Do you want to publish a course? Click here

Overcoming the rate-distance limit of device-independent quantum key distribution

251   0   0.0 ( 0 )
 Added by Hua-Lei Yin
 Publication date 2021
  fields Physics
and research's language is English




Ask ChatGPT about the research

Device-independent quantum key distribution (DIQKD) exploits the violation of a Bell inequality to extract secure key even if the users devices are untrusted. Currently, all DIQKD protocols suffer from the secret key capacity bound, i.e., the secret key rate scales linearly with the transmittance of two users. Here we propose a heralded DIQKD scheme based on entangled coherent states to improve entangling rates whereby long-distance entanglement is created by single-photon-type interference. The secret key rate of our scheme can significantly outperform the traditional two-photon-type Bell-state measurement scheme and, importantly, surpass the above capacity bound. Our protocol therefore is an important step towards a realization of DIQKD and can be a promising candidate scheme for entanglement swapping in future quantum internet.



rate research

Read More

Quantum key distribution (QKD) allows two distant parties to share encryption keys with security based on physical laws. Experimentally, it has been implemented with optical means, achieving key rates of 1.26 Megabit/s over 50 kilometres (km) of standard optical fibre and 1.16 bit/hour over 404 km of ultralow-loss fibre in a measurement-device-independent configuration. Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, currently considered unfeasible without quantum repeaters, is overcoming the fundamental rate-distance limit of point-to-point QKD. Here we introduce a conceptually new scheme where pairs of phase-randomised optical fields are first generated at two distant locations and then combined at a central measuring station. The fields imparted with the same random phase are twins and can be employed to distil a quantum key, as we prove under an explicit security assumption. The key rate of this Twin-Field QKD (TF-QKD) shows the same dependence on distance as a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of whom is in control of the measuring station. Differently from a quantum repeater, however, the new scheme is feasible with current technology and presents manageable levels of noise even on 550 km of standard optical fibre. This is promising to overcome the QKD rate-distance barrier and to greatly extend the range of secure quantum communications.
Measurement-device-independent quantum key distribution (MDI-QKD), based on two-photon interference, is immune to all attacks against the detection system and allows a QKD network with untrusted relays. Since the MDI-QKD protocol was proposed, fibre-based implementations have been rapidly developed towards longer distance, higher key rates, and network verification. However, owing to the effect of atmospheric turbulence, MDI-QKD over free-space channel remains experimentally challenging. Here, by developing the robust adaptive optics system, high precision time synchronization and frequency locking between independent photon sources located far apart, we realised the first free-space MDI-QKD over a 19.2-km urban atmospheric channel, which well exceeds the effective atmospheric thickness. Our experiment takes the first step towards satellite-based MDI-QKD. Moreover, the technology developed here opens the way to quantum experiments in free space involving long-distance interference of independent single photons.
We propose a method named as double-scanning method, to improve the key rate of measurement-device-independent quantum key distribution (MDI-QKD) drastically. In the method, two parameters are scanned simultaneously to tightly estimate the counts of single-photon pairs and the phase-flip error rate jointly. Numerical results show that the method in this work can improve the key rate by $35%-280%$ in a typical experimental set-up. Besides, we study the optimization of MDI-QKD protocol with all parameters including the source parameters and failure probability parameters, over symmetric channel or asymmetric channel. Compared with the optimized results with only the source parameters, the all-parameter-optimization method could improve the key rate by about $10%$.
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to distribute secret keys in an insecure network. It thus represents the ultimate form of cryptography, offering not only information-theoretic security against channel attacks, but also against attacks exploiting implementation loopholes. In recent years, much progress has been made towards realising the first DIQKD experiments, but current proposals are just out of reach of todays loophole-free Bell experiments. Here, we significantly narrow the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality. By using two randomly chosen key generating bases instead of one, we show that our protocol significantly improves over the original DIQKD protocol, enabling positive keys in the high noise regime for the first time. We also compute the finite-key security of the protocol for general attacks, showing that approximately 1E8 to 1E10 measurement rounds are needed to achieve positive rates using state-of-the-art experimental parameters. Our proposed DIQKD protocol thus represents a highly promising path towards the first realisation of DIQKD in practice.
We introduce a robust scheme for long-distance continuous-variable (CV) measurement-device-independent (MDI) quantum key distribution (QKD) in which we employ post-selection between distant parties communicating through the medium of an untrusted relay. We perform a security analysis that allows for general transmissivity and thermal noise variance of each link, in which we assume an eavesdropper performs a collective attack and controls the excess thermal noise in the channels. The introduction of post-selection enables the parties to sustain a secret key rate over distances exceeding those of existing CV MDI protocols. In the worst-case scenario in which the relay is positioned equidistant between them, we find that the parties may communicate securely over a range of 14 km in standard optical fiber. Our protocol helps to overcome the rate-distance limitations of previously proposed CV MDI protocols while maintaining many of their advantages.
comments
Fetching comments Fetching comments
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا