159 results on '"Lucamarini, Marco"'
Search Results
2. Quantum communications feasibility tests over a UK-Ireland 224-km undersea link
- Author
-
Amies-King, Ben, Schatz, Karolina P., Duan, Haofan, Biswas, Ayan, Bailey, Jack, Felvinti, Adrian, Winward, Jaimes, Dixon, Mike, Minder, Mariella, Kumar, Rupesh, Albosh, Sophie, and Lucamarini, Marco
- Subjects
Quantum Physics - Abstract
The future quantum internet will leverage existing communication infrastructures, including deployed optical fibre networks, to enable novel applications that outperform current information technology. In this scenario, we perform a feasibility study of quantum communications over an industrial 224 km submarine optical fibre link deployed between Southport in the United Kingdom (UK) and Portrane in the Republic of Ireland (IE). With a characterisation of phase drift, polarisation stability and arrival time of entangled photons, we demonstrate the suitability of the link to enable international UK-IE quantum communications for the first time., Comment: 11 pages, 6 figures
- Published
- 2023
- Full Text
- View/download PDF
3. State-Blocking Side-Channel Attacks and Autonomous Fault Detection in Quantum Key Distribution
- Author
-
Young, Matt, Lucamarini, Marco, and Pirandola, Stefano
- Subjects
Quantum Physics ,Computer Science - Cryptography and Security - Abstract
Side-channel attacks allow an Eavesdropper to use insecurities in the practical implementation of QKD systems to gain an advantage that is not considered by security proofs that assume perfect implementations. In this work we specify a side-channel capability for Eve that has yet to be considered, before then going on to discuss a scheme to autonomously detect such an attack during an ongoing QKD session, and the limits as to how fast a detection can be made. The side-channel capability is very general and covers a wide variety of possible implementations for the attack itself. We present how Alice and Bob can put in place a countermeasure to continue use of the QKD system, once a detection is made, regardless of the ongoing side-channel attack. This prevents downtime of QKD systems, which in critical infrastructure could pose severe risks. We then extend Eves side-channel capability and present a modified attack strategy. This strengthened attack can be detected under certain conditions by our scheme, however intelligent choices of parameters from Eve allow her strengthened attack to go undetected. From this, we discuss the implications this has on Privacy Amplification, and therefore on the security of QKD as a whole. Finally, consideration is given as to how these types of attacks are analogous to certain types of faults in the QKD system, how our detection scheme can also detect these faults, and therefore how this adds autonomous fault detection and redundancy to implementations of QKD., Comment: 8 pages, 5 figures, to be submitted to Physical Review A
- Published
- 2023
4. Real-time operation of a multi-rate, multi-protocol quantum key distribution transmitter
- Author
-
De Marco, Innocenzo, Woodward, Robert I., Roberts, George L., Paraïso, Taofiq K., Roger, Thomas, Sanzaro, Mirko, Lucamarini, Marco, Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
Quantum key distribution (QKD) is the best candidate for securing communications against attackers, who may in the future exploit quantum-enhanced computational powers to break classical encryption. As such, new challenges are arising from our need for large-scale deployment of QKD systems. In a realistic scenario, transmitting and receiving devices from different vendors should be able to communicate with each other without the need for matching hardware. Therefore, practical deployment of QKD would require hardware capable of adapting to different protocols and clock rates. Here, we address this challenge by presenting a multi-rate, multi-protocol QKD transmitter linked to a correspondingly adaptable QKD receiver. The flexibility of the transmitter, achieved by optical injection locking, allows us to connect it with two receivers with inherently different clock rates. Furthermore, we demonstrate the multi-protocol operation of our transmitter, communicating with receiving parties employing different decoding circuits., Comment: 7 pages, 4 figures
- Published
- 2021
5. Coherent phase transfer for real-world twin-field quantum key distribution
- Author
-
Clivati, Cecilia, Meda, Alice, Donadello, Simone, Virzì, Salvatore, Genovese, Marco, Levi, Filippo, Mura, Alberto, Pittaluga, Mirko, Yuan, Zhiliang L., Shields, Andrew J., Lucamarini, Marco, Degiovanni, Ivo Pietro, and Calonico, Davide
- Subjects
Quantum Physics ,Physics - Optics - Abstract
Quantum mechanics allows the distribution of intrinsically secure encryption keys by optical means. Twin-field quantum key distribution is the most promising technique for its implementation on long-distance fibers, but requires stabilizing the optical length of the communication channels between parties. In proof-of-principle experiments based on spooled fibers, this was achieved by interleaving the quantum communication with periodical adjustment frames. In this approach, longer duty cycles for the key streaming come at the cost of a looser control of channel length, and a successful key-transfer using this technique in a real world remains a significant challenge. Using interferometry techniques derived from frequency metrology, we developed a solution for the simultaneous key streaming and channel length control, and demonstrate it on a 206 km field-deployed fiber with 65 dB loss. Our technique reduces the quantum-bit-error-rate contributed by channel length variations to <1%, representing an effective solution for real-world quantum communications.
