Next Article in Journal
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
Previous Article in Journal
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Network-Compatible Unconditionally Secured Classical Key Distribution via Quantum Superposition-Induced Deterministic Randomness

School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju 61005, Korea
Cryptography 2022, 6(1), 4; https://doi.org/10.3390/cryptography6010004
Submission received: 22 December 2021 / Revised: 18 January 2022 / Accepted: 20 January 2022 / Published: 21 January 2022

Abstract

:
Based on the addressability of quantum superposition and its unitary transformation, a network-compatible, unconditionally secured key distribution protocol is presented for arbitrary networking in a classical regime with potential applications of one-time-pad cryptography. The network capability is due to the addressable unitary transformation between arbitrary point-to-point connections in a network through commonly shared double transmission channels. The unconditional security is due to address-sensitive eavesdropping randomness via network authentication. The proposed protocol may offer a solid platform of unconditionally secured classical cryptography for mass-data communications in a conventional network, which would be otherwise impossible.

1. Introduction

Due to the exponential growth of information traffic in fiber-optic communications backbone networks over the last thirty years, the information traffic rate has tripled every two years and is expected to reach its theoretical upper bound of 100 Tbps within a decade [1]. The more information traffic increases, the more data security should be emphasized. Current information security relies on computational complexity [2] and is thus vulnerable to both classical [3] and quantum attacks [4,5,6]. In classical cryptography such as public key cryptography [7], the key length has gradually increased over decades to protect data from potential eavesdropping, mostly relying on computing power [8]. As a result, secured data transmission in a classical (unsecured) regime becomes inefficient as the key length increases due to the tradeoff between security and the key generation rate [8]. Especially for big data-based artificial intelligence applications such as unmanned vehicles and Internet of things applications such as drones, data security must be carried out in an efficient way [9]. Thus, fundamental innovation in cryptography is required to overcome vulnerabilities in both classical attacks relying on algorithms or computing powers [3] and quantum attacks relying on quantum parallelism of superposition [4].
On the contrary, quantum cryptography [10] has been intensively studied for unconditionally secured quantum key distribution (QKD) over a quantum channel ever since the first QKD protocol of BB84 [11]. Due to imperfect single-photon detectors and quantum channel losses resulting in quantum loopholes however, QKD is also vulnerable to quantum attacks from a practical point of view [12]. The detection loopholes affect all QKD protocols, including decoy states [13] for single photons and Bell states [14] for entangled photon pairs. For transmission distance, QKD is strongly limited by the no-cloning theorem prohibiting duplication or amplification [15], unless quantum repeaters are implemented [16]. Moreover, there are no commercially available deterministic single-photon or entangled-photon pair generators yet, resulting in an extremely low QKD rate [10]. Besides, the key must be used only once to keep the unconditional security guaranteed by quantum mechanics [17]. Quantum networking among many parties is much harder to realize due to the limitations of multipartite entangled photon-pair generation [18]. Based on these practical issues, quantum cryptography seems to have a long way to go for commercial network applications such as e-commerce, including online banking and IoT via both wired and wireless communications [19], even though some point-to-point QKD protocols have already been launched for a testbed [20,21]. Further, QKD is incompatible with conventional information infrastructures in the classical domain such as wired and wireless networks, and thus severely limits its applications in mass data communications such as artificial intelligence based on big data [22].
To overcome the limitations of classical and quantum cryptographies, an entirely different method of unconditionally secured classical key distribution (USCKD) has been proposed for both wired [23] and wireless [24] transmissions using a pair of transmission channels forming a Mach-Zehnder interferometer (MZI) via quantum superposition between the MZI channels and its unitary transformation, resulting in deterministic randomness.This deterministic randomness represents no eavesdropping due to measurement indistinguishability caused by quantum superposition in the MZI channels, as well as the deterministic key distribution between two remote parties via unitary transformation. As demonstrated, the key generation determinacy in USCKD [23] is well understood in the coherence optics of MZI in terms of the directional determinacy [25]. The basis of eavesdropping randomness in USCKD has also been understood as measurement indistinguishability caused by channel superposition, as in Young’s double-slit experiments [26]. Here, a network-compatible USCKD (NC-USCKD) protocol is presented, analyzed, and discussed for arbitrary networking in the classical domain, where a commonly shared pair of transmission lines of MZI plays a key role in both the physics and infrastructure. The classical channel represents a lossy and unsecured transmission line, resulting in open access by anyone. In the proposed NC-USCKD scheme, unconditional security is achieved coherently via addressable quantum superposition between two arbitrary parties in a network through the shared MZI channels. For the robustness of the MZI system, real-time phase stabilization has already been experimentally demonstrated for a few km ranges in both wired [27] and wireless schemes [28].
For the network addressability of the present NC-USCKD, addressable quantum superposition between arbitrary two-remote parties is presented as a building block of unconditionally secured classical networking. Compared with the original point-to-point transmission scheme of USCKD [23], the addressability in the present NC-USCKD is due to the linear expansion of orthogonal bases through the shared MZI channels for N-to-N networking. For the unconditional security of NC-USCKD in a classical network, we also present an authentication protocol via network initialization between any arbitrary parties. The practical advantages of NC-USCKD include high-speed key distribution, addressable networking, and compatibility with conventional optical systems relying on the wave nature of coherence optics. Owing to the coherence optics of MZI [25,26], NC-USCKD is naturally compatible with classical systems such as optical switches, optical routers and even optical amplifiers. The phase locking in an optical amplifier such as an erbium-doped fiber amplifier is technically assured due to its coherence optics for regeneration in the fiber-optic communications networks [29]. The classical compatibility offers a great benefit to the current bottlenecked big-data applications based on CMOS technologies and can lead to a breakthrough in present mass data communications networks.

2. Materials and Methods

Numerical calculations in the results are conducted by homemade program using MATLAB, where the equations are driven in the main text analytically.

3. Results

Figure 1 shows a schematic of the proposed NC-USCKD based on a shared pair of round-trip MZI transmission channels in an N-party composed network, where addressable remote parties are called Alice and Bob. Here, the round trip configuration of MZI is the same as symmetrically coupled double MZIs, where Bob (Alice) controls the first (second) MZI. For the N-party networks, the number of arbitrary pairs for networking is N ( N 1 ) 2 , which is a quadratic expansion. This quadratic scalability in networking may be solved via multi-party superposition, which is beyond the present scope (discussed elsewhere). Each party has dual phase shifters to encode/encode one’s phase bases represented by, for example, φ 1 and φ 2 for the phase shifters Φ 1 and Φ 2 at Bob’s side or ψ 1 and ψ 2 for Ψ 1 and Ψ 2 at Alice’s side, respectively. The MZI scheme in Figure 1 has nothing to do with the phase encoded BB84 protocol [30], where USCKD uses a pair of transmission channels for deterministic randomness via quantum superposition and its unitary transformation [23]. For NC-USCKD, the phase controllers Φ 2 and Ψ 2 are added to the original scheme of USCKD for the purpose of addressable networking, where the original phase controllers ( Φ 1 and Ψ 1 ) are used for the unconditional security via deterministic randomness in the doubly coupled MZIs. In USCC without Φ 2 and Ψ 2 [23], the round-trip MZI results in the deterministic randomness if φ 1 = ψ 1 is satisfied, where φ 1 and ψ 1 have the same set of orthogonal phase bases: φ 1 , ψ 1 { 0 , π } . The opposite case of φ 1 ψ 1 also works for the key distribution if bit-by-bit network initialization is performed [23]. Here, we briefly seek an N-party addressable condition in the NC-USCKD scheme of Figure 1: The phase basis ‘0′ (‘ π ’) represents the key ‘0′ (‘1′).
The matrix representation, [BH], for the dual phase-controlled round-trip MZI in Figure 1 is as follows (see Section A of the Supplementary Information):
[ BH ] = 1 2 [ { e i ( ψ 2 + φ 1 ) + e i ( ψ 1 + φ 2 ) } i { e i ( ψ 2 + φ 1 ) e i ( ψ 1 + φ 2 ) } i { e i ( ψ 2 + φ 1 ) e i ( ψ 1 + φ 2 ) } { e i ( ψ 2 + φ 1 ) + e i ( ψ 1 + φ 2 ) } ] .
According to the unitary transformation in a round-trip MZI configuration of Figure 1, the returned light (E9 and E10) at Bob’s side must satisfy the identity or inversion relation if no network error occurs: [ E 9 E 10 ] = [ B H ] [ E 1 0 ] . Here, the added phases ( φ 2 , ψ 2 ) are the assigned address parameters for their sites. As discussed already in USCKD [23], unconditional security is performed with the phase bases of φ 1 and ψ 2 . For a fixed address set ( φ 2 , ψ 2 ) , Bob randomly prepares a key with his phase basis φ 1 , and sends it to Alice: this is the key preparation stage. Relative to Bob’s prepared lights (E3, E4), Alice’s phase ( ψ 1 , ψ 2 ) is transparent. Likewise, Bob’s phase ( φ 1 , φ 2 ) is also transparent to the returned light (E7, E8). Alice measures her visibility VA to copy Bob’s choice of φ 1 (see Table 1 in [23]). Then, Alice randomly chooses her phase basis for ψ 1 to shuffle Bob’s phase choice and sends it back to Bob: this is the key selection stage. If the returned light E9 (E10) hits the detector B3 (B4), the identity (inversion) relation is satisfied for the unitary transformation of the MZI matrix in Figure 1 (Section A of the Supplementary Information). If Alice chooses the same (opposite) basis as Bob, this results in the identity (inversion) relation. Unlike QKD, the key distribution of USCKD is fully deterministic without the need for sifting due to the MZI directionality, where sifting is used to induce eavesdropping randomness and the unconditional security is provided by the no-cloning theorem of quantum mechanics in QKD [15]. Thus, the random phase shuffling by Alice corresponds to sifting of the QKD for eavesdropping randomness. Here in NC-USCKD, eavesdropping randomness is achieved by network initialization (see Table 1). Depending on the key distribution strategy, the inversion case (Section B of the Supplementary Information) can also be included (see Table 2) for the key distribution. From Equation (1), the following phase relationship between Alice and Bob is obtained for identity and inversion relations, respectively:
ψ 1 + φ 2 = ψ 2 + φ 1 ,
( ψ 2 + φ 1 ) = ( ψ 1 + φ 2 ) ± π ,
with a deterministic key distribution according to the MZI physics of transmission directionality, the control phase bases ( φ 1 , ψ 1 ) in Equations (2) and (3) must be shifted by the address phase ( φ 2 , ψ 2 ) . For example, the modified phase basis φ 1 in Figure 1 is φ 1 = φ 1 + ψ 2 , where φ 1 is the original binary basis (0, π ); similarly for ψ 1 : ψ 1 = ψ 1 + φ 2 , where ψ 1 is also the original binary phase basis (discussed in Figure 2). Due to the phase matching condition of ψ 1 = φ 1   ( ψ 1 = φ 1 ) in USCKD for the identity relation, Equation (2) results in ψ 2 = φ 2   ( ψ 2 = φ 2 ± π ) . In a similar analogy for the inversion case of ψ 1 φ 1   ( ψ 1 = φ 1 ± π ) , the modified phase basis becomes ψ 2 φ 2   ( ψ 2 = φ 2 ± π ) (Section B of the Supplementary Information). Owing to the network addressability with ψ 2 = φ 2 or ψ 2 = φ 2 ± π for the identity or inversion case, NC-USCKD works for any arbitrary phase address. Thus, Figure 1 functions as a basic building block of network compatible USCKD in the classical domain.
In more detail, the control phase φ 1 depends on ψ 2 ( = φ 2 ) for arbitrary networking with a particular address δ at Φ 2 , where φ 1 = φ 1 + ψ 2 ( δ ) . Obviously, the φ 1 value varies based on the assigned address with δ at Φ 2 . As a result, the corresponding phase ψ 1 at Alice’s side also becomes shifted by δ , satisfying Equation (2), resulting in φ 1 = ψ 1 for the identity relation; otherwise, φ 1 = ψ 1 ± π for the inversion relation. Here, the address phase δ at Φ 2 plays a key role in addressable networking in NC-USCKD, where δ can be considered as a continuous phase variable (CPV). This is the generalization of USCKD for networking without changing the original physics of USCKD. Keeping this in mind, we investigate the CPV property in NC-USCKD for the network addressability.
Figure 1 shows a paired party assigned to the address set ( φ 2 , ψ 2 ) through a shared pair of transmission channels of MZI in the N-party network (Section C of the Supplementary Information). The coherent (bright) input light pulse E1 in Figure 1 is launched from a coherent laser (LD) through an optical modulator (OM) by Bob. A random phase basis φ 1 { 0 , π } controlled by the phase shifter Φ 1 is added to the split light E4. The other split light E3 is encoded by the address phase shifter Φ 2 with a phase variable φ 2 , where 0 φ 2 π . As explained above, only the φ 2 —corresponding receiver (Alice) with the ψ 2 address satisfies Equations (2) and (3) for deterministic randomness of USCKD through the commonly shared pair of MZI transmission channels. Here, the MZI determinacy represents the phase-dependent transmission directionality: If φ 1 = 0   ( φ 1 = π ) assuming no network errors, detector A1 (A2) always clicks with E6 (E5) for φ 2 = ψ 2 = 0 . The ψ 1 —controlled returned light E8 along with E7 by Alice is also governed by the same MZI transmission directionality, resulting in the identity or inversion relation (discussed in Figure 2 and Figure 3). For the return lights of E7 and E8, both phases φ 1 and φ 2 are invisible as mentioned above. Likewise, ψ 1 and ψ 2 are invisible to E3 and E4, respectively.
Figure 2 shows numerical calculations of the MZI determinacy for the output lights E5 and E6 on Alice’s side as well as the measurement randomness (IN5,6) in the shared pair of transmission channels. The related matrix representation [ MZ ] φ 1 , φ 2 of the directionality for E5 and E6 at the MZI interferometer is as follows:
[ MZ ] φ 1 , φ 2 = 1 2 [ e i φ 2 e i φ 1 i ( e i φ 2 + e i φ 1 ) i ( e i φ 2 + e i φ 1 ) ( e i φ 2 e i φ 1 ) ] ,
where [ E 5 E 6 ] = [ MZ ] φ 1 , φ 2 [ E 1 0 ] . The added phase φ 2 ( δ ) causes a δ —phase shift in E3 in the lower transmission line. To compensate the phase shift, φ 1 must be adjusted accordingly for E4 in the upper transmission line. Thus, the modified phase at Φ 1 must be φ 1 = φ 1 + δ , where ψ 2 = δ , 0 δ π , and φ 1 is the binary phase basis of { 0 , π } . With this modified phase, Equation (4) can be easily proved for the MZI determinacy (directionality) with an arbitrary value of δ for φ 2 .
For the numerical demonstrations of the φ 2 —dependent MZI determinacy mentioned above, two basis values of φ 1 { 0 ,   π } are used to test both the visibility V5,6 and the interference IN5,6. Here, the interference IN5,6 should be the same as IN3,4 if Eve has the same measurement tool as Alice’s. However, Eve’s measurement with the same interference tool results in either an in-phase or out-of-phase scenario with the same probability due to the measurement indistinguishability caused by the MZI path superposition. Figure 2a is the reference for φ 2 = 0 , while Figure 2b is for any arbitrary value of φ 2 = π / 3 . Figure 2a shows a typical fringe pattern of visibility V 5 , 6 , where the maximum occurs at the phase bases, φ 1 = φ 1 { 0 , π } (see the green dots in the solid curve). On the contrary, the interference IN 5 , 6 results in the same value for both bases, resulting in measurement indistinguishability (see the green and orange dots in the dotted curve). As discussed in [21], IN5,6 should be the same as IN3,4, showing the physical origin of the measurement immunity in the MZI path corresponding to the no-cloning theorem in QKD. The phase shift of φ 1 by the address value of φ 2 is numerically demonstrated in Figure 2b for φ 1 = φ 1 + φ 2 ( π 3 ) . For the maximum visibility V 5 , 6 = ± 1 , the phase shift condition is also satisfied. This linear phase shift relation in φ 1 with φ 2 reveals the infinite number of phase variables in φ 2 , resulting in the CPV characteristics of the present protocol as shown in Figure 2c. In other words, the address phase φ 2 is used for networking to the corresponding ψ 2 at Alice’s side. The corresponding interference IN5,6 always has the same value if φ 1 = φ 1 + φ 2 is satisfied, as shown in Figure 2d. Thus, Figure 2 demonstrates the φ 2 —dependent MZI directionality in the NA-USCKD scheme of Figure 1 as well as the indistinguishability in eavesdropping (discussed later). The resulting addressable condition on Alice’s side is ψ 1 = ψ 1 + ψ 2 .
Because the relation φ 1 = ψ 1 must be satisfied for the one-way deterministic key transmission in Figure 1, ψ 2 on Alice’s side must be equal to φ 2 according to Equation (2). Figure 3 shows the numerical calculations for the present NA-USCKD with addressable CPV of φ 2 and ψ 2 . To satisfy the identity matrix at Bob’s side for the returned light, the visibility of V B = 1 for both bases ( φ 1 = ψ 1 = { φ 2 , π + φ 2 } ) is numerically shown in Figure 3a for the right condition of φ 2 = ψ 2 ( 2 π 5 ) : V B = V 9 , 10 . However, for the wrong condition of φ 2 ψ 2 ( 2 π 5 ) , the maximum visibility of VB fails. Thus, Equations (2) and (3) are proved, where the modified phase basis of φ 1 becomes continuous because φ 2 ( = ψ 2 ) is continuous: 0 φ 2 π . In practice however, the possible number of CPV is of course determined by the detector’s sensitivity and MZI phase stability.
Figure 3a,b represents for the ψ 1 —independent identity relation ( ψ 1 = 0 ; 2 π 5 ;   π ) in the round-trip MZI scheme of Figure 1. For the address matching condition ( φ 2 = ψ 2 ) as shown with the dashed curve in Figure 3a, all ψ 1 values satisfy the correct VB if ψ 1 = φ 1 . The visibility VA (=V5,6) is broken if φ 1 φ 1 + φ 2 (see Figure 2b). Thus, only the dotted curve with ψ 1 = 2 π 5 ( = φ 2 ) in Figure 3b satisfies directionality condition in both sides with V 5 , 6 = 1 and V B = 1 (see the open circle). This is because φ 1 must be shifted by the φ 2 value, and the shifted φ 1 affects ψ 1 to keep V 5 , 6 = ± 1 .
For the key distribution process in Figure 2 and Figure 3, how does Alice know the correct ψ 1 ? In other words, how does Bob send his prepared key to Alice without revealing it to Eve? The answer to this question is given by authentication. If φ 2 ψ 2 for a wrong choice, the identity relation ( V B = 1 ) must fail as shown in Figure 3c,d (see the open circles). For the correct choice ( φ 2 = ψ 2 ) , both Bob and Alice automatically have φ 2 —phase shifted φ 1 and ψ 1 , respectively. Thus, their visibility measurements must fulfill the identity (or inversion) relation. If there is any mismatch in the address ( φ 2 ψ 2 ) , the return light cannot satisfy the identity (or inversion) relation as shown in Figure 3d (see the open circle): V B 1 . Here, V B 1 means that detector B4 is also clicked on for E4, indicating an error. Like USCKD [23], this property of NA-USCKD is also deterministic in the key distribution with random eavesdropping owing to the MZI physics. Details of authentication are discussed in the section on network initialization.
Figure 4 shows numerical calculations for the MZI channel measurements in Figure 1 for the demonstration of unconditional security in NC-USCKD. The matrix representation [ M Z ] ψ , φ is for both E7 and E8 in the MZI paths of Figure 1:
[ M Z ] ψ , φ = 1 2 [ e i ( ψ 2 + φ 1 ) i e i ( ψ 2 + φ 1 ) i e i ( ψ 1 + φ 2 ) e i ( ψ 1 + φ 2 ) ] ,
where [ E 7 E 8 ] = [ M Z ] ψ , φ [ E 1 0 ] is satisfied (see Section D of the Supplementary Information). Figure 4 shows both the interference IN7,8 and visibility V7,8 in the shared MZI channels for a smart eavesdropper. Although the channel intrusion by Eve without altering the output fringe is theoretically and technically possible with the same measurement tool, Eve’s chance to decode is just 50% on average because there is no way to keep the same phase difference as Bob or Alice. In other words, the same fringe pattern (visibility) can be achieved by Eve, but the absolute phase information of the light carrier is impossible due to the superposition between the two paths. Thus, Eve’s eavesdropping chance with fringe coincidence is random, resulting in unconditional security. Moreover, a random phase-basis selection technique is added to prevent classical attacks such as memory-based attacks [23]. According to Equation (2), Alice’s phase adjustment on ψ 1 with ψ 2 is automatic as discussed in Figure 3. Figure 4a,b is for the address matching ( φ 2 = ψ 2 ) between Alice and Bob, while Figure 4c,d is for mismatching ( φ 2 ψ 2 ) . Regardless of knowing or unknowing the address set ( φ 2 , ψ 2 ) , Eve’s channel attack must fail due to the MZI physics as well as the channel independence of coherence optics, as shown in Figure 4. This measurement randomness by Eve is rooted in Equation (5), where the four phase exponents of the matrix elements are all same. Thus, the eavesdropping randomness and measurement indistinguishability in the shared MZI channels by Eve are sustained for φ 2 —dependent network channels, resulting in the unconditional security in NC-USCKD.

3.1. Network Initialization: Network Addressing and Authentication

In an N party attached classical network configuration through a commonly shared pair of MZI transmission channels, the network initialization includes network authentications between the two parties assigned by the corresponding address set of φ 2 and ψ 2 . For the deterministic randomness analyzed in Figure 1, Figure 2, Figure 3 and Figure 4, the network initialization between arbitrary two parties in the network is a prerequisite process to avoid any potential eavesdropping. Suppose that Alice and Bob represent any paired party in the network connected by a specific address set of ψ 2 and φ 2 , respectively (see Figure 1). For a preparation stage, first, Alice shuffles the MZI network by randomly shifting her phase shifter Ψ 1 with a phase parameter δ ( 0 δ 2 π ) . Alice is now ready for scanning Ψ 1 for her visibility VA. Second, Bob repeatedly sends the same test key encoded by his phase shifter Φ 1 with φ 1 { 0 , π } randomly. Third, Alice scans her phase shifter Ψ 1 until she obtains an interference fringe of the maxima. Then, Alice sets her phase basis with the δ —added one: ψ 1 { δ , π + δ } . This modified phase set has a 50% chance of correctness due to the MZI randomness as mentioned above for Eve. The network initialization results in authentication.
Eve can also do the same as Alice does, but her chance is worse than for randomness due to δ . The chance for Eve to have the same δ as Alice’s is extremely low. In principle, two independent MZI systems set for Bob-Eve and Bob-Alice have a rare chance to be the same as each other, unless the input information by Bob is known to Eve, which is prohibited by definition. This small chance depends on the detector sensitivity, which is lower than one in a million in commercially available avalanche photodetectors. This sensitivity-based resolution defines the maximum number of possible addresses in the network. Of course, the network address number can be increased infinitely by using address layers, e.g., by expanding the address set ( φ 2 j , ψ 2 j ) with the j hierarchy. Although Eve has luckily found the δ assigned by Alice, Eve still has 50% chance to coincide with Alice’s.
The network initialization is summarized in Table 1, where the sequence number 1–4 applies for Sequence below. For this, Alice randomly resets the MZI system by modifying her phase shifter Ψ 1 with a new phase variable δ as mentioned above, as a preparation stage: Sequence #0. First, Bob randomly selects φ { φ 2 , φ 2 + π } for the light pulse E4 in Figure 1 and sends it to Alice along with E3 (see Figure 2): Sequence #1. Second, Alice measures VA and randomly sets her phase controller Ψ 1 with either δ or δ + π to send the reflected light to Bob: Sequence #2. Alice announces the result of VA publicly. Note that Alice never announces her phase choice either for ψ 1 or δ . Third, Bob measures his VB and publicly announces whether Alice’s measurement is correct or not: Sequence #3. Lastly, Alice knows secretly and deterministically whether the δ is correct or wrong: Sequence #4. If it is wrong, Alice just adds a π phase to δ , otherwise keeps it as her final phase basis set of ψ . Table 1 is for the case of a π —phase shifted δ .
  • Sequence
0.
(Network preparation) Initially Alice resets the MZI network by disturbing the MZI with her phase controller Ψ ( δ ) and scans δ until she gets V A = ± 1 for the test bits provided by Bob. The δ is a phase variable added to her phase basis ψ { 0 , π } . Then, Alice gives a cue to Bob.
1.
Bob randomly selects his phase basis φ { 0 , π } , encodes his light with φ , and sends it to Alice.
2.
Alice measures VA, publicly announces the result, and returns the φ -set light to Bob after encoding it with δ + ψ .
3.
Bob measures VB and publicly announces whether Alice’s result is correct (O) or not (X).
4.
Alice resets her phase basis ψ { 0 , π } to either ψ { δ , π + δ } or ψ { δ , π δ } depending on the Bob’s announcement: end of network initialization.
Eve may also perform the same network initialization of Table 1 with an arbitrary value of δ for her phase shifter, Ψ e ( δ ) . As a result, Eve obtains the same pattern but with unsynchronized maxima with respect to Alice’s because δ δ due to the asymmetry of independent systems. The synchronization chance ( δ = δ ) between Eve and Alice is extremely low, where the chance is decided by the detector’s sensitivity as mentioned above: a commercially available detector sensitivity is very high (>104 V/W at GHz). Thus, the addressable networking with unconditional security is achieved by network initialization as shown in Table 1. The unconditional security is effective with a 50% chance (randomness) via information theory [31]. As discussed with memory-based attacks [23], Eve has no chance of eavesdropping the data. One might suggest that Eve’s eavesdropping trials may shift the VA value causing an error, where the shift must be consistent owing to Eve’s abilities in the coherence setup. However, a consistent VA shift to Alice does not affect the initialization process at all, otherwise, confirms Eve’s intrusion. Thus, network initialization implies both network addressing and authentication between two addressees because this process completely removes the potential eavesdropping chance by Eve.

3.2. Key Distribution Protocol

Table 2 shows the key distribution procedure without sifting for the present NC-USCC in Figure 1. This procedure accompanies the network initialization at each order to avoid the memory-based attack, otherwise sifting is performed [23]. Below is a summary of the key distribution process: Procedure. After network initialization, Bob prepares a random key using the orthogonal bases of φ 1 and sends it to Alice via the shared MZI transmission lines. Then, Alice randomly selects the Bob-prepared one using her phase bases ψ 1 and set it for a raw key. Here, ψ 1 is modified via the network initialization in addition to the individual address ψ 2 . Owing to the directional determinacy of MZI, both parties deterministically share the same raw key by simply reading out their visibilities (VA; VB). Both the identity and inversion relations in VB are used for the row keys, resulting in a nearly 100% bit rate. If bit-by-bit network initialization is not performed, then a usual sifting process is performed for a batched order based on the identity relation in VB (Section E of the Supplementary Information). In this added sifting case, the network initialization is performed for the batched order. For error corrections, both parties finally publicly announce their error bits only (red numbers), and then remove them from the row key chain. As a result, the same length of final key (m) is shared between Alice and Bob. Here, the mark X represents the discarded bit resulting from the error correction. To evaluate the error rate, Bob compares the final key chain (m) with his prepared one. Privacy amplification may be added by randomly selecting some bits in the final key chain to calculate the error bit rate. The following is the key distribution procedure for NC-USCKD (see Table 2).
  • Sequence
0.
The network initialization is performed for both network addressing and authentication: see Table 1.
1.
Bob randomly selects his phase basis φ 1 { 0 , π } to prepare a key and sends it to Alice.
2.
Bob converts the chosen basis φ 1 into a key for his key record x: x { 0 , 1 } , if φ = 0 , x = 0; if φ = π , x = 1. The φ 1 is not influenced by the network initialization process.
3.
Alice measures her visibility VA and keeps the record.
4.
Alice copies the Bob’s key for her record y via MZI directionality: if VA = 1, y = 0; if V A = 1 , y = 1; if V A ± 1 , y = VA (error).
5.
Alice randomly selects her phase basis ψ 1 { 0 , π } , encodes the return light, and sends it back to Bob. Here, the ψ 1 is a corrected value as a result of the network initialization process: see Table 1.
6.
Alice converts the chosen basis ψ 1 into a key record z:   z { 0 , 1 } ; if ψ 1 = 0 , z = 0; if ψ 1 = π , z = 1.
7.
Alice compares y and z for the raw key mA: m A = ( y + z ) 1   at   modulus   2 . If m A { 0 , 1 } , m A = X (error).
8.
Bob measures his visibility VB and keeps the record.
9.
Bob sets the raw key mB via MZI determinacy: if V B = 1 , m B = 0 ; V B = 1 , m B = 1 . If V B ± 1 , m B = X   ( error ) .
10.
Alice and Bob publicly announce their error bits and remove them from their raw keys to set the shared final key, { m } .

4. Discussion

Regarding the eavesdropping discussed in Figure 4, Eve can set up the same measurement tools for both outbound and inbound eavesdropping as Alice and Bob have, respectively. Then, Eve simply reads out her visibility relying on the same MZI directionality with best chance of 50% on average. For arbitrary addressing in the N-party attached NC-USCKD, the network initialization between any arbitrary bi-parties results in network authentication. Thus, Eve’s measurement-based eavesdropping for the phase-controlled round-trip MZI system of Figure 1 is worse than random, resulting in unconditionally secured cryptography, even in the classical domain. Here, the network resolution or maximum number of addresses in the network is determined by the MZI phase stability [32], where extension of the transmission distance of more than a few km range [27,28] for the shared MZI is a just technical issue [33].

