Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bottleneck throttling its real-life applications lies in the limited communication distance and key ...generation speed, due to the fact that the information carrier can be easily lost in the channel. For all the current implementations, the key rate is bounded by the channel transmission probabilityη. Rather surprisingly, by matching the phases of two coherent states and encoding the key information into the common phase, this linear key-rate constraint can be overcome—the secure key rate scales with the square root of the transmission probabilityO(η) , as proposed in twin-field quantum key distribution M. Lucamarini et al. Overcoming the Rate–Distance Limit of Quantum Key Distribution without Quantum Repeaters, Nature (London) 557, 400 (2018). To achieve this, we develop an optical-mode-based security proof that is different from the conventional qubit-based security proofs. Furthermore, the proposed scheme is measurement device independent; i.e., it is immune to all possible detection attacks. The simulation result shows that the key rate can even exceed the transmission probabilityηbetween two communication parties. In addition, we apply phase postcompensation to devise a practical version of the scheme without phase locking, which makes the proposed scheme feasible with the current technology. This means that quantum key distribution can enjoy both sides of the world—practicality and security.
Full text
Available for:
CMK, CTK, FMFMET, IJS, NUK, PNG, UL, UM, UPUK
Abstract
Quantum key distribution — the establishment of information-theoretically secure keys based on quantum physics — is mainly limited by its practical performance, which is characterised by the ...dependence of the key rate on the channel transmittance
R
(
η
). Recently, schemes based on single-photon interference have been proposed to improve the key rate to
$$R=O(\sqrt{\eta })$$
R
=
O
(
η
)
by overcoming the point-to-point secret key capacity bound with interferometers. Unfortunately, all of these schemes require challenging global phase locking to realise a stable long-arm single-photon interferometer with a precision of approximately 100 nm over fibres that are hundreds of kilometres long. Aiming to address this problem, we propose a mode-pairing measurement-device-independent quantum key distribution scheme in which the encoded key bits and bases are determined during data post-processing. Using conventional second-order interference, this scheme can achieve a key rate of
$$R=O(\sqrt{\eta })$$
R
=
O
(
η
)
without global phase locking when the local phase fluctuation is mild. We expect this high-performance scheme to be ready-to-implement with off-the-shelf optical devices.
Quantum key distribution (QKD)1,2 offers a long-term solution to secure key exchange. Due to photon loss in transmission, it was believed that the repeaterless key rate is bounded by a linear ...function of the transmittance, O(η) (refs. 3,4), limiting the maximal secure transmission distance5,6. Recently, a novel type of QKD scheme has been shown to beat the linear bound and achieve a key rate performance of O(η) (refs. 7–9). Here, by employing the laser injection technique and the phase post-compensation method, we match the modes of two independent lasers and overcome the phase fluctuation. As a result, the key rate surpasses the linear bound via 302 km and 402 km commercial-fibre channels, over four orders of magnitude higher than existing results5. Furthermore, our system yields a secret key rate of 0.118 bps with a 502 km ultralow-loss fibre. This new type of QKD pushes forward long-distance quantum communication for the future quantum internet.Phase-matching quantum key distribution is implemented with a 502 km ultralow-loss optical fibre. The fluctuations of the laser initial phases and frequencies are suppressed by the laser injection technique and the phase post-compensation method.
Full text
Available for:
FZAB, GEOZS, IJS, IMTLJ, IZUM, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
Quantum random number generators (QRNGs) output genuine random numbers based upon the uncertainty principle. A QRNG contains two parts in general-a randomness source and a readout detector. How to ...remove detector imperfections has been one of the most important questions in practical randomness generation. We propose a simple solution, measurement-device-independent QRNG, which not only removes all detector side channels but is robust against losses. In contrast to previous fully device-independent QRNGs, our scheme does not require high detector efficiency or nonlocality tests. Simulations show that our protocol can be implemented efficiently with a practical coherent state laser and other standard optical components. The security analysis of our QRNG consists mainly of two parts: measurement tomography and randomness quantification, where several new techniques are developed to characterize the randomness associated with a positive-operator valued measure.
Quantum random number generators can provide genuine randomness by appealing to the fundamental principles of quantum mechanics. In general, a physical generator contains two parts—a randomness ...source and its readout. The source is essential to the quality of the resulting random numbers; hence, it needs to be carefully calibrated and modeled to achieve information-theoretical provable randomness. However, in practice, the source is a complicated physical system, such as a light source or an atomic ensemble, and any deviations in the real-life implementation from the theoretical model may affect the randomness of the output. To close this gap, we propose a source-independent scheme for quantum random number generation in which output randomness can be certified, even when the source is uncharacterized and untrusted. In our randomness analysis, we make no assumptions about the dimension of the source. For instance, multiphoton emissions are allowed in optical implementations. Our analysis takes into account the finite-key effect with the composable security definition. In the limit of large data size, the length of the input random seed is exponentially small compared to that of the output random bit. In addition, by modifying a quantum key distribution system, we experimentally demonstrate our scheme and achieve a randomness generation rate of over 5×103bit/s .
Full text
Available for:
CMK, CTK, FMFMET, IJS, NUK, PNG, UL, UM, UPUK
Abstract
Quantum physics can be exploited to generate true random numbers, which have important roles in many applications, especially in cryptography. Genuine randomness from the measurement of a ...quantum system reveals the inherent nature of quantumness—coherence, an important feature that differentiates quantum mechanics from classical physics. The generation of genuine randomness is generally considered impossible with only classical means. On the basis of the degree of trustworthiness on devices, quantum random number generators (QRNGs) can be grouped into three categories. The first category, practical QRNG, is built on fully trusted and calibrated devices and typically can generate randomness at a high speed by properly modelling the devices. The second category is self-testing QRNG, in which verifiable randomness can be generated without trusting the actual implementation. The third category, semi-self-testing QRNG, is an intermediate category that provides a tradeoff between the trustworthiness on the device and the random number generation speed.
A protocol with the potential of beating the existing distance records for conventional quantum key distribution (QKD) systems is proposed. It borrows ideas from quantum repeaters by using memories ...in the middle of the link, and that of measurement-device-independent QKD, which only requires optical source equipment at the userʼs end. For certain memories with short access times, our scheme allows a higher repetition rate than that of quantum repeaters with single-mode memories, thereby requiring lower coherence times. By accounting for various sources of nonideality, such as memory decoherence, dark counts, misalignment errors, and background noise, as well as timing issues with memories, we develop a mathematical framework within which we can compare QKD systems with and without memories. In particular, we show that with the state-of-the-art technology for quantum memories, it is potentially possible to devise memory-assisted QKD systems that, at certain distances of practical interest, outperform current QKD implementations.
Decoy state quantum key distribution LO, Hoi-Kwong; XIONGFENG MA; KAI CHEN
Physical review letters,
06/2005, Volume:
94, Issue:
23
Journal Article
Peer reviewed
Open access
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in ...quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature.
Full text
Available for:
CMK, CTK, FMFMET, IJS, NUK, PNG, UM