With the help of quantum key distribution (QKD), two distant peers are able to share information-theoretically secure key bits. Increasing key rate is ultimately significant for the applications of QKD in lossy channel. However, it has proved that there is a fundamental rate-distance limit, named linear bound, which limits the performance of all existing repeaterless protocols and realizations. Surprisingly, a recently proposed protocol, called twinfield (TF) QKD can beat linear bound with no need of quantum repeaters. Here, we present the first implementation of TF-QKD protocol and demonstrate its advantage of beating linear bound at the channel distance of 300 km. In our experiment, a modified TF-QKD protocol which does not assume phase post-selection is considered, and thus higher key rate than the original one is expected. After well controlling the phase evolution of the twin fields travelling hundreds of kilometers of optical fibres, the implemented system achieves high-visibility single-photon interference, and allows stable and high-rate measurement-device-independent QKD.Our experimental demonstration and results confirm the feasibility of the TF-QKD protocol and its prominent superiority in long distance key distribution services.
Twin-field quantum key distribution(TF-QKD) protocol and its variants, such as phase-matching QKD, sending-or-not-sending QKD and no phase post-selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications. However, there are still some gaps between theory and practice in these protocols. Concretely, a finite-key size analysis is still missing, and the intensity fluctuations are not taken into account. To address the finite-key size effect, we first give the key rate of NPP-TFQKD against collective attack in finite-key size region and then prove it can be against coherent attack. To deal with the intensity fluctuations, we present an analytical formula of 4-intensity decoy state NPP-TFQKD and a practical intensity fluctuation model. Finally, through detailed simulations, we show NPP-TFQKD can still keep its superiority of high key rate and long achievable distance.
Among the various versions of the twin-field quantum key distribution (TF-QKD) protocol [M.Lucamarini, Z. Yuan, J. Dynes, and A. Shields, Nature (London) 557, 400 (2018)] that can overcome the rate-distance limit, the TF-QKD without phase postselection proposed by Cui et al. [Phys. Rev. Appl. 11, 034053 (2019)] is an elegant TF-QKD that can provide high key rates since the postselection of global phases has been removed. However, the achievable distance of this variant is shorter than that of the original phase-matching QKD [X. Ma, P. Zeng, and H. Zhou, Phys. Rev. X 8, 031043 (2018)]. In this paper, we propose a method for improving its performance by introducing an additional decoy mode. The upper bound of the information leakage can be more tightly estimated; hence, both the key rate and the achievable distance are significantly improved. Interestingly, the operation of the proposed additional decoy mode is the same as that of the code mode; hence, it does not introduce difficulties into the experimental system. In addition, the improvement is substantial with finite decoy states, which is meaningful in practice.
Quantum key distribution (QKD) networks are promising to serve large numbers of users with information-theoretic secure communication. In QKD networks, the detection-safe protocol, termed measurement-device-independent (MDI) QKD, can naturally enhance realistic security by supporting untrusted measurement nodes. However, the environmental disturbances to quantum states degrade the performance of multi-user communication. Here we propose an MDI-QKD networking scheme with robustness against environmental disturbance and adaptability to multi-user access, where more than two users can generate keys simultaneously regardless of aligning reference frames and compensating channel disturbance on polarization. To achieve this, we introduce the reference-frame-independent protocol as well as a polarization-compensation-free method, design a multi-user measurement unit, and combine it with original two-user units. The scheme is experimentally demonstrated for the improvement of network robustness and adaptability in multi-user scenarios, and the time and device costs of disturbance compensation can be saved from O ( N ) to O ( 1 ) for an N-user network.
Twin-field quantum key distribution (TF-QKD) and its variant protocols are highly attractive due to the advantage of overcoming the rate-loss limit for secret key rates of point-to-point QKD protocols. For variations of TF-QKD, the key point to ensure security is switching randomly between a code mode and a test mode. Among all TF-QKD protocols, their code modes are very different, e.g. modulating continuous phases, modulating only two opposite phases, and sending or not sending signal pulses. Here we show that, by discretizing the number of global phases in the code mode, we can give a unified view on the first two types of TF-QKD protocols, and demonstrate that increasing the number of discrete phases extends the achievable distance, and as a trade-off, lowers the secret key rate at short distances due to the phase post-selection.
The parameters choosing (such as probabilities of choosing X-basis or Z-basis, intensity of signal state and decoy state, etc.) and system calibrating will be more challenging when the number of users of a measurement-device-independent quantum key distribution(MDI-QKD) network becomes larger. At present, people usually use optimization algorithms to search the best parameters. This method can find the optimized parameters accurately but may cost lots of time and hardware resources. It's a big problem in large scale MDI-QKD network. Here, we present a new method, using Back Propagation Artificial Neural Network(BPNN) to predict, rather than searching the optimized parameters. Compared with optimization algorithms, our BPNN is faster and more lightweight, it can save system resources. Another big problem brought by large scale MDI-QKD network is system recalibration. BPNN can support this work in real time, and it only needs to use some discarded data generated from communication process, rather than require us to add additional devices or scan the system
Untrusted node networks initially implemented by measurement-device-independent quantum key distribution (MDI-QKD) protocol are a crucial step on the roadmap of the quantum Internet. Considering extensive QKD implementations of trusted node networks, a workable upgrading tactic of existing networks toward MDI networks needs to be explicit. Here, referring to the nonstandalone (NSA) network of 5G, we propose an NSA-MDI scheme as an evolutionary selection for existing phase-encoding BB84 networks. Our solution can upgrade the BB84 networks and terminals that employ various phase-encoding schemes to immediately support MDI without hardware changes. This cost-effective upgrade effectively promotes the deployment of MDI networks as a step of untrusted node networks while taking full advantage of existing networks. In addition, the diversified demands on security and bandwidth are satisfied, and network survivability is improved.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.