QUANTUM SECURE NETWORK CLOCK SYNCHRONIZATION

Information

  • Patent Application
  • 20230379073
  • Publication Number
    20230379073
  • Date Filed
    February 06, 2023
    a year ago
  • Date Published
    November 23, 2023
    5 months ago
Abstract
A multi-node, quantum communication network for providing quantum-secure time transfer with Damon attack detection is described. The network includes three or more nodes connected via authenticated communication channels forming a closed loop. By determining differences between the local times at as well as the time durations required for photons to travel between the three or more nodes, the network detects a Damon attack, if present. For example, the network imposes a closed loop condition to detect the Damon attack. The network can also use the local time differences and time durations for photon travel between nodes to synchronize the local clocks at the three or more nodes of the network.
Description
FIELD OF THE INVENTION

The present invention relates to quantum communications and, more particularly, to quantum communication networks with three or more nodes.


BACKGROUND OF THE INVENTION

Quantum communications, namely secure optical communications enabled by the use of quantum properties of photons, are becoming more accepted and mainstream. While large scale fiber optic and free space optical implementations of quantum communications systems have been demonstrated, expanding point-to-point, two-node system to a multi-node network has been difficult to implement.


SUMMARY OF THE INVENTION

A multi-node, quantum communication network for providing quantum-secure time transfer with Damon attack detection is described, in accordance with an embodiment. The network includes three or more nodes connected via authenticated communication channels forming a closed loop. By determining differences between the local times at as well as the time durations required for photons to travel between the three or more nodes, the network detects a Damon attack, if present. For example, the network imposes a closed loop condition to detect the Damon attack. The network can also use the local time differences and time durations for photon travel between nodes to synchronize the local clocks at the three or more nodes of the network.


In accordance with another embodiment, a multi-node, quantum communication network for providing quantum-secure time transfer with Damon attack detection includes first, second, and third nodes. The first node includes a first local clock and a first photon pair source for providing a first entangled photon pair, the first entangled photon pair including first and second photons. The first node also includes a first capture device for capturing the first photon at a first local time t1 at the first local clock, and a first coupling mechanism for directing the second photon away from the first node. The first node further includes a first measuring device for receiving photons from outside the first node, and a first controller for controlling at least the first local clock, the first photon pair source, the first capture device, the first coupling mechanism, and the first measuring device. The second node includes a second local clock and a second photon pair source for providing a second entangled photon pair, the second entangled photon pair including third and fourth photons. The second node also includes a second capture device for capturing the third photon at a second local time t2 at the second local clock, and a second coupling mechanism for directing the fourth photon away from the second node. The second node further includes a second measuring device for receiving photons from outside the second node, and a second controller for controlling at least the second local clock, the second photon pair source, the second capture device, the second coupling mechanism, and the second measuring device. The third node includes a third local clock and a third photon pair source for providing a third entangled photon pair, the third entangled photon pair including fifth and sixth photons. The third node also includes a third capture device for capturing the fifth photon at a third local time t3 at the third local clock, and a third coupling mechanism for directing the sixth photon away from the third node. The third node additionally includes a third measuring device for receiving photons from outside the third node, and a third controller for controlling at least the third local clock, the third photon pair source, the third capture device, the third coupling mechanism, and the third measuring device. The network further includes a first authenticated communication channel communicatively connecting the first and second nodes, a second authenticated communication channel communicatively connecting the second and third nodes, and a third authenticated communication channel communicatively connecting the third and first nodes. The first, second, and third nodes and the first, second, and third authenticated communication channels form a closed loop. The first, second, and third controllers are configured for determining differences between the first, second, and third local times, as well as for measuring time durations required for the second photon to travel from the first node to the second node, for the second photon to travel from the first node to the third node, for the fourth photon to travel from the second node to the first node, for the fourth photon to travel from the second node to the third node, for the sixth photon to travel from the third node to the first node, and for the sixth photon to travel from the third node to the second node. The first, second, and third controllers are also configured for using the differences between the first, second, and third local times and the time durations so measured to detect a Damon attack, if present.


In accordance with a further embodiment, the first, second, and third controllers are further configured to detect the Damon attack if a closed loop condition is not satisfied. In an embodiment, the closed loop condition is defined as δ122331=0, wherein t1 is the local time of at the first node, t2 is the local time of at the second node, and t3 is the local time of at the third node, δ12=t1−t2, δ23=t2−t3, and δ31=t3−t1.


In another embodiment, the first, second, and third photon pair sources are configured for generating polarization-entangled photon pairs.


In a still further embodiment, the differences between the first, second, and third local times and the time durations so measured are used for synchronizing the first, second, and third local clocks.


In accordance with another embodiment, a method for determining presence of a Damon attack in a multi-node quantum communication network for providing quantum-secure time transfer is described. The method includes identifying a closed loop formed by at least three nodes within the network, and determining differences between local clocks of the at least three nodes. The method further includes imposing a closed loop condition on the differences so determined, and detecting, if the closed loop condition is not satisfied by the differences so determined, presence of the Damon attack.


In a further embodiment, the method includes, at each one of the at least three nodes, generating an entangled photon pair, the entangled photon pair including a first photon and a second photon entangled with the first photon, and capturing the first photon at a local time for the one of the at least three nodes. The method further includes measuring a travel time for the second photon to travel from the one of the at least three nodes to another one of the at least three nodes, calculating a difference in local time from the one of the at least three nodes to another one of the at least three nodes, and determining whether the local clock at each one of the at least three nodes is synchronized with another one of the at least three nodes.





BRIEF DESCRIPTION OF DRAWINGS


FIG. 1 illustrates a two-node quantum communication system.



FIG. 2 illustrates two nodes of a quantum communication system enabling secure time transfer over multiple nodes, in accordance with an embodiment.



FIG. 3 illustrates a configuration for a three-node quantum communication system, in accordance with an embodiment.



FIG. 4 illustrates another configuration for a three-node quantum communication system, in accordance with an embodiment.



FIG. 5 illustrates a configuration for a four-node quantum communication system, in accordance with an embodiment.



FIG. 6 illustrates another configuration for a four-node quantum communication system, in accordance with an embodiment.



FIG. 7 illustrates still another configuration for a four-node quantum communication system, in accordance with an embodiment.



FIG. 8 illustrates a configuration for a five-node quantum communication system, in accordance with an embodiment.





DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

The present invention is described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. In the drawings, the size and relative sizes of layers and regions may be exaggerated for clarity. Like numbers refer to like elements throughout.


It will be understood that, although the terms first, second, third etc. may be used herein to describe various elements, components, regions, layers and/or sections, these elements, components, regions, layers and/or sections should not be limited by these terms. These terms are only used to distinguish one element, component, region, layer or section from another region, layer or section. Thus, a first element, component, region, layer or section discussed below could be termed a second element, component, region, layer or section without departing from the teachings of the present invention.


Spatially relative terms, such as “beneath,” “below,” “lower,” “under,” “above,” “upper,” and the like, may be used herein for ease of description to describe one element or feature's relationship to another element(s) or feature(s) as illustrated in the figures. It will be understood that the spatially relative terms are intended to encompass different orientations of the device in use or operation in addition to the orientation depicted in the figures. For example, if the device in the figures is turned over, elements described as “below” or “beneath” or “under” other elements or features would then be oriented “above” the other elements or features. Thus, the exemplary terms “below” and “under” can encompass both an orientation of above and below. The device may be otherwise oriented (rotated 90 degrees or at other orientations) and the spatially relative descriptors used herein interpreted accordingly. In addition, it will also be understood that when a layer is referred to as being “between” two layers, it can be the only layer between the two layers, or one or more intervening layers may also be present.


The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items, and may be abbreviated as “/”.


It will be understood that when an element or layer is referred to as being “on,” “connected to,” “coupled to,” or “adjacent to” another element or layer, it can be directly on, connected, coupled, or adjacent to the other element or layer, or intervening elements or layers may be present. In contrast, when an element is referred to as being “directly on,” “directly connected to,” “directly coupled to,” or “immediately adjacent to” another element or layer, there are no intervening elements or layers present. Likewise, when light is received or provided “from” one element, it can be received or provided directly from that element or from an intervening element. On the other hand, when light is received or provided “directly from” one element, there are no intervening elements present.


Embodiments of the invention are described herein with reference to cross-section illustrations that are schematic illustrations of idealized embodiments (and intermediate structures) of the invention. As such, variations from the shapes of the illustrations as a result, for example, of manufacturing techniques and/or tolerances, are to be expected. Thus, embodiments of the invention should not be construed as limited to the particular shapes of regions illustrated herein but are to include deviations in shapes that result, for example, from manufacturing. Accordingly, the regions illustrated in the figures are schematic in nature and their shapes are not intended to illustrate the actual shape of a region of a device and are not intended to limit the scope of the invention.


Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and/or the present specification and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.


While certain aspects of quantum communications, such as reliable production of entangled photons, have been reliably demonstrated, certain other aspects are still difficult. One example is the need for clock synchronization and syntonization over multiple nodes of a quantum communications network. For instance, clock synchronization for a two-node quantum network has been described in US Pat. Pub. No. 2020/0084033 A1 entitled “Quantum Secure Clock Synchronization Based on Time-Energy and Polarization Entangled Photon Pairs” to Lamas-Linares, et al. While this patent application describes ways to securely synchronize the clocks at two nodes, it does not discuss expanding the concept to larger networks with multiple nodes without separately establishing node-to-node time transfer for every node combination. That is, while previously described methods discuss the synchronization of clocks between two nodes, they are absent disclosure regarding the synchronization of clocks across a network of three or more nodes without treating the network as a cluster of two-node networks.


For example, FIG. 1 shows a two-node network 100 including nodes A and B, connected by a bi-directional link (quantum channel) 110. The length of quantum channel 110 may or may not be known. Propagation time for a photon to travel from node A to node B (indicated by an arrow 112) is ΔtAB, and propagation time for a photon to travel from node B to node A (indicated by an arrow 114) is ΔtBA. Within each node, there is a local clock (120 and 130 in nodes A and B, respectively) for keeping the local time at the node (tA and tB in nodes A and B, respectively) and operating at a set frequency (fA and fB at nodes A and B, respectively). For this initial discussion, we assume fA=fB. The time labels tA and tB is assumed to have an unknown relationship to each other, and the relationship between local clocks 120 and 130 is not known. The time difference if local clocks 120 and 130 are placed together in the same location can be expressed as:





δAB=tA−tB   [Eq. 1]





δBA=tB−tA=−δAB   [Eq. 2]


Continuing to refer to FIG. 1, an entangled photon pair source (122 and 132 in nodes A and B, respectively) produces polarization entangled photon pairs by, for example, spontaneous parametric down-conversion (SPDC) or a similar method. One photon from each photon pair is detected locally by a first detector (124 and 134 in nodes A and B, respectively) and assigned a local time (t1A and t1B at nodes A and B, respectively). The other photon from each photon pair is sent over quantum channel 110 toward the other node, separated by a circulator (e.g., polarization maintaining circulators 126 and 136 in nodes A and B, respectively), detected by a second detector (128 and 138 in nodes A and B, respectively), and time tagged according to the clock at the receiving node (trA and trB at nodes A and B, respectively). This process of detection and time tagging is referred to as a measurement, and involves a projection of the polarization state and destruction of that photon by the detector.


The photons in each photon pair exhibits a relationship between the time labels assigned locally by the producing node and the remote node. This relationship depends on the intrinsic clock difference and the propagation time between the producing node and the remote node. For any given photon pair i produced in node A, this relationship can be expressed as:






t
lA
i
−t
rB
i

AB
+Δt
AB   [Eq. 3]


An efficient way to obtain tlAi−trBi for all produced photon pairs is to calculate a cross correlation over all time labels corresponding to photons produced at node A. The maximum value of that cross correlation τAB can be expressed as:





τABAB+ΔtAB   [Eq. 4]


Similarly, for photon pairs originating from node B, the maximum value of the cross correlation τBA can be expressed as:





τBABA+ΔtBA   [Eq. 5]


It is noted that that there is no guarantee, in principle, that ΔtAB=ΔtBA. However, when an optical fiber or free space single mode optical channel is used as quantum channel 110, it is assumed that the photons traveling in directions 112 and 114 are essentially identical except for their propagation directions. Thus, it is assumed in this example that ΔtAB=ΔtBA for simplicity. Thus, the time difference δAB can be expressed as:










δ
AB

=


1
2



(


τ
AB

-

τ
BA


)







[

Eq
.

6

]








Then the round-trip time, regardless of the symmetry of quantum channel 110, can be expressed as:






R
ABABBA   [Eq. 7]


Using the known relationships established in the equations above, the time relationships between the two local clocks 120 and 130 in nodes A and B, respectively, can be extracted in order to synchronize the two local clocks. Clock synchronization is essential for quantum communications (and other communications infrastructures) because relative time readings between even atomic clocks can drift within a short time frame, and disruption in the time transfer is one indicator of an adversary attack on the quantum channel. Thus, time transfer between nodes of the quantum communication network in a secure, non-spoofable manner is essential for ensuring security of the overall data transfer. In other words, any two nodes in the network can be synchronized in time in a quantum-secure manner with the additional assumption that the channel connecting the nodes is symmetric in time for the propagation of photons that are produced at random times and which are identical in their properties except the direction of propagation. If a malicious party (“Damon”) gains control of the degree of asymmetry in the quantum channel, he can use that to manipulate the measured offset between two nodes. Regardless, in a two-node network, the ability of the malicious party to manipulate the symmetry of a single channel compromises the security of the procedure and the network operator can be alerted of the intrusion.


However, the discussion above is limited to a two-node network. In order to expand to a quantum communication network including more than two nodes using the above approach, the assumptions and calculations must be repeated for each pair of nodes within the network (i.e., pairwise synchronization). That is, direct application of the above approach for time transfer to a multi-node network beyond two nodes is non-trivial.


It is recognized herein that, with the appropriate set of adjustments to the operation and functionality of the hardware at each node, time transfer among multiple nodes within a quantum communication network can be greatly simplified in a secure, non-spoofable manner.


A multi-node, quantum communication network is described. The network includes three or more nodes connected via quantum channels and configured such that quantum-secure time transfer across all nodes in the network is enabled. The network also is configured for providing synchronization and syntonization of local clocks at the three or more nodes. A method of operating a multi-mode, quantum communication network with quantum-secure time transfer is also described.


In particular, the present disclosure provides quantum-secure clock synchronization and syntonization hardware and procedure for secure time transfer between clocks in a network of three or more nodes. Each of the nodes in this network contains:

    • A local clock with initially unknown offset with respect to other clocks in the network (e.g., local clock 120 in FIG. 1)
    • A source of polarization-entangled photon pairs with high intrinsic time correlations based on, for example, SPDC (e.g., source 122)
    • A capture device for one of the down-conversion modes that contains one member of the entangled photon pair (e.g., first detector 124)
    • A coupling mechanism for the other member of the entangled photon pair to be introduced into a single optical mode connecting the producing node to another, receiving node (e.g., quantum channel 110)
    • A measuring device connected to the incoming signal from the quantum channel. (e.g., circulator 126 and second detector 128)
    • Authenticated communications channel between each member of the node and the rest of the network (sometimes referred to as a classical channel, and can simultaneously function as the quantum channel, mentioned above).
    • A controller configured for managing the above components for each node to enable secure time-transfer throughout the multi-node network (e.g., controller 220 in FIG. 2)


The various components of a node in a network are illustrated in FIG. 2. As shown in FIG. 2, a network portion 200 includes two nodes A and B, each of which includes, in addition to the two-node network shown in FIG. 1, a controller (e.g., controllers 220 and 230 in nodes A and B, respectively) and connections to additional nodes. Controllers 220 and 230 provide additional functionalities to enable the quantum-secure time transfer between the various nodes within the network.


In a multi-node network, pairwise synchronization procedures between any two nodes in the network, such as described above, can provide a set of relationships between the possible channel manipulations that Damon can perform before introducing inconsistencies derived from a set of additional constraints that arise from the network topology. In non-mathematical terms, it is recognized herein that these constraints imply that Damon must simultaneously control different sections of the overall network and introduce equal magnitude and opposite sign asymmetries in different channels. It is further recognized herein that the detailed mathematical structure also illustrates that not all pairwise exchanges are necessary for ensuring secure time transfer throughout the multi-node network, thus providing a constructive recipe for determining a minimum number of pairwise exchanges, thus determining a useful and optimal network topology and system structure.


In the network configurations described below, the constraints introduced by the network topology are available to all nodes via the authenticated communication channel and can be constantly monitored for consistency. Any inconsistency in the monitored values related to these constraints can result in a modification of the derived confidence level of the time transfer procedure. The topology conditions can also be augmented by any additional knowledge about the network channels and the laws of physics. For example, for two non-moving, stationary nodes based on Earth where their relative distance is known, it is a safe assumption that the minimum propagation time between the nodes is equal to or larger than that of the speed of light in vacuum, and all propagation times should be larger than zero, among other assumptions. For links between nodes in a space environment, the link itself can be remotely monitored for attempts at interference and thus be assumed to be same for symmetry breaking attacks, which may be quite elaborate. In a dynamic network where nodes are added and withdrawn ad hoc during the lifetime of the network, the constraints on the manipulations of a Damon attack change with the changes in topology and propagate throughout the network, thus introducing yet another difficulty for successful hacking.


Furthermore, in the network configuration described below, the authenticity of the timing signal itself (i.e., the entangled photons being exchanged) can be guaranteed by the ability of the sending and receiving nodes to perform a Bell inequality analysis on the photon pairs. Due to the no-cloning theorem of quantum mechanics and the monogamy of entanglement, it is essentially impossible for a Damon attack by fabrication (i.e., spoofing) of the timing signal and manipulate the synchronization process in this way. In other words, the disclosure provides a method of incorporating additional knowledge about network properties (for example limits on propagation times) on a quantum time transfer network to bound the possible modifications introduced by a malicious party targeting the time transfer procedure.


In an embodiment, the synchronization of clocks at multiple nodes applies to both time-transfer between clocks as well as syntonization. That is, the process described herein is applicable to both clock synchronization (i.e., setting different clocks to read the same time at a given instant) and clock syntonization (i.e., setting clocks to the same frequency or rate, regardless of the time they display. It is recognized that clocks can be synchronized for a given instant, although they will drift away from each other due to slight differences in their time keeping devices. Also, while clocks can be syntonized such that these slight differences in their time keeping devices are compensated in some way, they may still read different times on their faces. The presently disclosed network implementation allows for both secure synchronization and syntonization over the entire network with two or more nodes. Secure syntonization can be achieved, for example, by comparison of time intervals between successful pair detections in two nodes. The capability for secure syntonization in particular can provide advantages for large mesh and secure network communications required for, for example, 5G and military applications. In other words, the quantum communication system described herein can be “natively” used to keep the various clocks syntonized enough such that there is no significant relative drift to affect the accuracy of the time transfer. That is, since the clock frequencies throughout the network are essentially identical, relative clock drift with respect to other clocks can be constantly corrected during operation.


One way in which distribution of entangled photons can be used is to generate a secure key between two nodes such that these keys can be used to encode information transmitted in open channels, thus helping to obscure the timing conclusions from non-authorized passive listeners or eavesdroppers. By using the network configuration described herein for securing positioning, navigation, and timing (PNT) related procedures, for example, the communication system provides an in-built protection of the information gathered from the synchronization procedure.


Turning now to FIG. 3, a simple three-node quantum communication network 200 is illustrated. Nodes A, B, and C each contains the node components illustrated in FIG. 2, for example. The various propagation times between the nodes are shown in FIG. 2. As in the previously discussed two-node example, there is no guarantee that the links are symmetric in their propagation times (e.g., ΔtAB is not necessarily equal to ΔtBA).


With such a three-node network, a first step in the analysis is to determine the three quantities: δAB=tA−tB, δBC=tB−tC, and δCA=tC−tA. Similarly to the two-node case, we obtain the following measured, pairwise quantities:





τABAB+ΔtAB   [Eq. 8]





τBA=−δAB+ΔtBA   [Eq. 9]





τBCBC+ΔtCB   [Eq. 10]





τCB=−δBC+ΔtBC   [Eq. 11]





τCACA+ΔtCA   [Eq. 12]





τAC=−ΔCA+ΔtAC   [Eq. 13]


In addition to the pairwise relationships in Eqs. 8-13, the relationship between clocks in a closed loop provides an additional constraint that:





δABBCAC   [Eq. 14]


This additional loop constraint provides possible asymmetries of the system that may potentially be introduced in a Damon attack without detection. Combining Eq. 14 with Eqs. 8-13:










δ
AB

=



1
2



(


τ
AB

-

τ
BA


)


-


1
2



(


Δ


t
AB


-

Δ


t
BA



)








[

Eq
.

15

]














δ
BC

=



1
2



(


τ
BC

-

τ
CB


)


-


1
2



(


Δ


t
BC


-

Δ


t
CB



)








[

Eq
.

16

]














δ
CA

=



1
2



(


τ
CA

-

τ
AC


)


-


1
2



(


Δ


t
CA


-

Δ


t
AC



)








[

Eq
.

17

]








For convenience, it is assumed that ϵAB=(ΔtAB−ΔtBA) and mAB=(τAB−τBA) and similarly for equivalent quantities between other nodes. The parameter ϵ corresponds to the asymmetry of each quantum channel between nodes, and m corresponds to the differences between the cross-correlations that occur between two nodes in each direction. Combining the equations and constraints above:











1
2



(


m
CA

-

m
BC

-

m
AB


)


=


ϵ
CA

-

ϵ
bc

-

ϵ
AB







[



Eq


.





18



]








Eq. 18 implies that even an all-powerful Damon is constrained in the way it may be able to manipulate the quantum channels. Moreover, such manipulations would need to be performed all over the network to maintain consistency that avoids detection. In other words, in a three-node network, it is recognized herein that two extra pieces of additional information are enough to completely determine the system. For example, if we know that any two channels are symmetric (e.g., ΔtAB=ΔtBA and ΔtAC=ΔtCA), then there are no longer any modifications that can be performed by Damon that do not break at least one of the known relationships defined in equations above, thus ensuring time transmission within the network is secure.


As the number of nodes is increased, the number of closed loops that can be defined within the network grows and the ability of Damon to arbitrarily manipulate the measured time differences is further constrained. This property, combined with available physical information on sections of the network, can be used to establish confidence intervals on the measured time differences all over the network, even when additional information is concerned with only a local section. Examples of suitable additional information include knowledge that a particular channel/link is symmetric, knowledge that the propagation times cannot be negative, and knowledge that photo propagation speeds cannot be faster than the speed of light, among others. Furthermore, topology and connectivity factors into the constraints in networks with four or more nodes, as will be discussed hereinafter.