Coherence-Based Memory Attack

The eavesdropping randomness in the MZI scheme of Figure 1 however must be consistent relative to all coherently measured bits by Eve either in phase or out of phase with Alice or Bob. This fact is critical to post-measurement attacks such as memory-based attacks because Eve can simply flip all eavesdropped bits for correction. To protect from such a classical attack, bit-by-bit network initialization (Table 1) or block-based sifting (Section C of the Supplementary Information) is necessary. In other words, the eavesdropping randomness in MZI must be bit-by-bit to satisfy unconditional security in the present scheme. Then, the maximum eavesdropping rate becomes η e = ( 1 2 ) N , where N is the key length in digits. For N = 128, η e ~ 10 39 , it takes much longer than the age of the universe (1035 s) for a brute-force attack to succeed even with the world’s most powerful supercomputer, whose bit flip time is 10−17 s (see Section F of the Supplementary Information). For the random bit sequence, no efficient algorithm exists except for brute-force attacks. Owing to the coherence optics compatible with conventional optical systems, the key length of the present NC-USCKD has no practical limit due to phase-locked amplification. Thus, the unconditional security of NC-USCKD using coherent light opens the door to potential one-time-pad cryptography in the classical domain, otherwise impossible.

5. Conclusions

The NC-USCKD protocol was presented, analyzed, and discussed for addressability in an N-party attached classical network, where unconditional security is based on quantum superposition between shared transmission lines in the classical regime. The key rate of NC-USCKD depends on classical optoelectronic devices such an acousto-optic or electro-optic modulators at GHz compatible with current fiber-optic communications network systems. The network initialization in the N-party-involved optical network was successfully shown for two arbitrary parties assigned by the public addresses. The number of public addresses is practically dependent on the photo-detector’s sensitivity. Network initialization also resulted in authentication between the addressed two parties, where Eve’s eavesdropping success rate is quadratically decreased as N linearly increases. The proposed NC-USCKD can be applied to conventional DWDM-based fiber-optic communications networks by allocating each address to each wavelength [34]. Because of the MZI robustness in phase fluctuations demonstrated in both optical fibers [24] and free space [28] for a few km ranges, the network extension to tens of km with large N is a simple technical issue with current locking technologies [27,28,33,34]. In a multi-core fiber, the MZI path length is potentially error-free due to the core-to-core proximity in a few microns [1]. The wavelength converter, optical MUX/DEMUX, and an amplifier such as EDFA are coherent devices, so a phase difference between the input and output can be locked. This fixed phase shift can also be adjusted for the desired interference fringe in a network preparation stage. For wavelength sharing/dependent network configurations, STAR, ring, or FTTH fiber optic networks are also possible.
Unconditional security in NC-USCKD by using bright coherent light was presented using addressable quantum superposition and its unitary transformation for a shared MZI system between any two arbitrary remote parties in a network. Compared with QKD protocols such as BB84 based on single photons over a single quantum channel, the unconditional security of NC-USCKD was far more superior, resulting in detection loophole-free, ultrafast and distance unlimited unconditionally secured cryptography for N parties in a network. Unlike the canonical (non-orthogonal) basis-based no-cloning theorem in QKD, the physics of unconditional security of NC-USCKD lies in the quantum superposition between paired transmission lines of the MZI channels and its unitary transformation in a round-trip scheme, resulting in deterministic randomness. To avoid potential eavesdropping, real-time network initialization was performed to protect from classical attacks such as memory-based attacks. Compared with the original point-to-point transmission scheme of USCKD, the addressability in NC-USCKD is due to the linearity of orthogonal basis expansion among N parties for N-to-N networking. Eventually, the proposed NC-USCKD can be applied to current fiber-optic communications networks with laser locking techniques as well as to future multi-core fiber networks. As a result, NC-USCKD has potential for the long-lasting goal of one-time-pad cryptography in the classical regime for artificial intelligence requiring unconditionally secured mass data communications, such as in unmanned vehicles, drones, and medical record transmission.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/cryptography6010004/s1.

Funding

This research was funded by ICT R&D program of MSIT/IITP (2021-0-01810), “Development of elemental technologies for ultra-secure quantum internet”.

Data Availability Statement:

The data presented in this study are available in article.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Matsuoka, S. Ultrahigh-speed ultrahigh-capacity transport network technology for cost-effective core and metro networks. NTT Tech. Rev. 2011, 9, 1–7. [Google Scholar]
  2. Arora, S.; Barak, B. Computational Complexity; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar]
  3. Swenson, C. Modern Cryptanalysis; Wiley: Indianapolis, IN, USA, 2008. [Google Scholar]
  4. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The security of practical quantum key distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef] [Green Version]
  5. Pljonkin, A.; Petrov, D.; Sabantina, L.; Dakhkilgova, K. Nonclassical Attack on a Quantum Key Distribution System. Entropy 2021, 23, 509. [Google Scholar] [CrossRef] [PubMed]
  6. Pljonkin, A.P. Vulnerability of the Synchronization Process in the Quantum Key Distribution System in Research Anthology on Advancements in Quantum Technology; IGI Global Commerce: Commerce, CA, USA, 2021. [Google Scholar]
  7. Rivest, R.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  8. Barker, E.B.; Dang, Q.H. Recommendation for Key Management Part 3: Application-Specific Key Management Guidance. NIST Spec. Publ. 2015, 800, 57. [Google Scholar]
  9. Papernot, N.; McDaniel, P.; Sinha, A.; Wellman, M. SoK: Towards the science of security and privacy in machine learning. arXiv 2016, arXiv:1611.03814. [Google Scholar]
  10. Gisin, N.; Ribordy, G.; Tittle, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef] [Green Version]
  11. Bennett, C.H.; Brassard, G. Withdrawn: Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 2011, 175, 8. [Google Scholar] [CrossRef]
  12. Christensen, G.K.; McCusker, K.T.; Altepeter, J.; Calkins, B.; Gerrits, T.; Lita, A.; Miller, A.; Shalm, L.K.; Zhang, Y.; Nam, S.W.; et al. Detection-loophole-free test of quantum nonlocality and applications. Phys. Rev. Lett. 2013, 111, 130406. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  13. Huang, A.; Sun, S.-H.; Liu, Z.; Makarov, V. Quantum key distribution with distinguishable decoy states. Phys. Rev. A 2018, 98, 012330. [Google Scholar] [CrossRef] [Green Version]
  14. Sajeed, S.; Huang, A.; Sun, S.; Xu, F.; Makarov, V.; Curty, M. Insecurity of detector-device-independent quantum key distribution. Phys. Rev. Lett. 2016, 117, 250505. [Google Scholar] [CrossRef] [Green Version]
  15. Wootters, W.K.; Zurek, W.H. A single quantum cannot be cloned. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
  16. Duan, L.-M.; Lukin, M.; Cirac, I.; Zoller, P. Long-distance quantum communication with atomic ensembles and linear optics. Nature 2001, 414, 413–418. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  17. Vernam, G.S. Secrete Signaling System. U.S. Patent 1,310,719, 22 June 1919. [Google Scholar]
  18. Epping, M.; Kampermann, H.; Macchiavello, C.; Bruß, D. Multi-partite entanglement can speed up quantum key distribution in networks. New J. Phys. 2017, 19, 093012. [Google Scholar] [CrossRef]
  19. Chen, K.; Lo, H.-K. Multi-partite quantum cryptographic protocols with noisy GHZ states. Quantum Inf. Comput. 2007, 7, 689–715. [Google Scholar] [CrossRef]
  20. Sasaki, M.; Fujiwara, M.; Ishizuka, H.; Klaus, W.; Wakui, K.; Takeoka, M.; Miki, S.; Yamashita, T.; Wang, Z.; Tanaka, A.; et al. Field test of quatum key distribution in the Tokyo QKD network. Opt. Exp. 2011, 19, 10387. [Google Scholar] [CrossRef]
  21. Zhang, Q.; Xu, F.; Chen, Y.-A.; Peng, C.-Z.; Pan, J.-W. Large scale quantum key distribution: Challenges and solutions [invited]. Opt. Exp. 2018, 26, 24260. [Google Scholar] [CrossRef] [Green Version]
  22. Liao, S.-K.; Cai, W.-Q.; Liu, W.-Y.; Zhang, L.; Li, Y.; Ren, J.-G.; Yin, J.; Shen, Q.; Cao, Y.; Li, Z.-P.; et al. Satellite-to-ground quantum key distribution. Nature 2017, 549, 43–47. [Google Scholar] [CrossRef] [Green Version]
  23. Ham, B.S. Unconditionally secured classical cryptography using quantum superposition and unitary transformation. Sci. Rep. 2020, 10, 11687. [Google Scholar] [CrossRef]
  24. Ham, B.S. Analysis of phase noise effects in a coupled Mach-Zhender interferometer for a much stabilized free-space optical link. Sci. Rep. 2021, 11, 1900. [Google Scholar] [CrossRef] [PubMed]
  25. Ham, B.S. The origin of anticorrelation for photon bunching on a beam splitter. Sci. Rep. 2020, 10, 7309. [Google Scholar] [CrossRef]
  26. Greenberger, D.M.; Horne, M.A.; Zeilinger, A. Multiparticle Interferometry and the Superposition Principle. Phys. Today 1993, 46, 22–29. [Google Scholar] [CrossRef] [Green Version]
  27. Xavier, G.; Von Der Weid, J.P. Stable single-photon interference in a 1 km fiber-optic Mach–Zehnder interferometer with continuous phase adjustment. Opt. Lett. 2011, 36, 1764–1766. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  28. Abbott, B.P.; Abbott, R.; Abbott, T.D.; Abernathy, M.R.; Acernese, F.; Ackley, K.; Adams, C.; Adams, T.; Addesso, P.; Adhikari, B.P.; et al. Observation of gravitational waves from binary black hole merger Phys. Rev. Lett. 2016, 116, 061102. [Google Scholar] [CrossRef]
  29. Fu, L.B.; Rochette, M.; Ta’eed, V.G.; Moss, D.J.; Eggleton, B.J. Investigation of self-phase modulation based optical regeneration in single mode As2Se3 chalcogenide glass fiber. Opt. Express. 2005, 13, 7639–7646. [Google Scholar] [CrossRef]
  30. Bennett, C.H. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 1992, 68, 3121–3124. [Google Scholar] [CrossRef]
  31. Shannon, C.E. Communication Theory of Secrecy Systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  32. Zhu, B.; Fini, J.M.; Yan, M.F.; Liu, X.; Chandrasekhar, S.; Taunay, T.F.; Fishteyn, M.; Monberg, E.; DiMarcello, F.V. High-Capacity Space-Division-Multiplexed DWDM Transmissions Using Multicore Fiber. J. Light. Technol. 2011, 30, 486–492. [Google Scholar] [CrossRef]
  33. Black, E.D. An introduction to Pound–Drever–Hall laser frequency stabilization. Am. J. Phys. 2001, 69, 79–87. [Google Scholar] [CrossRef] [Green Version]
  34. Hou, D.; Ning, B.; Zhang, S.; Wu, J.; Zhao, J. Long-term stabilization of fiber laser using phase-locking technique with ul-tra-low phase noise and phase drift. IEEE J. Sel. Top. Quantum Elec. 2014, 20, 1101308. [Google Scholar]
Figure 1. A schematic of NC-USCC. LD, Laser diode; OM, Optical modulator; Φ 1 ,   Φ 2 , Ψ 1 , Ψ 2 , Phase shifter; A 1 ~ A 4 ,   B 1 , B 3 , B 4 , Photodetector, OD, Optical delay, M, Mirror, Ei, Light i. The distance between Bob and Alice depends on the MZI stability which can be in the order of 10 km. For the whole network configuration, refer to Section C of the Supplementary Information.
Figure 1. A schematic of NC-USCC. LD, Laser diode; OM, Optical modulator; Φ 1 ,   Φ 2 , Ψ 1 , Ψ 2 , Phase shifter; A 1 ~ A 4 ,   B 1 , B 3 , B 4 , Photodetector, OD, Optical delay, M, Mirror, Ei, Light i. The distance between Bob and Alice depends on the MZI stability which can be in the order of 10 km. For the whole network configuration, refer to Section C of the Supplementary Information.
Cryptography 06 00004 g001
Figure 2. Numerical calculations for the transmission directionality in MZI. Visibility V5,6 (solid) and Interference IN5,6 (dotted) for (a) φ 2 = 0 and (b) φ 2 = π / 3 . (c) V5,6 and (d) IN5,6. V i , j = ( I j I i I i + I j ) , where I i is intensity of E i . IN 5 , 6 = ( E 5 + E 6 ) ( E 5 + E 6 ) .
Figure 2. Numerical calculations for the transmission directionality in MZI. Visibility V5,6 (solid) and Interference IN5,6 (dotted) for (a) φ 2 = 0 and (b) φ 2 = π / 3 . (c) V5,6 and (d) IN5,6. V i , j = ( I j I i I i + I j ) , where I i is intensity of E i . IN 5 , 6 = ( E 5 + E 6 ) ( E 5 + E 6 ) .
Cryptography 06 00004 g002
Figure 3. Numerical calculations of visibility VB for OKD. Visibility VB (a,b) for ψ 2 = φ 2 = 2 π / 5 , and (c,d) for ψ 2 = 0   and   φ 2 = 2 π / 5 . Calculations are based on Equation (1). V B = ( I 10 I 9 I 10 + I 9 ) : Ii is the intensity of Ei.
Figure 3. Numerical calculations of visibility VB for OKD. Visibility VB (a,b) for ψ 2 = φ 2 = 2 π / 5 , and (c,d) for ψ 2 = 0   and   φ 2 = 2 π / 5 . Calculations are based on Equation (1). V B = ( I 10 I 9 I 10 + I 9 ) : Ii is the intensity of Ei.
Cryptography 06 00004 g003
Figure 4. Numerical calculations of interference IN7,8 and visibility V7,8 for Figure 1. (a) IN7,8 and (b) V7,8 for ψ 2 = φ 2 = 2 π / 5 . (c) IN7,8 and (d) V7,8 for ψ 2 = 0   and   φ 2 = 2 π / 5 . The keys are denoted by dots: φ 1 = ψ 1 = 0   ( blue ) ;   φ 1 = ψ 1 = π   ( red ) . I N 7 , 8 = ( E 7 + E 8 ) ( E 7 + E 8 ) ; V 7 , 8 = ( I 8 I 7 I 7 + I 8 ) .
Figure 4. Numerical calculations of interference IN7,8 and visibility V7,8 for Figure 1. (a) IN7,8 and (b) V7,8 for ψ 2 = φ 2 = 2 π / 5 . (c) IN7,8 and (d) V7,8 for ψ 2 = 0   and   φ 2 = 2 π / 5 . The keys are denoted by dots: φ 1 = ψ 1 = 0   ( blue ) ;   φ 1 = ψ 1 = π   ( red ) . I N 7 , 8 = ( E 7 + E 8 ) ( E 7 + E 8 ) ; V 7 , 8 = ( I 8 I 7 I 7 + I 8 ) .
Cryptography 06 00004 g004
Table 1. Network initialization for Table 2.
Table 1. Network initialization for Table 2.
PartyOrder (N)12345678910
Sequence
Alice2VA1−1−11−1111−11
ψ δ δ δ + πδδ + πδ + πδδ + πδδ + π
4CorrectnessXOXXXOXOOO
Bob1 φ 0ππ0π000π0
3VB+1−1+1+1+1−1+1−1−1−1
V A = V 5 , 6 ; V B = V 9 , 10 . Table 1 is for π —added δ . For non- π —added δ , see [23]. The order number is to show random cases. “O” (“X”) represents a correct (wrong) one.
Table 2. A key distribution procedure for NC-USCKD in Figure 1. The phase φ 1 is denoted without addition of φ 2 for simplicity. So does ψ 1 . The red indicates a network error. Each ‘order’ needs the network initialization in Table 1, otherwise sifting for the identity relation is needed.
Table 2. A key distribution procedure for NC-USCKD in Figure 1. The phase φ 1 is denoted without addition of φ 2 for simplicity. So does ψ 1 . The red indicates a network error. Each ‘order’ needs the network initialization in Table 1, otherwise sifting for the identity relation is needed.
PartyOrder12345678910set
Sequence
Bob1 φ 1 00π0ππ0π0π
2Prepared key:
x ( φ 1 )
0010110101 { x }
8VB1−10.91−1−1−1111
9Raw key01X0111000 { m B }
10Final key01X01X1000 { m }
Alice3VA11−11−10.81−11−1
4Copy x: y001010.80101 { y }
5 ψ 1 π00πππ00π0
6 z ( ψ 1 ) 1001110010 { z }
7Raw key01001X1000 { m A }
10Final key01X01X1000 { m }
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ham, B.S. Network-Compatible Unconditionally Secured Classical Key Distribution via Quantum Superposition-Induced Deterministic Randomness. Cryptography 2022, 6, 4. https://doi.org/10.3390/cryptography6010004

AMA Style

Ham BS. Network-Compatible Unconditionally Secured Classical Key Distribution via Quantum Superposition-Induced Deterministic Randomness. Cryptography. 2022; 6(1):4. https://doi.org/10.3390/cryptography6010004

Chicago/Turabian Style

Ham, Byoung S. 2022. "Network-Compatible Unconditionally Secured Classical Key Distribution via Quantum Superposition-Induced Deterministic Randomness" Cryptography 6, no. 1: 4. https://doi.org/10.3390/cryptography6010004

Article Metrics

Back to TopTop