Quantum Cryptography Research Report
Quantum Cryptography Research Report
Final version, made publicly available on October 14 2021, after the defense (on 24/09/2021).
Composition du jury
Rapporteurs
Stephanie WEHNER Professeur, QuTech, Université Technologique de Delft
Hugo ZBINDEN Professeur, Université de Genève
Andrew SHIELDS Head of Quantum Technology Division, Toshiba, Cambridge
Examinateurs
Pascale SENELLART Directrice de Recherche, CNRS
Gilles ZEMOR Professeur, Université de Bordeaux
Nicolas TREPS Professeur, Sorbonne Université
ii
to Aurore, Antoine and Camille.
iii
iv
Acknowledgements
Let me first warmly thank Stephanie Wehner, Hugo Zbinden and Andrew Shields for re-
viewing the present manuscript, as well as Pascale Senellart, Gilles Zémor and Nicolas
Treps for accepting to participate in my habilitation committee. Their outstanding scien-
tific contributions, and the different ways with which they approach research and technol-
ogy constitute models that I have tried to learn from. It is an honor for me that they have
accepted to be part of my jury and I look forward to the defense.
Telecom Paris has been a great place to work along these years. Even if I cannot name
all of them, I would like to thank my colleagues, students, as well as the administrative
and management staff of the Telecom Paris, for making the school such a special place.
I want to specially thank Michel Riguidel, who has given me the opportunity to directly
dive into quantum European research, a beautiful and foundational learning experience
for me. I also want to thank Henri Maitre and Talel Abdessalem for their trust and support
expressed at many occasions, that has been instrumental to the development of the quan-
tum activity at Telecom Paris and LTCI and now in the stimulating context of IP Paris and
the Q UANTUM center.
I want to thank Philippe Grangier, Anthony Leverrier, and Eleni Diamanti, for the reg-
ular, stimulating and sometimes even heated discussions that we share, yet always in a
friendly spirit. I would like also to thank Norbert Lütkenhaus, for being such a kind and
trusted source of scientific advice over the years. I also would like to thank Iordanis Kereni-
dis, and Eleni another time, for the initiative to set up the Paris Center for Quantum Com-
puting. It has been a wonderful opportunity to learn more about the computer science
side of quantum, and to get to know better great quantum colleagues at IRIF and Inria Se-
cret. Thanks in particular to Jean-Pierre Tillich, Frederic Magniez, Sophie Laplante, André
Chailloux and Alex Grilo, for advices and enjoyable discussions.
It has been wonderful to work as a team at Telecom Paris during many years with
Eleni Diamanti, Damian Markham and Elham Kashefi. I would like to thank them for
many great memories, and for their unique way to combine never-ending optimism, great
coolness and high working standards. It was a bitter moment to see them leave in 2016,
but great to continue to have many opportunities to work together, which I am very happy
about. Over the next few years, the action of Gerard Memmi and Yves Poilane and also
the motivation and the decisive team effort with Isabelle Zaquine and Filippo Miatto, has
allowed us to look forward and I am grateful to them about this.
v
I also realize the importance, especially even more after two years spent on "Zoom", of
the network of European colleagues and scientific friends working on quantum commu-
nications and quantum cryptography, and of its quality. I want to thank the CIVIQ team
and in particular Valerio Pruneri for his leadership and his attention to ideas and people.
It is a great pleasure to work with Vicente Martin, Momtchil Peev Imran Kahn, Vladimir
Usenko, Tobias Gehring and Ulrich Andersen, in this context, and more broadly to travel
at their sides on the long-term quantum communications journey. A great thank also, for
the colleagues and friends at AIT, in particular Andreas Poppe, Hannes Hübel, Christoph
Pacher, which which we share a long collaboration history, initiated on quantum networks,
and now on CV-QKD and quantum cybersecurity. I look forward to continuing this collab-
oration in EuroQCI and contribute to build a quantum industry. A very special thank to
Yves Jaouen, and Cedric Ware. It is great to collaborate with them on the frontier between
quantum and classical coherent communications. Thanks Yves for sharing your wisdom
on the experimental secrets of the optical communication platform, and your decisive and
always warm-hearted support to make it “quantum”.
The long-term collaboration with IdQuantique and their team, has also played an im-
portant role in my career and certainly in the decision to start SeQureNet with Nicolas
Aliacar that I want to thank for his friendship and trust. I want to thank Grégoire Ribordy,
Nicolas Gisin, Hugo Zbinden and Bruno Huttner for many great moments at their sides,
and congratulate them for the 20 years of IDQ. It has also been a great pleasure to par-
ticipate to the collective effort, steered by the Toshiba team, towards industry standards
for QKD, with the ETSI QKD Industry Standardization Group. Let me thank in particu-
lar Marco Lucamarini, for many enlightening discussions as well as Tom Chapuran, Alan
Mink, Ivo Petro Degiovanni, Marco Gramegna and obviously Andrew Shields and Martin
Ward for bringing their driving energy and professionalism to his forum that is now truly
playing a central role in QKD industrialization, and notably security certification.
Let me finally conclude by thanking my students and post-docs, and in particular Ru-
pesh Kumar, who worked with me as a post-doc and was the driving force in our ex-
perimental CV-QKD papers. Let me also mention my former and current PhD students
Aurélien, Hao, Adrien, Nilesh, Raphaël, Francesco and Guillaume. It has been great - and
still is - working with them, hopefully learn how to become a better supervisor. I has been
great also to learn from their questions and vision as we tried to explore together new
paths within the quantum cryptographic landscape. I want to thank them for their com-
mitment and passion, as we slowly climbed this mountain together. This would not have
been possible without them. I hope they also enjoyed the journey and look very much
forward to future hikes.
vi
List of publications
3. Raphaël Aymeric and Romain Alléaume. Covert continuous variable quantum key
distribution. In Preparation, 2021
4. Shihan Sajeed, Romain Alléaume, and Hoi-Kwong Lo. A direct look at quantum
secure communication. In Preparation, 2022
2. Hao Qin, Rupesh Kumar, Vadim Makarov, and Romain Alléaume. Homodyne-detector-
blinding attack in continuous-variable quantum key distribution. Physical Review A,
98(1):012312, 2018
3. Adrien Marie and Romain Alléaume. Self-coherent phase reference sharing for continuous-
variable quantum key distribution. Physical Review A, 95(1):012316, 2017
4. Hao Qin, Rupesh Kumar, and Romain Alléaume. Quantum hacking: Saturation at-
tack on practical continuous-variable quantum key distribution. Physical Review A,
94(1):012325, 2016
5. Rupesh Kumar, Hao Qin, and Romain Alléaume. Coexistence of continuous variable
qkd with intense dwdm classical channels. New Journal of Physics, 17(4):043027, 2015
vii
6. Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dia-
nati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Länger, Norbert Lütken-
haus, et al. Using quantum key distribution for cryptographic purposes: a survey.
Theoretical Computer Science, 560:62–81, 2014
9. Jean-Loup Smirr, Sylvain Guilbaud, Joe Ghalbouni, Robert Frey, Eleni Diamanti, Ro-
main Alléaume, and Isabelle Zaquine. Simple performance evaluation of pulsed
spontaneous parametric down-conversion sources for quantum communications. Op-
tics express, 19(2):616–627, 2011
10. Louis Salvail, Momtchil Peev, Eleni Diamanti, Romain Alléaume, Norbert Lütken-
haus, and Thomas Länger. Security of trusted repeater quantum key distribution
networks. Journal of Computer Security, 18(1):61–87, 2010
11. Romain Alleaume, François Roueff, Eleni Diamanti, and N Lütkenhaus. Topolog-
ical optimization of quantum key distribution networks. New Journal of Physics,
11(7):075002, 2009
12. Momtchil Peev, Christoph Pacher, Romain Alléaume, Claudio Barreiro, Jan Bouda,
W Boxleitner, Thierry Debuisschert, Eleni Diamanti, M Dianati, JF Dynes, et al. The
secoqc quantum key distribution network in vienna. New Journal of Physics, 11(7):075001,
2009
13. Anthony Leverrier, Romain Alléaume, Joseph Boutros, Gilles Zémor, and Philippe
Grangier. Multidimensional reconciliation for a continuous-variable quantum key
distribution. Physical Review A, 77(4):042325, 2008
14. Mehrdad Dianati, Romain Alléaume, Maurice Gagnaire, and Xuemin Shen. Archi-
tecture and protocols of the future european quantum key distribution network. Se-
curity and Communication Networks, 1(1):57–74, 2008
15. Y Dumeige, R Alléaume, P Grangier, F Treussart, and J-F Roch. Controling the single-
diamond nitrogen-vacancy color center photoluminescence spectrum with a fabry–
perot microcavity. New Journal of Physics, 13(2):025015, 2011
viii
16. Quyên Dinh Xuân, R Alléaume, Liantuan Xiao, F Treussart, B Journet, and J-F Roch.
Intensity noise measurement of strongly attenuated laser diode pulses in the time
domain. The European Physical Journal Applied Physics, 35(2):117–121, 2006
18. Romain Alléaume, Francois Treussart, Jean-Michel Courty, and Jean-Francois Roch.
Photon statistics characterization of a single-photon source. New Journal of physics,
6(1):85, 2004
19. Y Dumeige, F Treussart, R Alléaume, T Gacoin, J-F Roch, and P Grangier. Photo-
induced creation of nitrogen-related color centers in diamond nanocrystals under
femtosecond illumination. Journal of luminescence, 109(2):61–67, 2004
20. François Treussart, Romain Alléaume, Véronique Le Floch, LT Xiao, J-M Courty, and
J-F Roch. Direct measurement of the photon statistics of a triggered single photon
source. Physical review letters, 89(9):093601, 2002
21. François Treussart, Romain Alléaume, Véronique Le Floc’h, and Jean-François Roch.
Single photon emission from a single molecule. Comptes Rendus Physique, 3(4):501–
508, 2002
22. RA Michniak, R Alleaume, DN McKinsey, and JM Doyle. Alpha and beta particle
induced scintillations in liquid and solid neon. Nuclear Instruments and Methods in
Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equip-
ment, 482(1-2):387–394, 2002
Conference proceedings
1. Romain Alléaume, Raphaël Aymeric, Cédric Ware, and Yves Jaouën. Technology
trends for mixed qkd/wdm transmission up to 80 km. In 2020 Optical Fiber Commu-
nications Conference and Exhibition (OFC), pages 1–3. IEEE, 2020
2. Ravi Raghunathan, G Ricard, Filippo Miatto, Isabelle Zaquine, and Romain Alléaume.
Single qubit arbitrary unitary synthesis using photonic spectral encoding. In Quan-
tum Technology International Conference (QTech 2018), 2018
3. Romain Alléaume, Ivo P Degiovanni, Alan Mink, Thomas E Chapuran, Norbert Lutken-
haus, Momtchil Peev, Christopher J Chunnilall, Vincente Martin, Marco Lucamarini,
Martin Ward, et al. Worldwide standardization activity for quantum key distribu-
tion. In 2014 IEEE Globecom Workshops, pages 656–661. IEEE, 2014
4. Hao Qin, Rupesh Kumar, and Romain Alléaume. Saturation attack on continuous-
variable quantum key distribution system. In Emerging Technologies in Security and
ix
Defence; and Quantum Security II; and Unmanned Sensor Systems X, volume 8899, page
88990N. International Society for Optics and Photonics, 2013
5. Yannick Dumeige, Romain Alléaume, Philippe Grangier, François Treussart, and Jean-
François Roch. Coupling of a single nitrogen vacancy colour centre in diamond, to
a planar microcavity. In 2011 13th International Conference on Transparent Optical Net-
works, pages 1–4, 2011
6. David Elkouss, Anthony Leverrier, Romain Alléaume, and Joseph J Boutros. Efficient
reconciliation protocol for discrete-variable quantum key distribution. In 2009 IEEE
International Symposium on Information Theory, pages 1879–1883. IEEE, 2009
7. M Peev, Romain Alléaume, T Langer, Lutkenhaus N, Maurhart O., and Salvail L. The
secoqc quantum key distribution network prototype: Principles, design and imple-
mentation. In Globecom. IEEE, 2007
8. Mehrdad Dianati and Romain Alléaume. Architecture of the secoqc quantum key
distribution network. In 2007 First International Conference on Quantum, Nano, and
Micro Technologies (ICQNM’07), pages 13–13. IEEE, 2007
9. Mehrdad Dianati and Romain Alléaume. Architecture of the secoqc quantum key
distribution network. In 2007 First International Conference on Quantum, Nano, and
Micro Technologies (ICQNM’07), pages 13–13. IEEE, 2007
10. Rex AC Medeiros, Romain Alléaume, Gérard Cohen, and Francisco M de Assis. Zero-
error capacity of quantum channels and noiseless subsystems. In 2006 International
Telecommunications Symposium, pages 900–905. IEEE, 2006
11. Romain Alléaume, François Roueff, Oliver Maurhart, and N Lutkenhaus. Architec-
ture, security and topology of a global quantum key distribution network. In 2006
Digest of the LEOS Summer Topical Meetings, pages 38–39. IEEE, 2006
12. Romain Alléaume, Jean-François Roch, Darius Subacius, Anton Zavriyev, and Alexei
Trifonov. Fiber-optics quantum cryptography with single photons. In AIP Conference
Proceedings, volume 734, pages 287–290. American Institute of Physics, 2004
13. Alexei Trifonov, Anton Zavriyev, Darius Subacius, Romain Alléaume, and Jean-François
Roch. Practical quantum cryptography. In Quantum Information and Computation II,
volume 5436, pages 1–11. International Society for Optics and Photonics, 2004
14. Lian-Tuan Xiao, Romain Alléaume, Quyen Dinh Xuan, Francois Treussart, Bernard A
Journet, and Jean-françois Roch. Measurement of photon distribution in attenuated
diode laser pulses. In Physics and Simulation of Optoelectronic Devices XI, volume 4986,
pages 463–468. International Society for Optics and Photonics, 2003
x
15. F Treussart, R Alléaume, V Le Floc?h, LT Xiao, J-F Roch, and J-M Courty. Pho-
ton statistics of a single photon source. In Organic Nanophotonics, pages 413–422.
Springer, 2003
16. Francois Treussart, Romain Alléaume, Jean-Michel Courty, and Jean-Francois Roch.
Emission properties of a single photon source. Physica Scripta, 2004(T112):95, 2004
2. Marco Lucamarini, Andrew Shields, Romain Alléaume, Christopher Chunnilall, Ivo Pietro
Degiovanni, Marco Gramegna, Atilla Hasekioglu, Bruno Huttner, Rupesh Kumar,
Andrew Lord, Norbert Lütkenhaus, Vadim Makarov, Vicente Martin, Alan Mink,
Momtchil Peev, Masahide Sasaki, Alastair Sinclair, Tim Spiller, Martin Ward, Cather-
ine White, and Zhiliang Yuan. Implementation security of quantum cryptography.
ETSI Group Specification Document, 2018
Patents
1. Romain Alléaume. Communication with everlasting security from short-term-secure
encrypted quantum communication, October 2016. International Patent WO2016110582A1
2. Romain Alléaume and Adrien Marie. Phase reference sharing schemes for continuous-
variable quantum cryptography, May 2016. European Patent EP3244566
xi
xii
Contents
1 Introduction 1
1.1 From research to applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Quantum cryptography and its applications frontiers . . . . . . . . . . . . . 2
1.3 Organization of the manuscript and main contributions . . . . . . . . . . . . 4
xiii
4.3.1 Quantum hacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
4.3.2 Towards security certification . . . . . . . . . . . . . . . . . . . . . . 54
5 Perspectives 59
5.1 Critical assessment of quantum cryptography positioning . . . . . . . . . . 60
5.1.1 Classical and quantum cryptography: a complex dialectic . . . . . . 60
5.1.2 Bridging the divides by resetting priorities . . . . . . . . . . . . . . . 64
5.2 Quantum cryptography in a hybrid security model . . . . . . . . . . . . . . 67
5.2.1 Extended security models in quantum cryptography . . . . . . . . . 67
5.2.2 Quantum Computational Timelock Security Model . . . . . . . . . 68
5.2.3 MUB-QCT key establishment protocol . . . . . . . . . . . . . . . . . . 71
5.2.4 QCT: Challenges and Future work . . . . . . . . . . . . . . . . . . . . 76
5.3 Towards real-world quantum cryptography . . . . . . . . . . . . . . . . . . . 78
5.3.1 A holistic and engineering-driven approach . . . . . . . . . . . . . . 78
5.3.2 Renewed perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
xiv
Chapter 1
Introduction
My research activity over the past fifteen years has largely been focused on quantum cryp-
tography and in particular quantum key distribution (QKD) and its industrial develop-
ment. This has given me the opportunity to tackle a large variety of subjects, ranging from
foundamental scientific questions related to information security and quantum optics, to
technological and engineering challenges associated with the development of a commer-
cial QKD system. This “Habilitation à Diriger des Recherches” (HdR) manuscript intends
to present an overview of this work and also to draw some perspectives for the future of
quantum cryptography, with a focus on its practical applications.
1
Chapter 1. Introduction
Technology Development
Quantum Envisaged
Information Applications
Research
Figure 1.1: Dialectic interaction between research in quantum information and the targeted
applications.
2
1.2. Quantum cryptography and its applications frontiers
Application
frontier
ty
Ne
ity
uri
cur
tw
Tel
ork
Se
c
rSe
e
(QKD)
co unica
Co
be
m tion
mm
pto
Q Crypto
Cy
Cry
s
Q Information Q Technologies
(QKD)
Q Foundations
Figure 1.2: QKD is a pluri-disciplinar technology. It rests on a foundational quantum pil-
lar and is becoming increasingly connected to the telecommunications and cyber-security
industry pillars.
Figure 1.2 provides a pictorial representation of this viewpoint, in the form of a trian-
gle, that can also be seen as a bird’s eye view of the content of this manuscript. We will
begin with the basis of the triangle, with chapter 2 on quantum cryptography, where we
will briefly position existing primitives in terms of service but also in terms of technologi-
cal readiness. We will then address in chapter 3, and chapter 4 respectively, the two other
sides of the triangle, and the challenges associated with the integration of quantum cryp-
tography (and principally QKD), in the cybersecurity and telecom landspaces. Finally we
will propose in chapter 5 a more personal analysis of some of the lessons learnt at the ap-
plication frontier, based on the experience and insights gathered as a contributor to QKD
technology. This actually leads us to formulate a critical analysis of QKD positioning and
then, to propose a path and some new perspectives for quantum cryptography, both in
terms of research program and applications.
3
Chapter 1. Introduction
Let us now describe in more details, chapter by chapter, and section by section, the content
of this manuscript, with pointers towards the related scientific contributions and refer-
ences.
