KETS QuantumKETS Quantum

KETS Quantum

  • Quantum-safe Solutions
    • Quantum Key Distribution
    • Quantum Random Number Generator
  • Use Cases
  • News & Insight
  • About KETS
    • About KETS
    • Working at KETS

Why should Bob do the heavy lifting when you can have Charlie do all the work?

  • Home
  • Blog
  • comment
  • Why should Bob do the heavy lifting when you can have Charlie do all the work?
  • 11 Apr, 2024

    KETS Quantum Security pleased to announce we have won a £1.7m contract funded by Innovate UK to accelerate development
  • 11 Aug, 2023

    Super Seven #29 Rosanna Fish
  • 12 Jul, 2023

    Super Seven #28 Priya Gupta
  • 12 Jul, 2023

    Super Seven #27 Vitor Ribeiro
  • 16 Mar, 2023

    Super Seven #26 Pedro Nunes

Categories

  • announcements
  • awards
  • blog
  • comment
  • events
  • funding
  • news
  • projects
  • team
  • technology

Why should Bob do the heavy lifting when you can have Charlie do all the work?

May, 13

alice, bob, bristol university, news, paper, qkd, quantum, quantum qkd, quantum random numbers, research

While it would have been very easy to miss over the last month or so, as dealing with Covid-19 and rapidly switching to working from home to protect our fellow citizens and health service has taken priority, one of my students – @Henry Semenenko – very successfully defended his PhD and quietly published an important demonstration addressing a potential weakness in quantum security.

Picked up by Science Daily, Henry’s paper on Chip-Based Measurement-Device-Independent Quantum Key Distribution shows how to remove a potential vulnerability due to the single photon detector systems used in quantum key distribution (QKD). QKD is a method that allows us to distribute extremely secure digital encryption keys to two parties. It allows a first party (ideally a big VC) to lock a message (ideally a digital cheque with lots of 0’s) before sending it over a network to a second party (ideally KETS) allowing them to unlock it (and cash it!) once it arrives.

So, what is the problem? Well quantum security is still in its earlier days, similar to the early days of the internet – think back to when your dial-up modem used to routinely drop your connection. We are still working out some of the kinks, and the single photon detectors – because they were purpose built for light detection, not security – have some potential vulnerabilities if we are not careful.

Usually in QKD the VC would send single qubits in the form of photons (single particles of light) to KETS with one bit of the key stored in each photon sent. Then it would be up to KETS to measure the photons and learn the key. But, as mentioned, detectors can be vulnerable – there has been several demonstrations of people blinding detectors and manipulating their detection efficiencies and timing, ultimately allowing them to learn the digital encryption key without the legitimate parties noticing. That is where measurement-device-independent (MDI) QKD comes in.

In MDI-QKD, both the VC and KETS would send qubit photons to a third party to be jointly measured. This joint measurement on both photons together can then be viewed as creating entanglement between the VC and KETS backwards in time. Entanglement in this context means the VC and KETS effectively share a stream of highly correlated pairs of photons from which they can generate their key. Moreover, one can show that this correlation is only shared by the VC and KETS, and not with anyone else in the universe. In other words, the third party asked to make the measurements could be the VC’s biggest rival!

While there has been some excellent early demonstrations of this technique, key to Henry’s result is accomplishing this with chip-based devices.

It is this chip-based approach that is ultimately going to enable quantum communications and security at scale in real world commercial applications.

However, this chip-based approach also made the experiment much more challenging… something Henry learned the hard way. The earlier experiments were generally done with bulk fibre optic systems that are inherently modular. When one component does not work, it is easily swapped out for another. Need another modulator to make your life easier and give you an additional degree of freedom? Just splice it in. But integrated chips generally have far fewer knobs to turn to make something work and the whole point of them is their design is fixed. That is where they get their stability from, their monolithic structure (i.e. one-piece construction). All of this is wonderful once you have a robust design, but far more challenging when doing the world’s first chip-based MDI-QKD experiment!

Lucky for us, Henry persevered and demonstrated a wonderful experiment that is now shared with the world as part of our collective scientific consciousness. The next phase of the work is being discussed within QETLabs with the suitably mysterious project title of “The Node”. As for Henry, after years of understanding how to eke out the best performance and ridiculous control of integrated quantum photonic chips, he is now unsurprisingly developing them with IMEC, one of the world-leading fabrication foundries, as a Quantum Photonics Research Engineer. While here at KETS, we are working on this and many other cutting-edge ways to keep your information and data safe from quantum computing technology.

Chris Erven, May 2020

alice, bob, bristol university, news, paper, qkd, quantum, quantum qkd, quantum random numbers, research
Share
Super Seven #1 Lorraine McManus
Super Seven #2 Robert Denman

[contact-form-7 id=”4″ title=”Contact form 1″]

KETS Quantum

enquiry@kets-quantum.com Company number - 10297688

CONTACT

Station Road Workshops

Bristol

BS15 4PJ

Links

  • Quantum Key Distribution
  • Quantum Number Random Generator
  • Use Cases
  • Privacy Policy

Newsletter Subscribe

KETS QUANTUM SECURITY LTD. © 2024 All Rights Reserved
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT