The instant application is related to co-pending application Ser. No. 10/716,747, entitled “Systems and Methods for Implementing Training Frames for Quantum Cryptographic Links” and filed on a same date herewith, the disclosure of which is incorporated by reference herein in its entirety.
The present application further relates to co-pending U.S. patent application Ser. No. 09/943,709, entitled “Systems and Methods for Path Set-up in a Quantum Key Distribution Network” and filed Aug. 31, 2001; and U.S. patent application Ser. No. 09/944,328, entitled “Quantum Cryptographic Key Distribution Networks with Untrusted Switches” and filed Aug. 31, 2001, the disclosures of which are incorporated by reference herein.
The present invention relates generally to cryptographic systems and, more particularly, to systems and methods for implementing training frames for quantum cryptographic links.
Within the field of cryptography, it is well recognized that the strength of any cryptographic system depends, among other things, on the key distribution technique employed. For conventional encryption to be effective, such as a symmetric key system, two communicating parties must share the same key and that key must be protected from access by others. The key must, therefore, be distributed to each of the parties.
To combat these inherent deficiencies in the key distribution process, researchers have developed a key distribution technique called quantum cryptography. Quantum cryptography employs quantum systems and applicable fundamental principles of physics to ensure the security of distributed keys. Heisenberg's uncertainty principle mandates that any attempt to observe the state of a quantum system will necessarily induce a change in the state of the quantum system. Thus, when very low levels of matter or energy, such as individual photons, are used to distribute keys, the techniques of quantum cryptography permit the key distributor and receiver to determine whether any eavesdropping has occurred during the key distribution. Quantum cryptography, therefore, prevents an eavesdropper, like Eve, from copying or intercepting a key that has been distributed from Alice to Bob without a significant probability of Bob's or Alice's discovery of the eavesdropping.
A well known quantum key distribution (QKD) scheme involves a quantum channel, through which Alice and Bob send keys using polarized or phase encoded photons, and a public channel, through which Alice and Bob send ordinary messages. Since these polarized or phase encoded photons are employed for QKD, they are often termed QKD photons. The quantum channel is a path, such as through air or an optical fiber, that attempts to minimize the QKD photons' interaction with the environment. The public channel may comprise a channel on any type of communication network such as a Public Switched Telephone network, the Internet, or a wireless network. An eavesdropper, Eve, may attempt to measure the photons on the quantum channel. Such eavesdropping, however, will induce a measurable disturbance in the photons in accordance with the Heisenberg uncertainty principle. Alice and Bob use the public channel to discuss and compare the photons sent through the quantum channel. If, through their discussion and comparison, they determine that there is no evidence of eavesdropping, then the key material distributed via the quantum channel can be considered completely secret.
Alice and Bob then estimate 230 whether Eve has eavesdropped upon the key distribution. To do this, Alice and Bob must agree upon a maximum tolerable error rate. Errors can occur due to the intrinsic noise of the quantum channel and eavesdropping attack by a third party. Alice and Bob choose randomly a subset of photons m from the sequence of photons that have been transmitted and measured on the same basis. For each of the m photons, Bob announces publicly his measurement result. Alice informs Bob whether his result is the same as what she had originally sent. They both then compute the error rate of the m photons and, since the measurement results of the m photons have been discussed publicly, the polarization data of the m photons are discarded. If the computed error rate is higher than the agreed upon tolerable error rate (typically no more than about 15%), Alice and Bob infer that substantial eavesdropping has occurred. They then discard the current polarization data and start over with a new sequence of photons. If the error rate is acceptably small, Alice and Bob adopt the remaining polarizations, or some algebraic combination of their values, as secret bits of a shared secret key 235, interpreting horizontal or 45 degree polarized photons as binary 0's and vertical or 135 degree photons as binary 1's (see row 6 of
Alice and Bob may also implement an additional privacy amplification process 240 that reduces the key to a small set of derived bits to reduce Eve's knowledge of the key. If, subsequent to discussion 215 and sifting 225, Alice and Bob adopt n bits as secret bits, the n bits can be compressed using, for example, a hash function. Alice and Bob agree upon a publicly chosen hash function ƒ and take K=ƒ(n bits) as the shared r-bit length key K. The hash function randomly redistributes the n bits such that a small change in bits produces a large change in the hash value. Thus, even if Eve determines a number of bits of the transmitted key through eavesdropping, and also knows the hash functions she still will be left with very little knowledge regarding the content of the hashed r-bit key K. Alice and Bob may further authenticate the public channel transmissions to prevent a “man-in-the-middle” attack in which Eve masquerades as either Bob or Alice.
Systems and methods consistent with the present invention implement path length control in a quantum cryptographic system to mitigate the effects of thermal and stress fluctuations in the transmitter or receiver that may adversely affect the transmission of QKD symbols across a phase-encoded QKD link. In a process equivalent to the above polarization-encoding method, the key bits in the present invention may be encoded in the phase of a photon. A transmitter (Alice) may send single photons by means of a highly attenuated laser, with each photon passing through a phase adjusting element, such as, for example, a Mach-Zehnder interferometer, that may be randomly modulated to one of four phases using a phase adjuster to encode both a value and a basis in the photon's phase ΦVa+ΦBa. Since Alice's interferometer may be unbalanced, two time-spaced wavepackets emerge at Alice's output when the interferometer is pulsed. The receiver (Bob) may contain another Mach-Zehnder interferometer, randomly modulated to one of two basis phases ΦBb in order to encode a basis.
Ideally, the differential delay in both Bob's and Alice's interferometer is identical to within a few wavelengths and stable to within a fraction of the QKD photon's wavelength. When the two pulses from Alice enter Bob's interferometer, they are split into two sets of two that combine at the output such that the leading pulse of one set overlaps the trailing pulse of the other set. Interference in the overlapping wave functions creates a central pulse whose probability of striking either detector is dependent on the relative phases of the two waves, set by the total phase shift introduced at Alice and Bob, Φ0=ΦVa+ΦBa−ΦBb. When the total phase shift is Φ0=0, for example, the intensity is maximum at a first receiving photodetector D0 at Bob and minimum at a second receiving photodetector D1 at Bob. A single photon is more likely to strike detector D0, representing a received value of zero. When the total phase shift is Φ0=π, the reverse is true: the photon is more likely to strike D1, which represents a received value of one.
For the link to operate properly the differential delay caused by the short and long arms of each interferometer should be the same and remain stable to within a fraction of the QKD wavelength. This state is difficult to maintain over long periods of time, since the interferometers may be separated by considerable distance and, thus, subject to different environmental conditions. Environmentally-induced changes in differential delay contribute to the applied phase shift, Φ0, and result in a higher quantum bit error rate (QBER) and disruption of the operation of the quantum link. The total phase shift is therefore Φ=Φ0+ΔΦ, where ΔΦ is an extraneous phase shift.
Systems and methods consistent with the present invention employ a feedback system, that uses training symbols as an input, for continuously and automatically controlling the path length through a QKD link in order to match the interferometer at the transmitter (Alice) precisely with the interferometer at the receiver (Bob) in the presence of site-specific thermal and acoustic fiber-length fluctuations. Systems and methods consistent with the invention, thus, reduce QBER and ensure the proper operation of the QKD link.
In accordance with the purpose of the invention as embodied and broadly described herein, a method of controlling path length in a quantum cryptographic key distribution (QKD) system includes receiving training symbols transmitted from a QKD transmitter over a QKD path. The method further includes controlling a length of the QKD path based on the received training symbols.
In another implementation consistent with the present invention, a method of automatically controlling a path length in a quantum cryptographic key distribution system is provided, where the path includes a first interferometer and a second interferometer. The method includes employing a phase shifting element in the second interferometer. The method further includes automatically adjusting the phase shifting element to control the path length based on symbols transmitted over the path.
In a further implementation consistent with the present invention, a method of automatically controlling a path length in a quantum cryptographic key distribution (QKD) system is provided. The method includes employing a feedback system in the QKD system. The method further includes automatically controlling the path length, using the feedback system, based on symbols transmitted over the path.
In yet another implementation consistent with the present invention, a method of controlling a path length in a quantum cryptographic key distribution (QKD) system is provided. The method includes determining probabilities associated with multiple detection events, the plurality of detection events being associated with a sequence of symbols received over a path in the QKD system. The method further includes controlling a length of the path based on the determined probabilities.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and, together with the description, explain the invention. In the drawings,
The following detailed description of the invention refers to the accompanying drawings. The same reference numbers in different drawings identify the same or similar elements. Also, the following detailed description does not limit the invention. Instead, the scope of the invention is defined by the appended claims.
Systems and methods consistent with the present invention employ a feedback system, that uses training symbols as an input, for continuously and automatically controlling the path length through a QKD link. Control of the path through the QKD link permits the differential delay path-length of the interferometer at the transmitter (Alice) to be matched with the differential delay path-length of the interferometer at the receiver (Bob) in the presence of site-specific environmental differences. By controlling the path length, systems and methods consistent with the invention reduce QBER and ensure the proper operation of the link.
Optical link/network 415 may include a link that may carry light throughout the electromagnetic spectrum, including light in the human visible spectrum and light beyond the human-visible spectrum, such as, for example, infrared or ultraviolet light. The link may include, for example, a conventional optical fiber. Alternatively, the link may include a free-space optical path, such as, for example, a path through the atmosphere or outer space, or even through water or other transparent media. As another alternative, the link may include a hollow optical fiber that may be lined with photonic band-gap material.
Furthermore, optical link/network 415 may include a QKD network that includes one or more QKD switches (not shown) for distributing encryption keys between a source QKD endpoint (e.g., QKD endpoint 405a) and a destination QKD endpoint (e.g., QKD endpoint 405b). Such a QKD network may include the QKD network described in U.S. patent application Ser. No. 09/943,709, entitled “Systems and Methods for Path Set-up in a Quantum Key Distribution Network,” and U.S. patent application Ser. No. 09/944,328, entitled “Quantum Cryptographic Key Distribution Networks with Untrusted Switches.”
QKD endpoints 405 may distribute Quantum Cryptographic keys via optical link/network 415. Subsequent to quantum key distribution via optical link/network 415, QKD endpoint 405a and QKD endpoint 405b may encrypt traffic using the distributed key(s) and transmit the traffic via network 410.
It will be appreciated that the number of components illustrated in
Input device 515 permits entry of data into QKD endpoint 405 and may include a user interface (not shown). Output device 520 permits the output of data in video, audio, and/or hard copy format. Quantum cryptographic transceiver 525 may include mechanisms for transmitting and receiving encryption keys using quantum cryptographic techniques. Interface(s) 530 may interconnect QKD endpoint 405 with link/network 415. Bus 535 interconnects the various components of QKD endpoint 405 to permit the components to communicate with one another.
QKD receiver 610 may include a photon detector 625 and a photon evaluator 630. Photon detector 625 can include, for example, conventional avalanche photo detectors (APDs) or conventional photo-multiplier tubes (PMTs). Photon detector 625 can also include cryogenically cooled detectors that sense energy via changes in detector temperature or electrical resistivity as photons strike the detector apparatus. Photon detector 625 can detect photons received across the optical link. Photon evaluator 630 can include conventional circuitry for processing and evaluating output signals from photon detector 625 in accordance with quantum cryptographic techniques.
QKD source 705 may include a laser that produces photon pulses at, for example, a 1550 nm wavelength. The number of photons contained in each photon pulse produced by QKD source 705 may be statistically distributed according to, for example, a Poisson distribution. According to such a statistical distribution, a series of photon pulses emitted by QKD source 705, when attenuated by optical attenuator 710, may include less than a threshold level of photons per pulse on average (e.g., less than 1 photon/pulse). Optical coupler 715 may include, for example, a 50/50 coupler, and may couple dim photon pulses from QKD source 705 to interferometer 720. Interferometer 720 may include a phase adjuster 725 and a separate interferometer arm 730. Interferometer 720 may, for example, include a Mach-Zehnder interferometer, that may be modulated to one of four phases to encode both a basis value and a cryptographic key symbol value in each photon's self interference. For example, a cryptographic key symbol of “0” or “1” may be encoded in either of two randomly selected non-orthogonal bases. In one implementation, the “0” key symbol can be encoded by either a phase shift of 0 (basis 0) or π/2 (basis 1) and the “1” key symbol can be encoded by either a π phase shift (basis 0) or a 3π/2 phase shift (basis 1). Four different basis and key symbol pairs (basis, symbol) may, thus, be encoded by four different phase shifts (0, π/2, π, or 3π/2). This may be achieved by applying four different voltages to phase adjuster 725. These voltages may be applied by summing amp 750 which may convert a basis value B received from FIFO 755 and a cryptographic key value V received from FIFO 760 to one of four different voltages for inducing a corresponding phase shift in phase adjuster 725.
Optical coupler 735 may include, for example, a 50/50 coupler, and may couple the signals from phase adjuster 725 and interferometer arm 730 to fiber adapter 740. Fiber adapter 740 may interconnect polarization maintaining fiber from optical coupler 735 to non-polarization maintaining fiber coupled to WDM 745. WDM 745 may multiplex the “dim” photon pulses from QKD source 705 with the “bright” photon pulses generated by bright source 747. Bright source 747 may include a laser that produces multi-photon pulses (e.g., “bright” pulses) at, for example, a 1300 nm wavelength.
A series of trigger values T may be received from FIFO 765 for triggering pulse generator 770. When triggered, pulse generator 770 may send a pulse to bright source 747 for initiating the transmission of a bright pulse, and a pulse to delay unit 775. Delay unit 775 may delay the pulse from pulse generator 770 a specified delay interval before passing the pulse on to pulse generator 780. Upon receipt of the delayed pulse, pulse generator 780 may send an electrical pulse to QKD source 705 for initiating the transmission of a photon pulse that may be attenuated by optical attenuator 710 to produce a dim photon pulse.
WDM 805 may demultiplex optical pulses transmitted from a QKD transmitter 605 of another QKD endpoint 405. WDM 805 may, for example, demultiplex bright pulses received at 1300 nm wavelength to bright pulse detector 810. WDM 805 may further, for example, demultiplex dim pulses received at 1550 nm wavelength to polarization controller 815. Polarization controller 815 may adjust the polarization of incoming dim pulse photons, which have had their polarization altered by transit across link 415, such that the photons exhibit uniform polarization. Fiber adapter 820 may adapt non-polarization maintaining fiber coupled to polarization controller 815 to polarization maintaining fiber coupled to optical coupler 825. Optical coupler 825 may provide dim pulses to interferometer 830. Interferometer 830 may include, for example, a Mach-Zehnder interferometer and may further include a phase adjuster 835 and a phase shifter 840. A phase shift may be randomly applied to phase adjuster 835 via gain adjust amplifier 886. Gain adjust amplifier 886 may receive a basis value B from FIFO 890 indicating either a 0−π or a π/2−3π/2 phase angle. Gain adjust amplifier 886 may translate the basis value to an output voltage that adjusts the phase shift of phase adjuster 835 an amount corresponding to the output voltage. Phase shifter 840 may maintain a stable path length during photon transmission and reception and may maintain the identity of interferometers at QKD transmitter 605 and QKD receiver 610. In some implementations, for example, phase shifter 840 may include a conventional fiber stretcher that is controlled by a voltage source (not shown) for adjusting the path length. In other implementations, phase shifter 840 may only include a conventional phase modulator controlled by a voltage source. Yet in other implementations, a bias voltage may be applied directly to the phase adjuster 835.
Optical coupler 845 may couple the signals from phase adjuster 835 and phase shifter 840 and provide the coupled signals to QKD APD 855 via fiber adapter 850, and to QKD APD 865 via fiber adapter 860. Fiber adapter 850 may adapt polarization maintaining fiber coupled to a port of optical coupler 845 to non-polarizarion maintaining fiber coupled to QKD APD 855. Fiber adapter 860 may adapt non-polarization maintaining fiber coupled to a port of optical coupler 845 to non-polarization maintaining fiber coupled to QKD APD 865.
Bright pulse detector 810 may pass an electrical annunciator pulse, indicating receipt of a bright photon pulse, to pulse threshold device 870. Pulse threshold device 870 may provide a logic pulse for each bright pulse received at detector 810 to trigger the gating of QKD APDs (D0) 855 and (D1) 865 via delay unit 880, amplifier 877 and pulse generator 885. Delay unit 880 may delay the logic pulse trigger from pulse threshold device 870 a sufficient interval such that QKD APDs (D0) 855 and (D1) 865 are gated precisely at a time a subsequent dim photon pulse arrives. At the receipt of a dim photon pulse at either QKD APD (D0) 855 or (D1) 865, the outputs of the APDs are sampled by pulse threshold device 889. Pulse threshold device 889 provides a pulse corresponding to each APD 855 and 865 if their sampled outputs meet a specified threshold value. Pulse stretcher 887 receives the corresponding pulse(s) from pulse threshold device 889 and converts the received pulses to a logic high symbol (i.e., a pulse is received) or a logic low symbol (i.e., no pulse is received). Logic high or low symbols corresponding to the output from QKD APD (D0) 855 may be provided to FIFO 894. Logic high or low symbols corresponding to the output from QKD APD (D1) 865 may be provided to FIFO 896.
Pulse threshold device 870 may further provide a logic pulse, corresponding to each received bright photon pulse, as a trigger to FIFOs 890, 892, 894 and 896 via delay unit 867. The trigger may “clock” data in or out of each of the FIFOs.
Pulse threshold device 870 may further provide a logic pulse, via delay unit 875, to trigger pulse generator 872. Pulse generator 872, responsive to a trigger pulse from pulse threshold device 870, may pass a framing symbol F to FIFO 892.
A transmitter Qframe 905 may include multiple frame locations (frame loc #1910-1 through frame loc #N 910-N), each of which may include a number of symbol values. A frame length may determine the number of frame locations in transmitter Qframe 905. The frame length may be fixed, or may vary with each frame. The symbols of each frame location may include a basis symbol BT, a first symbol S0 and a second symbol S1. Basis value BT may indicate one of two bases. A first basis may include a phase shift of 0 or π. A second basis may include a phase shift of π/2 or 3π/2. Symbols S0 and S1 may, together, indicate a quantum cryptographic key symbol. For example, S0 and S1 symbols of “01” may indicate a key symbol of “0.” As an additional example, S0 and S1 symbols of “10” may indicate a key symbol of “1.” Basis symbol BT and each symbol S0 and S1 may be used to phase modulate 920 an outgoing “dim” pulse 925 from QKD transmitter 605.
A receiver Qframe 945 may include multiple frame locations (frame loc #1950-1 through frame loc #N 950-N), each of which may include a number of symbol values. A frame length may determine the number of frame locations in receiver Qframe 945. The frame length may be fixed, or may vary with each frame. The symbols of each frame location may include a basis symbol BR, a first detected symbol D0935 and a second detected symbol D1940. Basis value BR may indicate one of two bases. A first basis may include a phase shift of 0 or π. A second basis may include a phase shift of π/2 or 3π/2. Basis value BR may be used to phase modulate 930 a received dim pulse 925. D0935 may indicate a symbol detected at QKD APD (D0) 855 of QKD receiver 610. D1940 may indicate a symbol detected at QKD APD (D1) 865 of QKD receiver 610.
Frame payload annunciator pulses 1120 may include a number of pulses that identify the boundaries of the payload of frame 1100. In a fixed length frame (i.e., frame with no frame length 1135), frame payload annunciator pulses 1120 may include, for example, 1024 bits all set to “1.” In a variable length frame, for example, frame payload annunciator pulses 1120 may include a number of bits set to “1” as determined by frame length 1135.
During the bright pulses of the frame payload annunciator pulses 1120, the “dim” pulses 1140 transmitted by QKD transmitter 605 can be considered to be “significant,” and, thus, include the symbols of the frame payload (see 1150,
Count table 1300 may include a field that indicates basis and value pairs 1305 associated with symbols transmitted from another QKD endpoint 405a (referred to as “Alice”), a field 1310 that indicates a basis used by the receiving QKD endpoint 405b (referred to as “Bob”) for measuring received “dim” pulses, a theoretical total phase shift value Φ0 1310 for the path between Alice and Bob, and binned counts of training events 1320. The binned counts of training events 1320 may include counts for “no hits” 1325 indicating a binned count of no symbols detected at either APD (D0) 855 or APD (D1) 865 of QKD receiver 610, a “D0 hit” 1330 indicating a binned count of symbols detected only at D0 APD 855, and not D1 APD 865, a “D1 hit” 1335 indicating a binned count of symbols detected only at D1 APD 865, and not D0 APD 855, and “D0, D1 hits” 1340 indicating a binned count of symbols detected at both D0 APD 855 and D1 APD 865.
In one implementation, joint probability table 1400 may be stored in memory 510 of a QKD endpoint 405. Alternatively, joint probability table 1400 may also be stored in a database external to a QKD endpoint 405.
Consistent with one exemplary embodiment of the present invention that employs BB84 protocol, an additional phase shift may be introduced in La and Lb, thus, controlling the constructive or destructive interference at detectors D0855 and D1865. For example, when the total introduced phase shift Φ0=ΦVa+ΦVb−ΦBb is zero, the intensity may be maximum at detector D0855 and minimum at detector D1865. For the total phase of π, the reverse is true, and for the total phase shift of π/2 and 3π/2 the intensity of the resulting central peak may be equal for both of the detectors. For the protocol to operate properly, the differential delay caused by the short and long arms of each interferometer should be the same and remain stable to within a fraction of the QKD wavelength. This state is difficult to maintain over long periods of time, since both interferometers 720 and 830 may be in different locations (i.e., usually separated by ten's of kilometers) and subject to different temperature, pressure and stress conditions. Environmentally-induced changes in differential delay contribute to the applied phase shift, Φ0, and result in a higher quantum bit error rate (QBER) and disruption of the operation of the quantum link. The total phase shift is therefore Φ=Φ0+ΔΦ, where ΔΦ is an extraneous phase shift.
In order to compensate for the phase error that results from environmentally-induced phase changes in the interferometers, a phase shifter may be included in the short arm of the interferometer 830. A phase error may be determined from statistics associated with the detection events given know settings of the intended photon phases. The phase error may then be compensated dynamically, by adjusting the phase shifter 840 to expand or contract the effective path length such that ΔΦ=0. In one implementation in which phase shifter 840 includes, for example, a fiber stretcher, the phase error may be compensated by adjusting the voltage of the fiber stretcher, thus, expanding or contracting the fiber length.
In order to directly separate the extraneous phase error from the intended photon phase values in the detection statistics, the phase shift values applied by Alice for each qubit, ΦVa+ΦBa would have to be known. This information is not immediately available to Bob during data transmission, since the bit value and basis phases transmitted by Alice are completely random. Some of this information becomes available after the sifting of qubits, however, the variation in phase error is typically too rapid to allow for information from the delayed qubit sifting to be useful. Thus, consistent with the present invention, training frames, that include deterministic information about the values of ΦVa+ΦBa, may be used. Each training frame contains qubits encoded using deterministic value and basis pairs as agreed upon by Alice and Bob prior to frame transmission. While receiving qubits in training frames, Bob continues to apply random bases. However, since the value and basis settings at Alice are known apriori to Bob, Bob can recover the total phase shift Φ0 for each qubit without public communication with Alice. Since the detection probability distribution function for both detectors depends on Φ0 and phase error, the value of the phase error may, for example, be estimated by solving a set of non-linear equations.
The stability of feedback system 1600 may depend on the sum of the sample time T and the computational delay, as well as the proportional gain K. The higher the gain, the faster the system 1600 will respond to change in phase error ΔΦ (the overshoot would be higher and the rise time would be the smallest). However, as the gain K is increased, the settling time will become longer due to the ringing of the phase error ΔΦ, up to the point of instability. Choosing the right sampling time T is important as well.
The estimation of ΔΦ may be based on joint probability table 1400, and the more counts that are present in the table, the closer the probability of detection events converges to its mean for each point and, thus, the error of the estimate becomes smaller. However, as T becomes significantly large, the value of the phase error ΔΦ starts to change during the counts. This can be compensated by: a) increasing the number of training frames, or b) isolating both interferometers better (i.e., setting the time constant for the interferometer setup large). The plant of the system, which consists of the phase shifter, the training frames susbsystem, and the estimator may be essentially a linear system. It is characterized by the proportional gain of the phase shifter and sampling dynamics that arise from the delay required to collect data and compute the estimates.
The exemplary process may begin with the setting of frame number 1130 to an initial value [act 1705](
A determination may be made whether frame type 1125 indicates that the frame is a training frame [act 1730]. If frame type 1125 indicates that the frame is a data frame, and not a training frame, then bright source 747 may, optionally, transmit symbols that indicate frame length 1135 [act 1735]. For example, bright source 747 may transmit 32 symbols that include a binary encoded frame length value. Bright source 747 may then transmit a single frame payload annunciator pulse 1120 [act 1805](
Processing unit 505 may determine whether the transmitted frame payload annunciator pulse was the last annunciator pulse of frame payload annunciator pulses 1120 [act 1835]. If not, the exemplary process may return to act 1805 with the transmission of the next frame payload annunciator pulse. If the transmitted frame payload annunciator pulse was the last pulse of the frame, then processing unit 505 may increment frame number 1130 [act 1840] and the exemplary process may return to act 1710 above to begin transmission of the next frame.
Returning to act 1730, if processing unit 505 determines that frame type 1125 indicates that the frame is a training frame, then one of a number of different training frame transmission processes may be implemented. In a first exemplary training frame transmission process, described with respect to acts 1905-1950 of
In the first exemplary training frame transmission process, a counter i is set to “1” [act 1905]. A known sequence of basis (Bi) and value (Vi) pairs is selected [act 1910]. For example, a repetitive sequence of the following basis and value pairs may be selected: {(0,0), (0,1), (1,0), (1,1)}. In other embodiments, a more complex sequence of basis and value pairs may be selected, such as, for example, a series of all possible permutations of 4-qubit sequences that may exercise unusual cases in a receiving detector's behavior, such as detection probabilities that vary depending on recent history of activity. Furthermore, a known sequence of basis (Bi) and value (Vi) pairs may be associated with each different training frame. A first training frame may have a first known associated sequence S1, a second training frame may have a second known associated sequence S2, and so on. Processing unit 505 may then, optionally, set frame length 1135 to a length n of the known sequence associated with the current frame and transmit the frame length via bright source 747 [act 1915]. For example, bright source 747 may transmit 32 symbols that include a binary encoded frame length value. Processing unit 505 may then encode symbol value Vi as two symbols S0i and S1i [act 1920]. Thus, a “0” training symbol may be encoded as the symbols “01” and a “1” training symbol may be encoded as the symbols “10.” Bright source 747 may then transmit a single frame payload annunciator pulse 1120 [act 1925]. This annuniciator pulse may be used for synchronization timing and for setting a frame boundary (e.g., the first annunciator pulse) for the transmitted payload symbols.
Phase adjuster 725 may phase modulate an output dim pulse from QKD source 705 using basis value Bi and the encoded symbol values S0i and S1i [act 1930]. For example, if transmitting S0 equal to 0, and the basis value Bi is zero, then the outgoing dim pulse can be encoded with a phase shift of 0. As another example, if transmitting S0 equal to 1, and the basis value Bi is zero, then the outgoing dim pulse can be encoded with a phase shift of π. QKD source 705 may transmit, via optical attenuator 710, the phase encoded dim photon pulse a specified interval after transmission of the frame payload annunciator pulse [act 1935]. Processing unit 505 may determine whether counter i is equal to the known sequence length n [act 1940]. If not, then counter i may be incremented (i.e., i=i+1) [act 1945] and the exemplary process may return to act 1920 above for transmission of the next training dim pulse. If the counter i is equal to the known sequence length n, then frame number 1130 may be incremented [act 1950] and the exemplary process may return to act 1710 (
In a second exemplary training frame transmission process, a counter j is set to “1” [act 2005]. Processing unit 505 may use the current frame number 1130 as a seed in an algorithm to generate a sequence of basis (Bj) and value (Vj) pairs [act 2010]. The algorithm may include a deterministic algorithm, such as a pseudo-random number generator, that generates a sequence of basis and value pairs (Bj, Vj) from the frame number seed. The algorithm may further include a true random number generator that may work on a variety of principles, such as, for example, passage of a photon through a beam splitter, decaying radioactive atoms, thermal noise, etc. A true random number generator will give a less predictable random number generator that a pseudo-random number generator. The same algorithm may be employed at the transmitting QKD endpoint and the receiving QKD endpoint. In one implementation, for example, bases and symbol values (V) may be computed as a function (ƒ) of the training frame number (FN) and the symbol number (s) within a frame in which a training symbol is to be transmitted:
B=ƒ(FN,s)
V=ƒ(FN,s)
where the function (ƒ) represents a truly random or pseudo-random function.
Processing unit 505 may then, optionally, set frame length 1135 to a length n of the generated sequence and transmit the frame length via bright source 747 [act 2015]. For example, bright source 747 may transmit 32 symbols that include a binary encoded frame length value. Processing unit 505 may then encode symbol value Vj as two symbols S0j and S1j [act 2020]. Thus, a “0” training symbol may be encoded as the symbols “01” and a “1” training symbol may be encoded as the symbols “10.” Bright source 747 may then transmit a single frame payload annunciator pulse 1120 [act 2025]. This annuniciator pulse may be used for synchronization timing and for setting a frame boundary (e.g., the first annunciator pulse) for the transmitted payload symbols. Phase adjuster 725 may phase modulate an output dim pulse from QKD source 705 using basis value Bj and the encoded symbol values S0j and S1j [act 2030]. For example, if transmitting S0 equal to 0, and the basis value Bj is zero, then the outgoing dim pulse can be encoded with a phase shift of 0. As another example, if transmitting S0 equal to 1, and the basis value Bj is zero, then the outgoing dim pulse can be encoded with a phase shift of π. QKD source 705 may transmit, via optical attenuator 710, the phase encoded dim photon pulse a specified interval after transmission of the frame payload annunciator pulse [act 2035]. Processing unit 505 may determine whether counter j is equal to the known sequence length n [act 2040]. If not, then counter j may be incremented (i.e., j=j+1) and the exemplary process may return to act 2020 above for transmission of the next training dim pulse. If the counter j is equal to the known sequence length n, then frame number 1130 may be incremented and the exemplary process may return to act 1710 (
The exemplary process may begin with the reception of bright pulses at QKD receiver 610 and the discarding of “0” symbols until a “1” symbol is received at bright pulse detector 810 [act 2105]. The discarded “0” symbols followed by the “1” symbol may indicate interframe mark 1110. Following the “1” symbol, the subsequent eight symbols may be read as the frame type 1125 [act 2110]. Frame type 1125 may indicate whether the frame is a data frame or a training frame. The subsequent 32 symbols may then be read as frame number 1130 [act 2115]. The 32 symbols may, for example, include the frame number as a binary encoded value. In the case of noisy or lossy channels, techniques may be used in order to estimate the frame number 1130 before corruption. Such techniques may include Maximum Likelihood Estimation, or other known techniques, applicable to recovering symbols corrupted in transit in noisy or lossy channels. Optionally, the symbols following the frame number 1130 may be read as frame length 1135 [act 2120]. The frame length symbols of frame length 1135 may include, for example, 32 symbols that include the frame length encoded as a binary encoded value.
A determination may be made whether frame type 1125 indicates that the frame is a training frame [act 2125]. If not, a determination may then be made whether the next received bright pulse symbol, following the pulses of frame number 1130 or optional frame length 1135, equals the “1” symbol [act 2130]. If not, then the exemplary process may return to act 2105 above. If the next bright pulse symbol equals the “1” symbol, indicating the start of the frame payload, then the “1” symbol may be counted by, for example, processing unit 505 [act 2205](
Dim pulse hits on both detectors (D0) 855 and (D1) 865 may then be sampled to produce values D0 and D1 [act 2220]. A current frame number, basis BR, values D0 and D1, and the dim pulse photon number corresponding to the current received dim photon pulse may be recorded in, for example, memory 510 [act 2225]. The dim pulse photon number may then be incremented [act 2230]. A determination may then be made whether the symbol count (act 2205 above) matches the frame length [act 2235]. For example, if the frame length includes 1024 symbols, the end of the frame will occur when the symbol count equals 1024. If the symbol count does not match the frame length, the exemplary process may return to act 2130 for receipt of the next bright annunciator pulse. If the symbol count matches the frame length, then the frame number, dim pulse photon number, basis BR, and D0 and D1 values may be utilized in subsequent QKD sifting and error correction [act 2240]. QKD sifting and error correction may be performed, for example, according to conventional techniques. The exemplary process may then return to act 2105 to begin the processing of another frame.
Returning to act 2125, if frame type 1125 indicates that the frame is a training frame, then a determination may then be made whether the next received bright pulse symbol equals the “1” symbol [act 2305](
B=ƒ(FN,s)
V=ƒ(FN,s)
where the function (ƒ) represents a truly random or pseudo-random function.
The same algorithm may be employed at the transmitting QKD endpoint and the receiving QKD endpoint.
Processing unit 505 may then use the deduced basis and symbol value pair (B, V) and the chosen basis BR, used to detect the training symbol (see act 2315 above), as a row index (INDEXROW) for count table 1300 [act 2335]. Processing unit 505 may further use detector hits at detectors D0855 and D1865 as a column index (INDEXCOLUMN) for count table 1300 [act 2340]. Processing unit 505 may then increment a running count in a table entry of count table 1300 that corresponds to the row index and column index (INDEXROW, INDEXCOLUMN) [act 2405](
The dim pulse photon number may then be incremented [act 2410]. A determination may then be made whether the symbol count (see act 2310 above) matches the frame length [act 2415]. For example, if the frame length includes 1024 symbols, the end of the frame will occur when the symbol count equals 1024. If the symbol count does not match the frame length, the exemplary process may return to act 2305 for receipt of the next bright annunciator pulse. If the symbol count matches the frame length, then the results stored in count table 1300 may be used to perform a path length control process as described with respect to
The exemplary path length control process may begin with the normalization of counts in count table 1300, to the total number of events, to obtain an updated joint probability table 1400 [act 2505](
Ignoring the case when two photons are emitted from QKD source 705, the probabilities of events B1 and B2 can be modeled from the parameters of the system as follows:
where parameters α(j), β(j) and V are offset, scale and visibility parameters of the system that do not depend on Φ0 or ΔΦ. The conditional probability P(Bj|Φ=Φ0+ΔΦ) on the left side of equations (1) and (2) can be determined as the ratio of the joint probabilities:
P(Bj|Am)=P(Bj∩Am)/P(Am) Eqn. (3)
wherein Am is one of the disjoint events A0 . . . A7, each corresponding to the specific total phase shift of both interferometers, Φ0+ΔΦ. Eqns. (1) and (2), thus, produce sixteen non-linear equations, eight for the detection event B1 (i.e., the intersection of event B1 with events A0 through A7 in joint probability table 1400) and eight for the detection event B2 (i.e., the intersection of event B2 with events A0 through A7 in joint probability table 1400), with five unknown parameters α(o)+β(o)/2, α(1)+β(1)/2, β(o)V/2, β(1)V/2 and ΔΦ, and one input variable Φ0.
An estimate of ΔΦ may be obtained using conventional least squares estimation algorithms and Eqns. (1), (2) and (3). Convention least squares estimation may include an interative method that starts with an initial guess of the unknown parameters α(o)+β(o)/2, α(1)+β(1)/2, β(o)V/2, β(1)V/2 and ΔΦ of Eqns (1), (2) and (3). Each iteration may then adjust the current guess until the algorithm converges, minimizing the sum of the squared differences between the observed responses (i.e., normalized probabilities from joint probability table 1400) and their fitted values. In one implementation, a Gauss-Newton method with Levenberg-Marquardt modifications for global convergence may be used for performing least squares estimation. One skilled in the art will recognize, however, that other techniques may be used for estimating ΔΦ, including (but not limited to), using Kalman filters or robust least squares estimates such as least absolute residuals or Bisquare weights.
In order to determine the initial estimate of the unknown parameters α(o)+β(o)/2, α(1)+β(1)/2, β(o)V/2, β(1)V/2 and ΔΦ, Eqns. (1) and (2) can be generalized to the following:
where
x(j)=Vβ(j)cos(ΔΦ)/2, Eqn. (7)
y(j)=Vβ(j)sin(ΔΦ)/2, Eqn. (8)
k(j)=α(j)+β(j)/2, Eqn. (9)
and j=0, 1 is the index of the detection events equal to 0 for B1 and 1 for B2 events. A least squares fit of Eqn. (6) may be performed, using conventional estimation techniques, to determine parameters k(j), x(j) and y(j) for j=0 and j=1 [act 2510]. The initial estimates of the unknown parameters α(o)+β(o)/2, α(1)+β(1)/2, β(o)V/2, β(1)V/2 and ΔΦ may then be obtained, using the determined parameters k(j), x(j) and y(j), from the following:
ΔΦ=α tan 2(y(j),x(j)) Eqn. (10)
(β(j)V/2)2=(x(j))2+(y(j))2 Eqn. (11)
α(j)+β(j)/2=k(j) Eqn. (12)
for j=0 and j=1. Since ΔΦ is a common parameter for both detectors, two initial guesses are available. The fit with a smaller residual is more accurate and, thus, would be a better candidate for the initial estimate. The initial estimates only have to be completed once. For consecutive estimation, the previous estimate of the parameters may be used.
An estimation may be performed, using the initial estimates of α(o)+β(o)/2, α(1)+β(1)/2, β(o)V/2, β(1)V/2 and ΔΦ obtained in act 2515 above, to converge upon a final estimate of ΔΦ [act 2520]. The estimation may include, for example, an iterative least squares estimation algorithm that starts with the initial estimates of the unknown parameters α(o)+β(o)/2, α(1)+β(1)/2, β(o)V/2, β(1)V/2 and ΔΦ and then adjusts a current guess of the unknown parameters until the algorithm converges, minimizing the sum of the squared differences between the observed responses (i.e., normalized probabilities from joint probability table 1400) and their fitted values. In one implementation, a Gauss-Newton method with Levenberg-Marquardt modifications for global convergence may be used for performing the least squares estimation. After converging upon an estimate of ΔΦ, the estimate may be used to adjust the path length of the QKD system [act 2605]. The phase error ΔΦ may then be compensated dynamically, by employing path length control feedback system 1600 to adjust phase shifting element 840 to expand or contract the effective path length such that ΔΦ=0. In one implementation in which phase shifting element 840 includes, for example, a fiber stretcher, the phase error ΔΦ may be compensated by employing path length control feedback system 1600 to adjust the voltage of the fiber stretcher, thus, expanding or contracting the fiber length. In another implementation in which phase shifting element 1630 includes, for example, a phase modulator, the phase error ΔΦ may be compensated by employing path length control feedback system 1600 to adjust the voltage of the phase modulator to expand or contract the fiber length. After the path length is adjusted, count table 1300 may be reset to zero [act 2610], and the process of count accumulation may continue.
Systems and methods consistent with the present invention implement path length control in a quantum cryptographic system to mitigate the effects of thermal and acoustic fluctuations that may adversely affect the transmission of QKD symbols across a QKD link. The path length control process, consistent with the present invention, employs a feedback system, that uses training symbols as an input for continuously and automatically controlling the path length through a QKD link. Through use of the feedback system for controlling the path length, QBER may be reduced and proper operation of the link may be ensured.
The foregoing description of exemplary embodiments of the present invention provides illustration and description, but is not intended to be exhaustive or to limit the invention to the precise form disclosed. Modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention. For example, while certain components of the invention have been described as implemented in software and others in hardware, other configurations may be possible. Furthermore, while wavelength division multiplexing of the bright and dim pulses has been described above, time division multiplexing may be used, alternatively, or in conjunction with wavelength division multiplexing, for transmitting the bright and dim pulses over the quantum cryptographic link (e.g., bright pulses alternating with dim pulses in a time division manner). Additionally, while exemplary embodiments of the present invention have been described as using optical QKD pulses (i.e., photon pulses) for encoding and transmitting cryptographic keys, it will be appreciated that other non-optical pulses that include, for example, individual atoms, electrons, etc., may alternatively be used. In embodiments employing non-optical pulses, the individual quantum particles (e.g., atoms, electrons) may be modulated to encode cryptographic key symbols.
While series of acts has been described with regard to
The instant application claims priority from provisional application No. 60/456,852, filed Mar. 21, 2003, the disclosure of which is incorporated by reference herein in its entirety. The present application is a continuation-in-part of U.S. application Ser. No. 10/271,103, entitled “Systems and Methods for Framing Quantum Cryptographic Links” and filed Oct. 15, 2002, the disclosure of which is incorporated by reference herein in its entirety.
The U.S. Government has a paid-up license in this invention and the right in limited circumstances to require the patent owner to license others on reasonable terms as provided for by the terms of Contract No. F30602-01-C-0170, awarded by the Defense Advanced Research Project Agency (DARPA).
