Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han...
Transcript of Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han...
Quantum Cryptography & Computing in China
Zheng-fu HanUniversity of Science and Technology of China
November 6, 2019
4
CONTENTS
2
3
Progress of Quantum Cryptography
Progress of Quantum Computing
1 Background of Quantum Cryptography
Progress of Quantum Cryptography Standards
2
3
Cryptography Act of China
Effective date: Jan. 1. 2010
Open:International cryptographic standard
International company
Classification : Top CryptographyGeneric CryptographyCommercial Cryptography
Adopted at the 14th meeting of the standing committee of the 13th National People's Congress
Protect:Intellectual property
Establish:Authentication system
Groups of Quantum Key Distribution
Quantum SecurityCryptography in China
PQC
QKD
………Prof. Xiang’s Report
Prof. Guo and Han’s Group in University of Science and Technology of China (USTC)Company ---Anhui Qasky Quantum Technology Co. Ltd.
Prof. Pan’s group-- in USTCCompany: Quantum CTek Co., Ltd.)
Hong Guo’s group—Peking University
Prof. Zen’s group– Shanghai Jiao Tong UniversityShanghai Xuntai Information Technology C.o. Ltd.
Many other group in University and Institute
4
CONTENTS
2
3
Progress of Quantum Cryptography in China
Progress of Quantum Computer in China
1 Background on Quantum Information in China
Progress of Quantum Cryptography Standards in China
5
6
1、 Laser Injection to Attack MDI-QKD
Prof. Xian ming Jin’ sGroup from Shang hai Jiao Tong University
For Polarization code MDI System, can get 60% with fewer fingerprint
arXiv:1902.10423 (2019).
With blinding light Without blinding lightCW blinding , thermal blinding, sinkholeblinding ……
after-gate attack, faint-after-gate attack, detector-control attack under specific laser damage, ATR attack
2、Defences of detector control attack
Steal almost all keys just by introducing few errors
Fingerprint:High photocurrent causing by blinding light
Without strong blinding light
more concealed and threatening
few errors; fail to monitoring illumination, afterpulse, photocurrent
Prof. Guo from USTC Prof. Han from USTC
Countermeasure Model – variable attenuation SPD
VA-SPD modelAlice sends quantum states
Bob measure
Basis alignment
generate key
The attenuation value of VA in each VA-SPD is randomly set to 0 dB or 3 dB
judgment
The criterion(1)
(2)
Eqs. (1) and (2) cannot besatisfied simultaneously ifthe system was hacked bythe detector-control attack.
Optica, 6, 1178-1184 (2019)
Optica, 6, 1178-1184 (2019)
without blinding lightwith blinding light
fingerprint!( by blinding light)
VA changes, a signal will be generated
one or more clicks50% error bit
It is independent of the technical details of the detector, and can be easily applied to existing QKD systems.
far from the secure regionin detector control attack
Long distance applications are necessary in China .
Key rate is severely depressed in case of long distance.
Nat. Commun. 8, 15043 (2017)
3、Towards long-distance QKD
Prof. guo & Han’group!
Source:OPLL+negative feedback o generate the twin fields;
Channel:Reference part is time multiplexed with quantum part to compensatethe fast phase drift over long fibers .
Our approach to implement TF-QKD
Phys. Rev. X 9, 021046 (2019)
3、Towards long-distance QKD
Standard single-mode fibers (ITU-G. 652D) witha loss coefficient of about 0.18 dB/km are used;
The overall loss of Charlie’s devices isapproximately 5.16 dB (including loss of PM andefficiency of SSPD);
The secret key rate overwhelms PLOB bound at adistance of 300 km.
The key rate (∼2.01 kbps) significantly surpassthe state-of-the-art QKD experiment with thesame channel loss (53.3 dB).
Phys. Rev. X 9, 021046 (2019)
3、Towards long-distance QKD
4、Towards long-distance QKD
arXiv preprint arXiv:1910.07823 (2019)
Prof. Pan’ sGroup
4、Towards long-distance QKD
arXiv preprint arXiv:1910.07823 (2019)Normal SMF: R=1.79x10-8 @350kmSuper low loss fiber : R=6.34x10-6@509km
Prof. Pan’ sGroup
15
5、Field Test of CV- QKD
Prof. Guo Hong’ sGroup
Underground Fiber, Guang Zhou City @50Km
16
5、Field Test of CV- QKD
Prof. Guo Hong’ sGroup
Underground Fiber, Qing Dao City Key Rate >10kbps@70Km
4
CONTENTS
2
3
Progress of Quantum Cryptography in China
Progress of Quantum Computer in China
1 Background on Quantum Information in China
Progress of Quantum Cryptography Standards in China
17
Cryptography Standardization Technical
Committee (CSTC)
Relationships of Cryptography Standardization Technical Committee
Cryptography Standardization Technical Committee :
Responsibilities for the standardization of cryptographic technology, product, system management, etc.
18
Prof. Han from USTC
Members of the committee of QKD
Many interest committee, such as communication companies, energy industries, finance and government agents, participated in the standardization of quantum secure communication.
Lead by Anhui Qasky Quantum Technology Co. Ltd.
2017Beijing
2015Langfang
2016Beijing2018Suzhou
Standardization of Quantum Cryptography
Seminars of Quantum Cryptography Standards
Standardization of Quantum Cryptography
Technology of quantum key applicationDevice requirements of
key application Quantum VPN Quantum encrypter ……
Requirements of system and application
Business requirements andapplication scenario
Network architecture Network operation management
Technology requirements of key application
Key application interface
……
Technology of quantum key management and device management Technology requirements
of key management Key management Key relay Key service interface ……
Technology requirements ofdevice management
Device management interface Device communication protocol ……
Working Contents
Standardization of Quantum Cryptography
Technology of quantum key distribution Requirements of QKD
protocol Decoy BB84 protocol Continuous variable protocol ……
Technical requirements of quantum channel
Quantum repeater Routing and exchange Channel multiplexing
Technical requirements of quantum security
Security of QKD Security of component
and device Security of interface
Test technology of quantum cryptography Protocol test
……
Performance test
……
Security test
……
Working Contents
Introduction on Quantum Cryptography Standards
Decoy BB84 Quantum Key Distribution Test Specification
Specified the test purpose, environment configuration, process and judgment of the decoy BB84 QKD protocol. Described the testing requirements and methods of the products function, performance, hardware, software and safety management.
Decoy BB84 Quantum Key Distribution Technology Specification
Described the procedure of the decoy BB84 quantum QKD protocol. Specified the security indicators of each stage, and the technical requirements of the product functions, performance and management.
A first versions of the “Decoy BB84 Quantum Key
Distribution Test Specification”has been formed, is
calling for public comments.
Introduction on Quantum Cryptography Standards
A draft of the “Decoy BB84 Quantum Key
Distribution Technology Specification”has finalized
and waiting for authorized
4
CONTENTS
2
3
Progress of Quantum Cryptography in China
Progress of Quantum Computer in China
1 Background on Quantum Information in China
Progress of Quantum Cryptography Standards in China
25
KF C6-130
Superconductor Six Q-bits Chip
High fidelity Logic Gate
(99.7%)
XW S2-200
Two Spin Q-bits Chip on Silicon
High Coherence High speed control
HeFei Origin Quantum Computing Technology co., LTD
Prof. G-c GuoProf. G-p Guo
One key setting all Measurement and Control system of all channels and parameters Four one-key testing process of quantum chipsParameter loop and traversal functionCustom waveform editing and import functionsSequence setting functionUser defined channel groupingSystem real-time monitoring
Measurement and control module
Virtual Quantum Computing EmuWave
Open and Free for 32 bitsCharge for more than 64 bits
Virtual Quantum Computing more than 200 bits
Quantum Chemical Computing—ChemiQ
The first quantum application software Molecular rendering, automatic
calculation functionFunction configuration + result
displayDeveloped on QPanda and VQNet
Genuine 12-Qubit Entanglement on a Superconducting Quantum Processor
Phys. Rev. Lett. 122, 110501 (2019)By Janwei Pan’s Group
A high quality 12-bit one-dimensional chain superconducting bit chip wasdesigned and processed, and the parallel logic gate operation was adoptedto avoid the crosstalk between the bits, and the thermal cycle operation wasused to remove the influence of the unnecessary two-level system on thebit performance. The true entanglement of 12 superconducting bits wasfirst prepared and verified, with the fidelity up to 70%!
Propagation and Localization of Collective Excitationson a 24-Qubit Superconducting Processor
With 24 bits superconducting quantum processor, They developed aquantum multi-body system dynamics simulation. On the superconductingquantum chip, they simulated Bose - Hubbard ladder model, observed thedifference dynamics process between single excitation and doubleexcitation.
Science 364, 753 (2019)
By Janwei Pan’s Group
Quantum computation with universal errormitigation on a superconducting quantum processor
SCIENCE ADVANCES 2019;5: eaaw5686Hao-hua Wang’s Group
Zhe jiang University
Medium-scale quantum devices that integrate about hundreds of physical qubits are likely to be developed inthe near future. However, these devices will lack the resources for realizing quantum fault tolerance. Therefore,The main challenge of exploring the advantage of quantum computation is to minimize the impact of device andcontrol imperfections without complete logical encoding. Quantum error mitigation is a solution satisfying therequirement. Here, we demonstrate an error mitigation protocol based on gate set tomography and quasiprobability decomposition. One- and two-qubit circuits are tested on a superconducting device, andcomputation errors are successfully suppressed. Because this protocol is universal for digital quantumcomputers and algorithms computing expected values, our results suggest that error mitigation can be anessential component of near-future quantum computation.
E-mail: [email protected] Tel: +86 0551-63607342
T H A N K S
33