- Published
- 2020
- Full Text
- View/download PDF
6. 600 km repeater-like quantum communications with dual-band stabilisation
- Author
-
Pittaluga, Mirko, Minder, Mariella, Lucamarini, Marco, Sanzaro, Mirko, Woodward, Robert I., Li, Ming-Jun, Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
Twin-field (TF) quantum key distribution (QKD) fundamentally alters the rate-distance relationship of QKD, offering the scaling of a single-node quantum repeater. Although recent experiments have demonstrated the new opportunities for secure long-distance communications allowed by TF-QKD, formidable challenges remain to unlock its true potential. Previous demonstrations have required intense stabilisation signals at the same wavelength as the quantum signals, thereby unavoidably generating Rayleigh scattering noise that limits the distance and bit rate. Here, we introduce a novel dual-band stabilisation scheme that overcomes past limitations and can be adapted to other phase-sensitive single-photon applications. Using two different optical wavelengths multiplexed together for channel stabilisation and protocol encoding, we develop a setup that provides repeater-like key rates over record communication distances of 555 km and 605 km in the finite-size and asymptotic regimes respectively, and increases the secure key rate at long distance by two orders of magnitude to values of practical significance., Comment: Final version of the manuscript. 18 pages, 5 figures. Methods and supplementary materials are included
- Published
- 2020
- Full Text
- View/download PDF
7. Intrinsic mitigation of the after-gate attack in quantum key distribution through fast-gated delayed detection
- Author
-
Koehler-Sidki, Alex, Dynes, James F., Martinez, Amos, Lucamarini, Marco, Roberts, George L., Sharpe, Andrew W., Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics ,Physics - Instrumentation and Detectors ,Physics - Optics - Abstract
The information theoretic security promised by quantum key distribution (QKD) holds as long as the assumptions in the theoretical model match the parameters in the physical implementation. The superlinear behaviour of sensitive single-photon detectors represents one such mismatch and can pave the way to powerful attacks hindering the security of QKD systems, a prominent example being the after-gate attack. A longstanding tenet is that trapped carriers causing delayed detection can help mitigate this attack, but despite intensive scrutiny, it remains largely unproven. Here we approach this problem from a physical perspective and find new evidence to support a detector's secure response. We experimentally investigate two different carrier trapping mechanisms causing delayed detection in fast-gated semiconductor avalanche photodiodes, one arising from the multiplication layer, the other from the heterojunction interface between absorption and charge layers. The release of trapped carriers increases the quantum bit error rate measured under the after-gate attack above the typical QKD security threshold, thus favouring the detector's inherent security. This represents a significant step to avert quantum hacking of QKD systems., Comment: 8 pages, 6 figures
- Published
- 2019
- Full Text
- View/download PDF
8. Simple source device-independent continuous-variable quantum random number generator
- Author
-
Smith, Peter Raymond, Marangon, Davide G., Lucamarini, Marco, Yuan, Zhiliang, and Shields, Andrew
- Subjects
Quantum Physics ,Physics - Optics - Abstract
Phase-randomized optical homodyne detection is a well-known technique for performing quantum state tomography. So far, it has been mainly considered a sophisticated tool for laboratory experiments but unsuitable for practical applications. In this work, we change the perspective and employ this technique to set up a practical continuous-variable quantum random number generator. We exploit a phase-randomized local oscillator realized with a gain-switched laser to bound the min-entropy and extract true randomness from a completely uncharacterized input, potentially controlled by a malicious adversary. Our proof-of-principle implementation achieves an equivalent rate of 270 Mbit/s. In contrast to other source-device-independent quantum random number generators, the one presented herein does not require additional active optical components, thus representing a viable solution for future compact, modulator-free, certified generators of randomness.
- Published
- 2019
- Full Text
- View/download PDF
9. A Modulator-Free Quantum Key Distribution Transmitter Chip
- Author
-
Paraïso, Taofiq K., De Marco, Innocenzo, Roger, Thomas, Marangon, Davide G., Dynes, James F., Lucamarini, Marco, Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
Quantum key distribution (QKD) has convincingly been proven compatible with real life applications. Its wide-scale deployment in optical networks will benefit from an optical platform that allows miniature devices capable of encoding the necessarily complex signals at high rates and with low power consumption. While photonic integration is the ideal route toward miniaturisation, an efficient route to high-speed encoding of the quantum phase states on chip is still missing. Consequently, current devices rely on bulky and high power demanding phase modulation elements which hinder the sought-after scalability and energy efficiency. Here we exploit a novel approach to high-speed phase encoding and demonstrate a compact, scalable and power efficient integrated quantum transmitter. We encode cryptographic keys on-demand in high repetition rate pulse streams using injection-locking with deterministic phase control at the seed laser. We demonstrate record secure-key-rates under multi-protocol operation. Our modulator-free transmitters enable the development of high-bit rate quantum communications devices, which will be essential for the practical integration of quantum key distribution in high connectivity networks., Comment: 8 pages, 3 figures
- Published
- 2019
- Full Text
- View/download PDF
10. Overcoming the rate-distance barrier of quantum key distribution without using quantum repeaters
- Author
-
Lucamarini, Marco, Yuan, Zhiliang, Dynes, James F., and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
Quantum key distribution (QKD) allows two distant parties to share encryption keys with security based on physical laws. Experimentally, it has been implemented with optical means, achieving key rates of 1.26 Megabit/s over 50 kilometres (km) of standard optical fibre and 1.16 bit/hour over 404 km of ultralow-loss fibre in a measurement-device-independent configuration. Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, currently considered unfeasible without quantum repeaters, is overcoming the fundamental rate-distance limit of point-to-point QKD. Here we introduce a conceptually new scheme where pairs of phase-randomised optical fields are first generated at two distant locations and then combined at a central measuring station. The fields imparted with the same random phase are "twins" and can be employed to distil a quantum key, as we prove under an explicit security assumption. The key rate of this Twin-Field QKD (TF-QKD) shows the same dependence on distance as a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of whom is in control of the measuring station. Differently from a quantum repeater, however, the new scheme is feasible with current technology and presents manageable levels of noise even on 550 km of standard optical fibre. This is promising to overcome the QKD rate-distance barrier and to greatly extend the range of secure quantum communications., Comment: 4 pages, 3 figures. Supplementary information included as ancillary file on this page
- Published
- 2018
- Full Text
- View/download PDF
11. Twin-field QKD in a real-world network
- Author
-
Meda, Alice, primary, Virzì, Salvatore, additional, Clivati, Cecilia, additional, Liorni, Carlo, additional, Bertaina, Gianluca, additional, Donadello, Simone, additional, Gramegna, Marco, additional, Degiovanni, Ivo Pietro, additional, Pittaluga, Mirko, additional, Lucamarini, Marco, additional, Yuan, Zhiliang, additional, Shields, Andrew, additional, Dispenza, Massimiliano, additional, Genovese, Marco, additional, and Calonico, Davide, additional
- Published
- 2024
- Full Text
- View/download PDF
12. Intensity modulation as a preemptive measure against blinding of single-photon detectors based on self-differencing cancellation
- Author
-
Koehler-Sidki, Alexander, Lucamarini, Marco, Dynes, James F., Roberts, George L., Sharpe, Andrew W., Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics ,Physics - Instrumentation and Detectors - Abstract
Quantum key distribution is rising as an important cryptographic primitive for protecting the communication infrastructure in the digital era. However, its implementation security is often weakened by components whose behavior deviates from what is expected. Here, we analyse the response of a self-differencing avalanche photodiode, a key enabler for high speed quantum key distribution, to intense light shone from a continuous-wave laser. Under incorrect settings, the cancellation entailed by the self-differencing circuitry can make the detector insensitive to single photons. However, we experimentally demonstrate that even in such cases intensity modulation can be used as an effective measure to restore the detector's expected response to the input light.
- Published
- 2018
- Full Text
- View/download PDF
13. Long term test of a fast and compact Quantum Random Number Generator
- Author
-
Marangon, Davide G., Plews, Alan, Lucamarini, Marco, Dynes, James F., Sharpe, Andrew W., Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
Random numbers are an essential resource to many applications, including cryptography and Monte Carlo simulations. Quantum random number generators (QRNGs) represent the ultimate source of randomness, as the numbers are obtained by sampling a physical quantum process that is intrinsically probabilistic. However, they are yet to be widely employed to replace deterministic pseudo random number generators (PRNG) for practical applications. QRNGs are regarded as interesting devices. However they are slower than PRNGs for simulations and are typically seen as clumsy laboratory prototypes, prone to failures and unreliable for cryptographic applications. Here we overcome these limitations and demonstrate a compact and self-contained QRNG capable of generating random numbers at a pace of 8 Gbit/s uninterruptedly for 71 days. During this period, the physical parameters of the quantum process were monitored in real time by self-checking functions implemented in the generator itself. At the same time, the output random numbers were analyzed with the most stringent suites of statistical tests. The analysis shows that the QRNG under test sustained the continuous operation without physical instabilities or hardware failures. At the same time, the output random numbers were analyzed with the most stringent suites of statistical tests, which were passed during the whole operation time. This extensive trial demonstrates the reliability of a robustly designed QRNG and paves the way to its use in practical applications based on randomness., Comment: 8 pages, 7 figures
- Published
- 2018
- Full Text
- View/download PDF
14. Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound
- Author
-
Tamaki, Kiyoshi, Lo, Hoi-Kwong, Wang, Wenyuan, and Lucamarini, Marco
- Subjects
Quantum Physics - Abstract
Quantum key distribution is a way to distribute secret keys to distant users with information theoretic security and key rates suitable for real-world applications. Its rate-distance figure, however, is limited by the natural loss of the communication channel and can never surpass a theoretical limit known as point-to-point secret key capacity. Recently, a new type of quantum key distribution with an intermediate relay was proposed to overcome this limit (M. Lucamarini, Z. L. Yuan, J. F. Dynes and A. J. Shields, Nature, 2018). However, a standard application of the decoy state method limited the security analysis of this scheme to hold under restrictive assumptions for the eavesdropper. Hence, overcoming the point-to-point secret key capacity with an information-theoretic secure scheme is still an open question. Here, we propose a novel way to use decoy states to answer this question. The key idea is to switch between a Test mode and a Code mode, the former enabling the decoy state parameter estimation and the latter generating a key through a phase encoding protocol. This way, we confirm the scaling properties of the original scheme and overcome the secret key capacity at long distances. Our work plays a key role to unlock the potential of practical secure quantum communications., Comment: 25 pages, 3 figures
- Published
- 2018
15. On the security of two-way quantum key distribution
- Author
-
Shaari, Jesni Shamsul, Mancini, Stefano, Pirandola, Stefano, and Lucamarini, Marco
- Subjects
Quantum Physics - Abstract
An author (arXiv:1709.09262 [quant-ph] (2017), Nanoscale Research Letters (2017) 12:552) has recently questioned the security of two-way quantum key distribution schemes by referring to attack strategies which leave no errors in the (raw) key shared by the legitimate parties. We argue that the article is based on a flawed understanding of the actual workings of a two-way protocol, thus the erroneous conclusions drawn thereof.
