ترغب بنشر مسار تعليمي؟ اضغط هنا

Overcoming the rate-distance barrier of quantum key distribution without using quantum repeaters

170   0   0.0 ( 0 )
 نشر من قبل Marco Lucamarini
 تاريخ النشر 2018
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

Quantum key distribution (QKD) allows two distant parties to share encryption keys with security based on physical laws. Experimentally, it has been implemented with optical means, achieving key rates of 1.26 Megabit/s over 50 kilometres (km) of standard optical fibre and 1.16 bit/hour over 404 km of ultralow-loss fibre in a measurement-device-independent configuration. Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, currently considered unfeasible without quantum repeaters, is overcoming the fundamental rate-distance limit of point-to-point QKD. Here we introduce a conceptually new scheme where pairs of phase-randomised optical fields are first generated at two distant locations and then combined at a central measuring station. The fields imparted with the same random phase are twins and can be employed to distil a quantum key, as we prove under an explicit security assumption. The key rate of this Twin-Field QKD (TF-QKD) shows the same dependence on distance as a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of whom is in control of the measuring station. Differently from a quantum repeater, however, the new scheme is feasible with current technology and presents manageable levels of noise even on 550 km of standard optical fibre. This is promising to overcome the QKD rate-distance barrier and to greatly extend the range of secure quantum communications.

قيم البحث

اقرأ أيضاً

Device-independent quantum key distribution (DIQKD) exploits the violation of a Bell inequality to extract secure key even if the users devices are untrusted. Currently, all DIQKD protocols suffer from the secret key capacity bound, i.e., the secret key rate scales linearly with the transmittance of two users. Here we propose a heralded DIQKD scheme based on entangled coherent states to improve entangling rates whereby long-distance entanglement is created by single-photon-type interference. The secret key rate of our scheme can significantly outperform the traditional two-photon-type Bell-state measurement scheme and, importantly, surpass the above capacity bound. Our protocol therefore is an important step towards a realization of DIQKD and can be a promising candidate scheme for entanglement swapping in future quantum internet.
A feasible route towards implementing long-distance quantum key distribution (QKD) systems relies on probabilistic schemes for entanglement distribution and swapping as proposed in the work of Duan, Lukin, Cirac, and Zoller (DLCZ) [Nature 414, 413 (2 001)]. Here, we calculate the conditional throughput and fidelity of entanglement for DLCZ quantum repeaters, by accounting for the DLCZ self-purification property, in the presence of multiple excitations in the ensemble memories as well as loss and other sources of inefficiency in the channel and measurement modules. We then use our results to find the generation rate of secure key bits for QKD systems that rely on DLCZ quantum repeaters. We compare the key generation rate per logical memory employed in the two cases of with and without a repeater node. We find the cross-over distance beyond which the repeater system outperforms the non-repeater one. That provides us with the optimum inter-node distancing in quantum repeater systems. We also find the optimal excitation probability at which the QKD rate peaks. Such an optimum probability, in most regimes of interest, is insensitive to the total distance.
62 - Yonggi Jo , Wonmin Son 2016
It is known that measurement-device-independent quantum key distribution (MDI-QKD) provides ultimate security from all types of side-channel attack against detectors at the expense of low key generation rate. Here, we propose MDI-QKD using 3-dimensio nal quantum states and show that the protocol improves the secret key rate under the analysis of mismatched-basis statistics. Specifically, we analyze security of the 3d-MDI-QKD protocol with uncharacterized sources, meaning that the original sources contain unwanted states instead of expected one. We simulate secret key rate of the protocol and identify the regime where the key rate is higher than the protocol with the qubit MDI-QKD.
63 - T.C. Ralph , N. Walk 2014
Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by class ical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. Whilst this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is considered we show it is possible to distribute an unconditionally secure secret key without sending a quantum signal, instead harnessing the intrinsic entanglement between different regions of space time. The protocol is practical in free space given horizon technology and might be testable in principle in the near term using microwave technology.
85 - Hao Shu 2021
Quantum key distribution(QKD) is an important area in quantum information theory. Nowadays, there are many protocols such as BB84 protocol, Lo-Chaus protocol and GR10 protocol. They usually require legitimated parties have the ability to create parti cles, using a sifting procedures (BB84, GR10), or must destroy entangled states (Lo-Chau). In this paper, we give a QKD scheme which can recycle entangled states and need not to run sifting procedures. The protocol use teleportation and mutual unbiased bases of qudits. Moreover, The scheme can be modified to add a third party who assumes all the states creating procedures and so the communicated parties need not to create states. This is in fact an entanglement distribution protocol. Also, the protocol can be modified for distributing key over arbitrary long distance. We compare our protocol with the previous protocols and discuss the security of it by corresponding to BB84 protocol.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا