A quantum leap in security
DOI: 10.1063/PT.3.4699
We all send sensitive data such as credit card information over the internet daily. Internet security currently relies on several computational assumptions. For example, the security of a well-known public-key encryption scheme—the so-called RSA cryptosystem—hinges on the belief that no efficient algorithm for performing prime factorization of large integers will appear in the next decade on conventional computers. But a quantum computer could efficiently factor large integers and thus break the most widely used public-key encryption schemes, including the RSA and elliptic curve cryptosystems. 1 Put simply, when a fully functioning quantum computer is built, much of conventional cryptography will fall apart.
Motivated by that eventuality—and by the many potential future applications of quantum computers in biomedicine, chemistry, artificial intelligence, and other fields—researchers have recently made tremendous progress toward constructing a large-scale, universal quantum computer. (To learn about how quantum hardware is becoming increasingly accessible, see the article by Harrison Ball, Michael Biercuk, and Michael Hush on page 28
There are two main approaches to quantum-safe cryptography. The first one, post-quantum cryptography, relies on conventional public-key cryptosystems that experts believe are resistant to existing quantum algorithms. Its security against future advances in classical or quantum algorithms, however, has yet to be established. The second approach, quantum key distribution (QKD), 3 relies on the quantum no-cloning theorem, which states that any attempt to copy an unknown quantum state, or even try to obtain information about it, disturbs the original state. With that theorem, QKD securely distributes a common string of secret bits, called a cryptographic key, between two distant parties, typically named Alice and Bob.
The security of QKD holds even if a potential eavesdropper—say, Eve—has computational capabilities that reach the limit allowed by quantum mechanics. The security is achieved by sending nonorthogonal quantum signals through an open channel, such as an optical fiber or a free-space link. Any eavesdropping attempt to access the transmitted information can be caught because it introduces detectable errors.
If the established secret key is combined with a one-time-pad cryptosystem, Alice and Bob can communicate in absolute privacy through an untrusted channel (see the article by Daniel Gottesman and Hoi-Kwong Lo, Physics Today, November 2000, page 22
To generate a secret key using QKD, Alice and Bob must first distribute a (possibly virtual) bipartite quantum-entangled state through a quantum channel. A bipartite quantum state is entangled precisely if it exhibits stronger than classical correlations (see the article by Reinhold Bertlmann, Physics Today, July 2015, page 40
That property holds for any common measurement basis selected by Alice and Bob. Most importantly, their results are totally random and unpredictable for Eve. If Alice and Bob associate the bit value 0 to the result
In practice, channel loss, channel noise, device imperfections, and a possible attack by Eve might prevent Alice and Bob from sharing perfect Bell states. Still, quantum mechanics allows them to verify if the shared states are sufficiently close to Bell states. If they are, Alice and Bob can distill a smaller fraction of perfect Bell states from the original states using local operations and public, classical communication. That fraction determines the length of the secret key that Alice and Bob can extract from their shared systems.
Progress and challenges
Researchers have developed high-speed QKD systems with repetition rates of up to 10 GHz; implemented long-distance, fiber-based, point-to-point QKD links as far as 421 km apart; and enabled the multiplexing of quantum and classical signals in the same fiber, which is necessary for QKD to be compatible with conventional optical communication systems. QKD networks are now being deployed worldwide for secure communication in metropolitan and suburban areas.
Quantum-repeater technology would enable entanglement distribution over arbitrarily long distances, but it has yet to be developed. Currently, QKD networks typically rely on a trusted-node architecture to overcome the distance limitation imposed by channel loss. 4 For that setup, QKD only protects the communication between adjacent nodes in the network, and a copy of the key is available at all trusted nodes. In China, a 2000 km QKD backbone with about 30 trusted nodes connects Beijing and Shanghai, and a ground-to-satellite QKD network has recently enabled a secure video conference between Beijing and Vienna, 7600 km apart. Likewise, Europe and the US are developing blueprints for building continental-scale QKD networks this decade.
Despite such tremendous achievements, some fundamental challenges remain. The most pressing one is to guarantee the security of real-life QKD implementations. Because of device imperfections, real devices could, for example, leak electromagnetic or acoustic radiation, or behave differently from what is typically assumed in security analyses. The deviations could open security loopholes, or so-called side channels, which Eve might exploit. Single-photon detectors at a receiver are particularly sensitive to quantum hacking attacks. Researchers have demonstrated that by injecting strong light into the receiver, Eve could control which of Bob’s detectors observes a signal each time and thus obtain the secret key. 5
One possible approach to bridge the gap between theory and practice is QKD that is device-independent (DI), 6 though no experimental implementation has been realized so far. The solution uses a Bell inequality to verify if Alice and Bob share an entangled state, and it thus does not require them to characterize the internal functioning of the apparatuses. Despite its theoretical beauty, DI QKD is impractical with current technology: It demands a nearly perfect single-photon detection efficiency and yet would provide only a low key rate—the number of secret bits obtained per transmitted signal—at short distances of about 40 km. In addition, ensuring that the measurement apparatuses do not leak any information to Eve might be challenging for uncharacterized devices. For example, certain single-photon detectors emit backflash light that reveals which detector observes a signal each time.
The performance of QKD in terms of key rate versus distance still needs improvement. In point-to-point QKD configurations, the key rate scales at most linearly with the transmittance of the quantum channel, which is the probability that a one-photon pulse emitted by Alice reaches Bob. 4 For typical optical-fiber channels, the transmittance decreases exponentially with the distance and thus so does the key rate. Whereas quantum repeaters are the ideal solution, researchers can increase secret-key rates via multiplexing techniques.
Network distribution
To distribute an entangled state and protect the QKD setups from side-channel attacks, researchers have developed an alternative solution called entanglement swapping. It relies on a third party called Charles, who holds the measurement unit and forms a small quantum network with Alice and Bob. Each of them prepares an entangled state locally and sends one half of the entangled pair of particles to Charles and keeps the other half in their respective lab. At the receiving side, Charles detects the arriving signals with a measurement that projects them into a Bell state. Remarkably, if Charles’s measurement is successful in the ideal noiseless scenario, the local particles at Alice’s and Bob’s labs become entangled in a Bell state even though they have not interacted with each other. Figure
Figure 1.

Quantum keys can be distributed via entanglement swapping. (a) Two parties, Alice and Bob, who wish to communicate information, prepare entangled states

Alice and Bob can verify that they actually share Bell states, or states sufficiently close to them, independently of the method used to distribute the states. To complete the verification, they measure their local systems in two conjugate bases
Alice and Bob can then verify that Charles behaved honestly by confirming that they share entangled states. Because all of the detectors are within Charles’s station, Alice and Bob are protected from all possible side-channel attacks that target the measurement unit.
From a practical point of view, the setup in figure
The essential ingredient that enables entanglement swapping is the Bell-state measurement performed at Charles’s station. Remarkably, researchers can make such a measurement by using a simple interferometric setup with standard, linear optical components based on two-photon or one-photon interference. Both effects, each resulting in a different QKD protocol with its own merits, are illustrated in figure
Figure 2.

Generating interference with a two-photon and one-photon approach. (a) Due to the Hong-Ou-Mandel effect, if two indistinguishable photons (left) enter through different input ports of a 50:50 beamsplitter (BS), both photons exit the BS through the same randomly chosen output port (orange, right). If the photons do not overlap perfectly in time, the probability that they exit the BS through different ports increases with the time delay between them, up to a value of 0.5. (b) Alice prepares the entangled state

The scenarios that have been considered thus far assume that Alice and Bob can prepare perfect entangled states. In a prepare-and-measure setup, that assumption corresponds to generating photon-number states, which have a well-defined number of photons. But those states are challenging to prepare with the experimental capabilities currently available. Instead, researchers typically prefer to implement QKD using attenuated laser sources that emit weak coherent pulses (WCPs). Although Alice and Bob could still run QKD protocols with that experimental setup, they would need to estimate certain quantities related to the photon-number states. Fortunately, they can estimate those quantities with the decoy-state method. 7 It requires Alice and Bob to randomly vary the photon-number statistics of the respective signals they each generate. If Alice and Bob generate phase-randomized WCPs, the decoy-state method requires them to simply change the laser’s intensity setting.
Measurement-device-independent QKD
An important, recent research direction builds QKD networks with untrusted relays using QKD that is measurement-device-independent (MDI). 8 It’s currently the most popular and effective solution to counter quantum hacking because of its practicality and high key-generation rate at long distances. Indeed, numerous experimental demonstrations of MDI QKD have been reported in recent years that have achieved 1 Mb/s secret-key rates 9 and transmission distances of 404 km with telecommunication fibers. 10 The successes would be enough, for example, to encrypt a high-quality video call with the one-time-pad cryptosystem or to distribute secret keys between the Canadian cities of Toronto and Ottawa.
MDI QKD builds on the entanglement-swapping protocol that uses a Bell-state measurement based on two-photon interference and is implemented in a prepare-and-measure fashion using WCPs and decoy states. Secret bits are distilled from the one-photon contributions emitted by Alice and Bob and successfully detected by Charles, who could be the QKD network provider.
A schematic diagram of MDI QKD is shown in figure
Figure 3.

Practical methods for quantum key distribution (QKD). In measurement-device-independent (MDI) QKD, (a) Alice and Bob each use a laser and a polarization modulator (Pol-Mod) to prepare phase-randomized weak coherent pulses (WCPs) in Bennett–Brassard polarization states.