- Published
- 2018
16. Decoy-state quantum key distribution with a leaky source
- Author
-
Tamaki, Kiyoshi, Curty, Marcos, and Lucamarini, Marco
- Subjects
Quantum Physics - Abstract
In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems., Comment: 37 pages, 5 figures
- Published
- 2018
- Full Text
- View/download PDF
17. Author Correction: Coherent phase transfer for real-world twin-field quantum key distribution
- Author
-
Clivati, Cecilia, Meda, Alice, Donadello, Simone, Virzì, Salvatore, Genovese, Marco, Levi, Filippo, Mura, Alberto, Pittaluga, Mirko, Yuan, Zhiliang, Shields, Andrew J., Lucamarini, Marco, Degiovanni, Ivo Pietro, and Calonico, Davide
- Published
- 2022
- Full Text
- View/download PDF
18. Coherent phase transfer for real-world twin-field quantum key distribution
- Author
-
Clivati, Cecilia, Meda, Alice, Donadello, Simone, Virzì, Salvatore, Genovese, Marco, Levi, Filippo, Mura, Alberto, Pittaluga, Mirko, Yuan, Zhiliang, Shields, Andrew J., Lucamarini, Marco, Degiovanni, Ivo Pietro, and Calonico, Davide
- Published
- 2022
- Full Text
- View/download PDF
19. Manipulating photon coherence to enhance the security of practical quantum key distribution
- Author
-
Roberts, George L., Lucamarini, Marco, Dynes, James F., Savory, Seb J., Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
Quantum key distribution (QKD) allows two users to communicate with theoretically provable secrecy by encoding information on photonic qubits. Current encoders are complex, however, which reduces their appeal for practical use and introduces potential vulnerabilities to quantum attacks. Distributed-phase-reference (DPR) systems were introduced as a simpler alternative, but have not yet been proven practically secure against all classes of attack. Here we demonstrate the first DPR QKD system with information-theoretic security. Using a novel light source, where the coherence between pulses can be controlled on a pulse-by-pulse basis, we implement a secure DPR system based on the differential quadrature phase shift protocol. The system is modulator-free, does not require active stabilization or a complex receiver, and also offers megabit per second key rates, almost three times higher than the standard Bennett-Brassard 1984 (BB84) protocol. This enhanced performance and security highlights the potential for DPR protocols to be adopted for real-world applications., Comment: 5 pages, 4 figures, supplementary materials included as ancillary file
- Published
- 2017
- Full Text
- View/download PDF
20. Modulator-free coherent-one-way quantum key distribution
- Author
-
Roberts, George L., Lucamarini, Marco, Dynes, James F., Savory, Seb J., Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
Time-bin encoding is an attractive method for transmitting photonic qubits over long distances with minimal decoherence. It allows a simple receiver for quantum key distribution (QKD) that extracts a key by measuring time of arrival of photons and detects eavesdropping by measuring interference of pulses in different time bins. In the past, coherent pulses have been generated using a CW laser and an intensity modulator. A greatly simplified transmitter is proposed and demonstrated here that works by directly modulating the laser diode. Coherence between pulses is maintained by a weak seed laser. The modulator-free source creates time-bin encoded pulses with a high extinction ratio (29.4 dB) and an interference visibility above 97 %. The resulting QKD transmitter gives estimated secure key rates up to 4.57 Mbit/s, the highest yet reported for coherent-one-way QKD, and can be programmed for all protocols using weak coherent pulses., Comment: 4 pages, 3 figures
- Published
- 2017
- Full Text
- View/download PDF
21. Long-distance quantum key distribution secure against coherent attacks
- Author
-
Fröhlich, Bernd, Lucamarini, Marco, Dynes, James F., Comandar, Lucian C., Tam, Winci W. -S., Plews, Alan, Sharpe, Andrew W., Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
