Abstract
The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with Ddimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for realworld quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16dimensional quantum states. Information is encoded in the singlephoton transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental highdimensional QKD.
Introduction
Theft of electronic information is a major problem in modern telecommunications. For instance, recent advances in computing technology such as the ever growing parallel processing power of graphical processing units (GPUs), have allowed the bruteforce cracking of passwords to be greatly sped up^{1,2}. A very promising solution to the issue of information security is quantum key distribution (QKD), also called quantum cryptography^{3}. Quantum cryptographic schemes allow remote parties to share a secret key (a sequence of bits) through the use of quantum channels. This key is later used for secure information transmission and the advantage of QKD is that the presence of an eavesdropper may, in principle, be detected. The first QKD protocol was proposed in 1984 by Bennett and Brassard, called BB84^{4}. It employs two sets of orthogonal quantum states spanning two mutually unbiased bases (MUBs)^{5}. BB84 is a prepareandmeasure QKD protocol, in which single quantum systems are exchanged between the communicating parties (Alice and Bob) for the establishment of each shared secret key bit.
Most experimental implementations of quantum cryptography have been done with BB84based QKD schemes. Experiments with increased performance (i.e. higher transmission distance, larger secure key generation rate, more compact schemes, etc...) have been demonstrated in the past few years^{6,7,8,9,10,11} and the vast majority of these demonstrations have employed only twodimensional quantum systems. The use of high dimensional systems has been nevertheless widely deployed in classical digital communications for many years, as a way to maximize the efficiency of the transmission channel^{12}. With the same goal, the first studies on the theoretical framework to generalize the BB84 protocol to high dimensional state spaces were carried out over a decade ago^{13,14,15}. It was shown that there is an important additional feature in moving to higher dimensions in QKD: increased security, which is alone a major motivation to implement highdimensional quantum cryptography. Nonetheless, due to experimental challenges, there have been only proofofprinciple experiments of QKD in higher dimensions^{16,17,18}.
Recently, on the theoretical front, the interest on highdimensional QKD did not wane as security bounds were derived considering finite key lengths^{19}. Moreover, an important experimental tool has emerged in recent years to dynamically manipulate light in freespace, the spatial light modulator (SLM)^{20}. The capabilities of the SLMs have been explored in experiments of quantum information and it is now widely recognized as a tool for the manipulation of highdimensional quantum systems (qudits) encoded in the transverse momentum of single photons^{21,22,23,24,25,26}. In classical optical communications, SLMs have also been used to multiplex and demultiplex classical highspeed data streams, further increasing the channel capacity^{27}. Nevertheless, in spite of all recent progress, a demonstration of a quantum key exchange session using the BB84 protocol in higher dimensions is still lacking. In this paper this issue is finally addressed.
We report an automated QKD session between Alice and Bob, based on the BB84 protocol extended to 16dimensional quantum systems^{15}. We employ the linear transverse momentum of singlephotons as the degree of freedom for encoding the qudit states^{28}. The singlephotons are produced by Alice from attenuated laser pulses. At Alice and Bob's sites, the quantum states spanning the MUBs are randomly produced with the help of SLMs, dynamically introducing relative phases between the paths available for the propagation of the single photons^{25}. The entire setup is synchronized working at a repetition rate of 30 Hz, which is the current physical limit of standard commercially available SLMs. The custom electronics required for the full automated execution of the protocol were developed on field programmable gate array (FPGA) units. The measured quantum bit error rate (QBER) of the correlated bits generated was smaller than half of the bound allowed for extracting a secret key while considering the general coherent attacks; and close to three times smaller than the limit for individual attacks^{15,19}.
Results
In this demonstration we take advantage of the flexibility allowed by SLMs to encode information using the transverse wave profile of single photons. Although it is a continuous degree of freedom, it can be discretized using slits to define different possible paths for the photon transmission^{28}. The SLMs are built with liquid crystal displays (LCDs) and require the use of polarizers. They allow an individual control of the gray level of each pixel on the LCD^{29}. While changing the pixel gray level, the polarization is changed and when combined with the polarizers, the light transmissivity of the pixel is varied. Together with this effect a relative phase change may also be induced in each pixel. The slits can be directly generated on the SLM. This is done by programming the gray levels of all the LCD pixels such that areas with high transmissivity correspond to the slits and everywhere else has zero transmission. By employing a set of D parallel slits a Hilbert space of D dimensions is constructed. The state after the slits can be written as the following coherent superposition:
where l_{D} = (D − 1)/2. l〉 represents the state of the photon transmitted by the lthslit of the SLM^{28}. The uniform amplitude distribution is obtained with an adequate choice of the spatial beam profile on the plane of the slits^{25}. This state can be generated provided that the singlephotons have a larger transverse coherence length than the distance between the outermost slits. ϕ_{l} are the relative phase shifts at each slit. Each ϕ_{l} can be dynamically changed in realtime in the SLMs.
In standard BB84 quantum cryptography, the required states are two vectors of twodimensional MUBs, with a total of four states required. In the case of a multidimensional BB84 protocol, the individual states to be sent and measured belong to two Ddimensional MUBs. The index β denotes a specific MUB with β = α, α′. In this experiment 16 slits are employed, generating a 16dimensional Hilbert space. Consequently 32 states had to be generated, 16 for each MUB. Of the large number of families of MUBs that exist in 16 dimensions^{30}, we chose two MUBs that only required phase modulations of 0 and π and no amplitude modulation (see Methods). This eased the implementation of the MUBs states with the SLMs.
Alice needs to randomly choose in which MUB, α or α′, she will encode her qudit. She then randomly chooses one of the D possible states from this MUB. As we will explain next, in our scheme, this is done by using a phasemodulation SLM and pseudorandom subroutines to depict a sequence of predefined masks. Upon successfully receiving the photon, Bob needs to make a projective measurement. He also randomly chooses states from α and α′. For this purpose, Bob uses a detection apparatus composed of a phasemodulation SLM, a lens and a “pointlike” avalanche single photon detector (APD) [shown in Fig. 1(a)]. The singlephoton detector remains fixed at the center of the focal plane. It covers the transverse blue zone of 10 μm indicated in Fig. 1. At the SLM, Bob depicts phasemasks where the phases at each slit are chosen in accordance with the MUBs states given in the Methods section. In this case, the probability of singlephoton detection is proportional to when Alice and Bob choose the states belonging to the same (different) MUBs, where k, k′ = 0, …, D − 1. Each time Bob matches his state choice with Alice's, while both choose the same MUB, constructive spatial interference occurs and the probability of singlephoton detection (the single count rate) is maximal [See the example of Fig. 1(b)]. When the vectors are not matched and Alice and Bob have chosen the same MUB, total destructive interference occurs at the transverse area of the detector [See the example of Fig. 1(c)]. When Alice and Bob's choices of MUBs are not the same (incompatible) the probability of detection is 1/D regardless of which states were chosen by both [See the example of Fig. 1(d)].
In our experiment the light source is a singlemode continuouswave laser with a 690 nm emission wavelength (See Fig. 2). It is followed by an acoustooptic modulator (AOM), which sets the optical pulse repetition frequency. The width of the pulses depends on the average photon number employed. Two mean photon numbers per pulse were used, μ_{a} = 0.60 and μ_{b} = 0.18, to test the performance of our QKD prototype. A 50 ns optical pulse for the case of μ_{a} is generated by the AOM. For the results with μ_{b}, a 20 ns optical pulse was used instead. An extra calibrated attenuator (not shown in Fig. 2) is also used to set precisely the desired average photon number at the output of Alice's station. The average photon number was measured directly at Alice's output with a removable mirror and a singlephoton detector with known overall detection efficiency (also not shown in Fig. 2).
We employed three SLMs, two located within Alice and the other belonging to Bob. The first SLM (SLM1) is programmed to perform amplitude modulation in order to generate the slits. This stage defines the number of paths available for the photon transmission and, therefore, the dimension to be used in the experiment, 16 in our case. The mask projected on this SLM remains fixed throughout the experiment. The slits are 2 pixels wide, with a separation of 1 pixel between them, with each pixel having an area of 32 × 32 μm^{2}. The relation between the width of the slits and the separation between them was chosen to maximize the distribution probability in the center of the detection plane, when Alice and Bob take the same state [See Fig. 1(b)]. A set of polarizers is used before and after each SLM.
A first set of lenses is used as a beam expander to illuminate the entire area of the slits at the SLM1 with attenuated pulses. A second set of lenses forms the image of SLM1 onto the second SLM (SLM2). This SLM is configured for phasemodulation in order to implement the phase shifts required for constructing the MUBs states at Alice's station. This is done following the technique introduced in^{25}. The singlephoton is then transmitted through a freespace channel (here consisting of a third telescope set of lenses), forming the image of Alice's output onto Bob's modulator (SLM3). This link is 50 cm long. A final lens following the SLM3 focuses the light onto the APD.
The entire system is synchronized at 30 Hz, with the master clock generated within Alice's FPGA and distributed to Bob through an electrical cable for synchronization. Alice's FPGA unit is used to trigger the AOM and generate the attenuated pulses. The pulses generated are naturally phase randomized due to the low repetition frequency of the pulses when compared to the laser coherence length. Nevertheless for higher operating frequencies, it can be actively phase randomized with schemes such as^{31}. The bases and state choices done by Alice and Bob are performed independently using pseudorandom number generator subroutines in their individual FPGAs. For each clock pulse Alice and Bob choose, independently, a mask from the 32 distinct possibilities and project them onto SLM 2 and SLM3, respectively. Bob's FPGA unit records the singlephoton detections at the APD. It also controls the detection window duration, which is 50 ns when working with μ_{a} and 20 ns for μ_{b}. Each FPGA records the corresponding state choice and is connected to a personal computer (PC1 and PC2) who perform the basis reconciliation procedure through an Ethernet cable.
For each photon number μ_{a} and μ_{b}, the protocol is then executed continuously and the basis reconciliation done in parallel to the data acquisition. In the reconciliation procedure the detections for compatible and incompatible basis choices by Alice and Bob are split. At this point all the incompatible detections are discarded. An important figure of merit for any QKD setup is the QBER, whose definition is (N_{i})/(N_{c} + N_{i}), where N_{c} and N_{i} are the correct and incorrect detections at Bob's detector. For this experiment the N_{c} detections correspond to the sums of all the ones obtained when both MUB vectors chosen by Alice and Bob are the same. The N_{i} detections are the sum of the detections when Alice and Bob do not choose the same MUB vectors. In the realworld scenario there will always be practical issues such as imperfect components and misalignment. Therefore, the detected probabilities will differ from the ideal ones. In order for any QKD protocol to be secure, the QBER must be below a certain value. This value depends on the attack strategy allowed for Eve, as well as the number of dimensions of the system. Following the bounds provided in^{15}, we calculate that with 16 dimensions the error rate threshold for secure key generation when considering individual attacks is D^{ind} = 37.50%. For the more general class of collective attacks we obtain an upper bound of D^{coh} = 28.97%. In our experimental implementation the measured QBER is shown in Fig. 3 together with the breakdown of the detections into the different types of detected events. In the case of using μ_{a}, the average QBER is 13.4 ± 4%. In the QKD session with μ_{b}, the average QBER is 15.6 ± 7%. One can note the stability provided by the setup due to the small variations in the QBER during the long experimental runs. In both cases the QBER is below the security thresholds of individual attacks as well as collective attacks. This indicates that a positive net key rate can be extracted from the sifted bits^{15}. Nevertheless, further theoretical studies are needed to optimize the optimum average photon number per pulse, as a function of the transmission distance for highdimensional QKD. The average obtained sifted key rate is 27.0 and 11.1 bits/hour for μ_{a} and μ_{b}, respectively. No postprocessing was done in the sifted key bits. Finally, we have calculated the Shannon's entropy for the detected symbols for both μ_{a} and μ_{b}, where p_{k} is the probability of detecting state k. We obtain an entropy of 3.98 ± 0.03 and 3.92 ± 0.05 bits for the QKD sessions with μ_{a} and μ_{b}, respectively. Both cases are close to the theoretical maximum of 4 bits/symbol when working in a 16dimensional Hilbert space.
Discussion
Here, we have experimentally demonstrated an automated QKD session based on the BB84 protocol extended to 16dimensional quantum states. The QBER remains constant and below the security limits, showing the robustness and stability of the setup. Our work therefore can be seen as an initial point for the development of realworld experimental highdimensional QKD. It paves the way for future investigations in this area. For example, the new generation of SLMs based on ferroelectric liquid crystals allows for frame rates up to 1 kHz. So, one may envisage that they will allow for faster key generation rates in schemes similar to the setup presented here. Moreover, recent developments on integrated silicon photonics have demonstrated SLMs with a modulation speed of 150 MHz^{32}. They are designed to modulate the light in one transverse direction and, thus, they match the requirements for encoding information using the linear transverse momentum. Another line of investigation is the study of propagation of spatiallyencoded qudits for QKD through optical fibers. This is challenging since singlemode fibers cannot be used and multimode fibers scramble the information across the modes. Nevertheless progress has been made recently using photonic crystal fibers^{33} and multimode fibers with active compensation of scattered light propagation^{34}. This last technique is promising for our setup since it involves the transmission of images through multimode fibers. In principle, the image of Alice's SLM would be formed onto the fiber, propagated, then imaged again on Bob's SLM. Last, it is worth to mention that our scheme can also be adapted to investigate the performance of other QKD protocols in higher dimensions^{35} and study fundamental related concepts^{36}.
Methods
Mutually unbiased bases
The two employed MUBs are displayed here. They obey the condition that , where α and α′ denote the two MUBs. k and k′ label the states in a given MUB. For sake of simplicity, we describe the MUB's states in terms of unitary transformations. The MUBs are given by:
References
Murakami, T., Kasahara, R. & Saito, T. An implementation and its evaluation of password cracking tool parallelized on GPGPU. In: International Symposium On Communication And Information Technologies (ISCIT), Tokyo Japan, Oct. 2010.
Vu, A.D., Han, J.I., Nguyen, H.A., Kim, Y.M. & Im, Y.M. A homogeneous parallel brute force cracking algorithm on the GPU. In: International Conference On ICT Convergence (ICTC), Seoul, South Korea, Sept. 2011.
Gisin, N., Ribordy, G., Tittel, W. & Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002).
Bennett, C. H. & Brassard, G. Quantum cryptography: public key distribution and coin tossing. In: Proceedings Of The IEEE International Conference On Computers, Systems And Signal Processing, Bangalore, India (IEEE, New York, 1984), p. 175.
Wootters, W. K. & Fields, B. D. Optimal statedetermination by mutually unbiased measurements. Ann. Phys. 191, 363–381 (1989).
Gobby, C., Yuan, Z. L. & Shields, A. J. Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84, 3762 (2004).
Takesue, H. et al. Quantum key distribution over a 40dB channel loss using superconducting singlephoton detectors. Nature Photon. 1, 343 (2007).
Stucki, D. et al. High rate, longdistance quantum key distribution over 250 km of ultra low loss fibres. New J. Phys. 11, 075003 (2009).
Xavier, G. B. et al. Experimental polarization encoded quantum key distribution over optical fibres with realtime continuous birefringence compensation. New J. Phys. 11, 045015 (2009).
Dixon, A. R., Yuan, A. L., Dynes, J. F., Sharpe, A. W. & Shields, A. J. Continuous operation of high bit rate quantum key distribution. Appl. Phys. Lett. 96, 161102 (2010).
Wang, S. et al. 2 GHz clock quantum key distribution over 260 km of standard telecom fiber. Opt. Lett. 37, 1008 (2012).
Proakis, J. G. & Salehi, M. Digital Communications 5th Edition (McGrawHill 2007).
BechmannPasquinucci, H. & Tittel, W. Quantum cryptography using larger alphabets. Phys. Rev. A 61, 062308 (2000).
Bourennane, M., Karlsson, A. & Björk, G. Quantum key distribution using multilevel encoding. Phys. Rev. A 64, 012306 (2001).
Cerf, N. J., Bourennane, M., Karlsson, A. & Gisin, N. Security of quantum key distribution using dlevel systems. Phys. Rev. Lett. 88, 127902 (2002).
Gröblacher, S., Jennewein, T., Vaziri, A., Weihs, G. & Zeilinger, A. Experimental quantum cryptography with qutrits. New J. Phys. 8, 75 (2006).
AliKahn, I., Broadbent, C. J. & Howell, J. C. Largealphabet quantum key distribution using energytime entangled bipartite states. Phys. Rev. Lett. 98, 060503 (2007).
Walborn, S. P., Lemelle, D. S., Almeida, M. P. & Souto Ribeiro, P. H. Quantum key distribution with higherorder alphabets using spatially encoded qudits. Phys. Rev. Lett. 96, 090501 (2006).
Sheridan, L. & Scarani, V. Security proof for quantum key distribution using qudit systems. Phys. Rev. A 82, 030301(R) (2010).
Grier, D. G. A revolution in optical manipulation. Nature 424, 21 (2003).
Yao, E., FrankeArnold, S., Courtial, J. & Padgett, M. J. Observation of quantum entanglement using spatial light modulators. Opt. Express 14, 13089–13094 (2006).
Lima, G., Vargas, A., Neves, L., Guzmán, R. & Saavedra, C. Manipulating spatial qudit states with programmable optical devices. Opt. Express 17, 10688 (2009).
Dada, A. C., Leach, J., Buller, G. S., Padgett, M. J. & Andersson, E. Experimental highdimensional twophoton entanglement and violations of generalized Bell inequalities. Nature Phys. 7, 677 (2011).
Hendrych, M. et al. Experimental estimation of the dimension of classical and quantum systems. Nature Phys. 8, 588 (2012).
Lima, G. et al. Experimental quantum tomography of photonic qudits via mutually unbiased basis. Opt. Express 19, 3542 (2011).
Pimenta, W. et al. Minimal state tomography of spatial qubits using a spatial light modulator. Opt. Express 18, 24423 (2010).
Wang, J. et al. Terabit freespace data transmission employing orbital angular momentum multiplexing. Nature Photon. 6, 488 (2012).
Neves, L. et al. Generation of Entangled States of Qudits using Twin Photons. Phys. Rev. Lett. 94, 100501 (2005).
Moreno, I., Veláquez, P., FernándezPousa, C. R. & SánchezLópez, M. M. Jones matrix method for predicting and optimizing the optical modulation properties of a liquidcrystal display. J. Appl. Phys. 94, 36973702 (2003).
Romero, J. L., Björk, G., Klimov, A. B. & SánchezSoto, L. L. Structure of the sets of mutually unbiased bases for N qubits. Phys. Rev. A 72, 062310 (2005).
Zhao, Y., Bing, Q. & Lo, H.K. Experimental quantum key distribution with active phase randomization. Appl. Phys. Lett. 90, 044106 (2007).
Qiu, C., Chen, J., Xia, Y. & Xu, Q. Active dielectric antenna on chip for spatial light modulation. Sci. Rep. 2, 855 (2012).
Löffler, W. et al. Fiber Transport of Spatially Entangled Photons. Phys. Rev. Lett. 106, 240505 (2011).
Choi, Y. et al. Scannerfree and wideField Endoscopic Imaging by Using a Single Multimode Optical Fiber. Phys. Rev. Lett. 109, 203901 (2012).
Xiong, Z.X. et al. General quantum key distribution in higher dimension. Phys. Rev. A 85, 012334 (2012).
Gallego, R., Brunner, N., Hadley, C. & Acín, A. DeviceIndependent Tests of Classical and Quantum Dimensions. Phys. Rev. Lett. 105, 230501 (2010).
Acknowledgements
The authors wish to thank A. Klimov for assistance with the generation of the MUBs and J. Cariñe, A. Wolf and M. Figueroa for discussions related to the FPGAs. This work was funded by the grants FONDECYT 1120067, ICM P10030F and CONICYT PFB08024. G.B.X. acknowledges funding from FONDECYT 11110115. G.C. and E.S.G. acknowledge the financial support of CONICYT.
Author information
Affiliations
Contributions
S.E., G.C. and E.S.G. have executed the experiment and processed the data. W.A.T.N., C.S., G.B.X. and G.L. designed and assisted in the experiment. All authors agree to the contents of the paper.
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Rights and permissions
This work is licensed under a Creative Commons AttributionNonCommercialNoDerivs 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/byncnd/3.0/
About this article
Cite this article
Etcheverry, S., Cañas, G., Gómez, E. et al. Quantum key distribution session with 16dimensional photonic states. Sci Rep 3, 2316 (2013). https://doi.org/10.1038/srep02316
Received:
Accepted:
Published:
Further reading

Quantum randomness protected against detection loophole attacks
Quantum Information Processing (2021)

Quantum information processing with spacedivision multiplexing optical fibres
Communications Physics (2020)

Stochastic optimization on complex variables and purestate quantum tomography
Scientific Reports (2019)

Phase Matching Quantum Key Distribution based on SinglePhoton Entanglement
Scientific Reports (2019)

Control over the transverse structure and longdistance fiber propagation of light at the singlephoton level
Scientific Reports (2019)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.