Charles is supposed to measure the incoming signals with a Bell-state measurement and then announce his results. The setup exploits the Hong-Ou-Mandel effect to identify two of the four Bell states, which is enough to achieve secure QKD. Depending on the Bell states announced and the polarization bases used, Bob might need to bit-flip part of his polarization data to match Alice’s. The raw key is formed by the polarization data in which both Alice and Bob employ the
When compared with conventional QKD schemes that suffer from detection side-channels, the key advantage of MDI QKD is that Charles need not be trustworthy. He can only learn if Alice’s and Bob’s raw key bits are the same or different but not their particular values. The secret-key rate still scales linearly with the quantum channel transmittance because MDI QKD requires that two photons—one from Alice and the other from Bob—reach Charles. To overcome that limit, one can furnish MDI QKD with quantum memories
11
or quantum non-demolition measurements
12
or use another approach known as twin-field (TF) QKD,
13
shown schematically in figure
An alternative approach
The elegant idea of TF QKD replaces the entanglement-swapping operation based on two-photon interference with one based on one-photon interference.
9
The method, if successful, projects the incoming states into a Bell state
Several recently introduced variants of TF QKD offer security against general attacks.
14
,
15
Most importantly, the ideal setup
15
can be well approximated with a prepare-and-measure scheme in which Alice and Bob each send Charles WCPs whose phase is randomly and independently selected as 0,
The main experimental challenge of TF QKD is maintaining the phase stability between Alice’s and Bob’s signals, which is not required in MDI QKD. That demand means that TF QKD needs an auto-compensating technique, such as a Sagnac loop, or phase locking of the remote laser pulses. But despite the experimental difficulties, various research groups have already performed proof-of-principle demonstrations 16 and have achieved transmission distances longer than 500 km. 17
Closing the gap
Quantum interference enables a family of novel protocols that offer unprecedented levels of security and performance for QKD. The protocols are particularly suited for an untrusted network setting with multiple users. Each user holds a low-cost, compact, chip-based QKD transmitter, and they all share the measurement unit that contains the single-photon detectors.
However, in real-life network settings, the symmetric scenario, in which the channel loss between Alice and Charles is the same as or similar to that between Bob and Charles, is not always true. Some researchers introduced efficient variants of MDI QKD and TF QKD for asymmetric configurations that allow Alice and Bob to use different intensity settings for their signals. 18 The protocols could prove useful in a general quantum network with vastly different channel losses. In such a network, users are dynamically added or deleted at any time without compromising network performance.
A fundamental question that remains unanswered is how to protect QKD transmitter hardware against quantum hacking. Protection will require the development of security proofs that can handle device imperfections in the transmitters and hardware countermeasures that prevent the manipulation of devices. Fortunately, those tasks are, in general, much simpler than protecting the measurement unit. Alice and Bob could use optical isolation, spectral filters, and monitor detectors to physically protect their transmitters from Eve. In addition, security proofs that include most transmitters’ imperfections have been developed in recent years. When combined with the setups introduced in this article, the security proofs can close the gap between QKD theory and practice.

PAINTING BY GERALDINE COX

We are grateful for financial support from the European Union’s Horizon 2020 research and innovation programme under a QCALL Marie Sklodowska-Curie grant, Spain’s Ministry of Economy and Competitiveness, the European Regional Development Fund through grant TEC2017-88243-R, the PRESTO program of the Japan Science and Technology Agency and grant JP-MJPR1861, the Natural Sciences and Engineering Research Council of Canada, the Canada Foundation for Innovation, the Ontario Research Fund, Huawei Technologies Canada, Mitacs, the US Office of Naval Research, the Royal Bank of Canada, and the University of Hong Kong startup grant.
References
1. P. W. Shor, in Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE (1994), p. 124.
2. F. Arute et al., Nature 574, 505 (2019). https://doi.org/10.1038/s41586-019-1666-5
3. C. H. Bennett, G. Brassard, Proceedings of the International Conference on Computers, Systems and Signal Processing, IEEE (1984), p. 175;
A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991). https://doi.org/10.1103/PhysRevLett.67.6614. S. Pirandola et al., Nat. Commun. 8, 15043 (2017). https://doi.org/10.1038/ncomms15043
5. L. Lydersen et al., Nat. Photonics 4, 686 (2010). https://doi.org/10.1038/nphoton.2010.214
6. A. Acín et al., Phys. Rev. Lett. 98, 230501 (2007). https://doi.org/10.1103/PhysRevLett.98.230501
7. W.-Y. Hwang, Phys. Rev. Lett. 91, 057901 (2003); https://doi.org/10.1103/PhysRevLett.91.057901
H.-K. Lo, X. Ma, K. Chen, Phys. Rev. Lett. 94, 230504 (2005); https://doi.org/10.1103/PhysRevLett.94.230504
X.-B. Wang, Phys. Rev. Lett. 94, 230503 (2005). https://doi.org/10.1103/PhysRevLett.94.2305038. H.-K. Lo, M. Curty, B. Qi, Phys. Rev. Lett. 108, 130503 (2012). https://doi.org/10.1103/PhysRevLett.108.130503
9. M. Lucamarini et al., Nature 557, 400 (2018). https://doi.org/10.1038/s41586-018-0066-6
10. L. C. Comandar et al., Nat. Photonics 10, 312 (2016). https://doi.org/10.1038/nphoton.2016.50
11. H.-L. Yin et al., Phys. Rev. Lett. 117, 190501 (2016). https://doi.org/10.1103/PhysRevLett.117.190501
12. C. Panayi et al., New J. Phys. 16, 043005 (2014). https://doi.org/10.1088/1367-2630/16/4/043005
13. K. Azuma, K. Tamaki, W. J. Munro, Nat. Commun. 6, 10171 (2015). https://doi.org/10.1038/ncomms10171
14. X.-B. Wang, Z.-W. Yu, X.-L. Hu, Phys. Rev. A 98, 062323 (2018). https://doi.org/10.1103/PhysRevA.98.062323
15. M. Curty, K. Azuma, H.-K. Lo, npj Quant. Inf. 5, 64 (2019). https://doi.org/10.1038/s41534-019-0175-6
16. M. Minder et al., Nat. Photonics 13, 334 (2019). https://doi.org/10.1038/s41566-019-0377-7
17. J.-P. Chen et al., Phys. Rev. Lett. 124, 070501 (2020). https://doi.org/10.1103/PhysRevLett.124.070501
18. W. Wang, F. Xu, H.-K. Lo, Phys. Rev. X 9, 041012 (2019); https://doi.org/10.1103/PhysRevX.9.041012
F. Grasselli, Á. Navarette, M. Curty, New J. Phys. 21, 113032 (2019). https://doi.org/10.1088/1367-2630/ab520e
More about the Authors
Marcos Curty is an associate professor of telecommunication engineering at the University of Vigo in Spain. Koji Azuma is a distinguished researcher at NTT Basic Research Laboratories in Atsugi, Japan. Hoi-Kwong Lo is a professor of physics at the University of Toronto and is the director of physics and astronomy at the University of Hong Kong.