quantum key distribution (original) (raw)

Definition: methods for the secure distribution of encryption keys

Categories: article belongs to category quantum photonics quantum photonics, article belongs to category methods methods

Related: quantum cryptographyquantum information processingoptical data transmissionsingle-photon sourcesphoton pair sources

Page views in 12 months: 268

DOI: 10.61835/3z2 Cite the article: BibTex BibLaTex plain textHTML Link to this page! LinkedIn

Content quality and neutrality are maintained according to our editorial policy.

📦 For purchasing quantum key distribution, use the RP Photonics Buyer's Guide — an expert-curated directory for finding all relevant suppliers, which also offers advanced purchasing assistance.

What is Quantum Key Distribution?

Quantum key distribution is a technique used in the context of quantum cryptography to generate a perfectly random key (a bit sequence) which is shared by a sender and a recipient while making sure that nobody else has a chance to learn about the key, e.g. by intercepting the communication channel used during the process. Basic principles of quantum mechanics are exploited to ensure that. Only if quantum mechanics were to turn out to be a flawed theory (for which there is no reasonable evidence after decades of intense research), it might be possible to break the security of such a communication system.

Methods of Quantum Key Distribution

The best known and popular scheme of quantum key distribution is based on the Bennet–Brassard protocol (in short: BB84), which was invented in 1984 [1]. It relies on the no-cloning theorem [3, 4] for non-orthogonal quantum states. For example, it can be implemented using polarization states of single photons. Essentially, the Bennet–Brassard protocol works as follows:

A possible eavesdropper (called Eve) would have to detect the photons' polarization directions without knowing the corresponding base states. In those cases where Eve's guess concerning the base states is wrong, Eve obtains random results. If Eve sends out photons with these polarization directions, Bob's results will also be random in cases where Bob's guess was right. This will therefore be detected during the last stage (the bit verification). Quantum mechanics would not allow Eve to do a polarization measurement without projecting the photon state onto the chosen base states, i.e., without altering the photon states.

Note that Alice and Bob actually need to carry out secure authentication to prevent an interceptor from manipulating their public communications. This also requires some secret key, which at first glance would seem to lead to a catch-22 situation: you need a secret key to generate another secret key. However, authentication requires only a short key, whereas the quantum key distribution scheme can generate a much longer one and is therefore still useful.

Some remaining problems are:

A modified cryptography scheme was suggested in 1991 by Ekert [2]. Here, entangled states are used instead of the randomly chosen measurement basis. In many respects, this protocol is similar to the BB84 protocol.

Some quantum key distribution systems have been demonstrated which promise unconditional security for transmission distances up to a few tens of kilometers, although at least one system has been proven not to be perfectly secure; successful eavesdropping has been demonstrated [11]. It should be possible, however, to eliminate such security loopholes with more careful implementations. Further system refinements should also allow for transmission distances over 100 km. Research is also directed at developing more practical single-photon and correlated photon pair sources, based on, e.g., spontaneous parametric downconversion in ($\chi^{(2)}$) crystals or spontaneous four-wave mixing in optical fibers.

There are already some commercial quantum key distribution systems which can be used by banks, for example.

Suppliers

Bibliography

[1] C. H. Bennet and G. Brassard, “Quantum Cryptography: Public key distribution and coin tossing”, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, p. 175 (1984) (Bennet–Brassard protocol)
[2] A. Ekert, “Quantum cryptography based on Bell´s theorem”, Phys. Rev. Lett. 67 (6), 661 (1991); doi:10.1103/PhysRevLett.67.661
[3] W. K. Wooters and W. H. Zurek, “A single quantum cannot be cloned”, Nature 299, 802 (1982) (no-cloning theorem); doi:10.1038/299802a0
[4] N. J. Cerf and J. Fiurasek, “Optical quantum cloning — a review”, Prog. Opt. 49, 455 (2006)
[5] A. Tanaka et al., “Ultra fast quantum key distribution over a 97 km installed telecom fiber with wavelength division multiplexing clock synchronization”, Opt. Express 16 (15), 11354 (2008); doi:10.1364/OE.16.011354
[6] C. Erven et al., “Entangled quantum key distribution over two free-space optical links”, Opt. Express 16 (21), 16840 (2008); doi:10.1364/OE.16.016840
[7] A. R. Dixon et al., “Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate”, Opt. Express 16 (23), 18790 (2008); doi:10.1364/OE.16.018790
[8] C. Bonato et al., “Feasibility of satellite quantum key distribution”, New J. Phys. 11, 045017 (2009); doi:10.1088/1367-2630/11/4/045017
[9] V. Scarani et al., “The security of practical quantum key distribution”, Rev. Mod. Phys. 81 (3), 1301 (2009); doi:10.1103/RevModPhys.81.1301
[10] D. Stucki et al., “High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres”, New J. Phys. 11, 075003 (2009); doi:10.1088/1367-2630/11/7/075003
[11] I. Gerhardt et al., “Full-field implementation of a perfect eavesdropper on a quantum cryptography system”, Nature Commun. 2, 349 (2011), DOI: 10.1038/ncomms1348; doi:10.1038/ncomms1348
[12] H-K. Lo, M. Curty and K. Tamaki, “Secure quantum key distribution” (review paper), Nature Photon. 8, 595 (2014); doi:10.1038/nphoton.2014.149
[13] S. Liao et al., “Satellite-to-ground quantum key distribution”, Nature 549 (7670), 43-47 (2017); doi:10.1038/nature23655
[14] Q. Zhang et al., “Large scale quantum key distribution: challenges and solutions”, Opt. Express 26 (18), 24260 (2018); doi:10.1364/OE.26.024260
[15] M. Pittaluga et al., “600-km repeater-like quantum communications with dual-band stabilization”, Nature Photonics 15, 530 (2021); doi:10.1038/s41566-021-00811-0
[16] J.-P. Chen et al., “Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas”, Nature Photonics 15, 570 (2021); doi:10.1038/s41566-021-00828-5
[17] S. Wang et al., “Twin-field quantum key distribution over 830-km fibre”, Nature Photonics 16, 154 (2022); doi:10.1038/s41566-021-00928-2

(Suggest additional literature!)

Questions and Comments from Users

Here you can submit questions and comments. As far as they get accepted by the author, they will appear above this paragraph together with the author’s answer. The author will decide on acceptance based on certain criteria. Essentially, the issue must be of sufficiently broad interest.

Please do not enter personal data here. (See also our privacy declaration.) If you wish to receive personal feedback or consultancy from the author, please contact him, e.g. via e-mail.

By submitting the information, you give your consent to the potential publication of your inputs on our website according to our rules. (If you later retract your consent, we will delete those inputs.) As your inputs are first reviewed by the author, they may be published with some delay.