Differential phase shift-quantum key distribution
Differential phase shift-quantum key distribution
net/publication/224453455
CITATIONS READS
5 2,625
4 authors, including:
All content following this page was uploaded by Yasuhiro Tokura on 26 November 2015.
1. Introduction and background power but on the laws of quantum mechanics [1].
Secure communications is one of the most impor- 1.1 Quantum key distribution
tant topics in the telecommunication field. At present, Quantum cryptography allows two physically sep-
cryptography, the art of hiding information in a string arated parties to create a random secret key. For this
of bits meaningless to any unauthorized party, is usu- reason, it is often called quantum key distribution
ally used for secure communications. (QKD). Once a sender (Alice) and a receiver (Bob)
Classical cryptography, whose security is based on share random secret keys, they can achieve perfectly
the need for a large amount of computation, is wide- secure communication using a one-time-pad method,
ly used in today’s communications systems. Howev- which has been proved to provide complete security.
er, this type of cryptography will be vulnerable to In short, QKD is a technique for establishing a
attack from clever eavesdroppers in the future. For quantum channel on which Alice and Bob can detect
example, RSA public key cryptography (named after the existence of an eavesdropper. When this quantum
Rivest, Shamir, and Adleman) is based on the diffi- channel is available, Alice and Bob can create a key
culty of factoring large integers. If an efficient way to through it and can be assured of the security of the
factorize large integers is found, RSA will no longer key. The quantum channel is constructed based on the
be secure. In fact, with the advent of quantum com- following theorem in quantum mechanics: an eaves-
puters, it will be possible to factor large numbers in dropper (Eve) cannot acquire any information from a
an instant. Therefore, a lot of activity is being focused quantum state transmitted from Alice to Bob without
on finding cryptography schemes that will provide disturbing its quantum state, so when Eve acquires
ultimately secure communications. some information from the quantum state, the state is
Now quantum cryptography is in the spotlight. perturbed and a key bit error is induced. This theorem
Even if a quantum computer is made, quantum cryp- is deduced from the following laws of quantum
tography provides ultimately secure communications mechanics.
because its security is based not on computational (1) With an appropriate measurement basis, a cer-
tain physical property of a quantum state is determi-
† NTT Basic Research Laboratories nately measured. But with another measurement
Atsugi-shi, 243-0198 Japan basis, the physical property is measured probabilisti-
E-mail: [email protected] cally.
(2) No one can clone an unknown quantum state in error-corrected keys using a universal hash function.
general. Then they distill a fully secret key, which can be used
Based on the above idea, Alice and Bob can gener- with full confidence to encrypt a message.
ate a secret key as follows. Alice encodes the bit
information onto quantum states and sends it to Bob 1.2 Conventional QKD protocol and
through the quantum channel. Bob randomly chooses implementation
a measurement basis for each quantum state and mea- Several protocols have been proposed for the above
sures the state. After that, Bob discloses the measure- idea, such as BB84 [2], B92 [3], and E91 [4]. Here,
ment basis and then Alice and Bob choose the proper we overview BB84, the most famous QKD protocol,
bits, which could be a raw key. To check the existence to explain the above idea. We also introduce Plug &
of an eavesdropper, Alice and Bob choose a fraction Play QKD, which is a widely performed fiber-based
of their raw keys and compare them over a public BB84-QKD implementation.
(classical) channel. If an eavesdropper measures the 1.2.1 BB84 protocol
quantum state to steal the information, the quantum BB84, which was proposed by Bennett and Bras-
state changes and a key bit error is induced with some sard in 1984, is a QKD protocol using four quantum
probability. Thus, from the error rate in the test bits, states with two non-orthogonal bases. In practice, a
Alice and Bob can detect whether an eavesdropper single photon is used as a quantum state. In imple-
exists or not and also evaluate the amount of leaked menting the BB84 protocol, there are two ways to
information, assuming that all errors, including those encode bit information onto a single photon: polar-
due to imperfections in practical systems, result from ization encoding and phase encoding. Here, we
eavesdropping. If the estimated information leakage describe polarization encoding because it is easy to
exceeds an upper bound, they discard their raw keys. understand intuitively.
If the error rate or leakage is small, they perform the Figure 1 shows the sequence of the BB84 protocol.
following sequence. First, Alice and Bob perform First, Alice sends single photons in one of four polar-
error correction to obtain a matched bit string. The ization states: vertical linear, horizontal linear, right
obtained string may not be completely private. To circular, or left circular. She randomly chooses one of
eliminate the possibility of leakage, Alice and Bob the polarization states for each photon and records
perform privacy amplification [1], which shortens the her choice. Bob has two filters and selects one of
Eve
Filter 1
Filter 2
Eavesdropping
Intercept Resend
Filter 1
Alice Bob
Polarization Right Horiz. Left Vert.
state
Filter 2
Classical channel
Bob’s measurement biases Measurement biases
them randomly before measuring each photon. One posed by Muller et al. [5]. In this system, instead of
of the filters allows him to distinguish between hori- being encoded onto polarization states, the bit infor-
zontally and vertically polarized photons, whereas mation is encoded onto the relative phase of the
the other distinguishes between right and left circu- superposition of single photon states. This is what is
larly polarized ones. When Bob chooses the matched known as phase coding. Most experiments and com-
filter, he gets the correct output. When Bob chooses mercial products use this QKD setup.
the filter that does not correspond to the polarization Figure 2 shows the schematic diagram of the Plug
state sent by Alice, each outcome can occur with 50% & Play QKD system. Bob injects a light pulse
probability. Bob records the filters used and the out- through a circulator. The pulse is split into two puls-
comes. es at a coupler. One pulse takes the short arm and the
Second, after receiving a sufficient number of pho- other takes the long arm. A polarization controller is
tons, Bob announces through a public channel which set in each arm so that the pulse is completely trans-
filter he used for each photon, but does not reveal the mitted at the polarization beam splitter. The pulses
measurement results. Alice compares Bob’s data with propagate to Alice and are reflected by a Faraday mir-
the list of states she sent, and tells Bob for which pho- ror. One pulse is phase modulated at PM(a) by φa = {0
or π or π or 3π } at Alice’s site. The light power is
tons he used a compatible filter, but not the polariza-
tion states themselves. In cases where states and fil- 2 2
ters are compatible, they keep the data. Otherwise the attenuated to be 0.1 photon per pulse, and then the
data are simply discarded. Under the agreement that pulses travel back to Bob. Thanks to the effect of the
vertical linear or right circular polarization states Faraday mirror, the birefringence of the optical fiber
denote a “0” bit and horizontal linear or left circular is automatically compensated, and the pulse comes
polarization states denote a “1” bit, Alice and Bob back orthogonally polarized. Each pulse travels
can share the same bit string, which could be a raw through the counter arm. The light that passes
key. through the long arm is phase modulated at PM(b) by
φb = {0 or π } at Bob’s site. Since the pulses travel
Third, Alice and Bob each choose a fraction of their
raw keys and compare them over a public channel to 2
assess the secrecy of their communication. They per- through the same optical path, they stably interfere
form error correction and privacy amplification, as with each other at the coupler. The relative phase
described in the previous section. Then, Alice and between φa at Alice’s site and φb at Bob’s determines
Bob can share a secret key, which can be used with which photon detector clicks, DET1 or DET2.
perfect confidence to encrypt a message. With this setup, Alice randomly chooses one of four
phase modulations: 0, π , π, or 3π , which corresponds
1.2.2 Plug & Play QKD
Though QKD using polarization states is easy to 2 2
understand, it is not suitable for fiber transmission, to the choice of polarization states mentioned in the
because the polarization state is not maintained BB84 protocol explanation. Bob randomly chooses one
of two phase modulations: 0 or π , which corresponds
because of the birefringence in optical fiber. A QKD
setup suitable for fiber transmission has been pro- 2
Bob
Alice
Polarization DET1
Faraday Phase beam
Fiber splitter
mirror modulator Attenuator DET2
PM(a)
Phase 50:50
π 3π Circulator
φa = 0, , π, modulator coupler
2 2
PM(b)
Intensity
π modulator
φb = 0,
2
Laser diode
t4 t3 t2 t1 Time
Protocol
Alice Bob
Time t1 t2 t3 t4 t5 t6 t7 Time t2 t4 t6
Phase Detector Det2 Det1 Det2
0 π 0 0 0 π 0
difference
Phase
π 0 π
Time t2 t4 t6 difference
by detector 1 denotes “0” and a click by detector 2 Bob’s long path. In the second case the detector clicks
denotes “1”, for example, Alice and Bob obtain an according to the phase difference between the two
identical bit string. time slots, which gives a correct answer. Bob does not
notice any eavesdropping in this case. However, no
2.2 Eavesdropping interference occurs and the detectors click randomly
DPS-QKD uses the uncertainty of the detection at the first and third time instances. A bit error is
time of photons. If an eavesdropper steals a photon introduced by these detection events. The probability
and sends a fake one, Alice and Bob notice the exis-
of clicks at the first or third time instances is 1 , so
tence of the eavesdropper from the bit error induced 2
by the detection timing error. 1
the error rate is . The eavesdropping is revealed
Here, we show one example of security against one 4
type of intercept-resend attack. Eve intercepts and from this error rate.
measures transmitted states and resends a false signal
to Bob according to her measurement, as illustrated 2.3 Features
in Fig. 4. Eve cannot measure every phase difference DPS-QKD has several advantages over convention-
because the transmitted state is less than one photon al QKD schemes.
per pulse. Eve thus sends a signal only when she First, this scheme is polarization insensitive, pro-
detects a photon. She sends a single photon split into vided that a polarization insensitive interferometer is
two time slots through an interferometer identical to available. In our scheme, the information is carried by
Bob’s, in which the relative phase between the two the phase difference between two sequential pulses.
time slots is 0 or π depending on the measured phase Though the polarization state changes after propaga-
difference. For unmeasured time slots, on the other tion through the fiber, two sequential pulses experi-
hand, she sends no photon. This fake signal generates ence the same change so they have the same polar-
the same count rate in Bob’s detectors as the original ization state at the fiber output, as long as the time
one. Bob does not notice the eavesdropping from the interval of two sequential pulses is much shorter than
photon counting rate. However, a bit error is intro- the time constant of the change in the fiber. This con-
duced from this fake signal as follows. When a pho- dition is satisfied in actual systems because changes
ton split into two time slots arrives at Bob’s site, he in temperature and/or mechanical pressure have a
could count a photon at one of three possible time slow time constant compared with the pulse interval.
instances: (1) when a photon passes through the short Therefore, nearly perfect interference between two
path in Eve’s interferometer and the short path in sequential pulses is possible independent of polariza-
Bob’s interferometer, (2) when a photon passes tion change in fiber.
through Eve’s short path and Bob’s long path or Second, DPS-QKD has a simpler receiver setup and
through Eve’s long path and Bob’s short path, or (3) thus smaller loss than other QKD setups. For exam-
when a photon passes through Eve’s long path and ple, in the Plug & Play QKD setup, there are (as men-
Eve
1-bit delay DET1
circuit
DET2
π π
0
Bob
1-bit delay DET1
Alice circuit
DET2
t3 t2 t1
Time
tioned before) many components, which increase the 2.4.1 Performance of the PLC Mach-Zehnder
excess loss at the receiver’s site. In DPS-QKD on the interferometer
other hand, there is only one interferometer at the Before conducting the transmission experiment, we
receiver’s site so the excess loss is much smaller. Very evaluated the performance of the PLC Mach-Zehnder
few photons are lost at the receiver’s site, which interferometer. We used one packaged with input and
means we can achieve a high key generation rate. output fibers. A peltier device and a thermistor were
Third, key generation efficiency is high compared attached to the PLC chip to control the temperature,
with conventional QKD protocols. In the BB84 pro- so the phase difference between the two waveguide
tocol, half of the received photons are discarded paths could be stably controlled. The path-length dif-
because they are basis-mismatched. On the other ference was 20 cm, which introduced a one-bit delay
hand, the DPS-QKD protocol utilizes all photons for of 1 ns at 1 Gbit/s. The excess loss of the interferom-
creating a key, which provides high efficiency. eter was 2.64 dB (fiber-to-fiber). The PLC is sensitive
Fourth, in the DPS-QKD setup, it is possible to to the polarization state due to its birefringence
send a light pulse at a high repetition frequency. In the (about 10–4), which is induced by the residual stress
Plug & Play QKD setup, the repetition frequency in the silica glass film. This results in a polarization-
cannot be made too high because of Rayleigh dependent spectral response shift and degrades the
backscattering. On the other hand, DPS-QKD is a extinction ratio. The shift can be eliminated using a
one-way transmission system so the light can be birefringence compensation technique or by choos-
transmitted at a high repetition frequency and we can ing the wavelength at which the shift is zero. To eval-
achieve a high key generation rate. uate the stability of the interferometer, we measured
the extinction ratio at various temperatures for the
2.4 Experiment best and worst polarization states. Figure 5 shows the
As described above, the DPS-QKD scheme has results, where the upper and lower lines are the
some advantages over conventional QKD schemes. extinction ratios for the worst and best polarization
One of the most characteristic advantages is the states, respectively. Even for the worst polarization
polarization insensitive operation. However, this pre- state, an extinction ratio of less than –20 dB (1%) was
supposes that a stable and polarization insensitive obtained under temperature control within 0.05°C. At
interferometer is available. We performed an experi- the optimum temperature, the polarization depen-
ment using a Mach-Zehnder interferometer fabricat- dence was small, so that the extinction ratio ranged
ed using a planar lightwave circuit (PLC) based on from 0.27 to 0.46% when the input polarization state
silica waveguide technologies [7]-[9]. was varied. These results show that stable polariza-
tion-independent operation is possible using a PLC
–10
Extinction ratio (dB)
–15
–20
–25
Clock
Alice
Pulse
Pulse
pattern
generator
generator
1 GHz 0.1 photon
1 GHz per pulse
External Intensity Phase
Attenuator
cavity laser modulator modulator
(λ = 1551 nm) (LiNbO3) (LiNbO3)
0 π π
1 GHz
125 ps Bob
Glass-waveguide Pulse
Mach-Zehnder generator
interferometer
5 MHz
Optical fiber Time
Det interval
Det analyzer
20 km (APD) (TIA)
(4.46 dB) 20 cm
(2.64 dB)
8.5
4000
7.5
Raw key generation rate (bit/s)
3000
6.5
QBER (%)
2000 5.5
4.5
1000
3.5
0
0.2 0.4 0.6 0.8 1
Fig. 7. QBER and the raw key generation rate as a function of the time window.
References
[1] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptog-
raphy,” Rev. Mod. Phys., Vol. 74, p. 145, 2002. Kyo Inoue
[2] C. H. Bennett and G. Brassard, “Quantum cryptography: public key Senior Research Engineer, Optical Science
distribution and coin tossing,” Proc. Internat. Conf. Computer Sys- Laboratory, NTT Basic Research Laboratories.
tems and Signal Processing, pp. 175-179, 1984. He received the B.S., M.S., and Ph.D. degrees
in applied physics from the University of Tokyo,
[3] C. H. Bennett, “Quantum cryptography using any two nonorthogonal Tokyo in 1982, 1984, and 1997, respectively. He
states,” Phys. Rev. Lett., Vol. 68, p. 21, 1992. joined NTT Laboratories in 1984 and conducted
[4] A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. research on optical communications. From 2001
to 2003, he was a visiting scholar at Stanford
Rev. Lett., Vol. 67, p. 6, 1991. University, USA, where he worked on quantum
[5] A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden, and N. Gisin, optics.
“‘Plug & play’ systems for quantum cryptography,” Appl. Phys. Lett.,
Vol. 70, pp. 793-795, 1997.
[6] K. Inoue, E. Waks, and Y. Yamamoto, “Differential-phase-shift quan-
tum key distribution using coherent light,” Phys. Rev., Vol. A 68, p.