Introduction
Quantum communication and cryptography are to realize communications with higher capacity than the Shannon limit [1] and unbreakable security, which cannot be possible with conventional technologies. Pursuing high capacity in optical communications, one has recently reached the quantum-limited regime where the signals are densely packed in the phase space so that quantum indistinguishability of the signal states becomes a matter [2]. Further improvement to increase the rate in bits/s/Hz/photon requires quantum engineering [3]–[6]. This is also important in optical space data links where no amplifiers can be used through a long distance transmission [7]. Quantum communication is expected eventually to achieve the ultimate channel capacity of such optical links [8]–[11]. The fact disclosed recently that fibers were actually tapped over a long time by intelligence agencies these decades has convinced one that physical layer security is an urgent concern. Even without such an active attack, information often leaks between fibers in the same cable through the fiber cross-talk phenomenon, especially at parts where the cable is bent [12]. Quantum cryptography, or more specifically quantum key distribution (QKD) [13], attracts more attention in this respect. QKD has been deployed in many field links and networks [14] –[20]. In addition, it has already been successfully commercialized and found practical use cases [21]. New generation GHz-clocked QKD systems have been deployed in the field network, demonstrating their reliable operations [16], [18]–[20]. The maximum key generation rate at present is something around 100 kb/s over a 50 km installed fiber. This performance, however, still falls short of the level for practical deployment in wide area public infrastructures.
Increasing the capacity and ensuring the security are generally competing tasks. The speed and distance limits of
QKD are the price for realizing the unconditional security. For example, an expected key rate at
In a new network paradigm, various QKD schemes, physical layer cryptography, algorithmic cryptography and optical/quantum communications are integrated in an inter-operable manner, depending on user needs and allowed costs. Such a paradigm unifying quantum communication and cryptography with conventional optical communication and cryptography may be referred to as quantum photonic network. This emerging platform is to integrate QKD for the highest security, quantum communication for power-minimum maximum-capacity communications, and a new scheme of physical layer cryptography which merges the merits of these two to realize the secrecy capacity with the provable security into a network, so that the whole network can provide best solutions for various kinds of use cases.
In this paper, we first present the updated Tokyo QKD Network, consisting of novel QKD systems, and key management systems supporting variety of applications. We next mention a next generation entanglement-QKD system and related technologies. We then present a basic theory of physical layer cryptography which characterizes the secrecy capacity, and engineers the tradeoff between the efficiency of reliable transmission and secrecy of communication. We finally discuss future issues for realizing quantum photonic network.
Quantum Photonic Network
Photonic network is an emerging infrastructure of optical communications. It specifically means the IP over optical path network. Its structure is depicted in Fig. 1. The optical path network is at the physical layer (Layer 1), and is made as transparent as possible based on all optical processing nodes (photonic nodes), instead of conventional nodes of electrical processing. It is to utilize broadband of optical fields and to resolve the speed limit and heating of electrical devices. Actually broadband optical transmission is realized by wavelength division multiplexing (WDM) in a fiber. Networking and routing are carried out by all optical processing with wavelength switching, which is performed by the optical cross-connects (OXCs). The OXCs are directly connected to IP routers at the network layer (Layer 3) to set up a desired optical path. Routing, signaling, and link management at Layer 3 are supported by the generalized multi-protocol label switching in the control plane, which is implemented in out-of-band channels in optical fibers or sometimes over a dedicated control network. In this way, transparent optical links are formed in a flexible manner at Layer 1. The optical transparency is also the prerequisite for making a QKD link. If the photonic nodes could be employed in a QKD network, then flexible direct QKD connectivity can be realized. Unfortunately, however, current QKD performances are not sufficient for extending a distance through lossy photonic nodes.
