SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Why is QKD not used?
             Towards high-performance CVQKD
               Practical security considerations




              Experimental Demonstration of
       Continuous-Variable Quantum Key Distribution
          over 80 km of Standard Telecom Fiber

       Paul Jouguet, S´bastien Kunz-Jacques, Anthony
                       e
         Leverrier, Philippe Grangier, Eleni Diamanti
                              SeQureNet, T´l´com ParisTech
                                          ee


                                         2012-09-14




1/20
Why is QKD not used?
                  Towards high-performance CVQKD
                    Practical security considerations


QKD: four main limitations (1/2)


       Speed
           Not enough for OTP: not a serious issue
           Physical parameters estimation over large blocks: hardware
           drifts, latency
       Distance
           Asymmetric crypto is not limited
           Trusted nodes are not a good solution: quantum repeaters are
           required




2/20
Why is QKD not used?
                  Towards high-performance CVQKD
                    Practical security considerations


QKD: four main limitations (2/2)



       Security
           Incomplete security proofs
           Distance between proofs and practical implementations
       Deployment
           QKD requires a dark fiber: $$$
           WDM compatibility: lowers QKD extra premium




3/20
Why is QKD not used?
             Towards high-performance CVQKD
               Practical security considerations


Two technologies



                           Discrete variables      Continuous variables
          medium          photon phase/polar.      field amplitude-phase
         detection          photon counters         coherent detection
           range                100 km                     25km
            rate                 1Mb/s                    10kb/s
       components            active cooling              standard
        integration              WDM                      WDM
          security                 yes                      yes




4/20
Why is QKD not used?
                 Towards high-performance CVQKD
                   Practical security considerations


Gaussian protocol




       Losses and excess noise lower the SNR.




5/20
Why is QKD not used?
           Towards high-performance CVQKD
             Practical security considerations


Optical setup




6/20
Why is QKD not used?
             Towards high-performance CVQKD
               Practical security considerations


Speed limitations


       Delay between classical and quantum signals (200ns)
       Laser pulsed with a tunable frequency (1MHz)
       Data acquisition speed (up to 5MHz)
       Filtering: tradeoff between speed and electronic noise (current
       cutoff at 10MHz, 100MHz feasible arxiv:1006.1257 Yue-Meng
       Chi et al.)
       High-speed error correction: LDPC codes (GPU) or polar
       codes (CPU) (up to 10Mbit/s) (arxiv:1204.5882, P. Jouguet
       and S. Kunz-Jacques)




7/20
Why is QKD not used?
                 Towards high-performance CVQKD
                   Practical security considerations


Range limitations



           High error-correction efficiency, even at low SNRs
           Finite-size effects
           Low SNR Alice/Bob synchronization mechanism
           Low-loss LO path
           Excess noise (imperfect relative phase estimation)
       New SNR regions allowed by error-correction techniques.




8/20
Why is QKD not used?
             Towards high-performance CVQKD
               Practical security considerations


Channel virtualization



       Idea introduced by Leverrier (Phys. Rev. A 77, 042325
       (2008))
       Translates the initial problem into a channel coding problem
       on a good channel
       Good means very efficient error-correcting codes available
       Usual suspect: BIAWGNC




9/20
Why is QKD not used?
              Towards high-performance CVQKD
                Practical security considerations


 How to improve the efficiency of the multidimensional
 scheme?



        Improve the approximation between the virtual channel and
        the target channel
        Improve the efficiency of the codes on the target channel
        (Phys. Rev. A 84, 062317 (2011), P. Jouguet, S.
        Kunz-Jacques and A. Leverrier)




10/20
Why is QKD not used?
              Towards high-performance CVQKD
                Practical security considerations


 What is a good code for the BIAWGNC?


