Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 15 de 15
Filter
Add more filters










Publication year range
1.
Opt Express ; 31(16): 26301-26313, 2023 Jul 31.
Article in English | MEDLINE | ID: mdl-37710493

ABSTRACT

We have developed a simple time-bin phase encoding quantum key distribution system, using the optical injection locking technique. This setup incorporates both the merits of simplicity and stability in encoding, and immunity to channel disturbance. We have demonstrated the field implementation of quantum key distribution over long-distance deployed aerial fiber automatically. During the 70-day field test, we achieved approximately a 1.0 kbps secure key rate with stable performance. Our work takes an important step toward widespread implementation of QKD systems in diverse and complex real-life scenarios.

2.
Opt Express ; 31(16): 26335-26343, 2023 Jul 31.
Article in English | MEDLINE | ID: mdl-37710496

ABSTRACT

In this work, we present a new time-bin phase-encoding quantum key distribution (QKD), where the transmitter utilizes an inherently stable Sagnac-type interferometer, and has comparable electrical requirements to existing polarization or phase encoding schemes. This approach does not require intensity calibration and is insensitive to environmental disturbances, making it both flexible and high-performing. We conducted experiments with a compact QKD system to demonstrate the stability and secure key rate performance of the presented scheme. The results show a typical secure key rate of 6.2 kbps@20 dB and 0.4 kbps@30 dB with channel loss emulated by variable optical attenuators. A continuous test of 120-km fiber spool shows a stable quantum bit error rate of the time-bin basis within 0.4%∼0.6% over a consecutive 9-day period without any adjustment. This intrinsically stable and compatible scheme of time-bin phase encoding is extensively applicable in various QKD experiments, including BB84 and measurement-device-independent QKD.

3.
Opt Express ; 31(6): 9196-9210, 2023 Mar 13.
Article in English | MEDLINE | ID: mdl-37157494

ABSTRACT

The reference-frame-independent quantum key distribution (RFI-QKD) has the advantage of tolerating reference frames that slowly vary. It can generate secure keys between two remote users with slowly drifted and unknown reference frames. However, the drift of reference frames may inevitably compromise the performance of QKD systems. In the paper, we employ the advantage distillation technology (ADT) to the RFI-QKD and the RFI measurement-device-independent QKD (RFI MDI-QKD), and we then analyze the effect of ADT on the performance of decoy-state RFI-QKD and RFI MDI-QKD in both asymptotic and nonasymptotic cases. The simulation results show that ADT can significantly improve the maximum transmission distance and the maximum tolerable background error rate. Furthermore, the performance of RFI-QKD and RFI MDI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are taken into account. Our work combines the merits of the ADT and RFI-QKD protocols, which further enhances the robustness and practicability of QKD systems.

4.
Opt Express ; 31(26): 44501-44514, 2023 Dec 18.
Article in English | MEDLINE | ID: mdl-38178519

ABSTRACT

Conventional theoretical studies on the ground-state laser cooling of a trapped ion have mostly focused on the weak sideband coupling (WSC) regime, where the cooling rate is inverse proportional to the linewidth of the excited state. In a recent work [New J. Phys.23, 023018 (2021)10.1088/1367-2630/abe273], we proposed a theoretical framework to study the ground state cooling of a trapped ion in the strong sideband coupling (SSC) regime, under the assumption of a vanishing carrier transition. Here we extend this analysis to more general situations with nonvanishing carrier transitions, where we show that by properly tuning the coupling lasers a cooling rate proportional to the linewidth can be achieved. Our theoretical predictions closely agree with the corresponding exact solutions in the SSC regime, which provide an important theoretical guidance for sideband cooling experiments.

5.
Entropy (Basel) ; 24(4)2022 Mar 26.
Article in English | MEDLINE | ID: mdl-35455123

ABSTRACT

Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections in realistic devices that are not considered in the theoretical security proof may have an impact on the practical security of realistic HD-QKD systems. In this paper, we research the influence of a realistic intensity modulator on the practical security of HD-QKD systems with the decoy-state method and finite-key effects. We demonstrate that there is a certain impact in the secret key rate and the transmission distance when taking practical factors into security analysis.

6.
Entropy (Basel) ; 24(10)2022 Sep 23.
Article in English | MEDLINE | ID: mdl-37420359

ABSTRACT

Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution. However, the weak randomness in a practical QKD system may lower the secret key rate and limit its achievable communication distance, thus compromising its performance. In this paper, we analyze the effects of the weak randomness on the SNS TF-QKD. The numerical simulation shows that SNS TF-QKD can still have an excellent performance under the weak random condition: the secret key rate can exceed the PLOB boundary and achieve long transmission distances. Furthermore, our simulation results also show that SNS TF-QKD is more robust to the weak randomness loopholes than the BB84 protocol and the measurement-device-independent QKD (MDI-QKD). Our results emphasize that keeping the randomness of the states is significant to the protection of state preparation devices.

7.
Phys Rev Lett ; 127(18): 180501, 2021 Oct 29.
Article in English | MEDLINE | ID: mdl-34767433

ABSTRACT

Scaling up to a large number of qubits with high-precision control is essential in the demonstrations of quantum computational advantage to exponentially outpace the classical hardware and algorithmic improvements. Here, we develop a two-dimensional programmable superconducting quantum processor, Zuchongzhi, which is composed of 66 functional qubits in a tunable coupling architecture. To characterize the performance of the whole system, we perform random quantum circuits sampling for benchmarking, up to a system size of 56 qubits and 20 cycles. The computational cost of the classical simulation of this task is estimated to be 2-3 orders of magnitude higher than the previous work on 53-qubit Sycamore processor [Nature 574, 505 (2019)NATUAS0028-083610.1038/s41586-019-1666-5. We estimate that the sampling task finished by Zuchongzhi in about 1.2 h will take the most powerful supercomputer at least 8 yr. Our work establishes an unambiguous quantum computational advantage that is infeasible for classical computation in a reasonable amount of time. The high-precision and programmable quantum computing platform opens a new door to explore novel many-body phenomena and implement complex quantum algorithms.

8.
Entropy (Basel) ; 23(9)2021 Aug 25.
Article in English | MEDLINE | ID: mdl-34573728

ABSTRACT

Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD. However, the device imperfections may compromise its practical implementations. The goal of this paper is to make it robust against the state preparation flaws (SPFs) and side channels at the light source. We adopt the sending or not-sending (SNS) TF-QKD protocol to accommodate the SPFs and multiple optical modes in the emitted states. We analyze that the flaws of the phase modulation can be overcome by regarding the deviation of the phase as phase noise and eliminating it with the post-selection of phase. To overcome the side channels, we extend the generalized loss-tolerant (GLT) method to the four-intensity decoy-state SNS protocol. Remarkably, by decomposing of the two-mode single-photon states, the phase error rate can be estimated with only four parameters. The practical security of the SNS protocol with flawed and leaky source can be guaranteed. Our results might constitute a crucial step towards guaranteeing the practical implementation of the SNS protocol.

9.
Entropy (Basel) ; 23(5)2021 Apr 23.
Article in English | MEDLINE | ID: mdl-33922572

ABSTRACT

The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound. One variation called phase-matching QKD (PM-QKD) protocol employs discrete phase randomization and the phase post-compensation technique to improve the key rate quadratically. However, the discrete phase randomization opens a loophole to threaten the actual security. In this paper, we first introduce the unambiguous state discrimination (USD) measurement and the photon-number-splitting (PNS) attack against PM-QKD with imperfect phase randomization. Then, we prove the rigorous security of decoy state PM-QKD with discrete phase randomization. Simulation results show that, considering the intrinsic bit error rate and sifting factor, there is an optimal discrete phase randomization value to guarantee security and performance. Furthermore, as the number of discrete phase randomization increases, the key rate of adopting vacuum and one decoy state approaches infinite decoy states, the key rate between discrete phase randomization and continuous phase randomization is almost the same.

10.
Phys Rev Lett ; 123(19): 190501, 2019 Nov 08.
Article in English | MEDLINE | ID: mdl-31765197

ABSTRACT

Recent advances on quantum computing hardware have pushed quantum computing to the verge of quantum supremacy. Here, we bring together many-body quantum physics and quantum computing by using a method for strongly interacting two-dimensional systems, the projected entangled-pair states, to realize an effective general-purpose simulator of quantum algorithms. The classical computing complexity of this simulator is directly related to the entanglement generation of the underlying quantum circuit rather than the number of qubits or gate operations. We apply our method to study random quantum circuits, which allows us to quantify precisely the memory usage and the time requirements of random quantum circuits. We demonstrate our method by computing one amplitude for a 7×7 lattice of qubits with depth (1+40+1) on the Tianhe-2 supercomputer.

11.
Sci Rep ; 7(1): 15265, 2017 11 10.
Article in English | MEDLINE | ID: mdl-29127408

ABSTRACT

Boson sampling is strongly believed to be intractable for classical computers but solvable with photons in linear optics, which raises widespread concern as a rapid way to demonstrate the quantum supremacy. However, due to its solution is mathematically unverifiable, how to certify the experimental results becomes a major difficulty in the boson sampling experiment. Here, we develop a statistical analysis scheme to experimentally certify the collision-free boson sampling. Numerical simulations are performed to show the feasibility and practicability of our scheme, and the effects of realistic experimental conditions are also considered, demonstrating that our proposed scheme is experimentally friendly. Moreover, our broad approach is expected to be generally applied to investigate multi-particle coherent dynamics beyond the boson sampling.

12.
Opt Express ; 25(15): 16971-16980, 2017 Jul 24.
Article in English | MEDLINE | ID: mdl-28789196

ABSTRACT

The device-independent (DI) quantum key distribution (QKD) protocol requires minimal assumptions about the devices and its security relies on the violation of Bell inequalities, making it hard to realize in real world. Semi-device-independent (SDI) QKD protocol confines quantum state within finite dimensional Hilbert space, thus easier for implementation with existing experimental technology. In this paper, we propose a practical SDI prepare-and-measure BB84 protocol. By introducing min entropy for security proof, we obtain a security bound under the practical condition with finite resources. Numerical simulations imply the finite-key effect can not be ignored in the forthcoming SDI QKD experiment.

13.
Opt Express ; 24(19): 22159-68, 2016 Sep 19.
Article in English | MEDLINE | ID: mdl-27661950

ABSTRACT

The decoy-state high-dimensional quantum key distribution provides a practical secure way to share more private information with high photon-information efficiency. In this paper, based on detector-decoy method, we propose a detector-decoy high-dimensional quantum key distribution protocol. Employing threshold detectors and a variable attenuator, we can promise the security under Gsussian collective attacks with much simpler operations in practical implementation. By numerical evaluation, we show that without varying the source intensity, our protocol performs much better than one-decoy-state protocol and as well as the two-decoy-state protocol in the infinite-size regime. In the finite-size regime, our protocol can achieve better results. Specially, when the detector efficiency is lower, the advantage of the detector-decoy method becomes more prominent.

14.
Opt Express ; 24(18): 20763-73, 2016 Sep 05.
Article in English | MEDLINE | ID: mdl-27607679

ABSTRACT

Recently, a novel protocol named round-robin differential phase-shift (RRDPS) quantum key distribution [Nature 509, 475(2014)] has been proposed. It can estimate information leakage without monitoring bit error rate. In this paper, we study the performance of RRDPS using heralded single photon source (HSPS) without and with decoy-state method, then compare it with the performance of weak coherent pulses (WCPs). From numerical simulation, we can see that HSPS performs better especially for shorter packet and higher bit error rate. Moreover, we propose a general theory of decoy-state method for RRDPS protocol based on only three decoy states and one signal state. Taking WCPs as an example, the three-intensity decoy-state protocol can distribute secret keys over a distance of 128 km when the length of pulses packet is 32, which confirms great practical interest of our method.

15.
Opt Express ; 24(6): 6594-605, 2016 Mar 21.
Article in English | MEDLINE | ID: mdl-27136849

ABSTRACT

In recent years, a large quantity of work have been done to narrow the gap between theory and practice in quantum key distribution (QKD). However, most of them are focus on two-party protocols. Very recently, Yao Fu et al proposed a measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol and proved its security in the limit of infinitely long keys. As a step towards practical application for MDI-QCC, we design a biased decoy-state measurement-device-independent quantum cryptographic conferencing protocol and analyze the performance of the protocol in both the finite-key and infinite-key regime. From numerical simulations, we show that our decoy-state analysis is tighter than Yao Fu et al. That is, we can achieve the nonzero asymptotic secret key rate in long distance with approximate to 200km and we also demonstrate that with a finite size of data (say 1011 to 1013 signals) it is possible to perform secure MDI-QCC over reasonable distances.

SELECTION OF CITATIONS
SEARCH DETAIL
...