Architecture for Reconfigurable Quantum Key Distribution Networks Based on Entangled Photons Directed by a Wavelength Selective Switch

ABSTRACT

A system and method for securing communications between a plurality of users communicating over an optical network. The system utilizes a fixed or tunable source optical generator to generate entangled photon pairs, distribute the photons and establish a key exchange between users. The distribution of entangled photon pairs is implemented via at least one wavelength selective switch.

This application is a continuation of U.S. patent application Ser. No. 14/282,150 filed May 20, 2014, which is a continuation of U.S. patent application Ser. No. 13/644,545 filed Oct. 4, 2012 and issued as U.S. Pat. No. 8,861,735 on Oct. 14, 2014, which is a continuation of U.S. patent application Ser. No. 12/008,926 filed Jan. 15, 2008 and issued as U.S. Pat. No. 8,311,221 on Nov. 13, 2012 the disclosures of which are herein incorporated by reference in their entirety.

FIELD OF THE INVENTION

The present invention relates generally to message security across optical networks through methods of encryption, and more particularly, to an approach for reconfigurable multi-user quantum key distribution (QKD) networks based on the Eckert QKD protocol. Distribution of entangled photons, which controls QKD connections, is determined utilizing a Wavelength Selective Routing Device.

BACKGROUND OF THE INVENTION

Wavelength-division multiplexing (WDM) in optical networking has been employed in core networks for over a decade. WDM technology enables signals of multiple wavelengths to be concurrently transmitted over a given optical medium. This has been facilitated by the availability of wideband optical amplifiers that can simultaneously amplify many different wavelengths without distortion. The advantages provided by WDM translate into greater fiber utilization, lower capital expenditures associated with fiber deployment, and reduced costs in repeater stations by eliminating the need to terminate each wavelength along the fiber path. To maximize economic utility, the wavelength density that can be multiplexed onto a given fiber has increased in recent years: 80-wavelength systems are now common in the EDFA band, with 50 GHz frequency spacings between channels in many offerings.

Tunable unidirectional wavelength multiplexers and demultiplexers for adding and dropping a wavelength channel to and from a transmission system with a node are known in the art. It is also known that these tunable multiplexers may comprise wavelength-selective switches (WSSs) on the multiplexer side to multiplex a plurality of wavelength channels that are being added to the optical transmission system. Tunable filters or an additional WSS can be utilized to demultiplex wavelength channels that are dropped from the optical transmission system to the local terminal. WSSs are commercially available devices that dynamically route signals from the input port(s) to the output port(s) based on the wavelength of the signal, in response to control signals that set the WSS's connection state. In unidirectional multiplexers and demultiplexers, separate optical components are used to multiplex and demultiplex the signals.

Quantum Key Distribution and Networking—Message security is a critical concern in today's communication networks. Such security is usually provided through cryptography, a process in which message data is convolved with a known key to produce an encrypted message. The level of security varies with the algorithm and the key length, but security can always be improved by changing keys more frequently. In fact, the only provably secure encryption is the one-time pad, in which there is one key bit per message bit, and keys are never reused. For any encryption method, the security of the message is based on the privacy of the keys. Even the one-time pad can be broken if the keys are known to an eavesdropper. Thus, secure key distribution is the foundation of any encryption system. The classic method of key distribution is to generate keys at one site, record them on a physical medium, then transfer them via human courier to both ends of an encrypted message link Quantum Key Distribution (QKD) removes the risks associated with courier distribution, enabling collaborative generation of secure keys at the endpoints where they are needed. Security of the process against eavesdropping is guaranteed by the no-cloning theorem, when operating in the single-quantum regime. Classic QKD algorithms, such as the BB84 protocol (Bennett and Brassard, 1984) are designed for point-to-point operation between two sites connected by a dedicated optical link. For a community of K users interconnected by optical fibers, K*(K−1) fiber pairs would be needed. Our new approaches offer a much more efficient, fiber-lean, solution for full connectivity. They also provide for dynamic sharing of the QKD bandwidth, allowing rapid expansion or contraction of the QKD rate at individual sites on an on-demand basis.

Quantum Entanglement—Quantum entanglement is a phenomenon relating the quantum states of two or more objects even when these objects are spatially separated. This phenomenon manifests itself in correlation between measurable physical properties of the entangled objects. The simplest example is a pair of polarization-entangled photons. A photon can have either vertical or horizontal polarization. For two entangled photons the polarization of each is uncertain. However, when these photons are sent to distant observers Alice and Bob, polarization measurements performed by them are correlated. That is if Alice observes a vertical polarization for her photon, Bob's photon will have a horizontal polarization or vice versa. While Alice's result is random (she does not know a priori whether her photon is horizontally or vertically polarized), polarization measurements performed by Bob always produce a result correlated with that of Alice. If a sequential stream of entangled photons is delivered to Alice and Bob, such correlation allows them to form a truly random sequence of zeros and ones that could serve as a cryptographic key for secured communication (Eckert 1991). To maximize the generation rate of secure keys, exchange of measurement data between Alice and Bob is typically performed through a classical communication channel, which may be public. The QKD protocols are constructed in such a way that an eavesdropper on the public channel cannot reconstruct the secure keys. Thus, the quantum part of an entanglement-based QKD system may be made up of unidirectional fibers and components that distribute entangled photons. The (bidirectional) classical channel needed to complete the QKD system can be provided by any of the standard systems known in the art, and it is not discussed below.

