In the future, our society and our lives will become even more reliant on networks, so it will be vital that information is transmitted quickly and safely. However, the rise of quantum computers, with their overwhelming computational capabilities, will pose a threat to the security of cryptographic communications. Hopes are high for quantum key distribution as a method of secure encrypted communication. According to information theory, quantum key distribution, which uses the principles of quantum mechanics, is an unbreakable form of encryption. Toshiba is leading the world in developing unique technologies for accelerating and stabilizing quantum key distribution. 

In this running feature, we'll explain this technology over the course of several articles. 

In part 1, we explained the principles of quantum key distribution technology and the BB84 protocol. In part 2, we'll learn about the technologies that are used to produce the higher speeds and greater stability required for quantum key distribution.


Achieving the high speeds and stability that are essential for the practical use of quantum key distribution


Digitalization has proceeded at a rapid pace throughout society. In business and academic research settings, tremendous amounts of data are relayed through information and communication networks (hereafter referred to simply as "networks") when conducting high resolution video conferences, performing genome analysis, or the like. In people's homes, as well, products such as automobiles and appliances are increasingly becoming connected to networks, which is making these networks even more important.

As we explained in part 1, the valuable information passed through these networks is protected by encryption. Currently, quantum cryptographic communication is considered the safest form of cryptographic communication. In quantum cryptographic communication, cryptographic keys generated through quantum key distribution are used to communicate securely.

For this highly secure quantum cryptographic communication to be used in various applications, it is vital that the quantum key distribution system that generates these cryptographic keys is made faster and more stable. It must be made faster because the amounts of highly confidential data that are transmitted are sometimes extremely large, so numerous cryptographic keys are used. It must be made more stable because it is essential that the weak photons that carry cryptographic key information reach their destination. At Toshiba, we consider the speed and stability of quantum key distribution systems to be important parts of the practical deployment of quantum cryptographic communications. That's why we've been at the forefront of technical development in these areas.


Toshiba leads the world with its quantum key distribution systems


Toshiba's quantum key distribution systems generate cryptographic keys at some of the highest speeds in the world. The quantum key distribution system we developed in 2017 achieved a key distribution speed of 13.7 Mbps in an optical fiber environment built to simulate the transmission of quantum key distribution over a distance of 10 kilometers. This was the first system in the world to break the 10 Mbps barrier.

* Mbps: Unit used to indicate transmission speed. A transmission speed of 13.7 Mbps means roughly 13.7 megabits are transmitted per second.

Even in real-world environments, in which the quantum key distribution system is significantly affected by various factors, including the optical fiber used to transmit the photons, the system is capable of stably transmitting cryptographic keys. In 2018, a quantum key distribution system transmitter was connected via optical fiber to a receiver located roughly 7 km away. Over the course of a month, the system successfully generated cryptographic keys at an average speed in excess of 10 Mbps. This was a world first.

Achieving these high speeds and stability required the development of technologies for rapid and precise photon detection, elemental technologies used in every step of the cryptographic key generation process, and technologies for integrating the detection and generation technologies in a quantum key distribution system.


The structure of the quantum key distribution system and the process used to generate cryptographic keys


Quantum key distribution systems are made up of a transmitter and a receiver for sending and receiving photons, together with control servers for performing the processing performed when generating cryptographic keys. Cryptographic keys are created in a four step process (Fig. 1).

In the first step, the transmitter sends photons containing cryptographic key information (bit information) and basis information, as defined in the BB84 protocol. These photons are detected by a receiver (Fig. 1 - (1) Photon transmission and detection).

* The BB84 protocol is explained in depth in part 1 of this series.

Next, the basis information for the transmitted photons is shared between the transmitter and the receiver. Based on this information, the bit information that can be used as a cryptographic key is selected (Fig. 1 - (2) Sifting).

There may be errors in the photon data sent by the transmitter due to noise while the photon was being transmitted. In the third step, errors in the data received by the receiver are corrected to prevent them from affecting later processing (Fig. 1 - (3) Error correction).

In the last step, after correcting errors for the received data, data is compressed to a size whose security can be guaranteed (Fig. 1 - (4) Privacy amplification)

The data compressed by privacy amplification is provided as a cryptographic key to the cryptographic communication server that performs encryption. This enables highly secure cryptographic communication.


Technologies for accelerating the steps involved in quantum key distribution generation


Now let's look at the Toshiba technologies used to accelerate each of these four cryptographic key generation steps.

First, we'll look at how to speed up step number one, "photon detection" (Fig. 1 - (1)).

The receiver, which detects photons, must be a highly sensitive detector in order to detect the extremely weak photons that carry the cryptographic key information. However, the more sensitive a detector is, the more susceptible it is to ambient noise, which prevents it from detecting photons that get drowned out by the noise.

Toshiba has tackled this problem by using Avalanche Photo Diodes (APDs), photo diodes with improved detection efficiency, as detectors. It has also developed self-differencing circuit technologies with embedded delay and difference circuits to eliminate periodic noise (*1) (Fig. 2).

These technologies improve photon detection efficiency, increasing the speed with which keys can be generated.

Now let's consider the next step, "sifting" (Fig. 1 - (2)).

First, the transmitter converts the photon data sent to the receiver in the previous step into an electrical signal and inputs it into the sifting process. The receiver, as well, converts the photon data received into an electrical signal and inputs it to the sifting process. The bit information selected through sifting is then passed on to the next step as data that can be used for the cryptographic key.

Here, Toshiba has developed specially-designed hardware circuits that optimize the processes involved in converting detected photons into electrical signals and sifting them. These circuits are built into both the transmitter and the receiver to process signals rapidly.

For the third step, "error correction" (Fig. 1 - (3)), we've moved to using the Low Density Parity Check (LDPC) error correction method.

This is simpler than the methods used in the past, and error correction is performed faster as the result of switching to an algorithm that supports parallel processing. The process is further accelerated by implementing LDPC using a hardware accelerator that has been improved to better handle quantum key distribution.

The last step, "privacy amplification" (Fig. 1 - (4)) involves high computational complexity and time-intensive computation. We've parallelized this computation to shorten the amount of time it takes to perform privacy amplification (*2).

By integrating the elemental technologies used in these cryptographic key generation steps, in 2017 we broke a new world record for key delivery: 13.7 Mbps (*3).


Stabilization technologies essential for transmitting weak photons


To continue sending cryptographic keys correctly, it is important that the transmission of photons is itself stable.

The signals sent in quantum key distribution are carried by photons, which are extremely weak. This makes it difficult to stably transmit photons when transmission is affected by outside factors.

In real-world environments, in particular, when photons are passed down optical fibers, they are easily affected by factors such as the ambient temperature or the vibration of the optical fibers themselves. These factors can change the phase or polarization of the light. This causes the bit error rate to increase and prevents the sending of accurate bit information.

To address this problem, Toshiba has developed stabilization control technology. This technology periodically sends stabilization pulses along the same optical fibers where the photons for keys pass through. The stabilization pulses is used to detect and eliminate any deviations during standard operation. This stabilization control technology lowers bit error rates and continuously stabilizes the distribution of keys (Fig. 3).

In this article, we've covered various technologies used in Toshiba's quantum key distribution systems to achieve the high speeds and stability. In the next article (part 3), we'll look at quantum key distribution network technologies and standardization activities.

*1 L.C. Comandar, B. Fröhlich, J.F. Dynes, A.W. Sharpe, M. Lucamarini, Z.L. Yuan, R. V. Penty, and A.J. Shields, “Gigahertz-gated InGaAs/InP single-photon detector with detection efficiency exceeding 55% at 1550 nm,” J. Appl. Phys. 117, 083109 (2015)
*2 R. Takahashi, Y. Tanizawa, A. R. Dixon, “Practical Implementation of Privacy Amplification in Quantum Key Distribution,” QCrypt 2019, Poster 77, (2019)
*3 Z. Yuan et al., "10-Mb/s Quantum Key Distribution," in Journal of Lightwave Technology, vol. 36, no. 16, pp. 3427-3433 (2018)

Mamiko Kujiraoka

Research scientist
Computer and Network Systems Laboratory
Corporate Research & Development Center
Toshiba Corporation


Since joining Toshiba, Mamiko Kujiraoka has been involved in the research and development of quantum computers. Since 2016, her research and development has been focused on quantum encryption.

  • The corporate names, organization names, job titles and other names and titles appearing in this article are those as of February 2022.

>> Related information

Related articles