Rewriting Eqs. 8-13 with the unknowns on the left-hand side of the equations and the known values (or measurable quantities) on the right-hand side, the following equations hold for a three-node network:





ΔtABABAB   [Eq. 19]





ΔtBA−δABBA   [Eq. 20]





ΔtCBBCBC   [Eq. 21]





ΔtBC−δBCCB   [Eq. 22]





ΔtCACACA   [Eq. 23]





ΔtAC−δCAAC   [Eq. 24]


Defining a quantum channel as symmetric when its corresponding ϵ value is zero, the symmetry relations between each pair of nodes can be rewritten as:





ΔtAB−ΔtBAAB   [Eq. 25]





ΔtBC−ΔtCBBC   [Eq. 26]





ΔtCA−ΔtACCA   [Eq. 27]


When ϵ is non-zero, the channel is defined as being asymmetric. These equations can be rewritten in a matrix form Mx=r, which takes the form:









M
:=

[





1


0


0


0


0


0




0


1


0


0


0


0




0


0


1


0


0


0




0


0


0


1


0


0




0


0


0


0


1


0




0


0


0


0


0


1



|



1


0


0





-
1



0


0




0


1


0




0



-
1



0




0


0


1




0


0



-
1









1



-
1



0


0


0


0




0


0


1



-
1



0


0




0


0


0


0


1



-
1




|



0


0


0




0


0


0




0


0


0





]





[

Eq
.

28

]









x
:=

[





Δ


t
AB







Δ


t
BA







Δ


t
CB







Δ


t
BC







Δ


t
CA







Δ


t
AC









δ
AB






δ
BC






δ
CA





]







r
:=

[





τ
AB






τ
BA






τ
CB






τ
BC






τ
CA






τ
AC








ϵ
AB






ϵ
BC






ϵ
CA





]





M may also be divided into four block submatrices:









M
:=

[


A
C

|

B
D


]





[

Eq
.

29

]







In Eq. 29, A=I is the 2n×2n (6 by 6) identity matrix, C=BT (i.e., C is the transpose of B), and D=0 is the n×n (3 by 3) zero matrix. Thus, M can be re-expressed as:









M
:=

[


I

B
T


|

B
0


]





[

Eq
.

30

]







The inverse of M can be computed with block-wise inversion, with the help of the Schur complement of A










M

-
1


:=

[



I
-



B

(


B
T


B

)


-
1




B
T



|


B

(


B
T


B

)


-
1







(


B
T


B

)


-
1




B
T


|

-


(


B
T


B

)


-
1





]





[

Eq
.

31

]







Recognizing that the value BTB=2I and its inverse








(


B
T


B

)


-
1


=


1
2


I





in a particular case, Eq. 31 can be further simplified as:










M

-
1


:=


1
2

[




2

I

-

BB
T


|
B



B
T


|

-
I



]





[

Eq
.

32

]







To solve for the unknowns x in Eq. 28, Mx=r is multiplied by M−1 to obtain:









x
=



M

-
1



r

=




1
2

[




2

I

-

BB
T


|
B



B
T


|

-
I



]

[

τ
ϵ

]

=


1
2

[



2

τ

-


BB
T


τ

+

B

ϵ





B
T


τ

-
ϵ


]







[

Eq
.

33

]







Written in another way:










[


Δ

t

δ

]

=


1
2

[



2

τ

-


BB
T


τ

+

B

ϵ





B
T


τ

-
ϵ


]





[

Eq
.

34

]







Eq. 34 can be split along the submatrix blocks:





t=(2−BBT)τ+  [Eq. 35]





2δ=BTτ−ϵ  [Eq 36]


Inserting the various known values, we obtain:










[

Eq
.

37

]














2
[




Δ


t
AB







Δ


t
BA







Δ


t
CB







Δ


t
BC







Δ


t
CA







Δ


t
AC





]

=


2
[





τ
AB






τ
BA






τ
CB






τ
BC






τ
CA






τ
AC




]

-
⁠⁠


[



1



-
1



0


0


0


0





-
1



1


0


0


0


0




0


0


1



-
1



0


0




0


0



-
1



1


0


0




0


0


0


0


1



-
1





0


0


0


0



-
1



1



]


[





τ
AB






τ
BA






τ
CB






τ
BC






τ
CA






τ
AC




]

+







[



1


0


0





-
1



0


0




0


1


0




0



-
1



0




0


0


1




0


0



-
1




]


[




ϵ
AB






ϵ
BC






ϵ
CA




]












Δt
AB

=




τ
AB

+

τ
BA


2

+

ϵ
AB








[

Eq
.

38

]
















Δ


t
BA


=




τ
BA

+

τ
AB


2

-

ϵ
AB








[

Eq
.

39

]
















Δ


t
CB


=




τ
CB

+

τ
BC


2

+

ϵ
BC







[

Eq
.

40

]















Δ


t
BC


=




τ
BC

+

τ
CB


2

-

ϵ
BC







[

Eq
.

41

]















Δ


t
CA


=




τ
CA

+

τ
AC


2

+

ϵ
CA







[

Eq
.

42

]















Δ


t
AC


=




τ
AC

+

τ
CA


2

-

ϵ
CA







[

Eq
.

43

]







Thus, for the clock time differences:










2
[




δ
AB






δ
BC






δ
CA




]

=



[



1



-
1



0


0


0


0




0


0


1



-
1



0


0




0


0


0


0


1



-
1




]

[




τ
AB






τ
BA






τ
CB






τ
BC






τ
CA






τ
AC




]

-

[




ϵ
AB






ϵ
BC






ϵ
CA




]







[

Eq
.

44

]














δ
AB

=


1
2



(


τ
AB

-

τ
BA

-

ϵ
AB


)






[

Eq
.

45

]













δ
BC

=


1
2



(


τ
CB

-

τ
BC

-

ϵ
BC


)






[

Eq
.

46

]













δ
CA

=


1
2



(


τ
CA

-

τ
AC

-

ϵ
CA


)






[

Eq
.

47

]







The symmetry relations used above may be substituted with other limitations. Again, revisiting Eqs. 8-13, with the unknowns are grouped on the left-hand side of the equations and the known values (or measurable quantities) on the right-hand side, for a network of three nodes:





ΔtABABAB   [Eq. 48]





ΔtBA−δABBA   [Eq. 49]





ΔtCBBCBC   [Eq. 50]





ΔtBC−δBCCB   [Eq. 51]





ΔtCACACA   [Eq. 52]





ΔtAC−δCAAC   [Eq. 53]


For the symmetry relations, Eq. 14 is substituted for the last closure relation:





ΔtAB−ΔtBAAB   [Eq. 54]





ΔtBC−ΔtCBBC   [Eq. 55]





δABBCCA=0   [Eq. 56]


Again, a quantum channel is defined as symmetric when its corresponding E value is zero. When ϵ is non-zero, the channel is considered asymmetric. In this particular example, because of the substitution, there are no restriction on the relationship of ΔtCA and ΔtAC, meaning the channel connecting nodes A and C could be arbitrarily asymmetric. The system of equations can be rewritten in a matrix form Mx=r, which takes the form:









M
:=

[






1


0


0


0


0


0




0


1


0


0


0


0




0


0


1


0


0


0




0


0


0


1


0


0




0


0


0


0


1


0




0


0


0


0


0


1









1


0


0





-
1



0


0




0


1


0




0



-
1



0




0


0


1




0


0



-
1









1



-
1



0


0


0


0




0


0


1



-
1



0


0




0


0


0


0


0


0



|



0


0


0




0


0


0




1


1


1





]





[

Eq
.

57

]









x
:=

[





Δ


t
AB







Δ


t
BA







Δ


t
CB







Δ


t
BC







Δ


t
CA







Δ


t
AC









δ
AB






δ
BC






δ
CA





]







r
:=

[





τ
AB






τ
BA






τ
CB






τ
BC






τ
CA






τ
AC








ϵ
AB






ϵ
BC





0




]





While it is no longer possible to simplify the inverse of M as in Eqs. 29-32, it can be assured that there is a solution as long as A and the Schur complement of A in M/A:=D−CA−1B have inverses. Thus, A will always remain the identity no matter what loop closure relations are substituted. The Schur complement of A for this system takes the form:










[

Eq
.

