Abstract
The twin-field quantum key distribution (TFQKD) protocol has garnered considerable attention in quantum communication because it overcomes the well-known fundamental limit of the secret key rate without quantum repeaters. In this study, we employ this scheme to demonstrate the long-distance distribution of entangled coherent state (ECS), which has not been addressed in the existing literature. We show a scheme for the distribution of ECS with a yield of $\sqrt {\eta }$, where η is the total efficiency of the whole transmission link. Compared to the cat-state based scheme, the success probability for fidelity is enhanced by 1.86 to 11.54 times in our new scheme, where the ECS is |ψECS(α = 2.0)〉 and the fixed fidelity (F) ranges from 0.99 to 0.75. The performance of our scheme in the presence of realistic on-off photon detector has also been investigated. Our work provides the application of TFQKD method toward continuous variable entanglement distribution and we believe that its application to other quantum information processing protocols are worth investigation in the near future.
© 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement
1. Introduction
Entangled coherent states (ECSs) are a fundamentally interesting class of quantum states of light with several applications in quantum information processing [1,2]. Since its first appearance in 1967 [3], ECS have attracted considerable research interest for Bell-like inequality violation [4], quantum teleportation tasks [5–7], quantum metrology [8–10], and so on. Several schemes for the generation of ECS have been proposed, which are based on nonlinear Kerr evolution [7], electromagnetically induced transparency [11], and cavity quantum electrodynamics system [12,13]. More recently, the optical generation of ECS using the non-local photon subtraction on cat state [14] and the mixture between squeezed vacuum and coherent light has been experimentally demonstrated [15].
Although ECS has been successfully generated experimentally, its distribution between two remote users is still a major challenge. This is because ECS is easily distorted by loss. In this study, we show that twin-field quantum key distribution (TFQKD) can be used to improve the performance of the distribution of ECSs over long distances.
Essentially, the key rate in QKD with weak coherent states is always bounded by $O(\eta ^2)$ [16,17]. The decoy-state technique [18–20] facilitates the use of stronger coherent states with average photon number $O(1)$ and the finally the key rate scales as $O(\eta )$ [21]. The recent advancement in TFQKD [22,23] further improves the secret key rates to the order of $O(\sqrt {\eta })$ [24]. The essence for this improvement is that TFQKD can work if only one of the detectors ($D_c$ and $D_d$) registers a click (see Fig. 1 for more details on the allocation of these two detectors). This is in strong contrast to device-independent QKD where both $D_c$ and $D_d$ should register non-zero photons [25].
TFQKD has also stimulated many upgraded variants. For example, Wang et al. [26,27] proposed a sending-or-not-sending (SNS) protocol in which Alice and Bob do not perform post selection for the bits in the Z basis of the signal pulses. Hence, the traditional calculation formulas directly apply. It automatically resolves the issue of security proof. Han et al. gave a detailed security proof to the No-Phase-Post-Selection TFQKD in case of finite-key size and intensity fluctuations [28]. F. Grasselli et al. presented a security bound of the TFQKD protocol when the parities of both Alice and Bob used different settings of decoy intensity and when the protocol was performed in asymmetric loss scenarios [29]. More recently, the method of TFQKD protocol has also been extended to coherent state coding [30].
Motivated by such a striking improvement of $\sqrt {\eta }$ in the secure key rate of TFQKD, we are now investigating whether it is possible to harvest this improvement in continuous variable quantum information processing. Typically, in the prototype scheme of TFQKD [24], an entangled state $|\psi _{AC}\rangle =|\psi _{BD}\rangle =\sqrt {q}|00\rangle +\sqrt {1-q}|11\rangle$ is used. Here, we show that by replacing $|\psi _{AC}\rangle =|\psi _{BD}\rangle$ with a hybrid entangled state (Eq.(13) in Sec. 2.2), one can implement a long-distance distribution of ECS.
Moreover, this scheme has the following advantages: (1) It inherits the intrinsic advantages of TFQKD ($\sqrt {\eta }$ scaling of secret key rate) and the high generation rate of ECS. (2) The scheme generates a genuine odd ECS $|\alpha \rangle |-\alpha \rangle -|-\alpha \rangle |\alpha \rangle$, and not a damped or approximated version of $|\sqrt {T}\alpha \rangle |-\sqrt {T}\alpha \rangle - |-\sqrt {T}\alpha \rangle |\sqrt {T}\alpha \rangle$ [14], which has been frequently reported [14,31,32]. (3) This new scheme exhibits a better probability-fidelity tradeoff, with $1.86$ to $11.54$ times improvement in success probability when fixed fidelity $F$ varies from $0.99$ to $0.75$. Thus, the TFQKD method, originally developed for the distribution of keys between remote users, still has an advantage toward the distribution of continuous variable quantum entanglement. The $\sqrt {\eta }$ improvement in the key rate provides a powerful tool to counteract the decoherence in extremely long-distance quantum communications.
2. Schemes for the distribution of ECS
We have considered the following ECS:
This is an odd cat state, which has been reported earlier [2]. The even and other forms of ECS can be analyzed using the same method. Figure 1 shows three different schemes for long-distance distribution of ECS.
2.1 Direct transmission
Figure 1(a) presents the direct distribution scheme. The ECS $|\psi _\mathrm {ECS}\rangle$ is prepared in the center and it is sent toward the two sides of a lossy channel. We assume that the channel has a total transmission efficiency of $\eta$ and the source is just located at the center of the channel. The transmittance of each halfway channel is $\sqrt {\eta }$. We use two beam splitters (BS1 and BS2) with transmittance $\sqrt {\eta }$ to simulate this two-side lossy channel. As $|\psi _\mathrm {ECS}\rangle$ is a non-Gaussian state, it is quite convenient to express the state evolution in Fock state space. In what follows, we assume that $\alpha$ is a real and positive number $\alpha >0$. The coherent states can be represented by a superposition $|\alpha \rangle =\sum _{n=0}^\infty \frac {e^{-\frac {\alpha ^2}{2}}\alpha ^n}{\sqrt {n!}}|n\rangle$ [33]. Mathematically, the operation of a BS on modes $k$ and $\ell$ can be equivalently represented by an unitary operator [33]
Generally, BS is described by a linear operation and it evolves two coherent states ($|\alpha \rangle$ and $|\beta \rangle$) into two new coherent states
After the BS operation, the four-mode state $ACBD$ can be written as
2.2 Non-local photon subtraction on cat state
Figure 1(b) shows the most typical scheme for generating ECS [32]. It uses two local Schrödinger$'$s cat states $|\psi _\mathrm {cat}\rangle =\frac {1}{\sqrt {N_c}}(|\alpha \rangle +|-\alpha \rangle )$ ($N_c=2+2e^{-2\alpha ^2}$) and one non-local photon subtraction in the center. The photon subtraction is heralded by a single click in the single photon detector.
First, the coupling between $AC$ and $BD$ generates a four-mode state
Finally, the optical modes $C$ and $F$ interfere at the $50:50$ BS (BS5). Again using Eq.(3), we obtain
2.3 TFQKD method
Figure 1(c) shows a schematic of the proposed scheme, which is based on TFQKD protocol. Here, we use two identical hybrid entangled states
Then, $C$ and $D$ modes are sent through the two halfway channels each with transmittance $\sqrt {\eta }$. Finally, both beams interfere at a $50:50$ BS. Again, we consider the case when the two single photon detectors $(D_c,D_d)$ register $(1,0)$. The advantage of this new scheme is that the states $|0\rangle$ and $|1\rangle$ suffer the channel loss and the states $A$ and $B$ that contain the information of $\alpha$ remain invariant. This is the reason for obtaining the original ECS as the output state.
The output can be derived in Fock state space. First, we see that after the halfway channel, the state in optical modes $A$ and $C$ (similarly, that in the modes $B$ and $D$) is a mixed state:
Moreover, as mentioned before, the output state $\rho _{10}^{(c)}$ is exactly similar to the ECS in Eq. (1), and not the damped version $|\psi _\mathrm {ECS}(\alpha \eta ^{\frac {1}{4}})\rangle$ or $|\psi _\mathrm {ECS}(\sqrt {T}\alpha )\rangle$.
3. Performance and numerical comparisons of the three schemes
We can use the fidelity $F=\langle \psi _\mathrm {ECS}|\rho |\psi _\mathrm {ECS}\rangle$ ($\rho =\rho ^{(a)}, \rho _{ 10}^{(b)}, \rho _{10}^{(c)}$) to compare the performance of the three schemes. $F$ can be expressed as
4. Advantage of $\sqrt {\eta }$ scaling
It is quite interesting to find out whether our scheme for the distribution of ECS also benefits from the advantage of $\sqrt {\eta }$ scaling of the security key rate , as is shown by most of the papers based on TFQKD [26,35–40]. Here, we show that the answer is affirmative.
To give a fair comparison between the three schemes in Fig. 1, we define a quantity yield to quantify how well the target ECS can be obtained. The direct transmission scheme shown in Fig. 1(a) is deterministic (success probability = $1$) and we can define the yield as $Y^{(a)}= \langle \psi _\mathrm {ECS}| \rho ^{(a)} |\psi _\mathrm {ECS}\rangle$. For the scheme in Fig. 1(b), the yield can be defined as $Y^{(b)}=P_{(10)}^{(b)} \langle \psi _\mathrm {ECS}| \rho ^{(b)} | \psi _\mathrm {ECS} \rangle$. For the scheme Fig. 1(c), the yield can be defined as $Y^{(c)}=P_{(10)}^{(c)} \langle \psi _\mathrm {ECS}| \rho ^{(c)} | \psi _\mathrm {ECS} \rangle$.
After lengthy calculations, we obtain
whereA visual comparison of the yields $Y^{(a)}, Y^{(b)}, Y^{(c)}$ as a function of transmission distance is given in Fig. 3. We consider that $\alpha =2.2$, $T=0.98$, and $\eta =10^{-\frac {0.20L}{10}}$, where the channel efficiency is assumed to be $0.20$ dB/km [32]. The direct transmission scheme exhibits reliable performance only for short distances, where its $100\%$ probability of success makes a pronounced contribution. However, this advantage is lost with increasing distance. It is evident that the scheme based on TFQKD outperforms the other two schemes in long-distance transmission. Moreover, the yield of this new scheme is exactly equal to $\frac {1}{4}\sqrt {\eta }$, as shown by the black solid line in Fig. 3. The factor $\frac {1}{4}$ can be attributed to the probability of photon detection $(D_c,D_d)=(1,0)$. $(D_c,D_d)=(0,1)$ can provide another ECS $\frac {1}{\sqrt {N_+}}(|\alpha ,-\alpha \rangle +|-\alpha ,\alpha \rangle )$. Thus, in terms of ECS, the yield of our TFQKD scheme scales as $\frac {1}{2}\sqrt {\eta }=O(\sqrt {\eta })$, similar to most of the TFQKD-based schemes.
5. Performance of the schemes for non-ideal detectors
In the previous section, we showed the performance of our scheme using ideal photon detector with $100 \%$ efficiency, which is difficult to achieve in experiments. Here, we alleviate this condition by using on-off photon detectors that are not $100 \%$ efficient. It is quite interesting to investigate how the performance of the schemes (Figs. 1(b) and 1(c)) degrade in case of on-off detectors. The on-off detector can only register two results. ‘Off’ implies that no photons are detected, while ‘on’ implies that one or more photons are detected. In this case, successful distribution of ECS is realized when the output of detectors $D_c$ and $D_d$ is $(D_c,D_d)=(\mathrm {'on'},\mathrm {'off'})$.
In photon number space, the measurement operators corresponding to the detection of ‘on’ and ‘off’ states can be expressed as positive-definite operators $\{ \hat {\Pi }_\mathrm {on}=\sum\limits _{k=1}^\infty [1-(1-\tau )^k] |k\rangle \langle k|$, $\hat {\Pi }_\mathrm {off}=\sum\limits _{k=0}^\infty (1-\tau )^k |k\rangle \langle k| \}$ [41,42]. Here, $0<\tau <1$ denotes the efficiency of the detector. The derivation of state evolution in Sec. 2 can be applied here as well, except the projection operator $|10\rangle _{CD}\langle 10|$ in Eq. (9) and Eq. (15) should be replaced by $\hat {\Pi }_{\mathrm {on},C}\otimes \hat {\Pi }_{\mathrm {off},D}$. The yield in this case can be defined in an analogous way as that in Sec. 4, i.e.,
Figure 5 compares the yield of the schemes for $\tau =0.9$ (Fig. 5(a)) and $\tau =0.6$ (Fig. 5(b)). A yield scaling with $O(\sqrt {\eta })$ can be identified for the case of on-off photon detectors as well. Here, we observe a strong coincidence between the yield of scheme in Fig. 1(c) and the scaling of $\frac {\tau }{4}\sqrt {\eta }$.
6. Conclusions
Based on entanglement swapping, TFQKD provides an excellent method for countering the linear bound in long-distance key distribution. Here, we used this method for the distribution of ECS, which is very important for continuous variable quantum information processing. This method can be extended to the distribution of entangled squeezed state such as $|\xi ,-\xi \rangle -|-\xi ,\xi \rangle$, where $|\xi \rangle =S(\xi )|0\rangle$ is the single-mode squeezed vacuum state.
Compared with the direct transmission protocol in Fig. 1(a), the interference protocols in Figs. 1(b) and 1(c) are complicated and have more challenges to overcome in experimental implementations. For example, (1) the single-photon interference at the central measuring center requires indistinguishable spatial and spectral characteristics. This requires a precise control of the source and the beam splitter. The experiment in Ref. [35] also adds a polarization controller and a feedback phase modulation before and after the input of interference (BS5). (2) The dark count in detectors $D_c$ and $D_d$. Recent dark count of the detector for the infrared single-photon is about 50 Hz [43]. Although the count rate is small, it will have a serious effect because it could finally cause an erroneous heralding when the photon number in the optic pulse of each halfway is comparable with the dark count. This happens in long-distance quantum communication, and a super-conducting single-photon detector with a dark count rate as low as 1 Hz [44] can be used to help further reduce the dark count rate. (3) The channel noise could be another factor to be considered in long-distance fiber-based channels. The fiber coupling efficiency, guided acoustic wave Brillouin scattering (GAWBS) [45], Rayleigh scattering, and Raman scattering are not negligible when $\eta \rightarrow 0$. The fiber coupling efficiency can be considered as an additional transmission line loss and the noise in the scattering can forms a thermal noise in the fiber, as shown in a recent study by Jia et al. [46]. In their experiment, they used a phase-locking technique to further reduce the influence of noise in fiber.
The advantage of $\sqrt {\eta }$ scaling inherited from the TFQKD provides an efficient and promising tool to combat long-distance induced decoherence and is expected to be beneficial for several quantum information processing protocols. This work provides an effective step in such a direction and we hope our theoretical perspective can be validated experimentally in the near future.
Funding
National Natural Science Foundation of China (11574400, 11204379, 11981240356); Beijing Institute of Technology Research Fund Program for Young Scholars.
Acknowledgments
The authors thank Prof. XiongFeng Ma at TsingHua University and Prof. Shuang Wang at University of Science and Technology of China for fruitful discussion in ShanXi University on twin-field quantum key distribution.
Disclosures
The authors declare no conflicts of interest.
References
1. B. C. Sanders, “Entangled coherent states,” Phys. Rev. A 45(9), 6811–6815 (1992). [CrossRef]
2. B. C. Sanders, “Review of entangled coherent states,” J. Phys. A: Math. Theor. 45(24), 244002 (2012). [CrossRef]
3. Y. Aharonov and L. Susskind, “Charge superselection rule,” Phys. Rev. 155(5), 1428–1431 (1967). [CrossRef]
4. C. C. Gerry, J. Mimih, and A. Benmoussa, “Maximally entangled coherent states and strong violations of bell-type inequalities,” Phys. Rev. A 80(2), 022111 (2009). [CrossRef]
5. X. Wang, “Quantum teleportation of entangled coherent states,” Phys. Rev. A 64(2), 022302 (2001). [CrossRef]
6. H. Jeong, M. S. Kim, and J. Lee, “Quantum-information processing for a coherent superposition state via a mixedentangled coherent channel,” Phys. Rev. A 64(5), 052308 (2001). [CrossRef]
7. S. J. van Enk, “Entanglement capabilities in infinite dimensions: Multidimensional entangled coherent states,” Phys. Rev. Lett. 91(1), 017902 (2003). [CrossRef]
8. C. C. Gerry, A. Benmoussa, and R. A. Campos, “Nonlinear interferometer as a resource for maximally entangled photonic states: Application to interferometry,” Phys. Rev. A 66(1), 013804 (2002). [CrossRef]
9. Y. M. Zhang, X. W. Li, W. Yang, and G. R. Jin, “Quantum fisher information of entangled coherent states in the presence of photon loss,” Phys. Rev. A 88(4), 043832 (2013). [CrossRef]
10. J. Joo, W. J. Munro, and T. P. Spiller, “Quantum metrology with entangled coherent states,” Phys. Rev. Lett. 107(8), 083601 (2011). [CrossRef]
11. M. Paternostro, M. S. Kim, and B. S. Ham, “Generation of entangled coherent states via cross-phase-modulation in a double electromagnetically induced transparency regime,” Phys. Rev. A 67(2), 023811 (2003). [CrossRef]
12. L. Davidovich, A. Maali, M. Brune, J. M. Raimond, and S. Haroche, “Quantum switches and nonlocal microwave fields,” Phys. Rev. Lett. 71(15), 2360–2363 (1993). [CrossRef]
13. T. Liu, Q.-P. Su, S.-J. Xiong, J.-M. Liu, C.-P. Yang, and F. Nori, “Generation of a macroscopic entangled coherent state using quantum memories in circuit qed,” Sci. Rep. 6(1), 32004 (2016). [CrossRef]
14. A. Ourjoumtsev, F. Ferreyrol, R. Tualle-Brouri, and P. Grangier, “Preparation of non-local superpositions of quasi-classical light states,” Nat. Phys. 5(3), 189–192 (2009). [CrossRef]
15. Y. Israel, L. Cohen, X.-B. Song, J. Joo, H. S. Eisenberg, and Y. Silberberg, “Entangled coherent states created by mixing squeezed vacuum and coherent light,” Optica 6(6), 753–757 (2019). [CrossRef]
16. D. Gottesman, H. Lo, N. Lutkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,” in “Proceedings of 2004 International Symposium on Information Theory,” (2004), p. 136.
17. N. Lütkenhaus, “Security against individual attacks for realistic quantum key distribution,” Phys. Rev. A 61(5), 052304 (2000). [CrossRef]
18. W.-Y. Hwang, “Quantum key distribution with high loss: Toward global secure communication,” Phys. Rev. Lett. 91(5), 057901 (2003). [CrossRef]
19. X.-B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Phys. Rev. Lett. 94(23), 230503 (2005). [CrossRef]
20. H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94(23), 230504 (2005). [CrossRef]
21. S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi, “Fundamental limits of repeaterless quantum communications,” Nat. Commun. 8(1), 15043 (2017). [CrossRef]
22. M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, “Overcoming the rate-distance limit of quantum key distribution without quantum repeaters,” Nature 557(7705), 400–403 (2018). [CrossRef]
23. X. Ma, P. Zeng, and H. Zhou, “Phase-matching quantum key distribution,” Phys. Rev. X 8(3), 031043 (2018). [CrossRef]
24. M. Curty, K. Azuma, and H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol,” npj Quantum Information 5(1), 64 (2019). [CrossRef]
25. H.-K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution,” Phys. Rev. Lett. 108(13), 130503 (2012). [CrossRef]
26. J. Lin and N. Lütkenhaus, “Simple security analysis of phase-matching measurement-device-independent quantum key distribution,” Phys. Rev. A 98(4), 042332 (2018). [CrossRef]
27. Z.-W. Yu, X.-L. Hu, C. Jiang, H. Xu, and X.-B. Wang, “Sending-or-not-sending twin-field quantum key distribution in practice,” Sci. Rep. 9(1), 3080 (2019). [CrossRef]
28. F.-Y. Lu, Z.-Q. Yin, R. Wang, G.-J. Fan-Yuan, S. Wang, D.-Y. He, W. Chen, W. Huang, B.-J. Xu, G.-C. Guo, and Z.-F. Han, “Practical issues of twin-field quantum key distribution,” arXiv: 1901.04264v3 (2019).
29. F. Grasselli, Á. Navarrete, and M. Curty, “Asymmetric twin-field quantum key distribution,” New J. Phys. 21(11), 113032 (2019). [CrossRef]
30. H.-L. Yin and Z.-B. Chen, “Coherent-state-based twin-field quantum key distribution,” Sci. Rep. 9(1), 14918 (2019). [CrossRef]
31. N. Sangouard, C. Simon, N. Gisin, J. Laurat, R. Tualle-Brouri, and P. Grangier, “Quantum repeaters with entangled coherent states,” J. Opt. Soc. Am. B 27(6), A137–A145 (2010). [CrossRef]
32. J. Borregaard, “Long-distance entanglement distribution using coherent states,” Ph.D. thesis, University of Copenhagen (2011).
33. D. F. Walls and G. J. Milburn, in “Quantum Optics,” (Springer-Verlag, 1994).
34. L.-M. Duan, M. D. Lukin, J. I. Cirac, and P. Zoller, “Long-distance quantum communication with atomic ensembles and linear optics,” Nature 414(6862), 413–418 (2001). [CrossRef]
35. S. Wang, D.-Y. He, Z.-Q. Yin, F.-Y. Lu, C.-H. Cui, W. Chen, Z. Zhou, G.-C. Guo, and Z.-F. Han, “Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system,” Phys. Rev. X 9(2), 021046 (2019). [CrossRef]
36. X.-B. Wang, Z.-W. Yu, and X.-L. Hu, “Twin-field quantum key distribution with large misalignment error,” Phys. Rev. A 98(6), 062323 (2018). [CrossRef]
37. C. Cui, Z.-Q. Yin, R. Wang, W. Chen, S. Wang, G.-C. Guo, and Z.-F. Han, “Twin-field quantum key distribution without phase postselection,” Phys. Rev. Appl. 11(3), 034053 (2019). [CrossRef]
38. M. Minder, M. Pittaluga, G. L. Roberts, M. Lucamarini, J. F. Dynes, Z. L. Yuan, and A. J. Shields, “Experimental quantum key distribution beyond the repeaterless secret key capacity,” Nat. Photonics 13(5), 334–338 (2019). [CrossRef]
39. Y. Liu, Z.-W. Yu, W. Zhang, J.-Y. Guan, J.-P. Chen, C. Zhang, X.-L. Hu, H. Li, C. Jiang, J. Lin, T.-Y. Chen, L. You, Z. Wang, X.-B. Wang, Q. Zhang, and J.-W. Pan, “Experimental twin-field quantum key distribution through sending or not sending,” Phys. Rev. Lett. 123(10), 100505 (2019). [CrossRef]
40. X. Zhong, J. Hu, M. Curty, L. Qian, and H.-K. Lo, “Proof-of-principle experimental demonstration of twin-field type quantum key distribution,” Phys. Rev. Lett. 123(10), 100506 (2019). [CrossRef]
41. A. A. Semenov, A. V. Turchin, and H. V. Gomonay, “Detection of quantum light in the presence of noise,” Phys. Rev. A 78(5), 055803 (2008). [CrossRef]
42. V. D’Auria, O. Morin, C. Fabre, and J. Laurat, “Effect of the heralding detector properties on the conditional generation of single-photon states,” Eur. Phys. J. D 66(10), 249 (2012). [CrossRef]
43. “Id230 infrared single-photon detector,” https://www.idquantique.com/quantum-sensing/products/infrared_photon_counters.
44. “Id281 superconducting nanowire,” https://www.idquantique.com/quantum-sensing/products/infrared_photon_counters.
45. Y. Li, N. Wang, X. Wang, and Z. Bai, “Influence of guided acoustic wave brillouin scattering on excess noise in fiber-based continuous variable quantum key distribution,” J. Opt. Soc. Am. B 31(10), 2379–2383 (2014). [CrossRef]
46. M. Huo, J. Qin, J. Cheng, Z. Yan, Z. Qin, X. Su, X. Jia, C. Xie, and K. Peng, “Deterministic quantum teleportation through fiber channels,” Sci. Adv. 4(10), eaas9401 (2018). [CrossRef]