Networking and extending the range of QKD must rely on the key relay via the trusted nodes at present. Security of the nodes should be protected classically. This means that there must be the same security loopholes in a QKD network as a classical one. In spite of this fact, the trusted-node-based QKD network is worth being developed as a practical network solution. One of new values added by QKD is the interconnectivity of crypto systems, thanks to the simplest encryption/decryption by XOR operation between a plain/cipher text and a key. This point should be contrasted to conventional algorithmic schemes. Their high-end solutions are specifically designed organization by organization, and their specifications are usually not disclosed. This makes it very hard to interconnect the systems of different organizations in a seamless secure link. The QKD network can solve this problem if the keys and their identifications could be properly managed in the trusted nodes.
We may call such a solution QKD platform, which integrate QKD network with a smart key management system and application interfaces (APIs) to support variety of applications. The point of interface is defined at the API of the QKD platform. Users will be able to request keys for their applications, and receive them from the QKD platform. Once supplied, the users are in charge of management and uses at the keys. The key management server in the QKD platform stores all the necessary information on the keys, including generation dates, supplying dates, key sizes, user ID information etc. When any security incident would occur in a user system, the user can delete the keys in it and receive new keys from the QKD platform at a time. We are updating the Tokyo QKD network to a prototype of the QKD platform. The QKD platform will be introduced to photonic network to enhance its security at each layer, whose concept, secure photonic network [25], is summarized in Fig. 1.
It is a never-ending task in any practical security technologies to find security loopholes and side-channels, and to implement countermeasures. QKD itself is not an exception. Actucally, several side-channels of QKD components have been identified, and their countermeasures have been developed [26]– [32]. On the other hand, some approaches have been proposed to remove side-channels by using a self-testing mechanism based on quantum effects, namely the entanglement and indistiguishable interference of photons. These schemes are device-independent (DI)-QKD [33] and measurement-device-independent-QKD [34]. They provide not only a new notion to combat the side-channel problem of crypto-technology, but also a basic protocol for fully quantum networking. In particular, DI-QKD based on the entanglement is essentially an elementary link in the quantum repeater network paradigm. These new schemes are, however, far from practical deployment yet. Some scalable architectures proposed so far still seem to require new technological developments. Therefore researches in this direction is still in fundamental research phase.
The schemes mentioned above can be categorized in a rough diagram of the security versus the usability as in Fig. 2. The usability means speed, distance, inverse of cost, and so on. One-way QKD such as BB84, and entanglement-based QKD are in a higher security side, but the key rate is much lower than the standard rates of optical communication, and hence the usability is not so high. Photonic network is in a wider usability side, realizing broadband and long distance transmission. Its security is based on algorithmic cryptography, which is implemented in Layer 3 or the upper layers. There is still a big gap between QKD and photonic network. This gap will not be filled merely by improving QKD technology itself as discussed in Introduction. Physical layer cryptography can be an intermediate scheme to fill this gap. Instead of weakening assumptions on the physical channel to an eavesdropper (Eve), one exploits higher transmission rate over a longer distance with the provable security, i.e., ITS. This would be valid and sensible in space laser communications, which are basically line-of-sight communications between the sender (Alice) and the receiver (Bob). Eve should be apart from this main channel, otherwise she can be visible for Alice and Bob. The details will be explained in Section IV.
Diagram to categolize main cryptographic schemes in terms of the security versus the usability.
Thus Fig. 2 includes all schemes we know for secure wire and wireless communications. Quantum photonic network means a platform to integrated them to provide best solutions for various kinds of use cases. Its practical architecture and implementation are an on-going challenge.
QKD and Related Technologies
A. Novel BB84-QKD System
Currently the four-state protocol originally proposed by Bennett and Brassard, called BB84
[22], is most widely implemented in the world. Its key rate and distance had
been improved rapidly until 2010, when GHz-clocked QKD systems were first deployed in a field environment
[16]. Key generation at around 100 kb/s over a 50 km installed fiber
became possible. Since then, however, further improvement of QKD performance has remained little. The main bottleneck
is the performance limits of single photon detection. The maximum count rate is roughly a few hundred mega counts per
sec (cps) for both avalanche photodiode (APD) and superconducting nanowire single photon detector (SSPD). APDs are
usually operated in the gated mode, whose gating speed is limited at about 1 GHz. So the clock rate of a fast QKD
system is also set at this rate. Dark counts (and after-pulses for APD) mainly limits the distance of successful key
generation, where the signal counts fall down at the dark count noise level. Dark count and after-pulse probabilities
for novel APDs for a gating period of 1 ns or less are
A reasonable option to increase the key generation rate is to use WDM for a QKD system
[35], [36]. We have developed a
GHz-clocked WDM-QKD system with maximally eight wavelength channels. The scheme is decoyed BB84 using time-bin
signals. The clock rate is 1.244 GHz. Fig. 3 shows a photo of this WDM-QKD
system. The WDM encoder and decoder structures are summarized in Fig. 4.
It provides a flexible solution to support a variety of applications including secure voice transmission and real-time
secure TV conferencing with one-time pad (OTP) encryption. We put this system with two-channel WDM to field test. The
two wavelengths were
A photo of the GHz-clocked WDM-QKD system. Alice's transmitter includes a laser source, a PLC time-bin encoder, eight mudulator units for the signal and decoy information, a multiplexer, a controller, and a key distillation engine. Bob's receiver consists of two 19-inch lacks. The right rack includes a PLC time-bin decoder, four demultiplexers, a photon detector unit containing four APDs, a controller, and a key distillation engine. The left rack include another photon detector unit. Thus in this photo, two-channel WDM is implemented.
WDM encoder and decoder structures. At Alice, optical pulses of 50-ps-width pass through a 2
The field fiber was 22 km in a loopback configuration between Koganei and Fuchu. The total loss is
12.6 dB. More than 95% of the channel is in an aerial fiber over poles. So it suffers from large
polarization drift, which is mainly influenced by the sunlight time. In order to perform QKD in such a severe
condition, we developed several stabilization techniques, as summarized in Fig. 4
. [37]. One is polarization independent decoder based on planar light
wave circuit (PLC). By carefully tuning the temperature, any polarization states can interfere properly at the output
port of the PLC decoder. The similar PLC is also used in the encoder, where the temperature is fixed at a certain
value, and photons passing through it are polarized. The PLC is connected to the WDM coupler and the modulators by
polarization maintaining fibers. The polarization is disturbed in the channel, but its drift is not a matter in our
decoder system. The other is feedback control to optimize temperature of the PLC encoder and decoder, bias voltage for
the modulators, and gating time for APDs, by using photon count rate and bit error rate. These techniques allow one to
realize stable high speed QKD for a long time, namely, quantum bit error rate (QBER) of 1.6% and key rate of
152 kb/s for the
We have also developed a compact demonstration model for single channel operation at 1.244 GHz, whose photo is shown in Fig. 5. The transmitter/receiver is enclosed in a half-height rack. The transmitter occupies even less than half a volume of it. A typical key rate is 100 kb/s at a distance of 60 km assuming a fiber loss rate of 0.2 dB/km.
B. Entanglement QKD
Now let us turn our attention to a next generation QKD, entanglement-based QKD scheme [38]. The entanglement-based QKD schemes require no random number sources because random selection of bases can be automatically done in a passive manner in the measurement process. This allows one a simpler implementation. The scheme is also less susceptible to side-channel attacks. When highly efficient photon detectors are employed, DI security can be ensured by setting a criterion of appropriate inequalities testing the degree of entanglement.
We are particularly develop a scheme based on a hybrid entanglement source, which generates entangled photons between two different degrees of freedoms, time-bin format for fiber transmission at a telecom wavelength and polarization format for free space transmission at a near-infrared wavelength. This hybrid entanglement source will allow one to make a quantum link between fiber and space channels. It will also be useful for storing and relaying quantum information encoded in telecom photons via atomic or electronic systems with resonance at a near-infrared wavelength.
The scheme is depicted in Fig. 6. A periodically poled lithium niobate
(PPLN) crystal pumped by continuous wave laser at 532 nm generates pairs of two photons in the two different
wavelengths, one at 1550 nm and the other at 810 nm, in the same polarization. They are separated by a
dichroic mirror. The pair correlation time is roughly 20 ps which was estimated from the spectral distribution of
down converted photons from PPLN, and specifies the temporal scale of photon wave packets. This is much shorter than
the detector time resolution of 400 ps. So the photons are correlated at each instantaneous time
Time-bin qubit is defined at Bob by his decoder, which is an asymmetric PLC interferometer. The long and short arms
make a time difference of
With these delay circuits, a photon is distributed in three time slots, centered at
\begin{equation}
\frac{1}{\sqrt{2}} \biggr \lbrace e^{i\theta (\tau)} {|H\rangle}_A {|1\rangle}_B + e^{i[\theta (t+\tau)-\theta
_1-\theta _2]} {|V\rangle}_A {|0\rangle}_B \biggl \rbrace
\end{equation}
We had performed a hybrid entanglement distribution experiment with the time-bin signal of 2.5 ns time
separation using Si APDs for Alice and InGaAs APDs for Bob [39]. The quantum
interference visibility of 95.8% and 88% with tolerance
We have recently extended the scheme to an entanglement QKD system based on the modified Ekert 91 protocol
[40]. The time separation was shortened to 800 ps. Alice's detectors
were extended from four APDs to six, comprising the measurement with three sets of polarization qubit basis whose
relative offset angles are
C. Efficient Photon Source
The distance and key rate of the entanglement-QKD are still poorer than one-way QKD like BB84. For improving the key
rate, more efficient photon sources are desired. We have developed the photon source based on type-II parametric
down-conversion with a group-velocity matched periodically poled KTiOPO
We have also implemented Sagnac polarization-entangled photon source with a PPKTP crystal, which is compact, stable, highly entangled, spectrally pure and ultra-bright. The schemetic is shown in Fig. 7. The photons were detected by two SSPDs with detection efficiencies of 70% and 68% at dark counts of less than 1 kcps [43]. Recently the coincidence count rate has been doubled from the result reported in [43], by optimizing the alignment in the Sagnac loop. As shown in the interference pattern in Fig. 8 , at 10 mW pump, the maximum coincidence count was 20 kcps (with single counts of 90 kcps for D1 and 120 kcps for D2), which corresponded to a coincidence of 40 kcps without polarizers. The visibility has also been increased from 96% in [43] to 98%. Thus a new tool box of quantum light source and detector at the telecom bands is now available, which surpasses the performace obtained so far in the near infrared wavelengths matched for the Si APD window. It will bring us a step closer to the realization of quantum information and communications technology in optical fiber infrastructures.
D. QKD Platform
Various QKD protocols can be integrated into a network by key relay via trusted nodes. In our QKD platform, the key management layer plays a role of networking. At each node, key management agent (KMA) is located, and receives the key material, resizes and saves them as well as to store information on quantum BER, key generation rate and so on. Secure key is encapsulated with the other key, and is relayed securely to the terminal. The KMAs also have APIs and supply secure key to variety of applications in the upper layers.
Fig. 9 depicts a secure network scheme which includes QKD-enhanced Layer-2 and Layer-3 switches. Layer-2 switches identify the media access control address (MAC address) of both sending and receiving devices, and switch packets in LANs. Currently high speed Layer-2 crypto-systems are commercially available, which directly encrypt data stream from the Layer-2 switch by using advanced encryption standard. The cipher text includes not only payload but also MAC and IP addresses of the users. QKD platform supports key refresh to Layer-2 encryptor/decriptor, and also adds OTP mode in Layer 2. Layer-3 switches perform routing based in IP addresses. The QKD-enhanced Layer-3 switches at Alice and Bob receive two kinds of secure key pairs. At Alice, one is used for encrypting payload and IP address by OTP, creating an OTP-encrypted IP packet. The other is used together with universal hash functions such as Wegman–Carter protocol, for generating an authentication tag from that packet. The packet consisting of the encrypted IP packet and the authentication tag is then routed to to Bob at the terminal node. Thus both encryption of data transfer and ITS authentication can be realized simultaneously in a compatible manner with the current standard of IPsec.