Quantum key distribution (QKD) permits information-theoretically secure transmission of digital encryption keys, assuming that the behaviour of the devices employed for the key exchange can be reliably modelled and predicted. Remarkably, no assumptions have to be made on the capabilities of an eavesdropper other than that she is bounded by the laws of Nature, thus making the security of QKD "unconditional". However, unconditional security is hard to achieve in practice. For example, any experimental realisation can only collect finite data samples, leading to vulnerabilities against coherent attacks, the most general class of attacks, and for some protocols the theoretical proof of robustness against these attacks is still missing. For these reasons, in the past many QKD experiments have fallen short of implementing an unconditionally secure protocol and have instead considered limited attacking capabilities by the eavesdropper. Here, we explore the security of QKD against coherent attacks in the most challenging environment: the long-distance transmission of keys. We demonstrate that the BB84 protocol can provide positive key rates for distances up to 240 km without multiplexing of conventional signals, and up to 200 km with multiplexing. Useful key rates can be achieved even for the longest distances, using practical thermo-electrically cooled single-photon detectors., Comment: 6 pages, 3 figures, supplementary information
- Published
- 2017
- Full Text
- View/download PDF
22. Ultra-high bandwidth quantum secured data transmission
- Author
-
Dynes, James F., Tam, Winci W-S., Plews, Alan, Fröhlich, Bernd, Sharpe, Andrew W., Lucamarini, Marco, Yuan, Zhiliang, Radig, Christian, Straw, Andrew, Edwards, Tim, and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
Quantum key distribution (QKD) provides an attractive means for securing communications in optical fibre networks. However, deployment of the technology has been hampered by the frequent need for dedicated dark fibres to segregate the very weak quantum signals from conventional traffic. Up until now the coexistence of QKD with data has been limited to bandwidths that are orders of magnitude below those commonly employed in fibre optic communication networks. Using an optimised wavelength divisional multiplexing scheme, we transport QKD and the prevalent 100 Gb/s data format in the forward direction over the same fibre for the first time. We show a full quantum encryption system operating with a bandwidth of 200 Gb/s over a 100 km fibre. Exploring the ultimate limits of the technology by experimental measurements of the Raman noise, we demonstrate it is feasible to combine QKD with 10 Tb/s of data over a 50 km link. These results suggest it will be possible to integrate QKD and other quantum photonic technologies into high bandwidth data communication infrastructures, thereby allowing their widespread deployment.
- Published
- 2016
- Full Text
- View/download PDF
23. 600-km repeater-like quantum communications with dual-band stabilization
- Author
-
Pittaluga, Mirko, Minder, Mariella, Lucamarini, Marco, Sanzaro, Mirko, Woodward, Robert I., Li, Ming-Jun, Yuan, Zhiliang, and Shields, Andrew J.
- Published
- 2021
- Full Text
- View/download PDF
24. Quantum secured gigabit optical access networks
- Author
-
Fröhlich, Bernd, Dynes, James F., Lucamarini, Marco, Sharpe, Andrew W., Tam, Simon W. -B., Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics ,Physics - Optics - Abstract
Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON). The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future., Comment: 11 pages, 5 figures
- Published
- 2015
- Full Text
- View/download PDF
25. Practical security bounds against the Trojan-horse attack in quantum key distribution
- Author
-
Lucamarini, Marco, Choi, Iris, Ward, Martin B., Dynes, James F., Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security., Comment: 18 pages, 11 figures. Some typos corrected
- Published
- 2015
- Full Text
- View/download PDF
26. Security bounds for efficient decoy-state quantum key distribution
- Author
-
Lucamarini, Marco, Dynes, James F., Fröhlich, Bernd, Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest., Comment: 8 pages, 2 figures, 2 tables. Special Issue on Quantum Communication & Cryptography
- Published
- 2015
- Full Text
- View/download PDF
27. GHz-gated InGaAs/InP single-photon detector with detection efficiency exceeding 55% at 1550 nm
- Author
-
Comandar, Lucian C., Fröhlich, Bernd, Dynes, James F., Sharpe, Andrew W., Lucamarini, Marco, Yuan, Zhiliang, Penty, Richard V., and Shields, Andrew J.
