ترغب بنشر مسار تعليمي؟ اضغط هنا

Heralded amplification of nonlocality via entanglement swapping for long-distance device-independent quantum key distribution

218   0   0.0 ( 0 )
 نشر من قبل Yoshiaki Tsujimoto
 تاريخ النشر 2019
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

To realize the practical implementation of device-independent quantum key distribution~(DIQKD), the main difficulty is that its security relies on the detection-loophole-free violation of the Clauser-Horne-Shimony-Holt~(CHSH) inequality, i.e. the CHSH value $S>2$, which is easily destroyed by the loss in transmission channels. One of the simplest methods to circumvent it is to utilize the entanglement swapping relay~(ESR). Here, we propose and experimentally test an improved version of the heralded nonlocality amplifier protocol based on the ESR, and numerically show that our scheme is much more robust against the transmission loss than the previously developed protocol. In the experiment, we observe that the obtained probability distribution is in excellent agreement with those expected by the numerical simulation with experimental parameters which are precisely characterized in a separate measurement. Moreover, we experimentally estimate the nonlocality of the heralded state after the transmission of 10~dB loss just before detection. It is estimated to be $S=2.104>2$, which indicates that our final state possesses strong nonlocality even with various experimental imperfections. Our result clarifies an important benchmark of the ESR protocol, and paves the way towards the long-distance realization of the loophole-free CHSH-violation as well as DIQKD.


قيم البحث

اقرأ أيضاً

In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploited to establish a shared key that is secure independently of the internal workings of the QKD devices. An experimental implementation of DIQKD, howev er, is still awaited, since hitherto all optical Bell tests are subject to the detection loophole, making the protocol unsecured. In particular, photon losses in the quantum channel represent a fundamental limitation for DIQKD. Here, we introduce a heralded qubit amplifier based on single-photon sources and linear optics that provides a realistic solution to overcome the problem of channel losses in Bell tests.
Measurement-device-independent quantum key distribution (MDI-QKD), based on two-photon interference, is immune to all attacks against the detection system and allows a QKD network with untrusted relays. Since the MDI-QKD protocol was proposed, fibre- based implementations have been rapidly developed towards longer distance, higher key rates, and network verification. However, owing to the effect of atmospheric turbulence, MDI-QKD over free-space channel remains experimentally challenging. Here, by developing the robust adaptive optics system, high precision time synchronization and frequency locking between independent photon sources located far apart, we realised the first free-space MDI-QKD over a 19.2-km urban atmospheric channel, which well exceeds the effective atmospheric thickness. Our experiment takes the first step towards satellite-based MDI-QKD. Moreover, the technology developed here opens the way to quantum experiments in free space involving long-distance interference of independent single photons.
We introduce a robust scheme for long-distance continuous-variable (CV) measurement-device-independent (MDI) quantum key distribution (QKD) in which we employ post-selection between distant parties communicating through the medium of an untrusted rel ay. We perform a security analysis that allows for general transmissivity and thermal noise variance of each link, in which we assume an eavesdropper performs a collective attack and controls the excess thermal noise in the channels. The introduction of post-selection enables the parties to sustain a secret key rate over distances exceeding those of existing CV MDI protocols. In the worst-case scenario in which the relay is positioned equidistant between them, we find that the parties may communicate securely over a range of 14 km in standard optical fiber. Our protocol helps to overcome the rate-distance limitations of previously proposed CV MDI protocols while maintaining many of their advantages.
Device-independent quantum key distribution (DIQKD) exploits the violation of a Bell inequality to extract secure key even if the users devices are untrusted. Currently, all DIQKD protocols suffer from the secret key capacity bound, i.e., the secret key rate scales linearly with the transmittance of two users. Here we propose a heralded DIQKD scheme based on entangled coherent states to improve entangling rates whereby long-distance entanglement is created by single-photon-type interference. The secret key rate of our scheme can significantly outperform the traditional two-photon-type Bell-state measurement scheme and, importantly, surpass the above capacity bound. Our protocol therefore is an important step towards a realization of DIQKD and can be a promising candidate scheme for entanglement swapping in future quantum internet.
Device-independent quantum key distribution (DIQKD) guarantees unconditional security of secret key without making assumptions about the internal workings of the devices used. It does so using the loophole-free violation of a Bells inequality. The pr imary challenge in realizing DIQKD in practice is the detection loophole problem that is inherent to photonic tests of Bells inequalities over lossy channels. We revisit the proposal of Curty and Moroder [Phys. Rev. A 84, 010304(R) (2011)] to use a linear optics-based entanglement-swapping relay (ESR) to counter this problem. We consider realistic models for the entanglement sources and photodetectors; more precisely, (a) polarization-entangled states based on pulsed spontaneous parametric downconversion (SPDC) sources with infinitely higher order multi-photon components and multimode spectral structure, and (b) on-off photodetectors with non-unit efficiencies and non-zero dark count probabilities. We show that the ESR-based scheme is robust against the above imperfections and enables positive key rates at distances much larger than what is possible otherwise.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا