This disclosure relates to the field of security systems. More particularly, this disclosure relates to detection of tampering with security systems.
Many government, industrial, and commercial entities have a need to protect various aspects of their endeavors from hostile physical intrusion. Such intrusions may range from terrorist attacks to burglary attempts to mischievous mayhem to industrial or military espionage. To prevent such actions it is often desirable to secure the property boundaries at sensitive sites such as nuclear and chemical facilities, military bases, and other sensitive installations. Sometimes such protection focuses on a boundary of a particular facility such as a warehouse, a vault, a storage crib, or a similar protected zone. In some instances a security system may be employed to monitor a physical boundary associated with such a system. For example, a fence around a protected property may include an electronic continuity circuit that is designed to detect a break in the fence that could indicate an intrusion into the property. In some instances a security system may be employed to monitor the physical integrity of a secured space. Examples of such security systems are window and door alarms, motion detectors, and optical beam interruption detectors. Also, distribution systems such as gas and oil pipelines, electrical distribution systems, and voice and data communication lines often warrant special security measures. In the case of pipelines, fluid pressure monitors may be used to detection intrusion of the boundary (i.e., the path) of a pipeline. In the case of electrical power distribution systems and communication systems, the detection of service interruption may be used to detect tampering with the “boundary” (i.e., the distribution/communication lines) associated with such systems. However in the case of communication lines it is often necessary to also protect against eavesdropping, and various detection systems have been developed for that purpose. However adversary nations, terrorists, rogue organizations, and thieves are becoming increasingly technically sophisticated in their abilities to attack and thwart such security measures. What are needed therefore are improved security systems for protecting various boundaries and communication lines from compromise by such attacks.
In one embodiment the present disclosure provides a system for monitoring the integrity of a boundary. The system includes a source apparatus for generating a first and a second quantum system, where the first and the second quantum systems are quantum mechanically entangled in at least one monitored physical property. There is a transmission medium disposed along the boundary. A first receiver and a second receiver are provided. There is a transmission apparatus that is provided for directing the first quantum system through the transmission medium to the first receiver and for directing the second quantum system to the second receiver. There is an evaluation apparatus that is provided for assessing a first verifying quantum system received by the first receiver and for assessing a second verifying quantum system received by the second receiver. The evaluation apparatus also estimates whether the first verifying quantum system and the second verifying quantum system are quantum mechanically entangled in the at least one monitored physical property. Further provided is an alarm apparatus for indicating a possible compromise of the boundary if the first verifying quantum system and the second verifying quantum system are not likely quantum mechanically entangled in the at least one monitored physical property.
A further embodiment provides a system for monitoring the integrity of a communication link. The system includes a source apparatus for generating a first and a second quantum system, where the first and the second quantum systems are quantum mechanically entangled in at least one monitored physical property, and where each monitored physical property has a value pair corresponding to the first and the second quantum system. There is a first receiver and a second receiver that are operatively connected by the communication link. A transmission apparatus is provided for directing the first quantum system through the communication link to the first receiver and for directing the second quantum system to the second receiver. There is a first evaluation apparatus for estimating a first value of each monitored physical property of a first verifying quantum system received by the first receiver, and there is a second evaluation apparatus for estimating a second value of each monitored physical property of a second verifying quantum system received by the second receiver. An alarm system is provided for indicating a possible compromise of the communication link if the estimated first value of each monitored physical property of the first verifying quantum system and the estimated second value of each monitored physical property of the second verifying quantum system are not likely equal to the value of each monitored physical property.
Another embodiment provides a system for monitoring the integrity of a transmission of a quantum system. This embodiment includes an apparatus for generating the quantum system with an as-transmitted value of a monitored physical property. A transmission medium is provided as is a receiver and a transmission apparatus for directing the quantum system through the transmission medium to the receiver. There is an evaluation system for estimating an as-received value of the monitored physical property of a verifying quantum system received by the receiver, and an alarm system for comparing the as-transmitted value of the monitored physical property of the transmitted quantum system with the as-received value of the monitored physical property of the verifying quantum system. The alarm system indicates a possible compromise of the transmission of the quantum system if the estimated as-received value of the monitored physical property of the verifying quantum system does not likely correspond to the as-transmitted value of the monitored physical property of the transmitted quantum system.
A method is provided for monitoring the integrity of a boundary. The method includes a step of generating a first and a second quantum system, where the first and the second quantum systems are quantum mechanically entangled in at least one monitored physical property. A further step includes transmitting the first quantum system through a transmission medium along the boundary to a first receiver and transmitting the second quantum system to a second receiver. Another step is estimating whether the first verifying quantum system received by the first receiver and the second verifying quantum system received by the second receiver are quantum mechanically entangled in the at least one monitored physical property. The method also provides for generating an indication of possible compromise of the boundary if the first verifying quantum system and the second verifying quantum system are not likely quantum mechanically entangled in the at least one monitored physical property.
A further method embodiment is a method for monitoring the integrity of a communication link. This embodiment includes a step of generating a first and a second quantum system, where the first and the second quantum systems are quantum mechanically entangled in at least one monitored physical property, with each monitored physical property having a value pair corresponding to the first and the second quantum system. A further step is transmitting the first quantum system through the communication link to a first receiver and transmitting the second quantum system to a second receiver. Two additional steps are estimating a first value of each monitored physical property of a first verifying quantum system received by the first receiver, and estimating a second value of each monitored physical property of a second verifying quantum system received by the second receiver. The method further provides for comparing the estimated first value of each monitored physical property of the first verifying quantum system with the estimated second value of each monitored physical property of the second verifying quantum system. A further step is generating an indication of a possible compromise of the communication link if the estimated first value of each monitored physical property of the first verifying quantum system and the estimated second value of each monitored physical property of the second verifying quantum system are not likely equal to the value pair of each monitored physical property.
A further method embodiment is provided for monitoring the integrity of a transmission of a quantum system. This embodiment includes the steps of generating the quantum system with an as-transmitted value of a monitored physical property, transmitting the quantum system through a transmission medium to a receiver, and estimating an as-received value of the monitored physical property of a verifying quantum system received by the receiver. A further step is comparing the as-transmitted value of the monitored physical property of the transmitted quantum system with the estimated as-received value of the monitored physical property of the verifying quantum system. Also provided in this embodiment is a step of indicating a possible compromise of the transmission of the quantum system if the estimated as-received value of the monitored physical property of the verifying quantum system does not likely correspond to the as-transmitted value of the monitored physical property of the transmitted quantum system.
Further provided is a method for verifying the integrity of a physical perimeter. This embodiment includes the steps of generating an entangled pair of first and second quantum systems, directing the first quantum system about the physical perimeter, and comparing the first quantum system with the second quantum system for verification of the authenticity of the first quantum system.
Various advantages are apparent by reference to the detailed description in conjunction with the figures, wherein elements are not to scale so as to more clearly show the details, wherein like reference numbers indicate like elements throughout the several views, and wherein:
In the following detailed description of the preferred embodiments, reference is made to the accompanying drawings, which form a part hereof, and within which are shown by way of illustration the practice of specific embodiments of systems and methods for monitoring the integrity of boundaries, communications links and transmission of quantum systems. It is to be understood that other embodiments may be utilized, and that structural changes may be made and processes may vary in other embodiments.
There are many government, industrial, commercial, institutional, and personal situations where it is desirable to maintain the integrity of a boundary. The term “boundary” as used herein refers to a spatial demarcation that separates a region in which some level of protection is intended from a region in which a lesser level or no level of protection is intended. Examples of a boundary are a fence line of a military base, a tool crib, a school yard, and a door of a home. The interruption of a beam of light is commonly used to detect the passage of a person or object across a boundary, and thereby indicate a potential compromise of the integrity of a boundary. For example, a visible or invisible “laser tripwire” functions by transmitting light along a boundary to a remote receiver. When the beam of light is blocked, its absence at the receiver signals an alarm. This sensing strategy is vulnerable, however, to an intercept-resend attack, i.e., an attack in which an intruder intercepts the incoming beam of light, accurately records its properties (to arbitrary precision), and resends a perfect duplicate to the receiver. A similar vulnerability arises with classical electronic surveillance systems such as closed-circuit TV, burglar alarms, and tamper-indicators. This vulnerability arises in the context of a classical physical system because an intruder has an opportunity to reliably intercept and measure classical information describing the transmitted signal and to reproduce the signal and send the reproduced signal to the receiver, leaving a physical gap in the protection of the boundary.
The ability to copy, or clone, information is a vulnerability that is inherent with classical physical boundary systems. This vulnerability, however, does not exist within the context of quantum mechanics systems. Quantum mechanics is a set of principles underlying the most fundamental known properties of all physical systems. Notable among these principles are both a dual wave-like and particle-like behavior of matter and radiation. More specifically and pertinent to this disclosure, a generally-accepted “no-cloning” theorem states that an arbitrary quantum of information, e.g., an unknown qubit, cannot be reliably cloned due to fundamental restrictions imposed on measurement by the linearity of quantum mechanics. This characteristic provides an entanglement-based alternative to the transmission of classical information across a physical boundary, and depending on the embodiment implemented, substantially all or at least a large portion of the vulnerability to an intercept-resend attack is negated.
The system 10 of
In the embodiment of
In the embodiment of
Typically the transmission medium 34 is physically integrated with the boundary 14. For example, if the boundary 14 includes a fence, the transmission medium 34 (which in the example of
Returning to the details of
Under normal operations where there has been no compromise of the transmission medium 34, the first receiver 50 receives a first verifying quantum system 62, which is the first quantum system 26. However if the transmission medium 34 has been compromised by, for example, a breach of the boundary 14 and the transmission medium 34 at zone 66, the most likely outcome is that the first quantum system 26 is destroyed and no first verifying quantum system 62 arrives at the first receiver 50. This condition is identified as a possible compromise of the boundary 14 in the same fashion as a conventional laser tripwire system identifies such a breach. However, if the transmission medium 34 has been compromised by a sophisticated intercept/resend device, such as device 70 depicted in
Under normal circumstances at about the same time that the first receiver 50 receives the first verifying quantum system 62, the second receiver 58 receives a second verifying quantum system 74, which is the second quantum system 30. However, if the reliable path 54 is compromised, either no second verifying quantum system 74 is received by the second receiver 58 or, if the reliable path 54 has been compromised by a sophisticated intercept/resend device, a second verifying quantum system 74 may arrive at the second receiver 58. The system 10 is capable of detecting a compromise of either the transmission medium 34 or a compromise of the reliable path 54, but the system 10 is not capable of detecting a coordinated compromise of both the transmission medium 34 and the reliable path 54 that would include essentially a substitute system. Although such an attack is quite unlikely, the system 10 is typically configured so that the reliable path 54 is in a secured environment that is not vulnerable to compromise, and therefore there is negligible chance that the second verifying quantum system 74 is not the second quantum system 30.
The system 10 also includes an evaluation apparatus 78. The evaluation apparatus 78 assesses the first verifying quantum system 62 received by the first receiver 50 and assesses the second verifying quantum system 74 received by the second receiver 58. The evaluation apparatus 78 is typically a single apparatus in a single location (and preferably a secure location) that assesses the quantum properties of both the first verifying quantum system 62 and the second verifying quantum system 74. As previously indicated, in the embodiment of
The system 10 of
where ωj and kj⊥denote the longitudinal frequency and the transverse momentum of the jth photon, respectively.
The polarization-entangled state of a photon-pair generated by SPDC can be approximated by the Bell state
where the joint-polarization state |hP, vG=|hP×|vG is the direct product of single-photon horizontal and vertical polarization states |h and |v, respectively, and the subscripts denote patrol (P) or guard (G) photons. This Bell state represents one of four maximally polarization-entangled biphoton states. The validity of this Bell state approximation is determined by the pulse power and the magnitude of the second-order susceptibility. Moreover, the polarization entanglement of this state can be expressed in terms of the experimentally measureable polarization-correlation visibility. (There is a one-to-one correspondence between the visibility and the von Neumann entropy of the state.) The visibility V quantifies the fringe contrast of the polarization-correlation spectrum obtained in either the h-v measurement basis or the conjugate diagonal-anti-diagonal (also referred to herein as ±, 45/−45 and 45°/−45°) measurement basis. Here the diagonal (+) and anti-diagonal (−) basis states are defined as |±=(|h±|v)/√2.
As an example of a coincidence detection unit, the evaluation apparatus 136 may include a coincidence logic unit having two input channels and one output channel. When two logic pulses are received as inputs within a specified time interval, the logic unit generates a logic pulse in the output. It is typical to monitor this collection process with a (digital) computer running commercially available data acquisition software.
A sophisticated intruder might somehow determine that the system 100 was monitoring h/v polarized photons, and after compromising the transmission medium, employ an intercept-resend device in an attempt to inject h and/or v polarized photons into the patrol photon path. To counteract that threat it is helpful to frequently rotate the λ/2 wave plate 216 90° simultaneously in both the receivers 128 and 132 so that they are detecting a pseudo-random variation of h/v and diagonal/anti-diagonal polarized photons. In other words, the system may monitor coincidence rates for eight settings of the guard (G) and patrol (P) receivers: (G0, P0), (G0, P90), (G90, P0), (G90, P90), (G45, P45), (G45, P-45), (G-45, P45), and (G-45, P-45). Such a monitoring pattern would be difficult for an intruder to copy.
Also, polarization-entangled photon-pairs have the property of correlated circular polarizations. Polarization may be transformed from circular to linear with a quarter-wave (λ/4) plate. Thus, if a receiver is oriented to distinguish 0° and 90° linear polarization, then the addition of a half-wave plate converts the receiver so that it distinguishes 45° and −45° linear polarization (as previously discussed), and the addition of a quarter-wave plate converts the receiver so that it distinguishes right and left circular polarization. It is not necessary to install and remove the wave plates; they can all be left in the path. One set of wave plate orientations will transform 45/−45 to h/v; another set of orientations will transform right/left to h/v; and another set of orientations will leave the polarization property unchanged. In fact, there are an infinite number of polarization properties (45/−45, h/v, and right/left being three) and for each polarization property, there exists a combination of quarter wave plate and half wave plate orientations that will transform that state to linear.
It should be noted that several variations of receiver and SPD detectors may be employed. For example, a simpler (less expensive) system may be built using only one SPD in each receiver. That is, one receiver would have a 208A-type SPD and the other receiver would have a 208B-type SPD. The receiver with the 208A-type SPD would not require a polarizing beam splitter (PBS) 212. Another variation is to split the incoming receiver path at each receiver point in two directions—with one path going to an h/v polarization detection system and the other path going to a diagonal/anti-diagonal detection system. This configuration would not require any mechanical rotation of a λ/2 wave plate.
Returning to
R
C(θP,θG)=sin2(θP+θG) (Eq'n 4)
where θP and θG are the corresponding analyzer angles. Measurements made in the conjugate ± basis are obtained by rotating the incoming photons using a λ/2 wave plate. Moreover, those measurements yield a result similar to Eq. (4) apart from a π/2 phase shift. Hence, for the polarization-entangled state of Eq. (3), the empirical definition of the visibility as the contrast
has a maximum of unity in either basis. In contrast, an unentangled state is predicted to have a visibility of zero in at least one basis, independent of whether the received state is a pure state, e.g., |hP, vG or |vP, hG, or the classical mixture
Thus, measuring the visibility provides an experimental means to quantify polarization entanglement and, therefore, differentiate between an ensemble of polarization-entangled states and the unentangled states prepared by a would-be intruder. (The term “intruder” refers to any malevolent entity attempting to defeat the integrity of a border.) An unentangled pure state implies the intruder chose the ‘correct’ measurement basis, while a mixed state implies the conjugate basis was used. For the unentangled states above, the visibility vanishes when measured in the ± basis.
It is generally possible to quantify an appropriate sensitivity and specificity for a sensor to detect entanglements using the visibility characteristic of Equation 5 by incorporating additive Gaussian noise into the model system and using a binary decision evaluation that uses the measured visibility to discriminate between entangled and unentangled quantum states.
The binary decision evaluation is a formulation of (classical) detection theory for discriminating between two hypotheses based on an observed signal:
H
0
:s
i
=V
0
+n (Eq'n 7A)
and
H
1
:s
i
=V
1
+n (Eq'n 7B)
In Equations 7A and 7B, si represents the ith instance of the observed visibility and it is used to discriminate between the two hypotheses and V0=0 and V1=1 are the visibilities predicted for unentangled and entangled photon pairs, respectively, and n is a zero-mean Gaussian random noise variable of variance σ2. Considering M measurements, the corresponding log-likelihood ratio test is:
Where {tilde over (s)}i=si/σM1/2 is the normalized sample data, λ defines the threshold for detection, and
d=M
1/2(V1−V0)/σ (Eq'n 9)
is the normalized displacement of the visibilities.
Discriminating between two known values in additive Gaussian noise leads to well-known results for the corresponding probability of detection Qd and false alarm probability Q0:
Q
d
=erfc(x1) (Eq'n 10A)
Q
0
=erfc(x0) (Eq'n 10B)
Here the complimentary error function is defined as
and the limits for Q0 and Qd,
x
0=(ln λ)/d+d/2 (Eq'n 12A)
x
1=(ln λ)/d−d/2 (Eq'n 12B)
are expressed in terms of the threshold λ and the dimensionless displacement d. These results can be conveniently represented by a receiver operating characteristic (ROC) curve, which demonstrates the trade-off in detection sensitivity and detection specificity using a parametric plot of (Q0, Qd) with respect to the detection threshold λ.
Measurements of the visibility are useful for quantitatively discriminating between entangled and unentangled photon pair states. This detection scheme need not know a priori the types of quantum states prepared by the intruder, i.e., the detector works just as well for pure states as mixed states based on single-mode, polarization-entangled photon pairs. If an intruder attempts to measure and clone the polarization state of the patrol photon, the destruction of entanglement leads to a noticeable change in the measurement statistics recorded by the receivers.
A more difficult situation involves a case where the intruder has accurate knowledge about the transmission of the patrol photon, e.g., path, bandwidth, center frequency, timing information, etc. and the intruder, aware that the transmitted patrol photon is entangled with the secured guard photon, uses quantum teleportation to transfer the entangled state of patrol photon to a doppelganger photon.
For the case of polarization-entangled photon pairs, the intruder may employ a pair of entangled doppelganger photons, as shown in
It is possible for the intruder to locally correct the action of Bell-state measurement; however, doing so would require the intruder to delay the transmission of the second doppelganger photon until after the measurement of the patrol photon had occurred. When the patrolled perimeter is the shortest distance between two points (a straight line), then this delay in transmission is, in principle, always detectable by the receiver. On the other hand, if the patrol photon takes a less direct route, e.g., by patrolling a perimeter that turns or curves, then it is possible for the intruder to “cut corners” and “make up” time loss in implementing these corrective actions.
An adaptation of spectrally multimode, polarization-entangled photon pairs may be used to reject such measures. Briefly, the visibility of the received states before and after quantum teleportation may be examined while using an assumption that the intruder has applied the appropriate local unitary operation to complete the teleportation protocol and taking into account how polarization-correlation visibility behaves following teleportation with respect to the characteristics of the spectral modes and spectral entanglement.
The spectrally multimode analog of the polarization-entangled state presented in Equation 3 is
where f(ω,ω′) and g(ω,ω′) are normalized joint spectral amplitudes and |hP(ω)=|hP|ωP is a horizontally polarized patrol photon in the spectral eigenstate having frequency ω, etc. These states are typical of the polarization-entangled biphoton states prepared by SPDC when a pulsed pump pulse initiates the down-conversion process
The specific forms of the joint spectral amplitudes in Equation 13 are strongly dependent on the type of SPDC, as well as the material properties of the nonlinear optical medium being used. Furthermore, the joint spectral amplitudes need not be identical or even individually separable with respect to frequency. The joint spectral amplitude is, however, generally decomposable as
where λn is the nth Schmidt coefficient and the Schmidt modes un and vn form a complete biorthonormal set for the joint spectral Hilbert space. (Normalization of f(ω,ω) implies Σnλn=1.) The joint amplitude g(ω, ω′) is likewise represented by a Schmidt decomposition. For the case that Equation 14 has more than one term in the summation, then the joint spectral amplitude is said to be spectrally entangled, and this spectral entanglement can be quantified in terms of the Schmidt number K defined by
The Schmidt number has a minimum of K=1 (an unentangled joint spectrum) and grows monotonically as the number of modes increases.
Analogous to the quantification of single spectral mode polarization entanglement, the polarization entanglement of a spectrally multimode state may be quantified in terms of the polarization-correlation visibility. An analysis of the polarization-correlation experiment shows that the theoretical maximum for the visibility is given by
V=Re∫dω∫dω′f(ω,ω′)g(ω,ω′)* (Eq'n 16)
which is unity only when the joint spectral amplitudes are identical. Moreover, the maximal visibility is independent of the spectral entanglement.
Continuing with the analysis of quantum teleportation of a spectrally multimode, polarization-entangled biphoton state, assume that two pairs of photons are each prepared in a state of the general form of Equation 13, with the first state representing the patrol-guard (PG) pair and the second state representing the doppelganger (DD) pair. The patrol photon and one of the doppelganger photons are then subjected to a polarization-based Bell-state measurement, which is accomplished by interfering the two photons at a 50:50 beam splitter and analyzing each output mode, e.g., in the h-v basis. Conditioned upon the coincident detection of two photons, the resulting reduced, polarization density matrix of the guard and second doppelganger photons is
where the off-diagonal coherence term
G=∫dω∫dω′∫dω″∫dω′″f
GP(ω,ω′″)gDD(ω′″,ω′)*gGP(ω,ω″)*fDD(ω″,ω′) (Eq'n 18)
represents the overlap of the spectral amplitudes. The real component of G yields the visibility expected for the guard-doppelganger (GD) photon pair, i.e.,
VGD=Re G (Eq'n 19)
As noted in Equation 16, the initial patrol-guard state yields maximal visibility when the joint spectral amplitudes are identical. Assuming this relationship for both the PG and DD pairs, the Schmidt decomposition of Equation 14 is inserted into Equation 16 to find the resulting coherence. Simplifying the analysis to the case that the photons produce identical marginal spectra, gives the best possible visibility of the GD pair. Specifically, the visibility following teleportation is inversely proportional to the spectral entanglement carried by the joint spectral amplitude, i.e.,
V
GD
max
=K
−1 (Eq'n 20)
In the absence of spectral entanglement, λn=δn0, K=1, and the visibility of the swapped GD pair matches the unit visibility of the original pair (cf. Equation 16). However, in the limit of strong spectral entanglement, e.g., when λn≈1/N and K−1≈N (with N an effective number of spectral modes), the visibility of the GD pair can be much less than the original, expected visibility. Consequently, when the initial spectral entanglement between the patrol-guard photons is high, an intruder's attempts to use quantum teleportation can be detected based on the decrease in the observed visibility.
This last approach to verifying the authenticity of the polarization-entangled photon pair does not require any knowledge about discrepancies in the time of arrival of the patrol or doppelganger photons. Hence, even when the intruder has sufficient time to implement teleportation, the visibility it generates will be poor and, therefore, the intruder's presence will be detectable.
The terms “spectrally entangled” and “frequency entangled” are used interchangeably herein. A source apparatus for generating a pair of frequency entangled photons may be constructed as follows. A nonlinear optical crystal, e.g., BBO, is illuminated by a pump laser of a given spectral profile, e.g., a monochromatic or a broadband spectral profile. The pump laser enters the crystal at a direction that satisfies the second-order phase matching requirements for spontaneous parametric down conversion (the exact angle depending on the desired crystal and degree of frequency entanglement), whereupon passing through the crystal, photons comprising the pump laser undergo down conversion into a pair of lower frequency photons that serve as the outputted frequency entangled photons. Note that the conservation of energy restricts the frequencies of the outputted photon pair to sum to the energy of the incident pump laser photon.
A receiver for assessing spectral (frequency) entanglement of a photon may be constructed as follows. The frequency of each photon in the frequency entangled photon pair is measured individually. The individual measurements of frequency can be accomplished, e.g., using a diffraction grating to disperse each possible frequency toward a spatially separate photon detector. The photon detectors may be an array of single-photon detector or the pixels in a charged coupled device (CCD) planar array. By monitoring which frequencies are detected in coincidence events (when a photon is observed in each arm of the measurement apparatus), then the correlation between frequencies may be established. The degree of frequency entanglement may then be assessed from these measurements, e.g., by comparing the maximal and minimal widths of the associated two-dimensional frequency distribution.
The use of a pair of quantum systems that have a simultaneously entangled polarization characteristic and an entangled frequency characteristic of a first and second quantum system is particularly useful in thwarting a teleportation attack on a system for detecting compromise of a quantum mechanical transmission medium. A source for polarization and frequency entangled photons is a broadband analog of the source for polarization entangled photons. Whereas a “polarization entangled source” has heretofore referred to the polarization entangled photon pair generated in a cross ringed configuration and producing monochromatic output, a polarization and frequency entangled source refers to similarly produced pair of polarization entangled photons where the photons are not monochromatic, i.e., more than one frequency is populated. Hence, the descriptions for generating polarization entangled photons previously described herein are augmented slightly to note that the photons generated during SPDC are inherently spectrally multimode and that accurate accounting of the polarization and frequency properties identifies a pair of photons that are entangled in polarization and frequency. The degree to which the photons are entangled in these properties can be assessed using the receivers described as follows. When the photon pairs are simultaneously entangled in both polarization and frequency, the receivers for assessing such physical properties may be constructed in the same manner described herein for detecting frequency entanglement, supplemented by inclusion of a polarization analyzer (as shown in
The various techniques described heretofore for detecting an intercept-resend attack on boundary monitoring system may be applied in other configurations for other purposes. For example,
The system 250 further includes a first receiver 278 and a second receiver 282. There is a transmission apparatus 286 that is configured to direct the first quantum system 270 through the communication link 254 to the first receiver 278 and configured to direct the second quantum system 274 through a reliable path 290 to the second receiver 282.
There is a first evaluation apparatus 294 that evaluates a first value of each monitored physical property of a first verifying quantum system 298 received by the first receiver 278. There is a second evaluation apparatus 302 that evaluates a second value of each monitored physical property of a second verifying quantum system 306 received by the second receiver 282. Typically the reliable path 290 is a secure link so that the second verifying quantum system 306 is the second quantum system 274.
There is an alarm system 310 that indicates a possible compromise of the communication link 254 if the estimated first value of each monitored physical property of the first verifying quantum system 298 and the estimated second value of each monitored physical property of the second verifying quantum system 306 are not likely equal to the paired value of each monitored physical property. In the embodiment of
The system 400 of
There is an evaluation system 424 that estimates an as-received value of the monitored physical property of a verifying quantum system 428 received by the receiver 416. There is an alarm system 432 that compares the as-transmitted value of the monitored physical property of the transmitted quantum system 404 with the as-received value of the monitored physical property of the verifying quantum system 428, and indicates a possible compromise of the transmission of the quantum system if the estimated as-received value of the monitored physical property of the verifying quantum system 428 does not likely correspond to the as-transmitted value of the monitored physical property of the transmitted quantum system 404. Various mechanisms may be used to ensure that the alarm system 432 knows the as-transmitted value of the monitored physical property of the transmitted quantum system 404. For example, the as-transmitted value of the monitored physical property of the transmitted quantum system 404 may be communicated over a secure communication link to the alarm system 432 by the apparatus 408 that generated the quantum system 404. Alternately, a pattern of as-transmitted values of the monitored physical property of a series transmitted quantum systems 404 may be known and monitored by the alarm system 432.
The system 400 of
A polarization-entangled “quantum fence” may be constructed using current quantum optical technology. In particular, SPDC-based entanglement sources are readily available for generating pulsed polarization-entangled photon pairs at rates up to 250,000/pairs/sec/mW of pump power. In addition, measurement of the polarization-correlation visibility in conjugate bases can be performed using an entirely passive experimental apparatus, i.e., on-the-fly reconfiguration is unnecessary. Moreover, both free-space and fiber-based sensors are candidates for such application.
As a first demonstration of these principles, a free-space quantum fence was constructed using a polarization-entanglement source. The purpose of the demonstration was to “simulate” the behavior of a quantum fence system. The experimental setup had only one detector per receiver, so the system was simply cycled through all of the settings to generate data for all eight pairs of polarizations (G0, P0), (G0, P90), (G90, P0), (G90, P90), (G45, P45), (G45, P-45), (G-45, P45), and (G-45, P-45). The data sets consisted of lists of numbers corresponding to the number of coincidences recorded in one-second intervals. In effect, all the data were collected for one of the eight settings, then all of the data for the next setting, and so on. In a real system, one would switch between settings much more rapidly in order to make things difficult for an intruder. To simulate the intruder, coincidences were detected between uncorrelated photons. This was done by simply changing the electronic delay previously-mentioned herein so that coincidences were recorded only for photons originating from different down-conversion events. In practice, this gives a much lower coincidence rate, so the collection window was adjusted to give comparable overall count rates.
In this specific demonstration, an Argon laser operating at 351.1 nm pumped a 1-mm Beta Barium Borate (BBO) crystal with the crystal axis oriented for degenerate type-II SPDC at 702 nm. Horizontally and vertically polarized photons were emitted into different directions under the constraint of conservation of energy and momentum. By adjusting the orientation of the BBO crystal, the two emission patterns can be made to intersect. In this cross-ring configuration, one photon was emitted into each of the two spatial paths defined by intersecting emission cones. A second, rotated BBO crystal immediately followed the first to compensate for group velocity differences between the down-converted photons. Each photon then traveled ˜60 cm to a polarization analyzer, which consisted of rotated λ/2 wave plates, polarizing beam splitters, and single-photon detectors with the measurement basis for each analyzer station chosen by the orientation of an inserted wave plate, cf.
The test monitored coincidence counts over a 1-second window and yielded maximal count rates of 188 pairs/sec and 35 pairs/sec in the h-v and the ± bases, respectively. The lower count rate in the ± basis was due to the use of a single-mode fiber in front of one SPD. The visibility was calculated by recording coincidence counts in the orientations expected to provide maxima and minima for both the h-v and the diagonal-anti-diagonal bases; the average corrected visibility in each basis was 0.9755±0.0169 (h-v) and 0.9139±0.0834 (±), respectively. Visibilities presented in
Visibility measurements for unentangled photons were also performed. In this experiment, 1-second windows of stray photons were collected at each detector to simulate a maximally mixed state. A maximal rate of 7.7 pairs/sec was detected with an average visibility −0.01±0.160, which is consistent with the theoretical prediction of zero. The small negative contribution is an artifact of using the same analyzer orientations as in the entangled photon case; the maximum and minimum in the polarization correlation of the stray room light were probably at slightly different angles.
The ability of the quantum fence to sense an intruder's presence was tested by combining the visibilities acquired for entangled and unentangled light into the time series shown in
Taking the average visibility in the normal region as a baseline, the dimensionless displacement d was calculated with respect to the visibility observed in the transition or intrusion regions. Assuming a decision based on a standard deviation of σ=0.1, the average dimensionless displacement in the intrusion region was d≈7.3 for a value V0=0.16 (one σ away from the mean). The corresponding receiver operating characteristic (ROC) curve is shown in
The results obtained from the experimental setup, which transmitted each photon 0.6 m, may be used to extrapolate the sensor's performance across longer distances. Specifically, atmospheric attenuation may be accounted for in the model of the patrol photon transmitted across a distance L. (This adjustment accounts for the reduction in count rate due to attenuation, neglecting losses in the coincidence counts due to decoherence.) At a wavelength of 800 nm, the effects of atmospheric attenuation can be as low as 0.2 dB/km under best weather conditions and as high as 20 dB/km in the presence of heavy mist. (The actual test system generated photon pairs at 702 nm, but this wavelength may be tuned by changing the pump pulse wavelength and the properties of the nonlinear optical crystal.)
Results of this test demonstrate that visibility measurements provide a viable means of authenticating the entanglement of a photon pair. Even with a modest experimental setup, a polarization-entangled quantum fence senses intrusions with a high probability of detection and a low false-alarm rate over a long range of transmission distances. A quantum fence using brighter, pulsed sources of polarization-entangled photon pairs, with count rates reported as high as 250,000 pairs/sec, could yield similar performance characteristics while requiring a collection window as short as 1 ms.
The foregoing descriptions of embodiments have been presented for purposes of illustration and exposition. They are not intended to be exhaustive or to limit the embodiments to the precise forms disclosed. Obvious modifications or variations are possible in light of the above teachings. The embodiments are chosen and described in an effort to provide the best illustrations of principles and practical applications, and to thereby enable one of ordinary skill in the art to utilize the various embodiments as described and with various modifications as are suited to the particular use contemplated. All such modifications and variations are within the scope of the appended claims when interpreted in accordance with the breadth to which they are fairly, legally, and equitably entitled.
This invention was made with government support under Contract No. DE-AC05-00OR22725 awarded by the U.S. Department of Energy. The government has certain rights in the invention.