High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf ·...

12
New J. Phys. 17 (2015) 033033 doi:10.1088/1367-2630/17/3/033033 PAPER High-dimensional quantum cryptography with twisted light Mohammad Mirhosseini 1 , Omar S Magaña-Loaiza 1 , Malcolm N OSullivan 1 , Brandon Rodenburg 1 , Mehul Malik 1,2 , Martin P J Lavery 3 , Miles J Padgett 3 , Daniel J Gauthier 4 and Robert W Boyd 1,5 1 The Institute of Optics, University of Rochester, Rochester, New York 14627, USA 2 Institute for Quantum Optics and Quantum Information (IQOQI), Austrian Academy of Sciences, Boltzmanngasse 3, A-1090 Vienna, Austria 3 School of Physics and Astronomy, University of Glasgow, Glasgow, G12 8QQ, UK 4 Department of Physics, Duke University, Durham, NC 27708 USA 5 Department of Physics, University of Ottawa, Ottawa ON K1N 6N5, Canada E-mail: [email protected] Keywords: quantum key distribution, orbital angular momentum, singular optics Abstract Quantum key distribution (QKD) systems often rely on polarization of light for encoding, thus limiting the amount of information that can be sent per photon and placing tight bounds on the error rates that such a system can tolerate. Here we describe a proof-of-principle experiment that indicates the feasibility of high-dimensional QKD based on the transverse structure of the light eld allowing for the transfer of more than 1 bit per photon. Our implementation uses the orbital angular momentum (OAM) of photons and the corresponding mutually unbiased basis of angular position (ANG). Our experiment uses a digital micro-mirror device for the rapid generation of OAM and ANG modes at 4 kHz, and a mode sorter capable of sorting single photons based on their OAM and ANG content with a separation efciency of 93%. Through the use of a seven-dimensional alphabet encoded in the OAM and ANG bases, we achieve a channel capacity of 2.05 bits per sifted photon. Our experiment demonstrates that, in addition to having an increased information capacity, multilevel QKD systems based on spatial-mode encoding can be more resilient against intercept-resend eavesdropping attacks. 1. Introduction First introduced in 1984 by Bennett and Brassard, quantum key distribution (QKD) is a method for distributing a secret key between two parties [1, 2]. Due to a fundamental property of quantum physics known as the no- cloning theorem, any attempt made by a third party to eavesdrop inevitably leads to errors that can be detected by the sender and receiver [3, 4]. Modern QKD schemes conventionally use a qubit system for encoding information, such as the polarization of a photon. Such systems are easily implemented because technology for encoding and decoding information in a qubit state-space is readily available today, enabling system clock rates in the GHz regime [57]. Recently, the spatial degree of freedom of photons has been identied as an extremely useful resource for transferring information [8, 9]. The information transfer capacity of classical communication links has been increased to more than one terabit per second using spatial-mode multiplexing [10]. In addition, it has been theoretically shown that employing multilevel quantum states (qudits) can increase the robustness of a QKD system against eavesdropping [1114]. Although the majority of high-dimensional QKD schemes so far have employed time-bin encoding for increasing the alphabet size [1518], it is expected that spatial-mode encoding can be alternatively used to enhance the performance of a QKD system considering the recent advances in free-space orbital angular momentum (OAM) communication, . The feasibility of high-dimensional QKD in the spatial domain has been previously demonstrated by encoding information in the transverse linear momentum and position bases [19, 20]. While such encoding schemes provide a simple solution for increasing the information capacity, they are not suitable for long-haul optical links due to the cross-talk caused by diffraction. Diffraction creates a varying transmission loss for OPEN ACCESS RECEIVED 5 October 2014 REVISED 15 January 2015 ACCEPTED FOR PUBLICATION 16 February 2015 PUBLISHED 20 March 2015 Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. © 2015 IOP Publishing Ltd and Deutsche Physikalische Gesellschaft

Transcript of High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf ·...

Page 1: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

New J. Phys. 17 (2015) 033033 doi:10.1088/1367-2630/17/3/033033

PAPER

High-dimensional quantum cryptography with twisted light

MohammadMirhosseini1, Omar SMagaña-Loaiza1,MalcolmNO’Sullivan1, BrandonRodenburg1,MehulMalik1,2,Martin P J Lavery3,Miles J Padgett3, Daniel J Gauthier4 andRobertWBoyd1,5

1 The Institute of Optics, University of Rochester, Rochester, NewYork 14627,USA2 Institute forQuantumOptics andQuantum Information (IQOQI), Austrian Academy of Sciences, Boltzmanngasse 3, A-1090Vienna,

Austria3 School of Physics andAstronomy,University ofGlasgow,Glasgow, G12 8QQ,UK4 Department of Physics, DukeUniversity, Durham,NC27708USA5 Department of Physics, University ofOttawa,OttawaONK1N6N5, Canada

E-mail:[email protected]

Keywords: quantumkey distribution, orbital angularmomentum, singular optics

AbstractQuantumkey distribution (QKD) systems often rely on polarization of light for encoding, thuslimiting the amount of information that can be sent per photon and placing tight bounds on the errorrates that such a system can tolerate. Here we describe a proof-of-principle experiment that indicatesthe feasibility of high-dimensional QKDbased on the transverse structure of the lightfield allowingfor the transfer ofmore than 1 bit per photon.Our implementation uses the orbital angularmomentum (OAM) of photons and the correspondingmutually unbiased basis of angular position(ANG).Our experiment uses a digitalmicro-mirror device for the rapid generation of OAMandANGmodes at 4 kHz, and amode sorter capable of sorting single photons based on their OAMandANGcontent with a separation efficiency of 93%. Through the use of a seven-dimensional alphabetencoded in theOAMandANGbases, we achieve a channel capacity of 2.05 bits per sifted photon.Ourexperiment demonstrates that, in addition to having an increased information capacity,multilevelQKD systems based on spatial-mode encoding can bemore resilient against intercept-resendeavesdropping attacks.

1. Introduction

First introduced in 1984 by Bennett and Brassard, quantumkey distribution (QKD) is amethod for distributinga secret key between two parties [1, 2]. Due to a fundamental property of quantumphysics known as the no-cloning theorem, any attemptmade by a third party to eavesdrop inevitably leads to errors that can be detectedby the sender and receiver [3, 4].ModernQKD schemes conventionally use a qubit system for encodinginformation, such as the polarization of a photon. Such systems are easily implemented because technology forencoding and decoding information in a qubit state-space is readily available today, enabling system clock ratesin theGHz regime [5–7]. Recently, the spatial degree of freedomof photons has been identified as an extremelyuseful resource for transferring information [8, 9]. The information transfer capacity of classicalcommunication links has been increased tomore than one terabit per second using spatial-modemultiplexing[10]. In addition, it has been theoretically shown that employingmultilevel quantum states (qudits) can increasethe robustness of aQKD system against eavesdropping [11–14]. Although themajority of high-dimensionalQKD schemes so far have employed time-bin encoding for increasing the alphabet size [15–18], it is expectedthat spatial-mode encoding can be alternatively used to enhance the performance of aQKD system consideringthe recent advances in free-space orbital angularmomentum (OAM) communication, .

The feasibility of high-dimensional QKD in the spatial domain has been previously demonstrated byencoding information in the transverse linearmomentum and position bases [19, 20].While such encodingschemes provide a simple solution for increasing the information capacity, they are not suitable for long-hauloptical links due to the cross-talk caused by diffraction. Diffraction creates a varying transmission loss for

OPEN ACCESS

RECEIVED

5October 2014

REVISED

15 January 2015

ACCEPTED FOR PUBLICATION

16 February 2015

PUBLISHED

20March 2015

Content from this workmay be used under theterms of theCreativeCommonsAttribution 3.0licence.

Any further distribution ofthis workmustmaintainattribution to theauthor(s) and the title ofthework, journal citationandDOI.

© 2015 IOPPublishing Ltd andDeutsche PhysikalischeGesellschaft

Page 2: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

different spatial frequencies that results inmixing of spatialmodes [21, 22]. Cross-talk increases the quantumsymbol error rate (SER) and fundamentally limits the secure key rate of aQKD system. This adverse effect can bealleviated by employingOAMmodes. Due to their rotational symmetry, OAMmodes have the desirableproperty of remaining orthogonal upon propagation in a systemwith round apertures [23]. In a recentexperiment, OAMmodeswere used for performing classical communication over a 3 km long free-space opticallink [24]. In this experiment, themain contribution of turbulencewas shown to be a transverse displacement oftheOAMmodes i.e., a tip-tilt error that can be readily corrected forwith present technology. As such,OAMmodes are ideal candidates for use in a free-space quantum communication link.

TheOAMof photons has enabledmany applications in the field of quantum information including studiesof quantum entanglement [25–28], photonic superdense coding [29], realization of high-dimensionalwavefunctions [30], and quantum cloning [31]. Similarly, a number of studies have investigated the benefits ofemployingOAMmodes in quantum cryptography [32–34]. Recently, rotation-invariantOAMvectormodeshave been used for performingQKD in a two-dimensional state space [35]. Although thismethod offers anadvantage in terms of optical alignment, it fails to utilize the large information capacity of theOAMbasis. Thecomplete realization of a high-dimensional QKD systemwithOAMhas remained impractical up until nowmostly due to the difficulty in efficiently sorting single photons in theOAMbasis. Additionally, any realisticapplication requires a fast key-generation rate that cannot be achievedwithmost of the commonmethods forgeneratingOAMmodes.

2.High-dimensional QKDwithOAM

In this paper we describe a proof-of-principle experiment that demonstrates the feasibility of performing high-dimensional quantum cryptographywithOAMmodes.We encode information in a seven-dimensional set ofOAMmodes alongwithmodes in themutually unbiased basis of azimuthal angle (ANG).Our scheme uses adigitalmicro-mirror device (DMD) for fast generation, and an efficient technique for unambiguous sorting ofbothOAMandANGmodes. By combining these techniques, we selectively generate the set of 14 spatialmodesat a rate of 4 kHz and correspondingly detect themwith a separation efficiency of 93%.Wemeasure a channelcapacity of 2.05 bits per sifted photonwith an average SER of 10.5% that is well below the error bounds that arerequired for security against intercept-resend eavesdropping attacks. Of our SER, 4% is due to detector darkcounts and ambient light, and 6.5% is due to errors due to intermodal crosstalk.

In our scheme, Alice randomly chooses her photons from two complementary bases. The primary encodingbasis is a set of OAMvortexmodes. Thesemodes have a top-hat intensity structure and a helical phase profilecharacterized byΨ =ℓ ℓφeOAM

i , whereℓ ∈ −{ 3: 3} (see figure 1).We construct amutually unbiased basis setusing a linear combination of OAMmodes of index ℓ∣ ∣ ⩽ 3with equal amplitudes

∑Ψ Ψ π ℓ=ℓ

=−d

n

d

1exp

i2, (1)n

N

N

ANG OAM ⎜ ⎟⎛⎝

⎞⎠

where the dimension = + =d N2 1 7 in our experiment.We refer to thesemodes as the angular (ANG)modesdue to their localized intensity patterns (see figure 1). TheANGmodes form amutually unbiased basis withrespect to theOAMbasis [36–38]

Ψ Ψ ℓ= ∀ℓ d n1 { , }. (2)nANG OAM

2

Consequently, themeasurement of a photon in theANGbasis provides no information about itsOAM state andvice versa. Additionally, the ANG and theOAMbases remainmutually unbiased upon propagation (Seeappendix).

Our experimental setup is depicted infigure 1. A collimated beam from ahelium–neon laser illuminates abinary hologram realized on aDMD to generate spatialmodes [39].We use a prepare-and-measure schemesimilar to the BB84 protocol [1]. Alice initially picks a random sequence of desiredOAMandANGmodes andloads the binary holograms for generating each of themodes in the sequence to theDMD’s internalmemory. Totransmit each symbol, Alice then triggers theDMDandmodulates the beamusing an acousto-opticmodulatorto create rectangular pulses of 125 nswidth. The beampower is attenuated such that each pulse contains onaverage μ = 0.1photons. The prepared states are then imaged to Bob’s receiving aperture via a 4f telescope thatforms a lossless 2 m long communication link.

Bob’smode sorter consists of two refractive elements for performing a log-polar to cartesian transformation[40]. Going through these elements, anOAMmode is converted to a planewavewith a tilt that is proportional totheOAMmode indexℓ. A single lens focuses such a planewave into a spot that is shifted by an amountproportional toℓ. Similarly, anANGmode transforms to a localized spot shifted by an amount proportional to

2

New J. Phys. 17 (2015) 033033 MMirhosseini et al

Page 3: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

the angular index n. A beam splitter is used to randomly choose between theOAMandANGbases. In order toreduce the overlap between the neighboring transformedmodes, we use a coherent beam combinationtechnique [41]. A fan-out element is realized on a phase-only spatial lightmodulator (SLM) to divide theincident light intomultiple copies. The copies are phase corrected using a second SLMand are recombined by alens to a series ofmuch narrower spotswith the same initial spacing between them. In addition, two cylindricallenses are realized on the SLMs to adjust the aspect ratio of the transformedmodes.

The sortedmodes are coupled to an array offibers that are connected to avalanche photodiodes (APDs). Dueto the limited number of available APDs (four), Bob’s data for each group of the the symbols is taken separatelyand is combined later. The signal from theAPDs is processed by afield-programmable gate array to producephoton counts using a gating signal sharedwithAlice. The photon detection events arefinally saved in Bob’scomputer. Alice and Bob are also connected via a classical link realized by an ethernet cable running a TCP/IPprotocol. After Alice and Bob collect a sufficiently large number of symbols, they stop themeasurement. At thispoint, they publicly broadcast the bases used for preparation andmeasurement of each photon via the classicallink. Alice and Bob then discard themeasurements that were done in different bases. The key generated at thisstage is referred to as the sifted key.

Figure 2 shows a portion of the sifted key generated in the experiment. At this stage, the two copies of the keyowned byAlice and Bob are almost identical but they contain some discrepancies. The discrepancies are due tothe imperfections in our system, namely imperfectmode-sorting, detector dark counts, and ambient light.However, any errors in the keymust be attributed to an eavesdropper and corrected for using the procedure oferror correction. The keys are transformed to a binary formon a symbol-by-symbol basis and randomized bymeans of a random-number generator shared byAlice and Bob. The cascade protocol is run byAlice and Bob tofix the discrepancies by comparing the two keys in a block-by-block fashion and performing parity checks [42].After error-correction, Alice and Bob share two identical copies of the key.However, a portion of the key can stillbe known to Eve from eavesdropping on the quantum channel or from accessing the publicly availableinformation transmitted in the classical channel during the error correction. Alice and Bob performprivacy

Figure 1. (a) The experimental setup. Alice prepares themodes by carving out pulses from ahighly attenuatedHe-Ne laser using anAOM.The spatialmode information is impressed on these pulseswith aDMD. Bob’smode sorter and fan-out elementsmap theOAMmodes and theANGmodes into separated spots that are collected by an array offibers. (b) The alphabet. CCD images ofproduced light field profiles in two complementary spatial bases of OAMandANG (d=7). The intensity profile of themodes areshown on the right. An example of binary holograms used for the generation ofmodes in each basis is shown on the left.

3

New J. Phys. 17 (2015) 033033 MMirhosseini et al

Page 4: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

amplification tominimize Eve’s information. This is done by using a universal hash function formapping theerror-corrected key to a shorter randomkey of desired length [43]. The amount bywhich the key is shortened atthis stage is chosen by estimating the amount of information owned by Eve. Finally, the secure key is used tosecurely transmit information (a picture in this case) over the classical channel (see figure 2).

3. Security analysis

Transmission and detection efficiencyThe power transmission efficiency of themode sorter’s refractive elements ismeasured to be 85%. TwoHoloeyePLUTOphase-only SLMs are used for realizing the holograms for the fan-out element and its correspondingphase-correcting element. In addition, two cylindrical lenses are realized on the SLMs to adjust the aspect ratioof the transformed beams. The diffraction efficiency of each SLM ismeasured to be approximately45%.

Thefiber array consists of 7multi-mode fibers with 62.5/125 μm core/cladding diameters andNA=0.275.We havemeasured the efficiency of coupling the transformedmodes to the fiber array to be approximately 18%.The detection is performedwith Perkin-Elmer SPCM-AQRH-14APDs. The quantum efficiency of the APDs isη = 0.65. The transmission efficiency of the optical link can be calculated as

Figure 2.Key generation. (a) an example of a random sifted key from the experiment. The spatialmodes aremapped to numberbetween 0 and 6 (errors aremarked in red and underlined). Each symbol is converted into a three digit binary number first and thebinary key is randomized before the error-correction. Privacy amplificationminimizes Eve’s information by shortening the keylength. (b) Alice encrypts the secretmessage (a picture6) using the shared secure key andBob decrypts it. In this case a short key isrepeatedmany times tomatch the bit length of the image. In practice,multiple uses of a short key cannot provide security and a longkey needs to be used.

6Old Persian cuneiformwriting from theXerxes tablet (Persia, circa 470 BC). Photo courtesy ofWendyHarns via flickr.

4

New J. Phys. 17 (2015) 033033 MMirhosseini et al

Page 5: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

= × × =T 0.85 (0.45) 0.18 0.031. (3)link2

Each detector has a typical dark-count rate of −c50 s 1 and an after-pulsing probability of0.3%.

Classical information capacityFigure 3 shows the conditional probability of Bob detecting eachmode as a function of themode sent by Alice.Theoretical values for the case of a systemwith no errors is shownon the left for comparison. In order tomeasure the SERmore precisely, each rowof thematrix is constructed by sending the same symbolmany timesand detecting all possible outcomes. This scheme eliminates the time consuming procedure of switching amongdifferent spatialmodes and permits amuchmore accuratemeasurement of the error-rate using a large set of sentand received symbols.

Figure 3.Conditional probability of detection. (a) Theoretical predictions for an ideal system. The bases chosen byAlice and Bob aremarked on the horizontal axis. (b)The experimental results. To construct thematrix a total number of 14million pulses with μ = 0.1photon per each are sent byAlice. The signals fromAPDs and the gate are collected using a 300 MHz oscilloscope on the fastacquisitionmode and processed on a computer. (c) 3D view of the experimental data.

5

New J. Phys. 17 (2015) 033033 MMirhosseini et al

Page 6: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

Themutual information between the sent and received symbols is defined as

∑= ( ) ( )( )

I P x yP x y

P x P y, log

,

( ). (4)AB

i j

i j

i j

i j,2

⎣⎢⎢⎢

⎦⎥⎥⎥

Here, xi is the event of sending symbol i and yj is the event of detecting symbol j. Assuming a uniformprobabilityfor sendingNmodes and a uniformprobability of an error occurring in the detection, the equation (4) can besimplified to [13]

= + + − −−

I d F F FF

dlog ( ) log ( ) (1 ) log

1

1. (5)AB 2 2 2

⎜ ⎟⎛⎝

⎞⎠

Here, δ ϵ= − −F 1 is the probability of correctly detecting eachmode. The SER caused by imperfectsorting is denoted by δ and the SER due to the dark counts is shown by ϵ. For the case of our experiment,δ = 0.065 andϵ = 0.04. The total SER, − F1 , is directlymeasured fromdata as10.5%.We have identified theerror from the imperfect sorting, δ, by repeating the experiment in the high-light level and analyzing the resultsafter background subtraction. The error probability ϵ can be divided to 2% from stray light,1.9% fromthermally-induced dark counts, and0.15% from after-pulsing.

Using these numbers, we calculate IAB as 2.05 bits per photon. For comparison, the ideal value of IAB for d=7modes is equal to =dlog ( ) 2.82 bits per photon. Further, the sortingmechanismby itself would result in a valueof 2.29 bits per photon in the absence of any background or dark counts. The probability of correctly detectingeachmode in the absence of dark counts, also known as the separation efficiency of themode sorter, is calculatedto be slightlymore than 93%.

Note that the calculation ofmutual information only requires the knowledge of the cross-talk and darkcount values. The loss in the optical system reduces the key generation rate of the protocol. However, a uniformloss in the transmission and detection does not change themutual information betweenAlice and Bob’s siftedkeys since the time frameswith no photon-detection event are removed in the basis reconciliation procedure.

Secure key rateWeconsider a cloning-based individual attack. In this situation, themutual information between the symbolsowned byAlice and Eve can bewritten as [13]

= + + −−−( ) ( )I d F F F

F

dlog ( ) log 1 log

1

1. (6)AE E E

E2 2 2

⎜ ⎟⎛⎝

⎞⎠

Here, FE is the fidelity of Eve’s cloningmachine. The value of Eve’s fidelity can be optimized to gainmaximuminformation for any given SER detected by Bob. This quantity is shown to be [13]

= + − − + − −FF

d

d F

d dd F F

( 1)(1 ) 2( 1) (1 ) . (7)E

For our experiment, FE=0.43, resulting in =I 0.35AE bits. For a sufficiently long ensemble of symbols owned byAlice, Bob, and Eve the secure keyR is found to be [2, 44]

= − ( )R R I I Imax , , (8)AB AE BEnet sift⎡⎣ ⎤⎦

whereRsift is the sifted key rate. This rate can bewritten as a function of the pulse repetition rate frep

μ η=R f T1

2. (9)sift rep link

For our experiment we have μ = 0.1. TheDMDused in our system (Texas InstrumentDLP3000) is capable ofswitching between the computer holograms stored in itsmemory at the speed of 4 kHz.We refer to thismode ofoperation as burstmode. Burstmode can be used to transmit a short key at =f 4rep kHz. The internalmemory

can only store up to 100 patterns, which limits the applicability of the burstmode for a long key. To generate along randomkey, we instead load each hologramonto theDMDusing a computer. This task alongwith the timeneeded for synchronizing the two computers reduces the raw key generation rate to approximately =f 1rep Hz.

Using =f 4rep kHz for the burstmode, we calculate =R 4sift (photons s−1) and =R 6.8net (secure bits s−1).

Note that this calculation characterizes the operation of the optical system in the presence of 14 detectors forcollecting data.

The calculation above can be recast to the alternative form

=R f I . (10)net rep pulse

6

New J. Phys. 17 (2015) 033033 MMirhosseini et al

Page 7: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

Here, Ipulse is the amount of secure information transmitted per each pulse. For our experiment we infer

= × −I 1.7 10pulse3 secure bits per pulse.

To quantitatively assess the security of our system,we plot the values for the error bound of an intercept-resend eavesdropping attack, a coherent attack, as well as the SER fromour experimental data infigure 4. In anintercept-resend attack, the eavesdropper (Eve)measures the state of the intercepted photon in an arbitrarilyselected basis and then resends a photon prepared to be in this same state. In a coherent attack, Eve coherentlyprobes afinite number of qudits in order to gain information about the key [13]. It is evident from thisgraph that our experimental SER is well below the required bounds for security against both intercept-resendand coherent attacks (figure 4). Unlike intercept-resend attacks, the SER for coherent attacks only depends onsystemdimension d and is independent of the number ofMUBsM [13].Hence, increasing the number ofMUBsbeyond 2 results in a drop in the key ratewithout any gain in security against coherent attacks. Nevertheless,there is a clear increase in the allowed SER for larger systemdimensions, demonstrating an advantage for using ahigh-dimensional encoding scheme forQKD such as that of OAM.

Using the SER, we estimate the information gained by Eve to be 0.35 bits per sifted photon for cloning-basedindividual attacks. It has been argued that cloning-based eavesdropping is the optimal strategy for an individualattack on systems based on qudits [13]. The portion of the key obtained by Eve is removed in the privacyamplification process, leading to amutual information of 1.7 secure bits per sifted photon in the final key. Itshould be emphasized that our secure key rate analysis assumes an infinite key, while any experimentalrealization produces only afinite key [45].We areworking toward afinite key analysis of the security, whichwillbe reported in the future.

In contrast to phase-only SLMs that are limited to a frame rate of 60 Hz, theDMDused in our setup has theability to rapidly switch betweenmodes at a speed of 4 kHz. This is especially important considering the fact thatthe speed of generation of spatialmodes limits the key generation rate of the system.Wemeasure our raw keygeneration rate to be 16.4 bits per second (for operation in burstmode). After performing basis reconciliationand privacy amplification for a sufficiently long key, we estimate the secure key rate to be 6.5 bits per second,which ismore than 3 orders ofmagnitude larger than that achieved in previous spatial-mode basedprotocols [20].

Photonnumber splitting (PNS) attacksThe analysis above considers intercept-resend and cloning based attacks. The PNS attack is yet anotherpossibility when the protocol uses imperfect single-photon sources. In our protocol, weak coherent pulses(WCPs) are used for realizing approximate single photon pulses. For small values of photon-numberexpectation values, aWCP contains either zero or one photonmost of the times.However, the pulsemay stillcontainmultiple photonswith a non-zero probability. In this situation, Eve can split one photon off of amulti-photon signal, without disturbing the polarization or the spatial structure of the signal [46–48]. Eve canmeasureher photon after basis reconciliation and obtain complete informationwithout causing any error in the signal.

The PNS attacks pose amore serious threat in the presence of loss. In this situation, Eve can, in principle,replace the lossy channel with a perfect quantum channel and only transmit to Bob the signals of her choice. Aninequality has been developed in [49] that serves as a necessary condition for security

Figure 4.Error-bound for security. Bob’s error bound calculated from theory as a function of the dimension of theHilbert space forintercept-resend attackswith twoMUBs (M=2) and coherent attacks is plotted alongwith symbol error ratemeasured fromourexperimental data (the error bar shows one standard deviation). It is seen that the symbol error rate fromour experiment lies wellbelow the theoretical bounds and hence it is sufficient for proof of security.

7

New J. Phys. 17 (2015) 033033 MMirhosseini et al

Page 8: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

>p p . (11)detection multi

Here, pdetection is the total probability of detection events for Bob, and pmulti is the probability of having a pulse

withmulti-photons. For a coherent state with an average photon number o f μ, we have μ = μ μ−P n( , ) en !

n

, andconsequently

∑ μ μ= ≈=

p P n( , )2

. (12)n

multi2

2

The total probability of detection events can be calculated by considering the signal detection events and thedetector dark counts

= + − ≈ +p p p p p p p . (13)detection signal dark signal dark signal dark

Using the parameters for our experiments we have = × −p 5 10multi3 and

μ η= + ≃ × −p T p 2 10detection link dark3. It can be see that <p pdetection multi and hence security against PNS

attacks cannot be guaranteed in our current implementation.We discuss the possible approaches for providingsecurity against PNS attacks in the following section.

Effect of imperfectMUBsThe unbiased relation between the two bases, as defined in equation (2), guarantees that detecting a photon inthewrong basis results in a completely randomoutcome andhence it reveals zero information about the key. Inpractice, however, the imperfect generation and sorting of theOAMandANGmodes results in variations in thedegree of overlap between a pair ofmodes chosen from the two different bases. Such variations can be noticed inthe off-diagonal blocks in thematrix for conditional probability of detection (figure 3). In this situation, themeasurement of a photon in thewrong basis can, in principle, reveal some information about the transmittedsymbol.

Themutual information between the symbols sent in theOAMbasis and detected in the ANGbasis can becalculated using equation (4). For our experiment, we have calculated =I 0.036OAM ANG bits per photon.Similarly, themutual information for the case of sending a photon in the ANGbasis and detecting it in theOAMbasis is calculated to be =I 0.058ANG OAM bits per photon.Note that these values aremuch smaller than IAB

which is equal to 2.05 bits per photon.We have assumed an unbiased relation between theOAMandANGmodes in our security analysis.The small number the quantities IANG OAM and IOAM ANG calculated abovejustifies the validity of this approximation. Amore complete security analysis needs to take these numbers intoaccount in estimating the information owned byAlice (IAE). Such an analysis, however, is beyond the scope ofcurrent article and should be the subject of future studies.

4. Steps towards practical QKDwithOAMmodes

The secure key rate of aQKD system is considered as the ultimatemetric for quantifying its performance. In theabove sections we described how a high-dimensional encoding scheme such as that of OAMcan potentiallybenefit the secure key rate of QKDprotocols.While our experiment provides significant improvements inrealizingOAM-basedQKD, several challenges need to be addressed before such a protocol can be employed forpractical applications. In addition to a high secure key rate, a free-spaceQKD link needs to provide reliable longdistance operation, efficient classical post-processing, ease of alignment, and a rigorous security analysisconsidering the finite size of practical keys.While some of these requirements can be achieved by increasing thedegree of sophistication of the systemor through the use of state-of-the-art technology, there is still need fortheoretical and experimental research before a full demonstration can be performed. Below,we address some ofthe current limitations.

Fast key generationThe secure key rate scales proportionally with the raw key generation rate. Although holography techniques canachieve kHzmode switching rates usingDMDs [39], practical QKDwould require key rates in theGHz regime.OAMmodes can be generated and switched atMHz rates using on-chip resonators [50] and potentially at GHzrates usingQ-plates [51].However, to generate the states in the ANGbasis onewould need tomodulate both theamplitude and phase of the beam, a task that best suits free-space holography. Recently, amethod involvingstatic holograms realized on an SLMand anAOM for switching between them achieved aMHzmode-switchingrate [52]. Unfortunately, the change in thewavelength caused by the AOM forbids applying thismethod forQKSsince side-channel attacks could be performed based on spectrum.

8

New J. Phys. 17 (2015) 033033 MMirhosseini et al

Page 9: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

Alternatively, generation of OAMandANGmodes at a rate of 1 GHz ormore can be achieved byilluminating a series of static hologramswith beams frommultiple lasers. The shaped beams after the hologramscan be passively combined using a series of beam splitters. The intensity of each laser beam can then bemodulated either by using electro-opticmodulators or by switching diode lasers on and off [10].

High throughputThe key generation rate drops as loss increases.Moreover, high loss in the communication linkmakes theprotocol vulnerable to PNS attacks. The throughput of our detection system can be readily increased byemploying high efficiency SLMs, or AR-coated custom refractive elements. This would translate to a six-foldincrease in the transmission efficiency in our experiment. Additionally, the amount of loss due to the scatteringin the air can beminimized by operating in the near-infrared regime.

TurbulencemitigationAtmospheric turbulence results in degradation of the spatial profile of themodes upon propagation. This resultsinmixing of the neighboringOAMandANGmodes. The effects of turbulence onOAMmodes has been a topicof extensive studies [38, 53, 54]. Common solutions formitigating the adverse effects of atmospheric turbulenceinclude the use of every othermode for encoding [55] and utilization of adaptive optics systems [56]. Recently,long-haul free-space propagation of OAMmodes has been realized using novel detection schemes [24].

Larger dimensionalityIncreasing the number of themodes increases the information carried by each single photon and results in ahigher secure bit rate. Previously, we have shown that ourmode sorter is capable of sorting 25OAMandANGmodeswith an averagemutual information of 4.17 bits per detected photons [41]. Consequently, the encodedinformation per photon can be readily increased by increasing the number of APDs in the experiment.Ultimately, the number ofmodes supported by the optical link is limited by the sizes of the transmitting andreceiving apertures.

Universal security proofA comprehensive security proof for aQKD system should include both the fundamental and practical propertiesof the physical system. The security analysis presented in this work assumes an infinitely long key. For afinitekey, the efficiency of classical post-processing need to bemeasured and used for amore rigorous calculation ofthe secure key rate [57]. In addition, our analysis assumes a uniform error-rate and transmission efficiency for allthemodes.While our data demonstrates the rationale for this approximation, amore comprehensive analysisneeds to include the effects of non-uniform SER and loss in amulti-level QKD system.More research is neededto establish the theoretical framework for security analysis of such systems.

Finally, we have demonstrated security against intercept-resend and cloning-based attacks, while ourimplementation remains vulnerable to PNS attacks. This limitation can be avoided by either reducing the loss inthe systemor by employing the decoy-state protocol [58].

5. Conclusions

In conclusion, we have demonstrated that a functionalQKD systembased on spatial-mode encoding isrealizable with current technology.We report a proof-of-principle experiment that uses a seven-dimensionalalphabet encoded inOAMand in themutual unbiased basis of ANGmodes.We implement a fastmode-generation technique that uses aDMD to generate spatialmodes at a speed of 4 kHz and amode-transformationtechnique that is able tomeasure theOAMandANGcontent of a photonwith an accuracy of 93%.Using thesetwomethods, we achieve amutual information of 2.05 bits per sifted photon, which ismore than twice themaximumallowable capacity of a two-dimensional QKD system. The SER of our scheme ismeasured to be 10.5%, which is sufficient for proving unconditional security against coherent and individual eavesdropping attacksfor an infinite key. In addition, we lay out a clear path for howour system can be enhanced to performpractical,high-dimensional QKDusing current technology. For example, our SER can be significantly reduced throughthe use of better detectors and amore sophisticatedmode-transformation technique. Our experiment opens thedoor to realizing real-world,multi-level quantum communication systemswith record capacities and levels ofsecurity.

9

New J. Phys. 17 (2015) 033033 MMirhosseini et al

Page 10: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

Acknowledgments

Weacknowledge helpful discussionwithGlennATyler of theOptical Sciences Company. This workwasfinancially supported byDARPA/DSO InPho program, theUSAir Force under contract FA9453-14-M-0317,theUKEPSRCunder ProgrammeGrant COAM, and theCanadian Excellence ResearchChair (CERC)program.OSML acknowledges support fromCONACyT.MehulMalik acknowledges support fromEuropeanCommission through aMarie Curie Fellowship.

Appendix. Diffraction and radialmodes

It is known thatOAMmodeswith largermode indexℓ have a larger rootmean squared (rms) radius in the farfield [59]. Given the different radial profiles of differentOAMmodes, onemight be concerned that the securityof the protocol is compromised.More specifically, we are interested to knowwhether Eve can gain informationby using the photons that fall outside Bob’s aperture. The details of the diffraction behavior depends on theradial profile of theOAMmodes as defined in the transmitter’s aperture.We considerOAMmodeswith a top-hat intensity profile such as the ones used in our experiment. Since diffraction plays no role once the Fresnelnumber is sufficiently large, this issue does not directly apply to our experiment. However, the answer to thequestion for a low-Fresnel-number system is not trivial. Below, we show that it is impossible for Eve to gain anyinformation by performing this attack regardless of the Fresnel number of the system.

Intercept and intercept attackIn an intercept and intercept attack (also known as denial of service) Eve detects a photonwithout retransmittingit. Since Alice andBob disregards the frameswith no photons in basis reconciliation, Evewill not have anymutual informationwith the sifted key and hence there is no loss of security.

Intercept and resend attackIn this type of attack Eve detects a photon that falls outside of Bob’s apertures in a randombasis. She then resendsa photon in a state determined by the result of hermeasurement into the Bob’s aperture. The geometry for Bob’sand Eve’s apertures are shown infigure A1. Note that theR R,B E1 andRE2 are all bound between zero andinfinity and sowe are considering themost general case.

We demonstrate anOAMmode’s opticalfield at any plane z byΨ ℓ z( )OAM . The probability for detecting eachof theOAMmodes by Eve can bewritten as

∫ Ψ=ℓ ℓP z z r r( ) ( ) d . (A.1)R

R

OAM OAM2

E

E

1

2

AssumingAlice chooses to sendOAMmodes randomlywith a probability of d1 (where = +d N2 1 is the totalnumber ofmodes used), the probability for detecting anyOAMmodewill be

∫∑ Ψ=ℓ

=−

P zd

z r r( )1

( ) d . (A.2)N

N

R

R

OAM OAM2

E

E

1

2

Figure A1.Bob’s and Eve’s receiving apertures.

10

New J. Phys. 17 (2015) 033033 MMirhosseini et al

Page 11: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

Similarly, the probability for detecting each of theANGmodes can bewritten as

∫ Ψ=P z z r r( ) ( ) d , (A.3)n

R

Rn

ANG ANG2

E

E

1

2

and the probability for detecting anyANGmodewill be

∫∑ Ψ==−

P zd

z r r( )1

( ) d . (A.4)n N

N

R

Rn

ANG ANG2

E

E

1

2

Wecan simplify equation (A.4) using the definition of the ANGmodes

∑Ψ Ψ π ℓ=ℓ

=−d

n

d

1exp

i2. (A.5)n

N

N

ANG OAM ⎜ ⎟⎛⎝

⎞⎠

Substituting Ψ nANG we get

∑ ∑

∑ ∑ ∑

∑ ∑ ∑

∑ ∑

Ψ π ℓ

Ψ Ψπ ℓ ℓ

Ψ Ψπ ℓ ℓ

Ψ Ψ δ

Ψ

=

= − ′

= − ′

=

=

=

ℓ ℓ

ℓ ℓ

ℓ ℓ

ℓ ℓ

ℓ ℓ

ℓ ℓℓ ℓ

=− =−

=− =− ′=−

=− ′=−

=−

=− ′=−

′′

=−

P zd d

n

dr r

d d

n

dr r

d d

n

dr r

dr r

dr r

P z

( )1 1

expi2

d

1 1exp

i2 ( )d

1 1exp

i2 ( )d

1d

1d

( ). (A.6)

n N

N

R

R

N

N

R

R

n N

N

N

N

N

N

R

R

N

N

N

N

n N

N

R

R

N

N

N

N

R

R

N

N

ANG OAM

2

OAM OAM*

OAM OAM*

OAM OAM* ,

OAM2

OAM

E

E

E

E

E

E

E

E

E

E

1

2

1

2

1

2

1

2

1

2

⎜ ⎟⎛⎝

⎞⎠⎡⎣⎢

⎤⎦⎥

⎡⎣⎢

⎤⎦⎥

The above result shows that it is equally probable for Eve to detect a photon from either theOAMbasis or theANGbasis using the beam from any range of radii. Consequently, it is impossible for Eve to gain information bydetecting a photon fromoutside of Bob’s aperture.Moreover, the result remains valid at any plane z fromnearfield to farfield.

References

[1] Bennett CHandBrassardG 1984Proc. IEEE Int. Conf. (Bangalore) pp 175–9[2] GisinN, RibordyG, TittelW andZbindenH2002Rev.Mod. Phys. 74 145–95[3] WoottersWKandZurekWH1982Nature 299 802–3[4] DieksD 1982Phys. Lett.A 92 271–2[5] TakesueH,NamSW,ZhangQ,Hadfield RH,Honjo T, Tamaki K andYamamoto Y 2007Nat. Photonics 1 343–8[6] NamekataN, TakesueH,Honjo T, Tokura Y and Inoue S 2011Opt. Express 19 10632–9[7] DixonAR, YuanZ L,Dynes J F, Sharpe AWand Shields A J 2008Opt. Express 16 18790–979[8] Molina-Terriza G, Torres J P andTorner L 2007Nat. Phys. 3 305–10[9] GibsonG,Courtial J, PadgettM J, VasnetsovM, Pas’koV, Barnett SMand Franke-Arnold S 2004Opt. Express 12 5448–56[10] Wang J et al 2012Nat. Photonics 6 488–96[11] Bechmann-Pasquinucci H andTittelW2000Phys. Rev.A 61 062308[12] BourennaneM,KarlssonA andBjörkG2001Phys. Rev.A 64 012306[13] Cerf N, BourennaneM,KarlssonA andGisinN2002Phys. Rev. Lett. 88 127902[14] SychD,Grishanin B andZadkovV 2004Phys. Rev.A 70 052331[15] Marcikic I, de RiedmattenH, TittelW, ZbindenH, LegréMandGisinN2004Phys. Rev. Lett. 93 180502[16] Ali-Khan I, Broadbent C andHowell J 2007Phys. Rev. Lett. 98 060503[17] Nunn J,Wright L J, Söller C, Zhang L,Walmsley I A and Smith B J 2013Opt. Express 21 15959–73[18] Zhang Z,Mower J, EnglundD,Wong FNCand Shapiro JH 2014Phys. Rev. Lett. 112 120506[19] Walborn S, LemelleD, AlmeidaMandRibeiro P 2006Phys. Rev. Lett. 96 090501[20] Etcheverry S, CañasG, Gómez E S,NogueiraWAT, Saavedra C, Xavier GB and LimaG2013 Sci. Rep. 3 2316[21] Shapiro JH 1974Appl. Opt. 13 2614[22] Miller DAB2000Appl. Opt. 39 1681–99[23] SlepianD1965 JOSA 55 1110–4[24] KrennM, Fickler R, FinkM,Handsteiner J,MalikM, Scheidl T,Ursin R andZeilinger A 2014New J. Phys. 16 113028[25] Mair A, Vaziri A,WeihsG andZeilinger A 2001Nature 412 313–6[26] Leach J, Jack B, Romero J, JhaAK, YaoAM, Franke-Arnold S, IrelandDG, BoydRW,Barnett SMand PadgettM J 2010 Science 329

662–5[27] McLarenM,Mhlanga T, PadgettM J, Roux F S and Forbes A 2014Nat. Commun. 5 3248

11

New J. Phys. 17 (2015) 033033 MMirhosseini et al

Page 12: High-dimensional quantum cryptography with twisted lightqelectron/pubs/NJP17_033033_2015.pdf · 2015. 3. 31. · differentspatialfrequenciesthatresultsinmixingofspatialmodes[21,22].Cross-talkincreasesthequantum

[28] Leach J, Bolduc E,GauthierD J andBoydRW2012Phys. Rev.A 85 060304(R)[29] Barreiro J T,Wei TC andKwiat PG 2008Nat. Phys. 4 282–6[30] MalikM,MirhosseiniM, LaveryMP J, Leach J, PadgettM J andBoydRW2014Nat. Commun. 5 3115[31] Nagali E, Sansoni L, Sciarrino F, deMartini F,Marrucci L, Piccirillo B, Karimi E and Santamato E 2009Nat. Photonics 3 720–3[32] MafuM,DudleyA, Goyal S, Giovannini D,McLarenM, PadgettM J, KonradT, Petruccione F, LütkenhausN and Forbes A 2013 Phys.

Rev.A 88 032305[33] Groblacher S, Jennewein T, Vaziri A,WeihsG andZeilinger A 2006New J. Phys. 8 75–75[34] Vaziri A,WeihsG andZeilinger A 2002Phys. Rev. Lett. 89 240401[35] ValloneG,D’AmbrosioV, Sponselli A, Slussarenko S,Marrucci L, Sciarrino F andVilloresi P 2014 Phys. Rev. Lett. 113 060503[36] Giovannini D, Romero J, Leach J, Dudley A, Forbes A and PadgettM2013Phys. Rev. Lett. 110 143601[37] D’Ambrosio V, Cardano F, Karimi E,Nagali E, Santamato E,Marrucci L and Sciarrino F 2013 Sci. Rep. 3 2726[38] MalikM, Rodenburg B,MirhosseiniM, Leach J, LaveryMP J, PadgettM J andBoydRW2012Opt. Express 20 13195–200[39] MirhosseiniM,Magaña-LoaizaO S, ChenC, Rodenburg B,MalikMandBoydRW2013Opt. Express 21 30196–203[40] LaveryMP J, RobertsonD J, BerkhoutGCG, LoveGD, PadgettM J andCourtial J 2012Opt. Express 20 2110[41] MirhosseiniM,MalikM, Shi Z andBoydRW2013Nat. Commun. 4 2781[42] BrassardG and Salvail L 1994EUROCRYPT’93 LectureNotes in Computer Science vol 795 pp 410–23[43] Bennett CH, BrassardG, CrépeauC andMaurerUM1995 IEEE Trans. Inf. Theory 41 1915–23[44] Csiszar I andKorner J 1978 IEEETrans. Inf. Theory 24 339–48[45] Scarani V andRenner R 2008Phys. Rev. Lett. 100 200501[46] YuenHP1996Quantum Semiclass. Opt. 8 939[47] Huttner B, ImotoN,GisinN andMorT 1995Phys. Rev.A 51 1863–9[48] LütkenhausN 2000Phys. Rev.A 61 052304[49] BrassardG, LütkenhausN,Mor T and Sanders B 2000Phys. Rev. Lett. 85 1330–3[50] StrainM J et al 2014Nat. Commun. 5 4856[51] Karimi E, Piccirillo B,Nagali E,Marrucci L and Santamato E 2009Appl. Phys. Lett. 94 231124[52] Radwell N, BrickusD, Clark TWand Franke-Arnold S 2014Opt. Express 22 12845–52[53] Tyler GA andBoydRW2009Opt. Lett. 34 142–4[54] PatersonC2005Phys. Rev. Lett. 94 153901[55] Rodenburg B, LaveryMP J,MalikM,MirhosseiniM, RobertsonD J, PadgettM andBoydRW2012Opt. Lett. 37 3735–7[56] Rodenburg B,MirhosseiniM,MalikM,Magaña-LoaizaO S, YanakasM,Maher L, SteinhoffNK, Tyler GA andBoydRW2014New J.

Phys. 16 033020[57] Scarani V et al 2009 Rev.Mod. Phys. 81 1301–50[58] HwangWY2003Phys. Rev. Lett. 91 057901[59] Phillips R L andAndrews LC 1983Appl. Opt. 22 643

12

New J. Phys. 17 (2015) 033033 MMirhosseini et al