4
1.3. Organization of the manuscript and main contributions
have contributed to define and formalize the architecture of QKD networks, including the
3-layers architecture [ARML06] that has then become widely adopted [SFI+ 11, CZC+ 21,
MNR+ 20]. In collaboration with my European colleagues, in particular at AIT Vienna,
we also came up with the first suite of network protocols for a trusted node QKD net-
works, [DA07] that has then been demonstrated at metropolitan scale during the SECOQC
demonstration Vienna in 2008 [PPA+ 09].
We also present and put in perspective our work on mixed QKD/WDM transmission
[KQA15], in which we performed the first experimental demonstration that QKD could be
deployed over an optical fibre in coexistence with intense WDM channels, whose launch
power is typically around 0 dBm. Such “native strong coexistence capability” is made pos-
sible by the significant common mode rejection ratio that can be obtained with a balanced
homodyne receiver. Also not yet sufficient for deployment over optical backbones, these
results and the additional recent progress [EHP+ 19, KSDS19] position quantum coherent
communications favorably in view of the integration of quantum communication over ex-
isting lit fiber network infrastructure.
Chapter 4 is dedicated to the interplay between QKD and security. After recalling its
composable security definition 4.1, we discuss how QKD can be used and combined with
other security primitives in order to provide security services, while keeping an edge over
purely computational and classical constructions.
The question of enhancing real-world security applications using QKD 4.2 has been
(and still is) at the heart of my research work, starting with the SECOQC white paper
[ARW+ 07] that was later published, after an important revision work, in the special issue
of the Theory of Computer Science journal, at the occasion of the 30th birthday of BB84
[ABB+ 14]. This part of my work has lead me to become increasingly interested by cryp-
tography, and also increasingly aware of the dissensus that could exist between quantum
and classical cryptographers, in relation with QKD. This raising of awareness has in return
deeply influenced my research. In particular, it has motivated me to investigate the nature
of the dissensus and to develop research positioned at the frontier between classical and
quantum cryptography, and that may contribute to reconcile both visions.
The ability to build quantum cryptographic hardware and to certify its security prop-
erties appears as another central challenge addressed in section 4.3. In this perspective,
the design, evaluation and certification of QKD implementation secure against high attack
potential attackers appears as a concrete and ambitious objective, to which my research
team has vigorously contributed, notably via our work on saturation attack on CV-QKD.
In [QKA16], we studied the implementation security of CV-QKD and demonstrated that
the non-linear response of coherent receivers, in case it is not monitored, could be used
as an attack vector against CV-QKD and lead to a full security break. We coined this vul-
nerability “Saturation Attack”. We then showed in [QKMA18] that this attack could be
implemented with simple hardware and proposed a practical counter-measure. We also
participate to the ETSI QKD-ISG efforts on QKD implementation security[LSA+ 18], and to
the writing of the first QKD protection profile [ETS21]. Towards this end, we have recently
5
Chapter 1. Introduction
proposed and experimentally demonstrated how the Common Criteria methodology and
attack ratings can be applied to conduct vulnerability analysis of QKD [KMQA21] paving
the way towards security certification of real-world quantum cryptographic systems.
The final Chapter 5 intends to conclude this manuscript by drawing some new per-
spectives towards real-world application of quantum cryptography. This chapter is built
around original content as well as research in progress. We open this chapter, in section
5.1, with a critical analysis of quantum cryptography positioning. Building on our work
on the use of QKD for cryptographic purposes [ARW+ 07, ABB+ 14] but also acknowledg-
ing the important dissensus between quantum and classical cryptography communities
[PPS07, Sch18, NCS20, ANS20, NSA20], we try to identify the nature of the complex di-
alectic interaction between these communities and the grounds on which their vision of
cryptography can differ. This leads us to suggest a revised positioning with a stronger
complementarity with respect to classical cryptography, as well as and an engineering-
driven approach targeted to provide a security gain in realistic contexts.
Section 5.2, then presents our ongoing work on quantum cryptography in an hy-
brid quantum-computational security model that combines the noisy storage assumption
[KWW12] with an extra assumption, namely the short-term security of computational one-
way functions [Unr15] . The advantage of this Quantum Computational Timelock (QCT)
security model is to allow to build protocols with everlasting security (unreachable with
computational schemes) with performance (rate-loss behavior) and functionality that go
beyond what is possible with “standard” quantum cryptography. Building on some ideas
first proposed at QCrypt 2015 [All15b]. We recently proposed [VA20] a key distribution
protocol in the QCT security model whose security proof can be established- for the mo-
ment against restricted attacks - by a reduction to a quantum to classical randomness ex-
tractor [BFW13]. This leads to key distribution rates that could be boosted by a O(d) factor
when implemented over a d-dimensional encodings, opening a new path towards quan-
tum key establishment in high-loss setting, but also in terms of practical security with
reduced trust requirements at the receiving site. I have also filed three european patent
demands in relation with this work, one of them leading to a granted international patent
[All15a, All15c, All16].
We conclude in 5.3 with a final section that intends to propose a shift in the approach
pursued by practical quantum cryptography towards a revised vision that we call real-
world quantum cryptography (rwqc) by analogy with the distinctive approach, scientific
and technological work as well as community building that has already occurred around
real-world cryptography [RWC]. Rwqc emerges as a holistic approach characterized by a
shift of priorities towards objectives such as practical security gain in real-world applica-
tion contexts or the ambition to engineer cost-effective quantum cryptographic hardware
whose security can be certified. We elaborate on these perspectives and on the concrete
development of such a real-world quantum cryptography program and try also to capture
the high-level vision that it could be based upon. This leads us to envisage “Slow Infor-
mation” in which data locality and privacy could emerge as central concepts empowered
6
1.3. Organization of the manuscript and main contributions
7
Chapter 1. Introduction
8
Chapter 2
Quantum cryptography can be defined as the ensemble of cryptographic tasks that are
impossible to realize solely with classical means, and that are rendered possible thanks to
the use of quantum information as a communication or processing resource.
From a conceptual viewpoint, the central challenge of quantum cryptography is hence
to leverage quantum information principles in order to build cryptographic protocols that
meet one of the two following objectives:
1. Reach a security level that cannot be obtained classically, in particular based on clas-
sical information processing and computational assumptions.
2. Realize functionalities that are not achievable solely with classical means.
Cryptographic protocols can essentially be built from a small set core building blocks,
such as randomness generation, cryptographic hashing, key establishment, data encryp-
tion, as well as digital signature and commitment schemes. Such core building blocks
are called cryptographic primitives and are logically the main focus of attention both for
codebreakers and codemakers.
We aim to present here a schematic overview of existing quantum cryptographic prim-
itives, with of focus on applications and hence primitives that can be implemented with
near-term technologies. Towards this end we analyze for which cryptographic functional-
ities there exist constructions based on quantum resources that allow to obtain a specific
“quantum cryptographic advantage”, but also for which functionalities we cannot hope to
obtain such an advantage. This overview will moreover allow us to position quantum key
distribution - that will be the main primitive studied in this manuscript - in the broader
landscape of quantum cryptographic applications.
9
Chapter 2. Charting the near-term quantum cryptographic landscape
Even thought the distinction between near-term and long-term applications is deemed
to be at least partially subjective and will of course evolve with time, it seems interesting
to identify some patterns correlating between the technological readiness quantum cryp-
tographic primitives and their required resources:
• Quantum money, i.e. the ability to design unforgeable quantum coins (which hence
requires long-term quantum storage) whose validity could be verified privately (by
the bank) [Wie83]. An important question is to design a scheme allowing for publicly
verifiable quantum money [AC12, Zha19].
• Generalization of cryptographic primitives, definition of appropriate security mod-
els and constructions, in a setting where quantum information is processed using a
quantum computer. This can in particular relate the encryption of quantum informa-
tion [BZ13, ABF+ 16].
• Private quantum computation [Fit17]. Considering that future large quantum com-
puters will be mostly accessed through the cloud, there will be a pressing need to
10
2.2. Framing quantum cryptographic advantage
allow for private quantum computation and to develop protocols to address the task
of securely delegating quantum computation to an untrusted device while maintain-
ing the privacy, and in some instances the integrity, of the computation. Following
the seminal theoretical breakthrough leading to the first protocol for blind quantum
computing scheme[BFK09], private quantum computation is a very active research
field.
11
Chapter 2. Charting the near-term quantum cryptographic landscape
the future, due to advances in algorithmic or in computing power. In particular, in the con-
text of secure communication with classical data, harvesting attacks sometimes described
as “ store now, attack later” are intrinsically always possible, since classical data can be
copied at the physical layer, without restrictions. This jeopardizes the ability to guarantee
long-term security with classical cryptography.
An essential advantage of quantum cryptography is hence to provide a practical route
to realize some cryptographic functionalities with information-theoretic security (ITS), thereby
reducing, if not removing the security threats inherent to computational assumptions.
12
2.3. Functional overview of quantum cryptographic primitives
each other and aiming to establish fresh new key material, secure against a third party, the
attack attacker Eve that is hence untrusted.
Trust models are also related to physical trust assumptions that play a central role in the
practical security of real-word cryptographic system implementation. Such assumptions
indeed play a particular role in quantum cryptography. As a matter of fact, quantum
cryptography is intrinsically based on a formalized description of the physical layer, that
allows to use specific verification methods to assess and assess the validity of the model,
along three main lines:
13
Chapter 2. Charting the near-term quantum cryptographic landscape
of course, in a state of sin”. Another striking illustration of the issue one can encounter
with a PRNG, is that the algorithm might have been intentionally flawed to contain a
backdoor, as it has been the case with Dual_EC_DRBG (Dual Elliptic Curve Deterministic
Random Bit Generator) as revealed by Edward Snowden based on a leaked NSA memo
[Lan14]. Such backdoor in a PRNG, that was part of a standardized cryptographic suite
could in particular impact the security of cryptographic key generation, by making such
keys predictable for the NSA .
There is therefore a compelling need to produce “true” random numbers, that could
constitute a guaranteed source of entropy even in adversarial settings, and we know that
such true random number generators (TRNGs) cannot just be digital, and must instead rely
on some physical hardware able to generate some physical output that is sampled in order
to obtain an entropy source. “Classical” TRNGs exist and are commercially available. They
typically consist in high-dimensional and chaotic physical systems, such as ring oscillators
or thermal noise in resistors.
Quantum random number generators (QRNGs) constitute a special kind of hardware-
based TRNGs, where the physical systems that is measured, in a quantum system in
some superposition of the measurement eigenstates [HCea17]. This leads to measurement
outcomes that constitute a “natural” entropy source, that still need to be classically
processed with a randomness extractor, in order to provide almost uniform randomness.
• Prepare and measure QRNGs (PM-QRNGs), for which the quantum state preparation
and measurement device need to be trusted. An interesting research question would
consist in clarifying to which extend PM-QRNGs differ, from a security standpoint,
from other hardware-based TRNGs. Such difference might stem if some specific vul-
nerability of chaos-based systems to injection attacks, able to strongly reduce their
output entropy [MM09], could be proven to be generic.
14
2.3. Functional overview of quantum cryptographic primitives
Distributing cryptographic secret keys among a set of legitimate users is a central problem
in cryptography. Before the advent of public-key cryptography in the 1970’s, sharing a
symmetric key between the sender and the receiver was a prerequisite to establish a se-
cure channel, with the issue that the distribution of initial secret keys had to be performed
outband, typically using secret couriers, making it difficult to manage over large networks,
without a centralized and trusted operator. This issue, known as the key establishment prob-
lem has been a structural problem that has had a deep impact on the deployment and the
practical operation of cryptography until the 1970’s. The invention of public-key cryp-
tography in 1976 [DH76] has litterally lead to a revolution of our digital society, enabling
a whole new set of secure functionalities over open networks, and in particular digital
signature and key establishment, even between users that do not initially share a secret,
therefore offering a solution to the key establishment problem. More broadly public-key
cryptography has provided the security foundations for the development of Internet.
Quantum key distribution (QKD), invented in 1984 by Charles Bennett and Gilles Bras-
sard [BB14] based on some earlier ideas of Stephen Wiesner [Wie83] is a quantum crypto-
graphic alternative solution to the secret key establishment problem. It is a 3-party prim-
itives, with two trusted parties (Alice and Bob) and an eavesdropper, Eve. Rigorously
speaking, QKD should be called quantum key agreement, or quantum key establishment,
since the secret key shared at the end of the protocol is not decided upon solely by one
of the player and then distributed to the other. However, the expression “quantum key
distribution” and the acronym QKD are now firmly established.
Contrary to the computationally-secure secret-key and public-key schemes for key es-
tablishment, QKD is information-theoretically secure (ITS), i.e. secure irrespectively of the
computing power that may be used by an attacker [May01, BBB+ 06, SP00]. In particular
QKD is secure even against an attacker equipped with a quantum computer, and yet can
be operated with available technology. QKD hence offers a solution for ITS key establish-
ment, while this primitive impossible to realize with classical means 2
It is interesting to note that information-theoretically secure classical secret key agree-
ment, by public discussion, over an untrusted channel is possible [Mau93], and that such
work has played an important role in establishing the theoretical foundations of QKD se-
curity [BBCM95]. ITS classical secret key agreement however typically requires settings
with additional assumptions, such as the wire-tap channel [Wyn75] or the satellite sce-
nario [Mau93] that allow to guarantee that the amount of information accessible to Eve
remains bounded to a level below with the mutual information between Alice and Bob. In
this perspectives, the striking advantage of QKD is to use fundamental quantum proper-
ties, and in particular measurement-disturbance trade-off, to upper the information leaked
to Eve, therefore alleviating the need for additional assumptions.
2
Whether practical QKD can serve real-world applications, with an effective advantage with respect to
classical alternatives, will be evoked in more depth in the next chapters.
15
Chapter 2. Charting the near-term quantum cryptographic landscape
A protocol realizing OT is said to be secure if none of the parties learn any more infor-
mation than what she is supposed to learn according to the protocol definition (for example
a 1-out-of-2-OT would be insecure, if A could learn bit c or if B could both bits b0 and b1 ).
Following the first breakthrough result in quantum cryptography, with the BB84 QKD
protocol, a long series of work has studied which other MPC cryptographic primitives are
possible in the quantum world.
However, the subsequent results were negative as Mayers and also Lo and Chau proved
in 1997 the impossibility of secure ideal quantum bit commitment and oblivious transfer
and consequently of any type of two-party secure computation [May97, Lo97, LC97], with
information-theoretic-security. The intuition behind this no-go result is that entanglement
can be always be used to establish cheating strategies that cannot be detected by an honest
player.
Under additional physical limitations, secure OT is however possible and this is in
particular the case if Bob has a bounded [DFSS08] or a noisy quantum memory [KWW12],
but also based on relativistic constraints [KTHW13, PGea18].
16
2.3. Functional overview of quantum cryptographic primitives
Another important 2-party primitive is coin flipping over the telephone (that we will sim-
ply denote as coin flipping), which was first proposed by Blum [Blu83] and has since found
numerous applications in two-party secure computation. Even though the results of May-
ers and of Lo and Chau exclude the possibility of perfect quantum coin flipping, i.e., where
the resulting coin is perfectly unbiased, it still remained open whether one can construct a
quantum protocol where no player could bias the coin with probability 1.
Aharonov et al. [ATSVY00] indeed provided a quantum coin flipping protocol where
no dishonest player could bias the coin with probability higher than 0.9143. A series of
work then tried to investigate how low the cheating probability of a dishonest player could
be, in a quantum setting. Kitaev established a 1/2 lower bound for the product Alice and
Bob cheating probabilities, therefore leading to a √12 lower bound in the case where Alice
and Bob cheating strategies are symmetric. Again a series of theoretical advances, and the
construction of an optimal weak coin flipping protocol by Mochon [Moc07], culminated
into a quantum (strong) coin flipping protocol, with almost optimal cheating probability,
√1 + [CK09].
2
17
Chapter 2. Charting the near-term quantum cryptographic landscape
MPC
Coin ITS Almost optimal cheating probabil-
Flipping ity of √12 + for strong coin flipping
[CK09].
18
Chapter 3
Quantum communication
engineering
QKD is one of the most mature quantum technologies [LT19]. Its development is in-
trinsically related to the ability of enabling security applications with security levels (no-
tably information-theoretic-security) unachievable classically. This “cryptographic facet”
of QKD has been contextualized in the previous chapter and will be the focus of the next
chapter.
In this chapter, we want to focus on the “communication facet” of QKD and on the driv-
ing role that quantum key distribution is playing on the development of quantum commu-
nication research and technologies. Addressing some of the associated quantum commu-
nication challenges has been one of the important objectives of my research work, with as-
sociated contributions ranging from QKD system engineering [LAB+ 08, JKJD+ 12, MA17]
to Quantum communication networking [ARDL09, PPA+ 09] , including the integration of
QKD over existing classical WDM optical networks [KQA15, AAWJ20], that we will now
review and put in context in this chapter.
19
Chapter 3. Quantum communication engineering
20
3.2. DV and CV Quantum communication technologies
DV-QKD CV-QKD
Long reachable distance achievable More sensitive to loss
with current detectors Distance limit demonstrated:
Typically 150 km- 200 km can be 25 km in 2007 [LBGP+ 07], 80 km in 2013
reached (1 bit/s limit around 300 km) [JKJL+ 13a] Cf subsection 3.3.2, 150 km in
2020 [ZCP+ 20]
DV-QKD key rate is not very sensitive CV-QKD has more complex post processing
to reconciliation efficiency and is very sensitive to reconciliation effi-
ciency. Need for specific highly efficient er-
ror correction codes. Cf subsection 3.3.2
Single photon detectors need to be Coherent receivers can be operated at room
cooled (-30◦ C for APDs, 4K for SNSPDs) temperature
Single photon detectors are sensitive Coherent detector act as selective spectral
to stray light.WDM integration requires filters well fit for WDM integration, Cf sec-
high filtering tion 3.4.2.
No need of phase reference Need of a shared phase reference between
(phase randomization is actually better Alice and Bob, Cf subsection 3.3.1
for security)
21
Chapter 3. Quantum communication engineering
The Local Local Oscillator method. In order to lift the limitations of CV-QKD im-
plementations relying on the TLO design, a new CV-QKD method relying on a “local local
22
3.3. CV-QKD System Engineering
LO pulses BOB
LO pulses ALICE signal pulse α S
BOB LO Coherent
reference pulse α R detection
ALICE
+
optical Coherent
M D phase
channel detection optical
LA LA Mod correction
channel
1/f k-th pair
1/f
signal pulses
oscillator” (LLO) has been independently introduced in [QLP+ 15, SBC+ 15, HHL+ 15]. This
method, implementing the Gaussian modulated coherent state protocol, consists in using
a second laser at Bob’s side in order to produce local LO pulses for coherent detections.
One crucial advantage of implementing CV-QKD in a LLO configuration is to close, by
design, any potential security loophole linked to the possibility of manipulating the LO
as it propagates on the public optical channel between Alice and Bob. Implementing LLO
CV-QKD allows on the other hand to ensure by design that the LO is fully trusted, and in
particular that the LO amplitude (that requires careful calibration) cannot be manipulated.
Another important advantage of LLO CV-QKD stems from the fact that in this configura-
tion, repetition rate and distance do not affect the LO intensity at detection. A LO power
sufficient to ensure high electronic to shot noise ratio may thus be obtained, independently
of the propagation distance.
Implementing CV-QKD in the LLO configuration however comes with new experimen-
tal challenges. The main issue in LLO-based CV-QKD is to be able to perform CV-QKD
despite the potentially important drift of the relative phase between Alice’s emitter laser
LA and Bob’s local oscillator laser LB , see Fig. 3.2. The relative phase at reception is, in
the case of LLO-based CV-QKD, the relative phase between the two free-running lasers LA
and LB . As such, Bob’s raw measurement outcomes are a priori decorrelated from Alice’s
quadratures and a phase correction process has to be performed in order to allow secret
key generation. The goal of the phase reference sharing in the context of LLO CV-QKD is
then to ensure a low enough phase noise so that the excess noise is significantly below the
threshold imposed by security proofs [DL15].
Our Contribution in [AM16, MA17]: we have analyzed some limitations in the LLO se-
quential method implemented in [QLP+ 15, SBC+ 15, HHL+ 15], where time-multiplexing
between quantum signals pulses and reference pulses was used in order to jointly per-
form phase recovery and quantum communication. We have then introduced new ele-
23
Chapter 3. Quantum communication engineering
LLO-sequential (Fig. 3.2) Yes Vdrift ∼ 10−1 (60dB AM) High AM dynamics
Vdrift ∼ 10−3 (30dB AM)
Table 3.3: Summary of the advantages and drawbacks of Transmitted LO and LLO-
sequentional CV-QKD designs (cf Figure 3.1 and 3.2).
ments in the standard noise model of CV-QKD analysis, considering new practical con-
straints imposed by the simultaneous quantum signal and phase reference transmission
of LLO-based CV-QKD. In particular, we show that the amplitude modulator dynam-
ics is a key parameter in order to compare performance of realistic implementations of
LLO-based CV-QKD. Based on this comprehensive model, we show that there exist fun-
damental and practical limitations in the phase noise tolerance of the design introduced in
[QLP+ 15, SBC+ 15, HHL+ 15], that we designate as LLO-sequential.
In order to go beyond this phase noise limit, we have introduced the idea of self-
coherence in phase reference sharing for CV-QKD implementations based on a local local
oscillator. Self-coherent designs consist in ensuring the phase coherence between pairs of
LO
2/f
self-coherence
optical
LA AM PM
channel
2/f
reference pulse
self-coherence Bob
signal pulse
Figure 3.3: (color) LLO-delayline design. Alice sends consecutive phase coherent signal/reference
pulses pairs to Bob based on a balanced delay line interferometer. On his side, Bob uses his own
laser as the LO for coherent detections using the same delay line technique to produce phase coher-
ent LO pulses. Phase estimation and phase correction are digitally performed after measurement
acquisition.
24
3.3. CV-QKD System Engineering
quantum signal and phase reference pulses by deriving both of them from the same op-
tical wavefront at emission. This allows to perform relative phase recovery schemes with
better sensitivity than in the LLO-sequential design. In particular, we have proposed a de-
sign, called LLO-delayline, implementing a self-coherent phase sharing design. It ensures
the self-coherence using a balanced delay line interferometer split between emitter and re-
ceiver sides as depicted on figure 3.3. We have analyzed how self-coherence is obtained
and studied the performance reachable with this design, demonstrating that they exhibit a
much stronger resilience to high phase noise than the LLO-sequential design under realis-
tic experimental parameters. While previous experimental proposals of LLO CV-QKD are
limited to slowly varying reference frames regimes (ie. based on very stable lasers or high
repetition rates), our newly introduced design allows phase reference sharing resilient to
high phase noise regimes, using the idea of self-coherence.
A second self-coherent design, referred to as LLO-displacement, relies on an original
multiplexing allowing to transmit both the quantum signal and the reference pulse within
each optical pulse. The simultaneous transmission of quantum signal and phase reference
can be seen as an original cryptographic primitive, considered in [Qi16], that can be used
with different modulation schemes. In particular, this allows to optimize the resources −
in terms of required hardware and repetition rate − in LLO-based CV-QKD experiments.
We have studied the theoretical performance of such design and exhibit its limitations, in
terms of phase noise tolerance. An important advantage of our LLO-displacement design
is however its experimental simplicity, since no specific hardware devices are required.
Interestingly this design has been experimentally validated and further developed into
the first simultaneous quantum and classical communication scheme proposed by Qi and
Lim [QL18].
25
Chapter 3. Quantum communication engineering
requirements associated with error-correction are particularly high, for two main reasons.
Error correction typically can hence constitute a bottleneck for modern CV-QKD system
performance. While Gaussian protocols can provide the highest key rates and already
enjoy the strongest proofs, [DL15], error correction is especially challenging in that case.
Early implementations used sliced reconciliation to map infinite-dimensional modulation
signals to a discrete alphabet, leading however to reconciliation protocols that were highly
inefficient (small β) at low SNR. In [LAB+ 08], we proposed a method based on eigth-
dimensional reconciliation, allowing to efficiently map (β > 95%), without post-selection,
CV-QKD signals to a high-dimensional binary alphabet, onto which specific LDPC codes
can be applied. This technique has allowed a very significant leap in performance, from a
reach of about 25 km in [LBGP+ 07], to 80 km in [JKJL+ 13a], as illustrated on figure 3.4
Figure 3.4: Key rate versus distance of the CV-QKD experiment [JKJL+ 13a]. This illus-
trates the performance leap obtained in particular by significantly improving the error-
correction efficiency β at long distance (low SNR), using multidimensional reconciliation
from [LAB+ 08]
State-of-the art implementations for CV-QKD error-correction, based on LDPC and
implemented over a GPU, currently reach a maximum throughput below 100 Mbit/s
[LZL+ 20]. With the increase of clock rate from MHz to GHz and the convergence with
26
3.3. CV-QKD System Engineering
Figure 3.5: Technology Readiness Levels scale, used in Horizon 2020 program.
QKD is one of the first quantum technology that has been able to climb the TRL ladder,
reaching TRL 7-9 about a decade ago for DV-QKD systems [IDQ21]. Concerning CV-QKD
technology, SeQureNet, spin-off of Telecom Paris(Tech), that I have co-founded in 2008,
has actively contributed to push forward the industrialization of the technology during
the period 2010-2014. We report here on a some salient aspects of this work in the next two
27
Chapter 3. Quantum communication engineering
paragraphs, before considering today’s landscape and challenges in the final paragraph.
28
3.3. CV-QKD System Engineering
ture is depicted on figure 3.6. Special efforts have been invested to improve the SNR
and stability of clock recovery signals (Alice-Bob synchronization). The system rep-
etition rate has been set to 1 MHz, compatible with the rate of high-clearance (20 dB)
custom shot-noise limited homodyne detection developed at IOGS [LBGP+ 07].
• The main modifications, and the core work needed to increase the stability and per-
formance of the CV-QKD system lie on the software side. The software stack has been
fully rewritten, with new feedback control loops, improved procedures for param-
eter estimation and original (inventive) algorithms for phase stabilisation, synchro-
nization. Additional efforts were related to a better separation of functionalities, and
a clean management of scheduling. This lead to a more stable and more evolutionary
system.
• New algorithms, for reconciliation have been written, based on the work described
in 3.3.2. They rely on efficient LDPC codes, implemented on GPU and fast privacy
amplification algorithm.
Figure 3.7: a) Map of the 18 km field-test combining CV-QKD with encryptors [JKJD+ 12]
b) Cygnus: first commercial CV-QKD system, released by SeQureNet in 2013 c) Cygnus
deployment within the Tokyo QKD network (2014).
Field deployments QKD is the first quantum communication technology to have reached
a maturity level sufficient to allow field deployments. This requires to meet an ensemble
of requirements related to stability, noise robustness, integration and interfacing, allowing
to climb from TRL4-5 to TRL larger than 7.
The work conducted at Telecom Paris in the context of a French ANR project SEQURE al-
29
Chapter 3. Quantum communication engineering
lowed to perform the first long-term (several weeks) field demonstration of CV-QKD inter-
faced with Layer 3 encryptors, [JKJD+ 12] . Increased software stability has been achieved
by suppressing memory overflow issues that were previously limiting autonomous sys-
tem operation. On Figure 3.7 a), we can see the map of the 17.7 km field demonstration,
performed in 2011, linking Thales R & T (Palaiseau) to Thales Raytheon Systems (Massy),
together with a picture of the two integrated systems, combining CV-QKD devices and
Mistral encryptors from Thales.
As detailed in the previous paragraph on System integration, the work accomplished
by our spin-off SeQureNet addressed additional challenges, related in particular to error-
correction and system integration. This has lead to the release of the first commercial CV-
QKD system in 2013, based on a transmitted local oscillator (TLO) design. This system,
called Cygnus, integrated in 19" racks, is depicted on Figure 3.7 b), it has been success-
fully commercialized and deployed, as illustrated on Figure 3.7 c), with the integration of
Cygnus CV-QKD systems in the Tokyo QKD network.
30
3.4. Quantum communication networking
Figure 3.8: Quantum Key Distribution network in China [CZC+ 21], with a terrestrial part
composed of a 2000 km quantum backbone, connecting several metropolitan QKD net-
works. It is complemented by a spatial segment, that has been illusrated by the Micius
satellite demonstration demonstration [YLL+ 20]
Architecture of quantum networks
The European project Secoqc has constituted one of my first professional undertaking,
following my PhD. I was in charge of the Secoqc “NETWORK Work-Package” and thereby
started to investigate how classical networks operate, in order to understand what reason-
able architecture could be proposed for QKD networks. This work lead to a series of works
and talks, in collaboration, notably, with colleagues at the Austrian Institute of Technology
that were coordinating the Secoqc project.
A central outcome of this work has consisted in proposing, for the first time, a logically
layered architecture for QKD networks, with three different layers:
• The QKD layer, that is also a physical layer where optical QKD quantum channels
are implemented, on a point-to-point basis, between QKD endpoints, placed in QKD
(trusted) nodes.
• The Secrets layer, that is to say a classical communication network connecting trusted
nodes in which QKD-generated keys are stored. This layer enables network-wide
key forwarding between connected trusted node based on one-time-pad encryption
and can therefore ensure a global management of secret keys.
• The Application layer, in which global keys are transferred (from the secrets layer)
and used by applications such as symmetric encryption, symmetric authentication,
possibly within more complex network security protocols such as IPSec [MNR+ 20].
31
Chapter 3. Quantum communication engineering
Figure 3.9: 3 Layers architecture for a QKD network based on trusted nodes. This logical
architecture proposed for the first time in [ARML06] has then also been adopted by most
subsequent large QKD networks projects in Japan, Korea and China.
This architecture allows to decouple secret key management from optical network
management and quantum key distribution and from the use of the symmetric keys in
secure applications. On a cryptographic level, it can be used to provide long-distance
key establishment with information-theoretic security, by daisy-chaining OTP encryptions
with one-time-pad keys renewed by QKD. The trusted node QKD network architecture
[ARML06] together with an original suite of network protocols [DA07], that we have pro-
posed in the framework of the Secoqc project, have been demonstrated at metropolitan
scale in Vienna in 2008 [PPA+ 09]. Interestingly, we can also notice that this work has also
strongly influenced the architectural design adopted in subsequent QKD network deploy-
ments. In particular, a similar 3-layer approach has been adopted in most of the subsequent
QKD network deployments [SFI+ 11, CZC+ 21, MNR+ 20].
Topological design
Beyond its logical description and architecture, the topological design of a QKD network
(and more generally, quantum communication infrastructure) is a multi-factorial and con-
strained problem, that needs to take into account at least three dimensions:
• The targeted service, in particular for a QKD network, the ability to establish an ITS
cryptographic key between any two distant nodes.
• The structure of the demand, i.e. the spatial and time distribution of the requested
32
3.4. Quantum communication networking
traffic, but also the associated value of the service to the final user.
• The cost structure, that can be roughly divided into the initial investment needed
to install and deploy the network (capital expenditure, CAPEX), as well as the
marginal operational costs associated with running the services (operational expen-
diture, OPEX).
Figure 3.10: Toy model of a 1D QKD chain linking two QKD users, Alice and Bob over
a distance L (considered much longer than Dmax , the maximum span of a QKD link).
Intermediate QKD nodes, spaced by a distance ` serve as trusted relays, while multiple
QKD links can be deployed in parallel to meet the demand.
In [ARDL09], we have conducted one of the earliest study on the topological design of
a QKD network, investigating in particular the impact of the specific rate versus distance
profile of QKD, R(l), on the global cost minimization of different QKD network archi-
tectures and models, starting with a toy model depicted in Figure 3.10. This enables to
observe the emergence of an optimal distance at a which trusted node would need to be
placed, on a linear chain, but also to study the transition, in 2D models, between topo-
logical design with one level of hierarchy (QKD backbone) as in for high traffic demand
(or lower cost of trusted node infrastructure), versus non-hierarchical architecture com-
posed of a collection of 1D chains as in Figure 3.10. Although not yet instantiated with real
figures, the models and results obtained in this article illustrate the importance of infras-
tructure cost in the general economical equation associated with quantum communication
networks.
33
Chapter 3. Quantum communication engineering
specifically, public-key cryptography has allowed, fifty years ago to perform secure com-
munications in an end-to-end fashion, i.e. without requiring to trust an intermediate third
party, however with some practical limitations. Hence from this perspective, a security
technology requiring to introduce trusted node may be considered a step backward.
This objection against trusted QKD networks is structural and cannot be easily miti-
gated. However, a closer scrutiny at the typology of secure networks, shows that there
can be important variations in terms of underlying key management and trust structure.
In particular, some high-security communication and data storage infrastructure, are man-
aged principally with symmetric cryptography, and rely on trusted nodes. This can typ-
ically be the case for military, but also critical infrastructures with a centralized trusted
operator. The use of QKD can hence be relevant in order to strengthen the security of key
management procedures in such networks, that typically correspond to the use-cases tar-
geted by the current EuroQCI initiative towards the deployment of a European Quantum
Communication Infrastructure [EC19].
In [SPD+ 10] we have focused on trusted repeater networks and have studied the case
when part of the nodes are not to be trusted and could be arbitrarily malicious. We have
shown how to ensure that two distant users of the network can share identical and private
keys after key generation over the network, on which QKD links connect direct neighbors,
assuming that classical messages can be transported reliably over the network. We show
that path-diversity can be used to tolerate l-bounded adversary, i.e. that corrupt at most l
nodes. In particular, we have shown that secret keys can be generated through l disjoint
paths in a private and authentic way against (l − 1) bounded adversaries.
34
3.4. Quantum communication networking
Early work Pioneering work on QKD in WDM environment has been performed with
DV-QKD systems, in coarse-WDM [Tow97] as well as later in dense-WDM configurations
[PTC+ 09, CTP+ 09], however over distances below 25 km. Several DV-QKD experiments
have then tried to extend the distance for mixed QKD/WDM. In [EWL+ 10], 4 classical
channels where multiplexed with a DV-QKD system and 50 km operation was demon-
strated. However, the input power of the classical channels was attenuated to the smallest
possible power compatible with the sensitivity limit of the optical receiver (-26 dBm). At-
tenuating the classical channel launch power was also used in [PDC+ 12] where the impres-
sive distance of 90 km was demonstrated, however with an input power limited down to
-18.5 dBm and in addition the use of temporal filtering techniques. Temporal and spectral
filtering techniques have also been optimized in [PDL+ 14] to allow the first demonstration
of DV-QKD in coexistence with one 0 dBm classical channel, at 25 km.
Towards QKD/WDM coexistence over optical backbone links The ability to deploy
QKD over optical backbones or over inter-datacenter links could be a game-changer for
the development of the technology, significantly reducing QKD deployment cost overhead
and most importantly opening radically larger and security-relevant market segments.
35
Chapter 3. Quantum communication engineering
Figure 3.11: (Left): Excess noise measurements vs launch power in forward (a) and back-
ward (b) channel configuration. Black, red and blue data points are the excess noise eval-
uated at Alice for fiber length of 25km, 50km and 75km, for different classical channel
power. Dashed lines indicate the expected excess noise curve and solid horizontal lines
are null key threshold for CV-QKD, for the respective channel distance.
(Right): Tolerable classical channel power vs Reachable distance: Performance of QKD
in the context of coexistence with classical optical channels. Red and blue colors represents
our results with a CV-QKD system, in forward and backward classical channel configura-
tion, while previous works with DV-QKD systems are in Green. Stars: experiments con-
ducted in the C-band (DWDM). Squares: experiments conducted in CWDM. The dotted
red and blue lines are the forward and backward simulation curve for the null key rate
in the current experiment. Gray bands show transmitter input power range in different
standardized optical networks. Figure taken from [KQA15], see original article for the
number-reference correspondance.
Although these requirements have not yet been fulfilled in a single experimental
demonstration, significant steps have been recently made. In [EHP+ 19], CV-QKD co-
propagation jointly transmitted with 100 WDM channels over which a datarate of 18.3
Tbit/s was being sent, over a realistic set-up. This impressive demonstration meets criteria
2) and 3), however was demonstrated only over 10 km. Fig. 3.12 compares this figure with
earlier demonstrations. At OFC 2019, Kleis et. al. [KSDS19] reported on an experimen-
tal demonstration of mixed CV-QKD /WDM with classical signals placed in the S-band.
36
3.4. Quantum communication networking
This has allowed them to multiplex up to 28 classical channels at 0 dBm each (approx. 14
dBm of total power) in coexistence with CV-QKD, i.e a notable progress towards criteria
1) and 2). Finally, we notice that [MWZ+ 18] has made decisive steps in meeting criteria
1-2-3) all along, by demonstrating the integration of DV-QKD, in coexistence with 21 dBm
of classical signals, carrying 3.6 Tbs data-rate, over 66 km. This record performance how-
ever relies on the use of large-core fibers and cannot therefore be directly applied within
existing networks.
Figure 3.12: Figure taken from [EHP+ 19] and comparing the total classical bitrate, the
number of wavelength division multiplexing channels and the total data-rate of classical
channels. It illustrates the abililty to operate CV-QKD in mixed WDM environment close
to the backbone regime, i.e with 100 classical channels and Terabit/s classical capacity.
However the demonstrated distance was only 10 km, and the launch power of each clas-
sical channel is approx. -7 dBm. See original article for details, and the number-reference
correspondance.
37
Chapter 3. Quantum communication engineering
38
Chapter 4
−m
X
ρideal
ABE = 2 |kiA hk| ⊗ |kiB hk| ⊗ ρE (4.2)
(k)
where kA = kB = k implies that Alice and Bob hold the same string, and where ρE is
independent of k, i.e., Eve has no information on the key string variable K.
Due to practical statistical issues, such as the finite data size and non-ideal error correc-
tion, Alice and Bob cannot aim to obtain an ideal key with certainty from a practical QKD
protocol. It is however reasonable to allow the key to have a small failure probability for
its correctness and secrecy, and to extend the security definition accordingly.
A QKD protocol is defined [BOHL+ 05a, RK05] to be cor -correct if the probability dis-
tribution P r(kA , kB ) of the final state ρABE in Eq. 4.1 satisfies P r(kA 6= kB ) ≤ cor . It
39
Chapter 4. QKD security: from theory to practice
is defined to be sec -secret if the state ρABE is close in trace distance to the single-party
1
private state ρideal
AE , i.e more precisely if minρE 2 (1 − pabort )||ρAEP − ρideal
AE ||1 ≤ sec , where
ideal −m
pabort is the probability that the protocol aborts and ρAE = 2 (k) |kiA hk| ⊗ ρE denotes
a bipartite quantum state where Alice holds a uniform string, perfect decoupled from Eve.
Hence, for some cor and sec , we say that the QKD protocol is -secure with =
cor + sec if it is cor -correct and sec -secret . A strong feature of this security definition,
based on trace-distance metric, is that it is composable, even against an eavesdropper E
holding a quantum memory [BOHL+ 05a, RK05].
It is interesting to note that the above-mentioned security definition was for a large
part developed by Renato Renner, and co-authors, during his PhD work [Ren05]. One
important goal has been to address the issue of proposing a composable security definition,
criteria that was not met by previous security definitions relying on mutual information
as a quantifier for Eve information, because the possibility to unlock a large quantity of
mutual information with a small leakage of secret information [KRBM07]
4.2.1 Definitions
Quantum cryptography departs from classical cryptography essentially from a security
standpoint, and not from a functional standpoint. Concerning QKD, it provides a specific
route to realize the authenticated key encryption (AKE) primitive. To capture the security
gain that QKD may bring, it is essential to introduce definitions that allow to establish a
40
4.2. Using QKD for cryptographic purposes
• Single-shot security: the security achieved a the level of a single key establishment
session.
• Key dependency: the vulnerability of a key, established in a given AKE session, with
respect the compromise of another key, established in a future session (forward se-
curity) or past session (backward security).
We consider the different levels of security for AKE (mostly the confidentiality of the key,
but possibly its integrity and authenticity), when considering an attacker whose attack
surface is, by definition, limited to a single key exchange. In order to capture the cryp-
tographic advantage that may be attained by QKD, it is relevant to distinguish between
three security levels, information-theoretic security (ITS), being the highest.
When several cryptographic primitives are composed within a given protocol, the re-
sulting protocol can only be as secure as its weakest component. This consideration ap-
plies, for example, to the relation between AKE protocol and encryption. If any of the two
protocols is computationally secure, then the overall protocol can only be computationally
secure. Moreover, if we want to enjoy the everlasting security property for a composite
AKE + encryption protocol, we need to combine an everlasting secure AKE scheme with
an ITS encryption scheme. Finally, if we aim to build a composite protocol with ITS secu-
rity, then all the building blocks must be ITS as well.
41
Chapter 4. QKD security: from theory to practice
Key dependency
Single-shot security refers to the level of security that can be reached by a given AKE
cryptographic construction, at the level of a single session. Key dependency, on the other
hand, considers a more general scenario where many session keys have been established,
and considers the impact that the leakage of a given key may have on the security of
another one. The two central concepts are forward secrecy and post-compromise security
that designate respectively the impact that information leakage about a given key may
have either on past session key (forward security) or on future ones (post-compromise
security). Figure 4.1 illustrates schematically these two concepts.
Figure 4.1: Attack scenarios considered by forward and post-compromise secrecy; “test”
refers to the session under attack. Forward secrecy protects sessions against later compro-
mise; Post- compromise security protects sessions against earlier compromise [CGCG16].
Forward secrecy A central concept is the notion of forward secrecy.The term “forward
secrecy” however does not have a unique meaning across the literature. In the case of au-
thenticated key establishment (AKE), forward-security designates AKE protocols in which
the compromise of a key does not lead to compromise keys of previously completed ses-
sions [BG20]. In order to clarify discussion and comparison between QKD and computa-
tional AKE schemes, we need to make a distinction between absolute and computational
forward secrecy:
42
4.2. Using QKD for cryptographic purposes
• No forward-secrecy: the AKE scheme does not provide at all any backward protec-
tion.
Now that we have introduced the necessary definitions, we can compare the security of
different Authenticated Key Exchange constructions, in terms of single-shot security and
key dependency, and in particular compare the security of QKD-based AKE with alterna-
tive computational schemes relying on symmetric-key or public-key cryptography.
43
Chapter 4. QKD security: from theory to practice
QKD-based AKE
The single-shot security of QKD-based AKE depends on the authentication scheme used
for authenticating the classical channel. ITS authentication schemes based on pre-shared
secret and universal hashing [CW79, Sti94] can be combined with QKD to build an ITS
AKE. Using pre-shared secret can however be challenging, notably over large networks.
In this case, public-key authentication provides an interesting alternative, that can be used
to build everlasting secure QKD-based AKE. In addition, it is not necessary to use com-
putational secure authentication for all the key exchange sessions: once the QKD protocol
has output some secret key, a portion of this secret can subsequently be used to perform
subsequent authentication rounds, with ITS, guaranteeing the following statement: “if au-
thentication is unbroken during the first round of QKD, even if it is only computationally
secure, then subsequent rounds of QKD will be information-theoretically secure” [SML09].
In addition to ITS (or everlasting) single-shot security, one of the strong features of
QKD-based AKE is to offer absolute forward-secrecy and full post- compromise security.
As a matter of fact, QKD generates (usually based on an integrated QRNG) session keys
that are information-theoretically independent from each other, i.e. with maximum new
entropy at each session. This provides the highest levels of security regarding the key
dependency, and in particular absolute forward-secrecy. Regarding post-compromise se-
curity, one shall consider the sequential production of session keys with QKD. In such case,
the secret material needed at each QKD round to authenticate the classical channel stems
from a previous QKD round [ABB+ 14]. A post-compromise man-in-the middle attack is
therefore only possible only if all subsequent sessions, after the compromise and until the
session are also broken in real time, i.e. setting extremely stringent requirements on the
attacker.
Symmetric schemes as the block cipher AES can be used to guarantee the confidentiality
of a message, but also to guarantee integrity and authenticity, with the Message Authen-
tication Codes (MACs). Combining both functionalities can be employed also to build
an AKE primitive, that will exhibit computational single-shot security. Most symmetric-
key-based AKE schemes rely on shared long-term secrets, called master keys, and are vul-
nerable to the leakage of such long-term secrets. This means that they in general do not
provide forward-security (while some standard public-key schemes can). It is however
possible to add key-derivation mechanisms, to improve on this weakness, as proposed
for example with a recent work [ACF20]. We should note however, only computational
forward-secrecy can be achieved in this case, which hence strictly departs from the abso-
lute forward-secrecy AKE schemes that can be achieved using QKD.
Another drawback of symmetric schemes, in terms of key dependency, is that they
in general do not offer post-compromise security. As a matter of fact all future sessions
keys are deterministically derived from previous ones. Hence, once the attacker has com-
promised at least one session in the past, he can completely retrieve all the secrets of the
44
4.2. Using QKD for cryptographic purposes
following sessions.
Public-key-based AKE is especially needed to operate large and open networks with many
users. In such context, the distribution of pre-shared secrets is cumbersome as the num-
ber of keys scales badly (quadratically) with the size of the network. In such situation
the use of a public-key authentication scheme is extraordinarily convenient to provide dis-
tributed trust when combined with certificate authorities (CAs) in a public key infrastruc-
ture (PKI). In terms of the security properties, public-key based AKE schemes can provide
computational single-shot security based however on weaker computational assumptions
than symmetric-key cryptography, such as the existence of trapdoor one-way functions
(TOWFs). Conversely, public-key AKE can be implemented with ephemeral key strat-
egy, allowing the session keys to be independent and therefore offering absolute forward-
secrecy and full post-compromise security.
45
Chapter 4. QKD security: from theory to practice
46
4.2. Using QKD for cryptographic purposes
47
Chapter 4. QKD security: from theory to practice
It is interesting to compare these two schemes, from the perspective of security gain,
but also performance (data rate) and trust assumptions, and foreseen applications.
• over a point-to-point link In that case, the fact that QKD AKE offers full post-
compromise security, and that no trusted node are needed, implies a security gain.
QKD+AES hence appears as an interesting way to strengthen the security of P2P
secure communication links, in particular as a defense in depth, possibly in combi-
nation with PQC. This is in line with the recently proposed protocol by Paterson et.
al. [DHP20].
• over a large network with trusted nodes In the case of a large network with trusted
nodes, combining QKD with AES for secure communications does not bring a secu-
rity gain with respect to the use of symmetric encryption and key derivation that can
be achieved to perform SC with the same security (computational security of AES) in
an end-to-end fashion (i.e. without trusted nodes) and also without QKD, and hence
also at a significantly lower cost.
4.2.4 Conclusion
To which extent secure communication schemes based on QKD can bring some advan-
tages with respect to schemes relying solely on computational cryptography? To answer
this question, we have conducted an analysis based on security properties - that we have
carefully defined, and that also takes trust assumptions into account. The central con-
clusion of this analysis is that schemes combining QKD with OTP encryption should be
considered in priority, in the context of large QKD networks with trusted nodes, in order
to provide a security gain.
We can moreover think of security services providing a security gain based on
QKD+OTP and implementable with existing or near-term technology, in particular:
48
4.3. Practical security of QKD
• High-security key transport and more generally high-security key management, pos-
sibly over a large network, with trusted nodes. In such use-case, QKD+OTP can be
thought as a special (ITS and automatized) form of trusted courier. Such ultra-secure
communication scheme could typically be used to perform out-of-band key estab-
lishment in order to strengthen key management in high-security contexts.
• [No leakage] There is no information leakage from the security enclaves in which
Alice and Bob QKD systems are placed and operate.
• [Trusted implementation] The implementation of Alice and Bob QKD devices is con-
form to the model used in the security proof while the underlying trust assumptions
are verified.
49
Chapter 4. QKD security: from theory to practice
50
4.3. Practical security of QKD
works [KQA15] and to be possibly implemented in day light free space environments.
Unfortunately, these elements have potential vulnerabilities in CV-QKD implementations
that can be used by Eve to break security. For example LO manipulation is a long standing
security problem where Eve can modify LO pulse in different ways [JKJL+ 13a, MSJ+ 14]
and steal secret keys without being discovered. This issue has been recently solved by gen-
erating locally LO (LLO) signal at Bob side[QLP+ 15, SBC+ 15, HHL+ 15, MA17]. Regarding
to homodyne detection (HD), either wavelength dependent properties of the beam-splitter
[MSJL13, HWY+ 13b, HKJJ+ 14] or amplifier electronics saturation [QKA13b, QKA16] can
be independently taken advantage by Eve to launch attacks to break security.
While most implementation attacks against CV-QKD target LO manipulation in the TLO
setting, we have proposed in [QKA16] and further studied in [QKMA18] the so-called
saturation attack against CV-QKD, that consists in biasing the excess noise estimation by
actively inducing the saturation of the homodyne detectors.
The modus operandi of this attack is twofold. Eve launches the intercept and resend
(IR) attack [LDGP+ 07] such that she gains encoding information about the states sent by
Alice. However, a full IR attack induces 2 shot noise unit (SNU) of excess noise in Alice
& Bob measurements and hence reveals the presence of Eve. Exploiting the non-linear
behavior of a homodyne detector, in a way that Eve resends newly prepared signals to
induce electronics saturation on the homodyne detector, she can reduce 2 SNU of excess
noise below the null key threshold - where all generated keys are believed to be secure.
Since excess noise level is favorable to secure key generation, Alice and Bob then proceed to
error correction and privacy amplification. After listening to the classical post processing
communication between Alice and Bob, Eve can gain complete information about the final
key without revealing her presence. Importantly, the saturation attack only targets on the
HD which means even the recent proposed LLO CV-QKD scheme is not immune to this
attack if no countermeasure is considered.
Figure 4.2: Scheme for saturation attack. Eveintercept intercepts Alice’s Gaussian modulated
signal of quadratures {XA , PA } and shares her measurement results {XM , PM } through
the classical channel to Everesend . The resent and displaced signal of quadrature {XE , PE }
is measured by Bob homodyne detector.
51
Chapter 4. QKD security: from theory to practice
The actual realization of the saturation attack comprises of two steps: intercepting
Alice’s signal and resending a newly prepared signal to Bob with displacement ∆ and
gain G. We can consider that two cooperating eavesdroppers are involved in the attack:
Eveintercept , located near Alice intercepts the signals of quadratures {XA , PA } and classi-
cally communicates the measurement results {XM , PM } to Everesend - located near to Bob
as shown in Figure 4.2. Due to the technical restrictions imposed by the laboratory equip-
ment, we experimentally demonstrate only the resend step of the attack and model the
impact of the measurement associated with the intercept step. {XM , PM } is deduced from
{XA , PA } by simulating a heterodyne measurement, i.e. 3 dB loss factor and also the addi-
tion of a random Gaussian noise of variance 2 shot noise [LDGP+ 07].
Efficient countermeasures against the saturation are known. As detailed in [KJJ15] ac-
tive monitoring of the linearity of Bob’s coherent detection can provide a robust coun-
termeasure against saturation attack. This countermeasure, however, requires dedicated
hardware (additional amplitude modulator at Bob side). We have proposed in [QKMA18]
another countermeasure against the saturation attack, that can be implemented without
using additional hardware: it relies on the pre-characterization of the detector linear-
ity range, and consists in post-selecting measurement data, based on the fact that these
quadrature measurements fall, within high confidence, in the linearity range of the de-
tector. This countermeasure, that relies purely on software, has the advantage of being
implementable at a small marginal cost.
The work done in [QKA16, QKMA18] demonstrates that the non-linearity of the coher-
ent receiver can in principle be exploited to obtain a complete break of a QKD security
protocol, in certain parameter regimes.
We have recently pushed the analysis one step further in [KMQA21] and studied in
practice some of the experimental routes that could be used to launch the saturation attack
in practice. This has lead us to consider two implementation paths for the saturation attack,
namely a coherent and and incoherent attack strategy.
Coherent attack strategy This implementation strategy for the saturation attack con-
sists in coherently displacing the signals sent by Alice, in order to drive Bob’s receiver into
saturation. We have experimentally tested this attack in [KMQA21], using a set-up built
around a Sagnac interferometer where a laser, coherent with the QKD signals, is mixed
on a highly unbalanced variable beamsplitter. This setup, displayed on Figure 4.4 allows
to maintain a high phase stability thanks to the Sagnac loop and to perform a controlled
displacement by varying the beamsplitter transmittance. As depicted on Figure 4.3, this
setup has allowed us to coherently displace the QKD signals, and to drive the homodyne
reception into saturation, for high displacement values.
52
4.3. Practical security of QKD
Figure 4.3: Response of homodyne output due to a coherent displacement. Input signal
sent by Eve, with quadrature variance
√ V ar(XE ) = 22N0 with 5 different displacement
values ∆ and saturation at 106.42 N0 (magenta). Displacement shifts Bob’s quadrature
measurement XB (expressed here in volts). Large displacement value can lead to satura-
tion (that occurs when XB reaches −2.5Volts).
Figure 4.4: Experimental setup for generating displaced coherent state. AM: Amplitude
Modulator, PM: Phase Modulator, BS: BeamSplitter. In the Sagnac loop, Gaussian modu-
lated signals are prepared using the AM and PM modulators and are then displaced at the
Variable Beam Splitter (VBS), based on a coherent interference between pump. Displaced
signals is then sent to Bob along with local oscillator.
Incoherent attack strategy The incoherent attack strategy consists in sending an in-
tense incoherent laser pulse sent along with the resent coherent state.This strategy is ex-
perimentally much simpler, and relies on incoherent laser pulse injection.
Saturating the homodyne detector with external laser pulse indeed presents several
operational advantages over the coherent strategy. In particular, active phase drift com-
pensation is not required. Saturation attack with incoherent strategy can achieve compar-
atively a much better performance in terms of quadrature stability and noise. Provided
53
Chapter 4. QKD security: from theory to practice
Figure 4.5: Setup for incoherent coherent attack strategy, relying on pulse injection from
an external incoherent laser to induce saturation. AM: Amplitude Modulator, PM: phase
Modulator, BS: BeamSplitter, PBS: Polarization BeamSplitter, Att: Variable Attenuator.
the channel loss is not too small (low channel loss make it more difficult for Eve to succeed
in the intercept-resend attack), then incoherent attack strategy set-up displayed on Figure
4.5 can be successfully used to obtain a full break of QKD security: Alice and Bob estimate
that secure key can be distilled, at a positive key rate and see no change in the estimated
loss (Tsat = T ) , however the attacker has some knowledge about the key and hence QKD
security is broken.
The results of the experimental implementation of incoherent strategy for saturation
attack are displayed on Figure 4.6(a). The equivalent excess noise at the input is estimated
from the variance of saturated homodyne output experimental data, for different trans-
mission distances. It can be seen that, taking finite size effects into account, excess noise
bellow the null key threshold can be achieved, for distances above 35 km, while keeping
Tsat = T which is the signature that Eve can launch a successful intercept-resend attack
and remain untraceable.. On the other hand, for distance below 35 km, the success condi-
tion Tsat = T cannot be fulfilled, and the attack cannot be launched without being possibly
spotted by Alice and Bob.
54
4.3. Practical security of QKD
Figure 4.6: Results:- attack with incoherent light. (a) excess noise at Alice. Red squares
indicate the null key noise threshold and blue squares the estimated values of ξsat . (b)
Key rate per pulse, estimated under collective attacks. Black squares are simulated values
of final key per pulse while Green squares are from the experiment. Error bars are one
standard deviation of fluctuations among ten smaller data block of size 107 .
will moreover be a key driver to increase, in not enable their commercial use in the context
of highly regulated security-related markets such as telecom, health and critical infrastruc-
tures.
Security certification of QKD undoubtedly constitutes a complex task, requiring the
collaboration of experts from different fields ranging from IT security, quantum engineer-
ing and theory. Over the last few years, several international standardization organizations
have however been actively working towards this goal, under the unified Common Cri-
teria framework : ISO/IEC JCT 1/SC 27 has been focusing on the security requirements ,
security evaluation, testing and specification of point-to-point QKD modules [ISO20]. In
parallel, within the ETSI QKD ISG, we have contributed to identify and categorize the
known implementation attacks against QKD in a 2018 white paper [LSA+ 18]. This work
is now moving to a second level, the QKD ISG is now collective working on an important
milestone: writing the first QKD Protection Profile [ETS21], i.e. a document that will be to
provide a framework to analyze the implementation security of a QKD implementation,
but also a standardized approach for the evaluation and the security certification of QKD
systems.
QKD Attack rating In a recent work, [KMQA21], we have proposed some concrete steps
towards this goal and have shown how to conduct QKD vulnerability assessment in prac-
tice , based on a sound methodology inherited from Common Criteria. Taking a running
55
Chapter 4. QKD security: from theory to practice
CV-QKD system as a reference platform, we have experimentally tested and rated the two
different attack paths, namely the coherent and incoherent saturation attack mentioned
above.
The Common Criteria [CEM17], offer a comprehensive methodology and metrics to
rate possible attacks against the QKD security assets. This methodology generally con-
siders both the likelihood that a threat agent may successfully perform the attack and the
magnitude of the impact that this attack has on the assets. In our rating procedure we have
focused on the likelihood of an attack, evaluating the total effort required to successfully
mount the attack, called the Attack Potential: the higher the Attack Potential, the lower
the chances of the attack being performed are.
Table 4.1: Summary of the analysis on the two attacks to the homodyne detection. We
have reported the values for each factor of the Attack Potential, namely: Exp. stands for
Expertise, KoT for Knowledge of the TOE, WoO for Window of Opportunity and Equ for
Equipment. The factors chosen for the analysis are from Common Criteria [CEM17].
The rating procedure consists in attributing a numeric value to the Attack Potential,
the sum of them is the actual Attack Potential. In the Common Criteria framework, rating
is performed by considering the following factors: a) Expertise, b) Knowledge of the TOE,
c) Window of opportunity, d) Equipment, e) Elapsed time.
In the context of the attack on a lab systems, the Elapsed time factor (that typically des-
ignates the time elapsed between the release of a given product version, and the release of
hardware of software security patches) is difficult to evaluate and was hence not consid-
ered. We have on the other hand evaluated all the other four factors. order to rate the two
attacks paths for the saturation attack against CV-QKD Concerning the knowledge of the
TOE we have assume that the hacker Eve tries to obtain as much information as possible
about the Target of Evaluation (TOE) design, i.e. Eve has a good knowledge about the
specifications of the main components of the QKD system. Some important details might
however be system-specific or protected by a non-disclosure agreement between the ven-
dor and the owner of the QKD system. For this reason, for both attacks, the Knowledge
factor for the TOE factor is evaluated as restricted.
56
4.3. Practical security of QKD
Both attack paths rely on the intercept-resend strategy and can in principle be launched
in real time. However, such online implementations of the attacks require to evaluate the
optimal value of the displacement ∆ and of the gain G (see methods): this can be ob-
tained by manually tuning Eve’s setup and measure the excess noise due to displacement.
Assuming a frequent trusted evaluation of the channel loss, this tuning might be quite
challenging, especially in the case of the coherent attack, where the tuning precision is in-
evitably limited by the accuracy of the phase locking. As a result, for the coherent attack
the Windows of Opportunity can be chosen as difficult, while moderate for the incoherent
attack. Another important difference between the two attack paths is related to the require-
ments in terms of equipment and expertise. As previously explained, the coherent attack
requires Eve to resend coherent displaced signal while being successfully phase locked
with Alice and Bob. To achieve this, Eve needs to be an expert in coherent optical commu-
nications, able to control noise at the quantum level and to have access to bespoke equip-
ment. On the other hand, the incoherent attack only requires Eve to send an incoherent
signal, without worrying about being phase locked with Alice and Bob: this is reflected in
a simplified setup (Equipment specialized) and in a lower level of required technical exper-
tise for Eve (Expertise proficient). Based on correspondance between the different factors
and their numerical value (see [KMQA21] for details) we obtain an Attack Potential of 26
and 14 for coherent and incoherent attack respectively. As expected, the coherent attack is
rated as beyond high, while the incoherent attack is only rated as moderate.
These results illustrate the importance of rating attacks in order to prioritize the imple-
mentation of countermeasures and to steer the design and engineering of practical QKD
systems towards the highest possible security standards, paving the way to their security
certification.
57
Chapter 4. QKD security: from theory to practice
58
Chapter 5
Perspectives
As detailed in chapter 4, QKD can offer, in principle, a distinctive security advantage over
classical techniques, particularly in contexts where long-term protection is required. More-
over, as exposed in chapter 3, tremendous progress have achieved on the technology side
with the development of QKD systems that exhibit increased performances and their field
deployment over optical networks.
Yet the question of he usefulness of QKD to serve real-world use cases in practice is
still considered a controversial question: On the one hand, the importance of pushing
further the integration and use of QKD technology is strongly supported by the quantum
research and the emerging quantum industry community. The support to the development
of QKD technology is also important on the institutional side, with strategic investments
from leading scientific countries over the past years in QKD technology and quantum com-
munication infrastructures (including China, Korea, Japan, UK, Germany) . On the other
hand, the importance of pushing the development of quantum cryptography towards the
application side has often been considered with skepticism by notable representatives of
the cybersecurity community [PPS07, Sch18, NCS20, ANS20, NSA20].
This divergence of views, between the quantum and classical cryptography practition-
ers is obviously not uniform over the two communities. Remarkable advances involving
fruitful collaborations between quantum and classical cryptographers are indeed occur-
ring at an increasing rate [BS16, Sas18, PAB+ 20]. However, we also believe that this dis-
agreement has some structural causes and has moreover lead to some gap between the
communities that may hinder progress towards a better mutual understanding. We also
believe that this gap can be reduced, if not fully closed, by updating vision and research
programs, and that this reconciliation can play a significant role in the future progress of
practical quantum cryptography. The objective of this chapter is to try to take one step
back and analyze the reasons of such diverging views and to identify some grounds on
which they could be reconciled.
After a first section in which we try to analyze and better understand the complex di-
alectic behind the classical versus quantum cryptographic discord, we then propose some
directions to overcome the identified challenges. One of these directions consists in con-
59
Chapter 5. Perspectives
sidering security models strictly stronger than what can be achieved with computational
cryptography, and yet weaker than QKD standard security model. We have started to ex-
plore this direction already a few years ago by considering hybrid security models and are
now reaching some tangible results with the so-called quantum-computational timelock
security model and key establishment construction [VA20]. We will present this work in a
second section. We will then elaborate in a third section on the perspectives towards the
development of real-world quantum cryptography. This will lead us to link the question of
security gain evoked in chapter 4 with the identification of promising application domains
for quantum cryptography. In a sense we will revisit the childish but also invigorating
question: “what is quantum cryptography good for?” and to try to formulate some ele-
ments of answers. This will also lead us to propose some perspectives for future research
and technology development, rooted in an updated vision of quantum and classical cryp-
tography respective positioning.
2. A better understanding of the technological, but also fundamental reasons for a gap
between envisaged applications, and what technology can actually deliver.
After having mostly focused on the first aspect so far, we want to make seize the oppor-
tunity of this Habilitation thesis to also investigate the second aspect that is probably less
frequently tackled, and address the following key questions: Why has QKD technology not
yet been as successful, in terms of applications and impact, as many of us were expected 20 years
ago? This question will lead us to consider how we should update our vision and revise
our targets both in terms of technology and applications in order to tackle more efficiently
the outstanding challenges.
60
5.1. Critical assessment of quantum cryptography positioning
This questioning is at the heart of the groundbreaking BB84 paper, that appeared in
the Proceeding of the ICCSSP conference held in Bangalore in 1984 [BB84], after having
been rejecting from major cryptography conferences. There, Charles Bennet and Gilles
Brassard, make clear that quantum cryptography objective is to challenge conventional
cryptography relying on computational security:
«Conventional cryptosystems such as ENIGMA, DES, or even RSA, are based on a mixture of
guess work and mathematics. Information theory shows that traditional secret-key cryptosystem
cannot be totally secure unless the key, used once only, is at least as long as the cleartext. On the
other hand, the theory of computational complexity is not yet well enough understood to prove
the computational security of public-key cryptosystems. In this paper we use a radically different
foundation for cryptography, viz. the uncertainty principle of quantum physics. In conven-
tional information theory and cryptography it is taken for granted that digital communications in
principle can always be passively monitored or copied, even by someone ignorant of their meaning. »
• As Bennett and Brassard have clearly expressed, the program of quantum cryptogra-
phy is to challenge the security fondations of classical cryptography, and to develop
cryptographic protocols based on information-theoretic security, for some of the core
cryptographic services needed in our digital society such as key establishment mech-
anism or multi-party computation.
The structural dispute between classical and quantum cryptography has been extremely
stimulating. It has in particular lead to outstanding developments on the quantum cryp-
tography side, both in terms of fundamental concepts and in terms of technology. How-
ever, this competition may also turn into a systematic opposition, which can hamper the
mutual understanding between the classical and quantum crypto communities, and thus
61
Chapter 5. Perspectives
the collaborations at this nonetheless essential frontier. We try to analyze here some of the
reasons that may have triggered or fueled such a dynamic of systematic opposition, and
point at its detrimental consequences.
«All cryptography primitives will become quantum-based » The belief that cryptography is
bound to become fully quantum might be influenced by the vision of technology and in-
novation as a creative destruction process [Per95], where successful technologies have to
disrupt and replace older ones, in order to develop. It is not our subject here to question
Schumpeter’s theory, but to note that the creative destruction vision does not apply to
quantum cryptography, and in general to other branches of quantum technology such as
quantum computing or sensing. As a matter of fact, even though all these quantum tech-
nologies can imply profound paradigm shifts, they don’t imply the “destruction” or their
classical counterpart.
If we focus now on cryptography, it is important to realize that several public-key
functionalities (where a very large number of users may publicly engage in parallel in a
protocol, such as for example public-key encryption or verification of a digital signature)
play a fundamental role in our digital word and yet that they cannot be obtained with
quantum means with information-theoretic security. Confusion however often arises with
respect to this latter aspect. For example, some (otherwise quite interesting) work on
information-theoretically-secure classical message authentication schemes using quantum
means has been coined as “Quantum Digital Signature” [AA15], even though it does not
verify the properties of a digital signature, and in particular public verification.
«The quantum threat on cryptography implies the need for QKD » Another important
source of confusion, and of discord between the classical and quantum cryptography
community, is related to the different directions that can be considered and enforced in
order to guarantee that cryptography would still remain safe against futuristic attackers
in possession of (large) quantum computers. As a matter of fact, the discovery of a
polynomial-time factoring algorithm by Peter Shor in 1994 [Sho94], implies that such
quantum computers could in principle be used to factor large numbers exponentially
faster than classical machines, threatening a large fraction of public-key cryptography
and therefore of a fundamental pillar for Internet security. Early claims from the quantum
cryptography community might have been biased towards the conclusion that compu-
tational cryptography as a whole was threatened, promoting quantum cryptography,
and in particular QKD as the preferred solution, in order to avoid a “cryptocaplyse”.
62
5.1. Critical assessment of quantum cryptography positioning
This first level of confusion has been rapidly settled, notably via active interactions
between the Quantum cryptography [Bra16] and Post-Quantum Cryptography (PQC)
[Ber09] communities, with an agreement on both sides regarding the importance of
proposing new solutions to address the quantum threat. However, an important aspect
of the question is still often neglected by the quantum cryptography community: while
Shor algorithm certainly weakens the security foundations of public-key cryptography,
its impact on symmetric-key cryptography is much less dramatic [Ber09]. This hence
opens the possibility to use fully-symmetric solutions, (i.e. come back to some pre-1970
cryptography solutions) in order to build quantum-safe security infrastructures. This also
implies that symmetric solutions constitute the real contender and should be the reference
point when designing quantum-based security infrastructures. This point, recently voiced
by ANSSI [ANS20] however remains largely overlooked by the quantum cryptography
community. It constitutes, on the other hand, a central motivation for our work on hybrid
quantum computational security models (cf next section).
«QKD systems cannot be made practical » Some PQC supporters may also turn out to be QKD
skeptics, thereby pointing at practical limitations of QKD technology as a reason to disre-
gard its use in real-world use cases [NSA20, NCS20, ANS20] . As explained in chapters
3 and 4, QKD does have performance limitations, and has to face some new challenges
on the implementation security side. However, these challenges are addressed with en-
ergy and method [LSA+ 18, XMZ+ 20, PAB+ 20, CZC+ 21, LT19]. Real-world deployment,
performance enhancement, drastic cost reduction and certification of QKD therefore all
constitute tangible and reachable milestones for the years to come. There however hence
seems to be a blatant contradiction in the position mentioned above: how could one con-
sider realistic the fact that large quantum computers could be built within 10 to 15 years,
and yet that building affordable and secure QKD systems over the course of the next 5 to
10 years would be technologically out of reach?
Antagonistic positions
The most serious risk, in relation with the dynamic of opposition that we have evoked
and the confusing positions that are sometimes largely relayed, would be install some form
of long-term antagonism between the classical and cryptography community.
After having worked on these questions for some time [ARW+ 07, ABB+ 14, LSA+ 18]
and as expressed publicly at several occasions already [All17, All19a], my impression is
that this dissensus has reached problematic levels. More precisely, the debate seems to
have at least partially crystallized into antagonistic positions:
• Driven by the idealistic goal of developing “a cryptography based solely on the laws
of physics” [CCD+ 15], but also by the practical confusions that we have pointed
above, a fraction of quantum cryptography community tend to believe that quantum
cryptography could and indeed should, on the long run, replace classical cryptogra-
phy.
63
Chapter 5. Perspectives
64
5.1. Critical assessment of quantum cryptography positioning
As illustrated by figure 1.2 and in more depth within chapters 3 and 4, QKD technology
has a dual nature and the dynamics of the field is driven by parallel objectives:
The pursuit of these two objectives has been incredibly stimulating and has lead to
remarkable progress on the conceptual and technological sides. However, since the com-
petencies needed to address these challenges are generally held by different engineers
and scientists, tackling jointly the practicality and security aspects of QKD represents a
formidable challenge. As a consequence these questions are, to a large extent, addressed
separately or sequentially.
This dissociated approach of the security and practicality of QKD has so far essentially
allowed to escape a central contradiction, however clearly identified in [GRTZ02b]: Abso-
lute security implies infinite costs, which in turns implies zero practical interest, which means
that the two objectives listed above are fundamentally incompatible.
This leads to a central dilemma and the need to actually make a choice between
conflicting objectives to solve this dilemma. The nature of this choice has already been
identified a decade ago, by Valerio Scarani and Christian Kurtsiefer in their "black paper
on quantum cryptography" [SC14] and clearly expressed, in the quote below:
«This leads us to guess that the field, similar to non-quantum modern cryptography, is going to
split in two directions: those who pursue practical devices may have to moderate their security
claims; those who pursue ultimate security may have to suspend their claims of usefulness.»[SC14].
Scarani and Kurtsiefer exhort the QKD community to open their eyes on the divergence
between two distinct objectives, but also on the price to pay for such a clarification. Con-
cerning practical QKD, which constitutes our main focus, this clarification most certainly
require to acknowledge the need to relativise absolute security claims and to redefine on more
practical grounds the type of security guarantee that real-world QKD systems are able to
bring in practice.
Such clarification, despite its symbolic cost, can foster QKD progress in terms of en-
gineering and implementation security. As a practical and concrete approach, we have
recently illustrated how the use of Common Criteria vulnerability analysis methodology,
based on attack ratings allows to guide system design and to establish a lower bound on
QKD practical security [KMQA21].
65
Chapter 5. Perspectives
As we write these lines, the vast majority of the QKD community remains reluctant to
fully acknowledge the dilemma pointed by [SC14] and to give up the absolute security
claim, even for practical QKD. An important reason for that certainly lies in the simplic-
ity and in the symbolic power of targeting absolute security, without any assumptions.
However, even at the most abstract level, this claim might be difficult to ground on a
solid correspondance with the physical world and the physical implementation of QKD,
as illustrated by the recent ad absurdum refutation by Bernstein invoking the holographic
principle [Ber09]. It is also interesting to note the recent answer by Renner and Renes
[RR20] invoking fault-tolerant quantum computation as a justification - arguably far from
practical - for the validity of QKD absolute security model.
Beyond these difficulties, there is also a central reason to cherish the absolute security
model: it has provided and still provides a powerful framework that has allowed to make
key conceptual progress and develop fantastic research that has lead to a composable se-
curity definition and proof of QKD [Ren05], capitalizing on a remarkable series of work
spanning over more than 10 years [BBCM95, SP00, May01, BBB+ 06, BOHL+ 05b].
We propose to consider more “realistic” security model as a way to better capture and
define security properties that could then be enforced in practice, with high assurance.
This will typically rely on trading the objective of ultimate security (with no or strictly
minimal assumptions) to security models with additional assumptions. Such evolution
should however not be a leap into the unknown. Formal proofs, based on a precise secu-
rity model certainly constitute one of the most precious asset of quantum cryptography.
Moving towards new security models for quantum cryptography, car only be envisaged if
provable security†i.e. the ability to derive security claims from rigorous logical reasoning, is
kept as an intangible principle for quantum cryptography.
Diversifying with respect to one main security model also present the risk to end up
with models, protocols and security claims that become very complex, at that may be diffi-
cult if not impossible to to compare. We can note this phenomenon currently exists in mod-
ern cryptography, that rely on computational assumptions that are in general not directly
comparable. However, complexity theory and the use of restricted models [Sho97], and
reduction-based reasoning coupled with generic unifying approaches [MPZ20] constitute
powerful tools to compare security models. It seems important to aim at such compar-
ative analysis, also in quantum cryptography. Studying the possible reductions between
different existing quantum cryptographic protocol has howerver often been left aside so
far, which contributes to some of the confusion that we pointed at in the previous subsec-
tion. For example the reduction of Quantum Digital Signatures [AA15] to QKD followed
by information-theoretic authentication [Sti94] is often ignored. In the same spirit, we have
realized that despite the very large literature on Quantum Secure Direction Communica-
tion (QSDC) [DLL03], the protocol properties have only been informally defined. We are
currently working on a paper [SAL22] aiming at providing a property-based comparison
between QSDC and QKD combined with One-Time-Pad encryption.
66
5.2. Quantum cryptography in a hybrid security model
Assumptions on the storage capabilities of the adversary Given the technological chal-
lenges associated with quantum storage [SAA+ 10], a reasonable assumption consists in
assuming that the adversary is generically limited in its capacity to store quantum infor-
mation.
In the bounded-quantum storage model, introduced by Damgard, Fehr, Salvail and
Schaffner [DFSS08] one assumes that the adversary can only store a limited amount of
qubits. This model is inspired by the classical bounded storage model, [CM97], for which
a cryptographic advantage can only provided, for key establishment, against an attacker
whose memory size is less than quadratic with respect to the one of legitimate users
[DM04], thereby limiting the impact of such model in practice, in an era where cheap clas-
sical storage has become abundant. The bounded-quantum storage model allows to sig-
nificantly widen the scope of cryptographic primitives that can be constructed with quan-
tum resources, in particular Oblivious Transfer (OT), Bit Commitment (BC) and password-
based identification [DFSS08].
The noisy storage model, introduced by Wehner, Schaffner and Terhal [WST08], provides
a more realistic way to account for the difficulty of storing quantum information. It as-
sumes that the attacker has an arbitrary amount of quantum storage, whose quality and
in particular degrades with time. Assuming time-degradation of the classical capacity of
the storage enables to prove the unconditional security of OT and BC [KWW12], while en-
67
Chapter 5. Perspectives
tanglement sampling technique allows to to extend the validity of the noisy storage to the
case where the time-limited bound applies to the quantum capacity [DFW14].
Another recent line of work, called Quantum data locking (QDL), is based on the even
stronger assumption that quantum storage fully decoheres after some time limit. Relying
on a pre-shared secret, legitimate users can then leverage the information locking property
to design secure communication schemes, that rely on the time-limited quantum storage
assumption to impose that the attacker is limited to accessible information. This assump-
tion is in general not composable with the plain quantum security model of QKD. Dif-
ferent QDL constructions can then be used to upper bound this accessible information.
A first category relies on to single-photon encoding [GHK+ 14] and has been experimen-
tally demonstrated [LHA+ 16], with however standard (QKD-like) limitations in terms of
loss-tolerance while requiring greater experimental complexity. A second category relies
on continuous-variable encoding, and could in principle be used to reach quantum data
locking secure rates close to the classical capacity [LL15]. However such constructions
resort to random coding arguments for which practical implementation with structured
measurement is not possible.
1. Alice and Bob are assumed to have access to a public authenticated classical chan-
nel and to an encryption scheme that is computationally secure with respect to any
unauthorized attacker Eve for a time at least tcomp after a ciphertext is exchanged on
the classical channel.
68
5.2. Quantum cryptography in a hybrid security model
2. Eve’s d-dimensional quantum memory is tcoh -decohering with tcoh << tcomp . Seeing
the quantum memory as a channel, it can be written as as a time-dependent and
complete positive trace-preserving map Nt : ρ → Nt (ρ). The assumption related to
noisy storage and decoherence is characterized by:
1 Id 1
∀t > tcoh , ∀ρ Nt (ρ) − =o (5.1)
2 d 1 d
It is interesting to note that these two categories of assumptions, namely short-term com-
putational security [Unr15] and noisy quantum storage [KWW12], have so far already been
considered in quantum cryptography, yet only disjointly.
Figure 5.1: QCT security model: Assumption (a): Short-term secure encryption during
time tcomp , during which Alice and Bob can exchange an ephemeral classical secret S.
Assumption (b): Time-limited quantum memory, with coherence time tcoh << tcomp
.
Validity of QCT security model It is also important to discuss about the validity of the
model, and in particular about its central assumption: tcoh tcomp .
A practical lower bound on the value of tcomp can be inferred from assumed long-term
security of the AES256 encryption scheme, that is considered to meet the requirements for
long-term (30 years) confidentiality of Top Secret data [Hat03].
Regarding the coherence time of optically addressable quantum memory, we reviewed
in [VA20] experimental demonstrations of storage and then retrieval of optically encoded
69
Chapter 5. Perspectives
quantum information, at single photon level. This indicates that the value of tcoh ranges
from a few nanoseconds to microseconds [SAA+ 10].
Given the large gap between the upper bound on tcoh and lower bound on tcomp , the
validity of the QCT security model can be assumed with a very high confidence today.
This also leaves a considerable margin for its validity in the future. Finally, it has to be
noted that aim here to build a key distribution protocol with everlasting security, which
means in particular that the validity of the QCT security model only needs to hold at the
time of protocol execution to provide information-theoretic security in the future.
The rationale for the QCT security model is also rooted on a central observation:
quantum cryptographic functionalities can in the broad sense be guaranteed assuming
the existence of computational long-term-secure one-way-function [Gol09, ANS20]. This
conversely implies that a quantum cryptographic advantage can only arise in stronger
models, i.e. in security models where long-term computational security of one-way
function (and therefore encryption) does not hold.
The objective of the QCT security model is to enable performance and functionality im-
provements in quantum cryptography, while maintaining a clear advantage with respect
to both classical cryptography (based on computational assumptions) and with respect to
QKD.
• Security gain over classical cryptography. As we shall use the QCT approach to
build a key establishment scheme, called MUB-QCT (presented in the next subsec-
tion) the resulting protocol cannot be unconditional secure due to the nature of the
QCT assumptions. However, the model is crafted to enable everlasting security. This
means that the established keys can be provably secure against a computationally
unbounded adversary, provided that the initial ephemeral encrypted communica-
tion is not broken by an adversary within a time shorter than the decoherence time
of its available quantum storage (at protocol execution time). Such security level is
impossible to reach only with classical means.
• Improvement of the performance envelope, with respect to QKD and more broadly
to repeaterless quantum secret capacity fundamental bounds [PLOB17]. This im-
70
5.2. Quantum cryptography in a hybrid security model
Figure 5.2: One channel use of MUB-QCT leads to a classical wire-tap scheme w.r.t. bit x:
(a) Low-noise binary classical communication channel x → y between Alice and Bob.
(b) Noisy binary communication channel x → z between Alice and Eve. Due to QCT
assumptions, Eve is forced to measure ρx immediately at reception, and to later decode z
using her measurement result ω and post-measurement information S.
71
Chapter 5. Perspectives
Notations We make use of the following notation: for an integer d, we denote a set of
d elements {0, . . . , d − 1} as [d]. Any random variable is denoted by a capital letter, for
example X, with probability distribution PX over a finite alphabet X . The realization of X
is denoted by the lower-case letters x, for x ∈ X . We denote vectors in superscript face: for
example xn := (x1 , . . . , xn ), xn ∈ X n .
We shall call A = A1 A2 be the d dimensional Hilbert space used in the protocol, with
d a power of 2. We also denote {|xi} : x ∈ {0, 1} and {|ri} : r ∈ [d/2] the (standard)
orthonormal bases of A1 and A2 respectively.
The encoding vector basis on A is defined as ixr ≡ d2 × x + r and noted {|ixr i}x∈{0,1},r∈[d/2] .
An essential element of MUB-QCT protocol will consist in randomizing on of the basis
states of A using two set of unitaries:
• A complete set of d + 1 mutually unbiased bases (MUB), in dimension d. We index
this set by θ ∈ [d + 1] and will denote {Uθ } the unitary operations that transforms the
computational basis into the different MUB basis indexed by θ.
• A full set of pair-wise independent permutations {Pσ }, σ ∈ [|P|] . A family P of per-
mutations of a set of d elements [d], is pair-wise independent if for all i1 6= i2 and j1 6=
1
j2 , and for σ chosen uniformly over P one has, Pr {σ (i1 ) = j1 , σ (i2 ) = j2 } = d(d−1) .
The total number of pair-wise independent permutations for a set of d-elements is
(d)
|P| = d/22 ∼ 2d−1 for large d.
Encoding at Alice
• Setting a computational timelock: Alice picks θ and σ at random in [d + 1] × [|P|]. The
information S = (θ, σ) is sent from Alice to Bob using a short-term-secure encryption
scheme. S constitutes a computational timelock, i.e. a classical secret shared between
Alice and Bob, but not available to Eve during time at least tcomp .
• Quantum communication Given an input bit x ∈ {0, 1}, Alice generates (locally at
random) r in [d/2] and sends the state Pσ Uθ |ixr i to Bob
We will denote the state encoded by Alice and inputted on the quantum channel as
θ,σ
|ψx,r i = Pσ Uθ |ix,r i (5.2)
Decoding at Bob
Bob’s decoding strategy is fixed in order to offer perfect correctness over a ideal quantum
channel. It corresponds to the following operations:
• Knowing S = (θ, σ) , Bob unitarily transforms the received state back into the stan-
dard basis, by applying (Pσ Uθ )† to his received state
• Bob implements a two-outcome projective measurement in the standard basis, cor-
Pd/2
responding to POVM {My }y=0,1 with My = r=1 |iy,r ihiy,r |
72
5.2. Quantum cryptography in a hybrid security model
d/2
(Pσ Uθ )† ( |iy,r ihiy,r |)(Pσ Uθ )† )
X X
Myθσ = (5.3)
θ,σ r=1
2. Timelock: Alice and Bob exchange timelocked information (θn , σ n ) using short-term secure
encryption scheme (Enc, Dec).
• Encode and send x over a qudit: Alice sends a single copy of the qudit state |ψxθ,σ
k ,rk
i to
Bob over the quantum channel.
• Receive qudit and decode y: Upon reception of the qudit state at the quantum channel
output and knowing (θk , σk ) Bob performs the measurement {My }θk σk and obtains
outcome yk .
4. Classical post-processing:
• Parameter estimation: Based on a random sampling of (xn , y n ) Alice and Bob estimate
the bit error rate pe . If pe is below some set threshold εth , they abort.
• Finally Alice and Bob run an error correction algorithm followed by privacy amplifica-
tion (PA) to obtain the final keys (SA ; SB ), of length `.
Remark: the generalization to the case of a lossy quantum channel could be addressed
relatively simply, by adding a sifting phase,.
Security analysis
Eavesdropping model We consider the worst-case scenario where Eve has full access to
the channel input, as depicted on Figure 5.2. This is similar to the strong locking scenario
as considered in [GHK+ 14]).
73
Chapter 5. Perspectives
Hence from Eve’s viewpoint, that does not know r, nor S = (θ, σ), the quantum state
at channel input can be described by a density matrix ρx with
d/2
1 X 2 X
ρx = P σ Uθ |ix,r ihix,r | (Pσ Uθ )† (5.4)
|θ||σ| θσ d r=1
Optimal attack strategy Due to the QCT security model, Eve strategy is restricted to two
alternatives:
I Eve stores the input quantum state ρx in her quantum storage and later performs a
measurement at time tcomp given the information (θ, σ) that will then be revealed to
her, and she obtains z ∈ {0, 1}.
Proposition 1 (Strategy II is optimal ) If Eve follows the strategy I, her success probability to
guess the bit x correctly can be upper
bounded given the decoherence model described in Equation
I
(5.1), as Pguess (X|E) ≤ 12 + o d1 . If Eve follows strategy II, one simple strategy is to perform
a measurement in a random
MUB, followed by post-measurement decoding. This achieves success
probability at least 12 + Ω d1 . We can prove a matching upper bound, indicating that this is essen-
tially the optimal strategy, by considering the measurement in a fixed basis (Eve has no preferable
measurement basis since the full set of MUBs forms 2-design). Based on the work of Berta et. al., on
Quantum to Classical Randomness Extractors [BFW13] we can establish that such generic strat-
egy II, reduces to applying a strong QC-extractor to ρx . Taking
the parameters of the 1-MUB-QCT
II
protocol into account, this proves that Pguess (X|Z) ≤ 21 +Ω 1
d and consequently that the optimal
eavesdropping strategy is II.
Performance Analysis Since the MUB-QCT protocol defines an effective wire-tap sce-
nario, the key rate in the asymptotic limit for the MUB-QCT protocol, can be derived using
following Csiszár and Körner formula [CK78]:
74
5.2. Quantum cryptography in a hybrid security model
• MDI security: In the MUB-QCT protocol, the upper bound on Eve information can
be achieved by only considering the input state and not Bob measurement’s results.
Consequently, the implementation of Bob’s measurement device is not required to
be trusted to guarantee security, as displayed on Figure 5.3.
Figure 5.3: MUB-QCT trust requirements compared with those of standard QKD, MDI-
QKD and DI-QKD. MUB-QCT enjoys some MDI-type security features. This characteristic
can have an important practical impact by allowing to relax key engineering constraints.
The 1-MUB-QCT protocol considered the quantum communication of a single qudit state
Pσ Uθ |ix,r i from Alice to Bob. In such case we have shown that Eve’s information vanishes
as O(1/d). This in principle leaves the room to operate secure key establishment, a higher
number of copies, i.e. m copies of Pσ Uθ |ix,r i per channel use: this is the m-MUB-QCT
protocol.
Interestingly the m-MUB-QCT protocol could open the way to higher key rates and
long-distance operation, while keeping implementation simple and using with coherent
states with mean photon numbers ∼ m.
75
Chapter 5. Perspectives
Performance Analysis
The proactive MUB measurement strategy allows secure key distribution with input states
containing up to O(d) photons, implying a significant performance increase, characterized
by a O(d)-multiplication of key rate as shown in Figure 5.4. Analyzing the plot in Figure
5.4, we observe three distinct regimes, Constant rate regime: short distance, where the secret
key rate is constant and commensurate; Single copy regime: where the key rate is similar to
the single copy case, scaling as the transmissivity T ; Cutoff regime: long distances, where
detector dark count rates dominate, sharply limiting the secret key rate.
The possibility of sending multiple copies of the quantum state per channel use can
moreover be leveraged to perform multiparty key distribution between one Alice and
multiple Bobs
76
5.2. Quantum cryptography in a hybrid security model
Figure 5.4: Key rate per channel use as a function of distance, for m-MUB-QCT proto-
col against proactive MUB measurement strategy. The key rate at a given distance iss
maximized over the photon number m. The parameters assumed in the plots are: Loss
0.2dB/Km; Pdark = 10−6 ; efficiency of detectors η = 25%; visibility V = 98%. Since MUB-
QCT can be implemented with 2 detection modes (2-single photon detectors) we also plot
2-modes PLOB bound [PLOB17] as a benchmark..
key establishment with reduced trust requirements at reception side, and with rates and
reach significantly outperforming those of QKD.These theoretical results need to be con-
solidated but also experimentally tested and validated so that the relevance of the QCT
approach for RWQC can be assessed.
This leads to interesting new challenges for quantum cryptography in hybrid quan-
tum computational security models. On the theory side, a central challenge, that we have
started to investigate, consists in proving the security of m-MUB-QCT against√general at-
tacks. We conjecture that secure key rate can be obtained with up to m ∼ O( d) against
general attacks, guaranteeing significant performance improvement in practically achiev-
able multimode regime, even though lower than in the restricted analysis presented on
Figure 5.4. Another fascinating challenge, that we also intend to tackle, is related to the
design of repeater schemes in the QCT security model.
Building MUB-QCT demonstrators will require to prepare, modulate and detect high-
dimensional quantum encodings. Finding efficient and robust implementation schemes
and performing experimental demonstrations will hence be very important in order
to establish the practicality of the QCT approach. Multiple quantum systems demon-
strated so far in the context of high-dimensional QKD constitute interesting reference
points indicating the in-principle feasibility of MUB-QCT: they include temporal-spectral
[NWS+ 13, AKBH07], orbital angular momentum (OAM) [SBF+ 17, MMLO+ 15] as well as
spatial mode [DBD+ 17] encodings. In terms of dimensionality, existing time or spectral
77
Chapter 5. Perspectives
encoding HD-QKD techniques indicate the possibility to operate with d as large as 103
but also to envisage even much larger alphabet with existing or near-term technologies by
leveraging the specificities of the QCT framework.
This leads to the question of the objectives that RWQC should pursue. In particular,
if absolute security is not its horizon, can we define an alternative project, allowing to
demonstrate a clear security advantage over classical crypto, and yet better suited to prac-
tical contexts than abstract quantum cryptography? We answer positively to this question.
In particular, we believe that it is possible to address some if the core challenges of QKD,
at the application frontier, by trading the quest of absolute security for practical security
gains. In this perspective, RWQC emerges as a holistic approach characterized by a shift of
priorities towards objectives that integrate a dialectic dimension, balancing the ambition
to design cryptographic systems beyond classical reach with engineering constraints and
cost-benefit analysis. With the ambition of providing a cryptographic advantage in the
real-world,; RWQC can be articulated around two main guiding principles, at logical and
physical levels.
Enable security gain for real-world use cases Considering well-defined security mod-
els, the objective is to propose end-to-end security services relying on quantum crypto-
graphic protocols that can provide a clear security gain with respect to classical cryptogra-
phy.
The notion of end-to-end security is very important, and yet often overlooked. It in-
deed conditions the logical rationale of the choice of cryptographic primitives and their
combination. An emblematic question is related to the use QKD as a key renewal tech-
nique for AES encryption. As we have seen in section 4.2, QKD enables some security
gain, over classical cryptography alone, in terms of post-compromise security. However,
the implicit use of AES encryption for secure communications implies that we consider a
security model where AES is long-term secure. This also implies that the overall security
gain that can be achieved by combining QKD key renewal with AES encryption is marginal
78
5.3. Towards real-world quantum cryptography
with respect to what can be achieved purely classical solutions based on symmetric cryp-
tography, as argued in [ANS20].
We however want to point out that there exist use-cases where the use of QKD can
present strict security gain over classical cryptography (in that case PQC) alone. Such
use-cases have in common the fact that QKD is used to securely transport (with OTP en-
cryption) some scarce and strategic high-security data only, such as long-term secrets (health
data, governmental secrets) or some high-level cryptographic keys.
• A promising direction consists in combining QKD and PQC in order to obtain clear
gains from the combination, as in the recently proposed Muckle protocol [Exc20]
where a hybrid key exchange protocol is specified and studied, that presents high
reliability with respect to the failure of any of its (PQC and QKD) cryptographic
components, but also a performance gain with respect to using PQC alone.
79
Chapter 5. Perspectives
These challenges are at the heart of the current international effort towards the defi-
nition of standardized methods for security evaluation and certification of QKD [ISO20],
[ETS21], as well as QRNG [QRa], to which we actively participate in parallel with the
wider reflexion on the vulnerability analysis methodology and on the interplay between
theoretical and practical security developed in [KMQA21] and on the central role that en-
gineering complexity should be given. On a more fundamental level, these questions also
strongly resonate with device-independent and semi device-independent cryptography.
We note that the use of short-term secure computational assumption opens a promising
direction to make DI-QKD more practical. [MDCAF20]
Provable security for cyber-physical systems In resonance with the current work on
QKD and QRNG implementation security, but also Physical Unclonable Functions (PUFs),
the interplay between quantum technologies and cyber-physical system security appear to
us as a fascinating and largely unexplored field of research .
Quantum cryptographic techniques make in principle possible some very strong forms
of security by design, built around some physical and logical reduction to clear-cut pro-
cesses such as the quantum measurement of an elementary quantum system, or device-
independent characterization of measured correlations. In this perspective, security mod-
els and the interplay between logical and physical trust assumptions will play a central
role, as outlined in 5.2.1 and 5.2.2.
Slow Information I would like to conclude this chapter and this manuscript, by promot-
ing an alternative way to look at quantum cryptography and its applications, through the
concept and the metaphor of “Slow Information”. This concept is inspired by the “Slow
Food” movement [Pet13], founded in 1989 that promotes local, sustainable and quality
foods, with the ambition to be simultaneously protected from and included into the global
food system. This movement has grown into a global scale over the years [slo], around the
central idea that slowness is a key ingredient to differentiate from the food industry and
its deficiencies, and to coexist with it.
If we accept the relevance of drawing a parallelism between Food and Data, we can
then argue that the Slow Food principles provide interesting perspectives for our digital
80
5.3. Towards real-world quantum cryptography
and data-driven society, and envisage that quantum cryptography could play a decisive
role in building a “Slow information” islands around a few principles that we can sketch:
• Slow Information operates over network infrastructures whose physical layer can be
fully characterized using quantum information tools. It targets application use-cases
where a quantum cryptographic advantage can be reached, which implies relatively
small data sets, for which long-term security is needed. This also conversely imply
that Slow Information islands should expect to be operated very differently from
modern classical networks, in which the physical layer constraints can be essentially
abstracted and virtualized.
• Slow Information and the role of quantum networks would however not come as a
replacement or in opposition to classical secure networks. They would rely on quan-
tum cryptography, combined with computational cryptography, to protect highly
confidential information presenting long-term security needs, with security levels
unachievable classically. Based in particular around long-term-secure storage, such
quantum networks extend our ability to manage confidential data without resorting
to complete physical isolation.
• Slow information shall be based on precise trust assumptions notably with regard to
tamper-proof security perimeters and quantum cryptographic systems implementa-
tions, that will need to be certified. It shall also be based on well-defined security
models and provable security. We are here again tempted to draw a parallelism with
the Slow Food movement and its promotion of high-quality products that rely on a
cultural heritage whose protection and certification is required, with labels such as
protected designation of origin, PDO, or protected geographical indication, PGI.
81
Chapter 5. Perspectives
82
Bibliography
[AA15] Ryan Amiri and Erika Andersson. Unconditionally secure quantum signa-
tures. Entropy, 17(8):5635–5659, 2015.
[AA21] Raphaël Aymeric and Romain Alléaume. Covert continuous variable quan-
tum key distribution. In Preparation, 2021.
[AAWJ20] Romain Alléaume, Raphaël Aymeric, Cédric Ware, and Yves Jaouën. Tech-
nology trends for mixed qkd/wdm transmission up to 80 km. In 2020 Op-
tical Fiber Communications Conference and Exhibition (OFC), pages 1–3. IEEE,
2020.
[ABB+ 14] Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert,
Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas
Länger, Norbert Lütkenhaus, et al. Using quantum key distribution for
cryptographic purposes: a survey. Theoretical Computer Science, 560:62–81,
2014.
[ABF+ 16] Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni,
Christian Schaffner, and Michael St Jules. Computational security of quan-
tum encryption. In International Conference on Information Theoretic Security,
pages 47–71. Springer, 2016.
[AC12] Scott Aaronson and Paul Christiano. Quantum money from hidden sub-
spaces. In Proceedings of the forty-fourth annual ACM symposium on Theory of
computing, pages 41–60, 2012.
[ACF20] Gildas Avoine, Sébastien Canard, and Loïc Ferreira. Symmetric-key authen-
ticated key exchange (sake) with perfect forward secrecy. In Cryptographers?
Track at the RSA Conference, pages 199–224. Springer, 2020.
[ADM+ 14] Romain Alléaume, Ivo P Degiovanni, Alan Mink, Thomas E Chapuran,
Norbert Lutkenhaus, Momtchil Peev, Christopher J Chunnilall, Vincente
Martin, Marco Lucamarini, Martin Ward, et al. Worldwide standardization
activity for quantum key distribution. In 2014 IEEE Globecom Workshops,
pages 656–661. IEEE, 2014.
83
Bibliography
84
Bibliography
[ARS+ 04] Romain Alléaume, Jean-François Roch, Darius Subacius, Anton Zavriyev,
and Alexei Trifonov. Fiber-optics quantum cryptography with single pho-
tons. In AIP Conference Proceedings, volume 734, pages 287–290. American
Institute of Physics, 2004.
[ATSVY00] Dorit Aharonov, Amnon Ta-Shma, Umesh V Vazirani, and Andrew C Yao.
Quantum bit escrow. In Proceedings of the thirty-second annual ACM sympo-
sium on Theory of computing, pages 705–714, 2000.
[BB84] Charles H. Bennett and Gilles Brassard. Quantum cryptography: Public key
distribution and coin tossing. In Proceedings IEEE International Conference on
Computers, Systems and Signal Proceedings, number 0, pages 175–179, 1984.
[BB14] Charles H Bennett and Gilles Brassard. Quantum cryptography: public key
distribution and coin tossing. Theor. Comput. Sci., 560(12):7–11, 2014.
[BBB+ 06] Eli Biham, Michel Boyer, P Oscar Boykin, Tal Mor, and Vwani Roychowd-
hury. A proof of the security of quantum key distribution. Journal of cryptol-
ogy, 19(4):381–439, 2006.
[BBCM95] Charles H Bennett, Gilles Brassard, Claude Crépeau, and Ueli M Maurer.
Generalized privacy amplification. IEEE Transactions on Information Theory,
41(6):1915–1923, 1995.
[BBD+ 17] Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs,
Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, and Atsushi Waseda. Lin-
cos: A storage system providing long-term integrity, authenticity, and con-
fidentiality. In Proceedings of the 2017 ACM on Asia Conference on Computer
and Communications Security, pages 461–468, 2017.
85
Bibliography
[BBR+ 18] Alberto Boaron, Gianluca Boso, Davide Rusca, Cédric Vulliez, Claire Aute-
bert, Misael Caloz, Matthieu Perrenoud, Gaëtan Gras, Félix Bussières,
Ming-Jun Li, et al. Secure quantum key distribution over 421 km of optical
fiber. Physical review letters, 121(19):190502, 2018.
[BFK09] Anne Broadbent, Joseph Fitzsimons, and Elham Kashefi. Universal blind
quantum computation. In 2009 50th Annual IEEE Symposium on Foundations
of Computer Science, pages 517–526. IEEE, 2009.
[BFW13] Mario Berta, Omar Fawzi, and Stephanie Wehner. Quantum to classical
randomness extractors. IEEE Transactions on Information Theory, 60(2):1168–
1192, 2013.
[BG20] Colin Boyd and Kai Gellert. A modern view on forward security. The Com-
puter Journal, 2020.
[Blu83] Manuel Blum. Coin flipping by telephone a protocol for solving impossible
problems. ACM SIGACT News, 15(1):23–27, 1983.
[BOHL+ 05a] Michael Ben-Or, Michał Horodecki, Debbie W Leung, Dominic Mayers, and
Jonathan Oppenheim. The universal composable security of quantum key
distribution. In Theory of Cryptography Conference, pages 386–406. Springer,
2005.
[BOHL+ 05b] Michael Ben-Or, MichaÇ Horodecki, DebbieW. Leung, Dominic Mayers,
and Jonathan Oppenheim. The universal composable security of quantum
key distribution. In Joe Kilian, editor, Lecture Notes in Computer Science, vol-
ume 3378, pages 386–406–. Springer Berlin Heidelberg, 2005.
86
Bibliography
[BZ13] Dan Boneh and Mark Zhandry. Secure signatures and chosen ciphertext
security in a quantum computing world. In Annual Cryptology Conference,
pages 361–379. Springer, 2013.
[CBKG02] Nicolas J Cerf, Mohamed Bourennane, Anders Karlsson, and Nicolas Gisin.
Security of quantum key distribution using d-level systems. Physical review
letters, 88(12):127902, 2002.
[CCD+ 15] Matthew Campagna, Lidong Chen, Özgür Dagdelen, Jintai Ding, Jen-
nifer K. Fernick, Nicolas Gisin, Donald Hayford, Thomas Jennewein, Nor-
bert Lütkenhaus, Michele Mosca, Brian Neill, Mark Pecen, Ray Perlner, Gré-
goire Ribordy, John M. Schanck, Douglas Stebila, Nino Walenta, William
Whyte, and Zhenfei Zhang. Quantum safe cryptography and security: An
introduction, benefits, enablers and challengers. Technical report, ETSI (Eu-
ropean Telecommunications Standards Institute), June 2015.
[CK78] Imre Csiszár and Janos Korner. Broadcast channels with confidential mes-
sages. IEEE transactions on information theory, 24(3):339–348, 1978.
[CK09] André Chailloux and Iordanis Kerenidis. Optimal quantum strong coin
flipping. In 2009 50th Annual IEEE Symposium on Foundations of Computer
Science, pages 527–533. IEEE, 2009.
[CK11] Roger Colbeck and Adrian Kent. Private randomness expansion with
untrusted devices. Journal of Physics A: Mathematical and Theoretical,
44(9):095305, 2011.
[CM97] Christian Cachin and Ueli Maurer. Unconditional security against memory-
bounded adversaries. In Annual International Cryptology Conference, pages
292–306. Springer, 1997.
87
Bibliography
[CW79] J Lawrence Carter and Mark N Wegman. Universal classes of hash func-
tions. Journal of computer and system sciences, 18(2):143–154, 1979.
[CZC+ 21] Yu-Ao Chen, Qiang Zhang, Teng-Yun Chen, Wen-Qi Cai, Sheng-Kai Liao,
Jun Zhang, Kai Chen, Juan Yin, Ji-Gang Ren, Zhu Chen, et al. An integrated
space-to-ground quantum communication network over 4,600 kilometres.
Nature, pages 1–6, 2021.
[DA07] Mehrdad Dianati and Romain Alléaume. Architecture of the secoqc quan-
tum key distribution network. In 2007 First International Conference on Quan-
tum, Nano, and Micro Technologies (ICQNM’07), pages 13–13. IEEE, 2007.
[DAG+ 11a] Y Dumeige, R Alléaume, P Grangier, F Treussart, and J-F Roch. Controling
the single-diamond nitrogen-vacancy color center photoluminescence spec-
trum with a fabry–perot microcavity. New Journal of Physics, 13(2):025015,
2011.
[DAGS08] Mehrdad Dianati, Romain Alléaume, Maurice Gagnaire, and Xuemin Shen.
Architecture and protocols of the future european quantum key distribution
network. Security and Communication Networks, 1(1):57–74, 2008.
[DBD+ 17] Yunhong Ding, Davide Bacco, Kjeld Dalgaard, Xinlun Cai, Xiaoqi Zhou,
Karsten Rottwitt, and Leif Katsuo Oxenløwe. High-dimensional quantum
key distribution based on multicore fiber using silicon photonic integrated
circuits. npj Quantum Information, 3(1):1–7, 2017.
[DFSS08] Ivan B Damgård, Serge Fehr, Louis Salvail, and Christian Schaffner. Cryp-
tography in the bounded-quantum-storage model. SIAM Journal on Com-
puting, 37(6):1865–1890, 2008.
88
Bibliography
[DFW14] Frederic Dupuis, Omar Fawzi, and Stephanie Wehner. Entanglement sam-
pling and applications. IEEE Transactions on Information Theory, 61(2):1093–
1112, 2014.
[DH76] Whitfield Diffie and Martin Hellman. New directions in cryptography. IEEE
transactions on Information Theory, 22(6):644–654, 1976.
[DHP20] Benjamin Dowling, Torben Brandt Hansen, and Kenneth G Paterson. Many
a mickle makes a muckle: A framework for provably quantum-secure hy-
brid key exchange. In International Conference on Post-Quantum Cryptogra-
phy, pages 483–502. Springer, 2020.
[DL15] Eleni Diamanti and Anthony Leverrier. Distributing secret keys with quan-
tum continuous variables: Principle, security and implementations. En-
tropy, 17(9):6072, 2015.
[DLL03] Fu-Guo Deng, Gui Lu Long, and Xiao-Shu Liu. Two-step quantum di-
rect communication protocol using the einstein-podolsky-rosen pair block.
Physical Review A, 68(4):042317, 2003.
[DM04] Stefan Dziembowski and Ueli Maurer. On generating the initial key in the
bounded-storage model. In International Conference on the Theory and Appli-
cations of Cryptographic Techniques, pages 126–137. Springer, 2004.
[DSW+ 20] Hui Dai, Qi Shen, Chao-Ze Wang, Shuang-Lin Li, Wei-Yue Liu, Wen-Qi Cai,
Sheng-Kai Liao, Ji-Gang Ren, Juan Yin, Yu-Ao Chen, et al. Towards satellite-
based quantum-secure time transfer. Nature Physics, 16(8):848–852, 2020.
[DTA+ 04] Y Dumeige, F Treussart, R Alléaume, T Gacoin, J-F Roch, and P Grang-
ier. Photo-induced creation of nitrogen-related color centers in diamond
nanocrystals under femtosecond illumination. Journal of luminescence,
109(2):61–67, 2004.
[EHP+ 19] Tobias A Eriksson, Takuya Hirano, Benjamin J Puttnam, Georg Rademacher,
Ruben S Luís, Mikio Fujiwara, Ryo Namiki, Yoshinari Awaji, Masahiro
Takeoka, Naoya Wada, et al. Wavelength division multiplexing of con-
tinuous variable quantum key distribution and 18.3 tbit/s data channels.
Communications Physics, 2(1):1–8, 2019.
89
Bibliography
90
Bibliography
[GMR+ 13] Marissa Giustina, Alexandra Mech, Sven Ramelow, Bernhard Wittmann,
Johannes Kofler, Jörn Beyer, Adriana Lita, Brice Calkins, Thomas Gerrits,
Sae Woo Nam, et al. Bell violation using entangled photons without the
fair-sampling assumption. Nature, 497(7448):227–230, 2013.
[GRTZ02a] Nicolas Gisin, Grégoire Ribordy, Wolfgang Tittel, and Hugo Zbinden.
Quantum cryptography. Reviews of modern physics, 74(1):145, 2002.
[GRTZ02b] Nicolas Gisin, Grégoire Ribordy, Wolfgang Tittel, and Hugo Zbinden.
Quantum cryptography. Rev. Mod. Phys., 74:145–195, Mar 2002.
[GVAW+ 03] Frederic Grosshans, Gilles Van Assche, Jerome Wenger, Rosa Brouri, Nico-
las J. Cerf, and Philippe Grangier. Quantum key distribution using
gaussian-modulated coherent states. Nature, 421(6920):238–241, January
2003.
[Hat03] Lynn Hathaway. National policy on the use of the advanced encryption
standard (aes) to protect national security systems and national security in-
formation. National Security Agency, 23, 2003.
[HFW+ 13] D Huang, J Fang, D Wang, P Huang, and G Zeng. A wideband balanced
homodyne detector for high speed continuous-variable quantum key dis-
tribution systems. In QCrypt, 2013.
[HHL+ 15] Duan Huang, Peng Huang, Dakai Lin, Chao Wang, and Guihua Zeng.
High-speed continuous-variable quantum key distribution without send-
ing a local oscillator. Opt. Lett., 40(16):3695–3698, Aug 2015.
[HKJJ+ 14] Jing-Zheng Huang, Sébastien Kunz-Jacques, Paul Jouguet, Christian Weed-
brook, Zhen-Qiang Yin, Shuang Wang, Wei Chen, Guang-Can Guo, and
Zheng-Fu Han. Quantum hacking on Quantum Key Distribution using Ho-
modyne Detection. Phys. Rev. A, 89:032304, Mar 2014.
[HLW+ 15] Duan Huang, Dakai Lin, Chao Wang, Weiqi Liu, Shuanghong Fang, Jinye
Peng, Peng Huang, and Guihua Zeng. Continuous-variable quantum key
distribution with 1 mbps secure key rate. Opt. Express, 23:17511–17519, 2015.
91
Bibliography
[HWY+ 13a] Jing-Zheng Huang, Christian Weedbrook, Zhen-Qiang Yin, Shuang Wang,
Hong-Wei Li, Wei Chen, Guang-Can Guo, and Zheng-Fu Han. Quantum
hacking of a continuous-variable quantum-key-distribution system using a
wavelength attack. Phys. Rev. A, 87:062329, Jun 2013.
[HWY+ 13b] Jing-Zheng Huang, Christian Weedbrook, Zhen-Qiang Yin, Shuang Wang,
Hong-Wei Li, Wei Chen, Guang-Can Guo, and Zheng-Fu Han. Quantum
hacking of a continuous-variable quantum-key-distribution system using a
wavelength attack. Phys. Rev. A, 87:062329, Jun 2013.
[IDQ21] IDQ. http://www.idquantique.com, 2021.
[ISO20] ISO/IEC JTC1 SC27 WG3, Security requirements, test and evaluation meth-
ods for quantum key distribution., 2020.
[JKJD+ 12] Paul Jouguet, Sébastien Kunz-Jacques, Thierry Debuisschert, Simon Fossier,
Eleni Diamanti, Romain Alléaume, Rosa Tualle-Brouri, Philippe Grangier,
Anthony Leverrier, Philippe Pache, et al. Field test of classical symmetric
encryption with continuous variables quantum key distribution. Optics Ex-
press, 20(13):14030–14041, 2012.
[JKJD13] Paul Jouguet, Sébastien Kunz-Jacques, and Eleni Diamanti. Preventing cal-
ibration attacks on the local oscillator in continuous-variable quantum key
distribution. Phys. Rev. A, 87:062313, Jun 2013.
[JKJL+ 13a] Paul Jouguet, Sebastien Kunz-Jacques, Anthony Leverrier, Philippe Grang-
ier, and Eleni Diamanti. Experimental demonstration of long-distance
continuous-variable quantum key distribution. Nat Photon, 7(5):378–381,
2013.
[JKJL+ 13b] Paul Jouguet, Sébastien Kunz-Jacques, Anthony Leverrier, Philippe Grang-
ier, and Eleni Diamanti. Experimental study on the gaussian-modulated
coherent-state quantum key distribution over standard telecommunication
fibers. Nature Photonics, 7:378,Äì381, 2013.
[Ken12] Adrian Kent. Quantum tasks in minkowski space. Classical and Quantum
Gravity, 29(22):224013, 2012.
[KJJ15] Sébastien Kunz-Jacques and Paul Jouguet. Robust shot-noise measure-
ment for continuous-variable quantum key distribution. Physical Review A,
91(2):022307, 2015.
[KL14] Jonathan Katz and Yehuda Lindell. Introduction to modern cryptography. CRC
press, 2014.
[KL21] Wen Yu Kon and Charles Ci Wen Lim. Provably secure symmetric private
information retrieval with quantum cryptography. Entropy, 23(1):54, 2021.
92
Bibliography
[KMQA21] Rupesh Kumar, Francesco Mazzoncini, Hao Qin, and Romain Alléaume.
Experimental vulnerability analysis of qkd based on attack ratings. Scientific
Reports, 22:9564, 2021.
[KQA15] Rupesh Kumar, Hao Qin, and Romain Alléaume. Coexistence of continuous
variable qkd with intense dwdm classical channels. New Journal of Physics,
17(4):043027, 2015.
[Kra10] Hugo Krawczyk. Cryptographic extraction and key derivation: The hkdf
scheme. In Annual Cryptology Conference, pages 631–648. Springer, 2010.
[KRBM07] Robert König, Renato Renner, Andor Bariska, and Ueli Maurer. Small acces-
sible quantum information does not imply security. Physical Review Letters,
98(14):140502, 2007.
[KSDS19] Sebastian Kleis, Joachim Steinmayer, Rainer H Derksen, and Christian G
Schaeffer. Experimental investigation of heterodyne quantum key distri-
bution in the s-band or l-band embedded in a commercial c-band dwdm
system. Optics express, 27(12):16540–16549, 2019.
