-
Multi-field quantum conferencing overcomes the network capacity limit
Authors:
Yuan-Mei Xie,
Yu-Shuo Lu,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum conferencing enables multiple nodes within a quantum network to share a secure group key for private message broadcasting. The key rate, however, is limited by the repeaterless capacity to distribute multiparticle entangled states across the network. Currently, in the finite-size regime, no feasible schemes utilizing existing experimental techniques can overcome the fundamental rate-distan…
▽ More
Quantum conferencing enables multiple nodes within a quantum network to share a secure group key for private message broadcasting. The key rate, however, is limited by the repeaterless capacity to distribute multiparticle entangled states across the network. Currently, in the finite-size regime, no feasible schemes utilizing existing experimental techniques can overcome the fundamental rate-distance limit of quantum conferencing in quantum networks without repeaters. Here, we propose a practical, multi-field scheme that breaks this limit, involving virtually establishing Greenberger-Horne-Zeilinger states through post-measurement coincidence matching. This proposal features a measurement-device-independent characteristic and can directly scale to support any number of users. Simulations show that the fundamental limitation on the group key rate can be overcome in a reasonable running time of sending $10^{14}$ pulses. We predict that it offers an efficient design for long-distance broadcast communication in future quantum networks.
△ Less
Submitted 30 June, 2024;
originally announced July 2024.
-
Efficient source-independent quantum conference key agreement
Authors:
Yu Bao,
Yi-Ran Xiao,
Yu-Chen Song,
Yao Fu,
Xiao-Yu Cao,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum conference key agreement (QCKA) enables the unconditional secure distribution of conference keys among multiple participants. Due to challenges in high-fidelity preparation and long-distance distribution of multi-photon entanglement, entanglement-based QCKA is facing severe limitations in both key rate and scalability. Here, we propose a source-independent QCKA scheme utilizing the post-ma…
▽ More
Quantum conference key agreement (QCKA) enables the unconditional secure distribution of conference keys among multiple participants. Due to challenges in high-fidelity preparation and long-distance distribution of multi-photon entanglement, entanglement-based QCKA is facing severe limitations in both key rate and scalability. Here, we propose a source-independent QCKA scheme utilizing the post-matching method, feasible within the entangled photon pair distribution network. We introduce an equivalent distributing virtual multi-photon entanglement protocol for providing the unconditional security proof even in the case of coherent attacks. For the symmetry star-network, comparing with previous $n$-photon entanglement protocol, the conference key rate is improved from $O(η^{n})$ to $O(η^{2})$, where $η$ is the transmittance from the entanglement source to one participant. Simulation results show that the performance of our protocol has multiple orders of magnitude advantages in the intercity distance. We anticipate that our approach will demonstrate its potential in the implementation of quantum networks.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Repeater-Like Asynchronous Measurement-Device-Independent Quantum Conference Key Agreement
Authors:
Yu-Shuo Lu,
Yuan-Mei Xie,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum conference key agreement facilitates secure communication among multiple parties through multipartite entanglement and is anticipated to be an important cryptographic primitive for future quantum networks. However, the experimental complexity and low efficiency associated with the synchronous detection of multipartite entangled states have significantly hindered their practical application…
▽ More
Quantum conference key agreement facilitates secure communication among multiple parties through multipartite entanglement and is anticipated to be an important cryptographic primitive for future quantum networks. However, the experimental complexity and low efficiency associated with the synchronous detection of multipartite entangled states have significantly hindered their practical application. In this work, we propose a measurement-device-independent conference key agreement protocol that utilizes asynchronous Greenberger-Horne-Zeilinger state measurement.This approach achieves a linear scaling of the conference key rate among multiple parties, exhibiting performance similar to that of the single-repeater scheme in quantum networks. The asynchronous measurement strategy bypasses the need for complex global phase locking technologies, concurrently extending the intercity transmission distance with composable security in the finite key regime. Additionally, our work also showcases the advantages of the asynchronous pairing concept in multiparty quantum entanglement.
△ Less
Submitted 22 June, 2024;
originally announced June 2024.
-
Optical read and write of spin states in organic diradicals
Authors:
Rituparno Chowdhury,
Petri Murto,
Naitik A. Panjwani,
Yan Sun,
Pratyush Ghosh,
Yorrick Boeije,
Vadim Derkach,
Seung-Je Woo,
Oliver Millington,
Daniel G. Congrave,
Yao Fu,
Tarig B. E. Mustafa,
Miguel Monteverde,
Jesús Cerdá,
Jan Behrends,
Akshay Rao,
David Beljonne,
Alexei Chepelianskii,
Hugo Bronstein,
Richard H. Friend
Abstract:
Optical control and read-out of the ground state spin structure has been demonstrated for defect states in crystalline semiconductors, including the diamond NV- center, and these are promising systems for quantum technologies. Molecular organic semiconductors offer synthetic control of spin placement, in contrast to current limitations in these crystalline systems. Here we report the discovery of…
▽ More
Optical control and read-out of the ground state spin structure has been demonstrated for defect states in crystalline semiconductors, including the diamond NV- center, and these are promising systems for quantum technologies. Molecular organic semiconductors offer synthetic control of spin placement, in contrast to current limitations in these crystalline systems. Here we report the discovery of spin-optical addressability in a diradical molecule that comprises two trityl radical groups coupled via a fluorene bridge. We demonstrate the three important properties that enable operation as a spin-photon interface: (i) triplet and singlet spin states show photoluminescence peaked at 640 and 700 nm respectively; this allows easy optical measurement of ground state spin. (ii) the ground state spin exchange is small (~60 μeV) that allows preparation of ground state spin population. This can be achieved by spin-selective excited state intersystem crossing, and we report up to 8% microwave-driven contrast in photoluminescence. (iii) both singlet and triplet manifolds have near-unity photoluminescence quantum yield, which is in contrast to the near-zero quantum yields in prior reports of molecular diradicals. Our results establish these tuneable open-shell organic molecules as a platform to engineer tailor-made spin-optical interfaces.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
Ultra-sensitive solid-state organic molecular microwave quantum receiver
Authors:
Bo Zhang,
Yuchen Han,
Hong-Liang Wu,
Hao Wu,
Shuo Yang,
Mark Oxborrow,
Qing Zhao,
Yue Fu,
Weibin Li,
Yeliang Wang,
Dezhi Zheng,
Jun Zhang
Abstract:
High-accuracy microwave sensing is widely demanded in various fields, ranging from cosmology to microwave quantum technology. Quantum receivers based on inorganic solid-state spin systems are promising candidates for such purpose because of the stability and compatibility, but their best sensitivity is currently limited to a few pT/$\sqrt{\rm{Hz}}$. Here, by utilising an enhanced readout scheme wi…
▽ More
High-accuracy microwave sensing is widely demanded in various fields, ranging from cosmology to microwave quantum technology. Quantum receivers based on inorganic solid-state spin systems are promising candidates for such purpose because of the stability and compatibility, but their best sensitivity is currently limited to a few pT/$\sqrt{\rm{Hz}}$. Here, by utilising an enhanced readout scheme with the state-of-the-art solid-state maser technology, we develop a robust microwave quantum receiver functioned by organic molecular spins at ambient conditions. Owing to the maser amplification, the sensitivity of the receiver achieves 6.14 $\pm$ 0.17 fT/$\sqrt{\rm{Hz}}$ which exceeds three orders of magnitude than that of the inorganic solid-state quantum receivers. The heterodyne detection without additional local oscillators improves bandwidth of the receiver and allows frequency detection. The scheme can be extended to other solid-state spin systems without complicated control pulses and thus enables practical applications such as electron spin resonance spectroscopy, dark matter searches, and astronomical observations.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
Superresolution imaging of two incoherent optical sources with unequal brightnesses
Authors:
Jian-Dong Zhang,
Yiwen Fu,
Lili Hou,
Shuai Wang
Abstract:
Resolving the separation between two incoherent optical sources with high precision is of great significance for fluorescence imaging and astronomical observations. In this paper, we focus on a more general scenario where two sources have unequal brightnesses. We give the ultimate precision limit with respect to separation by using the quantum Fisher information. Through the calculation of the cla…
▽ More
Resolving the separation between two incoherent optical sources with high precision is of great significance for fluorescence imaging and astronomical observations. In this paper, we focus on a more general scenario where two sources have unequal brightnesses. We give the ultimate precision limit with respect to separation by using the quantum Fisher information. Through the calculation of the classical Fisher information, we analyze and compare several specific measurement schemes including direct measurement, Gaussian mode measurement and zero-photon measurement. The results indicate that Gaussian mode measurement is the nearly optimal for a small separation. Our work provides a positive complement to the aspect of superresolution imaging of incoherent sources.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Topological modes and spectral flows in inhomogeneous PT-symmetric continuous media
Authors:
Yichen Fu,
Hong Qin
Abstract:
In classical Hermitian continuous media, the spectral-flow index of topological modes is linked to the bulk topology via index theorem. However, the interface between two bulks is usually non-Hermitian due to the inhomogeneities of system parameters. We show that the connection between topological modes and bulk topology still exists despite the non-Hermiticity at the interface if the system is en…
▽ More
In classical Hermitian continuous media, the spectral-flow index of topological modes is linked to the bulk topology via index theorem. However, the interface between two bulks is usually non-Hermitian due to the inhomogeneities of system parameters. We show that the connection between topological modes and bulk topology still exists despite the non-Hermiticity at the interface if the system is endowed with PT symmetry. The theoretical framework developed is applied to the Hall magnetohydrodynamic model to identify a topological mode called topological Alfvén-sound wave in magnetized plasmas.
△ Less
Submitted 13 June, 2024; v1 submitted 18 September, 2023;
originally announced September 2023.
-
Experimental quantum e-commerce
Authors:
Xiao-Yu Cao,
Bing-Hong Li,
Yang Wang,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
E-commerce, a type of trading that occurs at a high frequency on the Internet, requires guaranteeing the integrity, authentication and non-repudiation of messages through long distance. As current e-commerce schemes are vulnerable to computational attacks, quantum cryptography, ensuring information-theoretic security against adversary's repudiation and forgery, provides a solution to this problem.…
▽ More
E-commerce, a type of trading that occurs at a high frequency on the Internet, requires guaranteeing the integrity, authentication and non-repudiation of messages through long distance. As current e-commerce schemes are vulnerable to computational attacks, quantum cryptography, ensuring information-theoretic security against adversary's repudiation and forgery, provides a solution to this problem. However, quantum solutions generally have much lower performance compared to classical ones. Besides, when considering imperfect devices, the performance of quantum schemes exhibits a significant decline. Here, for the first time, we demonstrate the whole e-commerce process of involving the signing of a contract and payment among three parties by proposing a quantum e-commerce scheme, which shows resistance of attacks from imperfect devices. Results show that with a maximum attenuation of 25 dB among participants, our scheme can achieve a signature rate of 0.82 times per second for an agreement size of approximately 0.428 megabit. This proposed scheme presents a promising solution for providing information-theoretic security for e-commerce.
△ Less
Submitted 13 January, 2024; v1 submitted 17 August, 2023;
originally announced August 2023.
-
Nontrivial worldline winding in non-Hermitian quantum systems
Authors:
Shi-Xin Hu,
Yongxu Fu,
Yi Zhang
Abstract:
Amid the growing interest in non-Hermitian quantum systems, non-interacting models have received the most attention. Here, through the stochastic series expansion quantum Monte Carlo method, we investigate non-Hermitian physics in interacting quantum systems, e.g., various non-Hermitian quantum spin chains. While calculations yield consistent numerical results under open boundary conditions, non-H…
▽ More
Amid the growing interest in non-Hermitian quantum systems, non-interacting models have received the most attention. Here, through the stochastic series expansion quantum Monte Carlo method, we investigate non-Hermitian physics in interacting quantum systems, e.g., various non-Hermitian quantum spin chains. While calculations yield consistent numerical results under open boundary conditions, non-Hermitian quantum systems under periodic boundary conditions observe an unusual concentration of imaginary-time worldlines over nontrivial winding and require enhanced ergodicity between winding-number sectors for proper convergences. Such nontrivial worldline winding is an emergent physical phenomenon that also exists in other non-Hermitian models and analytical approaches. Alongside the non-Hermitian skin effect and the point-gap spectroscopy, it largely extends the identification and analysis of non-Hermitian topological phenomena to quantum systems with interactions, finite temperatures, biorthogonal basis, and periodic boundary conditions in a novel and controlled fashion. Finally, we study the direct physical implications of such nontrivial worldline winding, which bring additional, potentially quasi-long-range contributions to the entanglement entropy.
△ Less
Submitted 10 December, 2023; v1 submitted 3 July, 2023;
originally announced July 2023.
-
Asynchronous measurement-device-independent quantum key distribution with hybrid source
Authors:
Jun-Lin Bai,
Yuan-Mei Xie,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
The linear constraint of secret key rate capacity is overcome by the tiwn-field quantum key distribution (QKD). However, the complex phase-locking and phase-tracking technique requirements throttle the real-life applications of twin-field protocol. The asynchronous measurement-device-independent (AMDI) QKD or called mode-pairing QKD protocol can relax the technical requirements and keep the simila…
▽ More
The linear constraint of secret key rate capacity is overcome by the tiwn-field quantum key distribution (QKD). However, the complex phase-locking and phase-tracking technique requirements throttle the real-life applications of twin-field protocol. The asynchronous measurement-device-independent (AMDI) QKD or called mode-pairing QKD protocol can relax the technical requirements and keep the similar performance of twin-field protocol. Here, we propose an AMDI-QKD protocol with a nonclassical light source by changing the phase-randomized weak coherent state to a phase-randomized coherent-state superposition in the signal state time window. Simulation results show that our proposed hybrid source protocol significantly enhances the key rate of the AMDI-QKD protocol, while exhibiting robustness to imperfect modulation of nonclassical light sources.
△ Less
Submitted 7 August, 2023; v1 submitted 10 April, 2023;
originally announced April 2023.
-
Experimental quantum secret sharing based on phase encoding of coherent states
Authors:
Ao Shen,
Xiao-Yu Cao,
Yang Wang,
Yao Fu,
Jie Gu,
Wen-Bo Liu,
Chen-Xun Weng,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum secret sharing (QSS) is one of the basic communication primitives in future quantum networks which addresses part of the basic cryptographic tasks of multiparty communication and computation. Nevertheless, it is a challenge to provide a practical QSS protocol with security against general attacks. A QSS protocol that balances security and practicality is still lacking. Here, we propose a Q…
▽ More
Quantum secret sharing (QSS) is one of the basic communication primitives in future quantum networks which addresses part of the basic cryptographic tasks of multiparty communication and computation. Nevertheless, it is a challenge to provide a practical QSS protocol with security against general attacks. A QSS protocol that balances security and practicality is still lacking. Here, we propose a QSS protocol with simple phase encoding of coherent states among three parties. Removing the requirement of impractical entangled resources and the need for phase randomization, our protocol can be implemented with accessible technology. We provide the finite-key analysis against coherent attacks and implement a proof-of-principle experiment to demonstrate our scheme's feasibility. Our scheme achieves a key rate of 85.3 bps under a 35 dB channel loss. Combined with security against general attacks and accessible technology, our protocol is a promising candidate for practical multiparty quantum communication networks.
△ Less
Submitted 27 March, 2023; v1 submitted 26 March, 2023;
originally announced March 2023.
-
Phase-Matching Quantum Key Distribution without Intensity Modulation
Authors:
Shan-Feng Shao,
Xiao-Yu Cao,
Yuan-Mei Xie,
Jie Gu,
Wen-Bo Liu,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum key distribution provides a promising solution for sharing secure keys between two distant parties with unconditional security. Nevertheless, quantum key distribution is still severely threatened by the imperfections of devices. In particular, the classical pulse correlation threatens security when sending decoy states. To address this problem and simplify experimental requirements, we pro…
▽ More
Quantum key distribution provides a promising solution for sharing secure keys between two distant parties with unconditional security. Nevertheless, quantum key distribution is still severely threatened by the imperfections of devices. In particular, the classical pulse correlation threatens security when sending decoy states. To address this problem and simplify experimental requirements, we propose a phase-matching quantum key distribution protocol without intensity modulation. Instead of using decoy states, we propose a novel method to estimate the theoretical upper bound on the phase error rate contributed by even-photon-number components. Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber. Furthermore, we perform a proof-of-principle experiment to demonstrate the feasibility of our protocol, and the key rate reaches 22.5 bps under a 45 dB channel loss. Addressing the security loophole of pulse intensity correlation and replacing continuous random phase with 6 or 8 slices random phase, our protocol provides a promising solution for constructing quantum networks.
△ Less
Submitted 19 August, 2023; v1 submitted 21 March, 2023;
originally announced March 2023.
-
One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys
Authors:
Bing-Hong Li,
Yuan-Mei Xie,
Xiao-Yu Cao,
Chen-Long Li,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum digital signatures (QDS), generating correlated bit strings among three remote parties for signatures through quantum law, can guarantee non-repudiation, authenticity, and integrity of messages. Recently, one-time universal hashing QDS framework, exploiting the quantum asymmetric encryption and universal hash functions, has been proposed to significantly improve the signature rate and ensu…
▽ More
Quantum digital signatures (QDS), generating correlated bit strings among three remote parties for signatures through quantum law, can guarantee non-repudiation, authenticity, and integrity of messages. Recently, one-time universal hashing QDS framework, exploiting the quantum asymmetric encryption and universal hash functions, has been proposed to significantly improve the signature rate and ensure unconditional security by directly signing the hash value of long messages. However, similar to quantum key distribution, this framework utilizes keys with perfect secrecy by performing privacy amplification that introduces cumbersome matrix operations, thereby consuming large computational resources, causing delays and increasing failure probability. Here, we prove that, different from private communication, imperfect quantum keys with limited information leakage can be used for digital signatures and authentication without compromising the security while having eight orders of magnitude improvement on signature rate for signing a megabit message compared with conventional single-bit schemes. This study significantly reduces the delay for data postprocessing and is compatible with any quantum key generation protocols. In our simulation, taking two-photon twin-field key generation protocol as an example, QDS can be practically implemented over a fiber distance of 650 km between the signer and receiver. For the first time, this study offers a cryptographic application of quantum keys with imperfect secrecy and paves a way for the practical and agile implementation of digital signatures in a future quantum network.
△ Less
Submitted 4 October, 2023; v1 submitted 3 January, 2023;
originally announced January 2023.
-
Breaking Rate-Distance Limitation of Measurement-Device-Independent Quantum Secret Sharing
Authors:
Chen-Long Li,
Yao Fu,
Wen-Bo Liu,
Yuan-Mei Xie,
Bing-Hong Li,
Min-Gang Zhou,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Currently most progresses on quantum secret sharing suffer from rate-distance bound, and thus the key rates are limited. In addition to the limited key rate, the technical difficulty and the corresponding cost together prevent large-scale deployment. Furthermore, the performance of most existing protocols is analyzed in the asymptotic regime without considering participant attacks. Here we report…
▽ More
Currently most progresses on quantum secret sharing suffer from rate-distance bound, and thus the key rates are limited. In addition to the limited key rate, the technical difficulty and the corresponding cost together prevent large-scale deployment. Furthermore, the performance of most existing protocols is analyzed in the asymptotic regime without considering participant attacks. Here we report a measurement-device-independent quantum secret sharing protocol with improved key rate and transmission distance. Based on spatial multiplexing, our protocol shows it can break rate-distance bounds over network under at least ten communication parties. Compared with other protocols, our work improves the secret key rate by more than two orders of magnitude and has a longer transmission distance. We analyze the security of our protocol in the composable framework considering participant attacks and evaluate its performance in the finite-size regime. In addition, we investigate applying our protocol to digital signatures where the signature rate is improved more than $10^7$ times compared with existing protocols. We anticipate that our quantum secret sharing protocol will provide a solid future for multiparty applications on the quantum network.
△ Less
Submitted 7 August, 2023; v1 submitted 10 December, 2022;
originally announced December 2022.
-
Breaking universal limitations on quantum conference key agreement without quantum memory
Authors:
Chen-Long Li,
Yao Fu,
Wen-Bo Liu,
Yuan-Mei Xie,
Bing-Hong Li,
Min-Gang Zhou,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires high-brightness and robust multiphoton entanglement sources, which is challenging in experiment and unpractical in application because of limited transmission distance caused by channel loss. Here we report a measurement-device-independent quantum conference key ag…
▽ More
Quantum conference key agreement is an important cryptographic primitive for future quantum network. Realizing this primitive requires high-brightness and robust multiphoton entanglement sources, which is challenging in experiment and unpractical in application because of limited transmission distance caused by channel loss. Here we report a measurement-device-independent quantum conference key agreement protocol with enhanced transmission efficiency over lossy channel. With spatial multiplexing nature and adaptive operation, our protocol can break key rate bounds on quantum communication over quantum network without quantum memory. Compared with previous work, our protocol shows superiority in key rate and transmission distance within the state-of-the-art technology. Furthermore, we analyse the security of our protocol in the composable framework and evaluate its performance in the finite-size regime to show practicality. Based on our results, we anticipate that our protocol will play an indispensable role in constructing multipartite quantum network.
△ Less
Submitted 11 April, 2023; v1 submitted 10 December, 2022;
originally announced December 2022.
-
All-Photonic Quantum Repeater for Multipartite Entanglement Generation
Authors:
Chen-Long Li,
Yao Fu,
Wen-Bo Liu,
Yuan-Mei Xie,
Bing-Hong Li,
Min-Gang Zhou,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Quantum network applications like distributed quantum computing and quantum secret sharing present a promising future network equipped with quantum resources. Entanglement generation and distribution over long distances is critical and unavoidable to utilize quantum technology in a fully-connected network. The distribution of bipartite entanglement over long distances has seen some progresses, whi…
▽ More
Quantum network applications like distributed quantum computing and quantum secret sharing present a promising future network equipped with quantum resources. Entanglement generation and distribution over long distances is critical and unavoidable to utilize quantum technology in a fully-connected network. The distribution of bipartite entanglement over long distances has seen some progresses, while the distribution of multipartite entanglement over long distances remains unsolved. Here we report a two-dimensional quantum repeater protocol for the generation of multipartite entanglement over long distances with all-photonic framework to fill this gap. The yield of the proposed protocol shows long transmission distance under various numbers of network users. With the improved efficiency and flexibility of extending the number of users, we anticipate that our protocol can work as a significant building block for quantum networks in the future.
△ Less
Submitted 10 December, 2022;
originally announced December 2022.
-
Efficient calculation of three-dimensional tensor networks
Authors:
Li-** Yang,
Y. F. Fu,
Z. Y. Xie,
T. Xiang
Abstract:
We have proposed an efficient algorithm to calculate physical quantities in the translational invariant three-dimensional tensor networks, which is particularly relevant to the study of the three-dimensional classical statistical models and the (2+1)-dimensional quantum lattice models. In the context of a classical model, we determine the partition function by solving the dominant eigenvalue probl…
▽ More
We have proposed an efficient algorithm to calculate physical quantities in the translational invariant three-dimensional tensor networks, which is particularly relevant to the study of the three-dimensional classical statistical models and the (2+1)-dimensional quantum lattice models. In the context of a classical model, we determine the partition function by solving the dominant eigenvalue problem of the transfer matrix, whose left and right dominant eigenvectors are represented by two projected entangled simplex states. These two projected entangled simplex states are not Hermitian conjugate to each other but are appropriately arranged so that their inner product can be computed much more efficiently than in the usual prescription. For the three-dimensional Ising model, the calculated internal energy and spontaneous magnetization agree with the published results in the literature. The possible improvement and extension to other models are also discussed.
△ Less
Submitted 14 April, 2023; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Experimental investigation of quantum correlations in a two-qutrit spin system
Authors:
Yue Fu,
Wenquan Liu,
Xiangyu Ye,
Ya Wang,
Chengjie Zhang,
Chang-Kui Duan,
Xing Rong,
Jiangfeng Du
Abstract:
We report an experimental investigation of quantum correlations in a two-qutrit spin system in a single nitrogen-vacancy center in diamond at room temperatures. Quantum entanglement between two qutrits was observed at room temperature and the existence of non-classical correlations beyond entanglement in the qutrit case has been revealed. Our work demonstrates the potential of the NV centers as th…
▽ More
We report an experimental investigation of quantum correlations in a two-qutrit spin system in a single nitrogen-vacancy center in diamond at room temperatures. Quantum entanglement between two qutrits was observed at room temperature and the existence of non-classical correlations beyond entanglement in the qutrit case has been revealed. Our work demonstrates the potential of the NV centers as the multi-qutrit system to execute quantum information tasks and provides a powerful experimental platform for studying fundamental physics of high-dimensional quantum systems in future.
△ Less
Submitted 10 August, 2022;
originally announced August 2022.
-
Sharing tripartite nonlocality sequentially by arbitrarily many independent observers
Authors:
Ya Xi Mao-Sheng Li Libin Fu,
Zhu-Jun Zheng
Abstract:
There exist bipartite entangled states whose violations of Clauser-Horne-Shimony-Holt (CHSH) Bell inequality can be observed by a single Alice and arbitrarily many sequential Bobs [Phys. Rev. Lett. 125, 090401 (2020)]. Here we consider its analogues for tripartite systems: a tripartite entangled state is shared among Alice, Bob and multiple Charlies. The first Charlie measures his qubit and then p…
▽ More
There exist bipartite entangled states whose violations of Clauser-Horne-Shimony-Holt (CHSH) Bell inequality can be observed by a single Alice and arbitrarily many sequential Bobs [Phys. Rev. Lett. 125, 090401 (2020)]. Here we consider its analogues for tripartite systems: a tripartite entangled state is shared among Alice, Bob and multiple Charlies. The first Charlie measures his qubit and then passes his qubit to the next Charlie who measures again with other measurements and so on. The goal is to maximize the number of Charlies that can observe some kind of nonlocality with the single Alice and Bob. It has been shown that at most two Charlies could share genuine nonlocality of the Greenberger-Horne-Zeilinger (GHZ) state via the violation of Svetlichny inequality with Alice and Bob [Quantum Inf. Process. 18, 42 (2019) and Phys. Rev. A 103, 032216 (2021)]. In this work, we show that arbitrarily many Charlies can have standard nonlocality (via violations of Mermin inequality) and some other kind of genuine nonlocality (which is known as genuinely nonsignal nonlocality) with the single Alice and single Bob.
△ Less
Submitted 6 November, 2023; v1 submitted 1 July, 2022;
originally announced July 2022.
-
Source-independent quantum random number generator against tailored detector blinding attacks
Authors:
Wen-Bo Liu,
Yu-Shuo Lu,
Yao Fu,
Si-Cheng Huang,
Ze-Jie Yin,
Kun Jiang,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Randomness, mainly in the form of random numbers, is the fundamental prerequisite for the security of many cryptographic tasks. Quantum randomness can be extracted even if adversaries are fully aware of the protocol and even control the randomness source. However, an adversary can further manipulate the randomness via tailored detector blinding attacks, which are hacking attacks suffered by protoc…
▽ More
Randomness, mainly in the form of random numbers, is the fundamental prerequisite for the security of many cryptographic tasks. Quantum randomness can be extracted even if adversaries are fully aware of the protocol and even control the randomness source. However, an adversary can further manipulate the randomness via tailored detector blinding attacks, which are hacking attacks suffered by protocols with trusted detectors. Here, by treating no-click events as valid events, we propose a quantum random number generation protocol that can simultaneously address source vulnerability and ferocious tailored detector blinding attacks. The method can be extended to high-dimensional random number generation. We experimentally demonstrate the ability of our protocol to generate random numbers for two-dimensional measurement with a generation speed of 0.1 bit per pulse.
△ Less
Submitted 23 March, 2023; v1 submitted 26 April, 2022;
originally announced April 2022.
-
Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources
Authors:
Jie Gu,
Xiao-Yu Cao,
Yao Fu,
Zong-Wu He,
Ze-Jie Yin,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
The security of quantum key distribution (QKD) is severely threatened by discrepancies between realistic devices and theoretical assumptions. Recently, a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws, side channels caused by mode dependencies, the Trojan horse atttacks an…
▽ More
The security of quantum key distribution (QKD) is severely threatened by discrepancies between realistic devices and theoretical assumptions. Recently, a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws, side channels caused by mode dependencies, the Trojan horse atttacks and pulse correlations. Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections. We present a characterization of source flaws and connect them to experiments, together with a finite-key analysis against coherent attacks. In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss. Compared with previous QKD protocols with imperfect devices, our study considerably improves both the secure key rate and the transmission distance, and shows application potential in the practical deployment of secure QKD with device imperfections.
△ Less
Submitted 27 October, 2022; v1 submitted 18 April, 2022;
originally announced April 2022.
-
Breaking the Rate-Loss Bound of Quantum Key Distribution with Asynchronous Two-Photon Interference
Authors:
Yuan-Mei Xie,
Yu-Shuo Lu,
Chen-Xun Weng,
Xiao-Yu Cao,
Zhao-Ying Jia,
Yu Bao,
Yang Wang,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless quantum key distribution via single-photon interference. However, to compensate for the channel fluctuations and lock the laser fluctuations, the techniques of phase tracking and phase locking are indispensable in experiment, which drastically increase experimental complexity and hinder free-space realization.…
▽ More
Twin-field quantum key distribution can overcome the secret key capacity of repeaterless quantum key distribution via single-photon interference. However, to compensate for the channel fluctuations and lock the laser fluctuations, the techniques of phase tracking and phase locking are indispensable in experiment, which drastically increase experimental complexity and hinder free-space realization. Inspired by the duality in entanglement, we herein present an asynchronous measurement-device-independent quantum key distribution protocol that can surpass the secret key capacity even without phase tracking and phase locking. Leveraging the concept of time multiplexing, asynchronous two-photon Bell-state measurement is realized by postmatching two interference detection events. For a 1 GHz system, the new protocol reaches a transmission distance of 450 km without phase tracking. After further removing phase locking, our protocol is still capable of breaking the capacity at 270 km. Intriguingly, when using the same experimental techniques, our protocol has a higher key rate than the phase-matching-type twin-field protocol. In the presence of imperfect intensity modulation, it also has a significant advantage in terms of the transmission distance over the sending-or-not-sending type twin-field protocol. With high key rates and accessible technology, our work provides a promising candidate for practical scalable quantum communication networks.
△ Less
Submitted 26 April, 2022; v1 submitted 21 December, 2021;
originally announced December 2021.
-
Scalable High-Rate Twin-Field Quantum Key Distribution Networks without Constraint of Probability and Intensity
Authors:
Yuan-Mei Xie,
Chen-Xun Weng,
Yu-Shuo Lu,
Yao Fu,
Yang Wang,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Implementation of a twin-field quantum key distribution network faces limitations, including the low tolerance of interference errors for phase-matching type protocols and the strict constraint regarding intensity and probability for sending-or-not-sending type protocols. Here, we propose a two-photon twin-field quantum key distribution protocol and achieve twin-field-type two-photon interference…
▽ More
Implementation of a twin-field quantum key distribution network faces limitations, including the low tolerance of interference errors for phase-matching type protocols and the strict constraint regarding intensity and probability for sending-or-not-sending type protocols. Here, we propose a two-photon twin-field quantum key distribution protocol and achieve twin-field-type two-photon interference through post-matching phase-correlated single-photon interference events. We exploit the non-interference mode as the code mode to highly tolerate interference errors, and the two-photon interference naturally removes the intensity and probability constraint. Therefore, our protocol can transcend the abovementioned limitations while breaking the secret key capacity of repeaterless quantum key distribution. Simulations show that for a four-user networks, under which each node with fixed system parameters can dynamically switch different attenuation links, the key rates of our protocol for all six links can either exceed or approach the secret key capacity. However, the key rates of all links are lower than the key capacity when using phase-matching type protocols. Additionally, four of the links could not extract the key when using sending-or-not-sending type protocols. We anticipate that our protocol can facilitate the development of practical and efficient quantum networks.
△ Less
Submitted 9 April, 2023; v1 submitted 21 December, 2021;
originally announced December 2021.
-
Experimental quantum advantage with quantum coupon collector
Authors:
Min-Gang Zhou,
Xiao-Yu Cao,
Yu-Shuo Lu,
Yang Wang,
Yu Bao,
Zhao-Ying Jia,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
An increasing number of communication and computational schemes with quantum advantages have recently been proposed, which implies that quantum technology has fertile application prospects. However, demonstrating these schemes experimentally continues to be a central challenge because of the difficulty in preparing high-dimensional states or highly entangled states. In this study, we introduce and…
▽ More
An increasing number of communication and computational schemes with quantum advantages have recently been proposed, which implies that quantum technology has fertile application prospects. However, demonstrating these schemes experimentally continues to be a central challenge because of the difficulty in preparing high-dimensional states or highly entangled states. In this study, we introduce and analyse a quantum coupon collector protocol by employing coherent states and simple linear optical elements, which was successfully demonstrated using realistic experimental equipment. We showed that our protocol can significantly reduce the number of samples needed to learn a specific set compared with the classical limit of the coupon collector problem. We also discuss the potential values and expansions of the quantum coupon collector by constructing a quantum blind box game. The information transmitted by the proposed game also broke the classical limit. These results strongly prove the advantages of quantum mechanics in machine learning and communication complexity.
△ Less
Submitted 28 April, 2022; v1 submitted 14 December, 2021;
originally announced December 2021.