58

]










M
/
A

:=



[



0


0


0




0


0


0




1


1


1



]

-


[



1



-
1



0


0


0


0




0


0


1



-
1



0


0




0


0


0


0


0


0



]

[



1


0


0





-
1



0


0




0


1


0




0



-
1



0




0


0


1




0


0



-
1




]


=

[




-
2



0


0




0



-
2



0




1


1


1



]






Eq. 58 does have an inverse and remains well-conditioned.


Such loop closure equations can be extended for networks with larger numbers of nodes. As an example, the construction of the closure relations can be generalized into a matrix form:





Γt=δ  [Eq. 59]


As defined above, each δ is defined as the time difference if any two clocks are brought together in the same location. For a three node network, then, where the ordering is a matter of convention:






t
A
−t
B:=δAB:=δBA:=tB−tA   [Eq. 60]






t
B
−t
C:=δBC:=−δCB:=tC−tB   [Eq. 61]






t
C
−t
A:=δCA:=−δAC:=tA−tC   [Eq. 62]


Eqs. 60-62 can be arranged into matrix form:









Γ
:=

[



1



-
1



0




0


1



-
1






-
1



0


1



]





[

Eq
.

63

]









t
:=

[




t
A






t
B






t
C




]







δ
:=

[




δ
AB






δ
BC






δ
CA




]





Due to the underlying loop (or cycle) structure of matrix Γ, the matrix has a rank r=n−1=2. For the right-hand side δ to exist in the column space of matrix Γ, there will be a set of constraints imposed on the δ values. To generate these constraints, an augmented matrix [Γ|δ] is formed, and linear operations on the rows of this matrix can be performed until it is in a reduced row echelon form:









[





1



-
1



0




0


1



-
1






-
1



0


1



|




δ
AB






δ
BC






δ
CA





]





[

Eq
.

64

]







First add row 1 to row 3 to eliminate the leading −1:









[




1



-
1



0




0


1



-
1





0



-
1



1



|




δ
AB






δ
BC







δ
AB

+

δ
CA






]




[

Eq
.

65

]







Next, add row 2 to row 1 to eliminate the −1 in the second column:









[




1


0



-
1





0


1



-
1





0


0


1



|





δ
AB

+

δ
BC







δ
BC







δ
AB

+

δ
CA






]




[

Eq
.

66

]







Thus, Eq. 66 is the reduced row echelon form of [Γ|δ], i.e., rref([Γ|δ]). The bottom row with only zeros can be interpreted as:





0tA+0tB+0tCABBCCA   [Eq. 67]


The left-hand side reduces to zero. Then, for this system to remain consistent and have a corresponding solution, thus matching Eq. 14 above, the following condition holds true:





δABBCCA=0   [Eq. 68]


In other words, the recognition of these specific requirements and limitations on the system allows quantum-secure time transfer across all three nodes. The implementation of such requirements can be handled by a controller at each node, such as controllers 220 and 230 shown in FIG. 2.


This method of quantum-secure time transfer can be further expanded to networks with any number of nodes, as will be described below. While trivial in the three-node case, for larger numbers of nodes the loop closure relations benefit from having a procedural generation method, such as described above. For any network, a matrix Γ may be generated for each quantum channel defined between any two network nodes. The augmented matrix [Γ|δ] can be formed and rewritten into reduced row echelon form (rref). Any rows that contain all zeros on the left columns of the augmented matrix will provide constraints on the values of δ.


For a network without a closed loop, such as a three-node network 400 illustrated in FIG. 4, in which nodes A and C do not share a quantum channel between them, the matrices for the equation expressing the connection system, Γt=δ, with t and δ as defined above, is relatively simple:









Γ
:=

[



1



-
1



0




0


1



-
1




]





[

Eq
.

69

]









t
:=

[




t
A






t
B






t
C




]







δ
:=

[




δ
AB






δ
BC




]





Using Eq. 69 to generate the rref ([Γ|δ]) leads to









[




1


0



-
1





0


1



-
1




|





δ
AB

+

δ
BC







δ
BC





]




[

Eq
.

70

]







It may be noted that there is no row of only zeros in the rref ([Γ|δ]) in Eq. 70. That is, there are no free variables in this system. As a result, other external constraints, such as symmetry in both directions of a quantum channel's propagation times, should be imposed to guarantee the security of the network. In other words, in terms of graph theory, the process of finding the constraints can be summarized as finding the cycle basis of the graph of the underlying network. The constraints on the values of δ arise from drawing a linearly independent set of simple cycles that form a basis in the cycle space of this graph. For the network shown in FIG. 3, a cycle basis would span a vector containing all nodes in the triangle network, and the constraint can be generated by summing the values of 6 between the nodes in a cycle, for example, A→B→C→A. In the case of the three-node network shown in FIG. 4, there are no cycles in the underlying graph, thus there is no corresponding cycle basis and no corresponding constraints on the δ values can be imposed. An alternative method, such as finding a cycle basis in polynomial time, can be used to form the fundamental δ constraint equations of such a network.


Expanding the implementation of the quantum-secure time transfer to a four-node network, such as a four-node network 500 shown in FIG. 5, a similar analysis is performed. For the network topology shown in FIG. 5, assuming as before that there is no explicit guarantee that the links are symmetric in their propagation times, the relationships between the various propagation times can be written as:





ΔtABABAB   [Eq. 71]





ΔtBA−δABBA   [Eq. 72]





ΔtCBBCBC   [Eq. 73]





ΔtBC−δBCCB   [Eq. 74]





ΔtCDCDCD   [Eq. 75]





ΔtDC−δCDDC   [Eq. 76]





ΔtDADADA   [Eq. 77]





ΔtAD−δDAAD   [Eq. 78]


The symmetry relations between each pair of nodes can be written as:





ΔtAB−ΔtBAAB   [Eq. 79]





ΔtBC−δtCBBC   [Eq. 80]





ΔtCD−ΔtDCCD   [Eq. 81]





ΔtDA−ΔtADDA   [Eq. 82]


Again, a quantum channel is defined as symmetric when its corresponding ϵ value is zero. When ϵ is non-zero, the channel is asymmetric. As usual, the relevant system of equations take the form:









M
:=

[


A
|
B


C
|
D


]





[

Eq
.

83

]







A=I is the 2n×2n (i.e., 8-by-8) identity matrix for n=the number of nodes, C=BT, i.e., C n×2n (i.e., 4-by-8) matrix is the transpose of B 2n×n (i.e., 8 by 4) matrix, and D=0 is the n×n (i.e., 4-by-4) zero matrix. The vector of unknowns and right-hand side then can be expressed as:









x
:=

[





Δ


t
AB







Δ


t
BA







Δ


t
CB







Δ


t
BC







Δ


t
CD







Δ


t
DC







Δ


t
DA







Δ


t
AD









δ
AB






δ
BC






δ
CD






δ
DA





]





[

Eq
.

84

]









R
:=

[





τ
AB






τ
BA






τ
CB






τ
BC






τ
CD






τ
DC






τ
DA






τ
AD








ϵ
AB






ϵ
BC






ϵ
CD






ϵ
DA





]





The solution takes the same form as Eqs. 35 and 36 above.


In the topology of four-node network 500, there can only be one loop around the ring, defined as the path traversing A→B→C→D→A. Again, the values of δ can be expressed as:





δAB=tA−tB   [Eq. 85]





δBC=tB−tC   [Eq. 86]





δCD=tC−tD   [Eq. 87]





δDA=tD−tA   [Eq. 88]


Eqs. 85-88 are added to obtain the one loop closure relation:





δABBCCDDA=0   [Eq. 89]


It is noted that this closure relation involves all nodes of the network. Alternatively, the connection system Γt=δ can be considered such that









Γ
:=

[



1



-
1



0


0




0


1



-
1



0




0


0


1



-
1






-
1



0


0


1



]





[

Eq
.

90

]









t
:=

[




t
A






t
B






t
C






t
D




]







δ
:=

[




δ
AB






δ
BC






δ
CD






δ
DA




]





The augmented matrix [Γ|δ] can be written as:









[




1



-
1



0


0




0


1



-
1



0




0


0


1



-
1






-
1



0


0


1



|




δ
AB






δ
BC






δ
CD






δ
DA





]




[

Eq
.

91

]







The reduced row echelon format matrix rref ([Γ|δ]) is then:









[




1


0


0



-
1





0


1


0



-
1





0


0


1



-
1





0


0


0


0



|





δ
AB

+

δ
BC

+

δ
CD








δ
BC

+

δ
CD







δ
CD







δ
AB

+

δ
BC

+

δ
CD

+

δ
DA






]




[

Eq
.

92

]







Note Eq. 92 yields the same constraints on the δ values as Eq. 89. One of the symmetry relations can then be substituted for this closure relation instead, thus modifying the C and D submatrices in Eq. 83 as:









C
:=

[



1



-
1



0


0


0


0


0


0




0


0


1



-
1



0


0


0


0




0


0


0


0


1



-
1



0


0




0


0


0


0


0


0


0


0



]





[

Eq
.

93

]









D
:=

[



0


0


0


0




0


0


0


0




0


0


0


0




1


1


1


1



]





The considerations and requirements above can be implemented at each of nodes A, B, C, and D so as to enable quantum-secure time transfer across all four nodes shown in FIG. 5.


The analysis can be further expanded to add additional quantum channels within the four-node network. In a four-node network 600 shown in FIG. 6, a quantum channel is added to connect nodes A and C. As before, there is no guarantee that the links are symmetric in their propagation times. The relationships between the various propagation times can be written as:





ΔtABABAB   [Eq. 94]





ΔtBA−δABBA   [Eq. 95]





ΔtCBBCBC   [Eq. 96]





ΔtBC−δBCCB   [Eq. 97]





ΔtCDCDCD   [Eq. 98]





ΔtDC−δCDDC   [Eq. 99]





ΔtDADADA   [Eq. 100]





ΔtAD−δDAAD   [Eq. 101]





ΔtCACACA   [Eq. 102]





ΔtAC−δCAAC   [Eq. 103]


The symmetry relations between each pair of nodes can be written as:





ΔtAB−ΔtBAAB   [Eq. 104]





ΔtBC−ΔtCBBC   [Eq. 105]





ΔtCD−ΔtDCCD   [Eq. 106]





ΔtDA−ΔtADDA   [Eq. 107]





ΔtCA−ΔtACCA   [Eq. 108]


Again, a quantum channel is defined as symmetric when its corresponding ϵ value is zero. When ϵ is non-zero, the channel is asymmetric. As usual, the relevant system of equations take the form:









M
:=

[


A
|
B


C
|
D


]





[

Eq
.

109

]







In this case, A=I is the (2n+2)×(2n+2) (i.e., 10-by-10) identity matrix, C=BT, i.e., C (n+1)×2(n+1) (i.e., 5-by-10) matrix is the transpose of B(2n+2)×(n+1) (i.e., 10-by-5) matrix, and D=0 is the (n+1)×(n+1) (i.e., 5-by-5) zero matrix. The vector of unknowns and right-hand side then can be expressed as:









x
:=

[





Δ


t
AB







Δ


t
BA







Δ


t
CB







Δ


t
BC







Δ


t
CD







Δ


t
DC







Δ


t
DA







Δ


t
AD







Δ


t
AC







Δ


t
CA









δ
AB






δ
BC






δ
CD






δ
DA






δ
CA





]





[

Eq
.

110

]









r
:=

[





τ
AB






τ
BA






τ
CB






τ
BC






τ
CD






τ
DC






τ
DA






τ
AD






τ
AC






τ
CA








ϵ
AB






ϵ
BC






ϵ
CD






ϵ
DA






ϵ
CA





]





Even with the additional quantum channel between nodes A and C, the structure of matrix M is preserved since the new quantum channel is independent of the other already established channels. Constructing the connection system Γt=δyields:









Γ
:=

[



1



-
1



0


0




0


1



-
1



0




0


0


1



-
1






-
1



0


0


1





-
1



0


1


0



]






[

Eq
.

111

]









t
:=

[




t
A






t
B






t
C






t
D




]







δ
:=

[




δ
AB






δ
BC






δ
CD






δ
DA






δ
CA




]





The augmented matrix [Γ|δ] can be written as:












[



1



-
1



0


0




0


1



-
1



0




0


0


1



-
1






-
1



0


0


1





-
1



0


1


0






"\[RightBracketingBar]"







δ
AB






δ
BC






δ
CD






δ
DA






δ
CA





]




[

Eq
.

112

]







The reduced row echelon format matrix rref([Γ|δ]) is then:












[



1


0


0



-
1





0


1


0



-
1





0


0


1



-
1





0


0


0


0




0


0


0


0






"\[RightBracketingBar]"








δ
AB

+

δ
BC

+

δ
CD








δ
BC

+

δ
CD







δ
CD







δ
AB

+

δ
BC

+

δ
CD

+

δ
DA








δ
AB

+

δ
BC

+

δ
CA






]




[

Eq
.

113

]







The new quantum channel between nodes A and B creates additional loop closure relations, as can be seen in the bottom two rows in Eq. 113:





δABBCCDDA=0   [Eq. 114]





δABBCCA=0   [Eq. 115]


Then the other submatrices C and D can be written as:









C
:=

[



1



-
1



0


0


0


0


0


0


0


0




0


0


1



-
1



0


0


0


0


0


0




0


0


0


0


1



-
1



0


0


0


0




0


0


0


0


0


0


0


0


0


0




0


0


0


0


0


0


0


0


0


0



]





[

Eq
.

116

]









D
:=

[



0


0


0


0


0




0


0


0


0


0




0


0


0


0


0




1


1


0


0


1




1


1


1


1


0



]





The Schuler complement of matrix M does have an inverse and remains well-conditioned:










M
/
A

:=

[




-
2



0


0


0


0




0



-
2



0


0


0




0


0



-
2



0


0




1


1


0


0


1




1


1


1


1


0



]





[

Eq
.

117

]







Thus, adding another connection to the four-node network of FIG. 4 resulted in another loop closure relation available for use in defining system symmetries and conditions. In essence, if a cycle (or cycles) is added into a given network, another closure equation can be generated if the new cycle does not lie in the span of the current cycle basis. For a network with n nodes, the n−1=3 channel symmetry constraints are still imposed on the network. It is recognized that this condition results in a reduction from the total of five quantum channels that exist in the topology illustrated in FIG. 6.


The method of quantum-secure time transfer can be further expanded to a maximally connected network shown in FIG. 7. As discussed above, the addition of another quantum channel results in the generation of another loop closure relation, and this quantum channel does not need to be symmetrically constrained.


As shown in FIG. 7, a four-node network 700 includes quantum channels between the four nodes in all possible pair combinations. As before, the relationships between the various propagation times can be expressed as:





ΔtABABAB   [Eq. 118]





ΔtBA−δABBA   [Eq. 119]





ΔtCBBCBC   [Eq. 120]





ΔtBC−δBCCB   [Eq. 121]





ΔtCDCDCD   [Eq. 122]





ΔtDC−δCDDC   [Eq. 123]





ΔtDADADA   [Eq. 124]





ΔtAD−δDAAD   [Eq. 125]





ΔtACACAC   [Eq. 126]





ΔtCA−δACCA   [Eq. 127]





ΔtBDBDBD   [Eq. 128]





ΔtDB−δBDDB   [Eq. 129]


The symmetry relations between each pair of nodes can be written as:





ΔtAB−ΔtBAAB   [Eq. 130]





ΔtBC−ΔtCBBS   [Eq. 131]





ΔtCD−ΔtDCCD   [Eq. 132]





ΔtDA−ΔtADDA   [Eq. 133]





ΔtCA−ΔtACCA   [Eq. 134]





ΔtDB−ΔtBDDB   [Eq. 135]


Again, a quantum channel is defined as symmetric when its corresponding ϵ value is zero. When ϵ is non-zero, the channel is asymmetric. As usual, the relevant system of equations takes the form:










M
:

=

[


A
|
B


C
|
D


]





[

Eq
.

