-
Error-resilient Reversal of Quantum Chaotic Dynamics Enabled by Scramblons
Authors:
Yu-Chen Li,
Tian-Gang Zhou,
Shengyu Zhang,
Ze Wu,
Liqiang Zhao,
Haochuan Yin,
Xiaoxue An,
Hui Zhai,
Pengfei Zhang,
Xinhua Peng
Abstract:
The emergence of the arrow of time in quantum many-body systems stems from the inherent tendency of Hamiltonian evolution to scramble quantum information and increase entanglement. While, in principle, one might counteract this temporal directionality by engineering a perfectly inverted Hamiltonian to reverse entanglement growth, such a scenario is fundamentally unstable because even minor imperfe…
▽ More
The emergence of the arrow of time in quantum many-body systems stems from the inherent tendency of Hamiltonian evolution to scramble quantum information and increase entanglement. While, in principle, one might counteract this temporal directionality by engineering a perfectly inverted Hamiltonian to reverse entanglement growth, such a scenario is fundamentally unstable because even minor imperfections in the backward evolution can be exponentially amplified, a hallmark of quantum many-body chaos. Therefore, successfully reversing quantum many-body dynamics demands a deep understanding of the underlying structure of quantum information scrambling and chaotic dynamics. Here, by using solid-state nuclear magnetic resonance on a macroscopic ensemble of randomly interacting spins, we measure the out-of-time-ordered correlator (OTOC) and validate key predictions of scramblon theory, a universal theoretical framework for information scrambling. Crucially, this theory enables us to isolate and mitigate errors in the OTOC caused by imperfections in the backward evolution. As a result, this protocol uncovers the anticipated exponential behavior of quantum many-body chaos and extracts the quantum Lyapunov exponent in a many-body experimental system for the first time. Our results push the fundamental limits of dynamical reversibility of complex quantum systems, with implications for quantum simulation and metrology.
△ Less
Submitted 24 June, 2025;
originally announced June 2025.
-
Time-bin encoded quantum key distribution over 120 km with a telecom quantum dot source
Authors:
Jipeng Wang,
Joscha Hanel,
Zenghui Jiang,
Raphael Joos,
Michael Jetter,
Eddy Patrick Rugeramigabo,
Simone Luca Portalupi,
Peter Michler,
Xiao-Yu Cao,
Hua-Lei Yin,
Shan Lei,
Jingzhong Yang,
Michael Zopf,
Fei Ding
Abstract:
Quantum key distribution (QKD) with deterministic single photon sources has been demonstrated over intercity fiber and free-space channels. The previous implementations relied mainly on polarization encoding schemes, which are susceptible to birefringence, polarization-mode dispersion and polarization-dependent loss in practical fiber networks. In contrast, time-bin encoding offers inherent robust…
▽ More
Quantum key distribution (QKD) with deterministic single photon sources has been demonstrated over intercity fiber and free-space channels. The previous implementations relied mainly on polarization encoding schemes, which are susceptible to birefringence, polarization-mode dispersion and polarization-dependent loss in practical fiber networks. In contrast, time-bin encoding offers inherent robustness and has been widely adopted in mature QKD systems using weak coherent laser pulses. However, its feasibility in conjunction with a deterministic single-photon source has not yet been experimentally demonstrated. In this work, we construct a time-bin encoded QKD system employing a high-brightness quantum dot (QD) single-photon source operating at telecom wavelength. Our proof-of-concept experiment successfully demonstrates the possibility of secure key distribution over fiber link of 120 km, while maintaining extraordinary long-term stability over 6 hours of continuous operation. This work provides the first experimental validation of integrating a quantum dot single-photon source with time-bin encoding in a telecom-band QKD system. In addition, it demonstrates the highest secure key rate among the time-bin QKDs based on single-photon sources. This development signifies a substantial advancement in the establishment of a robust and scalable QKD network based on solid-state single-photon technology
△ Less
Submitted 18 June, 2025;
originally announced June 2025.
-
Experimental relativistic zero-knowledge proofs with unconditional security
Authors:
Chen-Xun Weng,
Ming-Yang Li,
Nai-Rui Xu,
Yanglin Hu,
Ian George,
Jiawei Wu,
Shengjun Wu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Zero-knowledge proofs (ZKPs) are widely applied in digital economies, such as cryptocurrencies and smart contracts, for establishing trust and ensuring privacy between untrusted parties. However, almost all ZKPs rely on unproven computational assumptions or are vulnerable to quantum adversaries. We propose and experimentally implement an unconditionally secure ZKP for the graph three-coloring prob…
▽ More
Zero-knowledge proofs (ZKPs) are widely applied in digital economies, such as cryptocurrencies and smart contracts, for establishing trust and ensuring privacy between untrusted parties. However, almost all ZKPs rely on unproven computational assumptions or are vulnerable to quantum adversaries. We propose and experimentally implement an unconditionally secure ZKP for the graph three-coloring problem by combining subset relativistic bit commitments with quantum nonlocality game. Our protocol achieves a linear relationship between interactive rounds and the number of edges, reducing round complexity and storage requirements by thirteen orders of magnitude, thereby significantly enhancing practical feasibility. Our work illustrates the powerful potential of integrating special relativity with quantum theory in trustless cryptography, paving the way for robust applications against quantum attacks in distrustful internet environments.
△ Less
Submitted 30 January, 2025;
originally announced January 2025.
-
Practical quantum federated learning and its experimental demonstration
Authors:
Zhi-Ping Liu,
Xiao-Yu Cao,
Hao-Wen Liu,
Xiao-Ran Sun,
Yu Bao,
Yu-Shuo Lu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Federated learning is essential for decentralized, privacy-preserving model training in the data-driven era. Quantum-enhanced federated learning leverages quantum resources to address privacy and scalability challenges, offering security and efficiency advantages beyond classical methods. However, practical and scalable frameworks addressing privacy concerns in the quantum computing era remain und…
▽ More
Federated learning is essential for decentralized, privacy-preserving model training in the data-driven era. Quantum-enhanced federated learning leverages quantum resources to address privacy and scalability challenges, offering security and efficiency advantages beyond classical methods. However, practical and scalable frameworks addressing privacy concerns in the quantum computing era remain undeveloped. Here, we propose a practical quantum federated learning framework on quantum networks, utilizing distributed quantum secret keys to protect local model updates and enable secure aggregation with information-theoretic security. We experimentally validate our framework on a 4-client quantum network with a scalable structure. Extensive numerical experiments on both quantum and classical datasets show that adding a quantum client significantly enhances the trained global model's ability to classify multipartite entangled and non-stabilizer quantum datasets. Simulations further demonstrate scalability to 200 clients with classical models trained on the MNIST dataset, reducing communication costs by $75\%$ through advanced model compression techniques and achieving rapid training convergence. Our work provides critical insights for building scalable, efficient, and quantum-secure machine learning systems for the coming quantum internet era.
△ Less
Submitted 22 January, 2025;
originally announced January 2025.
-
Observation of continuous time crystals and quasi-crystals in spin gases
Authors:
Ying Huang,
Tishuo Wang,
Haochuan Yin,
Min Jiang,
Zhihuang Luo,
Xinhua Peng
Abstract:
Continuous time crystal (CTC) and quasi-crystal (CTQC) are two novel phases of matter characterized by the spontaneous breaking of continuous time-translation symmetry. To date, realizations of CTCs with periodic oscillations have been reported in only a few physical platforms, and their complex properties still require further exploration. Additionally, CTQCs, which feature quasi-periodic oscilla…
▽ More
Continuous time crystal (CTC) and quasi-crystal (CTQC) are two novel phases of matter characterized by the spontaneous breaking of continuous time-translation symmetry. To date, realizations of CTCs with periodic oscillations have been reported in only a few physical platforms, and their complex properties still require further exploration. Additionally, CTQCs, which feature quasi-periodic oscillations at multiple incommensurate frequencies, remain elusive. Here we report the experimental observation of CTC and CTQC signatures in noble-gas nuclear spins that interact nonlinearly with each other through feedback mechanisms. The observed limit cycle and quasi-periodic phases display persistent spin oscillations with coherence times extending beyond several hours. Notably, these oscillations are robust against noise perturbations and exhibit random time phases upon repetitive realization, epitomizing the continuous time-translation symmetry-breaking intrinsic to CTCs and CTQCs. As the feedback strength increases, the system undergoes a phase transition into a new phase characterized by chaotic oscillations, indicative of the ``melting" of time crystals. Interestingly, within certain feedback regimes, we even observe an unusual reverse phase transition from a chaotic phase back to time crystal phases. This work broadens the catalog of new phases of spin gas and unlocks opportunities in precision measurements, including multimode masers and tests of fundamental symmetries.
△ Less
Submitted 29 November, 2024;
originally announced November 2024.
-
Experimental coherent-state quantum secret sharing with finite pulses
Authors:
Yuan-Zhuo Wang,
Xiao-Ran Sun,
Xiao-Yu Cao,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum secret sharing (QSS) plays a significant role in multiparty quantum communication and is a crucial component of future quantum multiparty computing networks. Therefore, it is highly valuable to develop a QSS protocol that offers both information-theoretic security and validation in real optical systems under a finite-key regime. In this work, we propose a three-user QSS protocol based on p…
▽ More
Quantum secret sharing (QSS) plays a significant role in multiparty quantum communication and is a crucial component of future quantum multiparty computing networks. Therefore, it is highly valuable to develop a QSS protocol that offers both information-theoretic security and validation in real optical systems under a finite-key regime. In this work, we propose a three-user QSS protocol based on phase-encoding technology. By adopting symmetric procedures for the two players, our protocol resolves the security loopholes introduced by asymmetric basis choice without prior knowledge of the identity of the malicious player. Kato's concentration inequality is exploited to provide security against coherent attacks with the finite-key effect. Moreover, the practicality of our protocol has been validated under a 30-dB channel loss with a transmission distance of 5-km fiber. Our protocol achieves secure key rates ranging from 432 to 192 bps by choosing different pulse intensities and basis selection probabilities. Offering enhanced security and practicality, our protocol stands as an essential element for the realization of quantum multiparty computing networks.
△ Less
Submitted 8 October, 2024;
originally announced October 2024.
-
Generalized one-way function and its application
Authors:
Hua-Lei Yin
Abstract:
One-way functions are fundamental to classical cryptography and their existence remains a longstanding problem in computational complexity theory. Recently, a provable quantum one-way function has been identified, which maintains its one-wayness even with unlimited computational resources. Here, we extend the mathematical definition of functions to construct a generalized one-way function by virtu…
▽ More
One-way functions are fundamental to classical cryptography and their existence remains a longstanding problem in computational complexity theory. Recently, a provable quantum one-way function has been identified, which maintains its one-wayness even with unlimited computational resources. Here, we extend the mathematical definition of functions to construct a generalized one-way function by virtually measuring the qubit of provable quantum one-way function and randomly assigning the corresponding measurement outcomes with identical probability. Remarkably, using this generalized one-way function, we have developed an unconditionally secure key distribution protocol based solely on classical data processing, which can then utilized for secure encryption and signature. Our work highlights the importance of information in characterizing quantum systems and the physical significance of the density matrix. We demonstrate that probability theory and randomness are effective tools for countering adversaries with unlimited computational capabilities.
△ Less
Submitted 24 August, 2024;
originally announced August 2024.
-
Unconditionally secure key distribution without quantum channel
Authors:
Hua-Lei Yin
Abstract:
Key distribution plays a fundamental role in cryptography. Currently, the quantum scheme stands as the only known method for achieving unconditionally secure key distribution. This method has been demonstrated over distances of 508 and 1002 kilometers in the measurement-device-independent and twin-field configurations, respectively. However, quantum key distribution faces transmission distance iss…
▽ More
Key distribution plays a fundamental role in cryptography. Currently, the quantum scheme stands as the only known method for achieving unconditionally secure key distribution. This method has been demonstrated over distances of 508 and 1002 kilometers in the measurement-device-independent and twin-field configurations, respectively. However, quantum key distribution faces transmission distance issues and numerous side channel attacks since the basic physical picture requires the use of quantum channels between users. Even when quantum repeater and quantum constellation are used, commercializing quantum cryptography on a large scale remains unattainable due to the considerable expense and significant technical hurdles associated with establishing a global quantum network and facilitating mobile quantum communication. Here, by discovering the provable quantum one-way function, we propose another key distribution scheme with unconditional security, named probability key distribution, that promises users between any two distances to generate a fixed and high secret key rate. There are no quantum channels for exchanging quantum signals between two legitimate users. Non-local entangled states can be generated, identified and measured in the equivalent virtual protocol and can be used to extract secret keys. We anticipate that this discovery presents a paradigm shift in achieving unconditionally secure cryptography, thereby facilitating its widespread application on a global scale.
△ Less
Submitted 24 August, 2024;
originally announced August 2024.
-
Source-independent quantum secret sharing with entangled photon pair networks
Authors:
Yi-Ran Xiao,
Zhao-Ying Jia,
Yu-Chen Song,
Yu Bao,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
The large-scale deployment of quantum secret sharing (QSS) in quantum networks is currently challenging due to the requirements for the generation and distribution of multipartite entanglement states. Here we present an efficient source-independent QSS protocol utilizing entangled photon pairs in quantum networks. Through the post-matching method, which means the measurement events in the same bas…
▽ More
The large-scale deployment of quantum secret sharing (QSS) in quantum networks is currently challenging due to the requirements for the generation and distribution of multipartite entanglement states. Here we present an efficient source-independent QSS protocol utilizing entangled photon pairs in quantum networks. Through the post-matching method, which means the measurement events in the same basis are matched, the key rate is almost independent of the number of participants. In addition, the unconditional security of our QSS against internal and external eavesdroppers can be proved by introducing an equivalent virtual protocol. Our protocol has great performance and technical advantages in future quantum networks.
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
Post-Measurement Pairing Quantum Key Distribution with Local Optical Frequency Standard
Authors:
Chengfang Ge,
Lai Zhou,
Jinping Lin,
Hua-Lei Yin,
Qiang Zeng,
Zhiliang Yuan
Abstract:
The idea of post-measurement coincidence pairing simplifies substantially long-distance, repeater-like quantum key distribution (QKD) by eliminating the need for tracking the differential phase of the users' lasers. However, optical frequency tracking remains necessary and can become a severe burden in future deployment of multi-node quantum networks. Here, we resolve this problem by referencing e…
▽ More
The idea of post-measurement coincidence pairing simplifies substantially long-distance, repeater-like quantum key distribution (QKD) by eliminating the need for tracking the differential phase of the users' lasers. However, optical frequency tracking remains necessary and can become a severe burden in future deployment of multi-node quantum networks. Here, we resolve this problem by referencing each user's laser to an absolute frequency standard and demonstrate a practical post-measurement pairing QKD with excellent long-term stability. We confirm the setup's repeater-like behavior and achieve a finite-size secure key rate (SKR) of 15.94 bit/s over 504 km fiber, which overcomes the absolute repeaterless bound by 1.28 times. Over a fiber length 100 km, the setup delivers an impressive SKR of 285.68 kbit/s. Our work paves the way towards an efficient muti-user quantum network with the local frequency standard.
△ Less
Submitted 20 July, 2024;
originally announced July 2024.
-
Asynchronous measurement-device-independent quantum digital signatures
Authors:
Jing-Wei Bian,
Bing-Hong Li,
Yuan-Mei Xie,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum digital signatures (QDSs), which distribute and measure quantum states by key generation protocols and then sign messages via classical data processing, are a key area of interest in quantum cryptography. However, the practical implementation of a QDS network has many challenges, including complex interference technical requirements, linear channel loss of quantum state transmission, and p…
▽ More
Quantum digital signatures (QDSs), which distribute and measure quantum states by key generation protocols and then sign messages via classical data processing, are a key area of interest in quantum cryptography. However, the practical implementation of a QDS network has many challenges, including complex interference technical requirements, linear channel loss of quantum state transmission, and potential side-channel attacks on detectors. Here, we propose an asynchronous measurement-device-independent (MDI) QDS protocol with asynchronous two-photon interference strategy and one-time universal hashing method. The two-photon interference approach protects our protocol against all detector side-channel attacks and relaxes the difficulty of experiment implementation, while the asynchronous strategy effectively reduces the equivalent channel loss to its square root. Compared to previous MDI-QDS schemes, our protocol shows several orders of magnitude performance improvements and doubling of transmission distance when processing multi-bit messages. Our findings present an efficient and practical MDI-QDS scheme, paving the way for large-scale data processing with non-repudiation in quantum networks.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
High-rate quantum digital signatures network with integrated silicon photonics
Authors:
Yongqiang Du,
Bing-Hong Li,
Xin Hua,
Xiao-Yu Cao,
Zhengeng Zhao,
Feng Xie,
Zhenrong Zhang,
Hua-Lei Yin,
Xi Xiao,
Kejin Wei
Abstract:
The development of quantum networks is paramount towards practical and secure communications. Quantum digital signatures (QDS) offer an information-theoretically secure solution for ensuring data integrity, authenticity, and non-repudiation, rapidly growing from proof-of-concept to robust demonstrations. However, previous QDS systems relied on expensive and bulky optical equipment, limiting large-…
▽ More
The development of quantum networks is paramount towards practical and secure communications. Quantum digital signatures (QDS) offer an information-theoretically secure solution for ensuring data integrity, authenticity, and non-repudiation, rapidly growing from proof-of-concept to robust demonstrations. However, previous QDS systems relied on expensive and bulky optical equipment, limiting large-scale deployment and reconfigurable networking construction. Here, we introduce and verify a chip-based QDS network, placing the complicated and expensive measurement devices in the central relay while each user needs only a low-cost transmitter. We demonstrate the network with a three-node setup using an integrated encoder chip and decoder chip. By developing a 1-decoy-state one-time universal hash-QDS protocol, we achieve a maximum signature rate of 0.0414 times per second for a 1 Mbit file over fiber distances up to 200 km, surpassing all current state-of-the-art QDS experiments. This study validates the feasibility of chip-based QDS, paving the way for large-scale deployment and integration with existing fiber infrastructure.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Continuous-variable quantum digital signatures that can withstand coherent attacks
Authors:
Yi-Fan Zhang,
Wen-Bo Liu,
Bing-Hong Li,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum digital signatures (QDSs), which utilize correlated bit strings among sender and recipients, guarantee the authenticity, integrity, and nonrepudiation of classical messages based on quantum laws. Continuous-variable (CV) quantum protocol with heterodyne and homodyne measurement has obvious advantages of low-cost implementation and easy wavelength division multiplexing. However, security an…
▽ More
Quantum digital signatures (QDSs), which utilize correlated bit strings among sender and recipients, guarantee the authenticity, integrity, and nonrepudiation of classical messages based on quantum laws. Continuous-variable (CV) quantum protocol with heterodyne and homodyne measurement has obvious advantages of low-cost implementation and easy wavelength division multiplexing. However, security analyses in previous researches are limited to the proof against collective attacks in finite-size scenarios. Moreover, existing multibit CV QDS schemes have primarily focused on adapting single-bit protocols for simplicity of security proof, often sacrificing signature efficiency. Here, we introduce a CV QDS protocol designed to withstand general coherent attacks through the use of a cutting-edge fidelity test function, while achieving high signature efficiency by employing a refined one-time universal hashing signing technique. Our protocol is proved to be robust against finite-size effects and excess noise in quantum channels. In simulation, results demonstrate a significant reduction of eight orders of magnitude in signature length for a megabit message signing task compared with existing CV QDS protocols and this advantage expands as the message size grows. Our work offers a solution with enhanced security and efficiency, paving the way for large-scale deployment of CV QDSs in future quantum networks.
△ Less
Submitted 22 November, 2024; v1 submitted 3 July, 2024;
originally announced July 2024.
-
Multi-field quantum conferencing overcomes the network capacity limit
Authors:
Yuan-Mei Xie,
Yu-Shuo Lu,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum conferencing enables multiple nodes within a quantum network to share a secure group key for private message broadcasting. The key rate, however, is limited by the repeaterless capacity to distribute multiparticle entangled states across the network. Currently, in the finite-size regime, no feasible schemes utilizing existing experimental techniques can overcome the fundamental rate-distan…
▽ More
Quantum conferencing enables multiple nodes within a quantum network to share a secure group key for private message broadcasting. The key rate, however, is limited by the repeaterless capacity to distribute multiparticle entangled states across the network. Currently, in the finite-size regime, no feasible schemes utilizing existing experimental techniques can overcome the fundamental rate-distance limit of quantum conferencing in quantum networks without repeaters. Here, we propose a practical, multi-field scheme that breaks this limit, involving virtually establishing Greenberger-Horne-Zeilinger states through post-measurement coincidence matching. This proposal features a measurement-device-independent characteristic and can directly scale to support any number of users. Simulations show that the fundamental limitation on the group key rate can be overcome in a reasonable running time of sending $10^{14}$ pulses. We predict that it offers an efficient design for long-distance broadcast communication in future quantum networks.
△ Less
Submitted 5 January, 2025; v1 submitted 30 June, 2024;
originally announced July 2024.
-
Efficient source-independent quantum conference key agreement
Authors:
Yu Bao,
Yi-Ran Xiao,
Yu-Chen Song,
Yao Fu,
Xiao-Yu Cao,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum conference key agreement (QCKA) enables the unconditional secure distribution of conference keys among multiple participants. Due to challenges in high-fidelity preparation and long-distance distribution of multi-photon entanglement, entanglement-based QCKA is facing severe limitations in both key rate and scalability. Here, we propose a source-independent QCKA scheme utilizing the post-ma…
▽ More
Quantum conference key agreement (QCKA) enables the unconditional secure distribution of conference keys among multiple participants. Due to challenges in high-fidelity preparation and long-distance distribution of multi-photon entanglement, entanglement-based QCKA is facing severe limitations in both key rate and scalability. Here, we propose a source-independent QCKA scheme utilizing the post-matching method, feasible within the entangled photon pair distribution network. We introduce an equivalent distributing virtual multi-photon entanglement protocol for providing the unconditional security proof even in the case of coherent attacks. For the symmetry star-network, comparing with previous $n$-photon entanglement protocol, the conference key rate is improved from $O(η^{n})$ to $O(η^{2})$, where $η$ is the transmittance from the entanglement source to one participant. Simulation results show that the performance of our protocol has multiple orders of magnitude advantages in the intercity distance. We anticipate that our approach will demonstrate its potential in the implementation of quantum networks.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Repeater-like asynchronous measurement-device-independent quantum conference key agreement
Authors:
Yu-Shuo Lu,
Hua-Lei Yin,
Yuan-Mei Xie,
Yao Fu,
Zeng-Bing Chen
Abstract:
Quantum conference key agreement enables secure communication among multiple parties by leveraging multipartite entanglement, which is expected to play a crucial role in future quantum networks. However, its practical implementation has been severely limited by the experimental complexity and low efficiency associated with the requirement for synchronous detection of multipartite entangled states.…
▽ More
Quantum conference key agreement enables secure communication among multiple parties by leveraging multipartite entanglement, which is expected to play a crucial role in future quantum networks. However, its practical implementation has been severely limited by the experimental complexity and low efficiency associated with the requirement for synchronous detection of multipartite entangled states. In this work, we propose a measurement-device-independent quantum conference key agreement protocol that employs asynchronous Greenberger-Horne-Zeilinger state measurement. Our protocol enables a linear scaling of the conference key rate among multiple parties, demonstrating performance comparable to that of the single-repeater scheme in quantum networks. Additionally, we achieve intercity transmission distances with composable security under finite-key conditions. By adopting the generalized asynchronous pairing strategy, our approach eliminates the need for complex global phase locking techniques. Furthermore, by integrating asynchronous pairing with ring-interference network structure, our method provides insights for various quantum tasks beyond quantum communication, including multiparty computing and quantum repeaters.
△ Less
Submitted 11 June, 2025; v1 submitted 22 June, 2024;
originally announced June 2024.
-
Discrete-Modulated Continuous-Variable Quantum Key Distribution in Satellite-to-Ground Communication
Authors:
Shi-Gen Li,
Chen-Long Li,
Wen-Bo Liu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Satellite-to-ground quantum communication constitutes the cornerstone of the global quantum network, heralding the advent of the future of quantum information. Continuous-variable quantum key distribution is a strong candidate for space-ground quantum communication due to its simplicity, stability, and ease of implementation, especially for the robustness of space background light noise. Recently,…
▽ More
Satellite-to-ground quantum communication constitutes the cornerstone of the global quantum network, heralding the advent of the future of quantum information. Continuous-variable quantum key distribution is a strong candidate for space-ground quantum communication due to its simplicity, stability, and ease of implementation, especially for the robustness of space background light noise. Recently, the discrete-modulated continuous-variable protocol has garnered increased attention, owing to its lower implementation requirements, acceptable security key rate, and pronounced compatibility with extant infrastructures. Here, we derive key rates for discrete-modulated continuous-variable quantum key distribution protocols in free-space channel environments across various conditions through numerical simulation, revealing the viability of its application in satellite-to-ground communication.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
Quantum Coherence and Distinguishability as Complementary Resources: A Resource-Theoretic Perspective from Wave-Particle Duality
Authors:
Zhiping Liu,
Chengkai Zhu,
Hua-Lei Yin,
Xin Wang
Abstract:
Wave-particle duality, a fundamental principle of quantum mechanics, encapsulates the complementary relationship between the wave and particle behaviors of quantum systems. In this paper, we treat quantum coherence and classical distinguishability as complementary resources and uncover a novel duality relation, which is explored through quantum state discrimination under incoherent operations, ext…
▽ More
Wave-particle duality, a fundamental principle of quantum mechanics, encapsulates the complementary relationship between the wave and particle behaviors of quantum systems. In this paper, we treat quantum coherence and classical distinguishability as complementary resources and uncover a novel duality relation, which is explored through quantum state discrimination under incoherent operations, extending beyond typical interference scenarios. We prove that in an ensemble of mutually orthogonal pure states, the sum of `co-bits', quantifying the coherence preserved under incoherent free operations, and classical bits, representing the distinguishability extracted via quantum state discrimination, is bounded. This coherence-distinguishability duality relation exposes an inherent trade-off between the simultaneous preservation of a system's quantum coherence (wave-like property) and the extraction of its classical distinguishability (particle-like property). Our findings provide a fresh perspective on wave-particle duality through quantum resource theories, offering complementary insights into manipulating quantum and classical resources, with implications for quantum foundations and quantum technologies.
△ Less
Submitted 27 June, 2025; v1 submitted 22 April, 2024;
originally announced April 2024.
-
Experimental Quantum Byzantine Agreement on a Three-User Quantum Network with Integrated Photonics
Authors:
Xu Jing,
Cheng Qian,
Chen-Xun Weng,
Bing-Hong Li,
Zhe Chen,
Chen-Quan Wang,
Jie Tang,
Xiao-Wen Gu,
Yue-Chan Kong,
Tang-Sheng Chen,
Hua-Lei Yin,
Dong Jiang,
Bin Niu,
Liang-Liang Lu
Abstract:
Quantum communication networks are crucial for both secure communication and cryptographic networked tasks. Building quantum communication networks in a scalable and cost-effective way is essential for their widespread adoption, among which a stable and miniaturized high-quality quantum light source is a key component. Here, we establish a complete polarization entanglement-based fully connected n…
▽ More
Quantum communication networks are crucial for both secure communication and cryptographic networked tasks. Building quantum communication networks in a scalable and cost-effective way is essential for their widespread adoption, among which a stable and miniaturized high-quality quantum light source is a key component. Here, we establish a complete polarization entanglement-based fully connected network, which features an ultrabright integrated Bragg reflection waveguide quantum source, managed by an untrusted service provider, and a streamlined polarization analysis module, which requires only one single-photon detector for each end user. We perform a continuously working quantum entanglement distribution and create correlated bit strings between users. Within the framework of one-time universal hashing, we provide the first experimental implementation of source-independent quantum digital signatures using imperfect keys circumventing the necessity for private amplification. More importantly, we further beat the 1/3 fault-tolerance bound in Byzantine agreement, achieving unconditional security without relying on sophisticated techniques. Our results offer an affordable and practical route for addressing consensus challenges within the emerging quantum network landscape.
△ Less
Submitted 27 August, 2024; v1 submitted 17 March, 2024;
originally announced March 2024.
-
Optimizing single-photon quantum radar detection through partially postselected filtering
Authors:
Liangsheng Li,
Maoxin Liu,
Wen-Long You,
Chengjie Zhang,
Shengli Zhang,
Hongcheng Yin,
Zhihe Xiao,
Yong Zhu
Abstract:
In this study, we explore an approach aimed at enhancing the transmission or reflection coefficients of absorbing materials through the utilization of joint measurements of entangled photon states. On the one hand, through the implementation of photon catalysis in the reflected channel, we can effectively modify the state of the transmission channel, leading to a notable improvement in the transmi…
▽ More
In this study, we explore an approach aimed at enhancing the transmission or reflection coefficients of absorbing materials through the utilization of joint measurements of entangled photon states. On the one hand, through the implementation of photon catalysis in the reflected channel, we can effectively modify the state of the transmission channel, leading to a notable improvement in the transmission ratio. Similarly, this approach holds potential for significantly amplifying the reflection ratio of absorbing materials, which is useful for detecting cooperative targets. On the other hand, employing statistical counting methods based on the technique of heralding on zero photons, we evaluate the influence of our reflection enhancement protocol for detecting noncooperative targets, which is validated through Monte Carlo simulations of a quantum radar setup affected by Gaussian white noise. Our results demonstrate a remarkable enhancement in the signal-to-noise ratio of imaging, albeit with an increase in mean-square error. These findings highlight the potential practical applications of our approach in the implementation of quantum radar.
△ Less
Submitted 7 March, 2024; v1 submitted 25 February, 2024;
originally announced February 2024.
-
Asynchronous Quantum Repeater using Multiple Quantum Memory
Authors:
Chen-Long Li. Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
A full-fledged quantum network relies on the formation of entangled links between remote location with the help of quantum repeaters. The famous Duan-Lukin-Cirac-Zoller quantum repeater protocol is based on long distance single-photon interference, which not only requires high phase stability but also cannot generate maximally entangled state. Here, we propose a quantum repeater protocol using the…
▽ More
A full-fledged quantum network relies on the formation of entangled links between remote location with the help of quantum repeaters. The famous Duan-Lukin-Cirac-Zoller quantum repeater protocol is based on long distance single-photon interference, which not only requires high phase stability but also cannot generate maximally entangled state. Here, we propose a quantum repeater protocol using the idea of post-matching, which retains the same efficiency as the single-photon interference protocol, reduces the phase-stability requirement and can generate maximally entangled state in principle. We also outline an implementation of our scheme based on the Kerr nonlinear resonator. Numerical simulations show that our protocol has its superiority by comparing with existing protocols under a generic noise model and show the feasibility of building a large-scale quantum communication network with our scheme. We believe our work represents a crucial step towards the construction of a fully-connected quantum network.
△ Less
Submitted 25 November, 2024; v1 submitted 11 January, 2024;
originally announced January 2024.
-
Coherence in resonance fluorescence
Authors:
Xu-Jie Wang,
Guoqi Huang,
Ming-Yang Li,
Yuan-Zhuo Wang,
Li Liu,
Bang Wu,
Hanqing Liu,
Haiqiao Ni,
Zhichuan Niu,
Weijie Ji,
Rongzhen Jiao,
Hua-Lei Yin,
Zhiliang Yuan
Abstract:
Resonance fluorescence of a two-level emitter displays persistently anti-bunching irrespective of the excitation intensity, but inherits the driving laser's linewidth under weak monochromatic excitation. These properties are commonly explained in terms of two disjoined pictures, i.e., the emitter's single photon saturation or passively scattering light. Here, we propose a unified model that treats…
▽ More
Resonance fluorescence of a two-level emitter displays persistently anti-bunching irrespective of the excitation intensity, but inherits the driving laser's linewidth under weak monochromatic excitation. These properties are commonly explained in terms of two disjoined pictures, i.e., the emitter's single photon saturation or passively scattering light. Here, we propose a unified model that treats all fluorescence photons as spontaneous emission, one at a time, and can explain simultaneously both the spectral and correlation properties of the emission. We theoretically derive the excitation power dependencies, measurable at the single-photon incidence level, of the first-order coherence of the whole resonance fluorescence and super-bunching of the spectrally filtered, followed by experimental confirmation on a semiconductor quantum dot micro-pillar device. Furthermore, our model explains peculiar coincidence bunching observed in phase-dependent two-photon interference experiments. Our work provides an intuitive understanding of coherent light-matter interaction and may stimulate new applications.
△ Less
Submitted 28 January, 2025; v1 submitted 21 December, 2023;
originally announced December 2023.
-
Entropic uncertainty relations for multiple measurements assigned with biased weights
Authors:
Shan Huang,
Hua-Lei Yin,
Zeng-Bing Chen,
Shengjun Wu
Abstract:
The entropic way of formulating Heisenberg's uncertainty principle not only plays a fundamental role in applications of quantum information theory but also is essential for manifesting genuine nonclassical features of quantum systems. In this paper we investigate Rényi entropic uncertainty relations (EURs) in the scenario where measurements on individual copies of a quantum system are selected wit…
▽ More
The entropic way of formulating Heisenberg's uncertainty principle not only plays a fundamental role in applications of quantum information theory but also is essential for manifesting genuine nonclassical features of quantum systems. In this paper we investigate Rényi entropic uncertainty relations (EURs) in the scenario where measurements on individual copies of a quantum system are selected with nonuniform probabilities. In contrast with EURs that characterize an observer's overall lack of information about outcomes with respect to a collection of measurements, we establish state-dependent lower bounds on the weighted sum of entropies over multiple measurements. Conventional EURs thus correspond to the special cases when all weights are equal, and in such cases, we show our results are generally stronger than previous ones. Moreover, taking the entropic steering criterion as an example, we numerically verify that our EURs could be advantageous in practical quantum tasks by optimizing the weights assigned to different measurements. Importantly, this optimization does not require quantum resources and is efficiently computable on classical computers.
△ Less
Submitted 4 March, 2024; v1 submitted 28 September, 2023;
originally announced September 2023.
-
Finite-Key Analysis for Coherent One-Way Quantum Key Distribution
Authors:
Ming-Yang Li,
Xiao-Yu Cao,
Yuan-Mei Xie,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products due to its simple equipment requirements. However, existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime. In this paper, we present a…
▽ More
Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products due to its simple equipment requirements. However, existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime. In this paper, we present a tight finite-key security analysis within the universally composable framework for a variant of COW-QKD, which has been proven to extend the secure transmission distance in the asymptotic case. We combine the quantum leftover hash lemma and entropic uncertainty relation to derive the key rate formula. When estimating statistical parameters, we use the recently proposed Kato's inequality to ensure security against coherent attacks and achieve a higher key rate. Our paper confirms the security and feasibility of COW-QKD for practical application and lays the foundation for further theoretical study and experimental implementation.
△ Less
Submitted 9 January, 2024; v1 submitted 27 September, 2023;
originally announced September 2023.
-
Experimental quantum e-commerce
Authors:
Xiao-Yu Cao,
Bing-Hong Li,
Yang Wang,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
E-commerce, a type of trading that occurs at a high frequency on the Internet, requires guaranteeing the integrity, authentication and non-repudiation of messages through long distance. As current e-commerce schemes are vulnerable to computational attacks, quantum cryptography, ensuring information-theoretic security against adversary's repudiation and forgery, provides a solution to this problem.…
▽ More
E-commerce, a type of trading that occurs at a high frequency on the Internet, requires guaranteeing the integrity, authentication and non-repudiation of messages through long distance. As current e-commerce schemes are vulnerable to computational attacks, quantum cryptography, ensuring information-theoretic security against adversary's repudiation and forgery, provides a solution to this problem. However, quantum solutions generally have much lower performance compared to classical ones. Besides, when considering imperfect devices, the performance of quantum schemes exhibits a significant decline. Here, for the first time, we demonstrate the whole e-commerce process of involving the signing of a contract and payment among three parties by proposing a quantum e-commerce scheme, which shows resistance of attacks from imperfect devices. Results show that with a maximum attenuation of 25 dB among participants, our scheme can achieve a signature rate of 0.82 times per second for an agreement size of approximately 0.428 megabit. This proposed scheme presents a promising solution for providing information-theoretic security for e-commerce.
△ Less
Submitted 13 January, 2024; v1 submitted 17 August, 2023;
originally announced August 2023.
-
Quantum Neural Network for Quantum Neural Computing
Authors:
Min-Gang Zhou,
Zhi-Ping Liu,
Hua-Lei Yin,
Chen-Long Li,
Tong-Kai Xu,
Zeng-Bing Chen
Abstract:
Neural networks have achieved impressive breakthroughs in both industry and academia. How to effectively develop neural networks on quantum computing devices is a challenging open problem. Here, we propose a new quantum neural network model for quantum neural computing using (classically-controlled) single-qubit operations and measurements on real-world quantum systems with naturally occurring env…
▽ More
Neural networks have achieved impressive breakthroughs in both industry and academia. How to effectively develop neural networks on quantum computing devices is a challenging open problem. Here, we propose a new quantum neural network model for quantum neural computing using (classically-controlled) single-qubit operations and measurements on real-world quantum systems with naturally occurring environment-induced decoherence, which greatly reduces the difficulties of physical implementations. Our model circumvents the problem that the state-space size grows exponentially with the number of neurons, thereby greatly reducing memory requirements and allowing for fast optimization with traditional optimization algorithms. We benchmark our model for handwritten digit recognition and other nonlinear classification tasks. The results show that our model has an amazing nonlinear classification ability and robustness to noise. Furthermore, our model allows quantum computing to be applied in a wider context and inspires the earlier development of a quantum neural computer than standard quantum computers.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Asynchronous measurement-device-independent quantum key distribution with hybrid source
Authors:
Jun-Lin Bai,
Yuan-Mei Xie,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
The linear constraint of secret key rate capacity is overcome by the tiwn-field quantum key distribution (QKD). However, the complex phase-locking and phase-tracking technique requirements throttle the real-life applications of twin-field protocol. The asynchronous measurement-device-independent (AMDI) QKD or called mode-pairing QKD protocol can relax the technical requirements and keep the simila…
▽ More
The linear constraint of secret key rate capacity is overcome by the tiwn-field quantum key distribution (QKD). However, the complex phase-locking and phase-tracking technique requirements throttle the real-life applications of twin-field protocol. The asynchronous measurement-device-independent (AMDI) QKD or called mode-pairing QKD protocol can relax the technical requirements and keep the similar performance of twin-field protocol. Here, we propose an AMDI-QKD protocol with a nonclassical light source by changing the phase-randomized weak coherent state to a phase-randomized coherent-state superposition in the signal state time window. Simulation results show that our proposed hybrid source protocol significantly enhances the key rate of the AMDI-QKD protocol, while exhibiting robustness to imperfect modulation of nonclassical light sources.
△ Less
Submitted 7 August, 2023; v1 submitted 10 April, 2023;
originally announced April 2023.
-
Experimental quantum secret sharing based on phase encoding of coherent states
Authors:
Ao Shen,
Xiao-Yu Cao,
Yang Wang,
Yao Fu,
Jie Gu,
Wen-Bo Liu,
Chen-Xun Weng,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum secret sharing (QSS) is one of the basic communication primitives in future quantum networks which addresses part of the basic cryptographic tasks of multiparty communication and computation. Nevertheless, it is a challenge to provide a practical QSS protocol with security against general attacks. A QSS protocol that balances security and practicality is still lacking. Here, we propose a Q…
▽ More
Quantum secret sharing (QSS) is one of the basic communication primitives in future quantum networks which addresses part of the basic cryptographic tasks of multiparty communication and computation. Nevertheless, it is a challenge to provide a practical QSS protocol with security against general attacks. A QSS protocol that balances security and practicality is still lacking. Here, we propose a QSS protocol with simple phase encoding of coherent states among three parties. Removing the requirement of impractical entangled resources and the need for phase randomization, our protocol can be implemented with accessible technology. We provide the finite-key analysis against coherent attacks and implement a proof-of-principle experiment to demonstrate our scheme's feasibility. Our scheme achieves a key rate of 85.3 bps under a 35 dB channel loss. Combined with security against general attacks and accessible technology, our protocol is a promising candidate for practical multiparty quantum communication networks.
△ Less
Submitted 27 March, 2023; v1 submitted 26 March, 2023;
originally announced March 2023.
-
Phase-Matching Quantum Key Distribution without Intensity Modulation
Authors:
Shan-Feng Shao,
Xiao-Yu Cao,
Yuan-Mei Xie,
Jie Gu,
Wen-Bo Liu,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum key distribution provides a promising solution for sharing secure keys between two distant parties with unconditional security. Nevertheless, quantum key distribution is still severely threatened by the imperfections of devices. In particular, the classical pulse correlation threatens security when sending decoy states. To address this problem and simplify experimental requirements, we pro…
▽ More
Quantum key distribution provides a promising solution for sharing secure keys between two distant parties with unconditional security. Nevertheless, quantum key distribution is still severely threatened by the imperfections of devices. In particular, the classical pulse correlation threatens security when sending decoy states. To address this problem and simplify experimental requirements, we propose a phase-matching quantum key distribution protocol without intensity modulation. Instead of using decoy states, we propose a novel method to estimate the theoretical upper bound on the phase error rate contributed by even-photon-number components. Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber. Furthermore, we perform a proof-of-principle experiment to demonstrate the feasibility of our protocol, and the key rate reaches 22.5 bps under a 45 dB channel loss. Addressing the security loophole of pulse intensity correlation and replacing continuous random phase with 6 or 8 slices random phase, our protocol provides a promising solution for constructing quantum networks.
△ Less
Submitted 19 August, 2023; v1 submitted 21 March, 2023;
originally announced March 2023.
-
Advantages of Asynchronous Measurement-Device-Independent Quantum Key Distribution in Intercity Networks
Authors:
Yuan-Mei Xie,
Jun-Lin Bai,
Yu-Shuo Lu,
Chen-Xun Weng,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
The new variant of measurement-device-independent quantum key distribution (MDI-QKD), called asynchronous MDI-QKD or mode-pairing MDI-QKD, offers similar repeater-like rate-loss scaling but has the advantage of simple technology implementation by exploiting an innovative post-measurement pairing technique. We herein present an evaluation of the practical aspects of decoy-state asynchronous MDI-QKD…
▽ More
The new variant of measurement-device-independent quantum key distribution (MDI-QKD), called asynchronous MDI-QKD or mode-pairing MDI-QKD, offers similar repeater-like rate-loss scaling but has the advantage of simple technology implementation by exploiting an innovative post-measurement pairing technique. We herein present an evaluation of the practical aspects of decoy-state asynchronous MDI-QKD. To determine its effectiveness, we analyze the optimal method of decoy-state calculation and examine the impact of asymmetrical channels and multi-user networks. Our simulations show that, under realistic conditions, aynchronous MDI-QKD can furnish the highest key rate with MDI security as compared to other QKD protocols over distances ranging from 50 km to 480 km. At fiber distances of 50 km and 100 km, the key rates attain 6.02 Mbps and 2.29 Mbps respectively, which are sufficient to facilitate real-time one-time-pad video encryption. Our findings indicate that experimental implementation of asynchronous MDI-QKD in intercity networks can be both practical and efficient.
△ Less
Submitted 24 July, 2023; v1 submitted 28 February, 2023;
originally announced February 2023.
-
One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys
Authors:
Bing-Hong Li,
Yuan-Mei Xie,
Xiao-Yu Cao,
Chen-Long Li,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum digital signatures (QDS), generating correlated bit strings among three remote parties for signatures through quantum law, can guarantee non-repudiation, authenticity, and integrity of messages. Recently, one-time universal hashing QDS framework, exploiting the quantum asymmetric encryption and universal hash functions, has been proposed to significantly improve the signature rate and ensu…
▽ More
Quantum digital signatures (QDS), generating correlated bit strings among three remote parties for signatures through quantum law, can guarantee non-repudiation, authenticity, and integrity of messages. Recently, one-time universal hashing QDS framework, exploiting the quantum asymmetric encryption and universal hash functions, has been proposed to significantly improve the signature rate and ensure unconditional security by directly signing the hash value of long messages. However, similar to quantum key distribution, this framework utilizes keys with perfect secrecy by performing privacy amplification that introduces cumbersome matrix operations, thereby consuming large computational resources, causing delays and increasing failure probability. Here, we prove that, different from private communication, imperfect quantum keys with limited information leakage can be used for digital signatures and authentication without compromising the security while having eight orders of magnitude improvement on signature rate for signing a megabit message compared with conventional single-bit schemes. This study significantly reduces the delay for data postprocessing and is compatible with any quantum key generation protocols. In our simulation, taking two-photon twin-field key generation protocol as an example, QDS can be practically implemented over a fiber distance of 650 km between the signer and receiver. For the first time, this study offers a cryptographic application of quantum keys with imperfect secrecy and paves a way for the practical and agile implementation of digital signatures in a future quantum network.
△ Less
Submitted 4 October, 2023; v1 submitted 3 January, 2023;
originally announced January 2023.
-
Experimental Quantum Communication Overcomes the Rate-loss Limit without Global Phase Tracking
Authors:
Lai Zhou,
Jinping Lin,
Yuan-Mei Xie,
Yu-Shuo Lu,
Yumang Jing,
Hua-Lei Yin,
Zhiliang Yuan
Abstract:
Secure key rate (SKR) of point-point quantum key distribution (QKD) is fundamentally bounded by the rate-loss limit. Recent breakthrough of twin-field (TF) QKD can overcome this limit and enables long distance quantum communication, but its implementation necessitates complex global phase tracking and requires strong phase references which not only add to noise but also reduce the duty cycle for q…
▽ More
Secure key rate (SKR) of point-point quantum key distribution (QKD) is fundamentally bounded by the rate-loss limit. Recent breakthrough of twin-field (TF) QKD can overcome this limit and enables long distance quantum communication, but its implementation necessitates complex global phase tracking and requires strong phase references which not only add to noise but also reduce the duty cycle for quantum transmission. Here, we resolve these shortcomings, and importantly achieve even higher SKRs than TF-QKD, via implementing an innovative but simpler measurement-device-independent QKD which realizes repeater-like communication through asynchronous coincidence pairing. Over 413 and 508 km optical fibers, we achieve finite-size SKRs of 590.61 and 42.64 bit/s, which are respectively 1.80 and 4.08 times of their corresponding absolute rate limits. Significantly, the SKR at 306 km exceeds 5 kbit/s and meets the bitrate requirement for live one-time-pad encryption of voice communication. Our work will bring forward economical and efficient intercity quantum-secure networks.
△ Less
Submitted 5 August, 2023; v1 submitted 29 December, 2022;
originally announced December 2022.
-
Breaking Rate-Distance Limitation of Measurement-Device-Independent Quantum Secret Sharing
Authors:
Chen-Long Li,
Yao Fu,
Wen-Bo Liu,
Yuan-Mei Xie,
Bing-Hong Li,
Min-Gang Zhou,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Currently most progresses on quantum secret sharing suffer from rate-distance bound, and thus the key rates are limited. In addition to the limited key rate, the technical difficulty and the corresponding cost together prevent large-scale deployment. Furthermore, the performance of most existing protocols is analyzed in the asymptotic regime without considering participant attacks. Here we report…
▽ More
Currently most progresses on quantum secret sharing suffer from rate-distance bound, and thus the key rates are limited. In addition to the limited key rate, the technical difficulty and the corresponding cost together prevent large-scale deployment. Furthermore, the performance of most existing protocols is analyzed in the asymptotic regime without considering participant attacks. Here we report a measurement-device-independent quantum secret sharing protocol with improved key rate and transmission distance. Based on spatial multiplexing, our protocol shows it can break rate-distance bounds over network under at least ten communication parties. Compared with other protocols, our work improves the secret key rate by more than two orders of magnitude and has a longer transmission distance. We analyze the security of our protocol in the composable framework considering participant attacks and evaluate its performance in the finite-size regime. In addition, we investigate applying our protocol to digital signatures where the signature rate is improved more than $10^7$ times compared with existing protocols. We anticipate that our quantum secret sharing protocol will provide a solid future for multiparty applications on the quantum network.
△ Less
Submitted 7 August, 2023; v1 submitted 10 December, 2022;
originally announced December 2022.
-
Breaking universal limitations on quantum conference key agreement without quantum memory
Authors:
Chen-Long Li,
Yao Fu,
Wen-Bo Liu,
Yuan-Mei Xie,
Bing-Hong Li,
Min-Gang Zhou,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires high-brightness and robust multiphoton entanglement sources, which is challenging in experiment and unpractical in application because of limited transmission distance caused by channel loss. Here we report a measurement-device-independent quantum conference key ag…
▽ More
Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires high-brightness and robust multiphoton entanglement sources, which is challenging in experiment and unpractical in application because of limited transmission distance caused by channel loss. Here we report a measurement-device-independent quantum conference key agreement protocol with enhanced transmission efficiency over lossy channel. With spatial multiplexing nature and adaptive operation, our protocol can break key rate bounds on quantum communication over quantum network without quantum memory. Compared with previous work, our protocol shows superiority in key rate and transmission distance within the state-of-the-art technology. Furthermore, we analyse the security of our protocol in the composable framework and evaluate its performance in the finite-size regime to show practicality. Based on our results, we anticipate that our protocol will play an indispensable role in constructing multipartite quantum network.
△ Less
Submitted 11 April, 2023; v1 submitted 10 December, 2022;
originally announced December 2022.
-
All-Photonic Quantum Repeater for Multipartite Entanglement Generation
Authors:
Chen-Long Li,
Yao Fu,
Wen-Bo Liu,
Yuan-Mei Xie,
Bing-Hong Li,
Min-Gang Zhou,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum network applications like distributed quantum computing and quantum secret sharing present a promising future network equipped with quantum resources. Entanglement generation and distribution over long distances is critical and unavoidable to utilize quantum technology in a fully-connected network. The distribution of bipartite entanglement over long distances has seen some progresses, whi…
▽ More
Quantum network applications like distributed quantum computing and quantum secret sharing present a promising future network equipped with quantum resources. Entanglement generation and distribution over long distances is critical and unavoidable to utilize quantum technology in a fully-connected network. The distribution of bipartite entanglement over long distances has seen some progresses, while the distribution of multipartite entanglement over long distances remains unsolved. Here we report a two-dimensional quantum repeater protocol for the generation of multipartite entanglement over long distances with all-photonic framework to fill this gap. The yield of the proposed protocol shows long transmission distance under various numbers of network users. With the improved efficiency and flexibility of extending the number of users, we anticipate that our protocol can work as a significant building block for quantum networks in the future.
△ Less
Submitted 10 December, 2022;
originally announced December 2022.
-
General framework of quantum complementarity from a measurement-based perspective
Authors:
Shan Huang,
Wen-Bo Liu,
Yundu Zhao,
Hua-Lei Yin,
Zeng-Bing Chen,
Shengjun Wu
Abstract:
One of the most remarkable features of quantum physics is that attributes of quantum objects, such as the wave-like and particle-like behaviors of single photons, can be complementary in the sense that they are equally real but cannot be observed simultaneously. Quantum measurements, serving as windows providing views into the abstract edifice of quantum theory, are basic tools for manifesting the…
▽ More
One of the most remarkable features of quantum physics is that attributes of quantum objects, such as the wave-like and particle-like behaviors of single photons, can be complementary in the sense that they are equally real but cannot be observed simultaneously. Quantum measurements, serving as windows providing views into the abstract edifice of quantum theory, are basic tools for manifesting the intrinsic behaviors of quantum objects. However, quantitative formulation of complementarity that highlights its manifestations in sophisticated measurements remains elusive. Here we develop a general framework for demonstrating quantum complementarity in the form of information exclusion relations (IERs), which incorporates the wave-particle duality relations as particular examples. Moreover, we explore the applications of our theory in entanglement witnessing and elucidate that our IERs lead to an extended form of entropic uncertainty relations, providing intriguing insights into the connection between quantum complementarity and the preparation uncertainty.
△ Less
Submitted 28 September, 2023; v1 submitted 3 October, 2022;
originally announced October 2022.
-
Simultaneous All-versus-Nothing Refutation of Local Realism and Noncontextuality by a Single System
Authors:
Min-Gang Zhou,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
The quantum realms of nonlocality and contextuality are delineated by Bell's theorem and the Kochen-Specker theorem, respectively, embodying phenomena that surpass the explanatory capacities of classical theories. These realms hold transformative potential for the fields of information and computing technology. In this study, we unveil a ``all-versus-nothing" proof that concurrently illustrates th…
▽ More
The quantum realms of nonlocality and contextuality are delineated by Bell's theorem and the Kochen-Specker theorem, respectively, embodying phenomena that surpass the explanatory capacities of classical theories. These realms hold transformative potential for the fields of information and computing technology. In this study, we unveil a ``all-versus-nothing" proof that concurrently illustrates the veracity of these two seminal theorems, fostering a more nuanced comprehension of the intricate relationship intertwining quantum nonlocality and contextuality. Leveraging the capabilities of three singlet pairs and a Greenberger-Horne-Zeilinger state analyzer, our proof not only substantiates the conflict between quantum mechanics and hidden-variable theories from another perspective, but can also be readily verifiable utilizing the existing linear optics technology.
