About
👋 I'm Dr. Sarah Kaiser (she/her) and I love building cutting edge tech that can change…
Experience
Education
-
University of Waterloo
-
Activities and Societies: - Founding Member, Institute for Quantum Computing Equity and Inclusion committee 2015-2016 - Co-founder & Officer, FemPhys student group at University of Waterloo 2014-2015 - Officer, IQC Graduate student association 2014-2015 - Co-organizer, IQC Entrepreneurship club 2014 - University of Waterloo Chapter Officer, Optical Society of America 2014-2016 - Local Student Organizer,QCRYPT: Conference on Quantum Cryptography 2013
-
-
Activities and Societies: - Optical Society of America - Mathematical Association of America - Society of Physics Students - Sigma Pi Sigma - Sigma Zeta
Publications
-
Airborne demonstration of a quantum key distribution receiver payload
Quantum Science and Technology, 2, 2, 024009 (2017)
Satellite-based quantum terminals are a feasible way to extend the reach of quantum communication protocols such as quantum key distribution (QKD) to the global scale. To that end, prior demonstrations have shown QKD transmissions from airborne platforms to receivers on ground, but none have shown QKD transmissions from ground to a moving aircraft, the latter scenario having simplicity and flexibility advantages for a hypothetical satellite. Here, we demonstrate QKD from a ground transmitter to…
Satellite-based quantum terminals are a feasible way to extend the reach of quantum communication protocols such as quantum key distribution (QKD) to the global scale. To that end, prior demonstrations have shown QKD transmissions from airborne platforms to receivers on ground, but none have shown QKD transmissions from ground to a moving aircraft, the latter scenario having simplicity and flexibility advantages for a hypothetical satellite. Here, we demonstrate QKD from a ground transmitter to a receiver prototype mounted on an airplane in flight. We have specifically designed our receiver prototype to consist of many components that are compatible with the environment and resource constraints of a satellite. Coupled with our relocatable ground station system, optical links with distances of 3–10 km were maintained and quantum signals transmitted while traversing angular rates similar to those observed of low-Earth-orbit satellites. For some passes of the aircraft over the ground station, links were established within 10 s of position data transmission, and with link times of a few minutes and received quantum bit error rates typically ≈3%–5% , we generated secure keys up to 868 kb in length. By successfully generating secure keys over several different pass configurations, we demonstrate the viability of technology that constitutes a quantum receiver satellite payload and provide a blueprint for future satellite missions to build upon.
-
Laser damage creates backdoors in quantum communications
Phys. Rev. A94, 030302 (2016)
Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behavior on demand. We test it on two practical QC systems for key distribution and coin tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to…
Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behavior on demand. We test it on two practical QC systems for key distribution and coin tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to existing QC systems, and necessitates their testing to guarantee security.
-
Free-space quantum key distribution to a moving receiver
Optics ExpressVol. 23, Issue 26, pp. 33437 - 33447 (2015)
Technological realities limit terrestrial quantum key distribution (QKD) to single-link distances of a few hundred kilometers. One promising avenue for global-scale quantum communication networks is to use low-Earth-orbit satellites. Here we report the first demonstration of QKD from a stationary transmitter to a receiver platform traveling at an angular speed equivalent to a 600 km altitude satellite, located on a moving truck. We overcome the challenges of actively correcting beam pointing…
Technological realities limit terrestrial quantum key distribution (QKD) to single-link distances of a few hundred kilometers. One promising avenue for global-scale quantum communication networks is to use low-Earth-orbit satellites. Here we report the first demonstration of QKD from a stationary transmitter to a receiver platform traveling at an angular speed equivalent to a 600 km altitude satellite, located on a moving truck. We overcome the challenges of actively correcting beam pointing, photon polarization and time-of-flight. Our system generates an asymptotic secure key at 40 bits/s.
-
Experimental quantum key distribution with source flaws
Phys. Rev. A 92, 032305 (2015)
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be secure in practice. Here, we perform an experiment that for the first time…
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be secure in practice. Here, we perform an experiment that for the first time shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments and our theory can be applied to general QKD systems. These features constitute a step towards secure QKD with imperfect devices.
-
Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing
Phys. Rev. A 91, 032326
The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acín-Ribordy-Gisin 2004…
The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acín-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD we model both a strong attack using technology possible in principle and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed, the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.
Honors & Awards
-
Python Software Foundation Fellow
Python Software Foundataion
Sarah helps support the Python ecosystem by being phenomenal leaders, sustaining the growth of the Python scientific community, maintaining virtual Python communities, maintaining Python libraries, creating educational material, organizing Python events and conferences, starting Python communities in local regions, and overall being great mentors in our community. She continues to help make Python more accessible around the world. To learn more, see the blog…
Sarah helps support the Python ecosystem by being phenomenal leaders, sustaining the growth of the Python scientific community, maintaining virtual Python communities, maintaining Python libraries, creating educational material, organizing Python events and conferences, starting Python communities in local regions, and overall being great mentors in our community. She continues to help make Python more accessible around the world. To learn more, see the blog below:
https://pyfound.blogspot.com/2022/01/announcing-python-software-foundation.html -
Microsoft MVP
Microsoft
https://mvp.microsoft.com/en-us/PublicProfile/5003652
The MVP Award is a global program of recognized technology experts and community leaders who actively support technical communities through unique, innovative, and consistent knowledge sharing. These community leaders actively contribute to support the developer and IT Pro communities worldwide, helping them learn, build, and use our products. Learn below what seek for recognition in future community leaders.
Demonstrate…https://mvp.microsoft.com/en-us/PublicProfile/5003652
The MVP Award is a global program of recognized technology experts and community leaders who actively support technical communities through unique, innovative, and consistent knowledge sharing. These community leaders actively contribute to support the developer and IT Pro communities worldwide, helping them learn, build, and use our products. Learn below what seek for recognition in future community leaders.
Demonstrate community leadership and influence
Our program finds strength in diversity, inclusion, and positive influence. In all our interactions, we aspire to embody and champion these values as a program and as a community. Qualifying applicants must demonstrate leadership and ability to facilitate the sharing of knowledge with others, promote inclusive activities, and advance social good to support the community and under-represented groups.
Be a technical expert
Community leaders must have deep knowledge and expertise aligned to a Microsoft product or service or related open-source technologies. Through community work, qualifying applicants should be able to demonstrate their technical expertise.
Be a great advocate for the community
Leverage your technical expertise to advocate in the technical community. Qualifying applicants should generate local and global awareness that supports adoption and learning of Microsoft products & services through authentic connections, online/offline activities, and community enablement.
Contribute to the success of our products
Qualifying applicants should use their ability to discover and recommend improvements to Microsoft products & services through Microsoft official feedback channels (e.g., GitHub, Tech Community, etc.) or work on open-source extensions within the ecosystem. -
Equity and Inclusivity Award
University of Waterloo
https://uwaterloo.ca/faculty-association/status-women-equity-committee/swec-events/equity-inclusivity-award/past-recipients-swecs-equity-inclusivity-award
-
IQC David Johnston Award for Scientific Outreach
Institute for Quantum Computing, University of Waterloo
https://uwaterloo.ca/institute-for-quantum-computing/about/people/student-award-recipients#IQCDavidJohnston
-
Mike and Ophelia Lazaridis Fellowship
Institute for Quantum Computing
-
Best Poster Presentation
Sigma Zeta National Convention
-
Meritorious Award Winner
COMAP Competition
2009, 2010, 2011
Organizations
-
Q# Community
Co-founder, Maintainer
- Presentqsharp.community
-
Optical Society of America
-
- Present -
Society of Physics Students
-
- -
Mathematical Association of America
-
-
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Dr. Sarah Kaiser
1 other named Dr. Sarah Kaiser is on LinkedIn
See others named Dr. Sarah Kaiser