The present invention relates to quantum communications and, more particularly, to quantum communication networks with three or more nodes.
Quantum communications, namely secure optical communications enabled by the use of quantum properties of photons, are becoming more accepted and mainstream. While large scale fiber optic and free space optical implementations of quantum communications systems have been demonstrated, expanding point-to-point, two-node system to a multi-node network has been difficult to implement.
A multi-node, quantum communication network for providing quantum-secure time transfer with Damon attack detection is described, in accordance with an embodiment. The network includes three or more nodes connected via authenticated communication channels forming a closed loop. By determining differences between the local times at as well as the time durations required for photons to travel between the three or more nodes, the network detects a Damon attack, if present. For example, the network imposes a closed loop condition to detect the Damon attack. The network can also use the local time differences and time durations for photon travel between nodes to synchronize the local clocks at the three or more nodes of the network.
In accordance with another embodiment, a multi-node, quantum communication network for providing quantum-secure time transfer with Damon attack detection includes first, second, and third nodes. The first node includes a first local clock and a first photon pair source for providing a first entangled photon pair, the first entangled photon pair including first and second photons. The first node also includes a first capture device for capturing the first photon at a first local time t1 at the first local clock, and a first coupling mechanism for directing the second photon away from the first node. The first node further includes a first measuring device for receiving photons from outside the first node, and a first controller for controlling at least the first local clock, the first photon pair source, the first capture device, the first coupling mechanism, and the first measuring device. The second node includes a second local clock and a second photon pair source for providing a second entangled photon pair, the second entangled photon pair including third and fourth photons. The second node also includes a second capture device for capturing the third photon at a second local time t2 at the second local clock, and a second coupling mechanism for directing the fourth photon away from the second node. The second node further includes a second measuring device for receiving photons from outside the second node, and a second controller for controlling at least the second local clock, the second photon pair source, the second capture device, the second coupling mechanism, and the second measuring device. The third node includes a third local clock and a third photon pair source for providing a third entangled photon pair, the third entangled photon pair including fifth and sixth photons. The third node also includes a third capture device for capturing the fifth photon at a third local time t3 at the third local clock, and a third coupling mechanism for directing the sixth photon away from the third node. The third node additionally includes a third measuring device for receiving photons from outside the third node, and a third controller for controlling at least the third local clock, the third photon pair source, the third capture device, the third coupling mechanism, and the third measuring device. The network further includes a first authenticated communication channel communicatively connecting the first and second nodes, a second authenticated communication channel communicatively connecting the second and third nodes, and a third authenticated communication channel communicatively connecting the third and first nodes. The first, second, and third nodes and the first, second, and third authenticated communication channels form a closed loop. The first, second, and third controllers are configured for determining differences between the first, second, and third local times, as well as for measuring time durations required for the second photon to travel from the first node to the second node, for the second photon to travel from the first node to the third node, for the fourth photon to travel from the second node to the first node, for the fourth photon to travel from the second node to the third node, for the sixth photon to travel from the third node to the first node, and for the sixth photon to travel from the third node to the second node. The first, second, and third controllers are also configured for using the differences between the first, second, and third local times and the time durations so measured to detect a Damon attack, if present.
In accordance with a further embodiment, the first, second, and third controllers are further configured to detect the Damon attack if a closed loop condition is not satisfied. In an embodiment, the closed loop condition is defined as δ12+δ23+δ31=0, wherein t1 is the local time of at the first node, t2 is the local time of at the second node, and t3 is the local time of at the third node, δ12=t1−t2, δ23=t2−t3, and δ31=t3−t1.
In another embodiment, the first, second, and third photon pair sources are configured for generating polarization-entangled photon pairs.
In a still further embodiment, the differences between the first, second, and third local times and the time durations so measured are used for synchronizing the first, second, and third local clocks.
In accordance with another embodiment, a method for determining presence of a Damon attack in a multi-node quantum communication network for providing quantum-secure time transfer is described. The method includes identifying a closed loop formed by at least three nodes within the network, and determining differences between local clocks of the at least three nodes. The method further includes imposing a closed loop condition on the differences so determined, and detecting, if the closed loop condition is not satisfied by the differences so determined, presence of the Damon attack.
In a further embodiment, the method includes, at each one of the at least three nodes, generating an entangled photon pair, the entangled photon pair including a first photon and a second photon entangled with the first photon, and capturing the first photon at a local time for the one of the at least three nodes. The method further includes measuring a travel time for the second photon to travel from the one of the at least three nodes to another one of the at least three nodes, calculating a difference in local time from the one of the at least three nodes to another one of the at least three nodes, and determining whether the local clock at each one of the at least three nodes is synchronized with another one of the at least three nodes
The present invention is described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. In the drawings, the size and relative sizes of layers and regions may be exaggerated for clarity. Like numbers refer to like elements throughout.
It will be understood that, although the terms first, second, third etc. may be used herein to describe various elements, components, regions, layers and/or sections, these elements, components, regions, layers and/or sections should not be limited by these terms. These terms are only used to distinguish one element, component, region, layer or section from another region, layer or section. Thus, a first element, component, region, layer or section discussed below could be termed a second element, component, region, layer or section without departing from the teachings of the present invention.
Spatially relative terms, such as “beneath,” “below,” “lower,” “under,” “above,” “upper,” and the like, may be used herein for ease of description to describe one element or feature's relationship to another element(s) or feature(s) as illustrated in the figures. It will be understood that the spatially relative terms are intended to encompass different orientations of the device in use or operation in addition to the orientation depicted in the figures. For example, if the device in the figures is turned over, elements described as “below” or “beneath” or “under” other elements or features would then be oriented “above” the other elements or features. Thus, the exemplary terms “below” and “under” can encompass both an orientation of above and below. The device may be otherwise oriented (rotated 90 degrees or at other orientations) and the spatially relative descriptors used herein interpreted accordingly. In addition, it will also be understood that when a layer is referred to as being “between” two layers, it can be the only layer between the two layers, or one or more intervening layers may also be present.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items, and may be abbreviated as “/”.
It will be understood that when an element or layer is referred to as being “on,” “connected to,” “coupled to,” or “adjacent to” another element or layer, it can be directly on, connected, coupled, or adjacent to the other element or layer, or intervening elements or layers may be present. In contrast, when an element is referred to as being “directly on,” “directly connected to,” “directly coupled to,” or “immediately adjacent to” another element or layer, there are no intervening elements or layers present. Likewise, when light is received or provided “from” one element, it can be received or provided directly from that element or from an intervening element. On the other hand, when light is received or provided “directly from” one element, there are no intervening elements present.
Embodiments of the invention are described herein with reference to cross-section illustrations that are schematic illustrations of idealized embodiments (and intermediate structures) of the invention. As such, variations from the shapes of the illustrations as a result, for example, of manufacturing techniques and/or tolerances, are to be expected. Thus, embodiments of the invention should not be construed as limited to the particular shapes of regions illustrated herein but are to include deviations in shapes that result, for example, from manufacturing. Accordingly, the regions illustrated in the figures are schematic in nature and their shapes are not intended to illustrate the actual shape of a region of a device and are not intended to limit the scope of the invention.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and/or the present specification and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
While certain aspects of quantum communications, such as reliable production of entangled photons, have been reliably demonstrated, certain other aspects are still difficult. One example is the need for clock synchronization and syntonization over multiple nodes of a quantum communications network. For instance, clock synchronization for a two-node quantum network has been described in US Pat. Pub. No. 2020/0084033 A1 entitled “Quantum Secure Clock Synchronization Based on Time-Energy and Polarization Entangled Photon Pairs” to Lamas-Linares, et al. While this patent application describes ways to securely synchronize the clocks at two nodes, it does not discuss expanding the concept to larger networks with multiple nodes without separately establishing node-to-node time transfer for every node combination. That is, while previously described methods discuss the synchronization of clocks between two nodes, they are absent disclosure regarding the synchronization of clocks across a network of three or more nodes without treating the network as a cluster of two-node networks.
For example,
δAB=tA−tB [Eq. 1]
δBA=tB−tA=−δAB [Eq. 2]
Continuing to refer to
The photons in each photon pair exhibits a relationship between the time labels assigned locally by the producing node and the remote node. This relationship depends on the intrinsic clock difference and the propagation time between the producing node and the remote node. For any given photon pair i produced in node A, this relationship can be expressed as:
t
lA
i
−t
rB
i=δAB+ΔtAB [Eq. 3]
An efficient way to obtain tlAi−trBi for all produced photon pairs is to calculate a cross correlation over all time labels corresponding to photons produced at node A. The maximum value of that cross correlation TAB can be expressed as:
τAB=δAB+ΔtAB [Eq. 4]
Similarly, for photon pairs originating from node B, the maximum value of the cross correlation TBA can be expressed as:
τBA=δBA+ΔtBA [Eq. 5]
It is noted that that there is no guarantee, in principle, that ΔtAB=ΔtBA. However, when an optical fiber or free space single mode optical channel is used as quantum channel 110, it is assumed that the photons traveling in directions 112 and 114 are essentially identical except for their propagation directions. Thus, it is assumed in this example that ΔtAB=ΔtBA for simplicity. Thus, the time difference δAB can be expressed as:
δAB=½(τAB−τBA) [Eq. 6]
Then the round-trip time, regardless of the symmetry of quantum channel 110, can be expressed as:
R
AB=τAB+τBA [Eq. 7]
Using the known relationships established in the equations above, the time relationships between the two local clocks 120 and 130 in nodes A and B, respectively, can be extracted in order to synchronize the two local clocks. Clock synchronization is essential for quantum communications (and other communications infrastructures) because relative time readings between even atomic clocks can drift within a short time frame, and disruption in the time transfer is one indicator of an adversary attack on the quantum channel. Thus, time transfer between nodes of the quantum communication network in a secure, non-spoofable manner is essential for ensuring security of the overall data transfer. In other words, any two nodes in the network can be synchronized in time in a quantum-secure manner with the additional assumption that the channel connecting the nodes is symmetric in time for the propagation of photons that are produced at random times and which are identical in their properties except the direction of propagation. If a malicious party (“Damon”) gains control of the degree of asymmetry in the quantum channel, he can use that to manipulate the measured offset between two nodes. Regardless, in a two-node network, the ability of the malicious party to manipulate the symmetry of a single channel compromises the security of the procedure and the network operator can be alerted of the intrusion.
However, the discussion above is limited to a two-node network. In order to expand to a quantum communication network including more than two nodes using the above approach, the assumptions and calculations must be repeated for each pair of nodes within the network (i.e., pairwise synchronization). That is, direct application of the above approach for time transfer to a multi-node network beyond two nodes is non-trivial.
It is recognized herein that, with the appropriate set of adjustments to the operation and functionality of the hardware at each node, time transfer among multiple nodes within a quantum communication network can be greatly simplified in a secure, non-spoofable manner.
A multi-node, quantum communication network is described. The network includes three or more nodes connected via quantum channels and configured such that quantum-secure time transfer across all nodes in the network is enabled. The network also is configured for providing synchronization and syntonization of local clocks at the three or more nodes. A method of operating a multi-mode, quantum communication network with quantum-secure time transfer is also described.
In particular, the present disclosure provides quantum-secure clock synchronization and syntonization hardware and procedure for secure time transfer between clocks in a network of three or more nodes. Each of the nodes in this network contains:
The various components of a node in a network is illustrated in
In a multi-node network, pairwise synchronization procedures between any two nodes in the network, such as described above, can provide a set of relationships between the possible channel manipulations that Damon can perform before introducing inconsistencies derived from a set of additional constraints that arise from the network topology. In non-mathematical terms, it is recognized herein that these constraints imply that Damon must simultaneously control different sections of the overall network and introduce equal magnitude and opposite sign asymmetries in different channels. It is further recognized herein that the detailed mathematical structure also illustrates that not all pairwise exchanges are necessary for ensuring secure time transfer throughout the multi-node network, thus providing a constructive recipe for determining a minimum number of pairwise exchanges, thus determining a useful and optimal network topology and system structure.
In the network configurations described below, the constraints introduced by the network topology are available to all nodes via the authenticated communication channel and can be constantly monitored for consistency. Any inconsistency in the monitored values related to these constraints can result in a modification of the derived confidence level of the time transfer procedure. The topology conditions can also be augmented by any additional knowledge about the network channels and the laws of physics. For example, for two non-moving, stationary nodes based on Earth where their relative distance is known, it is a safe assumption that the minimum propagation time between the nodes is equal to or larger than that of the speed of light in vacuum, and all propagation times should be larger than zero, among other assumptions. For links between nodes in a space environment, the link itself can be remotely monitored for attempts at interference and thus be assumed to be same for symmetry breaking attacks, which may be quite elaborate. In a dynamic network where nodes are added and withdrawn ad hoc during the lifetime of the network, the constraints on the manipulations of a Damon attack change with the changes in topology and propagate throughout the network, thus introducing yet another difficulty for successful hacking.
Furthermore, in the network configuration described below, the authenticity of the timing signal itself (i.e., the entangled photons being exchanged) can be guaranteed by the ability of the sending and receiving nodes to perform a Bell inequality analysis on the photon pairs. Due to the no-cloning theorem of quantum mechanics and the monogamy of entanglement, it is essentially impossible for a Damon attack by fabrication (i.e., spoofing) of the timing signal and manipulate the synchronization process in this way. In other words, the disclosure provides a method of incorporating additional knowledge about network properties (for example limits on propagation times) on a quantum time transfer network to bound the possible modifications introduced by a malicious party targeting the time transfer procedure.
In an embodiment, the synchronization of clocks at multiple nodes applies to both time-transfer between clocks as well as syntonization. That is, the process described herein is applicable to both clock synchronization (i.e., setting different clocks to read the same time at a given instant) and clock syntonization (i.e., setting clocks to the same frequency or rate, regardless of the time they display. It is recognized that clocks can be synchronized for a given instant, although they will drift away from each other due to slight differences in their time keeping devices. Also, while clocks can be syntonized such that these slight differences in their time keeping devices are compensated in some way, they may still read different times on their faces. The presently disclosed network implementation allows for both secure synchronization and syntonization over the entire network with two or more nodes. Secure syntonization can be achieved, for example, by comparison of time intervals between successful pair detections in two nodes. The capability for secure syntonization in particular can provide advantages for large mesh and secure network communications required for, for example, 5G and military applications. In other words, the quantum communication system described herein can be “natively” used to keep the various clocks syntonized enough such that there is no significant relative drift to affect the accuracy of the time transfer. That is, since the clock frequencies throughout the network are essentially identical, relative clock drift with respect to other clocks can be constantly corrected during operation.
One way in which distribution of entangled photons can be used is to generate a secure key between two nodes such that these keys can be used to encode information transmitted in open channels, thus helping to obscure the timing conclusions from non-authorized passive listeners or eavesdroppers. By using the network configuration described herein for securing positioning, navigation, and timing (PNT) related procedures, for example, the communication system provides an in-built protection of the information gathered from the synchronization procedure.
Turning now to
With such a three-node network, a first step in the analysis is to determine the three quantities: δAB=tA−tB, δBC=tB−tC, and δCA=tC−tA. Similarly to the two-node case, we obtain the following measured, pairwise quantities:
τAB=δAB+ΔtAB [Eq. 8]
τBA=δAB+ΔtBA [Eq. 9]
τBC=δBC+ΔtCB [Eq. 10]
τCB=−δBC+ΔtBC [Eq. 11]
τCA=δCA+ΔtCA [Eq. 12]
τAC=−δCA+ΔtAC [Eq. 13]
In addition to the pairwise relationships in Eqs. 8-13, the relationship between clocks in a closed loop provides an additional constraint that:
δAB+δBC=δAC [Eq. 14]
This additional loop constraint provides possible asymmetries of the system that may potentially be introduced in a Damon attack without detection. Combining Eq. 14 with Eqs. 8-13:
δAB=½(τAB−τBA)−½(ΔtAB−ΔtBA) [Eq. 15]
δBC=½(τBC−τCB)−½(ΔtBC−ΔtCB) [Eq. 16]
δCA=½(τCA−τAC)−½(ΔtCA−ΔtAC) [Eq. 17]
For convenience, it is assumed that ∈AB=(ΔtAB−ΔtBA) and mAB=(τAB−τBA) and similarly for equivalent quantities between other nodes. The parameter E corresponds to the asymmetry of each quantum channel between nodes, and m corresponds to the differences between the cross-correlations that occur between two nodes in each direction. Combining the equations and constraints above:
½(mCA−mBC−mAB)=∈CA−∈bc−∈EAB [Eq. 18]
Eq. 18 implies that even an all-powerful Damon is constrained in the way it may be able to manipulate the quantum channels. Moreover, such manipulations would need to be performed all over the network to maintain consistency that avoids detection. In other words, in a three-node network, it is recognized herein that two extra pieces of additional information are enough to completely determine the system. For example, if we know that any two channels are symmetric (e.g., ΔtAB=ΔtBA and ΔtAC=ΔtCA), then there are no longer any modifications that can be performed by Damon that do not break at least one of the known relationships defined in equations above, thus ensuring time transmission within the network is secure.
As the number of nodes is increased, the number of closed loops that can be defined within the network grows and the ability of Damon to arbitrarily manipulate the measured time differences is further constrained. This property, combined with available physical information on sections of the network, can be used to establish confidence intervals on the measured time differences all over the network, even when additional information is concerned with only a local section. Examples of suitable additional information include knowledge that a particular channel/link is symmetric, knowledge that the propagation times cannot be negative, and knowledge that photo propagation speeds cannot be faster than the speed of light, among others. Furthermore, topology and connectivity factors into the constraints in networks with four or more nodes, as will be discussed hereinafter.
Rewriting Eqs. 8-13 with the unknowns on the left-hand side of the equations and the known values (or measurable quantities) on the right-hand side, the following equations hold for a three-node network:
Δ′tAB+δAB=τAB [Eq. 19]
ΔtBA−δAB=τBA [Eq. 20]
δtCB+δBC=τBC [Eq. 21]
ΔtBC−δBC=τCB [Eq. 22]
ΔtCA+δCA=τCA [Eq. 23]
ΔtAC−δCA=τAC [Eq. 24]
Defining a quantum channel as symmetric when its corresponding ∈ value is zero, the symmetry relations between each pair of nodes can be rewritten as:
ΔtAB−ΔtBA=∈AB [Eq. 25]
ΔtBC−ΔtCB=∈BC [Eq. 26]
ΔtCA−ΔtAC=∈CA [Eq. 27]
When E is non-zero, the channel is defined as being asymmetric. These equations can be rewritten in a matrix form Mx=r, which takes the form:
M may also be divided into four block submatrices:
In Eq. 29, A=I is the 2n×2n (6 by 6) identity matrix, C=BT(i.e., C is the transpose of B), and D=0 is the n×n (3 by 3) zero matrix. Thus, M can be re-expressed as:
The inverse of M can be computed with block-wise inversion, with the help of the Schur complement of A
Recognizing that the value BTB=21 and its inverse (BTB)−1=½I in a particular case, Eq. 31 can be further simplified as:
To solve for the unknowns x in Eq. 28, Mx=r is multiplied by M−1 to obtain:
Written in another way:
Eq. 34 can be split along the submatrix blocks:
2Δt=(2−BBT)τ+B∈ [Eq. 35]
2δ=BTτ−∈ [Eq 36]
Inserting the various known values, we obtain:
Thus, for the clock time differences:
δAB=½(τAB−τBA−∈AB) [Eq. 45]
δBC=½(τCB−τBC−∈BC) [Eq. 46]
δCA=½(τCA−τAC−∈CA) [Eq. 47]
The symmetry relations used above may be substituted with other limitations. Again, revisiting Eqs. 8-13, with the unknowns are grouped on the left-hand side of the equations and the known values (or measurable quantities) on the right-hand side, for a network of three nodes:
ΔTAB+δAB=τAB [Eq. 48]
ΔtBA−δAB=τBA [Eq. 49]
ΔtCB+δBC=τBC [Eq. 50]
ΔtBC−δBC=τCB [Eq. 51]
ΔtCA+δCA=τCA [Eq. 52]
ΔtAC−δCA=τAC [Eq. 53]
For the symmetry relations, Eq. 14 is substituted for the last closure relation:
ΔtAB−ΔtBA=∈AB [Eq. 54]
ΔtBC−ΔtCB=∈BC [Eq. 55]
δAB+δBC+δCA=0 [Eq. 56]
Again, a quantum channel is defined as symmetric when its corresponding ∈ value is zero. When ∈ is non-zero, the channel is considered asymmetric. In this particular example, because of the substitution, there are no restriction on the relationship of ΔtCA and ΔtAC, meaning the channel connecting nodes A and C could be arbitrarily asymmetric. The system of equations can be rewritten in a matrix form Mx=r, which takes the form
While it is no longer possible to simplify the inverse of M as in Eqs. 29-32, it can be assured that there is a solution as long as A and the Schur complement of A in M/A:=D−CA−1B have inverses. Thus, A will always remain the identity no matter what loop closure relations are substituted. The Schur complement of A for this system takes the form:
Eq. 58 does have an inverse and remains well-conditioned.
Such loop closure equations can be extended for networks with larger numbers of nodes. As an example, the construction of the closure relations can be generalized into a matrix form:
Γt=δ [Eq. 59]
As defined above, each δ is defined as the time difference if any two clocks are brought together in the same location. For a three node network, then, where the ordering is a matter of convention:
t
A
−t
B:=δAB:=δBA:=tB−tA [Eq. 60]
t
B
t
C:=δBC:=δCB:=tC−tB [Eq. 61]
t
C
−t
A:=δCA:=−δAC:=tA−tC [Eq. 62]
Eqs. 60-62 can be arranged into matrix form:
Due to the underlying loop (or cycle) structure of matrix Γ, the matrix has a rank r=n 1=2. For the right-hand side δ to exist in the column space of matrix Γ, there will be a set of constraints imposed on the δ values. To generate these constraints, an augmented matrix [Γ|δ] is formed, and linear operations on the rows of this matrix can be performed until it is in a reduced row echelon form:
First add row 1 to row 3 to eliminate the leading −1:
Next, add row 2 to row 1 to eliminate the −1 in the second column:
Thus, Eq. 66 is the reduced row echelon form of [Γ|δ], i.e., rref([Γ|δ]). The bottom row with only zeros can be interpreted as:
0tA+0tB+0tC=δAB+δBC+δCA [Eq. 67]
The left-hand side reduces to zero. Then, for this system to remain consistent and have a corresponding solution, thus matching Eq. 14 above, the following condition holds true:
δAB+δBC+δCA=0 [Eq. 68]
In other words, the recognition of these specific requirements and limitations on the system allows quantum-secure time transfer across all three nodes. The implementation of such requirements can be handled by a controller at each node, such as controllers 220 and 230 shown in
This method of quantum-secure time transfer can be further expanded to networks with any number of nodes, as will be described below. While trivial in the three-node case, for larger numbers of nodes the loop closure relations benefit from having a procedural generation method, such as described above. For any network, a matrix Γ may be generated for each quantum channel defined between any two network nodes. The augmented matrix [Γ|δ] can be formed and rewritten into reduced row echelon form (rref). Any rows that contain all zeros on the left columns of the augmented matrix will provide constraints on the values of 8.
For a network without a closed loop, such as a three-node network 400 illustrated in
Using Eq. 69 to generate the rref ([Γ|δ]) leads to
It may be noted that there is no row of only zeros in the rref ([Γ|δ]) in Eq. 70. That is, there are no free variables in this system. As a result, other external constraints, such as symmetry in both directions of a quantum channel's propagation times, should be imposed to guarantee the security of the network. In other words, in terms of graph theory, the process of finding the constraints can be summarized as finding the cycle basis of the graph of the underlying network. The constraints on the values of δ arise from drawing a linearly independent set of simple cycles that form a basis in the cycle space of this graph. For the network shown in
Expanding the implementation of the quantum-secure time transfer to a four-node network, such as a four-node network 500 shown in
ΔtAB+δAB=τAB [Eq. 71]
ΔtBA−δAB=τBA [Eq. 72]
ΔtCB+δBC=τBC [Eq. 73]
ΔtBC−δBC=τCB [Eq. 74]
ΔtCD+δCD=τCD [Eq. 75]
ΔtDC−δCD=τDC [Eq. 76]
ΔtDA+δDA=τDA [Eq. 77]
ΔtAD−δDA=τAD [Eq. 78]
The symmetry relations between each pair of nodes can be written as:
ΔtAB−ΔtBA=∈AB [Eq. 79]
ΔtBC−ΔtCB=∈BC [Eq. 80]
ΔtCD−ΔtDC=∈CD [Eq. 81]
ΔtDA−ΔtAD=∈DA [Eq. 82]
Again, a quantum channel is defined as symmetric when its corresponding E value is zero. When E is non-zero, the channel is asymmetric. As usual, the relevant system of equations take the form:
A=I is the 2n×2n (i.e., 8-by-8) identity matrix for n=the number of nodes, C=BT, i.e., C n×2n (i.e., 4-by-8) matrix is the transpose of B 2n×n (i.e., 8 by 4) matrix, and D=0 is the n×n (i.e., 4-by-4) zero matrix. The vector of unknowns and right-hand side then can be expressed as:
The solution takes the same form as Eqs. 35 and 36 above.
In the topology of four-node network 500, there can only be one loop around the ring, defined as the path traversing A→B→C→D→A. Again, the values of δ can be expressed as:
δAB=tA−tB [Eq. 85]
δBC=tB−tC [Eq. 86]
δCD=tC−tD [Eq. 87]
δDA=tD−tA [Eq. 88]
Eqs. 85-88 are added to obtain the one loop closure relation:
δAB+δBC+δCD+δDA=0 [Eq. 89]
It is noted that this closure relation involves all nodes of the network. Alternatively, the connection system Γt=δ can be considered such that
The augmented matrix [Γ|δ] can be written as:
The reduced row echelon format matrix rref ([Γ|δ]) is then:
Note Eq. 92 yields the same constraints on the δ values as Eq. 89. One of the symmetry relations can then be substituted for this closure relation instead, thus modifying the C and D submatrices in Eq. 83 as:
The considerations and requirements above can be implemented at each of nodes A, B, C, and D so as to enable quantum-secure time transfer across all four nodes shown in
The analysis can be further expanded to add additional quantum channels within the four-node network. In a four-node network 600 shown in FIG. 6, a quantum channel is added to connect nodes A and C. As before, there is no guarantee that the links are symmetric in their propagation times. The relationships between the various propagation times can be written as:
ΔtAB+δAB=τAB [Eq. 94]
ΔtBA−δAB=τBA [Eq. 95]
ΔtCB+δBC=τBC [Eq. 96]
ΔtBC−δBC=τCB [Eq. 97]
ΔtCD+δCD=τCD [Eq. 98]
ΔtDC−δCD=τDC [Eq. 99]
ΔtDA+δDA=τDA [Eq. 100]
ΔtAD−δDA=τAD [Eq. 101]
ΔtCA+δCA=τCA [Eq. 102]
ΔtAC−δCA=τAC [Eq. 103]
The symmetry relations between each pair of nodes can be written as:
ΔtAB−ΔtBA=∈AB [Eq. 104]
ΔtBC−ΔtCB=∈BC [Eq. 105]
ΔtCD−ΔtDC=∈CD [Eq. 106]
ΔtDA−ΔtAD=∈DA [Eq. 107]
ΔtCA−ΔtAC=∈CA [Eq. 108]
Again, a quantum channel is defined as symmetric when its corresponding ∈ value is zero. When ∈ is non-zero, the channel is asymmetric. As usual, the relevant system of equations take the form:
In this case, A=I is the (2n+2)×(2n+2) (i.e., 10-by-10) identity matrix, C=BT, i.e., C (n+1)×2(n+1) (i.e., 5-by-10) matrix is the transpose of B (2n+2)×(n+1) (i.e., 10-by-5) matrix, and D=0 is the (n+1)×(n+1) (i.e., 5-by-5) zero matrix. The vector of unknowns and right-hand side then can be expressed as:
Even with the additional quantum channel between nodes A and C, the structure of matrix M is preserved since the new quantum channel is independent of the other already established channels. Constructing the connection system Γt=δ yields:
The augmented matrix [Γ|δ] can be written as:
The reduced row echelon format matrix rref ([Γ|δ]) is then:
The new quantum channel between nodes A and B creates additional loop closure relations, as can be seen in the bottom two rows in Eq. 113:
δAB+δBC+δCD+δDA=0 [Eq. 114]
δAB+δBC+δCA=0 [Eq. 115]
Then the other submatrices C and D can be written as:
The Schuler complement of matrix M does have an inverse and remains well-conditioned:
Thus, adding another connection to the four-node network of
The method of quantum-secure time transfer can be further expanded to a maximally connected network shown in
As shown in
ΔtAB+δAB=τAB [Eq. 118]
ΔtBA−δAB=τBA [Eq. 119]
ΔtCB+δBC=τBC [Eq. 120]
ΔtBC−δBC=τCB [Eq. 121]
ΔtCD+δCD=τCD [Eq. 122]
ΔtDC−δCD=τDC [Eq. 123]
ΔtDA+δDA=τDA [Eq. 124]
ΔtAD−δDA=τAD [Eq. 125]
ΔtAC+δAC=τAC [Eq. 126]
ΔtCA−δAC=τCA [Eq. 127]
ΔtBD+δBD=τBD [Eq. 128]
ΔtDB−δBD=τDB [Eq. 129]
The symmetry relations between each pair of nodes can be written as:
ΔtAB−ΔtBA=∈AB [Eq. 130]
ΔtBC−ΔtCB=∈BC [Eq. 131]
ΔtCD−ΔtDC=∈CD [Eq. 132]
ΔtDA−ΔtAD=∈DA [Eq. 133]
ΔtCA−ΔtAC=∈CA [Eq. 134]
ΔtDB−ΔtBD=∈DB [Eq. 135]
Again, a quantum channel is defined as symmetric when its corresponding E value is zero. When E is non-zero, the channel is asymmetric. As usual, the relevant system of equations takes the form:
In this case, A=I is the n(n−1)×n(n−1) (i.e., 12-by-12) identity matrix, C=BT, i.e., C n (n−1)/2×n(n−1)/2 (i.e., 6-by-12) matrix is the transpose of B n(n−1)×n(n−1)/2 (i.e., 12-by-6) matrix, and D=0 is the n(n−1)/2×n(n−1)/2 (i.e., 6-by-6) zero matrix. The vector of unknowns and right-hand side then can be expressed as:
The δ equations in this case are:
t
A
−t
B=δAB [Eq. 138]
t
B
−t
C=δBC [Eq. 139]
t
C
−t
D=δCD [Eq. 140]
t
D
−t
A=δDA [Eq. 141]
t
C
−t
A=δCA [Eq. 142]
t
D
−t
B=δDB [Eq. 143]
Written in the connection system Γt=δ matrix form:
After manipulation, the reduced row echelon format matrix rref ([Γ|δ]) is then:
We then may use the three loop closure relations formed in the bottom three rows of the augmented reduced row echelon form of [Γ|δ]:
δAB+δBC+δCD+δDA=0 [Eq. 146]
δAB+δBC+δCA=0 [Eq. 147]
δBC+δCD+δDB=0 [Eq. 148]
An alternative method for finding a linearly independent set of loop closure relations is to use graph theory. For example, using the NetworkX Python library, a cycle basis of this graph may be computed. Using this method, a basis set can be defined as:
Loop 1 closure relation (A→B→C→A)
δAB+δBC+δCA=0 [Eq. 149]
Loop 2 closure relation (C→D→A→C)
δCD+δDA−δCA=0 [Eq. 150]
Loop 3 closure relation (B→C→D→B)
δBC+δCD+δDB=0 [Eq. 151
Then the C and D submatrices can be written as:
The Schur complement of A does have an inverse and remains well-conditioned:
It is recognized herein that, regardless of the number of quantum channels added into a network, n−1=3 symmetry closure relations need to be provided. These relations can be provided, for example, in the form of symmetry constraints for light propagation to be reciprocal within a particular quantum channel. With such a relation defined, it is possible to have a network with nodes that have a higher degree of quantum channel connections than two (not counting themselves) and not have to stipulate that channel be symmetric.
