Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
QUANTUM KEY DISTRIBUTION VIA PULSE POSITION MODULATION
Document Type and Number:
WIPO Patent Application WO/2016/014475
Kind Code:
A1
Abstract:
A system and method for distributing a quantum key from a first party to a second party. A first node is connected to a public channel, wherein the first node includes a pulse position modulation encoder connected to a quantum channel. A second node is connected to the public channel, wherein the second node includes a pulse position modulation decoder connected to the quantum channel. The pulse position modulation encoder encodes quantum states |0> and |1>, and transmits the encoded quantum states from the first node to the second node via the quantum channel. Quantum state |1> is encoded as |1> ≡ (|τ1> + |τ2>)/ √2.

Inventors:
WILKINSON STEVEN R (US)
YURTSEVER ULVI (US)
Application Number:
PCT/US2015/041263
Publication Date:
January 28, 2016
Filing Date:
July 21, 2015
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
RAYTHEON CO (US)
International Classes:
H04L9/08
Foreign References:
US20070071245A12007-03-29
US20120154062A12012-06-21
US201213400348A2012-02-20
Other References:
PRADEEP KUMARA ANIL PRABHAKARB: "Quantum key distribution using transverse spin wave-opticalinteractions", SPIE, PO BOX 10 BELLINGHAM WA 98227-0010, USA, 31 December 2011 (2011-12-31), XP040554940
NICOLAS GISIN ET AL: "Quantum Cryptography", ARXIV.ORG, CORNELL UNIVERSITY LIBRARY, 201 OLIN LIBRARY CORNELL UNIVERSITY ITHACA, NY 14853, 19 January 2001 (2001-01-19), XP080040705, DOI: 10.1103/REVMODPHYS.74.145
DEHMANI MUSTAPHA ET AL: "Quantum key distribution with several intercepts and resend attacks with partially non-orthogonal basis states", OPTIK, vol. 125, no. 2, 10 February 2013 (2013-02-10), pages 624 - 627, XP028766062, ISSN: 0030-4026, DOI: 10.1016/J.IJLEO.2013.06.099
SAMUEL J LOMONACO: "A Quick Glance at Quantum Cryptography", ARXIV.ORG, CORNELL UNIVERSITY LIBRARY, 201 OLIN LIBRARY CORNELL UNIVERSITY ITHACA, NY 14853, 23 November 1998 (1998-11-23), XP080646604
ROMAIN ALLEAUME ET AL: "SECOQC White Paper on Quantum Key Distribution and Cryptography", ARXIV.ORG, CORNELL UNIVERSITY LIBRARY, 201 OLIN LIBRARY CORNELL UNIVERSITY ITHACA, NY 14853, 23 January 2007 (2007-01-23), XP080269269
NAZARATHY: "Quantum key distribution over a fiber-optic channel by means of pulse position modulation", OPTICS LETTERS, vol. 1533, 2005, pages 30
See also references of EP 3172858A1
Attorney, Agent or Firm:
PERDOK, Monique M. et al. (Minneapolis, Minnesota, US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1. A system, comprising:

a quantum channel;

a public channel;

a first node connected to the public channel, wherein the first node includes a pulse position modulation encoder connected to the quantum channel; and

a second node connected to the public channel, wherein the second node includes a pulse position modulation decoder connected to the quantum channel; wherein the pulse position modulation encoder encodes quantum states

10) and II), and transmits the encoded quantum states via the quantum channel to the second node; and

wherein the pulse position modulation encoder encodes quantum state II) as |l)≡ (|i1) + | i2))/V2 .

2. The system of claim 1 , wherein the pulse position modulation encoder encodes quantum state 10) as by 10)≡ li2).

3. The system of claim 2, wherein the first and second nodes are synchronized via separate reference signals formed by interrogating Rubidium (Rb) cells with stabilized laser outputs of cavity- stabilized reference lasers. 4. The system of claim 1 , wherein the pulse position modulation encoder includes a beam splitter and three mirrors, wherein the three mirrors are positioned to delay the beam from the beam splitter by delay Δ.

5. The system of claim 1 , wherein the pulse position modulation decoder includes a beam splitter and three mirrors, wherein one of the three mirrors only reflects light during time bin 1.

6. The system of claim 1 , wherein the second node determines a shared secret key from the quantum states 10) and II) received from the first node and uses the shared secret key to encrypt data transferred on the public channel.

7. The system of claim 6, wherein the second node detects eavesdropping as a function of the quantum states 10) and II) received from the first node.

8. A pulse position modulation encoder which encodes quantum states 10) and II), and transmits the encoded quantum states out through a quantum channel interface, wherein the encoder encodes quantum state II) as

9. The encoder of claim 8, wherein the pulse position modulation encoder encodes quantum state 10) as by 10)≡ li2).

10. The encoder of claim 9, wherein the pulse position modulation encoder is synchronized to a pulse position modulation decoder via separate reference signals formed by interrogating Rubidium (Rb) cells with stabilized laser outputs of cavity-stabilized reference lasers.

11. The encoder of claim 8, wherein the pulse position modulation encoder includes a beam splitter and three mirrors, wherein the three mirrors are positioned to delay the beam from the beam splitter by delay Δ.

12. A pulse position modulation decoder which decodes quantum states 10) and II) received through a quantum channel interface, wherein the decoder decodes a quantum state II) encoded as |l ≡ (|ii ) + |i2))/ 2 .

13. The decoder of claim 12, wherein the pulse position modulation decoder decodes quantum state 10) as by 10)≡ li2).

14. The decoder of claim 13, wherein the pulse position modulation decoder is synchronized to a pulse position modulation encoder via separate reference signals formed by interrogating Rubidium (Rb) cells with stabilized laser outputs of cavity-stabilized reference lasers.

15. The decoder of claim 12, wherein the pulse position modulation decoder includes a beam splitter and three mirrors, wherein one of the three mirrors only reflects light during time bin 1.

16. A method of distributing a quantum key from a first party to a second party, the method comprising:

encoding quantum states 10) and II ), wherein encoding includes encoding quantum state II) as |l ≡ (|ii + |i2))/ 2 ;

transmitting a random string of quantum states I0) and II) from the first party to the second party;

measuring the quantum states by the second party, wherein measuring includes applying projections on the random string of quantum states I0) and II); publicly announcing the projections;

privately constructing, by the first party, a substring, wherein the substring includes bits sent in the random string of quantum states with indices that match indices in the projections;

privately constructing, by the second party, a string, wherein the string is a function of the projections;

publicly revealing a portion of the substring;

publicly revealing a portion of the string;

comparing the revealed portion of the substring to the revealed portion of the string;

if the revealed portion of the substring is identical to the revealed portion of the string, using remaining unrevealed bits of the string and substring as a shared secret key; and

if the revealed portion of the substring is not identical to the revealed portion of the string, noting eavesdropping .

17. The method of claim 16, wherein encoding quantum states 10) and II), includes encoding quantum state 10) as by 10)≡ li2). 18. The method of claim 16, wherein the first and second parties synchronize via separate reference signals formed by interrogating Rubidium (Rb) cells with stabilized laser outputs of cavity- stabilized reference lasers.

19. An article comprising a nontransitory computer-readable medium having instructions thereon, wherein the instructions, when executed in a computer, create a system for executing a method of distributing a quantum key from a first party to a second party, the method comprising:

encoding quantum states 10) and II ), wherein encoding includes encoding quantum state II) as |l)≡ (|ii + |i2))/ 2 ;

transmitting a random string of quantum states 10) and II) from the first party to the second party;

measuring the quantum states by the second party, wherein measuring includes applying projections on the random string of quantum states 10) and II); publicly announcing the projections;

privately constructing, by the first party, a substring, wherein the substring includes bits sent in the random string of quantum states with indices that match indices in the projections;

privately constructing, by the second party, a string, wherein the string is a function of the projections;

publicly revealing a portion of the substring;

publicly revealing a portion of the string;

comparing the revealed portion of the substring to the revealed portion of the string;

if the revealed portion of the substring is identical to the revealed portion of the string, using remaining unrevealed bits of the string and substring as a shared secret key; and if the revealed portion of the substring is not identical to the revealed portion of the string, noting eavesdropping .

20. The article of claim 19, wherein encoding quantum states 10) and includes encoding quantum state 10) as by 10)≡ li2).

Description:
QUANTUM KEY DISTRIBUTION VIA PULSE POSITION MODULATION

CLAIM OF PRIORITY

[0001] This application claims the benefit of priority to United States

Application Serial Number 14/337,688, filed July 22, 2014, which is incorporated herein by reference in its entirety.

BACKGROUND

[0002] There have been recent proposals for implementing the quantum cryptographic protocol BB92 with quantum states based on pulse-position modulation instead of polarization. Attempts to do so to date have been flawed; they are vulnerable to eavesdropping attacks since they do not fully implement the BB92 protocol. Some such approaches are detailed in Nazarathy, "Quantum key distribution over a fiber-optic channel by means of pulse position modulation," Optics Letters 1533, 30 (2005).

[0003] What is needed is a quantum cryptographic protocol BB92 with quantum states based on pulse-position modulation which addresses these issues, and other issues that become apparent in the discussion below.

BRIEF DESCRIPTION OF THE DRAWINGS

[0004] Embodiments are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings in which like reference numerals refer to similar elements.

[0005] Fig. 1 illustrates a quantum key distribution system according to one aspect of the present invention;

[0006] Fig. 2 illustrates pulse position modulation encoding;

[0007] Fig. 3 illustrates a method of distributing a quantum key from a first party to a second party;

[0008] Fig. 4 illustrates quantum key encoding; and

[0009] Fig. 5 illustrates quantum key decoding. BRIEF DESCRIPTION OF THE DRAWINGS

[0010] In the following detailed description of example embodiments of the invention, reference is made to specific examples by way of drawings and illustrations. These examples are described in sufficient detail to enable those skilled in the art to practice the invention, and serve to illustrate how the invention may be applied to various purposes or embodiments. Other embodiments of the invention exist and are within the scope of the invention, and logical, mechanical, electrical, and other changes may be made without departing from the subject or scope of the present invention. Features or limitations of various embodiments of the invention described herein, however essential to the example embodiments in which they are incorporated, do not limit the invention as a whole, and any reference to the invention, its elements, operation, and application do not limit the invention as a whole but serve only to define these example embodiments. The following detailed description does not, therefore, limit the scope of the invention, which is defined only by the appended claims.

[0011] A system 100 for Quantum Key Distribution (QKD) via pulse position modulation is shown in Fig. 1. In the example embodiment shown in Fig. 1, quantum key distribution allows two parties, Alice 102 and Bob 104, to share a common secret key via a quantum channel 106. The shared secret key is then used to encrypt data transferred between Alice and Bob via public channel 108.

[0012] Quantum Key Distribution, when done properly, guarantees the secrecy of the distributed key. If an eavesdropper (Eve 110) tries to determine the key, she will introduce transmission errors in the distribution of the key and will be detected; the shared secret key can then be discarded before it is used to transmit compromised data. If, on the other hand, no eavesdropping is detected, the secrecy of the distributed key is guaranteed.

[0013] Pulse position modulation coding of bits 0 and 1 is illustrated in

Fig. 2. In the example embodiment of Fig. 2, the position of the pulse in an active time window of length 2Δ determines the bit: position in time bin 2 (bin 122 in Fig. 2) corresponds to the bit 0, and position in time bin 1 (bin 120 in Fig. 2) corresponds to the bit 1. Active windows are separated by a fixed latency time interval τ.

[0014] As shown in Fig. 3, the BB92 protocol according to the presentinvention is the following: Alice encodes quantum states 10) and II) at 200 and sends them to Bob at 202. Quantum states 10) and II ) are not orthogonal: (110)≠ 0. Quantum state 10) is how a zero is encoded as a quantum state (as detailed below). Quantum state II) is how a one is encoded as a quantum state (as detailed below). Initially, Alice sends Bob a random string of I0)'s and ll)'s. At 204, Bob measures the states he receives by randomly applying the projections on I0) 1 and II) 1 :

¾ ^ -| )(o|

[0015] Bob publicly announces, at 206, the indices of those

measurements (projections) in which he got a positive result (=1). Alice privately constructs the substring which consists of the bits she sent Bob with the same indices as those Bob just publicly announced. Alice reveals a portion of the substring at 208.

[0016] Bob privately constructs the string

1 if the projection Bob used to obtain the positive result was 0 if the projection Bob used to obtain the positive result was for each index i he announced. Alice's substring and the string Bob constructs must be identical in the absence of noise and or eavesdropping. Public discussion follows as in the standard BB84 protocol. That is, a portionn of the raw common bits are publicly revealed at 208 and 210 and a check is made at 214 to make sure they are identical. If they are not, eavesdropping is concluded at 216 and the whole procedure is discarded. If they are, then the remaining unrevealed bits are used as the shared secret key at 218.

[0017] In the new PPM protocol, the state 10) is encoded as the state

"pulse is in second bin" represented by 10)≡ Ifc), and the state II) is encoded as the state "pulse is in coherent superposition of the first and second bins," represented by |l ≡ (|ii + |¾)) 2 . An example pulse position modulation encoder is shown in Fig. 4. In some embodiments, the new protocol relies on precise clock synchronization between Alice and Bob as part of the

implementation of two key requirements.

[0018] The first key requirement is the efficient construction of the states:

[0019] The construction of the state 10) is the same as the classical PPM state. The construction of the superposition state II), however, is more complex because, as noted above, l ≡ (|ii + |i2)) 2 . A pulse position modulation encoder for encoding is shown in Fig. 4. In the example shown in Fig. 4, simple optical elements are used to transmit the non- Schematically, as shown in Fig. 4, these simple optical elements include an initial beam splitter 140 and mirrors 142 (to delay half the beam by Δ). In one such embodiment, the split beams are combined into output channel 144 at the end.

[0020] The second key requirement is the construction of the projection operators Observe that the measurement

must be guaranteed to not click when the input state is 10), and click with probability 1 - | ΐ|θ | when the input state is II). Conversely, the measurement teed to not click when the input state is II), and click with when the input state is 10). One example implementation

of these measurement operators is illustrated in the pulse position modulation decoder of Fig. 5.

[0021] In the example embodiment shown in Fig. 5, a mirror 144 receives quantum states sent by Alice 102 and, in time bin 1 reflects the quantum states while in time bin 2, letting the signal through. Mirrors 142 reflect the reflected quantum states and the delayed reflected quantum states are combined with a delayed bin 2 set of quantum states by beam splitter 140 before being detected by detector 146. In one embodiment, detector 146 only detects photons that have are moving down to it.

[0022] In one example embodiment, the measurement must be

guaranteed to not click with input state 10), and click with probability 1/2 with input state II). As shown in Fig. 5, implementing EAS Y : Just do a

detection in time bin 1.

[0023] Likewise, the measurement must be guaranteed to not click

with input state II), and click with probability 1/2 with input state 10).

Implementing nar d. In one embodiment, it requires precise

timekeeping and synchronization in the placement of the initial mirror (in time bin 1 only), and in controlling the phase and time delays to make sure the detector never goes off with input state II).

[0024] As noted above, precise clock synchronization is required between Alice 102 and Bob 104. In one example embodiment, this is achieved, at least in part, via an ultra-stable frequency reference such as described in U.S. Patent Application No. 13/400,348, filed by Wilkerson et al. on Feb 20, 2012 the description of which is incorporated herein by reference. Synchronization of distant ultra-stable clocks can be achieved via a number of methods such as the Einstein synchronization protocol using optical two-way time transfer, with either optical fiber or free-space propagation.

[0025] In some embodiments, the ultra-stable frequency reference generating system described in U.S. Patent Application No. 13/400,348 includes a cavity- stabilized reference laser that includes a laser source locked to a stabilized cavity. In some such embodiments, the system also includes a Rubidium (Rb) cell that may be interrogated by a stabilized laser output of the cavity-stabilized reference laser to cause at least a two-photon Rubidium transition (to an upper state) within the Rubidium cell. A detector detects fluorescence within the Rubidium cell resulting from the spontaneous decay of the upper state Rubidium transition. Other vapor cell references can be used as well.

[0026] In vapor cell embodiments, the detector provides a detector output at a wavelength of the fluorescence to lock the cavity- stabilized reference laser to generate a stabilized laser output. In some such embodiments, the laser source is locking to both the stabilized cavity and to the Rubidium transition within the Rubidium cell. The combination of a cavity stabilized laser and femtosecond frequency comb referenced to the 778 nm two-photon transition in Rubidium as a source of ultra-low phase noise optical and microwave frequencies can be used, for instance, as standards in a compact system configuration.

[0027] As noted in the patent application, such systems are useful in systems that require synchronization; they are also suitable for use in, for instance, radar systems, communication systems, signal-collection systems and difficult EMI environments.

[0028] The description and the drawings herein sufficiently illustrate specific embodiments to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. Portions and features of some embodiments may be included in, or substituted for, those of other embodiments. Embodiments set forth in the claims encompass all available equivalents of those claims.

[0029] What have been described above are new systems and methods for quantum key distribution. The systems and methods described fully implement the BB92 protocol and which thus have the same absolute unconditional security properties as the standard polarization-based QKD protocol BB84. In one embodiment, a new method of encoding a ll) simplifies construction of a quantum key encoder.

[0030] Embodiments may be implemented in one or a combination of hardware, firmware and software. Embodiments may also be implemented as instructions stored on a computer-readable storage device, which may be read and executed by at least one processor to perform the operations described herein. A computer-readable storage device may include any non-transitory mechanism for storing information in a form readable by a machine (e.g., a computer). For example, a computer-readable storage device may include readonly memory (ROM), random- access memory (RAM), magnetic disk storage media, optical storage media, flash-memory devices, and other storage devices and media. In some embodiments, the system may include one or more processors and may be configured with instructions stored on a computer- readable storage device.