        A code is designed for a channel and a SNR
        Free parameter: the code rate R = n−m , m the number of
                                             n
        parity-check equations, n the length
        Low SNR / Lot of redundancy / Low rate
                                            R
        Efficiency β (SNR) =               C (SNR)
        Typical values:
            Slice reconciliation: β = 90%, SNR= 3, @30km
            Multidimensional reconciliation: β = 89%, SNR= 0.5, @50km




11/20
Why is QKD not used?
            Towards high-performance CVQKD
              Practical security considerations


 Set of available codes



                                     β              SNR
                                   93.6%           1.097
                                   93.1%           0.161
                                   95.8%           0.075
                                   96.9%           0.029
                                   96.6%          0.0145
                                   95.9%          0.00725




12/20
Why is QKD not used?
              Towards high-performance CVQKD
                Practical security considerations


 How to get more flexibility on the SNR?




        Possible to design codes with lower rates
        Not necessary: repetition codes
        Shortening, puncturing
        Optimization on the modulation variance




13/20
Why is QKD not used?
                                              Towards high-performance CVQKD
                                                Practical security considerations


 Theoretical secret key rate
        Parameters: VA ∈ {1, 100}, T = 10−0.2d/10 , ξ = 0.01, η = 0.6,
        Velec = 0.01
                                                  1
                                                                                               SNR=1.097       (1)
                                                           1                                   SNR=0.161       (2)
                                                0.1                                            SNR=0.075       (3)
                                                                         2                     SNR=0.029       (4)
              Key rate (secret bits/pulse)




                                                                                    3         SNR=0.0145       (5)
                                               0.01                                         SNR=0.00725        (6)
                                                                                            4
                                                                                                  5
                                              0.001
                                                                                                           6

                                             0.0001


                                              10−5


                                              10−6
                                                      0     20      40       60       80     100  120   140          160   180
                                                                                    Distance (km)
14/20
Why is QKD not used?
              Towards high-performance CVQKD
                Practical security considerations


 Finite size effects


        First analysis for discrete modulation protocols in Phys. Rev.
        A 81, 062343 (2010), Leverrier et al.
        Statistical uncertainty over estimated parameters (T , ξ)
             n
        K=   N (βI (x; y )     −S      PE   (y ; E ) − ∆(n))
        Extended analysis for Gaussian modulation, including
        imperfect homodyne detection (efficiency, electronic noise)
        and shot noise estimation (Phys. Rev. A 86, 032309 (2012),
        poster 33)
        Main effect: uncertainty on the excess noise ξ




15/20
Why is QKD not used?
                  Towards high-performance CVQKD
                    Practical security considerations


 Experimental results
        Parameters: d = 53km, η = 0.552, Velec = 0.015, SNR= 0.17,
        β = 94%, = 10−10

                                                        0.002
                                                                                                            excess noise
                                                                               std dev of the experimental excess noise
                                                                     std dev of the theoretical estimator (108 samples)
                                                                     std dev of the theoretical estimator (106 samples)
                                                       0.0015
                     Excess noise (shot noise units)




                                                        0.001




                                                       0.0005




                                                            0




                                                       -0.0005
                                                                 0          5             10             15           20
                                                                                          Time (hours)




16/20
Why is QKD not used?
                  Towards high-performance CVQKD
                    Practical security considerations


 Experimental results
        Parameters: d = 53km,80km, η = 0.552, Velec = 0.015,
        SNR=0.17,0.08, β = 94%, = 10−10

                                       100000
                                                                  asymptotic theoretical key rate
                                                    nite-size theoretical key rate (108 samples)
                                                                  asymptotic experimental point
                                                    nite-size experimental point (108 samples)

                                        10000
                    Key rate (bit/s)




                                         1000




                                          100
                                                0   20            40           60           80      100
                                                                   Distance (km)




17/20
Why is QKD not used?
              Towards high-performance CVQKD
                Practical security considerations


 Imperfect preparation


        Thermal noise (Phys. Rev. A 81, 022318 (2010), Usenko and
        Filip)
        Gaussian modulation: truncated and discretized (finite
        amount of randomness)
            Can be taken into account into the security proof (Phys. Rev.
            A 86, 032309 (2012), poster 33)
            But a lot of random numbers are required (+ sifting and
            multidimensional protocol)
        Calibration procedures
            Calibration of the homodyne detection
            Calibration of the phase noise




18/20
Why is QKD not used?
              Towards high-performance CVQKD
                Practical security considerations