136

]







In this case, A=I is the n(n−1)×n(n−1) (i.e., 12-by-12) identity matrix, C=BT, i.e., Cn(n−1)/2×n(n−1)/2 (i.e., 6-by-12) matrix is the transpose of B n(n−1)×n(n−1)/2 (i.e., 12-by-6) matrix, and D=0 is the n(n−1)/2×n(n−1)/2 (i.e., 6-by-6) zero matrix. The vector of unknowns and right-hand side then can be expressed as:









x
:=

[





Δ


t
AB







Δ


t
BA







Δ


t
CB







Δ


t
BC







Δ


t
CD







Δ


t
DC







Δ


t
DA







Δ


t
AD







Δ


t
AC







Δ


t
CA







Δ


t
BD







Δ


t
DB









δ
AB






δ
BC






δ
CD






δ
DA






δ
CA






δ
DB





]





[

Eq
.

137

]









r
:=

[





τ
AB






τ
BA






τ
CB






τ
BC






τ
CD






τ
DC






τ
DA






τ
AD






τ
AC






τ
CA






τ
BD






τ
DB








ϵ
AB






ϵ
BC






ϵ
CD






ϵ
DA






ϵ
CA






ϵ
DB





]





The δ equations in this case are:






t
A
−t
BAB   [Eq. 138]






t
B
−t
CBC   [Eq. 139]






t
C
−t
DCD   [Eq. 140]






t
D
−t
ADA   [Eq. 141]






t
C
−t
ACA   [Eq. 142]






t
D
−t
BDB   [Eq. 143]


Written in the connection system Γt=δ matrix form:











[



1



-
1



0


0




0


1



-
1



0




0


0


1



-
1






-
1



0


0


1





-
1



0


1


0




0



-
1



0


1



]

[




t
A






t
B






t
C






t
D




]

=

[




δ
AB






δ
BC






δ
CD






δ
DA






δ
CA






δ
DB




]





[

Eq
.

144

]







After manipulation, the reduced row echelon format matrix rref([Γ|δ]) is then:












[



1


0


0


0



-
1





0


1


0


0



-
1





0


0


1


0



-
1





0


0


0


0


0




0


0


0


0


0




0


0


0


0


0






"\[RightBracketingBar]"








δ
AB

+

δ
BC

+

δ
CD








δ
BC

+

δ
CD







δ
CD







δ
AB

+

δ
BC

+

δ
CD

+

δ
DA








δ
AB

+

δ
BC

+

δ
CA








δ
BC

+

δ
CD

+

δ
DB






]




[

Eq
.

145

]







We then may use the three loop closure relations formed in the bottom three rows of the augmented reduced row echelon form of [Γ|δ]:





δABBCCDDA=0   [Eq. 146]





δABBCCA=0   [Eq. 147]





δBCCDDB=0   [Eq. 148]


An alternative method for finding a linearly independent set of loop closure relations is to use graph theory. For example, using the NetworkX Python library, a cycle basis of this graph may be computed. Using this method, a basis set can be defined as:





Loop 1 closure relation (A→B→C→A)





δABBCCA=0   [Eq. 149]





Loop 2 closure relation (C→D→A→C)





δCDDA−δCA=0   [Eq. 150]





Loop 3 closure relation (B→C→D→B)





δBCCDDB=0   [Eq. 151]


Then the C and D submatrices can be written as:









C
:=

[



1



-
1



0


0


0


0


0


0


0


0


0


0




0


0


1



-
1



0


0


0


0


0


0


0


0




0


0


0


0


1



-
1



0


0


0


0


0


0




0


0


0


0


0


0


0


0


0


0


0


0




0


0


0


0


0


0


0


0


0


0


0


0




0


0


0


0


0


0


0


0


0


0


0


0



]





[

Eq
.

152

]









D
:=

[



0


0


0


0


0


0




0


0


0


0


0


0




0


0


0


0


0


0




1


1


0


0


1


0




0


0


1


1



-
1



0




0


1


1


0


0


1



]





The Schur complement of A does have an inverse and remains well-conditioned:










M
/
A

:=

[




-
2



0


0


0


0


0




0



-
2



0


0


0


0




0


0



-
2



0


0


0




1


1


0


0


1


0




1


1


1


1



-
1



0




0


1


1


0


0


1



]





[

Eq
.

153

]







It is recognized herein that, regardless of the number of quantum channels added into a network, n−1=3 symmetry closure relations need to be provided. These relations can be provided, for example, in the form of symmetry constraints for light propagation to be reciprocal within a particular quantum channel. With such a relation defined, it is possible to have a network with nodes that have a higher degree of quantum channel connections than two (not counting themselves) and not have to stipulate that channel be symmetric.


As another example, the requirements for enabling quantum-secure time transfer in a five-node network is considered. An example of a time-transfer network 800 is shown in FIG. 8. As before, the relationships between the various propagation times can be expressed as:





ΔtABABAB   [Eq. 154]





ΔtBA−δABBA   [Eq. 155]





ΔtBCBCBC   [Eq. 156]





ΔtCB−δBCCB   [Eq. 157]





ΔtCACACA   [Eq. 158]





ΔtAC−δCAAC   [Eq. 159]





ΔtADADAD   [Eq. 160]





ΔtDA−δADDA   [Eq. 161]





ΔtDEDEDE   [Eq. 162]





ΔtED−δDEDE   [Eq. 163]





ΔtEAEAEA   [Eq. 164]





ΔtAE−δEAAE   [Eq. 165]


The symmetry relations between each pair of nodes can be written as:





ΔtAB−ΔtBAAB   [Eq. 166]





ΔtBC−ΔtCBBC   [Eq. 167]





ΔtCA−ΔtACCA   [Eq. 168]





ΔtAD−ΔtDAAD   [Eq. 169]





ΔtDE−ΔtEDDE   [Eq. 170]





ΔtEA−ΔtAEEA   [Eq. 171]


As above, a quantum channel is defined as symmetric when its corresponding ϵ value is zero. When ϵ is non-zero, the channel is asymmetric. As usual, the relevant system of equations takes the form:









M
:=

[


A
|
B


C
|
D


]





[

Eq
.

172

]







In this case, A=I is the 12-by-12 identity matrix, C=BT is a 6-by-12 matrix transpose of B (a 12-by-6 matrix), and D=0 is the (n+1)×(n+1) (i.e., 6-by-6) zero matrix. The vector of unknowns and right-hand side then can be expressed as:









x
:=

[





Δ


t
AB







Δ


t
BA







Δ


t
BC







Δ


t
CB







Δ


t
CA







Δ


t
AC







Δ


t
AD







Δ


t
DA







Δ


t
DE







Δ


t
ED







Δ


t
EA







Δ


t
AE









δ
AB






δ
BC






δ
CA






δ
AD






δ
DE






δ
EA





]





[

Eq
.

173

]









r
:=

[





τ
AB






τ
BA






τ
BC






τ
CB






τ
CA






τ
AC






τ
AD






τ
DA






τ
DE






τ
ED






τ
EA






τ
AE








ϵ
AB






ϵ
BC






ϵ
CA






ϵ
AD






ϵ
DE






ϵ
EA





]





The δ equations in this case are:






t
A
−t
BAB   [Eq. 174]






t
B
−t
CBC   [Eq. 175]






t
C
−t
ACA   [Eq. 176]






t
A
−t
DAD   [Eq. 177]






t
D
−t
EDE   [Eq. 178]






t
E
−t
AEA   [Eq. 179]


Written in the connection system Γt=δ matrix form:












[



1



-
1



0


0




0


1



-
1



0




0


0


1



-
1






-
1



0


0


1





-
1



0


1


0




0



-
1



0


1



]

]

[




t
A






t
B






t
C






t
D




]

=

[




δ
AB






δ
BC






δ
CD






δ
DA






δ
CA






δ
DB




]





[

Eq
.

180

]







And the usual loop closure relations can be found by deriving the augmented reduced row echelon form of [Γ↑δ]. In this manner, the present method of operating calculating the required constraints and implementing them is expandable for use in a multi-mode network system for quantum-secure time transfer throughout the network.


It is noted that, in the above analyses, an assumption was made that the local clocks at the nodes in a given network all run at the same frequency, and the nodes are static with respect to each other such that the propagation times between the nodes do not change with time. While the assumption of syntonized clocks (i.e., clocks all running at the same frequency) is likely not justified in an absolute sense, clocks are generally well characterized and stringent limits on relative drift of their frequencies can be obtained. For instance, an effect of a clock drift is to make the peak of the cross-correlation function less pronounced such that, if the relative drift is too fast, the peak of the cross-correlation function may be difficult to detect from the background. However, if the peak is locatable, even with some frequency drift, then pairs of entangled photons can still be identified and the interval between successful detections can be measured such that an accurate trend of clock drift can be monitored. Thus, clock syntonization can be maintained while achieving time transfer between nodes in a secure manner.


Furthermore, while the networks illustrated in FIGS. 3-8 were assumed to be static, the method discussed above can be expanded to quantum-secure time transfer in non-static networks as well. For example, the relative motion of nodes can result in a similar effect as drifting clocks in that the cross-correlation measurement becomes “smeared” from the variation in propagation time such that a maximum cross-correlation value may be difficult to fine. However, like the clock drift, the relative motion can be measured by comparing time intervals between successive events in connected nodes such that the relative motion can also be taken into account by the controllers at the nodes.


While in principle it may be difficult to distinguish between the effects of relative motion and drifting clocks, the properties of the quantum clock synchronization network discussed herein can allow the effects of the two variables to be distinguished from each other. For instance in a two-node network, if the network is static, the roundtrip time for a photon traveling between the two nodes can be obtained by simply adding the time the photon takes to travel from node A to node B with the time the photon takes to travel from node B to node A. The network also allows a direct measurement of the roundtrip time by having node B reflect some photons originating from node A. Thus, node A is able to directly measure the roundtrip time of a photon according to the local clock at A. A concatenation of several such measurements can provide information regarding how quickly node A is moving with respect to node B, and the effect can be subtracted from other measurements to obtain the relative clock drift due to both motion and drift.


The foregoing is illustrative of the present invention and is not to be construed as limiting thereof. Although a few exemplary embodiments of this invention have been described, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of this invention.


Accordingly, many different embodiments stem from the above description and the drawings. It will be understood that it would be unduly repetitious and obfuscating to literally describe and illustrate every combination and subcombination of these embodiments. As such, the present specification, including the drawings, shall be construed to constitute a complete written description of all combinations and subcombinations of the embodiments described herein, and of the manner and process of making and using them, and shall support claims to any such combination or subcombination.


In the specification, there have been disclosed embodiments of the invention and, although specific terms are employed, they are used in a generic and descriptive sense only and not for purposes of limitation. Although a few exemplary embodiments of this invention have been described, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of this invention. Accordingly, all such modifications are intended to be included within the scope of this invention as defined in the claims. Therefore, it is to be understood that the foregoing is illustrative of the present invention and is not to be construed as limited to the specific embodiments disclosed, and that modifications to the disclosed embodiments, as well as other embodiments, are intended to be included within the scope of the appended claims. The invention is defined by the following claims, with equivalents of the claims to be included therein.

Claims
  • 1. A multi-node, quantum communication network for providing quantum-secure time transfer with Damon attack detection, the network comprising: a first node including a first local clock,a first photon pair source for providing a first entangled photon pair, the first entangled photon pair including first and second photons,a first capture device for capturing the first photon at a first local time ti at the first local clock,a first coupling mechanism for directing the second photon away from the first node,a first measuring device for receiving photons from outside the first node, anda first controller for controlling at least the first local clock, the first photon pair source, the first capture device, the first coupling mechanism, and the first measuring device;a second node including a second local clock,a second photon pair source for providing a second entangled photon pair, the second entangled photon pair including third and fourth photons,a second capture device for capturing the third photon at a second local time t2 at the second local clock,a second coupling mechanism for directing the fourth photon away from the second node,a second measuring device for receiving photons from outside the second node, anda second controller for controlling at least the second local clock, the second photon pair source, the second capture device, the second coupling mechanism, and the second measuring device;a third node including a third local clock,a third photon pair source for providing a third entangled photon pair, the third entangled photon pair including fifth and sixth photons,a third capture device for capturing the fifth photon at a third local time t3 at the third local clock,a third coupling mechanism for directing the sixth photon away from the third node,a third measuring device for receiving photons from outside the third node, anda third controller for controlling at least the third local clock, the third photon pair source, the third capture device, the third coupling mechanism, and the third measuring device;a first authenticated communication channel communicatively connecting the first and second nodes;a second authenticated communication channel communicatively connecting the second and third nodes; anda third authenticated communication channel communicatively connecting the third and first nodes,wherein the first, second, and third nodes and the first, second, and third authenticated communication channels form a closed loop,wherein the first, second, and third controllers are configuredfor determining differences between the first, second, and third local times,for measuring time durations required for the second photon to travel from the first node to the second node,for the second photon to travel from the first node to the third node,for the fourth photon to travel from the second node to the first node,for the fourth photon to travel from the second node to the third node,for the sixth photon to travel from the third node to the first node, andfor the sixth photon to travel from the third node to the second node, andfor using the differences between the first, second, and third local times and the time durations so measured to detect a Damon attack, if present.
  • 2. The network of claim 1, wherein the first, second, and third controllers are further configured to detect the Damon attack if a closed loop condition is not satisfied.
  • 3. The network of claim 2, wherein the closed loop condition is defined as δ12+δ23+δ31=0, wherein δ12=t1−t2, δ23=t2−t3, and δ31=t3−t1.
  • 4. The network of claim 1, wherein the first, second, and third photon pair sources are configured for generating polarization-entangled photon pairs.
  • 5. The network of claim 1, wherein the differences between the first, second, and third local times and the time durations so measured are used for synchronizing the first, second, and third local clocks.
  • 6. A method for determining presence of a Damon attack in a multi-node, quantum communication network for providing quantum-secure time transfer, the method comprising: identifying a closed loop formed by at least three nodes within the network;determining differences between local clocks of the at least three nodes;imposing a closed loop condition on the differences so determined; anddetecting, if the closed loop condition is not satisfied by the differences so determined, presence of the Damon attack.
  • 7. The method of claim 6, wherein imposing the closed loop condition includes, at each one of the at least three nodes, generating an entangled photon pair, the entangled photon pair including a first photon and a second photon entangled with the first photon,capturing the first photon at a local time for the one of the at least three nodes,measuring a travel time for the second photon to travel from the one of the at least three nodes to another one of the at least three nodes,calculating a difference in local time from the one of the at least three nodes to another one of the at least three nodes, anddetermining whether the local clock at each one of the at least three nodes is synchronized with another one of the at least three nodes.
CLAIM OF PRIORITY

The present application is a continuation of U.S. patent application Ser. No. 17/348,585, titled “Quantum Secure Network Clock Synchronization,” filed Jun. 15, 2021, which in turn claims priority to U.S. Provisional Patent Application No. 63/039,363, titled “Quantum Secure Network Clock Synchronization,” filed Jun. 15, 2020. Both applications are incorporated by reference in its entirety.

Provisional Applications (1)
Number Date Country
63039363 Jun 2020 US
Continuations (1)
Number Date Country
Parent 17348585 Jun 2021 US
Child 18106045 US