△ Less
Submitted 25 March, 2024; v1 submitted 24 August, 2022;
originally announced August 2022.
-
Beating the fault-tolerance bound and security loopholes for Byzantine agreement with a quantum solution
Authors:
Chen-Xun Weng,
Rui-Qi Gao,
Yu Bao,
Bing-Hong Li,
Wen-Bo Liu,
Yuan-Mei Xie,
Yu-Shuo Lu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Byzantine agreement, the underlying core of blockchain, aims to make every node in a decentralized network reach consensus. Classical Byzantine agreements unavoidably face two major problems. One is $1/3$ fault-tolerance bound, which means that the system to tolerate $f$ malicious players requires at least $3f+1$ players. The other is the security loopholes from its classical cryptography methods.…
▽ More
Byzantine agreement, the underlying core of blockchain, aims to make every node in a decentralized network reach consensus. Classical Byzantine agreements unavoidably face two major problems. One is $1/3$ fault-tolerance bound, which means that the system to tolerate $f$ malicious players requires at least $3f+1$ players. The other is the security loopholes from its classical cryptography methods. Here, we propose a Byzantine agreement framework with unconditional security to break this bound with nearly $1/2$ fault tolerance due to multiparty correlation provided by quantum digital signatures. \textcolor{black}{It is intriguing that quantum entanglement is not necessary to break the $1/3$ fault-tolerance bound, and we show that weaker correlation, such as asymmetric relationship of quantum digital signature, can also work.} Our work strictly obeys two Byzantine conditions and can be extended to any number of players without requirements for multiparticle entanglement. We experimentally demonstrate three-party and five-party consensus for a digital ledger. Our work indicates the quantum advantage in terms of consensus problems and suggests an important avenue for quantum blockchain and quantum consensus networks.
△ Less
Submitted 22 November, 2023; v1 submitted 18 June, 2022;
originally announced June 2022.
-
Multi-state Swap Test Algorithm
Authors:
Wen Liu,
Han-Wen Yin,
Zhi-Rao Wang,
Wen-Qin Fan
Abstract:
Estimating the overlap between two states is an important task with several applications in quantum information. However, the typical swap test circuit can only measure a sole pair of quantum states at a time. In this study we designed a recursive quantum circuit to measure overlaps of multiple quantum states $|φ_1...φ_n\rangle$ concurrently with $O(n\log n)$ controlled-swap (CSWAP) gates and…
▽ More
Estimating the overlap between two states is an important task with several applications in quantum information. However, the typical swap test circuit can only measure a sole pair of quantum states at a time. In this study we designed a recursive quantum circuit to measure overlaps of multiple quantum states $|φ_1...φ_n\rangle$ concurrently with $O(n\log n)$ controlled-swap (CSWAP) gates and $O(\log n)$ ancillary qubits. This circuit enables us to get all pairwise overlaps among input quantum states $|\langleφ_i|φ_j\rangle|^2$. Compared with existing schemes for measuring the overlap of multiple quantum states, our scheme provides higher precision and less consumption of ancillary qubits. In addition, we performed simulation experiments on IBM quantum cloud platform to verify the superiority of the scheme.
△ Less
Submitted 14 May, 2022;
originally announced May 2022.
-
Source-independent quantum random number generator against tailored detector blinding attacks
Authors:
Wen-Bo Liu,
Yu-Shuo Lu,
Yao Fu,
Si-Cheng Huang,
Ze-Jie Yin,
Kun Jiang,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Randomness, mainly in the form of random numbers, is the fundamental prerequisite for the security of many cryptographic tasks. Quantum randomness can be extracted even if adversaries are fully aware of the protocol and even control the randomness source. However, an adversary can further manipulate the randomness via tailored detector blinding attacks, which are hacking attacks suffered by protoc…
▽ More
Randomness, mainly in the form of random numbers, is the fundamental prerequisite for the security of many cryptographic tasks. Quantum randomness can be extracted even if adversaries are fully aware of the protocol and even control the randomness source. However, an adversary can further manipulate the randomness via tailored detector blinding attacks, which are hacking attacks suffered by protocols with trusted detectors. Here, by treating no-click events as valid events, we propose a quantum random number generation protocol that can simultaneously address source vulnerability and ferocious tailored detector blinding attacks. The method can be extended to high-dimensional random number generation. We experimentally demonstrate the ability of our protocol to generate random numbers for two-dimensional measurement with a generation speed of 0.1 bit per pulse.
△ Less
Submitted 23 March, 2023; v1 submitted 26 April, 2022;
originally announced April 2022.
-
Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources
Authors:
Jie Gu,
Xiao-Yu Cao,
Yao Fu,
Zong-Wu He,
Ze-Jie Yin,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
The security of quantum key distribution (QKD) is severely threatened by discrepancies between realistic devices and theoretical assumptions. Recently, a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws, side channels caused by mode dependencies, the Trojan horse atttacks an…
▽ More
The security of quantum key distribution (QKD) is severely threatened by discrepancies between realistic devices and theoretical assumptions. Recently, a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws, side channels caused by mode dependencies, the Trojan horse atttacks and pulse correlations. Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections. We present a characterization of source flaws and connect them to experiments, together with a finite-key analysis against coherent attacks. In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss. Compared with previous QKD protocols with imperfect devices, our study considerably improves both the secure key rate and the transmission distance, and shows application potential in the practical deployment of secure QKD with device imperfections.
△ Less
Submitted 27 October, 2022; v1 submitted 18 April, 2022;
originally announced April 2022.
-
Quantum-accelerated algorithms for generating random primitive polynomials over finite fields
Authors:
Shan Huang,
Hua-Lei Yin,
Zeng-Bing Chen,
Shengjun Wu
Abstract:
Primitive polynomials over finite fields are crucial for various domains of computer science, including classical pseudo-random number generation, coding theory and post-quantum cryptography. Nevertheless, the pursuit of an efficient classical algorithm for generating random primitive polynomials over finite fields remains an ongoing challenge. In this paper, we show how to solve this problem effi…
▽ More
Primitive polynomials over finite fields are crucial for various domains of computer science, including classical pseudo-random number generation, coding theory and post-quantum cryptography. Nevertheless, the pursuit of an efficient classical algorithm for generating random primitive polynomials over finite fields remains an ongoing challenge. In this paper, we show how to solve this problem efficiently through hybrid quantum-classical algorithms, and designs of the specific quantum circuits to implement them are also presented. Our research paves the way for the rapid and real-time generation of random primitive polynomials in diverse quantum communication and computation applications.
△ Less
Submitted 4 November, 2023; v1 submitted 24 March, 2022;
originally announced March 2022.
-
Automated machine learning for secure key rate in discrete-modulated continuous-variable quantum key distribution
Authors:
Zhi-Ping Liu,
Min-Gang Zhou,
Wen-Bo Liu,
Chen-Long Li,
Jie Gu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Continuous-variable quantum key distribution (CV QKD) with discrete modulation has attracted increasing attention due to its experimental simplicity, lower-cost implementation and compatibility with classical optical communication. Correspondingly, some novel numerical methods have been proposed to analyze the security of these protocols against collective attacks, which promotes key rates over on…
▽ More
Continuous-variable quantum key distribution (CV QKD) with discrete modulation has attracted increasing attention due to its experimental simplicity, lower-cost implementation and compatibility with classical optical communication. Correspondingly, some novel numerical methods have been proposed to analyze the security of these protocols against collective attacks, which promotes key rates over one hundred kilometers of fiber distance. However, numerical methods are limited by their calculation time and resource consumption, for which they cannot play more roles on mobile platforms in quantum networks. To improve this issue, a neural network model predicting key rates in nearly real time has been proposed previously. Here, we go further and show a neural network model combined with Bayesian optimization. This model automatically designs the best architecture of neural network computing key rates in real time. We demonstrate our model with two variants of CV QKD protocols with quaternary modulation. The results show high reliability with secure probability as high as $99.15\%-99.59\%$, considerable tightness and high efficiency with speedup of approximately $10^7$ in both cases. This inspiring model enables the real-time computation of unstructured quantum key distribution protocols' key rate more automatically and efficiently, which has met the growing needs of implementing QKD protocols on moving platforms.
△ Less
Submitted 26 April, 2022; v1 submitted 23 January, 2022;
originally announced January 2022.
-
Monogamy of quantum entanglement
Authors:
Xiao-Lan Zong,
Hao-Hao Yin,
Wei Song,
Zhuo-Liang Cao
Abstract:
Unlike classical correlation, quantum entanglement cannot be freely shared among many parties. This restricted shareability of entanglement among multi-party systems is known as monogamy of entanglement, which is one of the most fundamental properties of entanglement. Here, we summarize recent theoretical progress in the field of monogamy of entanglement. We firstly review the standard CKW-type mo…
▽ More
Unlike classical correlation, quantum entanglement cannot be freely shared among many parties. This restricted shareability of entanglement among multi-party systems is known as monogamy of entanglement, which is one of the most fundamental properties of entanglement. Here, we summarize recent theoretical progress in the field of monogamy of entanglement. We firstly review the standard CKW-type monogamy inequalities in terms of various entanglement measures. In particular, the squashed entanglement and one-way distillable entanglement are monogamous for arbitrary dimensional systems. We then introduce some generalized version of monogamy inequalities which extend and sharpen the traditional ones. We also consider the dual polygamy inequalities for multi-party systems. Moreover, we present two new definitions to define monogamy of entanglement. Finally, some challenges and future directions for monogamy of entanglement are highlighted.
△ Less
Submitted 18 June, 2022; v1 submitted 2 January, 2022;
originally announced January 2022.
-
Breaking the Rate-Loss Bound of Quantum Key Distribution with Asynchronous Two-Photon Interference
Authors:
Yuan-Mei Xie,
Yu-Shuo Lu,
Chen-Xun Weng,
Xiao-Yu Cao,
Zhao-Ying Jia,
Yu Bao,
Yang Wang,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless quantum key distribution via single-photon interference. However, to compensate for the channel fluctuations and lock the laser fluctuations, the techniques of phase tracking and phase locking are indispensable in experiment, which drastically increase experimental complexity and hinder free-space realization.…
▽ More
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless quantum key distribution via single-photon interference. However, to compensate for the channel fluctuations and lock the laser fluctuations, the techniques of phase tracking and phase locking are indispensable in experiment, which drastically increase experimental complexity and hinder free-space realization. Inspired by the duality in entanglement, we herein present an asynchronous measurement-device-independent quantum key distribution protocol that can surpass the secret key capacity even without phase tracking and phase locking. Leveraging the concept of time multiplexing, asynchronous two-photon Bell-state measurement is realized by postmatching two interference detection events. For a 1 GHz system, the new protocol reaches a transmission distance of 450 km without phase tracking. After further removing phase locking, our protocol is still capable of breaking the capacity at 270 km. Intriguingly, when using the same experimental techniques, our protocol has a higher key rate than the phase-matching-type twin-field protocol. In the presence of imperfect intensity modulation, it also has a significant advantage in terms of the transmission distance over the sending-or-not-sending type twin-field protocol. With high key rates and accessible technology, our work provides a promising candidate for practical scalable quantum communication networks.
△ Less
Submitted 26 April, 2022; v1 submitted 21 December, 2021;
originally announced December 2021.
-
Scalable High-Rate Twin-Field Quantum Key Distribution Networks without Constraint of Probability and Intensity
Authors:
Yuan-Mei Xie,
Chen-Xun Weng,
Yu-Shuo Lu,
Yao Fu,
Yang Wang,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Implementation of a twin-field quantum key distribution network faces limitations, including the low tolerance of interference errors for phase-matching type protocols and the strict constraint regarding intensity and probability for sending-or-not-sending type protocols. Here, we propose a two-photon twin-field quantum key distribution protocol and achieve twin-field-type two-photon interference…
▽ More
Implementation of a twin-field quantum key distribution network faces limitations, including the low tolerance of interference errors for phase-matching type protocols and the strict constraint regarding intensity and probability for sending-or-not-sending type protocols. Here, we propose a two-photon twin-field quantum key distribution protocol and achieve twin-field-type two-photon interference through post-matching phase-correlated single-photon interference events. We exploit the non-interference mode as the code mode to highly tolerate interference errors, and the two-photon interference naturally removes the intensity and probability constraint. Therefore, our protocol can transcend the abovementioned limitations while breaking the secret key capacity of repeaterless quantum key distribution. Simulations show that for a four-user networks, under which each node with fixed system parameters can dynamically switch different attenuation links, the key rates of our protocol for all six links can either exceed or approach the secret key capacity. However, the key rates of all links are lower than the key capacity when using phase-matching type protocols. Additionally, four of the links could not extract the key when using sending-or-not-sending type protocols. We anticipate that our protocol can facilitate the development of practical and efficient quantum networks.
△ Less
Submitted 9 April, 2023; v1 submitted 21 December, 2021;
originally announced December 2021.
-
Experimental quantum advantage with quantum coupon collector
Authors:
Min-Gang Zhou,
Xiao-Yu Cao,
Yu-Shuo Lu,
Yang Wang,
Yu Bao,
Zhao-Ying Jia,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
An increasing number of communication and computational schemes with quantum advantages have recently been proposed, which implies that quantum technology has fertile application prospects. However, demonstrating these schemes experimentally continues to be a central challenge because of the difficulty in preparing high-dimensional states or highly entangled states. In this study, we introduce and…
▽ More
An increasing number of communication and computational schemes with quantum advantages have recently been proposed, which implies that quantum technology has fertile application prospects. However, demonstrating these schemes experimentally continues to be a central challenge because of the difficulty in preparing high-dimensional states or highly entangled states. In this study, we introduce and analyse a quantum coupon collector protocol by employing coherent states and simple linear optical elements, which was successfully demonstrated using realistic experimental equipment. We showed that our protocol can significantly reduce the number of samples needed to learn a specific set compared with the classical limit of the coupon collector problem. We also discuss the potential values and expansions of the quantum coupon collector by constructing a quantum blind box game. The information transmitted by the proposed game also broke the classical limit. These results strongly prove the advantages of quantum mechanics in machine learning and communication complexity.
△ Less
Submitted 28 April, 2022; v1 submitted 14 December, 2021;
originally announced December 2021.
-
Long-distance twin-field quantum key distribution with entangled sources
Authors:
Bing-Hong Li,
Yuan-Mei Xie,
Zhao Li,
Chen-Xun Weng,
Chen-Long Li,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Twin-field quantum key distribution (TFQKD), using single-photon-type interference, offers a way to exceed the rate-distance limit without quantum repeaters. However, it still suffers from the photon losses and dark counts, which impose an ultimate limit on its transmission distance. In this letter, we propose a scheme to implement TFQKD with an entangled coherent state source in the middle to inc…
▽ More
Twin-field quantum key distribution (TFQKD), using single-photon-type interference, offers a way to exceed the rate-distance limit without quantum repeaters. However, it still suffers from the photon losses and dark counts, which impose an ultimate limit on its transmission distance. In this letter, we propose a scheme to implement TFQKD with an entangled coherent state source in the middle to increase its range, as well as comparing its performance under coherent attacks with that of TFQKD variants. Simulations show that our protocol has a theoretical distance advantage of 400 kilometers. Moreover, the scheme has great robustness against the misalignment error and finite-size effects. Our work is a promising step toward long-distance secure communication and is greatly compatible with future global quantum network.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
Finite-key Analysis for Quantum Conference Key Agreement with Asymmetric Channels
Authors:
Zhao Li,
Xiao-Yu Cao,
Chen-Long Li,
Chen-Xun Weng,
Jie Gu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
As an essential ingredient of quantum networks, quantum conference key agreement (QCKA) provides unconditional secret keys among multiple parties, which enables only legitimate users to decrypt the encrypted message. Recently, some QCKA protocols employing twin-field was proposed to promote transmission distance. These protocols, however, suffer from relatively low conference key rate and short tr…
▽ More
As an essential ingredient of quantum networks, quantum conference key agreement (QCKA) provides unconditional secret keys among multiple parties, which enables only legitimate users to decrypt the encrypted message. Recently, some QCKA protocols employing twin-field was proposed to promote transmission distance. These protocols, however, suffer from relatively low conference key rate and short transmission distance over asymmetric channels, which demands a prompt solution in practice. Here, we consider a tripartite QCKA protocol utilizing the idea of sending-or-not-sending twin-field scheme and propose a high-efficiency QCKA over asymmetric channels by removing the symmetry parameters condition. Besides, we provide a composable finite-key analysis with rigorous security proof against general attacks by exploiting the entropic uncertainty relation for multiparty system. Our protocol greatly improves the feasibility to establish conference keys over asymmetric channels.
△ Less
Submitted 23 September, 2021;
originally announced September 2021.
-
Coherent one-way quantum conference key agreement based on twin field
Authors:
Xiao-Yu Cao,
Jie Gu,
Yu-Shuo Lu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum conference key agreement (CKA) enables key sharing among multiple trusted users with information-theoretic security. Currently, the key rates of most quantum CKA protocols suffer from the limit of the total efficiency among quantum channels. Inspired by the coherent one-way and twin-field quantum key distribution (QKD) protocols, we propose a quantum CKA protocol of three users. Exploiting…
▽ More
Quantum conference key agreement (CKA) enables key sharing among multiple trusted users with information-theoretic security. Currently, the key rates of most quantum CKA protocols suffer from the limit of the total efficiency among quantum channels. Inspired by the coherent one-way and twin-field quantum key distribution (QKD) protocols, we propose a quantum CKA protocol of three users. Exploiting coherent states with intensity 0 and $μ$ to encode logic bits, our protocol can break the limit. Additionally, the requirements of phase randomization and multiple intensity modulation are removed in our protocol, making its experimental demonstration simple.
△ Less
Submitted 5 September, 2021;
originally announced September 2021.