[KTHW13] J˛edrzej Kaniewski, Marco Tomamichel, Esther Hänggi, and Stephanie
Wehner. Secure bit commitment from relativistic constraints. IEEE Trans-
actions on Information Theory, 59(7):4687–4699, 2013.
[KWW12] Robert Konig, Stephanie Wehner, and Jürg Wullschleger. Unconditional se-
curity from noisy quantum storage. IEEE Transactions on Information Theory,
58(3):1962–1984, 2012.
[LAB+ 08] Anthony Leverrier, Romain Alléaume, Joseph Boutros, Gilles Zémor, and
Philippe Grangier. Multidimensional reconciliation for a continuous-
variable quantum key distribution. Physical Review A, 77(4):042325, 2008.
[Lan14] Susan Landau. Highlights from making sense of snowden, part ii: What’s
significant in the nsa revelations. IEEE Security & Privacy, 12(1):62–64, 2014.
[LBGP+ 07] Jérôme Lodewyck, Matthieu Bloch, Raúl García-Patrón, Simon Fossier,
Evgueni Karpov, Eleni Diamanti, Thierry Debuisschert, Nicolas J Cerf, Rosa
Tualle-Brouri, Steven W McLaughlin, et al. Quantum key distribution over
25 km with an all-fiber continuous-variable system. Physical Review A,
76(4):042305, 2007.
[LC97] Hoi-Kwong Lo and Hoi Fung Chau. Is quantum bit commitment really
possible? Physical Review Letters, 78(17):3410, 1997.
[LC98] Hoi-Kwong Lo and Hoi Fung Chau. Why quantum bit commitment and
ideal quantum coin tossing are impossible. Physica D: Nonlinear Phenomena,
120(1-2):177–187, 1998.
93
Bibliography
[LCT14] Hoi-Kwong Lo, Marcos Curty, and Kiyoshi Tamaki. Secure quantum key
distribution. Nature Photonics, 8(8):595–604, 2014.
[LDGP+ 07] Jérôme Lodewyck, Thierry Debuisschert, Raúl García-Patrón, Rosa Tualle-
Brouri, Nicolas J. Cerf, and Philippe Grangier. Experimental implemen-
tation of non-gaussian attacks on a continuous-variable quantum-key-
distribution system. Phys. Rev. Lett., 98:030503, Jan 2007.
[LHA+ 16] Daniel J Lum, John C Howell, MS Allman, Thomas Gerrits, Varun B Verma,
Sae Woo Nam, Cosmo Lupo, and Seth Lloyd. Quantum enigma machine:
Experimentally demonstrating quantum data locking. Physical Review A,
94(2):022315, 2016.
[LL15] Cosmo Lupo and Seth Lloyd. Quantum data locking for high-rate private
communication. New Journal of Physics, 17(3):033022, 2015.
[LMC05] Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen. Decoy state quantum key
distribution. Physical review letters, 94(23):230504, 2005.
[LSA+ 18] Marco Lucamarini, Andrew Shields, Romain Alléaume, Christopher Chun-
nilall, Ivo Pietro Degiovanni, Marco Gramegna, Atilla Hasekioglu, Bruno
Huttner, Rupesh Kumar, Andrew Lord, Norbert Lütkenhaus, Vadim
Makarov, Vicente Martin, Alan Mink, Momtchil Peev, Masahide Sasaki,
Alastair Sinclair, Tim Spiller, Martin Ward, Catherine White, and Zhiliang
Yuan. Implementation security of quantum cryptography. ETSI Group Spec-
ification Document, 2018.
[LUL19] Jie Lin, Twesh Upadhyaya, and Norbert Lütkenhaus. Asymptotic security
analysis of discrete-modulated continuous-variable quantum key distribu-
tion. Physical Review X, 9(4):041064, 2019.
94
Bibliography
[LWW+ 10] Lars Lydersen, Carlos Wiechers, Christoffer Wittmann, Dominique Elser,
Johannes Skaar, and Vadim Makarov. Hacking commercial quantum cryp-
tography systems by tailored bright illumination. Nat Photon, 4(10):686–689,
October 2010.
[LZL+ 20] Yang Li, Xiaofang Zhang, Yong Li, Bingjie Xu, Li Ma, Jie Yang, and Wei
Huang. High-throughput gpu layered decoder of quasi-cyclic multi-edge
type low density parity check codes in continuous-variable quantum key
distribution systems. Scientific Reports, 10(1):1–11, 2020.
[MA17] Adrien Marie and Romain Alléaume. Self-coherent phase reference shar-
ing for continuous-variable quantum key distribution. Physical Review A,
95(1):012316, 2017.
[MA20] Francesco Mazzoncini and Romain Alléaume. State of the art analysis in qci
security. QOSAC study report, 4.1, 2020.
[Mau93] Ueli M Maurer. Secret key agreement by public discussion from common
information. IEEE transactions on information theory, 39(3):733–742, 1993.
[MDCAF20] Tony Metger, Yfke Dulek, Andrea Coladangelo, and Rotem Arnon-
Friedman. Device-independent quantum key distribution from computa-
tional assumptions. arXiv preprint arXiv:2010.04175, 2020.
[MGA+ 20] Philipp Muth, Matthias Geihs, Tolga Arul, Johannes Buchmann, and Stefan
Katzenbeisser. Elsa: efficient long-term secure storage of large datasets (full
version)? EURASIP Journal on Information Security, 2020:1–20, 2020.
95
Bibliography
[MM09] A Theodore Markettos and Simon W Moore. The frequency injection attack
on ring-oscillator-based true random number generators. In International
Workshop on Cryptographic Hardware and Embedded Systems, pages 317–331.
Springer, 2009.
[MMLO+ 15] Mohammad Mirhosseini, Omar S Magaña-Loaiza, Malcolm N O?Sullivan,
Brandon Rodenburg, Mehul Malik, Martin PJ Lavery, Miles J Padgett,
Daniel J Gauthier, and Robert W Boyd. High-dimensional quantum cryp-
tography with twisted light. New Journal of Physics, 17(3):033033, 2015.
[MMMP99] Vicente Martin, Jesus Martinez-Mateo, and Momtchil Peev. Introduction
to quantum key distribution. Wiley Encyclopedia of Electrical and Electronics
Engineering, pages 1–17, 1999.
[MNR+ 20] Miralem Mehic, Marcin Niemiec, Stefan Rass, Jiajun Ma, Momtchil
Peev, Alejandro Aguado, Vicente Martin, Stefan Schauer, Andreas Poppe,
Christoph Pacher, et al. Quantum key distribution: a networking perspec-
tive. ACM Computing Surveys (CSUR), 53(5):1–41, 2020.
[Moc07] Carlos Mochon. Quantum weak coin flipping with arbitrarily small bias.
arXiv preprint arXiv:0711.4114, 2007.
[MPZ20] Ueli Maurer, Christopher Portmann, and Jiamin Zhu. Unifying generic
group models. Cryptology ePrint Archive, 2020.
[MSJ+ 14] Xiang-Chun Ma, Shi-Hai Sun, Mu-Sheng Jiang, Ming Gui, Yan-Li Zhou,
and Lin-Mei Liang. Enhancement of the security of a practical continuous-
variable quantum-key-distribution system by manipulating the intensity of
the local oscillator. Phys. Rev. A, 89:032310, Mar 2014.
[MSJL13] Xiang-Chun Ma, Shi-Hai Sun, Mu-Sheng Jiang, and Lin-Mei Liang. Wave-
length attack on practical continuous-variable quantum-key-distribution
system with a heterodyne protocol. Phys. Rev. A, 87:052309, May 2013.
[MWZ+ 18] Yingqiu Mao, Bi-Xiao Wang, Chunxu Zhao, Guangquan Wang, Ruichun
Wang, Honghai Wang, Fei Zhou, Jimin Nie, Qing Chen, Yong Zhao, et al. In-
tegrating quantum key distribution with classical communications in back-
bone fiber network. Optics express, 26(5):6010–6020, 2018.
[NCS20] NCSC. Quantum security technologies, 2020.
[NSA20] NSA. Quantum key distribution (qkd) and quantum cryptography (qc),
2020.
[NWS+ 13] J Nunn, LJ Wright, C Söller, L Zhang, IA Walmsley, and BJ Smith. Large-
alphabet time-frequency entangled quantum key distribution by means of
time-to-frequency conversion. Optics express, 21(13):15959–15973, 2013.
96
Bibliography
[PAB+ 20] Stefano Pirandola, Ulrik L Andersen, Leonardo Banchi, Mario Berta, Dar-
ius Bunandar, Roger Colbeck, Dirk Englund, Tobias Gehring, Cosmo Lupo,
Carlo Ottaviani, et al. Advances in quantum cryptography. Advances in
Optics and Photonics, 12(4):1012–1236, 2020.
[PAL+ 07] M Peev, Romain Alléaume, T Langer, Lutkenhaus N, Maurhart O., and Sal-
vail L. The secoqc quantum key distribution network prototype: Principles,
design and implementation. In Globecom. IEEE, 2007.
[PAM+ 10] Stefano Pironio, Antonio Acín, Serge Massar, A Boyer de La Giroday,
Dzmitry N Matsukevich, Peter Maunz, Steven Olmschenk, David Hayes,
Le Luo, T Andrew Manning, et al. Random numbers certified by bell’s the-
orem. Nature, 464(7291):1021–1024, 2010.
[PDC+ 12] KA Patel, JF Dynes, I Choi, AW Sharpe, AR Dixon, ZL Yuan, RV Penty, and
AJ Shields. Coexistence of high-bit-rate quantum key distribution and data
on optical fiber. Physical Review X, 2(4):041010, 2012.
[Pet13] Carlo Petrini. Slow food nation: Why our food should be good, clean, and fair.
Rizzoli Publications, 2013.
[PMLA13] Stefano Pironio, Ll Masanes, Anthony Leverrier, and Antonio Acín. Security
of device-independent quantum key distribution in the bounded-quantum-
storage model. Physical Review X, 3(3):031007, 2013.
[PPA+ 09] Momtchil Peev, Christoph Pacher, Romain Alléaume, Claudio Barreiro, Jan
Bouda, W Boxleitner, Thierry Debuisschert, Eleni Diamanti, M Dianati,
JF Dynes, et al. The secoqc quantum key distribution network in vienna.
New Journal of Physics, 11(7):075001, 2009.
97
Bibliography
[PPS07] Kenneth G Paterson, Fred Piper, and Rüdiger Schack. Quantum cryptog-
raphy: a practical information security perspective. Nato Security Through
Science Series D-Information and Communication Security, 11:175, 2007.
[QFLM07] Bing Qi, Chi-Hang Fred Fung, Hoi-Kwong Lo, and Xiongfeng Ma. Time-
shift attack in practical quantum cryptosystems. Quantum Info. Comput.,
7(1):73–82, 2007.
[QHQL07] Bing Qi, Lei-Lei Huang, Li Qian, and Hoi-Kwong Lo. Experimental study
on the gaussian-modulated coherent-state quantum key distribution over
standard telecommunication fibers. Phys. Rev. A, 76:052323, Nov 2007.
[Qi16] Bing Qi. Simultaneous classical communication and quantum key distribu-
tion using continuous variables. Physical Review A, 94(4):042340, 2016.
[QKA13a] Hao Qin, Rupesh Kumar, and Romain Alléaume. Saturation attack on
continuous-variable quantum key distribution system. In Emerging Tech-
nologies in Security and Defence; and Quantum Security II; and Unmanned Sen-
sor Systems X, volume 8899, page 88990N. International Society for Optics
and Photonics, 2013.
[QKA13b] Hao Qin, Rupesh Kumar, and Romain Alléaume. Saturation Attack On
Continuous-Variable Quantum Key Distribution System. In Proc. SPIE 8899,
Emerging Technologies in Security and Defence; and Quantum Security II; and
Unmanned Sensor Systems X, 88990N, volume 8899, pages 88990N–88990N–
7, 2013.
[QKA16] Hao Qin, Rupesh Kumar, and Romain Alléaume. Quantum hacking: Sat-
uration attack on practical continuous-variable quantum key distribution.
Physical Review A, 94(1):012325, 2016.
[QKMA18] Hao Qin, Rupesh Kumar, Vadim Makarov, and Romain Alléaume.
Homodyne-detector-blinding attack in continuous-variable quantum key
distribution. Physical Review A, 98(1):012312, 2018.
[QL18] Bing Qi and Charles Ci Wen Lim. Noise analysis of simultaneous quantum
key distribution and classical communication scheme using a true local os-
cillator. Physical Review Applied, 9(5):054008, 2018.
98
Bibliography
[QLP+ 15] Bing Qi, Pavel Lougovski, Raphael Pooser, Warren Grice, and Miljko Bo-
brek. Generating the local oscillator locally in continuous-variable quan-
tum key distribution based on coherent detection. Phys. Rev. X, 5:041009,
Oct 2015.
[Rab05] Michael O Rabin. How to exchange secrets with oblivious transfer. IACR
Cryptol. ePrint Arch., 2005(187), 2005.
[Ren05] R Renner. Security of quantum key distribution (phd thesis). arXiv preprint
quant-ph/0512258, 2005.
[RK05] Renato Renner and Robert König. Universally composable privacy ampli-
fication against quantum adversaries. In Theory of Cryptography Conference,
pages 407–425. Springer, 2005.
[RR20] Joseph M Renes and Renato Renner. Are quantum cryptographic security
claims vacuous? arXiv preprint arXiv:2010.11961, 2020.
[RRL+ 21] Ravi Raghunathan, Guillaume Ricard, Baptiste Lefaucher, Antoine Henry,
Filippo Miatto, Isabelle Zaquine, and Romain Alléaume. Parallelizable syn-
thesis of arbitrary single-qubit gates with linear optics and time-frequency
encoding. In Preparation, 2021.
[RRM+ 18] Ravi Raghunathan, G Ricard, Filippo Miatto, Isabelle Zaquine, and Romain
Alléaume. Single qubit arbitrary unitary synthesis using photonic spectral
encoding. In Quantum Technology International Conference (QTech 2018), 2018.
[SAL22] Shihan Sajeed, Romain Alléaume, and Hoi-Kwong Lo. A direct look at
quantum secure communication. In Preparation, 2022.
[Sas18] Masahide Sasaki. Quantum key distribution and its applications. IEEE
Security & Privacy, 16(5):42–48, 2018.
99
Bibliography
[SBC+ 15] Daniel B. S. Soh, Constantin Brif, Patrick J. Coles, Norbert Lütkenhaus,
Ryan M. Camacho, Junji Urayama, and Mohan Sarovar. Self-referenced
continuous-variable quantum key distribution protocol. Phys. Rev. X,
5:041010, Oct 2015.
[SBF+ 17] Alicia Sit, Frédéric Bouchard, Robert Fickler, Jérémie Gagnon-Bischoff,
Hugo Larocque, Khabat Heshami, Dominique Elser, Christian Peuntinger,
Kevin Günthner, Bettina Heim, et al. High-dimensional intracity quantum
cryptography with structured photons. Optica, 4(9):1006–1010, 2017.
[SBV+ 20] Pavel Sekatski, J-D Bancal, Xavier Valcarce, EY-Z Tan, Renato Renner, and
Nicolas Sangouard. Device-independent quantum key distribution from
generalized chsh inequalities. arXiv preprint arXiv:2009.01784, 2020.
[SC14] Valerio Scarani and Kurtsiefer Christian. The black paper of quantum cryp-
tography: real implementation. Theoretical Computer Science, 560:27–32,
2014.
[Sch10] Christian Schaffner. Simple protocols for oblivious transfer and secure
identification in the noisy-quantum-storage model. Physical Review A,
82(3):032308, 2010.
[Sch18] Bruce Schneier. Cryptography after the aliens land. IEEE Security & Privacy,
16(5):86–88, 2018.
[SGG+ 11] Jean-Loup Smirr, Sylvain Guilbaud, Joe Ghalbouni, Robert Frey, Eleni Dia-
manti, Romain Alléaume, and Isabelle Zaquine. Simple performance evalu-
ation of pulsed spontaneous parametric down-conversion sources for quan-
tum communications. Optics express, 19(2):616–627, 2011.
100
Bibliography
101
Bibliography
[VA20] Nilesh Vyas and Romain Alléaume. Everlasting secure key agreement
with performance beyond qkd in a quantum computational hybrid secu-
rity model. arXiv preprint arXiv:2004.10173, 2020.
[WEH18] Stephanie Wehner, David Elkouss, and Ronald Hanson. Quantum internet:
A vision for the road ahead. Science, 362(6412), 2018.
[Wie83] Stephen Wiesner. Conjugate coding. ACM Sigact News, 15(1):78–88, 1983.
[Wyn75] Aaron D Wyner. The wire-tap channel. Bell system technical journal,
54(8):1355–1387, 1975.
[XAX+ 03] Lian-Tuan Xiao, Romain Alléaume, Quyen Dinh Xuan, Francois Treussart,
Bernard A Journet, and Jean-françois Roch. Measurement of photon distri-
bution in attenuated diode laser pulses. In Physics and Simulation of Opto-
electronic Devices XI, volume 4986, pages 463–468. International Society for
Optics and Photonics, 2003.
[XAX+ 06] Quyên Dinh Xuân, R Alléaume, Liantuan Xiao, F Treussart, B Journet, and
J-F Roch. Intensity noise measurement of strongly attenuated laser diode
pulses in the time domain. The European Physical Journal Applied Physics,
35(2):117–121, 2006.
[XMZ+ 20] Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, and Jian-Wei Pan.
Secure quantum key distribution with realistic devices. Reviews of Modern
Physics, 92(2):025002, 2020.
102
Bibliography
[YLL+ 20] Juan Yin, Yu-Huai Li, Sheng-Kai Liao, Meng Yang, Yuan Cao, Liang
Zhang, Ji-Gang Ren, Wen-Qi Cai, Wei-Yue Liu, Shuang-Lin Li, et al.
Entanglement-based secure quantum cryptography over 1,120 kilometres.
Nature, 582(7813):501–505, 2020.
[ZCP+ 20] Yichen Zhang, Ziyang Chen, Stefano Pirandola, Xiangyu Wang, Chao Zhou,
Binjie Chu, Yijia Zhao, Bingjie Xu, Song Yu, and Hong Guo. Long-distance
continuous-variable quantum key distribution over 202.81 km of fiber. Phys.
Rev. Lett., 125:010502, Jun 2020.
[ZFQ+ 08] Yi Zhao, Chi-Hang Fred Fung, Bing Qi, Christine Chen, and Hoi-Kwong Lo.
Quantum hacking: Experimental demonstration of time-shift attack against
practical quantum-key-distribution systems. Phys. Rev. A, 78:042333, Oct
2008.
[Zha19] Mark Zhandry. Quantum lightning never strikes the same state twice. In
Annual International Conference on the Theory and Applications of Cryptographic
Techniques, pages 408–438. Springer, 2019.
103