Creation of the entangled photons for telecom applications—The entangled photon pairs may be created by one of a variety of processes in which a photon from a source laser interacts with a nonlinear medium (which could be a special fiber or a waveguide structure), such as the parametric downconversion (PDC) process. In this PDC process, a primary source photon with a frequency ω₀ is annihilated in this process and a pair of entangled photons with frequencies ω₁ and ω₂ is created. In fact, each of the entangled photons occupies a relatively broad optical spectrum of the width BPDC centered at ω₁ and ω₂. Conservation of energy requires that the sum of the ω₁ and ω₂ is equal to ω₀. BPDC could be up to few tens of nm wide (20-40 nm). Such a spectral width makes the photons unsuitable for communication through optical fibers due to deleterious effects of chromatic dispersion. Thus, the photons are filtered, which reduces their bandwidth to about BF˜1 nm (or 125 GHz). To preserve the entanglement, the filters' center frequencies ω_(F1) and ω_(F2) must add up to ω₀. That is, the entangled photons are equally spaced above and below the frequency of the primary source photon. One way to provide the needed filtering is the use of a wavelength demultiplexer (WDM). An entangled pair enters the WDM through a common port, one photon leaves through a port A (centered around ω_(A)) to a fiber leading to Alice, and, in a similar fashion, the second photon is directed to Bob through port B (centered around ω_(B)), where ω_(A)+ω_(B)=ω₀. If another nonlinear process is used instead of PDC, the mathematical relation between the primary source frequency and the frequencies of the entangled photons may differ from that specified above, but a known mathematical relation will exist and the present invention can be used to establish QKD connection topology.

SUMMARY OF THE INVENTION

In accordance with a first aspect of the invention, there is disclosed a methodology for securing communications between a plurality of users communicating over an optical network. The method generally comprises the steps of: generating entangled photon pairs with known frequency relationships, distributing entangled photon pairs among individual users via a reconfigurable wavelength routing device, and establishing a key exchange between the individual users using the entangled photons distributed to the individual users.

In accordance with another aspect of the invention, there is disclosed a system for securing communications between a plurality of users communicating over an optical network. The inventive system comprises: a source adapted for generating entangled photon pairs with known frequency relationships, and a reconfigurable wavelength routing device communicating with the optical source for establishing a key exchange between the individual users using entangled photon pairs.

In accordance with yet another aspect of the invention, there is disclosed a memory medium containing machine readable instructions which, when executed by a processor, enable a device to secure communications between a plurality of users communicating over an optical network by generating entangled photon pairs at a plurality of frequencies from a primary optical source, distributing the entangled photons pairs to the users via a reconfigurable wavelength routing device, according to the frequency of the entangled photons; and establishing a key exchange between users using the entangled photon pairs.

These aspects of the invention and further advantages thereof will become apparent to those skilled in the art as the present invention is described with particular reference to the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic of an illustrative embodiment in accordance with an aspect of the present invention, depicting a network architecture wherein communications between users on a WSS network are secured via a Quantum Key Distribution using a fixed laser source.

DETAILED DESCRIPTION OF THE INVENTION

Embodiments of the invention will be described with reference to the accompanying drawing figures wherein like numbers represent like elements throughout. Before embodiments of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of the examples set forth in the following description or illustrated in the figures. The invention is capable of other embodiments and of being practiced or carried out in a variety of applications and in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. The use of “including,” “comprising,” or “having” and variations thereof herein is meant to encompass the items listed thereafter and equivalents thereof as well as additional items.

