehnder interferometer (of the encoder device). The Mach-Zehnder interferometer may comprise a first phase modulator, a second phase modulator, a first beam splitter, and a second beam splitter. The laser beam may pass through the first beam splitter, the first phase modulator, the second beam splitter, and the second phase modulator.
Before modulation, each optical pulse may comprise, e.g., a rectangular intensity profile. In particular, before modulation, each optical pulse may comprise constant optical power (for the duration of the optical pulse).
The first beam splitter and/or the second beam splitter may be a 50:50 beam splitter. The laser beam may be split at the first beam splitter (into a first and a second part) and recombined at the second beam splitter. The laser beam may further be (again) split at the second beam splitter (into a third and a fourth part). The first part may pass the first phase modulator. The second part may pass directly to the second beam splitter. The third part may be transmitted to a control detector. The fourth part may pass the second phase modulator and subsequently be transmitted to the quantum channel (as the optical pulse).
The input optical power of the laser for generating the optical pulses may be from 0.15 nW to 100.00 nW, preferably from 1 nW to 20 nW. Each of the optical pulses may have a photon number from 100 to 80 000, preferably from 800 to 15 000. The laser may, e.g., comprise a DFB PM laser diode. A central wavelength of the optical pulses may be between 1510 nm and 1550 nm, preferably between 1529 nm and 1531 nm, more preferably at 1530 nm. The line width may be 2 MHz or less.
Each of the optical pulses (after modulation) may comprise a (time-dependent) optical power from 0.1 nW to 50.0 nW (between its start and end on the time scale), preferably from 1 nW to 20 nW, more preferably from 5 to 15 nW.
The intensity profile may be modulated by at least one of a first phase modulator and a laser source intensity (input intensity). The phase profile may be modulated by the second phase modulator.
The intensity function may comprise, depending on the first encoder value, an oscillatory component, preferably with time-dependent (instantaneous) frequency. Further, the phase function may comprise, depending on the second encoder value, a (further) oscillatory component with time-dependent frequency.
Generally, the intensity function and/or the phase function may comprise at least two (local) maxima.
Modulating the intensity profile of the optical pulse according to (with) the intensity function may comprise at least one of (pointwise) multiplying the intensity profile with the intensity function, convolving the intensity profile with the intensity function, and (pointwise) adding the intensity function to the intensity profile. Further, modulating the phase profile of the optical pulse according to (with) the phase function may comprise at least one of (pointwise) multiplying the phase profile with the phase function, convolving the phase profile with the phase function, and (pointwise) adding the phase function to the phase profile.
For each first encoder value, the intensity function may be unique. In other words, for each first encoder value, the intensity function may be different from the intensity function for another first encoder value. In particular, for each first encoder value, the intensity function may have a unique time evolution. For example, for each first encoder value, the intensity function may be different from a constant multiple of the intensity function for another first encoder value. Correspondingly, for each second encoder value, the phase function may be unique. In other words, for each second encoder value, the phase function may be different from the phase function for another second encoder value. In particular, for each second encoder value, the phase function may have a unique time evolution. For example, for each second encoder value, the phase function may be different from a constant multiple of the phase function for another second encoder value.
The intensity function and the phase function may be the same for coinciding first encoder value and second encoder value. Alternatively, the intensity function and the phase function may be different for coinciding first encoder value and second encoder value and, in particular for any (pair of) first encoder value and second encoder value.
The intensity function and/or the phase function may be quasiperiodic.
For first encoder value a, the oscillatory component may have the form ca cos(ζa(t)+ηa) with factor ca, angle ηa and angular function ζa(t) depending on the first encoder value. The factor ca and the angle ηa may also be constant with respect to the first encoder value. In other words, the oscillatory component may have the form c cos(ζa(t)+η). For second encoder value a, the further oscillatory component may have the form {tilde over (c)}a cos({tilde over (ζ)}a(t)+{tilde over (η)}a) with further factor {tilde over (c)}a, further angle {tilde over (η)}a and further angular function {tilde over (ζ)}a(t) depending on the second encoder value. The further factor {tilde over (c)}a and the further angle {tilde over (η)}a may also be constant with respect to the second encoder value. In other words, the oscillatory component may have the form {tilde over (c)} cos({tilde over (ζ)}a(t)+{tilde over (η)}).
The oscillatory component and/or the further oscillatory component may comprise oscillations with an instantaneous period (local period) from 1 ns to 50 ns, preferably from 1 ns to 20 ns, more preferably from 1 ns to 10 ns. The instantaneous period may be change with time. The oscillatory component may also comprise oscillations with an instantaneous frequency (local frequency) from 10 MHz to 500 MHz, preferably from 45 MHz to 300 MHz, more preferably from 70 MHz to 130 MHz. The instantaneous frequency may change with time.
The intensity function may also comprise a constant (offset) component (a component constant in time). The phase function may also comprise a further constant (offset) component. The intensity function may comprise a sum of the oscillatory component and the constant component. The phase function may comprise a sum of the further oscillatory component and the further constant component.
The intensity function may comprise, depending on the first encoder value, a frequency chirp component, preferably at least one of a linear frequency chirp component, a quadratic frequency chirp component, a cubic frequency chirp component, and an exponential frequency chirp component. The phase function may comprise, depending on the second encoder value, a (further) frequency chirp component, preferably at least one of a linear frequency chirp component, a quadratic frequency chirp component, a cubic frequency chirp component, and an exponential frequency chirp component. The (further) oscillatory component may be or may comprise the (further) frequency chirp component.
The frequency chirp component may comprise a chirp rate depending on the first encoder value. The further frequency chirp component may comprise a further chirp rate depending on the second encoder value. The (further) chirp rate may be unique for each first (second) value.
The intensity function may depend on the first encoder value of (at least) two first bits of the encoder initial bit sequence and/or the phase function may depend on the second encoder value of (at least) two second bits of the encoder initial bit sequence.
In other words, generating each optical pulse of the plurality of optical pulses may comprise at least one of: modulating an intensity profile of the optical pulse according to an intensity function which depends on time and on a first encoder value of at least two first bits of the encoder initial bit sequence, and modulating a phase profile of the optical pulse according to a phase function which depends on time and a second encoder value of at least two second bits of the encoder initial bit sequence.
The intensity function may also depend on the first encoder value of at least three first bits of the encoder initial bit sequence and/or the phase function may depend on the second encoder value of at least three second bits of the encoder initial bit sequence. The intensity function may depend on the first encoder value of at least four first bits of the encoder initial bit sequence and/or the phase function may depend on the second encoder value of at least four second bits of the encoder initial bit sequence.
In general, the intensity function may depend on the first encoder value of at least one first bit and at most 100 first bits (in particular, at most 20 first bits; especially at most 4 first bits) of the encoder initial bit sequence. The phase function may depend on the second encoder value of at least one second bit and at most 100 second bits (in particular, at most 20 second bits; especially at most 4 second bits) of the encoder initial bit sequence.
In case the intensity (phase) function depends on one first (second) bit, the intensity (phase) profile may be modulated according to two different shapes (according to the intensity (phase) function for bit value 0 and according to the intensity (phase) function for bit value 1). In case the intensity (phase) function depends on two first (second) bits, the intensity (phase) profile may be modulated according to four different shapes (according to the intensity (phase) function for bit values 00, 01, 10, and 11). In general, in case the intensity (phase) function depends on n first (second) bits, the intensity (phase) profile may be modulated according to 2n different shapes.
The first bits of the encoder initial bit sequence may be different from the second bits of the first bit sequence. Alternatively, the first bits and the second bits may be the same or may partially overlap.
Each optical pulse may have a pulse length from 1 ns to 1000 ns, preferably from 50 ns to 200 ns, more preferably from 80 ns to 120 ns. Each optical pulse may have (essentially) the same pulse length. Each optical pulse may have a pulse length different from an average pulse length of the plurality of optical pulses by at most 0.1%.
Modulating the intensity profile and/or the phase profile may be carried out such that the pulse length of each optical pulse is changed by at most 10%, preferably at most 5%.
Determining the first decoder value may comprise comparing the approximate intensity profile with ideal approximate intensity profiles (for different possible first encoder values). Determining the second decoder value may comprise comparing the approximate phase profile with ideal approximate phase profiles (for different possible second encoder values).
The approximate intensity profile may comprise the plurality of intensity values. The approximate phase profile may comprise the plurality of phase values. For each time bin, the approximate intensity profile may comprise a corresponding intensity value and/or the approximate phase profile may comprise a corresponding phase value.
Measuring the intensity values and/or the phase values (for the plurality of time bins) may comprise carrying out heterodyne measurements for each time bin. Carrying out the heterodyne measurements may include splitting a (received) optical pulse into two beams which interfere with two further beams of local oscillators (LO) and measuring interference events using (photo-diode) detectors.
Each time bin may comprise a time bin length from 1 ns to 50 ns, preferably from 1 ns to 5 ns, more preferably from 1 ns to 2 ns.
The first decoder value of (at least) two first bits of the decoder initial bit sequence and/or the second decoder value of (at least) two second bits of the decoder initial bit sequence may be determined. Further, the first decoder value of (at least) three first bits of the decoder initial bit sequence and/or the second decoder value of (at least) three second bits of the decoder initial bit sequence may be determined. Moreover, the first decoder value of (at least) four first bits of the decoder initial bit sequence and/or the second decoder value of (at least) four second bits of the decoder initial bit sequence may be determined. In general, the first decoder value of at least one first bit and at most 100 first bits (in particular, at most 20 first bits; especially at most 4 first bits) of the decoder initial bit sequence and/or the second decoder value of at least one second bit and at most 100 second bits (in particular, at most 20 second bits; especially at most 4 second bits) of the decoder initial bit sequence may be determined.
Each one of the possible first encoder values may correspond to one of the ideal approximate intensity profiles. Each one of the possible second encoder values may correspond to one of the ideal approximate phase profiles. For example, in case of determining the first decoder value of a single first bit of the decoder initial bit sequence, the first decoder value may be 0 or 1. In case of determining the first decoder value of two first bits of the decoder initial bit sequence, the first decoder value may be one of 00, 01, 10, and 11. In general, in case of determining the first (second) decoder value of n first (second) bits of the decoder initial bit sequence, there are 2n possibilities for the first (second) decoder value. Hence, in case of determining the first (second) decoder value of n first (second) bits of the decoder initial bit sequence, there are 2n ideal approximate intensity (phase) profiles.
Comparing the approximate intensity profile with the ideal approximate intensity profiles may comprise determining a first characteristic indicative of the approximate intensity profile in relation to the ideal approximate intensity profiles. Comparing the approximate phase profile with the ideal approximate phase profiles may comprise determining a second characteristic indicative of the approximate phase profile in relation to the ideal approximate phase profiles.
The first characteristic may, e.g., comprise a first measured correlator difference determined from the approximate intensity profile and the ideal approximate intensity profiles. Determining the first decoder value may then comprise comparing the first measured correlator difference with a first threshold value. The second characteristic may comprise a second measured correlator difference determined from the approximate phase profile and the ideal approximate phase profiles. Determining the second decoder value may comprise comparing the second measured correlator difference with a second threshold value.
In other words and including variable symbols, the method may comprise at least one of:
Determining the first measured correlator difference ΔQ may comprise determining a (preferably normalized) sum of differences of ideal intensity values Na(t) dependent on the first encoder value a for each of the plurality time bins, wherein each of the differences is weighted by the (measured) intensity value for the respective time bin. Determining the second measured correlator difference ΔR may comprise determining a (preferably normalized) sum of differences of ideal phase values Πa(t) dependent on the second encoder value a for each of the plurality time bins, wherein each of the differences is weighted by the (measured) phase value for the respective time bin.