 Summary


        Long distance CVQKD with Gaussian modulation is possible
        thanks to low SNR error-correction capability
        Computing-power consuming because of decoding close to the
        threshold
        We use GPU (30× faster than CPU plus friendly Moore’s law)
        Higher secure distance with virtual Gaussian post-selection?
        (arxiv:1205.6933, J. Fiurasek, N. J. Cerf, arxiv:1206.0936, N.
        Walk et al.)
        Work on WDM coming




19/20
Why is QKD not used?
              Towards high-performance CVQKD
                Practical security considerations


 Enquire about Cygnus




        An open and customizable CVQKD research platform
        Tests/demonstrations of integration in optical networks




20/20

Contenu connexe

Tendances

CUHK System for the Spoken Web Search task at Mediaeval 2012
CUHK System for the Spoken Web Search task at Mediaeval 2012CUHK System for the Spoken Web Search task at Mediaeval 2012
CUHK System for the Spoken Web Search task at Mediaeval 2012MediaEval2012
 
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...IDES Editor
 
Secure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterSecure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterIDES Editor
 
Non-Lethal Weapons Reference Book 2011
Non-Lethal Weapons Reference Book 2011Non-Lethal Weapons Reference Book 2011
Non-Lethal Weapons Reference Book 2011Sarp Online
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video SurveillanceKobi Magnezi
 
Reproducible Emulation of Analog Behavioral Models
Reproducible Emulation of Analog Behavioral ModelsReproducible Emulation of Analog Behavioral Models
Reproducible Emulation of Analog Behavioral Modelsfnothaft
 
00 control panel xt specification sheet
00 control panel xt specification sheet00 control panel xt specification sheet
00 control panel xt specification sheetIlias Varsamis
 
Vlsi 2014 15
Vlsi 2014 15Vlsi 2014 15
Vlsi 2014 15shahu2212
 

Tendances (8)

CUHK System for the Spoken Web Search task at Mediaeval 2012
CUHK System for the Spoken Web Search task at Mediaeval 2012CUHK System for the Spoken Web Search task at Mediaeval 2012
CUHK System for the Spoken Web Search task at Mediaeval 2012
 
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...
Design of Optimal Linear Phase FIR High Pass Filter using Improved Particle S...
 
Secure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterSecure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan Register
 
Non-Lethal Weapons Reference Book 2011
Non-Lethal Weapons Reference Book 2011Non-Lethal Weapons Reference Book 2011
Non-Lethal Weapons Reference Book 2011
 
Scrambling For Video Surveillance
Scrambling For Video SurveillanceScrambling For Video Surveillance
Scrambling For Video Surveillance
 
Reproducible Emulation of Analog Behavioral Models
Reproducible Emulation of Analog Behavioral ModelsReproducible Emulation of Analog Behavioral Models
Reproducible Emulation of Analog Behavioral Models
 
00 control panel xt specification sheet
00 control panel xt specification sheet00 control panel xt specification sheet
00 control panel xt specification sheet
 
Vlsi 2014 15
Vlsi 2014 15Vlsi 2014 15
Vlsi 2014 15
 

En vedette

Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdwtyru1989
 
Mehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics DilemmasMehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics Dilemmasknowdiff
 
Quantum Information
Quantum Information Quantum Information
Quantum Information Dario Scotto
 
Time & Quantum Mechanics
Time & Quantum MechanicsTime & Quantum Mechanics
Time & Quantum MechanicsJohn Ashmead
 
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...Vasil Penchev
 
Mathematical Formulation of Quantum Mechanics
Mathematical Formulation of Quantum Mechanics Mathematical Formulation of Quantum Mechanics
Mathematical Formulation of Quantum Mechanics rbmaitri123
 
Atoms, quanta,and qubits: Atomism in quantum mechanics and information
Atoms, quanta,and qubits: Atomism in quantum mechanics and informationAtoms, quanta,and qubits: Atomism in quantum mechanics and information
Atoms, quanta,and qubits: Atomism in quantum mechanics and informationVasil Penchev
 
Quantum Implications 07262011
Quantum Implications 07262011Quantum Implications 07262011
Quantum Implications 07262011Gary Stilwell
 
Charge Quantization and Magnetic Monopoles
Charge Quantization and Magnetic MonopolesCharge Quantization and Magnetic Monopoles
Charge Quantization and Magnetic MonopolesArpan Saha
 
Magnetic monopoles and group theory.
Magnetic monopoles and group theory.Magnetic monopoles and group theory.
Magnetic monopoles and group theory.Renata Queiroz
 
Dark matter & dark energy
Dark matter & dark energyDark matter & dark energy
Dark matter & dark energysurat murthy
 
Quantum Nanomagnetism
Quantum  NanomagnetismQuantum  Nanomagnetism
Quantum Nanomagnetismoriolespinal
 
Quantum Numbers
Quantum NumbersQuantum Numbers
Quantum Numbersyasjoy
 
Time travel (journey beyond time)
Time travel (journey beyond time)Time travel (journey beyond time)
Time travel (journey beyond time)Indrabhaskar Mishra
 

En vedette (20)

Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
 
Mehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics DilemmasMehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics Dilemmas
 
Quantum Information
Quantum Information Quantum Information
Quantum Information
 
Time & Quantum Mechanics
Time & Quantum MechanicsTime & Quantum Mechanics
Time & Quantum Mechanics
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
 
Quantum Logic
Quantum LogicQuantum Logic
Quantum Logic
 
Faster Than Light
Faster Than LightFaster Than Light
Faster Than Light
 
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...
 
Mathematical Formulation of Quantum Mechanics
Mathematical Formulation of Quantum Mechanics Mathematical Formulation of Quantum Mechanics
Mathematical Formulation of Quantum Mechanics
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
Atoms, quanta,and qubits: Atomism in quantum mechanics and information
Atoms, quanta,and qubits: Atomism in quantum mechanics and informationAtoms, quanta,and qubits: Atomism in quantum mechanics and information
Atoms, quanta,and qubits: Atomism in quantum mechanics and information
 
Thesis defence
Thesis defenceThesis defence
Thesis defence
 
Quantum Implications 07262011
Quantum Implications 07262011Quantum Implications 07262011
Quantum Implications 07262011
 
Charge Quantization and Magnetic Monopoles
Charge Quantization and Magnetic MonopolesCharge Quantization and Magnetic Monopoles
Charge Quantization and Magnetic Monopoles
 
Magnetic monopoles and group theory.
Magnetic monopoles and group theory.Magnetic monopoles and group theory.
Magnetic monopoles and group theory.
 
Dark matter & dark energy
Dark matter & dark energyDark matter & dark energy
Dark matter & dark energy
 
Quantum Nanomagnetism
Quantum  NanomagnetismQuantum  Nanomagnetism
Quantum Nanomagnetism
 
Quantum Numbers
Quantum NumbersQuantum Numbers
Quantum Numbers
 
EPR paradox
EPR paradoxEPR paradox
EPR paradox
 
Time travel (journey beyond time)
Time travel (journey beyond time)Time travel (journey beyond time)
Time travel (journey beyond time)
 

Similaire à Experimental demonstration of continuous variable quantum key distribution over 80 km of standard telecom fiber

Contemporary Design of High ADC
Contemporary Design of High ADC Contemporary Design of High ADC
Contemporary Design of High ADC chiportal
 
Best Practices for Building Ultra-Low Latency Microwave Networks
Best Practices for Building Ultra-Low Latency Microwave NetworksBest Practices for Building Ultra-Low Latency Microwave Networks
Best Practices for Building Ultra-Low Latency Microwave NetworksAviat Networks
 
Boundary scan for support engineers and technicians
Boundary scan for support engineers and techniciansBoundary scan for support engineers and technicians
Boundary scan for support engineers and techniciansInterlatin
 
A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...ranjitha mudhiraj
 
Honeywell hdc 890
Honeywell hdc 890Honeywell hdc 890
Honeywell hdc 890mayur_32
 
Micro e systems_data_sheet-veratus_series_preliminary
Micro e systems_data_sheet-veratus_series_preliminaryMicro e systems_data_sheet-veratus_series_preliminary
Micro e systems_data_sheet-veratus_series_preliminaryElectromate
 
HC24.29.625-IA-23-Wide-Ruhl-Intel_2012_NTV_iA
HC24.29.625-IA-23-Wide-Ruhl-Intel_2012_NTV_iAHC24.29.625-IA-23-Wide-Ruhl-Intel_2012_NTV_iA
HC24.29.625-IA-23-Wide-Ruhl-Intel_2012_NTV_iASaurabh Dighe
 
2016 03-03 marchand
2016 03-03 marchand2016 03-03 marchand
2016 03-03 marchandSCEE Team
 
Datasheet sensor temperatura mcp9700
Datasheet sensor temperatura mcp9700Datasheet sensor temperatura mcp9700
Datasheet sensor temperatura mcp9700ADELIUS
 
D9600 advanced headend processor
D9600 advanced headend processorD9600 advanced headend processor
D9600 advanced headend processorAniruddh Tyagi
 
D9600 advanced headend processor
D9600 advanced headend processorD9600 advanced headend processor
D9600 advanced headend processoraniruddh Tyagi
 
D9600 advanced headend processor
D9600 advanced headend processorD9600 advanced headend processor
D9600 advanced headend processoraniruddh Tyagi
 
Instrumentation: Test and Measurement Methods and Solutions - VE2013
Instrumentation: Test and Measurement Methods and Solutions - VE2013Instrumentation: Test and Measurement Methods and Solutions - VE2013
Instrumentation: Test and Measurement Methods and Solutions - VE2013Analog Devices, Inc.
 

Similaire à Experimental demonstration of continuous variable quantum key distribution over 80 km of standard telecom fiber (20)

Contemporary Design of High ADC
Contemporary Design of High ADC Contemporary Design of High ADC
Contemporary Design of High ADC
 
43 131-1-pb
43 131-1-pb43 131-1-pb
43 131-1-pb
 
Best Practices for Building Ultra-Low Latency Microwave Networks
Best Practices for Building Ultra-Low Latency Microwave NetworksBest Practices for Building Ultra-Low Latency Microwave Networks
Best Practices for Building Ultra-Low Latency Microwave Networks
 
Boundary scan for support engineers and technicians
Boundary scan for support engineers and techniciansBoundary scan for support engineers and technicians
Boundary scan for support engineers and technicians
 
A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...A zigbee wireless sensor network and multiple way bus communication meduim ca...
A zigbee wireless sensor network and multiple way bus communication meduim ca...
 
A 1.2V 10-bit 165MSPS Video ADC
A 1.2V 10-bit 165MSPS Video ADCA 1.2V 10-bit 165MSPS Video ADC
A 1.2V 10-bit 165MSPS Video ADC
 
Hdc890 p36
Hdc890 p36Hdc890 p36
Hdc890 p36
 
Honeywell hdc 890
Honeywell hdc 890Honeywell hdc 890
Honeywell hdc 890
 
Micro e systems_data_sheet-veratus_series_preliminary
Micro e systems_data_sheet-veratus_series_preliminaryMicro e systems_data_sheet-veratus_series_preliminary
Micro e systems_data_sheet-veratus_series_preliminary
 
HC24.29.625-IA-23-Wide-Ruhl-Intel_2012_NTV_iA
HC24.29.625-IA-23-Wide-Ruhl-Intel_2012_NTV_iAHC24.29.625-IA-23-Wide-Ruhl-Intel_2012_NTV_iA
HC24.29.625-IA-23-Wide-Ruhl-Intel_2012_NTV_iA
 
2016 03-03 marchand
2016 03-03 marchand2016 03-03 marchand
2016 03-03 marchand
 
Kramer 104LN
Kramer 104LNKramer 104LN
Kramer 104LN
 
Kramer 104LN
Kramer 104LNKramer 104LN
Kramer 104LN
 
Kramer 104-LN
Kramer 104-LNKramer 104-LN
Kramer 104-LN
 
Datasheet sensor temperatura mcp9700
Datasheet sensor temperatura mcp9700Datasheet sensor temperatura mcp9700
Datasheet sensor temperatura mcp9700
 
D9600 advanced headend processor
D9600 advanced headend processorD9600 advanced headend processor
D9600 advanced headend processor
 
D9600 advanced headend processor
D9600 advanced headend processorD9600 advanced headend processor
D9600 advanced headend processor
 
D9600 advanced headend processor
D9600 advanced headend processorD9600 advanced headend processor
D9600 advanced headend processor
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Instrumentation: Test and Measurement Methods and Solutions - VE2013
Instrumentation: Test and Measurement Methods and Solutions - VE2013Instrumentation: Test and Measurement Methods and Solutions - VE2013
Instrumentation: Test and Measurement Methods and Solutions - VE2013
 

Plus de wtyru1989

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurementwtyru1989
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperialwtyru1989
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemwtyru1989
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementwtyru1989
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecturewtyru1989
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formationwtyru1989
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rarewtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationswtyru1989
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementwtyru1989
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectorswtyru1989
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theorywtyru1989
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlwtyru1989
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theoremwtyru1989
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07wtyru1989
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codeswtyru1989
 
标量量化
标量量化标量量化
标量量化wtyru1989
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012wtyru1989
 
Op amp tutorial-1
Op amp tutorial-1Op amp tutorial-1
Op amp tutorial-1wtyru1989
 

Plus de wtyru1989 (20)

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectors
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandl
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theorem
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
 
Em method
Em methodEm method
Em method
 
标量量化
标量量化标量量化
标量量化
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012
 
Op amp tutorial-1
Op amp tutorial-1Op amp tutorial-1
Op amp tutorial-1
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Experimental demonstration of continuous variable quantum key distribution over 80 km of standard telecom fiber