As another example, the requirements for enabling quantum-secure time transfer in a five-node network is considered. An example of a time-transfer network 800 is shown in
ΔtAB+δAB=τAB [Eq. 154]
ΔtBA−δAB=τBA [Eq. 155]
ΔtBC+δBC=τBC [Eq. 156]
ΔtCB+δBC=τCB [Eq. 157]
ΔtCA+δCA=τCA [Eq. 158]
ΔtAC−δCA=τAC [Eq. 159]
ΔtAD+δAD=τAD [Eq. 160]
ΔtDA−δAD=τDA [Eq. 161]
ΔtDE+δDE=τDE [Eq. 162]
ΔtED−δDE=τDE [Eq. 163]
ΔtEA+δEA=τEA [Eq. 164]
ΔtAE−δEA=τAE [Eq. 165]
The symmetry relations between each pair of nodes can be written as:
ΔtAB−ΔtBA=∈AB [Eq. 166]
ΔtBC−ΔtCB=∈BC [Eq. 167]
ΔtCA−ΔtAC=∈CA [Eq. 168]
ΔtAD−ΔtDA=∈AD [Eq. 169]
ΔtDE−ΔtED=∈DE [Eq. 170]
ΔtEA−ΔtAE=∈EA [Eq. 171]
As above, a quantum channel is defined as symmetric when its corresponding ∈ value is zero. When ∈ is non-zero, the channel is asymmetric. As usual, the relevant system of equations takes the form:
In this case, A=I is the 12-by-12 identity matrix, C=BT is a 6-by-12 matrix transpose of B (a 12-by-6 matrix), and D=0 is the (n+1)×(n+1) (i.e., 6-by-6) zero matrix. The vector of unknowns and right-hand side then can be expressed as:
The δ equations in this case are:
t
A
−t
B=δAB [Eq. 174]
t
B
−t
C=δBC [Eq. 175]
t
C
−t
A=δCA [Eq. 176]
t
A
−t
D=δAD [Eq. 177]
t
D
−t
E=δDE [Eq. 178]
t
E
−t
A=δEA [Eq. 179]
Written in the connection system Γt=δ matrix form:
And the usual loop closure relations can be found by deriving the augmented reduced row echelon form of [Γ|δ]. In this manner, the present method of operating calculating the required constraints and implementing them is expandable for use in a multi-mode network system for quantum-secure time transfer throughout the network.
It is noted that, in the above analyses, an assumption was made that the local clocks at the nodes in a given network all run at the same frequency, and the nodes are static with respect to each other such that the propagation times between the nodes do not change with time. While the assumption of syntonized clocks (i.e., clocks all running at the same frequency) is likely not justified in an absolute sense, clocks are generally well characterized and stringent limits on relative drift of their frequencies can be obtained. For instance, an effect of a clock drift is to make the peak of the cross-correlation function less pronounced such that, if the relative drift is too fast, the peak of the cross-correlation function may be difficult to detect from the background. However, if the peak is locatable, even with some frequency drift, then pairs of entangled photons can still be identified and the interval between successful detections can be measured such that an accurate trend of clock drift can be monitored. Thus, clock syntonization can be maintained while achieving time transfer between nodes in a secure manner.
Furthermore, while the networks illustrated in
While in principle it may be difficult to distinguish between the effects of relative motion and drifting clocks, the properties of the quantum clock synchronization network discussed herein can allow the effects of the two variables to be distinguished from each other. For instance in a two-node network, if the network is static, the roundtrip time for a photon traveling between the two nodes can be obtained by simply adding the time the photon takes to travel from node A to node B with the time the photon takes to travel from node B to node A. The network also allows a direct measurement of the roundtrip time by having node B reflect some photons originating from node A. Thus, node A is able to directly measure the roundtrip time of a photon according to the local clock at A. A concatenation of several such measurements can provide information regarding how quickly node A is moving with respect to node B, and the effect can be subtracted from other measurements to obtain the relative clock drift due to both motion and drift.
The foregoing is illustrative of the present invention and is not to be construed as limiting thereof. Although a few exemplary embodiments of this invention have been described, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of this invention.
Accordingly, many different embodiments stem from the above description and the drawings. It will be understood that it would be unduly repetitious and obfuscating to literally describe and illustrate every combination and subcombination of these embodiments. As such, the present specification, including the drawings, shall be construed to constitute a complete written description of all combinations and subcombinations of the embodiments described herein, and of the manner and process of making and using them, and shall support claims to any such combination or subcombination.
In the specification, there have been disclosed embodiments of the invention and, although specific terms are employed, they are used in a generic and descriptive sense only and not for purposes of limitation. Although a few exemplary embodiments of this invention have been described, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of this invention. Accordingly, all such modifications are intended to be included within the scope of this invention as defined in the claims. Therefore, it is to be understood that the foregoing is illustrative of the present invention and is not to be construed as limited to the specific embodiments disclosed, and that modifications to the disclosed embodiments, as well as other embodiments, are intended to be included within the scope of the appended claims. The invention is defined by the following claims, with equivalents of the claims to be included therein.
The present application claims priority to U.S. Provisional Patent Application No. 63/039,363, entitled “Quantum Secure Network Clock Synchronization,” filed Jun. 15, 2020, and incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
63039363 | Jun 2020 | US |