The first threshold value [Qa(0)−Qa(1)] with correlators Qa(0) and Qa(1) for first encoder value a. The second threshold value
[Ra(0)−Ra(1)] with correlators Ra(0) and Ra(1) for second encoder value a.
The first decoder value may be determined based on the first measured correlator difference ΔQ being greater or smaller than the first threshold value
In particular, the first decoder value may be determined based on the first measured correlator difference ΔQ being greater or smaller than the first threshold value
The first post-selection parameter and/or the second post-selection parameter may be determined such that a key generation rate for determining the shared key is maximized. In particular, the first post-selection parameter and/or the second post-selection parameter may be determined by numerical optimization over a set of candidate post-selection parameters and, preferably, by varying test input bit sequences for the encoder initial bit sequence and/or assumed signal leakage values.
The first post-selection parameter and/or the second post-selection parameter may be from 0.01 to 0.30, preferably from 0.05 to 0.20, more preferably from 0.08 to 0.10.
The method may comprise determining (and/or monitoring) optical signal losses along the quantum channel (and/or transmission line), in particular along the optical fiber, preferably optical signal losses depending on a position along the quantum channel. In other words, the optical signal losses may be determined as a function of the position along the quantum channel. In particular, for each position along the quantum channel, corresponding optical signal losses may be determined. The optical signal losses may thus correspond to a signal loss profile. The optical signal losses may be determined via optical test pulses (different from the plurality of optical pulses). The optical test pulses may comprise a greater optical power than the optical pulses, preferably by a factor of a least 10, more preferably by a factor of at least 100.
The optical signal losses may be determined by optical time-domain reflectometry. The optical signal losses may be determined during and/or prior to and/or subsequent to determining the shared key. The optical signal losses may be determined repeatedly. For example, the optical signal losses may be determined repeatedly within a time interval from 10 ns to 50 s, preferably from 10 ns to 10 s, in particular from one of 100 ns to 100 ms, 500 ns to 500 ms, 100 ms to 1000 ms, 0.5 s to 5 s, and 5 s to 10 s.
The method may comprise determining an intrusion event based on the optical signal losses and/or aborting (terminating) determining of the shared key based on the optical signal losses. The method may comprise discarding the shared key based on the optical signal losses.
Within the context of the present disclosure, intervals and value ranges (e.g., “from . . . to . . . ”, “between . . . and . . . ”) include their boundary points.
The aforementioned embodiments related to the methods for quantum key distribution can be provided correspondingly for the transmitter device, the receiver device, and the system for quantum key distribution.
All references, including publications, patent applications, and patents, cited herein are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety herein.
The use of the terms “a” and “an” and “the” and “at least one” and similar referents in the context of describing the invention (especially in the context of the following claims) are to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The use of the term “at least one” followed by a list of one or more items (for example, “at least one of A and B”) is to be construed to mean one item selected from the listed items (A or B) or any combination of two or more of the listed items (A and B), unless otherwise indicated herein or clearly contradicted by context. The terms “comprising,” “having,” “including,” and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to,”) unless otherwise noted. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
Preferred embodiments of this invention are described herein, including the best mode known to the inventors for carrying out the invention. Variations of those preferred embodiments may become apparent to those of ordinary skill in the art upon reading the foregoing description. The inventors expect skilled artisans to employ such variations as appropriate, and the inventors intend for the invention to be practiced otherwise than as specifically described herein. Accordingly, this invention includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the invention unless otherwise indicated herein or otherwise clearly contradicted by context.
| Number | Date | Country | Kind |
|---|---|---|---|
| 23216095.2 | Dec 2023 | EP | regional |