The continuous-variable version of quantum key distribution (QKD) offers the advantages (over discrete-variable systems) of higher secret key rates in metropolitan areas as well as the use of standard telecom components that can operate at room temperature. An important step in the real-world adoption of continuous-variable QKD is the deployment of field tests over commercial fibers. Here we report two different field tests of a continuous-variable QKD system through commercial fiber networks in Xian and Guangzhou over distances of 30.02 km (12.48 dB) and 49.85 km (11.62 dB), respectively. We achieve secure key rates two orders-of-magnitude higher than previous field test demonstrations. This is achieved by developing a fully automatic control system to create stable excess noise and by applying a rate-adaptive reconciliation protocol to achieve a high reconciliation efficiency with high success probability. Our results pave the way to achieving continuous-variable QKD in a metropolitan setting.
Quantum key distribution provides secure keys resistant to code-breaking quantum computers. The continuous-variable version of quantum key distribution offers the advantages of higher secret key rates in metropolitan areas, as well as the use of standard telecom components that can operate at room temperature. However, the transmission distance of these systems (compared with discrete-variable systems) are currently limited and considered unsuitable for long-distance distribution. Herein, we report the experimental results of long distance continuous-variable quantum key distribution over 202.81 km of ultralow-loss optical fiber by suitably controlling the excess noise and employing highly efficient reconciliation procedures. This record-breaking implementation of the continuous-variable quantum key distribution doubles the previous distance record and shows the road for long-distance and large-scale secure quantum key distribution using room-temperature standard telecom components.
In a continuous-variable quantum key distribution (CV-QKD) protocol, which is based on heterodyne detection at the receiver, the application of a noiseless linear amplifier (NLA) on the received signal before the detection can be emulated by the post-selection of the detection outcome. Such a post-selection, which is also called a measurement-based NLA, requires a cut-off to produce a normalisable filter function. Increasing the cut-off with respect to the received signals results in a more faithful emulation of the NLA and nearly Gaussian output statistics at the cost of discarding more data. While recent works have shown the benefits of post-selection via an asymptotic security analysis, we undertake the first investigation of such a post-selection utilising a composable security proof in the realistic finite-size regime, where this trade-off is extremely relevant. We show that this form of post-selection can improve the secure range of a CV-QKD over lossy thermal channels if the finite block size is sufficiently large and that the optimal value for the filter cut-off is typically in the non-Gaussian regime. The relatively modest improvement in the finite-size regime as compared to the asymptotic case highlights the need for new tools to prove the security of non-Gaussian cryptographic protocols. These results also represent a quantitative assessment of a measurement-based NLA with an entangled-state input in both the Gaussian and non-Gaussian regime.
A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. We also derive a key-rate equation that is specific for this system. This equation provides bounds above the upper bound of secure key under finite-key-size analysis. From this equation and our experimental data, we show that the keys that have been distilled from the smaller sifted-key size fall above our bound. Thus, their security is not covered by finite-key-size analysis. Experimentally, we could consistently force the system to generate the key outside of the bound. We also test manufacturers software update. Although all the keys after the patch fall under our bound, their security cannot be guaranteed under this analysis. Our methodology can be used for security certification and standardization of QKD systems.
We present and analyze two pathways to produce commercial optical-fiber patch cords with stable long-term transmission in the ultraviolet (UV) at powers up to $sim$ 200 mW, and typical bulk transmission between 66-75%. Commercial fiber patch cords in the UV are of great interest across a wide variety of scientific applications ranging from biology to metrology, and the lack of availability has yet to be suitably addressed. We provide a guide to producing such solarization-resistant, hydrogen-passivated, polarization-maintaining, connectorized and jacketed optical fibers compatible with demanding scientific and industrial applications. Our presentation describes the fabrication and hydrogen loading procedure in detail and presents a high-pressure vessel design, calculations of required Ht loading times, and information on patch cord handling and the mitigation of bending sensitivities. Transmission at 313 nm is measured over many months for cumulative energy on the fiber output of > 10 kJ with no demonstrable degradation due to UV solarization, in contrast to standard uncured fibers. Polarization sensitivity and stability are characterized yielding polarization extinction ratios between 15 dB and 25 dB at 313 nm, where we find patch cords become linearly polarizing. We observe that particle deposition at the fiber facet induced by high-intensity UV exposure can (reversibly) deteriorate patch cord performance and describe a technique for nitrogen purging of fiber collimators which mitigates this phenomenon.
We report an experimental demonstration of effective entanglement in a prepare&measure type of quantum key distribution protocol. Coherent polarization states and heterodyne measurement to characterize the transmitted quantum states are used, thus enabling us to reconstruct directly their Q-function. By evaluating the excess noise of the states, we experimentally demonstrate that they fulfill a non-separability criterion previously presented by Rigas et al. [J. Rigas, O. Guhne, N. Lutkenhaus, Phys. Rev. A 73, 012341 (2006)]. For a restricted eavesdropping scenario we predict key rates using postselection of the heterodyne measurement results.