-
Quon Classical Simulation: Unifying Clifford, Matchgates and Entanglement
Authors:
Zixuan Feng,
Zhengwei Liu,
Fan Lu,
Ningfeng Wang
Abstract:
We propose a unified classical simulation framework for quantum circuits, termed Quon Classical Simulation (QCS), built upon the diagrammatic formalism of the Quon language. Central to this framework is the introduction of magic holes, a topological feature that captures the global source of computational hardness in simulating quantum systems. Unlike conventional measures, the complexity of QCS i…
▽ More
We propose a unified classical simulation framework for quantum circuits, termed Quon Classical Simulation (QCS), built upon the diagrammatic formalism of the Quon language. Central to this framework is the introduction of magic holes, a topological feature that captures the global source of computational hardness in simulating quantum systems. Unlike conventional measures, the complexity of QCS is governed by the topological entanglement entropy associated with these magic holes. We show that Clifford circuits and Matchgate circuits are free of magic holes and thus efficiently simulable within our model. To capture the interaction structure of magic holes, we define a topological tensor network representation and develop novel skein relations and reduction algorithms to simplify circuit representations. This approach significantly improves the efficiency of classical simulations and provides a unified explanation for the tractability of various known quantum circuit classes. Our work offers a new topological perspective on the classical simulability of quantum systems and topological complexity.
△ Less
Submitted 12 May, 2025;
originally announced May 2025.
-
Measurement-device-independent quantum key distribution with asymmetric sources
Authors:
Jia-Jv Deng,
Feng-Yu Lu,
Zhen-Qiu Zhong,
Xiao-Hai Zhan,
Zhen-Qiang Yin,
Shuang Wang,
Wei Chen,
De-Yong He,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD), which eliminates all the attacks from the eavesdropper to the measurement party, has been one of the most promising technology for the implementation of end-to-end quantum networks. In practice, the asymmetry of both sources and channels is generally inevitable. Therefore, we propose a theory to analyze the performance when any two…
▽ More
Measurement-device-independent quantum key distribution (MDI-QKD), which eliminates all the attacks from the eavesdropper to the measurement party, has been one of the most promising technology for the implementation of end-to-end quantum networks. In practice, the asymmetry of both sources and channels is generally inevitable. Therefore, we propose a theory to analyze the performance when any two MDI users in networks communicates using asymmetric sources in distinct single or multiple temporal modes. As a specific application, we model to obtain the key rate of MDI-QKD with weak coherent pulse source and spontaneous parametric down-conversion source, and compare the performance to the cases with symmetric (i.e. identical) sources. The result demonstrates that the actual performance does not degrade due to the asymmetry of sources. In contrary, it maintains at a good level over the entire distance we study. This work provides a theoretical basis for analyzing and optimizing MDI-QKD networks with asymmetric sources, and thus paving the way for the practical deployment of completely asymmetric MDI-QKD networks.
△ Less
Submitted 24 April, 2025; v1 submitted 20 April, 2025;
originally announced April 2025.
-
Implementing an information-theoretically secure Byzantine agreement with quantum signed message solution
Authors:
Yao Zhou,
Feng - Yu Lu,
Zhen - Qiang Yin,
Shuang Wang,
Wei Chen,
Guang - Can Guo,
Zheng - Fu Han
Abstract:
Byzantine agreement (BA) enables all honest nodes in a decentralized network to reach consensus. In the era of emerging quantum technologies, classical cryptography-based BA protocols face inherent security vulnerabilities. By leveraging the information-theoretic security of keys generated by quantum processing, such as quantum key distribution (QKD), and utilizing the one-time pad (OTP) and one-t…
▽ More
Byzantine agreement (BA) enables all honest nodes in a decentralized network to reach consensus. In the era of emerging quantum technologies, classical cryptography-based BA protocols face inherent security vulnerabilities. By leveraging the information-theoretic security of keys generated by quantum processing, such as quantum key distribution (QKD), and utilizing the one-time pad (OTP) and one-time universal hashing (OTUH) classical methods proposed in \cite{yin2023QDS}, we propose a quantum signed Byzantine agreement (QSBA) protocol based on the quantum signed message (QSM) scheme. This protocol achieves information-theoretic security using only QKD-shared key resources between network nodes, without requiring quantum entanglement or other advanced quantum resources. Compared to the recently proposed quantum Byzantine agreement (QBA) \cite{weng2023beatingQBA}, our QSBA achieves superior fault tolerance, extending the threshold from nearly 1/2 to an arbitrary number of malicious nodes. Furthermore, our QSBA significantly reduces communication complexity under the same number of malicious nodes. Simulation results in a 5-node twin-field QKD network highlight the efficiency of our protocol, showcasing its potential for secure and resource-efficient consensus in quantum networks.
