33
Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019

Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Quantum Cryptography & Computing in China

Zheng-fu HanUniversity of Science and Technology of China

November 6, 2019

Presenter
Presentation Notes
Good morning everyone, I am Zhengfu Han from the University of Science and Technology of China. Here, I will report about the Quantum key distribution and Quantum Computing in China on my personal view.
Page 2: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

4

CONTENTS

2

3

Progress of Quantum Cryptography

Progress of Quantum Computing

1 Background of Quantum Cryptography

Progress of Quantum Cryptography Standards

2

Presenter
Presentation Notes
I will discuss about the follow four parts !
Page 3: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

3

Cryptography Act of China

Effective date: Jan. 1. 2010

Open:International cryptographic standard

International company

Classification : Top CryptographyGeneric CryptographyCommercial Cryptography

Adopted at the 14th meeting of the standing committee of the 13th National People's Congress

Protect:Intellectual property

Establish:Authentication system

Presenter
Presentation Notes
2019年10月26日,第十三届全国人民代表大会第十四会议批准了国家《密码法》,未来中国所有密码相关业务都将按国家《密码法》执行。《密码法》将于明年1月1日开始实行。密码法规定:中国密码将分为三类,核心密码、普通密码和商业密码,与国际接轨的部分主要是商业密码类。密码法规定,要大力发展密码科技,以法定形式保护密码相关的知识产权!密码法还规定,商业密码将向国际开放,包括积极参与并执行国际密码标准,中国商业密码产业向全球公司开放。为保障密码安全和规范密码行为,国家将同时建立一套有效的测评机制。
Page 4: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Groups of Quantum Key Distribution

Quantum SecurityCryptography in China

PQC

QKD

………Prof. Xiang’s Report

Prof. Guo and Han’s Group in University of Science and Technology of China (USTC)Company ---Anhui Qasky Quantum Technology Co. Ltd.

Prof. Pan’s group-- in USTCCompany: Quantum CTek Co., Ltd.)

Hong Guo’s group—Peking University

Prof. Zen’s group– Shanghai Jiao Tong UniversityShanghai Xuntai Information Technology C.o. Ltd.

Many other group in University and Institute

Presenter
Presentation Notes
中国的量子安全密码分为两类,第一类是PQC,这部分内容将由重庆大学的向宏教授报告,我们这里不再赘述。我主要介绍量子密码和量子计算在2019年度的主要变化和成果。 中国有很多课题组从事量子密码技术的研究,其中最主要的课题组包括:郭光灿教授和我的共同课题组,课题组与“安徽问天量子科技股份有限公司”(简称 Qasky)合作产业化! 中国的第二个量子密码课题是潘建伟教授课题组,他们也有一家公司称为:科大国盾量子科技股份有限公司。这两个课题组都隶属中国科学技术大学; 上海交通大学曾贵华教授课题组(关联公司:循态量子科技有限公司)和北京大学的郭弘课题组主要从事连续变量量子密钥分配(CV-QKD)研究。
Page 5: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

4

CONTENTS

2

3

Progress of Quantum Cryptography in China

Progress of Quantum Computer in China

1 Background on Quantum Information in China

Progress of Quantum Cryptography Standards in China

5

Presenter
Presentation Notes
I will discuss about the follow four parts !
Page 6: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

6

1、 Laser Injection to Attack MDI-QKD

Prof. Xian ming Jin’ sGroup from Shang hai Jiao Tong University

For Polarization code MDI System, can get 60% with fewer fingerprint

arXiv:1902.10423 (2019).

Presenter
Presentation Notes
今年6月初,上海交通大学的金贤敏教授在中国引起了渲染大波,有记者报道其“彻底攻破量子密钥分配”,研究后发现,这篇文章出自ARXIV上的一篇尚未发表的文章。事实上,该文章是对偏振编码系统的发送端激光器,注入弱激光来控制输出激光的偏振,从而达到控制ALICE端信号态的目的。该文章给出的最佳攻击效率能达到60%左右。值得注意的是,这种攻击对测量无设备关量子密钥分配(MDI-QKD)也是有效的。
Page 7: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

With blinding light Without blinding lightCW blinding , thermal blinding, sinkholeblinding ……

after-gate attack, faint-after-gate attack, detector-control attack under specific laser damage, ATR attack

2、Defences of detector control attack

Steal almost all keys just by introducing few errors

Fingerprint:High photocurrent causing by blinding light

Without strong blinding light

more concealed and threatening

few errors; fail to monitoring illumination, afterpulse, photocurrent

Prof. Guo from USTC Prof. Han from USTC

Presenter
Presentation Notes
针对QKD接收端探测器的攻击,是当前量子密钥分配最典型、也是最难防御的一类攻击,例如MAKAROV致盲攻击、after-gate attack 和 faint-after-gate attack etc.这类攻击,有时会留下指纹信息,例如上述第一种,有些不会留下明显的指纹信息,例如后两种。其中后面两种弱指纹或者无指纹的攻击更具有危险性,更难防御。
Page 8: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Countermeasure Model – variable attenuation SPD

VA-SPD modelAlice sends quantum states

Bob measure

Basis alignment

generate key

The attenuation value of VA in each VA-SPD is randomly set to 0 dB or 3 dB

judgment

The criterion(1)

(2)

Eqs. (1) and (2) cannot besatisfied simultaneously ifthe system was hacked bythe detector-control attack.

Optica, 6, 1178-1184 (2019)

Presenter
Presentation Notes
我们提出一种防御模型—可变衰减探测器模型,抵御探测器控制攻击。其核心思想是在单光子探测器前添加一个可以随机调制衰减(0/3dB)的可变衰减,检测两种衰减时的计数率和误码率,可以发现系统是否受到攻击,我们给出了完整的理论证明。
Page 9: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Optica, 6, 1178-1184 (2019)

without blinding lightwith blinding light

fingerprint!( by blinding light)

VA changes, a signal will be generated

one or more clicks50% error bit

It is independent of the technical details of the detector, and can be easily applied to existing QKD systems.

far from the secure regionin detector control attack

Presenter
Presentation Notes
实验演示出明显的攻击判据,特别是对于激光致盲类的攻击!如果是带致盲光的探测器控制攻击,在可变衰减探测器模型下会引入很明显的指纹,致盲光引入的计数会50%概率产生误码)。事实上,对系统改动较小,可以直接应用于实际的量子密钥分配系统中。
Page 10: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Long distance applications are necessary in China .

Key rate is severely depressed in case of long distance.

Nat. Commun. 8, 15043 (2017)

3、Towards long-distance QKD

Prof. guo & Han’group!

Presenter
Presentation Notes
在中国,尤其是中国西北地区,跨越数百公里没有可用的可信中继点,这对中国全境建立量子密钥分配网络是一个巨大的挑战,因此,超远距离安全量子密钥分配成为关键问题之一,2017年,东芝剑桥研究所的袁之良等人提出了一种双激光场协议,这种协议,可以突破光纤的指数衰减规律,从而实现超远距离的量子密钥分配。可是,这种密钥分配协议技术实现具有相当的难度,我们课题组,突破了远程激光器间的锁定技术,成功在标准通信光纤中实现了300公里量子密钥分配,同时密钥率可达2kbps,这个密钥率水平可以满足多数应用场合的需求。
Page 11: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Source:OPLL+negative feedback o generate the twin fields;

Channel:Reference part is time multiplexed with quantum part to compensatethe fast phase drift over long fibers .

Our approach to implement TF-QKD

Phys. Rev. X 9, 021046 (2019)

3、Towards long-distance QKD

Presenter
Presentation Notes
下一步工作的方向
Page 12: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Standard single-mode fibers (ITU-G. 652D) witha loss coefficient of about 0.18 dB/km are used;

The overall loss of Charlie’s devices isapproximately 5.16 dB (including loss of PM andefficiency of SSPD);

The secret key rate overwhelms PLOB bound at adistance of 300 km.

The key rate (∼2.01 kbps) significantly surpassthe state-of-the-art QKD experiment with thesame channel loss (53.3 dB).

Phys. Rev. X 9, 021046 (2019)

3、Towards long-distance QKD

Presenter
Presentation Notes
我们实现里300公里时的有效密钥分发,而且分发速率可以达到2kbps,这对相当多应用场合,码率基本上够用了。
Page 13: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

4、Towards long-distance QKD

arXiv preprint arXiv:1910.07823 (2019)

Prof. Pan’ sGroup

Page 14: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

4、Towards long-distance QKD

arXiv preprint arXiv:1910.07823 (2019)Normal SMF: R=1.79x10-8 @350kmSuper low loss fiber : R=6.34x10-6@509km

Prof. Pan’ sGroup

Presenter
Presentation Notes
潘建伟教授课题组同样努力在实现更远距离的双激光场qkd演示,他们利用了清华大学王向斌教授改进后的双场协议,在ARXIV上贴出的最新结果是:超低损耗光纤中的有效传输距离达到创记录的509公里,不过他们的有效码率有几个量级的降低。
Page 15: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

15

5、Field Test of CV- QKD

Prof. Guo Hong’ sGroup

Underground Fiber, Guang Zhou City @50Km

Presenter
Presentation Notes
在中国,至少有5个以上的连续变量量子密钥分配研究组,北京大学的郭弘课题组是最具代表性的课题组之一,他们在过去工作的基础上,今年连续完成了多个现场地下光缆的连续变量QKD的测试与演示。上图是其在广州的演示,其单传输距离接近50公里;下图是其在山东青岛的测试演示实验,其总传输距离超过了70公里,单传密钥率超过10kbps.
Page 16: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

16

5、Field Test of CV- QKD

Prof. Guo Hong’ sGroup

Underground Fiber, Qing Dao City Key Rate >10kbps@70Km

Page 17: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

4

CONTENTS

2

3

Progress of Quantum Cryptography in China

Progress of Quantum Computer in China

1 Background on Quantum Information in China

Progress of Quantum Cryptography Standards in China

17

Presenter
Presentation Notes
I will discuss about the follow four parts !
Page 18: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Cryptography Standardization Technical

Committee (CSTC)

Relationships of Cryptography Standardization Technical Committee

Cryptography Standardization Technical Committee :

Responsibilities for the standardization of cryptographic technology, product, system management, etc.

18

Prof. Han from USTC

Presenter
Presentation Notes
上图是中国密码标准管理结构图,2011年设立了QKD 工作组,安徽问天量子是牵头单位,我作为工作组组长。 two administrations related to the QKD standards, one is “standardization administration of P. R. China”, the other one is office of state commercial cryptography administration. Directed by such two administrations, we have “cryptography standardization technical committee ”, the committee has four standing workshops, namely “system design workgroup” “theory workgroup” “application workgroup” and “evaluation and validation workshop”. under the “theory workshop”, we have found a QKD WORKSHOP IN 2012
Page 19: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Members of the committee of QKD

Many interest committee, such as communication companies, energy industries, finance and government agents, participated in the standardization of quantum secure communication.

Lead by Anhui Qasky Quantum Technology Co. Ltd.

Presenter
Presentation Notes
Till now, we have draw more than 29 universities and IT companies to join us, three national related associations and committee became the member of the QKD standards workgroup.
Page 20: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

2017Beijing

2015Langfang

2016Beijing2018Suzhou

Standardization of Quantum Cryptography

Seminars of Quantum Cryptography Standards

Presenter
Presentation Notes
From 2015, we convoke at least two seminars each year, till now, we have organized more than 10 meetings to discuss about the QKD standards!
Page 21: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Standardization of Quantum Cryptography

Technology of quantum key applicationDevice requirements of

key application Quantum VPN Quantum encrypter ……

Requirements of system and application

Business requirements andapplication scenario

Network architecture Network operation management

Technology requirements of key application

Key application interface

……

Technology of quantum key management and device management Technology requirements

of key management Key management Key relay Key service interface ……

Technology requirements ofdevice management

Device management interface Device communication protocol ……

Working Contents

Presenter
Presentation Notes
Up to today , we have finished the QKD Standards workshop in three fields, such as the “key application interface, namely how to connect with other facility!
Page 22: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Standardization of Quantum Cryptography

Technology of quantum key distribution Requirements of QKD

protocol Decoy BB84 protocol Continuous variable protocol ……

Technical requirements of quantum channel

Quantum repeater Routing and exchange Channel multiplexing

Technical requirements of quantum security

Security of QKD Security of component

and device Security of interface

Test technology of quantum cryptography Protocol test

……

Performance test

……

Security test

……

Working Contents

Presenter
Presentation Notes
这是测试标准的一部分。
Page 23: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Introduction on Quantum Cryptography Standards

Decoy BB84 Quantum Key Distribution Test Specification

Specified the test purpose, environment configuration, process and judgment of the decoy BB84 QKD protocol. Described the testing requirements and methods of the products function, performance, hardware, software and safety management.

Decoy BB84 Quantum Key Distribution Technology Specification

Described the procedure of the decoy BB84 quantum QKD protocol. Specified the security indicators of each stage, and the technical requirements of the product functions, performance and management.

Presenter
Presentation Notes
目前,我们进入标准制定阶段的有两项:即:量子密钥分配的技术标准,和量子密钥分配设备的安全性测试标准.其他标准部分都在研究当中。
Page 24: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

A first versions of the “Decoy BB84 Quantum Key

Distribution Test Specification”has been formed, is

calling for public comments.

Introduction on Quantum Cryptography Standards

A draft of the “Decoy BB84 Quantum Key

Distribution Technology Specification”has finalized

and waiting for authorized

Presenter
Presentation Notes
到目前为止,我们的量子密钥分配的技术标准已经征集、整理、初步制定完成,并完成了全国性的意见征集和修订工作,正在等待国际标准部门的审核批准。 而量子密钥分配设备的测试标准,也已经完成征集、整理和初稿,目前已经向社会公开征集意见之中。
Page 25: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

4

CONTENTS

2

3

Progress of Quantum Cryptography in China

Progress of Quantum Computer in China

1 Background on Quantum Information in China

Progress of Quantum Cryptography Standards in China

25

Presenter
Presentation Notes
I will discuss about the follow four parts !
Page 26: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

KF C6-130

Superconductor Six Q-bits Chip

High fidelity Logic Gate

(99.7%)

XW S2-200

Two Spin Q-bits Chip on Silicon

High Coherence High speed control

HeFei Origin Quantum Computing Technology co., LTD

Prof. G-c GuoProf. G-p Guo

Presenter
Presentation Notes
中国的量子计算研究课题组不少于10个,但其中最大的三个组分别是郭光灿和郭国平教授的课题组、潘建伟课题组、南京大学于洋课题组和浙江大学王浩华课题组。公司层面,从事量子计算硬件研究的公司,只有三年前成立的本源量子一家。目前,他们已经拥有6比特的超导量子芯片,其保真度可以达到99.7%,原则上可以对社会开放编程测试;同时他们还有2量子比特的硅基量子芯片,其相干特性和高速控制问题也有了大幅度的提升。
Page 27: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

One key setting all Measurement and Control system of all channels and parameters Four one-key testing process of quantum chipsParameter loop and traversal functionCustom waveform editing and import functionsSequence setting functionUser defined channel groupingSystem real-time monitoring

Measurement and control module

Presenter
Presentation Notes
这是他们的量子芯片的测量和控制模块,目前已达到可向同行少量供货的水平。
Page 28: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Virtual Quantum Computing EmuWave

Open and Free for 32 bitsCharge for more than 64 bits

Virtual Quantum Computing more than 200 bits

Presenter
Presentation Notes
另外,他们的量子模拟系统EmuWave也已经上线,32比特以下已经免费向社会开放,64比特以上需要收费,总的模拟比特数已经超过200比特。
Page 29: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Quantum Chemical Computing—ChemiQ

The first quantum application software Molecular rendering, automatic

calculation functionFunction configuration + result

displayDeveloped on QPanda and VQNet

Page 30: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Genuine 12-Qubit Entanglement on a Superconducting Quantum Processor

Phys. Rev. Lett. 122, 110501 (2019)By Janwei Pan’s Group

A high quality 12-bit one-dimensional chain superconducting bit chip wasdesigned and processed, and the parallel logic gate operation was adoptedto avoid the crosstalk between the bits, and the thermal cycle operation wasused to remove the influence of the unnecessary two-level system on thebit performance. The true entanglement of 12 superconducting bits wasfirst prepared and verified, with the fidelity up to 70%!

Presenter
Presentation Notes
潘建伟团在这一年内,实现了12比特的纠缠链,保真度可以达到70%以上。
Page 31: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Propagation and Localization of Collective Excitationson a 24-Qubit Superconducting Processor

With 24 bits superconducting quantum processor, They developed aquantum multi-body system dynamics simulation. On the superconductingquantum chip, they simulated Bose - Hubbard ladder model, observed thedifference dynamics process between single excitation and doubleexcitation.

Science 364, 753 (2019)

By Janwei Pan’s Group

Presenter
Presentation Notes
今年,他们课题组利用24比特的超导量子处理器,首次模拟了BOSE-Hubbard梯子模型,观察到完全不同的单激发和双激发的差异,证实了量子计算的超越经典计算的能力。
Page 32: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

Quantum computation with universal errormitigation on a superconducting quantum processor

SCIENCE ADVANCES 2019;5: eaaw5686Hao-hua Wang’s Group

Zhe jiang University

Medium-scale quantum devices that integrate about hundreds of physical qubits are likely to be developed inthe near future. However, these devices will lack the resources for realizing quantum fault tolerance. Therefore,The main challenge of exploring the advantage of quantum computation is to minimize the impact of device andcontrol imperfections without complete logical encoding. Quantum error mitigation is a solution satisfying therequirement. Here, we demonstrate an error mitigation protocol based on gate set tomography and quasiprobability decomposition. One- and two-qubit circuits are tested on a superconducting device, andcomputation errors are successfully suppressed. Because this protocol is universal for digital quantumcomputers and algorithms computing expected values, our results suggest that error mitigation can be anessential component of near-future quantum computation.

Presenter
Presentation Notes
浙江大学王浩华课题组,今年内完成了一种新的量子纠错方案,由于量子芯片的研制难度太大,相当长一段时间只能得到不完美的量子芯片,因此,容错能力在最近几年内的量子计算机研制中,具有非常重要的价值。
Page 33: Quantum Cryptography & Computing in China...Quantum Cryptography & Computing in China Zheng-fu Han University of Science and Technology of China November 6, 2019 Good morning everyone,

E-mail: [email protected] Tel: +86 0551-63607342

T H A N K S

33

Presenter
Presentation Notes
谢谢各位的聆听!上述观点仅代表韩正甫的个人观点!