- Subjects
Quantum Physics - Abstract
We report on a gated single-photon detector based on InGaAs/InP avalanche photodiodes (APDs) with a single-photon detection efficiency exceeding 55% at 1550 nm. Our detector is gated at 1 GHz and employs the self-differencing technique for gate transient suppression. It can operate nearly dead time free, except for the one clock cycle dead time intrinsic to self-differencing, and we demonstrate a count rate of 500 Mcps. We present a careful analysis of the optimal driving conditions of the APD measured with a dead time free detector characterization setup. It is found that a shortened gate width of 360 ps together with an increased driving signal amplitude and operation at higher temperatures leads to improved performance of the detector. We achieve an afterpulse probability of 7% at 50% detection efficiency with dead time free measurement and a record efficiency for InGaAs/InP APDs of 55% at an afterpulse probability of only 10.2% with a moderate dead time of 10 ns., Comment: 10 pages, 4 figures
- Published
- 2014
- Full Text
- View/download PDF
28. Quantum Communications Feasibility Tests over a UK-Ireland 224 km Undersea Link
- Author
-
Amies-King, Ben, primary, Schatz, Karolina P., additional, Duan, Haofan, additional, Biswas, Ayan, additional, Bailey, Jack, additional, Felvinti, Adrian, additional, Winward, Jaimes, additional, Dixon, Mike, additional, Minder, Mariella, additional, Kumar, Rupesh, additional, Albosh, Sophie, additional, and Lucamarini, Marco, additional
- Published
- 2023
- Full Text
- View/download PDF
29. A quantum access network
- Author
-
Fröhlich, Bernd, Dynes, James F., Lucamarini, Marco, Sharpe, Andrew W., Yuan, Zhiliang, and Shields, Andrew J.
- Subjects
Quantum Physics ,Physics - Optics - Abstract
The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realising multi-user QKD networks with resource efficiency and brings QKD closer to becoming the first widespread technology based on quantum physics., Comment: 6 pages, 4 figures
- Published
- 2013
- Full Text
- View/download PDF
30. Security of two-way quantum key distribution
- Author
-
Beaudry, Normand J., Lucamarini, Marco, Mancini, Stefano, and Renner, Renato
- Subjects
Quantum Physics - Abstract
Quantum key distribution protocols typically make use of a one-way quantum channel to distribute a shared secret string to two distant users. However, protocols exploiting a two-way quantum channel have been proposed as an alternative route to the same goal, with the potential advantage of outperforming one-way protocols. Here we provide a strategy to prove security for two-way quantum key distribution protocols against the most general quantum attack possible by an eavesdropper. We utilize an entropic uncertainty relation, and only a few assumptions need to be made about the devices used in the protocol. We also show that a two-way protocol can outperform comparable one-way protocols., Comment: 10 pages, 5 figures
- Published
- 2013
- Full Text
- View/download PDF
31. Device-independent entanglement-based Bennett 1992 protocol
- Author
-
Lucamarini, Marco, Vallone, Giuseppe, Gianani, Ilaria, Di Giuseppe, Giovanni, and Mataloni, Paolo
- Subjects
Quantum Physics - Abstract
In this paper we set forth a novel connection between the Bennett 1992 protocol and a Bell inequality. This allows us to extend the usual prepare-and-measure protocol to its entanglement-based formulation. We exploit a recent result in the frame of device-independent quantum key distribution to provide a simple, model-independent, security proof for the new protocol. The minimum efficiency required for a practical implementation of the scheme is the lowest reported to date., Comment: 7 pages, 3 figures. 3nd version: published version
- Published
- 2011
- Full Text
- View/download PDF
32. Quantum Key Distribution and Communication using a Two-way Quantum Channel
- Author
-
Lucamarini, Marco and Mancini, Stefano
- Subjects
Quantum Physics - Abstract
We review a communication protocol recently proposed by us that makes use of a two-way quantum channel. We provide a characterization of such a protocol from a practical perspective, and consider the most relevant eavesdropping strategies against it. This allows us to compare its potentialities with those of a standard protocol which uses a one-way quantum channel., Comment: Submitted in March 2009 to the special issue of Quantum Key Distribution in TCS and NACO
- Published
- 2010
- Full Text
- View/download PDF
33. Compensating the Noise of a Communication Channel via Asymmetric Encoding of Quantum Information
- Author
-
Lucamarini, Marco, Di Giuseppe, Giovanni, Vitali, David, and Tombesi, Paolo
- Subjects
Quantum Physics - Abstract
An asymmetric preparation of the quantum states sent through a noisy channel can enable a new way to monitor and actively compensate the channel noise. The paradigm of such an asymmetric treatment of quantum information is the Bennett 1992 protocol, in which the ratio between conclusive and inconclusive counts is in direct connection with the channel noise. Using this protocol as a guiding example, we show how to correct the phase drift of a communication channel without using reference pulses, interruptions of the quantum transmission or public data exchanges., Comment: 5 pages, 3 figures
- Published
- 2010
- Full Text
- View/download PDF
34. Robust Unconditionally Secure Quantum Key Distribution with Two Nonorthogonal and Uninformative States
- Author
-
Lucamarini, Marco, Di Giuseppe, Giovanni, and Tamaki, Kiyoshi
- Subjects
Quantum Physics - Abstract
We introduce a novel form of decoy-state technique to make the single-photon Bennett 1992 protocol robust against losses and noise of a communication channel. Two uninformative states are prepared by the transmitter in order to prevent the unambiguous state discrimination attack and improve the phase-error rate estimation. The presented method does not require strong reference pulses, additional electronics or extra detectors for its implementation., Comment: 7 pages, 2 figures
- Published
- 2009
- Full Text
- View/download PDF
35. Experimental inhibition of decoherence on flying qubits via bang-bang control
- Author
-
Damodarakurup, Sajeev, Lucamarini, Marco, Di Giuseppe, Giovanni, Vitali, David, and Tombesi, Paolo
- Subjects
Quantum Physics - Abstract