E. Key Rate Bound
Before closing this section, let us consider what is the maximum achievable key rate for the unconditionally secure QKD. The key rates of all the known point-to-point QKD protocols (BB84, CV-QKD, etc. without quantum repeater or trusted nodes), decay exponentially with the fiber distance, i.e., decay linearly with the transmittance of the channel. A natural question arisen is then whether there are yet-to-be discovered protocols that could circumvent this rate-loss tradeoff without using quantum repeaters. Recent theoretical progress revealed that this is impossible. This is shown by establishing a fundamental upper bound on the secret key generation rate of a point-to-point QKD [23].
To derive the fundamental bound, we need to consider the most generic point-to-point optical QKD protocol. Suppose
Alice and Bob are given a pure-loss optical channel with transmittance
The classical version of the problem was rigidly formulated in 1993 by Maurer [44] and Ahlswede and Csiszàr [45] (interestingly, [44] mentions that it was inspired by the invention of BB84) where they introduced the secret key agreement capacity on the classical wiretap channel assisted by two-way public communication and proved its lower and upper bounds. Though its exact capacity formula has not been known yet, Maurer and Wolf later introduced a quantity called the intrinsic information and proved that this quantity optimized over all channel input distribution is a sharp upper bound on the secret key agreement capacity [46].
This intrinsic information was extended to the quantum realm. Christandl and Winter defined the squashed
entanglement of a bipartite quantum state and showed that it works as a good entanglement measure in quantum
information theory [47]. More recently, we further extended these results by
defining the squashed entanglement of a quantum channel and proved that this quantity has a more
direct analog to the intrinsic information, i.e., it is an upper bound on the secret key agreement capacity, as well
as the quantum capacity, in a quantum channel assisted by two-way classical public communication
[48]. This upper bound has a relatively simple form and thus one can calculate
it for various channels. In particular, applying it to a pure-loss optical channel, we can show that the key
generation rate per pulse
\begin{equation}
R \le \log _2 \frac{1+\eta}{1-\eta}.
\end{equation}
Fig. 10 compares the upper bound and the key rate achievable by the
ideal BB84 where we assume a perfect single-photon source, detectors, and other devices, an ideal key distillation
protocol, and the efficient BB84 protocol [49]. Note that the key rate per
mode for the ideal BB84 is given by
Upper bound on the secret key capacity in a pure-loss optical channel assisted by two-way public communication (blue solid line) and the achievable key rate by the ideal BB84 (black dashed line).
Physical Layer Cryptography
A. Background
The key rate bound shown in the last subsection tells us how difficult it is to implement the unconditionally secure key distribution against Eve with unbounded physical and computational powers. The performance of this bound, even if realized, is insufficient to cover the ranges of rate and distance required for nation-wide and global scale uses of QKD. In principle, trusted-node QKD network can be extended to the nation-wide scale, however, an extention to the global scale including space links faces the intrinsic limit. Although quantum relay based on tele-amplification was proposed for space links, the key rate is always sacrificed (see Fig. 11) [51]. This fact motivates us to study more practical schemes that can cover the ranges mentioned above with reasonably compromised assumptions on Eve while keeping a required security level.
A numerical example of the secrecy capacities for a wiretap channel with various tapping ratios in red by an eavesdropper.
The notion of cryptographic security can be categorized into the two; algorithmic security and provable security (or information-theoretic security, ITS). The former relies on that certain mathematical problems are practically impossible to solve with current computer resources and well-known attacks. The latter is based on security proofs made in an information theoretic manner by showing the existence of channel coding that can effectively establish the statistical independence between the legitimate users and the eavesdropper, given a physical model of a channel [50]. Provably secure cryptography is also referred to as physical layer cryptography [24]. This has been originally studied in the RF domain in wireless networks. Studies in the optical domain also attract attention recently, especially in free space optical communications. Some milestone demonstrations of optical space data links have been successful recently, and the security concern is becoming an issue. Established algorithmic crypto-schemes should be a first option, but updating their specifications in satellites would not be easy when security vulnerabilities come out. Next option may be physical layer cryptography. In fact optical space communications are done in a line of sight between the sender (Alice) and the receiver (Bob). If an eavesdropper (Eve) is in the channel, then she is easily visible for Alice and Bob. So what Eve should do is to hide from Alice and Bob away from the channel, and try to collect scattered light to get information from Alice. Thus one may limit the physical ability of Eve. Note here that Eve can have unbounded computational power. Then in such a degraded condition for Eve, Alice and Bob can realize a much higher transmission rate with ITS.
B. Assumptions on the Channel Model
QKD is an extreme example of physical layer cryptography in the sense that the provable security is ensured for Eve
with unlimited physical abilities and computational power. In the standard context of physical layer cryptography,
however, the channel from Alice to Eve (wiretap channel) is assumed to be degraded compared with that from Alice to
Bob (main channel). As an typical example, consider space laser link with photon counting by Bob and Eve. The main and
wiretap channels are modeled by the channel transmittances
\begin{equation}
C_S=\max _{P_x}\left[ I(X;Y) - I(X;Z) \right]
\end{equation}
C. Our Numerical Results
Here we present our numerical results on the secrecy capacity of physical layer cryptography with an on–off
keying scheme based on pulse position modulation (PPM) coding for a carrier wavelength centered at 1550 nm.
Fig. 11 compares the secrecy capacities as a function of the channel
transmittance
The secrecy capacities of an on–off keyed PPM scheme are shown by solid, long-dashed, dashed, and dotted lines
with the wiretap ratios
D. Our Theory of Finite Length Analysis
The secrecy capacity is the achievable rate in the asymptotic limit at code length
Conceptual codeword structure, the rate
Conceptual codeword structure and the definitions of related metrics are shown in
Fig. 12. Bob's decoding error
\begin{equation}
\epsilon _n^{B} \equiv \frac{1}{M}\sum _ {m \in {\cal M}_n}\Pr \left\lbrace m^{\prime}\ne m\right\rbrace .
\end{equation}
\begin{equation}
\delta _n^{E} \equiv \frac{1}{M}\sum _{m\in {\cal M}_n}D(P^{(m)}_n||\pi _n)
\end{equation}
So we would like to make Bob's decoding error
In Fig. 13, we depict a channel model and the quantities necessary to
describe the main result. We define the following dual functions;
\begin{eqnarray}
&&{\phi (\rho |W_B,q,r)}= \nonumber \\
&&\quad -\,\log \left[ \sum _{y\in {\cal Y}} \left(\sum _{x\in {\cal X}}q(x)W_B(y|x)^{\frac{1}{1+\rho}}
e^{r[\Gamma -c(x)]} \right)^{1+\rho}\right]\\
&&{\phi (-\rho |W_B,q,r)}= \nonumber \\
&&\quad -\,\log \left[ \sum _{z\in {\cal Z}} \left(\sum _{x\in {\cal X}}q(x)W_E(z|x)^{\frac{1}{1-\rho}}
e^{r[\Gamma -c(x)]} \right)^{1-\rho}\right] \quad
\end{eqnarray}
\begin{eqnarray}
{F_c(q, R_B, R_E,\infty)}&=& \sup _{0\le \rho \le 1}\sup _{r\ge 0} \Biggl [ \phi (\rho |W_B, q, r)\nonumber \\
&& - \,\rho (R_B+R_E) \Biggr] \\
H_c(q, R_E,\infty) &=& \sup _{0 < \rho < 1}\sup _{r\ge 0} \Biggl [ \phi (-\rho |W_E, q, r) + \rho R_E
\Biggr]. \nonumber\\
\end{eqnarray}
\begin{eqnarray}
\epsilon _n^B &\le&2 e^{-n F_c(q, R_B, R_E, +\infty)}, \\
\delta _n^E &\le&2 e^{-n H_c(q, R_E, n)}.
\end{eqnarray}
The channel matrices
Fig. 14 plots the reliability functions for several cost constraints in
the case of the on-off keying photon channel presented in Fig. 11 (at
On the other hand, Fig. 15 plots the secrecy functions. Larger power
implies weaker secrecy. The horizontal axis is the randomness rate
In Fig. 16, we plot the reliability and secrecy functions at the same
time. The reliable transmission with the provable security is possible for the rates in the interval indicated by the
green arrow. The figure also shows an example of the tradeoff engineering to increase the secrecy, keeping the
reliability of Bob. The randomness rate
The reliability and secrecy functions, and the tradeoff engineering to increase the secrecy against Eve, keeping the reliability for Bob.
Finally we consider the maximum criteria, m–
\begin{eqnarray}
\mathrm{m-}\epsilon _n^{B} &\equiv & \max _{m \in {\cal M}_n}\Pr \left\lbrace m^{\prime}\ne
m\right\rbrace\nonumber \\
&\le&6 e^{-n F_c(q, R_B, R_E, +\infty)} \\
\mathrm{m-}\delta _n^{E} &\equiv & \max _{m\in {\cal M}_n}D(P^{(m)}_n||\pi _n) \nonumber \\
&\le&6 e^{-n H_c(q, R_E, n)}.
\end{eqnarray}
Concluding Remark
We have presented our recent results on GHz-clocked BB84 QKD systems, entanglement QKD technologies, and the theories of QKD key rate bound and physical layer cryptography. Our QKD systems are deployed into practical metoroplitan-scale networks, and are integrated into the QKD platform for a new solution for key exchange and key supply. Entanglement QKD can be put into shorter distance links, such as important intra-networks. The point-to-point QKD link performance, however, has the intrinsic limit as shown in Section III-E . Quantum repeater is yet to be met with the criteria for practical application to QKD. So at present efforts should be paid on widening QKD applications in metoroplitan-scale networks.
In order to realize secure global network with the provable security, one must rely on physical layer cryptography
while assuming that the wiretap channel to Eve is physically bounded. We have developed a theory to quantify the
tradeoff between the reliability and the secrecy in finite code length
In optical space communications which are basically line-of-sight links, the degraded wiretap channel condition seems reasonable in practice. On the other hand, in optical fiber communications, the degraded condition is highly non-trivial. In fact, assuming that Alice and Bob know Eve's channel is unrealistic in most fiber network scenarios. So coding must be designed to withstand the uncertainty of the wiretap channel.
A reasonable approach is to deal with multiple possible realizations for the wiretap channel, each of which is actually occur is unknown. An interesting scheme in this deirection has been proposed as security embedding codes [55], where the high-security message can be embedded into the low-security message at full rate without incurring any loss on the overall rate of communication. The number of secure bits delivered to Bob depends on the actual realization of the wiretap channel. When the wiretap channel realization is weak, all bits at Bob need to be secure. When the wiretap channel realization is strong, a prescribed part of the bits needs to remain secure. Another interesting approach is to combine network coding with wiretap channel coding [56]. This so-called secure network coding on a wiretap network deals with multiple statistically independent messages from multiple nodes as the random bits making a certain message ambiguous to Eve.
Our theory and the above mentioned approaches are still within a classical framework based on classical symbols, for
given channel matrices
Eventually the known schemes of QKD and prospective schemes of physical layer cryptography will be integrated on photonic network infrastructures to realize high capacity communications with the provable security. These schemes should cooperate with modern cryptographic technologies which are already operating in the upper layers. This new network paradigm is referred to as quantum photonic network. It indicates a direction to unify optical/quantum communications with coding and cryptographic technologies, which is indeed an endeavour in information and communications technologies.