  • 1. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Experimental Demonstration of Continuous-Variable Quantum Key Distribution over 80 km of Standard Telecom Fiber Paul Jouguet, S´bastien Kunz-Jacques, Anthony e Leverrier, Philippe Grangier, Eleni Diamanti SeQureNet, T´l´com ParisTech ee 2012-09-14 1/20
  • 2. Why is QKD not used? Towards high-performance CVQKD Practical security considerations QKD: four main limitations (1/2) Speed Not enough for OTP: not a serious issue Physical parameters estimation over large blocks: hardware drifts, latency Distance Asymmetric crypto is not limited Trusted nodes are not a good solution: quantum repeaters are required 2/20
  • 3. Why is QKD not used? Towards high-performance CVQKD Practical security considerations QKD: four main limitations (2/2) Security Incomplete security proofs Distance between proofs and practical implementations Deployment QKD requires a dark fiber: $$$ WDM compatibility: lowers QKD extra premium 3/20
  • 4. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Two technologies Discrete variables Continuous variables medium photon phase/polar. field amplitude-phase detection photon counters coherent detection range 100 km 25km rate 1Mb/s 10kb/s components active cooling standard integration WDM WDM security yes yes 4/20
  • 5. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Gaussian protocol Losses and excess noise lower the SNR. 5/20
  • 6. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Optical setup 6/20
  • 7. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Speed limitations Delay between classical and quantum signals (200ns) Laser pulsed with a tunable frequency (1MHz) Data acquisition speed (up to 5MHz) Filtering: tradeoff between speed and electronic noise (current cutoff at 10MHz, 100MHz feasible arxiv:1006.1257 Yue-Meng Chi et al.) High-speed error correction: LDPC codes (GPU) or polar codes (CPU) (up to 10Mbit/s) (arxiv:1204.5882, P. Jouguet and S. Kunz-Jacques) 7/20
  • 8. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Range limitations High error-correction efficiency, even at low SNRs Finite-size effects Low SNR Alice/Bob synchronization mechanism Low-loss LO path Excess noise (imperfect relative phase estimation) New SNR regions allowed by error-correction techniques. 8/20
  • 9. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Channel virtualization Idea introduced by Leverrier (Phys. Rev. A 77, 042325 (2008)) Translates the initial problem into a channel coding problem on a good channel Good means very efficient error-correcting codes available Usual suspect: BIAWGNC 9/20
  • 10. Why is QKD not used? Towards high-performance CVQKD Practical security considerations How to improve the efficiency of the multidimensional scheme? Improve the approximation between the virtual channel and the target channel Improve the efficiency of the codes on the target channel (Phys. Rev. A 84, 062317 (2011), P. Jouguet, S. Kunz-Jacques and A. Leverrier) 10/20
  • 11. Why is QKD not used? Towards high-performance CVQKD Practical security considerations What is a good code for the BIAWGNC? A code is designed for a channel and a SNR Free parameter: the code rate R = n−m , m the number of n parity-check equations, n the length Low SNR / Lot of redundancy / Low rate R Efficiency β (SNR) = C (SNR) Typical values: Slice reconciliation: β = 90%, SNR= 3, @30km Multidimensional reconciliation: β = 89%, SNR= 0.5, @50km 11/20
  • 12. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Set of available codes β SNR 93.6% 1.097 93.1% 0.161 95.8% 0.075 96.9% 0.029 96.6% 0.0145 95.9% 0.00725 12/20
  • 13. Why is QKD not used? Towards high-performance CVQKD Practical security considerations How to get more flexibility on the SNR? Possible to design codes with lower rates Not necessary: repetition codes Shortening, puncturing Optimization on the modulation variance 13/20
  • 14. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Theoretical secret key rate Parameters: VA ∈ {1, 100}, T = 10−0.2d/10 , ξ = 0.01, η = 0.6, Velec = 0.01 1 SNR=1.097 (1) 1 SNR=0.161 (2) 0.1 SNR=0.075 (3) 2 SNR=0.029 (4) Key rate (secret bits/pulse) 3 SNR=0.0145 (5) 0.01 SNR=0.00725 (6) 4 5 0.001 6 0.0001 10−5 10−6 0 20 40 60 80 100 120 140 160 180 Distance (km) 14/20
  • 15. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Finite size effects First analysis for discrete modulation protocols in Phys. Rev. A 81, 062343 (2010), Leverrier et al. Statistical uncertainty over estimated parameters (T , ξ) n K= N (βI (x; y ) −S PE (y ; E ) − ∆(n)) Extended analysis for Gaussian modulation, including imperfect homodyne detection (efficiency, electronic noise) and shot noise estimation (Phys. Rev. A 86, 032309 (2012), poster 33) Main effect: uncertainty on the excess noise ξ 15/20
  • 16. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Experimental results Parameters: d = 53km, η = 0.552, Velec = 0.015, SNR= 0.17, β = 94%, = 10−10 0.002 excess noise std dev of the experimental excess noise std dev of the theoretical estimator (108 samples) std dev of the theoretical estimator (106 samples) 0.0015 Excess noise (shot noise units) 0.001 0.0005 0 -0.0005 0 5 10 15 20 Time (hours) 16/20
  • 17. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Experimental results Parameters: d = 53km,80km, η = 0.552, Velec = 0.015, SNR=0.17,0.08, β = 94%, = 10−10 100000 asymptotic theoretical key rate nite-size theoretical key rate (108 samples) asymptotic experimental point nite-size experimental point (108 samples) 10000 Key rate (bit/s) 1000 100 0 20 40 60 80 100 Distance (km) 17/20
  • 18. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Imperfect preparation Thermal noise (Phys. Rev. A 81, 022318 (2010), Usenko and Filip) Gaussian modulation: truncated and discretized (finite amount of randomness) Can be taken into account into the security proof (Phys. Rev. A 86, 032309 (2012), poster 33) But a lot of random numbers are required (+ sifting and multidimensional protocol) Calibration procedures Calibration of the homodyne detection Calibration of the phase noise 18/20
  • 19. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Summary Long distance CVQKD with Gaussian modulation is possible thanks to low SNR error-correction capability Computing-power consuming because of decoding close to the threshold We use GPU (30× faster than CPU plus friendly Moore’s law) Higher secure distance with virtual Gaussian post-selection? (arxiv:1205.6933, J. Fiurasek, N. J. Cerf, arxiv:1206.0936, N. Walk et al.) Work on WDM coming 19/20
  • 20. Why is QKD not used? Towards high-performance CVQKD Practical security considerations Enquire about Cygnus An open and customizable CVQKD research platform Tests/demonstrations of integration in optical networks 20/20