Number | Name | Date | Kind |
---|---|---|---|
4445116 | Grow | Apr 1984 | A |
4649233 | Bass et al. | Mar 1987 | A |
4770535 | Kim et al. | Sep 1988 | A |
5058973 | Refregier et al. | Oct 1991 | A |
5157461 | Page | Oct 1992 | A |
5243649 | Franson | Sep 1993 | A |
5307410 | Bennett | Apr 1994 | A |
5311572 | Friedes et al. | May 1994 | A |
5325397 | Scholz et al. | Jun 1994 | A |
5339182 | Kimble et al. | Aug 1994 | A |
5400325 | Chatwani et al. | Mar 1995 | A |
5414771 | Fawcett, Jr. | May 1995 | A |
5469432 | Gat | Nov 1995 | A |
5502766 | Boebert et al. | Mar 1996 | A |
5515438 | Bennett et al. | May 1996 | A |
5535195 | Lee | Jul 1996 | A |
5602916 | Grube et al. | Feb 1997 | A |
5675648 | Townsend | Oct 1997 | A |
5710773 | Shiga | Jan 1998 | A |
5720608 | Aoki et al. | Feb 1998 | A |
5729608 | Janson et al. | Mar 1998 | A |
5732139 | Lo et al. | Mar 1998 | A |
5757912 | Blow | May 1998 | A |
5764765 | Phoenix et al. | Jun 1998 | A |
5764767 | Beimel et al. | Jun 1998 | A |
5768378 | Townsend et al. | Jun 1998 | A |
5768391 | Ichikawa | Jun 1998 | A |
5805801 | Holloway et al. | Sep 1998 | A |
5850441 | Townsend et al. | Dec 1998 | A |
5911018 | Bischel et al. | Jun 1999 | A |
5953421 | Townsend | Sep 1999 | A |
5960131 | Fouquet et al. | Sep 1999 | A |
5960133 | Tomlinson | Sep 1999 | A |
5966224 | Hughes et al. | Oct 1999 | A |
6005993 | MacDonald | Dec 1999 | A |
6028935 | Rarity et al. | Feb 2000 | A |
6052465 | Gotoh et al. | Apr 2000 | A |
6097696 | Doverspike | Aug 2000 | A |
6122252 | Aimoto et al. | Sep 2000 | A |
6130780 | Joannopoulos et al. | Oct 2000 | A |
6145024 | Maezawa et al. | Nov 2000 | A |
6151586 | Brown | Nov 2000 | A |
6154586 | MacDonald et al. | Nov 2000 | A |
6160627 | Ahn et al. | Dec 2000 | A |
6160651 | Chang et al. | Dec 2000 | A |
6188768 | Bethune et al. | Feb 2001 | B1 |
6208935 | Yamada et al. | Mar 2001 | B1 |
6233075 | Chang et al. | May 2001 | B1 |
6233393 | Yanagihara et al. | May 2001 | B1 |
6272548 | Cotter et al. | Aug 2001 | B1 |
6289104 | Patterson et al. | Sep 2001 | B1 |
6341127 | Katsube et al. | Jan 2002 | B1 |
6378072 | Collins et al. | Apr 2002 | B1 |
6430345 | Dultz et al. | Aug 2002 | B1 |
6438234 | Gisin et al. | Aug 2002 | B1 |
6463060 | Sato et al. | Oct 2002 | B1 |
6507012 | Medard et al. | Jan 2003 | B1 |
6519062 | Yoo | Feb 2003 | B1 |
6522749 | Wang | Feb 2003 | B2 |
6529498 | Cheng | Mar 2003 | B1 |
6532543 | Smith et al. | Mar 2003 | B1 |
6538990 | Prorock | Mar 2003 | B1 |
6539410 | Klass | Mar 2003 | B1 |
6556544 | Lee | Apr 2003 | B1 |
6560707 | Curtis | May 2003 | B2 |
6563796 | Saito | May 2003 | B1 |
6594055 | Snawerdt | Jul 2003 | B2 |
6605822 | Blais et al. | Aug 2003 | B1 |
6646727 | Saleh et al. | Nov 2003 | B2 |
6647010 | Ford et al. | Nov 2003 | B1 |
6650805 | Chen et al. | Nov 2003 | B2 |
6654346 | Mahalingaiah et al. | Nov 2003 | B1 |
6661806 | Eriksson et al. | Dec 2003 | B1 |
6678379 | Mayers et al. | Jan 2004 | B1 |
6684335 | Epstein et al. | Jan 2004 | B1 |
6720589 | Shields | Apr 2004 | B1 |
6721269 | Cao et al. | Apr 2004 | B2 |
6728281 | Santori et al. | Apr 2004 | B1 |
6748434 | Kavanagh | Jun 2004 | B2 |
6754214 | Mahalingaiah | Jun 2004 | B1 |
6778557 | Yuki et al. | Aug 2004 | B1 |
6799270 | Bull et al. | Sep 2004 | B1 |
6801626 | Nambu | Oct 2004 | B1 |
6836463 | Garcia-Luna-Aceves | Dec 2004 | B2 |
6862564 | Shue et al. | Mar 2005 | B1 |
6873797 | Chang et al. | Mar 2005 | B2 |
6882431 | Teich et al. | Apr 2005 | B2 |
6895091 | Elliot et al. | May 2005 | B1 |
6895092 | Tomita | May 2005 | B2 |
6897434 | Kumar et al. | May 2005 | B1 |
6934472 | Chang et al. | Aug 2005 | B2 |
6986056 | Dultz et al. | Jan 2006 | B1 |
7028059 | Williams | Apr 2006 | B2 |
7035411 | Azuma et al. | Apr 2006 | B2 |
7068790 | Elliott | Jun 2006 | B1 |
7512242 | Pearson et al. | Mar 2009 | B2 |
20010038695 | Kim | Nov 2001 | A1 |
20020015573 | Ishibashi | Feb 2002 | A1 |
20020021467 | Ofek et al. | Feb 2002 | A1 |
20020025041 | Tomita | Feb 2002 | A1 |
20020097874 | Foden et al. | Jul 2002 | A1 |
20020110245 | Gruia | Aug 2002 | A1 |
20020141019 | Chang et al. | Oct 2002 | A1 |
20030002074 | Miyano | Jan 2003 | A1 |
20030002670 | Wang | Jan 2003 | A1 |
20030002674 | Nambu et al. | Jan 2003 | A1 |
20030059157 | DeCusatis et al. | Mar 2003 | A1 |
20030137944 | Medvinsky | Jul 2003 | A1 |
20030180042 | Nelles et al. | Sep 2003 | A1 |
20030215088 | Bao | Nov 2003 | A1 |
20030231771 | Gisin et al. | Dec 2003 | A1 |
20040005056 | Nishioka et al. | Jan 2004 | A1 |
20040008843 | Van Enk | Jan 2004 | A1 |
20040019676 | Iwatsuki et al. | Jan 2004 | A1 |
20040032954 | Bonfrate et al. | Feb 2004 | A1 |
20040109564 | Cerf et al. | Jun 2004 | A1 |
20040136321 | Ren et al. | Jul 2004 | A1 |
20040165884 | Al-Chalabi | Aug 2004 | A1 |
20040190725 | Yuan et al. | Sep 2004 | A1 |
20050036624 | Kent et al. | Feb 2005 | A1 |
20050094818 | Inoue et al. | May 2005 | A1 |
20060059343 | Berzanskis et al. | Mar 2006 | A1 |
20060252381 | Sasaoka et al. | Nov 2006 | A1 |
Number | Date | Country |
---|---|---|
WO 9607951 | Mar 1996 | WO |
WO 0205480 | Jan 2002 | WO |
Number | Date | Country | |
---|---|---|---|
60456852 | Mar 2003 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10271103 | Oct 2002 | US |
Child | 10716078 | US |