February 27, 2024 | ADNAN A.E. HAJOMER, IVAN DERKACH, RADIM FILIP, ULRIK L. ANDERSEN, VLADYSLAV C. USENKO, AND TOBIAS GEHRING
This paper presents a continuous-variable quantum passive optical network (CV-QPON) protocol that enables deterministic and simultaneous secret key generation among all network users. The protocol leverages the wave-like properties of coherent states and electric-field quadrature measurements to achieve this. The CV-QPON protocol is designed to extend the scope of continuous-variable quantum cryptography from point-to-point (PTP) to scalable point-to-multipoint (PTMP) networks, which is crucial for large-scale deployment. The protocol is implemented in a downstream topology where a provider (Alice) connects to multiple users (Bobs) via an insecure quantum broadcast channel, potentially under adversary control (Eve). Quantum correlations are established by preparing random coherent states at Alice's station, then simultaneously measured by Bobs. This setup enables independent key generation between Alice and each Bob, thanks to the independent quantum noise experienced by each user and the use of reverse information reconciliation.
The paper introduces two protocols: an untrusted protocol, where each Bob views others as potential adversaries, and a trusted protocol, where users collaborate against Eve by relying on a faithful operation of each other. The trusted protocol uniquely addresses the issue of information leakage due to the residual correlation between users without compromising the secret key's length. This is accomplished by establishing a hierarchical system of trust among users. The paper demonstrates the feasibility of the proposed protocols through an experimental CV-QPON setup involving eight users, each with an 11 km span of access link. In both trusted and untrusted scenarios, all users can simultaneously generate independent keys secure against collective attacks in the asymptotic regime, with approximately 30% improvement in the total network key rate for trusted protocols. Specifically, the paper achieved total network key rates of 2.1 Mbits/s and 1.5 Mbits/s for trusted and untrusted protocols, respectively. The capacity of the CV-QPON protocol is scalable, allowing it to support more than twice the current number of users, depending on the noise and channel transmittance. Additionally, CV-QPON offers a cost-effective solution as it utilizes standard telecommunications technology, enabling it to be effortlessly integrated into existing access networks.This paper presents a continuous-variable quantum passive optical network (CV-QPON) protocol that enables deterministic and simultaneous secret key generation among all network users. The protocol leverages the wave-like properties of coherent states and electric-field quadrature measurements to achieve this. The CV-QPON protocol is designed to extend the scope of continuous-variable quantum cryptography from point-to-point (PTP) to scalable point-to-multipoint (PTMP) networks, which is crucial for large-scale deployment. The protocol is implemented in a downstream topology where a provider (Alice) connects to multiple users (Bobs) via an insecure quantum broadcast channel, potentially under adversary control (Eve). Quantum correlations are established by preparing random coherent states at Alice's station, then simultaneously measured by Bobs. This setup enables independent key generation between Alice and each Bob, thanks to the independent quantum noise experienced by each user and the use of reverse information reconciliation.
The paper introduces two protocols: an untrusted protocol, where each Bob views others as potential adversaries, and a trusted protocol, where users collaborate against Eve by relying on a faithful operation of each other. The trusted protocol uniquely addresses the issue of information leakage due to the residual correlation between users without compromising the secret key's length. This is accomplished by establishing a hierarchical system of trust among users. The paper demonstrates the feasibility of the proposed protocols through an experimental CV-QPON setup involving eight users, each with an 11 km span of access link. In both trusted and untrusted scenarios, all users can simultaneously generate independent keys secure against collective attacks in the asymptotic regime, with approximately 30% improvement in the total network key rate for trusted protocols. Specifically, the paper achieved total network key rates of 2.1 Mbits/s and 1.5 Mbits/s for trusted and untrusted protocols, respectively. The capacity of the CV-QPON protocol is scalable, allowing it to support more than twice the current number of users, depending on the noise and channel transmittance. Additionally, CV-QPON offers a cost-effective solution as it utilizes standard telecommunications technology, enabling it to be effortlessly integrated into existing access networks.