Referring to FIG. 1 there is depicted an embodiment of the invention which utilizes a fixed source laser (also known as a fixed pump laser) 100 in combination with a Wave Selective Switch (WSS) 102, the WSS comprising a single port (I₁) disposed on one side of the WSS 102 and a multiplicity (K) of ports (P₁, P₂, . . . P_(K)) on the opposite side of the WSS 102. In this expedient, the WSS 102 divides a broadband input signal into N frequency bands (typically about 100 GHz in width), each centered at a frequency ω_(i), and routes the individual demultiplexed signals to output ports P₁, P₂, . . . P_(K). These individual bands are commonly referred to as “channels”. It will be appreciated by those skilled in the art that the WSS 102 is operable to route a signal from any input port to any output port. A given output port may simultaneously carry multiple channels, up to and including a full spectrum of channels carried on a broadband signal input to the WSS 102. It will be further appreciated that a WSS 102 may provide additional capabilities, such as multicasting operations. In this regard, a signal from a given input channel can be distributed among multiple output ports. Thus, the WSS 102 depicted in FIG. 1 can be employed to deliver entangled photon pairs to a plurality of users. In the example shown and described herein, K users U₁ . . . U_(K) are individually coupled by optical fibers 106 ₁-106 _(K) to output ports P₁-P_(K) of WSS 102. In this case, the source laser frequency is set to the middle of the WSS 102 band: ω₀=ω₁+ω_(N). In order to deliver the entangled photon pairs to any pair of users {U_(i), U_(j)}, complementary frequency channels m and n (ω₀=ω_(m)+ω_(n)) may be routed to ports P_(i) and P_(j), respectively. It will be appreciated by those of ordinary skill, that full connectivity can be achieved with a minimal number of fibers (i.e., K fibers for K endpoints). This has the potential to confer a dramatic improvement in network scalability as compared to the conventional fixed, point-to-point arrangement discussed in the foregoing. The WWS 102 further permits various combinations of connections to be concurrently set up and established. For example, channels ω₁ and ω₂ can be routed to U₁, while channel ω_(N) is routed to U₂ and ω_(N-1) is routed to U₃, where ω₀=ω₁+ω_(N) and ω₀=ω₂+ω_(N-1). In this manner, the following pairs of users {U₁, U₂} and {U₁, U₃} will receive the entangled pairs. It is unnecessary for each pair of users to obtain an entangled pair in each clock cycle, thus only each QKD connection requires an adequate supply of entangled photon pairs. It is also possible to set up multiple connections between a given pair of endpoints if their demand for QKD bandwidth is greater than the demand that can be supported by a single channel. In fact, due to its non-blocking switch capability, the WSS can distribute the available QKD channels in any arbitrary pattern that may be desired, and reconfigure them as needed. If there is a need to support more than K end users, WSS units may be cascaded to provide as many output ports as desired. In particular, the network may support more endpoints than there are wavelength channels (K>N), simply by scheduling the connection times and durations.

The foregoing detailed description is to be understood as being in every respect illustrative and exemplary, but not restrictive, and the scope of the invention disclosed herein is not to be determined from the description of the invention, but rather from the claims as interpreted according to the full breadth permitted by the patent laws. It is to be understood that various modifications will be implemented by those skilled in the art, without departing from the scope and spirit of the invention. 

We claim:
 1. A method comprising: receiving a first plurality of photons during a scheduled duration period, each photon of the first plurality of photons comprising one photon of a pair of entangled photons; generating an encryption key based on the first plurality of photons; and encrypting a message using the encryption key to generate an encrypted message capable of decryption using a decryption key generated based on a second plurality of photons, each photon of the second plurality of photons comprising a respective other photon of the pair of entangled photons.
 2. The method of claim 1, wherein the pair of entangled photons has a known frequency relationship.
 3. The method of claim 2, wherein each of the first plurality of photons has one of a vertical polarization and a horizontal polarization.
 4. The method of claim 3, wherein the generating the encryption key is based on a polarization of each of the first plurality of photons.
 5. The method of claim 1, further comprising: transmitting the encrypted message to a recipient, wherein the decryption key is associated with the recipient.
 6. The method of claim 1, wherein the scheduled duration period comprises a scheduled connection time and a scheduled duration, the scheduled connection time and the scheduled duration based on establishing a minimal number of transmission connections.
 7. The method of claim 6, wherein the scheduled connection time and the scheduled duration allow a number of endpoints to receive a plurality of photons when the number of endpoints exceeds a number of wavelength channels for transmission of the plurality of photons.
 8. The method of claim 1, wherein the entangled photons are generated by degenerate four-wave mixing.
 9. The method of claim 1, wherein the entangled photons are generated by parametric down-conversion.
 10. The method of claim 1, wherein the entangled photons are centered at an optical source frequency.
 11. A method comprising: receiving a first plurality of photons during a scheduled duration period, each photon of the first plurality of photons comprising one photon of a pair of entangled photons; generating a decryption key based on the first plurality of photons; and decrypting an encrypted message using the decryption key to generate a decrypted message, wherein the encrypted message is encrypted using an encryption key generated based on a second plurality photons, each photon of the second plurality of photons comprising a respective other photon of the pair of entangled photons.
 12. The method of claim 11, wherein the pair of entangled photons has a known frequency relationship.
 13. The method of claim 12, wherein each of the first plurality of photons has one of a vertical polarization and a horizontal polarization.
 14. The method of claim 13, wherein the generating the decryption key is based on a polarization of each of the first plurality of photons.
 15. The method of claim 11, further comprising: receiving the encrypted message from a sender, wherein the encryption key is associated with the sender.
 16. The method of claim 11, wherein the scheduled duration period comprises a scheduled connection time and a scheduled duration, the scheduled connection time and the scheduled duration based on establishing a minimal number of transmission connections.
 17. The method of claim 16, wherein the scheduled connection time and the scheduled duration allow a number of endpoints to receive a plurality of photons when the number of endpoints exceeds a number of wavelength channels for transmission of the plurality of photons.
 18. The method of claim 11, wherein the entangled photons are generated by degenerate four-wave mixing.
 19. The method of claim 11, wherein the entangled photons are generated by parametric down-conversion.
 20. The method of claim 11, wherein the entangled photons are centered at an optical source frequency. 