Decoherence may significantly affect the polarization state of optical pulses propagating in dispersive media because of the unavoidable presence of more than a single frequency in the envelope of the pulse. Here we report on the suppression of polarization decoherence in a ring cavity obtained by properly retooling for photonic qubits the ``bang-bang'' protection technique already employed for nuclear spins and nuclear-quadrupole qubits. Our results show that bang-bang control can be profitably extended to quantum information processes involving flying polarization qubits., Comment: 5 pages, 3 figures
- Published
- 2008
- Full Text
- View/download PDF
36. Quantum-limited force measurement with an optomechanical device
- Author
-
Lucamarini, Marco, Vitali, David, and Tombesi, Paolo
- Subjects
Quantum Physics - Abstract
We study the detection of weak coherent forces by means of an optomechanical device formed by a highly reflecting isolated mirror shined by an intense and highly monochromatic laser field. Radiation pressure excites a vibrational mode of the mirror, inducing sidebands of the incident field, which are then measured by heterodyne detection. We determine the sensitivity of such a scheme and show that the use of an entangled input state of the two sideband modes improves the detection, even in the presence of damping and noise acting on the mechanical mode., Comment: 8 pages, 4 figures
- Published
- 2006
- Full Text
- View/download PDF
37. Eavesdropping on Blind Quantum Key Distribution through a Labeling Attack
- Author
-
Lucamarini, Marco
- Subjects
Quantum Physics - Abstract
I present an eavesdropping on the protocol proposed by W.-H. Kye, et al. [Phys. Rev. Lett. 95, 040501 (2005)]. I show how an undetectable Eve can steal the whole information by labeling and then measuring the photons prepared by the user Alice., Comment: Comments and/or opinions are welcome and encouraged
- Published
- 2005
38. Two qubits entanglement dynamics in a symmetry-broken environment
- Author
-
Lucamarini, Marco, Paganelli, Simone, and Mancini, Stefano
- Subjects
Quantum Physics - Abstract
We study the temporal evolution of entanglement pertaining to two qubits interacting with a thermal bath. In particular we consider the simplest nontrivial spin bath models where symmetry breaking occurs and treat them by mean field approximation. We analytically find decoherence free entangled states as well as entangled states with an exponential decay of the quantum correlation at finite temperature., Comment: 10 pages, 2 figures
- Published
- 2004
- Full Text
- View/download PDF
39. Atomic Clocks Technologies for Twin-Field QKD in Real World
- Author
-
Clivati, Cecilia, primary, Meda, Alice, additional, Donadello, Simone, additional, Levi, Filippo, additional, Genovese, Marco, additional, Mura, Alberto, additional, Virzì, Salvatore, additional, Pittaluga, Mirko, additional, Yuan, Zhiliang, additional, Shields, Andrew J., additional, Lucamarini, Marco, additional, Degiovanni, Ivo P., additional, and Calonico, Davide, additional
- Published
- 2023
- Full Text
- View/download PDF
40. Key Rate Analysis of a 3-State Twin-Field Quantum Key Distribution Protocol in the Finite-key Regime
- Author
-
Young, Matt, Bunandar, Darius, Lucamarini, Marco, Pirandola, Stefano, Young, Matt, Bunandar, Darius, Lucamarini, Marco, and Pirandola, Stefano
- Abstract
When analysing Quantum Key Distribution (QKD) protocols several metrics can be determined, but one of the most important is the Secret Key Rate. The Secret Key Rate is the number of bits per transmission that result in being part of a Secret Key between two parties. There are equations that give the Secret Key Rate, for example, for the BB84 protocol, equation 52 from [1, p.1032] gives the Secret Key Rate for a given Quantum Bit Error Rate (QBER). However, the analysis leading to equations such as these often rely on an Asymptotic approach, where it is assumed that an infinite number of transmissions are sent between the two communicating parties (henceforth denoted as Alice and Bob). In a practical implementation this is obviously impossible. Moreover, some QKD protocols belong to a category called Asymmetric protocols, for which it is significantly more difficult to perform such an analysis. As such, there is currently a lot of investigation into a different approach called the Finite-key regime. Work by Bunandar et al. [2] has produced code that used Semi-Definite Programming to produce lower bounds on the Secret Key Rate of even Asymmetric protocols. Our work looks at devising a novel QKD protocol taking inspiration from both the 3-state version of BB84 [3], and the Twin-Field protocol [4], and then using this code to perform analysis of the new protocol., Comment: This manuscript was uploaded to the arXiv by the first author, without approval from co-authors. It is working in progress and contains issues that need to be addressed
- Published
- 2023
41. Practical single-fibre network-oriented quantum key distribution from a compact source of entangled photons in presence of White Rabbit time synchronisation
- Author
-
Schatz, Karolina P., primary, Amies-King, Ben, additional, Albosh, Sophie, additional, Kumar, Rupesh, additional, and Lucamarini, Marco, additional
- Published
- 2023
- Full Text
- View/download PDF
42. Phase noise characterisation of a 2-km hollow-core nested antiresonant nodeless fibre for twin-field quantum key distribution
- Author
-
Minder, Mariella, primary, Albosh, Sophie, additional, Alia, Obada, additional, Slavík, Radan, additional, Kumar, Rupesh, additional, Poletti, Francesco, additional, Kanellos, George T., additional, and Lucamarini, Marco, additional
- Published
- 2023
- Full Text
- View/download PDF
43. Quantum key distribution using a two-way quantum channel
- Author
-
Lucamarini, Marco and Mancini, Stefano
- Published
- 2014
- Full Text
- View/download PDF
44. Experimental repeater-like quantum communications over 600 km of optical fibre aided by wavelength-multiplexed phase stabilization
- Author
-
Pittaluga, Mirko, primary, Minder, Mariella, additional, Lucamarini, Marco, additional, Sanzaro, Mirko, additional, Woodward, Robert I., additional, Yuan, Zhiliang, additional, and Shields, Andrew J., additional
- Published
- 2022
- Full Text
- View/download PDF
45. Characterizing Phase Noise in a Gain-Switched Laser Diode for Quantum Random-Number Generation
- Author
-
Lovic, V, Marangon, Davide Giacomo, Lucamarini, Marco, Yuan, Zhiliang, and Shields, Andrew J.
- Abstract
While operating a quantum random-number generator (QRNG), it is extremely useful to have a model of the physical entropy source to guarantee that the device is delivering randomness of genuine quantum origin. In this work we consider a QRNG based on a gain-switched laser diode and we develop a model to quantify its phase noise. This model is based on the laser rate equations and the state-of-the-art techniques for the characterization of laser diodes used in lightwave systems. These tools let us achieve a faithful modeling of the phase noise and we verify its accuracy through comparisons with experimental measurements. Furthermore, the model can be used to select optimal parameters to maximize the QRNG performance and monitor the device behavior to detect malfunctioning or malicious tampering of the device.
- Published
- 2021
46. Checking noise correlations for safer two-way quantum key distribution
- Author
-
Shaari, Jesni S., Lucamarini, Marco, and Mancini, Stefano
- Published
- 2014
- Full Text
- View/download PDF
47. Secure quantum communications beyond the repeaterless secret key capacity
- Author
-
Lucamarini, Marco, primary
- Published
- 2021
- Full Text
- View/download PDF
48. Out-of-Band Electromagnetic Injection Attack on a Quantum Random Number Generator
- Author
-
Smith, P.R., Marangon, D. G., Lucamarini, Marco, Yuan, Z L, and Shields, Andrew
- Abstract
Random number generators underpin the security of current and future cryptographic systems and are therefore a likely target for attackers. Quantum random number generators have been hailed as the ultimate sources of randomness. However, as shown in this work, the susceptibility of the sensitive electronics required to implement such devices poses a serious threat to their security. We present an out-of-band electromagnetic injection attack on a photonic quantum random number generator through which an adversary can gain full control of the output. In our first experiment, the adversary forces the binary output of the generator to become an alternating string of 1s and 0s, with near 100% success. This attack may be spotted by a vigilant user performing statistical tests on their output strings. We therefore envisage a second more subtle attack in which the adversary forces the output to be a random pattern known to them, thus rendering any protection based on statistical tests ineffective.
- Published
- 2021
49. Gigahertz measurement-device-independent quantum key distribution using directly modulated lasers
- Author
-
Woodward, Robert Ian, Lo, Y. S., Pittaluga, M., Paraiso, T K, Lucamarini, Marco, Yuan, Z L, and Shields, Andrew
- Subjects
Computer Science::Cryptography and Security - Abstract
Measurement-device-independent quantum key distribution (MDI-QKD) is a technique for quantum-secured communication that eliminates all detector side-channels, although is currently limited by implementation complexity and low secure key rates. Here, we introduce a simple and compact MDI-QKD system design at gigahertz clock rates with enhanced resilience to laser fluctuations—thus enabling free-running semiconductor laser sources to be employed without spectral or phase feedback. This is achieved using direct laser modulation, carefully exploiting gain-switching and injection-locking laser dynamics to encode phase-modulated time-bin bits. Our design enables secure key rates that improve upon the state of the art by an order of magnitude, up to 8 bps at 54 dB channel loss and 2 kbps in the finite-size regime for 30 dB channel loss. This greatly simplified MDI-QKD system design and proof-of-principle demonstration shows that MDI-QKD is a practical, high-performance solution for future quantum communication networks.
- Published
- 2021
50. Real-time operation of a multi-rate, multi-protocol quantum key distribution transmitter
- Author
-
De Marco, Innocenzo, primary, Woodward, Robert I., additional, Roberts, George L., additional, Paraïso, Taofiq K., additional, Roger, Thomas, additional, Sanzaro, Mirko, additional, Lucamarini, Marco, additional, Yuan, Zhiliang, additional, and Shields, Andrew J., additional
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.