Artificial atoms shed light on the future of security

November 8, 2016, Joint Quantum Institute
Stylized depiction of quantum dots on a semiconductor surface based on an atomic-force microscope image. Credit: Joint Quantum Institute

From credit card numbers to bank account information, we transmit sensitive digital information over the internet every day. Since the 1990s, though, researchers have known that quantum computers threaten to disrupt the security of these transactions.

That's because predicts that these computers could do some calculations far faster than their conventional counterparts. This would let a quantum computer crack a common internet security system called public key cryptography.

This system lets two computers establish private connections hidden from potential hackers. In public key cryptography, every device hands out copies of its own public key, which is a piece of digital information. Any other device can use that public key to scramble a message and send it back to the first device. The first device is the only one that has another piece of information, its private key, which it uses to decrypt the message. Two computers can use this method to create a secure channel and send information back and forth.

A quantum computer could quickly calculate another device's private key and read its messages, putting every future communication at risk. But many scientists are studying how quantum physics can fight back and help create safer .

One promising method is quantum key distribution, which allows two parties to directly establish a secure channel with a single secret key. One way to generate the key is to use pairs of entangled photons—particles of light with a shared quantum connection. The entanglement guarantees that no one else can know the key, and if someone tries to eavesdrop, both parties will be tipped off.

Tobias Huber, a recently arrived JQI Experimental Postdoctoral Fellow, has been investigating how to reliably generate the entangled photons necessary for this secure communication. Huber is a graduate of the University of Innsbruck in Austria, where he was supervised by Gregor Weihs. They have frequently collaborated with JQI Fellow Glenn Solomon, who spent a semester at Innsbruck as a Fulbright Scholar. Over the past couple of years, they have been studying a particular source of entangled photons, called quantum dots.

A quantum dot is a tiny area in a semiconductor, just nanometers wide, that is embedded in another semiconductor. This small region behaves like an artificial atom. Just like in an atom, electrons in a quantum dot occupy certain discrete energy levels. If the quantum dot absorbs a photon of the right color, an electron can jump to a higher energy level. When it does, it leaves behind an open slot at the lower energy, which physicists call a hole. Eventually, the electron will decay to its original energy, emitting a photon and filling in the hole. The intermediate combination of the excited electron and the hole is called an exciton, and two excited electrons and two holes are called a biexciton. A biexciton will decay in a cascade, emitting a pair of photons.

Huber, Weihs, Solomon and several colleagues have developed a way to directly excite biexcitons in quantum dots using a sequence of laser pulses. The pulses make it possible to encode information in the pair of emitted photons, creating a connection between them known as time-bin entanglement. It's the best type of entanglement for transmitting quantum information through optical fibers because it doesn't degrade as easily as other types over long distances. Huber and his colleagues are the first to directly produce time-bin entangled photons from quantum dots.

In their latest work, published in Optics Express, they investigated how the presence of material imperfections surrounding the quantum dots influences this entanglement generation. Imperfections have their own electron energy levels and can steal an electron from a dot or donate an electron to fill a hole. Either way, the impurity prevents an exciton from decaying and emitting a photon, decreasing the number of photons that are ultimately released. To combat this loss, the team used a second laser to fill up the electron levels of the impurities and showed that this increased the number of photons released without compromising the entanglement between them.

The team says the new work is a step in the right direction to make quantum dots a viable source of entangled photons. Parametric down-conversion, a competitor that uses crystals to split the energy of one photon into two, occasionally produces two pairs of entangled photons instead of one. This could allow an eavesdropper to read an encrypted message without being detected. The absence of this drawback makes an excellent candidate for producing for quantum key distribution.

The advent of quantum computing brings new security challenges, but tools like are taking those challenges head-on. It's possible that, one day, we could have not only quantum computers, but quantum-secure communication lines, free from prying eyes.

Explore further: Researchers use quantum dots to manipulate light

More information: Tobias Huber et al. Effects of photo-neutralization on the emission properties of quantum dots, Optics Express (2016). DOI: 10.1364/OE.24.021794

Related Stories

Researchers use quantum dots to manipulate light

August 30, 2016

Leiden physicists have manipulated light with large artificial atoms, so-called quantum dots. Before, this has only been accomplished with actual atoms. It is an important step toward light-based quantum technology. The study ...

Quantum electronics: Two photons and chips

January 20, 2006

Scientists at Toshiba Research Europe Limited (Cambridge, UK) believe they are on to a way of producing entangled twins of photons using a simple semiconductor electronic device. Such a chip-based source of entangled photons ...

Three 'twisted' photons in 3 dimensions

February 29, 2016

Researchers at the Institute of Quantum Optics and Quantum Information, the University of Vienna, and the Universitat Autonoma de Barcelona have achieved a new milestone in quantum physics: they were able to entangle three ...

Researchers develop ideal single-photon source

September 7, 2015

With the help of a semiconductor quantum dot, physicists at the University of Basel have developed a new type of light source that emits single photons. For the first time, the researchers have managed to create a stream ...

JQI researchers create entangled photons from quantum dots

November 18, 2009

To exploit the quantum world to the fullest, a key commodity is entanglement—the spooky, distance-defying link that can form between objects such as atoms even when they are completely shielded from one another. Now, physicists ...

Recommended for you

How heavy elements come about in the universe

March 19, 2019

Heavy elements are produced during stellar explosion or on the surfaces of neutron stars through the capture of hydrogen nuclei (protons). This occurs at extremely high temperatures, but at relatively low energies. An international ...

Trembling aspen leaves could save future Mars rovers

March 18, 2019

Researchers at the University of Warwick have been inspired by the unique movement of trembling aspen leaves, to devise an energy harvesting mechanism that could power weather sensors in hostile environments and could even ...

Quantum sensing method measures minuscule magnetic fields

March 15, 2019

A new way of measuring atomic-scale magnetic fields with great precision, not only up and down but sideways as well, has been developed by researchers at MIT. The new tool could be useful in applications as diverse as mapping ...


Adjust slider to filter visible comments by rank

Display comments: newest first

5 / 5 (1) Nov 10, 2016
Good article. Note clarification on quantum computer code breaking is assigned to public/private key encoding. This coding scheme depends on very large primes. There is no published means of re-creating the primes used to create public/private keys. Note that the keys themselves are not the primes, but are derived from the primes. An exhaustive search of the primes and the creation of all the key pairs possible would take longer than the life of the universe to date. Since the public key is derived from both the prime pairs used, a reversal method might be developed to recreate both keys using a quantum computer. There is an assumption here that the solution can be coded for quantum computers. Another assumption is that a quantum computer will be constructed that has enough qbits (quantum bits) to make the calculation. (To date the number of qbits is about 4 and the needed number is about 100). Yet still another assumption is time needed. (Completely unknown, but faster than a PC)
not rated yet Nov 10, 2016
I just like the idea of an observation DDOS. This eyeball peering in to communications that sends the "observed" signal to communicators, so the communications stop. Its like something from a Douglas Adams novel.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.