△ Less
Submitted 8 February, 2025;
originally announced February 2025.
-
Quantum key distribution overcoming practical correlated intensity fluctuations
Authors:
Jia-Xuan Li,
Feng-Yu Lu,
Ze-Hao Wang,
Victor Zapatero,
Marcos Curty,
Shuang Wang,
Zhen-Qiang Yin,
Wei Chen,
De-Yong He,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Intensity correlations between neighboring pulses open a prevalent yet often overlooked security loophole in decoy-state quantum key distribution (QKD). As a solution, we present and experimentally demonstrate an intensity-correlation-tolerant QKD protocol that mitigates the negative effect that this phenomenon has on the secret key rate according to existing security analyses. Compared to previou…
▽ More
Intensity correlations between neighboring pulses open a prevalent yet often overlooked security loophole in decoy-state quantum key distribution (QKD). As a solution, we present and experimentally demonstrate an intensity-correlation-tolerant QKD protocol that mitigates the negative effect that this phenomenon has on the secret key rate according to existing security analyses. Compared to previous approaches, our method significantly enhances the robustness against correlations, notably improving both the maximum transmission distances and the achievable secret key rates across different scenarios. By relaxing constraints on correlation parameters, our protocol enables practical devices to counter intensity correlations. We experimentally demonstrate this first practical solution that directly overcomes this security vulnerability, establish the feasibility and efficacy of our proposal, taking a major step towards loophole-free and high-performance QKD.
△ Less
Submitted 23 January, 2025;
originally announced January 2025.
-
A Test of Empty Wave via Quantum Memory in a Weak Measurement Scheme
Authors:
Jian-Peng Dou,
Feng Lu,
Hao Tang,
Xiao-Wen Shang,
Xian-Min Jin
Abstract:
In quantum mechanics, a long-standing question remains: How does a single photon traverse double slits? One intuitive picture suggests that the photon passes through only one slit, while its wavefunction splits into an ``empty" wave and a ``full" wave. However, the reality of this empty wave is yet to be verified. Here, we present a novel experimental configuration that combines quantum memory and…
▽ More
In quantum mechanics, a long-standing question remains: How does a single photon traverse double slits? One intuitive picture suggests that the photon passes through only one slit, while its wavefunction splits into an ``empty" wave and a ``full" wave. However, the reality of this empty wave is yet to be verified. Here, we present a novel experimental configuration that combines quantum memory and weak measurement to investigate the nature of the empty wave. A single atomic excitation is probabilistically split between free space and a quantum memory, analogous to the two paths in a double-slit experiment. The quantum memory serves as a path detector, where single-photon Raman scattering is enhanced due to the presence of a stored spin wave, without collapsing the quantum state. This enhancement is recorded as classical information, and the spin wave stored in the quantum memory is retrieved twice, with an interference visibility of 79%. Unlike conventional weak measurement schemes, where weak values are detected during post-selection, our approach converts the weak value into classical information before interference takes place. Our results demonstrate the potential of quantum memory as a measurement device that preserves coherence while extracting partial information, offering new insights into quantum measurement.
△ Less
Submitted 20 September, 2024;
originally announced September 2024.
-
Regeneration of Spin Wave in Atomic Vapor
Authors:
Jian-Peng Dou,
Feng Lu,
Xiao-Wen Shang,
Hao Tang,
Xian-Min Jin
Abstract:
Conventionally, atomic vapor is perceived as a non-living system governed by the principles of thermodynamics and statistical physics. However, the demarcation line between life and non-life appears to be less distinct than previously thought. In a study of amplifying spin waves, we observe a phenomenon reminiscent of life: The atomic spin wave stored in atomic vapor has a capability of absorbing…
▽ More
Conventionally, atomic vapor is perceived as a non-living system governed by the principles of thermodynamics and statistical physics. However, the demarcation line between life and non-life appears to be less distinct than previously thought. In a study of amplifying spin waves, we observe a phenomenon reminiscent of life: The atomic spin wave stored in atomic vapor has a capability of absorbing energy from an external light source, and exhibits behaviors akin to active regeneration. We demonstrate that this regeneration significantly enhances the lifetime and retrieval efficiency of the spin wave, while concurrently the noise is effectively suppressed. Our results suggest that the regeneration mechanism holds promise for mitigating the pronounced decoherence typically encountered in spin waves carried by room-temperature media, therefore offering potential applications in the realms of quantum information and precision measurements at ambient conditions.
△ Less
Submitted 9 August, 2024;
originally announced August 2024.
-
Fully passive Measurement Device Independent Quantum Key Distribution
Authors:
Xiang Wang,
Feng-Yu Lu,
Ze-Hao Wang,
Zhen-Qiang Yin,
Shuang Wang,
Wei Chen,
De-Yong He,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD) can resist all attacks on the detection devices, but there are still some security issues related to the source side. One possible solution is to use the passive protocol to eliminate the side channels introduced by active modulators at the source. Recently, a fully passive QKD protocol has been proposed that can simultaneously achi…
▽ More
Measurement-device-independent quantum key distribution (MDI-QKD) can resist all attacks on the detection devices, but there are still some security issues related to the source side. One possible solution is to use the passive protocol to eliminate the side channels introduced by active modulators at the source. Recently, a fully passive QKD protocol has been proposed that can simultaneously achieve passive encoding and passive decoy-state modulation using linear optics. In this work, we propose a fully passive MDI-QKD scheme that can protect the system from both side channels of source modulators and attacks on the measurement devices, which can significantly improve the implementation security of the QKD systems. We provide a specific passive encoding strategy and a method for decoy-state analysis, followed by simulation results for the secure key rate in the asymptotic scenario. Our work offers a feasible way to improve the implementation security of QKD systems, and serves as a reference for achieving passive QKD schemes using realistic devices.
△ Less
Submitted 14 September, 2023;
originally announced September 2023.
-
Experimental demonstration of fully passive quantum key distribution
Authors:
Feng-Yu Lu,
Ze-Hao Wang,
Víctor Zapatero,
Jia-Lin Chen,
Shuang Wang,
Zhen-Qiang Yin,
Marcos Curty,
De-Yong He,
Rong Wang,
Wei Chen,
Guan-Jie Fan-Yuan,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
The passive approach to quantum key distribution (QKD) consists of removing all active modulation from the users' devices, a highly desirable countermeasure to get rid of modulator side-channels. Nevertheless, active modulation has not been completely removed in QKD systems so far, due to both theoretical and practical limitations. In this work, we present a fully passive time-bin encoding QKD sys…
▽ More
The passive approach to quantum key distribution (QKD) consists of removing all active modulation from the users' devices, a highly desirable countermeasure to get rid of modulator side-channels. Nevertheless, active modulation has not been completely removed in QKD systems so far, due to both theoretical and practical limitations. In this work, we present a fully passive time-bin encoding QKD system and report on the successful implementation of a modulator-free QKD link. According to the latest theoretical analysis, our prototype is capable of delivering competitive secret key rates in the finite key regime.
△ Less
Submitted 7 August, 2023; v1 submitted 23 April, 2023;
originally announced April 2023.
-
Induced-photorefractive attack against Quantum Key Distribution
Authors:
Peng Ye,
Wei Chen,
Guo-Wei Zhang,
Feng-Yu Lu,
Fang-Xiang Wang,
Guan-Zhong Huang,
Shuang Wang,
De-Yong He,
Zhen-Qiang Yin,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Lithium niobate (LiNbO3, LN) devices play critical roles in quantum information processing. However, for special applications like quantum key distribution (QKD), the characteristics of materials and devices and their impact on practical systems must be intensively inquired. For the first time, we reveal that the photorefractive effect in LN can be utilized as a potential loophole to carry out mal…
▽ More
Lithium niobate (LiNbO3, LN) devices play critical roles in quantum information processing. However, for special applications like quantum key distribution (QKD), the characteristics of materials and devices and their impact on practical systems must be intensively inquired. For the first time, we reveal that the photorefractive effect in LN can be utilized as a potential loophole to carry out malicious attacks by the eavesdroppers. We take a commercial LN-based variable optical attenuator as an example to demonstrate the method we named Induced-photorefractive attack (IPA) and propose two techniques to enable controllable attacks. Our results show that eavesdroppers can fulfill an efficient source-side attack by injecting an optimized irradiation beam with only several nanowatts, which is realistic when accessing commercial fiber channels. These measure and techniques can be employed for all individual and on-chip LN devices and initially explored a new security branch for system design and standardization of real-life QKD.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
Tight finite-key analysis for mode-pairing quantum key distribution
Authors:
Ze-Hao Wang,
Zhen-Qiang Yin,
Shuang Wang,
Rong Wang,
Feng-Yu Lu,
Wei Chen,
De-Yong He,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Mode-pairing quantum key distribution (MP-QKD) is a potential protocol that is not only immune to all possible detector side channel attacks, but also breaks the repeaterless rate-transmittance bound without needing global phase locking. Here we analyze the finite-key effect for the MP-QKD protocol with rigorous security proof against general attacks. Moreover, we propose a six-state MP-QKD protoc…
▽ More
Mode-pairing quantum key distribution (MP-QKD) is a potential protocol that is not only immune to all possible detector side channel attacks, but also breaks the repeaterless rate-transmittance bound without needing global phase locking. Here we analyze the finite-key effect for the MP-QKD protocol with rigorous security proof against general attacks. Moreover, we propose a six-state MP-QKD protocol and analyze its finite-key effect. The results show that the original protocol can break the repeaterless rate-transmittance bound with a typical finite number of pulses in practice. And our six-state protocol can improve the secret key rate significantly in long distance cases.
△ Less
Submitted 26 February, 2023;
originally announced February 2023.
-
Measurement-device-independent quantum key distribution for nonstandalone networks
Authors:
Guan-Jie Fan-Yuan,
Feng-Yu Lu,
Shuang Wang,
Zhen-Qiang Yin,
De-Yong He,
Zheng Zhou,
Jun Teng,
Wei Chen,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Untrusted node networks initially implemented by measurement-device-independent quantum key distribution (MDI-QKD) protocol are a crucial step on the roadmap of the quantum Internet. Considering extensive QKD implementations of trusted node networks, a workable upgrading tactic of existing networks toward MDI networks needs to be explicit. Here, referring to the nonstandalone (NSA) network of 5G,…
▽ More
Untrusted node networks initially implemented by measurement-device-independent quantum key distribution (MDI-QKD) protocol are a crucial step on the roadmap of the quantum Internet. Considering extensive QKD implementations of trusted node networks, a workable upgrading tactic of existing networks toward MDI networks needs to be explicit. Here, referring to the nonstandalone (NSA) network of 5G, we propose an NSA-MDI scheme as an evolutionary selection for existing phase-encoding BB84 networks. Our solution can upgrade the BB84 networks and terminals that employ various phase-encoding schemes to immediately support MDI without hardware changes. This cost-effective upgrade effectively promotes the deployment of MDI networks as a step of untrusted node networks while taking full advantage of existing networks. In addition, the diversified demands on security and bandwidth are satisfied, and network survivability is improved.
△ Less
Submitted 6 September, 2021; v1 submitted 2 September, 2021;
originally announced September 2021.
-
Unbalanced-basis-misalignment tolerant measurement-device-independent quantum key distribution
Authors:
Feng-Yu Lu,
Ze-Hao Wang,
Zhen-Qiang Yin,
Shuang Wang,
Rong Wang,
Guan-Jie Fan-Yuan,
Xiao-Juan Huang,
De-Yong He,
Wei Chen,
Zheng Zhou,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side. However, the protocol still keeps the strict assumptions on the source side that the four BB84-states must be perfectly prepared to ensure security. Some protocols release part of the assumptions in the encoding system to keep the practica…
▽ More
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side. However, the protocol still keeps the strict assumptions on the source side that the four BB84-states must be perfectly prepared to ensure security. Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced. In this work, we present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations. We have also experimentally demonstrated the protocol. The result indicates the high-performance and good security for its practical applications. Besides, its robustness and flexibility exhibit a good value for complex scenarios such as the QKD networks.
△ Less
Submitted 3 August, 2022; v1 submitted 26 August, 2021;
originally announced August 2021.
-
A universal simulating framework for quantum key distribution systems
Authors:
Guan-Jie Fan-Yuan,
Wei Chen,
Feng-Yu Lu,
Zhen-Qiang Yin,
Shuang Wang,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Quantum key distribution (QKD) provides a physical-based way to conciliate keys between remote users securely. Simulation is an essential method for designing and optimizing QKD systems. We develop a universal simulation framework based on quantum operator descriptions of photon signals and optical devices. The optical devices can be freely combined and driven by the photon excitation events, whic…
▽ More
Quantum key distribution (QKD) provides a physical-based way to conciliate keys between remote users securely. Simulation is an essential method for designing and optimizing QKD systems. We develop a universal simulation framework based on quantum operator descriptions of photon signals and optical devices. The optical devices can be freely combined and driven by the photon excitation events, which make it appropriate for arbitrary QKD systems in principle. Our framework focuses on realistic characters of optical devices and system structures. The imperfections of the devices and the non-local properties of a quantum system are taken into account when modeling. We simulate the single-photon and Hong-Ou-Mandel (HOM) interference optical units, which are fundamental of QKD systems. The results using this event-driven framework agree well with the theoretical results, which indicate its feasibility for QKD.
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
Twin-field quantum key distribution with passive-decoy state
Authors:
Jun Teng,
Feng-Yu Lu,
Zhen-Qiang Yin,
Guan-Jie Fan-Yuan,
Rong Wang,
Shuang Wang,
Wei Chen,
Wei Huang,
Bing-Jie Xu,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Twin-Field quantum key distribution (TF-QKD) and its variants, e.g. Phase-Matching QKD, Sending-or-not-sending QKD, and No Phase Post-Selection TFQKD promise high key rates at long distance to beat the rate distance limit without a repeater. The security proof of these protocols are based on decoy-state method, which is usually performed by actively modulating a variable optical attenuator togethe…
▽ More
Twin-Field quantum key distribution (TF-QKD) and its variants, e.g. Phase-Matching QKD, Sending-or-not-sending QKD, and No Phase Post-Selection TFQKD promise high key rates at long distance to beat the rate distance limit without a repeater. The security proof of these protocols are based on decoy-state method, which is usually performed by actively modulating a variable optical attenuator together with a random number generator in practical experiments, however, active-decoy schemes like this may lead to side channel and could open a security loophole. To enhance the source security of TF-QKD, in this paper, we propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method. And we present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD, and our scheme could reach satisfactory secret key rates with just a few photon detectors. This shows our work is meaningful in practice.
△ Less
Submitted 16 November, 2020; v1 submitted 14 November, 2020;
originally announced November 2020.
-
Finite-key analysis for twin-field quantum key distribution based on generalized operator dominance condition
Authors:
Rui-Qiang Wang,
Zhen-Qiang Yin,
Feng-Yu Lu,
Rong Wang,
Shuang Wang,
Wei Chen,
Wei Huang,
Bing-Jie Xu,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Quantum key distribution (QKD) can help two distant peers to share secret key bits, whose security is guaranteed by the law of physics. In practice, the secret key rate of a QKD protocol is always lowered with the increasing of channel distance, which severely limits the applications of QKD. Recently, twin-field (TF) QKD has been proposed and intensively studied, since it can beat the rate-distanc…
▽ More
Quantum key distribution (QKD) can help two distant peers to share secret key bits, whose security is guaranteed by the law of physics. In practice, the secret key rate of a QKD protocol is always lowered with the increasing of channel distance, which severely limits the applications of QKD. Recently, twin-field (TF) QKD has been proposed and intensively studied, since it can beat the rate-distance limit and greatly increase the achievable distance of QKD. Remarkalebly, K. Maeda et. al. proposed a simple finite-key analysis for TF-QKD based on operator dominance condition. Although they showed that their method is sufficient to beat the rate-distance limit, their operator dominance condition is not general, i.e. it can be only applied in three decoy states scenarios, which implies that its key rate cannot be increased by introducing more decoy states, and also cannot reach the asymptotic bound even in case of preparing infinite decoy states and optical pulses. Here, to bridge this gap, we propose an improved finite-key analysis of TF-QKD through devising new operator dominance condition. We show that by adding the number of decoy states, the secret key rate can be furtherly improved and approach the asymptotic bound. Our theory can be directly used in TF-QKD experiment to obtain higher secret key rate. Our results can be directly used in experiments to obtain higher key rates.
△ Less
Submitted 17 July, 2020;
originally announced July 2020.
-
Efficient decoy-states for the reference-frame-independent measurement-device-independent quantum key distribution
Authors:
Feng-Yu Lu,
Zhen-Qiang Yin,
Guan-Jie Fan-Yuan,
Rong Wang,
Hang Liu,
Shuang Wang,
Wei Chen,
De-Yong He
Abstract:
Reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) is a novel protocol which eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides. However, its performance may degrade notably due to statistical fluctuations, since more parameters, e.g. yields and error rates for mismatched-basis events, must be a…
▽ More
Reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) is a novel protocol which eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides. However, its performance may degrade notably due to statistical fluctuations, since more parameters, e.g. yields and error rates for mismatched-basis events, must be accumulated to monitor the security. In this work, we find that the original decoy-states method estimates these yields over pessimistically since it ignores the potential relations between different bases. Through processing parameters of different bases jointly, the performance of RFI-MDI-QKD is greatly improved in terms of secret key rate and achievable distance when statistical fluctuations are considered. Our results pave an avenue towards practical RFI-MDI-QKD.
△ Less
Submitted 4 May, 2020; v1 submitted 10 February, 2020;
originally announced February 2020.
-
Optimized protocol for twin-field quantum key distribution
Authors:
Rong Wang,
Zhen-Qiang Yin,
Feng-Yu Lu,
Shuang Wang,
Wei Chen,
Chun-Mei Zhang,
Wei Huang,
Bing-Jie Xu,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Twin-field quantum key distribution (TF-QKD) and its variant protocols are highly attractive due to the advantage of overcoming the rate-loss limit for secret key rates of point-to-point QKD protocols. For variations of TF-QKD, the key point to ensure security is switching randomly between a code mode and a test mode. Among all TF-QKD protocols, their code modes are very different, e.g. modulating…
▽ More
Twin-field quantum key distribution (TF-QKD) and its variant protocols are highly attractive due to the advantage of overcoming the rate-loss limit for secret key rates of point-to-point QKD protocols. For variations of TF-QKD, the key point to ensure security is switching randomly between a code mode and a test mode. Among all TF-QKD protocols, their code modes are very different, e.g. modulating continuous phases, modulating only two opposite phases, and sending or not sending signal pulses. Here we show that, by discretizing the number of global phases in the code mode, we can give a unified view on the first two types of TF-QKD protocols, and demonstrate that increasing the number of discrete phases extends the achievable distance, and as a trade-off, lowers the secret key rate at short distances due to the phase post-selection.
△ Less
Submitted 29 August, 2020; v1 submitted 15 April, 2019;
originally announced April 2019.
-
Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system
Authors:
Shuang Wang,
De-Yong He,
Zhen-Qiang Yin,
Feng-Yu Lu,
Chao-Han Cui,
Wei Chen,
Zheng Zhou,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
With the help of quantum key distribution (QKD), two distant peers are able to share information-theoretically secure key bits. Increasing key rate is ultimately significant for the applications of QKD in lossy channel. However, it has proved that there is a fundamental rate-distance limit, named linear bound, which limits the performance of all existing repeaterless protocols and realizations. Su…
▽ More
With the help of quantum key distribution (QKD), two distant peers are able to share information-theoretically secure key bits. Increasing key rate is ultimately significant for the applications of QKD in lossy channel. However, it has proved that there is a fundamental rate-distance limit, named linear bound, which limits the performance of all existing repeaterless protocols and realizations. Surprisingly, a recently proposed protocol, called twin-field (TF) QKD can beat linear bound with no need of quantum repeaters. Here, we present the first implementation of TF-QKD protocol and demonstrate its advantage of beating linear bound at the channel distance of 300 km. In our experiment, a modified TF-QKD protocol which does not assume phase post-selection is considered, and thus higher key rate than the original one is expected. After well controlling the phase evolution of the twin fields travelling hundreds of kilometers of optical fibres, the implemented system achieves high-visibility single-photon interference, and allows stable and high-rate measurement-device-independent QKD. Our experimental demonstration and results confirm the feasibility of the TF-QKD protocol and its prominent superiority in long distance key distribution services.
△ Less
Submitted 18 February, 2019;
originally announced February 2019.
-
Practical issues of twin-field quantum key distribution
Authors:
Feng-Yu Lu,
Zhen-Qiang Yin,
Rong-Wang,
Guan-Jie Fan-Yuan,
Shuang Wang,
De-Yong He,
Wei Chen,
1Wei Huang,
Bing-Jie Xu,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Twin-Field Quantum Key Distribution(TF-QKD) protocol and its variants, such as Phase-Matching QKD(PM-QKD), sending or not QKD(SNS-QKD) and No Phase Post-Selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications. However, there are still some gaps between theory and practice in these protocols. Concretely, a finite-key size analysis is still missing, and the intensity fluctuati…
▽ More
Twin-Field Quantum Key Distribution(TF-QKD) protocol and its variants, such as Phase-Matching QKD(PM-QKD), sending or not QKD(SNS-QKD) and No Phase Post-Selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications. However, there are still some gaps between theory and practice in these protocols. Concretely, a finite-key size analysis is still missing, and the intensity fluctuations are not taken into account. To address the finite-key size effect, we first give the key rate of NPP-TFQKD against collective attack in finite-key size region and then prove it can be against coherent attack. To deal with the intensity fluctuations, we present an analytical formula of 4-intensity decoy state NPP-TFQKD and a practical intensity fluctuation model. Finally, through detailed simulations, we show NPP-TFQKD can still keep its superiority of high key rate and long achievable distance.
△ Less
Submitted 16 April, 2019; v1 submitted 14 January, 2019;
originally announced January 2019.
-
Improving the performance of Twin-Field Quantum Key Distribution
Authors:
Feng-Yu Lu,
Zhen-Qiang Yin,
Chao-Han Cui,
Guan-Jie Fan-Yuan,
Rong Wang,
Shuang Wang,
Wei Chen,
De-Yong He,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Among the various versions of the twin-field quantum key distribution (TF-QKD) protocol [M.Lucamarini, Z. Yuan, J. Dynes, and A. Shields, Nature (London) 557, 400 (2018)] that can overcome the rate-distance limit, the TF-QKD without phase postselection proposed by Cui et al. [Phys. Rev. Appl. 11, 034053 (2019)] is an elegant TF-QKD that can provide high key rates since the postselection of global…
▽ More
Among the various versions of the twin-field quantum key distribution (TF-QKD) protocol [M.Lucamarini, Z. Yuan, J. Dynes, and A. Shields, Nature (London) 557, 400 (2018)] that can overcome the rate-distance limit, the TF-QKD without phase postselection proposed by Cui et al. [Phys. Rev. Appl. 11, 034053 (2019)] is an elegant TF-QKD that can provide high key rates since the postselection of global phases has been removed. However, the achievable distance of this variant is shorter than that of the original phase-matching QKD [X. Ma, P. Zeng, and H. Zhou, Phys. Rev. X 8, 031043 (2018)]. In this paper, we propose a method for improving its performance by introducing an additional decoy mode. The upper bound of the information leakage can be more tightly estimated; hence, both the key rate and the achievable distance are significantly improved. Interestingly, the operation of the proposed additional decoy mode is the same as that of the code mode; hence, it does not introduce difficulties into the experimental system. In addition, the improvement is substantial with finite decoy states, which is meaningful in practice.
△ Less
Submitted 5 September, 2019; v1 submitted 8 January, 2019;
originally announced January 2019.
-
Parameters optimization and real-time calibration of Measurement-Device-Independent Quantum Key Distribution Network based on Back Propagation Artificial Neural Network
Authors:
Feng-Yu Lu,
Zhen-Qiang Yin,
Chao Wang,
Chao-Han Cui,
Jun Teng,
Shuang Wang,
Wei Chen,
Wei Huang,
Bing-Jie Xu,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
The parameters choosing (such as probabilities of choosing X-basis or Z-basis, intensity of signal state and decoy state, etc.) and system calibrating will be more challenging when the number of users of a measurement-device-independent quantum key distribution(MDI-QKD) network becomes larger. At present, people usually use optimization algorithms to search the best parameters. This method can fin…
▽ More
The parameters choosing (such as probabilities of choosing X-basis or Z-basis, intensity of signal state and decoy state, etc.) and system calibrating will be more challenging when the number of users of a measurement-device-independent quantum key distribution(MDI-QKD) network becomes larger. At present, people usually use optimization algorithms to search the best parameters. This method can find the optimized parameters accurately but may cost lots of time and hardware resources. It's a big problem in large scale MDI-QKD network. Here, we present a new method, using Back Propagation Artificial Neural Network(BPNN) to predict, rather than searching the optimized parameters. Compared with optimization algorithms, our BPNN is faster and more lightweight, it can save system resources. Another big problem brought by large scale MDI-QKD network is system recalibration. BPNN can support this work in real time, and it only needs to use some discarded data generated from communication process, rather than require us to add additional devices or scan the system
△ Less
Submitted 20 December, 2018; v1 submitted 20 December, 2018;
originally announced December 2018.
-
Twin-field Quantum Key Distribution without Phase Post-Selection
Authors:
Chaohan Cui,
Zhen-Qiang Yin,
Rong Wang,
Feng-Yu Lu,
Wei Chen,
Shuang Wang,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
Twin-field quantum key distribution (TF-QKD) protocol and its variants, e.g. phase-matching (PM) QKD and TF-QKD based on sending or not sending, are highly attractive since they are able to overcome the well-known rate-loss limit for QKD protocols without repeater: $R=O(η)$ with $η$ standing for the channel transmittance. However, all these protocols require active phase randomization and post-sel…
▽ More
Twin-field quantum key distribution (TF-QKD) protocol and its variants, e.g. phase-matching (PM) QKD and TF-QKD based on sending or not sending, are highly attractive since they are able to overcome the well-known rate-loss limit for QKD protocols without repeater: $R=O(η)$ with $η$ standing for the channel transmittance. However, all these protocols require active phase randomization and post-selection that play an essential role together in their security proof. Counterintuitively, we find that in TF-QKD, beating the rate-loss limit is still possible even if phase randomization and post-selection in the coding mode are both removed, which means our final secure key rate $R=O(\sqrtη)$. Furthermore, our protocol is more feasible in practice and more promising according to its higher final key rate in the valid distance. Our security proof counters collective attack and can also counter coherent attack in asymptotical case
△ Less
Submitted 22 March, 2019; v1 submitted 6 July, 2018;
originally announced July 2018.
-
The visualization of the space probability distribution for a particle moving in a double ring-shaped Coulomb potential
Authors:
Yuan You,
Fa-Lin Lu,
Dong-Sheng Sun,
Chang-Yuan Chen,
Shi-Hai Dong
Abstract:
The analytical solutions to a double ring-shaped Coulomb potential (RSCP) are presented. The visualizations of the space probability distribution (SPD) are illustrated for the two-(contour) and three-dimensional (isosurface) cases. The quantum numbers (n, l, m) are mainly relevant for those quasi quantum numbers (n' ,l' ,m' ) via the double RSCP parameter c. The SPDs are of circular ring shape in…
▽ More
The analytical solutions to a double ring-shaped Coulomb potential (RSCP) are presented. The visualizations of the space probability distribution (SPD) are illustrated for the two-(contour) and three-dimensional (isosurface) cases. The quantum numbers (n, l, m) are mainly relevant for those quasi quantum numbers (n' ,l' ,m' ) via the double RSCP parameter c. The SPDs are of circular ring shape in spherical coordinates. The properties for the relative probability values (RPVs) P are also discussed. For example, when we consider the special case (n, l, m)=(6, 5, 0), the SPD moves towards two poles of axis z when the P increases. Finally, we discuss the different cases for the potential parameter b which is taken as negative and positive values for c>0 . Compared with the particular case b=0 , the SPDs are shrunk for b=-0.5 while spread out for b=0.5.
△ Less
Submitted 25 March, 2018;
originally announced March 2018.
-
The visualization of the space probability distribution for a moving particle I: in a single ring-shaped Coulomb potential
Authors:
Yuan You,
Fa-Lin Lu,
Dong-Sheng Sun,
Chang-Yuan Chen,
Shi-Hai Dong
Abstract:
We first present the exact solutions of the single ring-shaped Coulomb potential and then realize the visualizations of the space probability distribution for a moving particle within the framework of this potential. We illustrate the two-(contour) and three-dimensional (isosurface) visualizations for those specifically given quantum numbers (n, l, m) essentially related to those so-called quasi q…
▽ More
We first present the exact solutions of the single ring-shaped Coulomb potential and then realize the visualizations of the space probability distribution for a moving particle within the framework of this potential. We illustrate the two-(contour) and three-dimensional (isosurface) visualizations for those specifically given quantum numbers (n, l, m) essentially related to those so-called quasi quantum numbers (n',l',m') through changing the single ring-shaped Coulomb potential parameter b. We find that the space probability distributions (isosurface) of a moving particle for the special case and the usual case are spherical and circular ring-shaped, respectively by considering all variables in spherical coordinates. We also study the features of the relative probability values P of the space probability distributions. As an illustration, by studying the special case of the quantum numbers (n, l, m)=(6, 5, 1) we notice that the space probability distribution for a moving particle will move towards two poles of axis z as the relative probability value P increases. Moreover, we discuss the series expansion of the deformed spherical harmonics through the orthogonal and complete spherical harmonics and find that the principal component decreases gradually and other components will increase as the potential parameter b increases.
△ Less
Submitted 17 August, 2017;
originally announced August 2017.
-
Quantum Error Correction of Time-Correlated Errors
Authors:
Feng Lu,
Dan C. Marinescu
Abstract:
The complexity of the error correction circuitry forces us to design quantum error correction codes capable of correcting a single error per error correction cycle. Yet, time-correlated error are common for physical implementations of quantum systems; an error corrected during the previous cycle may reoccur later due to physical processes specific for each physical implementation of the qubits.…
▽ More
The complexity of the error correction circuitry forces us to design quantum error correction codes capable of correcting a single error per error correction cycle. Yet, time-correlated error are common for physical implementations of quantum systems; an error corrected during the previous cycle may reoccur later due to physical processes specific for each physical implementation of the qubits. In this paper we study quantum error correction for a restricted class of time-correlated errors in a spin-boson model. The algorithm we propose allows the correction of two errors per error correction cycle, provided that one of them is time-correlated. The algorithm can be applied to any stabilizer code when the two logical qubits $\mid 0_L>$ and $\mid 1_L>$ are entangled states of $2^{n}$ basis states in $\mathcal{H}_{2^n}$.
△ Less
Submitted 6 April, 2007; v1 submitted 26 May, 2006;
originally announced May 2006.
-
An R||C_{max} Quantum Scheduling Algorithm
Authors:
Feng Lu,
Dan C. Marinescu
Abstract:
Grover's search algorithm can be applied to a wide range of problems; even problems not generally regarded as searching problems, can be reformulated to take advantage of quantum parallelism and entanglement, and lead to algorithms which show a square root speedup over their classical counterparts.
In this paper, we discuss a systematic way to formulate such problems and give as an example a q…
▽ More
Grover's search algorithm can be applied to a wide range of problems; even problems not generally regarded as searching problems, can be reformulated to take advantage of quantum parallelism and entanglement, and lead to algorithms which show a square root speedup over their classical counterparts.
In this paper, we discuss a systematic way to formulate such problems and give as an example a quantum scheduling algorithm for an $R||C_{max}$ problem. $R||C_{max}$ is representative for a class of scheduling problems whose goal is to find a schedule with the shortest completion time in an unrelated parallel machine environment.
Given a deadline, or a range of deadlines, the algorithm presented in this paper allows us to determine if a solution to an $R||C_{max}$ problem with $N$ jobs and $M$ machines exists, and if so, it provides the schedule. The time complexity of the quantum scheduling algorithm is $\mathcal{O}(\sqrt{M^N})$ while the complexity of its classical counterpart is $\mathcal{O}(M^N)$.
△ Less
Submitted 29 September, 2006; v1 submitted 3 November, 2005;
originally announced November 2005.