-
Experimentally Detecting Quantized Zak Phases without Chiral Symmetry in Photonic Lattices
Authors:
Zhi-Qiang Jiao,
Stefano Longhi,
Xiao-Wei Wang,
Jun Gao,
Wen-Hao Zhou,
Yao Wang,
Yu-Xuan Fu,
Li Wang,
Ruo-**g Ren,
Lu-Feng Qiao,
Xian-Min **
Abstract:
Symmetries play a major role in identifying topological phases of matter and in establishing a direct connection between protected edge states and topological bulk invariants via the bulk-boundary correspondence. One-dimensional lattices are deemed to be protected by chiral symmetry, exhibiting quantized Zak phases and protected edge states, but not for all cases. Here, we experimentally realize a…
▽ More
Symmetries play a major role in identifying topological phases of matter and in establishing a direct connection between protected edge states and topological bulk invariants via the bulk-boundary correspondence. One-dimensional lattices are deemed to be protected by chiral symmetry, exhibiting quantized Zak phases and protected edge states, but not for all cases. Here, we experimentally realize an extended Su-Schrieffer-Heeger model with broken chiral symmetry by engineering one-dimensional zigzag photonic lattices, where the long-range hop** breaks chiral symmetry but ensures the existence of inversion symmetry. By the averaged mean displacement method, we detect topological invariants directly in the bulk through the continuous-time quantum walk of photons. Our results demonstrate that inversion symmetry protects the quantized Zak phase, but edge states can disappear in the topological nontrivial phase, thus breaking the conventional bulk-boundary correspondence. Our photonic lattice provides a useful platform to study the interplay among topological phases, symmetries, and the bulk-boundary correspondence.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Neural network-based prediction of the secret-key rate of quantum key distribution
Authors:
Min-Gang Zhou,
Zhi-** Liu,
Wen-Bo Liu,
Chen-Long Li,
Jun-Lin Bai,
Yi-Ran Xue,
Yao Fu,
Hua-Lei Yin,
Zeng-Bing Chen
Abstract:
Numerical methods are widely used to calculate the secure key rate of many quantum key distribution protocols in practice, but they consume many computing resources and are too time-consuming. In this work, we take the homodyne detection discrete-modulated continuous-variable quantum key distribution (CV-QKD) as an example, and construct a neural network that can quickly predict the secure key rat…
▽ More
Numerical methods are widely used to calculate the secure key rate of many quantum key distribution protocols in practice, but they consume many computing resources and are too time-consuming. In this work, we take the homodyne detection discrete-modulated continuous-variable quantum key distribution (CV-QKD) as an example, and construct a neural network that can quickly predict the secure key rate based on the experimental parameters and experimental results. Compared to traditional numerical methods, the speed of the neural network is improved by several orders of magnitude. Importantly, the predicted key rates are not only highly accurate but also highly likely to be secure. This allows the secure key rate of discrete-modulated CV-QKD to be extracted in real time on a low-power platform. Furthermore, our method is versatile and can be extended to quickly calculate the complex secure key rates of various other unstructured quantum key distribution protocols.
△ Less
Submitted 29 May, 2022; v1 submitted 5 August, 2021;
originally announced August 2021.
-
Experimental quantum secure network with digital signatures and encryption
Authors:
Hua-Lei Yin,
Yao Fu,
Chen-Long Li,
Chen-Xun Weng,
Bing-Hong Li,
Jie Gu,
Yu-Shuo Lu,
Shan Huang,
Zeng-Bing Chen
Abstract:
Cryptography promises four information security objectives, namely, confidentiality, integrity, authenticity, and non-repudiation, to support trillions of transactions annually in the digital economy. Efficient digital signatures, ensuring the integrity, authenticity, and non-repudiation of data with information-theoretical security are highly urgent and intractable open problems in cryptography.…
▽ More
Cryptography promises four information security objectives, namely, confidentiality, integrity, authenticity, and non-repudiation, to support trillions of transactions annually in the digital economy. Efficient digital signatures, ensuring the integrity, authenticity, and non-repudiation of data with information-theoretical security are highly urgent and intractable open problems in cryptography. Here, we propose a protocol of high-efficiency quantum digital signatures using secret sharing, one-time universal$_2$ hashing, and the one-time pad. We just need to use a 384-bit key to sign documents of up to $2^{64}$ lengths with a security bound of $10^{-19}$. If one-megabit document is signed, the signature efficiency is improved by more than $10^8$ times compared with previous quantum digital signature protocols. Furthermore, we build the first all-in-one quantum secure network integrating information-theoretically secure communication, digital signatures, secret sharing, and conference key agreement and experimentally demonstrate this signature efficiency advantage. Our work completes the cryptography toolbox of the four information security objectives.
△ Less
Submitted 9 June, 2022; v1 submitted 29 July, 2021;
originally announced July 2021.
-
Secure Quantum Secret Sharing without Signal Disturbance Monitoring
Authors:
Hua-Lei Yin,
Jie Gu,
Yuan-Mei Xie,
Wen-Bo Liu,
Yao Fu,
Zeng-Bing Chen
Abstract:
Quantum secret sharing (QSS) is an essential primitive for the future quantum internet, which promises secure multiparty communication. However, develo** a large-scale QSS network is a huge challenge due to the channel loss and the requirement of multiphoton interference or high-fidelity multipartite entanglement distribution. Here, we propose a three-user QSS protocol without monitoring signal…
▽ More
Quantum secret sharing (QSS) is an essential primitive for the future quantum internet, which promises secure multiparty communication. However, develo** a large-scale QSS network is a huge challenge due to the channel loss and the requirement of multiphoton interference or high-fidelity multipartite entanglement distribution. Here, we propose a three-user QSS protocol without monitoring signal disturbance, which is capable of ensuring the unconditional security. The final key rate of our protocol can be demonstrated to break the Pirandola-Laurenza-Ottaviani-Banchi bound of quantum channel and its simulated transmission distance can approach over 600 km using current techniques. Our results pave the way to realizing high-rate and large-scale QSS networks.
△ Less
Submitted 23 September, 2021; v1 submitted 20 April, 2021;
originally announced April 2021.
-
Quantum Advantage with Timestamp Membosonsampling
Authors:
Jun Gao,
Xiao-Wei Wang,
Wen-Hao Zhou,
Zhi-Qiang Jiao,
Ruo-**g Ren,
Yu-Xuan Fu,
Lu-Feng Qiao,
Xiao-Yun Xu,
Chao-Ni Zhang,
Xiao-Ling Pang,
Hang Li,
Yao Wang,
Xian-Min **
Abstract:
Quantum computer, harnessing quantum superposition to boost a parallel computational power, promises to outperform its classical counterparts and offer an exponentially increased scaling. The term "quantum advantage" was proposed to mark the key point when people can solve a classically intractable problem by artificially controlling a quantum system in an unprecedented scale, even without error c…
▽ More
Quantum computer, harnessing quantum superposition to boost a parallel computational power, promises to outperform its classical counterparts and offer an exponentially increased scaling. The term "quantum advantage" was proposed to mark the key point when people can solve a classically intractable problem by artificially controlling a quantum system in an unprecedented scale, even without error correction or known practical applications. Boson sampling, a problem about quantum evolutions of multi-photons on multimode photonic networks, as well as its variants, has been considered as a promising candidate to reach this milestone. However, the current photonic platforms suffer from the scaling problems, both in photon numbers and circuit modes. Here, we propose a new variant of the problem, timestamp membosonsampling, exploiting the timestamp information of single photons as free resources, and the scaling of the problem can be in principle extended to infinitely large. We experimentally verify the scheme on a self-looped photonic chip inspired by memristor, and obtain multi-photon registrations up to 56-fold in 750,000 modes with a Hilbert space up to $10^{254}$. Our work exhibits an integrated and cost-efficient shortcut step** into the "quantum advantage" regime in a photonic system far beyond previous scenarios, and provide a scalable and controllable platform for quantum information processing.
△ Less
Submitted 7 December, 2020;
originally announced December 2020.
-
Time-Delayed Magnetic Control and Narrowing of X-Ray frequency Spectra in Two-Target Nuclear Forward Scattering
Authors:
Po-Han Lin,
Yen-Yu Fu,
Wen-Te Liao
Abstract:
Controlling and narrowing x-ray frequency spectra in magnetically perturbed two-target nuclear forward scattering is theoretically studied. We show that different hard-x-ray spectral redistributions can be achieved by single or multiple switching of magnetic field in nuclear targets. Our scheme can generate x-ray spectral lines with tenfold intensity enhancement and spectral width narrower than fo…
▽ More
Controlling and narrowing x-ray frequency spectra in magnetically perturbed two-target nuclear forward scattering is theoretically studied. We show that different hard-x-ray spectral redistributions can be achieved by single or multiple switching of magnetic field in nuclear targets. Our scheme can generate x-ray spectral lines with tenfold intensity enhancement and spectral width narrower than four times the nuclear natural linewidth. The present results pave the way towards a brighter and flexible x-ray source for precision spectroscopy of nuclear resonances using modern synchrotron radiation.
△ Less
Submitted 15 November, 2020; v1 submitted 20 October, 2020;
originally announced October 2020.
-
Spontaneous and explicit parity-time-symmetry breaking in drift wave instabilities
Authors:
Hong Qin,
Yichen Fu,
Alexander S. Glasser,
Asher Yahalom
Abstract:
A method of Parity-Time (PT)-symmetry analysis is introduced to study the high dimensional, complicated parameter space of drift wave instabilities. We show that spontaneous PT-symmetry breaking leads to the Ion Temperature Gradient (ITG) instability of drift waves, and the collisional instability is the result of explicit PT-symmetry breaking. A new unstable drift wave induced by finite collision…
▽ More
A method of Parity-Time (PT)-symmetry analysis is introduced to study the high dimensional, complicated parameter space of drift wave instabilities. We show that spontaneous PT-symmetry breaking leads to the Ion Temperature Gradient (ITG) instability of drift waves, and the collisional instability is the result of explicit PT-symmetry breaking. A new unstable drift wave induced by finite collisionality is identified. It is also found that gradients of ion temperature and density can destabilize the ion cyclotron waves when PT symmetry is explicitly broken by a finite collisionality.
△ Less
Submitted 19 October, 2020;
originally announced October 2020.
-
Phase self-aligned continuous-variable measurement-device-independent quantum key distribution
Authors:
Hua-Lei Yin,
Wei Zhu,
Yao Fu
Abstract:
Continuous-variable measurement-independent-device quantum key distribution (CV-MDI-QKD) can offer high secure key rate at metropolitan distance and remove all side channel loopholes of detection as well. However, there is no complete experimental demonstration of CV-MDI-QKD due to the remote distance phase-locking techniques challenge. Here, we present a new optical scheme to overcome this diffic…
▽ More
Continuous-variable measurement-independent-device quantum key distribution (CV-MDI-QKD) can offer high secure key rate at metropolitan distance and remove all side channel loopholes of detection as well. However, there is no complete experimental demonstration of CV-MDI-QKD due to the remote distance phase-locking techniques challenge. Here, we present a new optical scheme to overcome this difficulty and also removes the requirement of two identical independent lasers. We anticipate that our new scheme can be used to demonstrate the in-field CV-MDI-QKD experiment and build the CV-MDI-QKD network with untrusted source.
△ Less
Submitted 10 January, 2019; v1 submitted 30 May, 2018;
originally announced May 2018.
-
Measurement-Device-Independent Twin-Field Quantum Key Distribution
Authors:
Hua-Lei Yin,
Yao Fu
Abstract:
The ultimate aim of quantum key distribution (QKD) is improving the performance of transmission distance and key generation speed. Unfortunately, it is believed to be limited by the secret-key capacity of quantum channel without quantum repeater. Recently, a novel twin-field QKD (TFQKD) [Nature 557, 400 (2018)] is proposed to break through the limit, where the key rate is proportional to the squar…
▽ More
The ultimate aim of quantum key distribution (QKD) is improving the performance of transmission distance and key generation speed. Unfortunately, it is believed to be limited by the secret-key capacity of quantum channel without quantum repeater. Recently, a novel twin-field QKD (TFQKD) [Nature 557, 400 (2018)] is proposed to break through the limit, where the key rate is proportional to the square-root of channel transmittance. Here, by using the vacuum and one-photon state as a qubit, we show that the TF-QKD can be regarded as a measurement-device-independent QKD (MDI-QKD) with single-photon Bell state measurement. Therefore, the MDI property of TF-QKD can be understood clearly. Importantly, the universal security proof theories can be directly used for the TF-QKD, such as BB84, six-state and reference-frame-independent schemes. Furthermore, we propose a feasible experimental scheme for the proof-of-principle experimental demonstration.
△ Less
Submitted 21 March, 2019; v1 submitted 30 May, 2018;
originally announced May 2018.
-
Experimental protection of the coherence of a molecular qubit exceeding a millisecond
Authors:
Yingqiu Dai,
Zhifu Shi,
Yue Fu,
Xi Qin,
Shiwei Mu,
Yang Wu,
Ji-Hu Su,
Lei Qin,
Yuan-Qi Zhai,
Yi-Fei Deng,
Xing Rong,
Jiangfeng Du
Abstract:
There are several important solid-state systems, such as defects in solids, superconducting circuits and molecular qubits, for attractive candidates of quantum computations. Molecular qubits, which benefit from the power of chemistry for the tailored and inexpensive synthesis of new systems, face the challenge from decoherence effect. The decoherence effect is due to the molecular qubits' inevitab…
▽ More
There are several important solid-state systems, such as defects in solids, superconducting circuits and molecular qubits, for attractive candidates of quantum computations. Molecular qubits, which benefit from the power of chemistry for the tailored and inexpensive synthesis of new systems, face the challenge from decoherence effect. The decoherence effect is due to the molecular qubits' inevitable interactions to their environment. Strategies to overcome decoherence effect have been developed, such as designing a nuclear spin free environment and working at atomic clock transitions. These chemical approaches, however, have some fundamental limitations. For example, chemical approach restricts the ligand selection and design to ligands with zero nuclear magnetic dipole moment, such as carbon, oxygen, and sulfur. Herein, a physical approach, named Dynamical decoupling (DD), is utilized to combat decoherence, while the limitations of the chemical approaches can be avoided. The phase memory time $T_2$ for a transition metal complex has been prolonged to exceed one millisecond ($1.4~$ms) by employing DD. The single qubit figure of merit $Q_M $ reaches $ 1.4\times 10^5$, which is $40$ times better than that previously reported value for such system. Our results show that molecular qubits, with milliseconds $T_2$, are promising candidates for quantum information processing.
△ Less
Submitted 28 June, 2017;
originally announced June 2017.
-
Experimental Quantum Digital Signature over 102 km
Authors:
Hua-Lei Yin,
Yao Fu,
Hui Liu,
Qi-Jie Tang,
Jian Wang,
Li-Xing You,
Wei-Jun Zhang,
Si-**g Chen,
Zhen Wang,
Qiang Zhang,
Teng-Yun Chen,
Zeng-Bing Chen,
Jian-Wei Pan
Abstract:
Quantum digital signature (QDS) is an approach to guarantee the nonrepudiation, unforgeability and transferability of a signature with the information-theoretical security. All previous experimental realizations of QDS relied on an unrealistic assumption of secure channels and the longest distance is only several kilometers. Here, we have experimentally demonstrated a recently proposed QDS protoco…
▽ More
Quantum digital signature (QDS) is an approach to guarantee the nonrepudiation, unforgeability and transferability of a signature with the information-theoretical security. All previous experimental realizations of QDS relied on an unrealistic assumption of secure channels and the longest distance is only several kilometers. Here, we have experimentally demonstrated a recently proposed QDS protocol without any secure channel. Exploiting the decoy state modulation, we have successfully signed one bit message through up to 102 km optical fiber. Furthermore, we continuously run the system to sign the longer message "USTC" with 32 bit at the distance of 51 km. Our results pave the way towards the practical application of QDS.
△ Less
Submitted 3 August, 2016;
originally announced August 2016.
-
Security of quantum key distribution with multiphoton components
Authors:
Hua-Lei Yin,
Yao Fu,
Yingqiu Mao,
Zeng-Bing Chen
Abstract:
Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04…
▽ More
Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three-photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works. Besides, we compare the performances of the six-state SARG04 with other prepare-and-measure QKD protocols using decoy states.
△ Less
Submitted 8 July, 2016;
originally announced July 2016.
-
Detector-decoy quantum key distribution without monitoring signal disturbance
Authors:
Hua-Lei Yin,
Yao Fu,
Yingqiu Mao,
Zeng-Bing Chen
Abstract:
The round-robin differential phase-shift quantum key distribution protocol provides a secure way to exchange private information without monitoring conventional disturbances and still maintains a high tolerance of noise, making it desirable for practical implementations of quantum key distribution. However, photon number resolving detectors are required to ensure that the detected signals are sing…
▽ More
The round-robin differential phase-shift quantum key distribution protocol provides a secure way to exchange private information without monitoring conventional disturbances and still maintains a high tolerance of noise, making it desirable for practical implementations of quantum key distribution. However, photon number resolving detectors are required to ensure that the detected signals are single photons in the original protocol. Here, we adopt the detector-decoy method and give the bounds to the fraction of detected events from single photons. Utilizing the advantages of the protocol, we provide a practical method of performing the protocol with desirable performances requiring only threshold single-photon detectors.
△ Less
Submitted 23 February, 2016;
originally announced February 2016.
-
Practical Quantum Digital Signature
Authors:
Hua-Lei Yin,
Yao Fu,
Zeng-Bing Chen
Abstract:
Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challen…
▽ More
Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.
△ Less
Submitted 22 March, 2016; v1 submitted 13 July, 2015;
originally announced July 2015.
-
Long-Distance Measurement-Device-Independent Multiparty Quantum Communication
Authors:
Yao Fu,
Hua-Lei Yin,
Teng-Yun Chen,
Zeng-Bing Chen
Abstract:
The Greenberger-Horne-Zeilinger (GHZ) entanglement, originally introduced to uncover the extreme violation of local realism against quantum mechanics, is an important resource for multiparty quantum communication tasks. But the low intensity and fragility of the GHZ entanglement source in current conditions have made the practical applications of these multiparty tasks an experimental challenge. H…
▽ More
The Greenberger-Horne-Zeilinger (GHZ) entanglement, originally introduced to uncover the extreme violation of local realism against quantum mechanics, is an important resource for multiparty quantum communication tasks. But the low intensity and fragility of the GHZ entanglement source in current conditions have made the practical applications of these multiparty tasks an experimental challenge. Here we propose a feasible scheme for practically distributing the post-selected GHZ entanglement over a distance of more than 100 km for experimentally accessible parameter regimes. Combining the decoy-state and measurement-device-independent protocols for quantum key distribution, we anticipate that our proposal suggests an important avenue for practical multiparty quantum communication.
△ Less
Submitted 4 March, 2015; v1 submitted 2 December, 2014;
originally announced December 2014.
-
Long distance measurement-device-independent quantum key distribution with coherent-state superpositions
Authors:
Hua-Lei Yin,
Wen-Fei Cao,
Yao Fu,
Yan-Lin Tang,
Yang Liu,
Teng-Yun Chen,
Zeng-Bing Chen
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited…
▽ More
Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method which gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.
△ Less
Submitted 19 September, 2014;
originally announced September 2014.
-
Violations of entropic Bell inequalities with coarse-grained quadrature measurements for continuous-variable states
Authors:
Zeng-Bing Chen,
Yao Fu,
Yu-Kang Zhao
Abstract:
It is a long-standing belief, as pointed out by Bell in 1986, that it is impossible to use a two-mode Gaussian state possessing a positive-definite Wigner function to demonstrate nonlocality as the Wigner function itself provides a local hidden-variable model. In particular, when one performs continuous-variable (CV) quadrature measurements upon a routinely generated CV entanglement, namely, the t…
▽ More
It is a long-standing belief, as pointed out by Bell in 1986, that it is impossible to use a two-mode Gaussian state possessing a positive-definite Wigner function to demonstrate nonlocality as the Wigner function itself provides a local hidden-variable model. In particular, when one performs continuous-variable (CV) quadrature measurements upon a routinely generated CV entanglement, namely, the two-mode squeezed vacuum (TMSV) state, the resulting Wigner function is positive-definite and as such, the TMSV state cannot violate any Bell inequality using CV quadrature measurements. We show here, however, that a Bell inequality for CV states in terms of entropies can be quantum mechanically violated by the TMSV state with two coarse-grained quadrature measurements per site within experimentally accessible parameter regime. The proposed CV entropic Bell inequality is advantageous for an experimental test, especially for a possible loophole-free test of nonlocality, as the quadrature measurements can be implemented with homodyne detections of nearly 100\% detection efficiency under current technology.
△ Less
Submitted 1 September, 2014;
originally announced September 2014.
-
Measurement-device-independent quantum key distribution based on Bell's inequality
Authors:
Hua-Lei Yin,
Yao Fu,
Yan-Lin Tang,
Yuan Li,
Teng-Yun Chen,
Zeng-Bing Chen
Abstract:
We propose two quantum key distribution (QKD) protocols based on Bell's inequality, which can be considered as modified time-reversed E91 protocol. Similar to the measurement-device-independent quantum key distribution (MDI-QKD) protocol, the first scheme requires the assumption that Alice and Bob perfectly characterize the encoded quantum states. However, our second protocol does not require this…
▽ More
We propose two quantum key distribution (QKD) protocols based on Bell's inequality, which can be considered as modified time-reversed E91 protocol. Similar to the measurement-device-independent quantum key distribution (MDI-QKD) protocol, the first scheme requires the assumption that Alice and Bob perfectly characterize the encoded quantum states. However, our second protocol does not require this assumption, which can defeat more known and unknown source-side attacks compared with the MDI-QKD. The two protocols are naturally immune to all hacking attacks with respect to detections. Therefore, the security of the two protocols can be proven based on the violation of Bell's inequality with measurement data under fair-sampling assumption. In our simulation, the results of both protocols show that long-distance quantum key distribution over 200 km remains secure with conventional lasers in the asymptotic-data case. We present a new technique to estimate the Bell's inequality violation, which can also be applied to other fields of quantum information processing.
△ Less
Submitted 28 July, 2014;
originally announced July 2014.