scholarly journals Modeling quantum optics for quantum key distribution system simulation

Author(s):  
Douglas D Hodson ◽  
Michael R Grimaila ◽  
Logan O Mailloux ◽  
Colin V McLaughlin ◽  
Gerald Baumgartner

This article presents the background, development, and implementation of a simulation framework used to model the quantum exchange aspects of Quantum Key Distribution (QKD) systems. The presentation of our simulation framework is novel from several perspectives, one of which is the lack of published information in this area. QKD is an innovative technology which exploits the laws of quantum mechanics to generate and distribute unconditionally secure cryptographic keys. While QKD offers the promise of unconditionally secure key distribution, real world systems are built from non-ideal components which necessitates the need to understand the impact these non-idealities have on system performance and security. To study these non-idealities we present the development of a quantum communications modeling and simulation capability. This required a suitable mathematical representation of quantum optical pulses and optical component transforms. Furthermore, we discuss how these models are implemented within our Discrete Event Simulation-based framework and show how it is used to study a variety of QKD implementations.

Author(s):  
Ryan D Engle ◽  
Douglas D Hodson ◽  
Logan O Mailloux ◽  
Michael R Grimaila ◽  
Colin V McLaughlin ◽  
...  

Quantum Key Distribution (QKD) systems are a novel technology that exploits the laws of quantum mechanics to generate and distribute unconditionally secure cryptographic keys between two geographically separated parties. They are suitable for use in applications where high levels of secrecy are required, such as banking, government, and military environments. In this paper, we describe the development of a module-based QKD simulation framework that facilitates the modeling of QKD post-processing functionalities. We highlight design choices made to improve upon an initial design, which included the segmentation of functionalities associated with various phases of QKD post-processing into discrete modules implementing abstract interfaces. In addition, communication between modules was improved by implementing observers to share data, and a specific strategy for dealing with post-processing synchronization and configuration activities was designed. Collectively, these improvements resulted in a significantly enhanced analysis capability to model and study the security and performance characteristics associated with specific QKD system designs.


Author(s):  
Ming Fang ◽  
Ya-Ping Li ◽  
Li Fei

Quantum key distribution (QKD) allows authenticated parties to share secure keys. Its security comes from quantum physics rather than computational complexity. The previous work has been able to demonstrate the security of the BB84 protocol based on the uncertainty principle, entanglement purification and information theory. In the security proof method based on entanglement purification, it is assumed that the information of Calderbank–Shor–Steane (CSS) error correction code cannot be leaked, otherwise, it is insecure. However, there is no quantitative analysis of the relationship between the parameter of CSS code and the amount of information leaked. In the attack and defense strategy of the actual quantum key distribution system, especially in the application of the device that is easy to lose or out of control, it is necessary to assess the impact of the parameter leakage. In this paper, we derive the relationship between the leaked parameter of CSS code and the amount of the final key leakage based on the BB84 protocol. Based on this formula, we simulated the impact of different CSS code parameter leaks on the final key amount. Through the analysis of simulation results, the security of the BB84 protocol is inversely proportional to the value of [Formula: see text] and [Formula: see text] in the case of the CSS code leak.


2005 ◽  
Vol 03 (01) ◽  
pp. 141-146 ◽  
Author(s):  
FABIO A. BOVINO ◽  
PIETRO VARISCO ◽  
ANNA MARTINOLI ◽  
PAOLO DE NICOLO ◽  
SANDRA BRUZZO ◽  
...  

We present the architecture and recent experimental results for a quantum key distribution system realized at Elsag spa Quantum Optics Laboratory with a key distribution rate suitable for practical industrial applications. The current system can reliably distribute secure cryptographic keys at a rate of 1,500 bit per second and higher at a few hundred meters, with a quantum bit error rate lower than 1%.


2017 ◽  
Vol 25 (17) ◽  
pp. 20045 ◽  
Author(s):  
Heasin Ko ◽  
Byung-Seok Choi ◽  
Joong-Seon Choe ◽  
Kap-Joong Kim ◽  
Jong-Hoi Kim ◽  
...  

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Shengjun Ren ◽  
Shuai Yang ◽  
Adrian Wonfor ◽  
Ian White ◽  
Richard Penty

AbstractWe present an experimental demonstration of the feasibility of the first 20 + Mb/s Gaussian modulated coherent state continuous variable quantum key distribution system with a locally generated local oscillator at the receiver (LLO-CVQKD). To increase the signal repetition rate, and hence the potential secure key rate, we equip our system with high-performance, wideband devices and design the components to support high repetition rate operation. We have successfully trialed the signal repetition rate as high as 500 MHz. To reduce the system complexity and correct for any phase shift during transmission, reference pulses are interleaved with quantum signals at Alice. Customized monitoring software has been developed, allowing all parameters to be controlled in real-time without any physical setup modification. We introduce a system-level noise model analysis at high bandwidth and propose a new ‘combined-optimization’ technique to optimize system parameters simultaneously to high precision. We use the measured excess noise, to predict that the system is capable of realizing a record 26.9 Mb/s key generation in the asymptotic regime over a 15 km signal mode fibre. We further demonstrate the potential for an even faster implementation.


Sign in / Sign up

Export Citation Format

Share Document