Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Field test of quantum key distribution with high key creation efficiency

Open Access Open Access

Abstract

Quantum key distribution (QKD) promises unconditional security for communication. However, the random choices of the measurement basis in QKD usually result in low key creation efficiency. This drawback is overcome in the differential-phase-shift QKD, provided that each photon can be prepared in a large number of time slots with a proper waveform. In this work we develop a miniature room-temperature 1550-nm single-photon source to generate narrowband single photon in 50 time slots with a nearly optimal waveform for achieving unity key creation efficiency. By utilizing these single photons in the field test, we demonstrate the differential-phase-shift QKD with a key creation efficiency of 97%. Our work shows that the practical QKD can benefit from the narrowband single photons with controllable waveforms.

© 2023 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

Quantum key distribution (QKD) promises unconditionally secure communication granted by the laws of physics [1]. The first demonstration of QKD [2], proposed by Bennett and Brassard [3], was based on the polarization encoding. Since then, different protocols [410] have been demonstrated to avoid the polarization distortion in optical fibers and extend the transmission distance [1129]. While the weak coherent pulses (WCP) were widely used in these demonstrations due to their simple realization, the quantum light sources offer additional benefits. For example, the use of single photons can tolerate higher loss [30,31] and higher quantum bit error rate (QBER) [32]. The use of entangled photons can extend the distance of QKD with the help of quantum repeaters [33].

Recently, single photons with long coherence time and narrow bandwidth have been exploited for enhancing the key creation efficiency (KCE) of QKD [34]. By using the 795-nm narrowband single photons generated from the cold atoms, Liu et. al increased the KCE of differential-phase-shift (DPS) QKD [5] from 22.2% to 66.6% with unconditional security. However, the wavelength and complexity of the used single-photon source are not suitable for practical QKD. To realize the QKD in a fiber network with multiple users, compact single-photon sources in the telecommunication band are necessary for high scalability and low transmission loss.

In this paper we demonstrate the field test of QKD with highest reported KCE thus far to the best of our knowledge. This is accomplished by implementing a miniature 1550-nm narrowband single-photon source at the room temperature. The long coherence time (198.8 ns) and narrow bandwidth (2.3 MHz) of the single photons allow us to increase the KCE and reduce the QBER [35], respectively. Moreover, the double-exponential waveform of the single photons is nearly optimal for achieving the unity KCE. By shaping each photon into 50 equally spaced time slots, with the width and spacing $T_s = 1.65$ ns, we achieve a KCE of 97% and a QBER of 3.2% below the threshold level of unconditional security [36]. The KCE is 94% and 11.8% higher than that of the BB84 and T12 protocol [37], respectively. Our work shows that the single photons with long coherence time and narrow bandwidth are feasible for practical QKD.

2. High key creation efficiency

In the DPS QKD [5], Alice (the sender) prepares each photon in three time slots with a flat-top envelope. The bits (0 or 1) are then randomly encoded in the phase difference (0 or $\pi$) between the adjacent time slots. After receiving the photons, Bob (the receiver) measures the bits with an one-bit delay Mach-Zehnder interferometer. If the photon is not detected in the first and last time slots, the bits are extracted by correlating the exit port of the photon to the phase difference. The KCE (namely, the probability of successfully creating one bit per photon) is thus equal to the probability of finding the photon at the correct exit port and in the time slots other than the first and last slots after the interference. In Fig. 1(a) we show the calculated KCE for DPS QKD by considering each photon prepared in $N \geq 3$ time slots [colored areas in the inset of Fig. 1(b)] with an envelope of various waveforms [dashed line in the inset of Fig. 1(b)]. The width and spacing of the time slots are both $T_s = 1.65$ ns and the non-flat waveforms are assumed to have a $1/e$ decay time constant of 52 ns. While the high number $N$ of time slots is important to obtain high KCE (which approaches 100% at very large $N$), the waveform of the envelope has a notable impact on the KCE. In general, the symmetrically decaying waveforms such as the triangle, double exponential, and Gaussian waveforms increase the KCE by lowering the probability of finding the single photons in the first and last time slots. However, due to the mismatch in the amplitudes between the adjacent time slots, the interference visibility of all non-flat-top waveforms deviate from 100%. Nevertheless, the QBERs induced by the amplitude mismatch are negligible compared to the threshold level 4.12% of the unconditionally secure DPS QKD [36]. This can be seen in Fig. 1(b), where we calculate the QBER by computing the probability of finding the photon, which is not in the first and last time slots after the interference, at the wrong exit port.

 figure: Fig. 1.

Fig. 1. (a) The calculated key creation efficiencies and (b) the QBERs for different numbers of time slots (colored areas) and waveforms or envelopes of the single-photon wavepackets (dash lines). The inset shows an example of single-photon wavepacket with a double-exponential waveform.

Download Full Size | PDF

3. Miniature telecom single-photon source with controllable waveforms

To increase the KCE, temporally long and symmetrically decaying single-photon wavepackets are advantageous. Figure 2(a) illustrates the setup of our single-photon source. Degenerate photon pairs at 1550 nm are generated from a periodically poled and type-II phase-matched KTiOPO$_4$ (PPKTP) crystal inside a monolithic resonator, which is implemented by spherically polishing the end faces of the crystal and depositing a 1550-nm high-reflection coating. The pump is a 775-nm cw external cavity diode laser (ECDL) frequency-stabilized by a high-precision wavemeter (1-MHz resolution and 30-MHz absolute accuracy). By depositing an additional high-reflection coating at the pump wavelength on the rear end, we realize the double-pass pumping. Together with the monolithic resonator, this enables the photon pairs to be generated in a single longitudinal mode without the need of external filters [3840]. After the photon pair are separated by a polarizing beamsplitter (PBS), a single (signal) photon is heralded by detecting an idler photon with a single-photon counting module (SPCM, ID Quantique ID230). Accounted for the fiber-coupling efficiency (75%), transmission loss (5%), and detector’s quantum efficiency (15%), the generation rate is $4.2 \times 10^5$ s$^{-1}$ per mW of the pump power with a fluctuation within 15% about the average rate [Fig. 2(b)]. Figure 2(c) shows the measured second-order quantum coherence function at zero time delay $g^{(2)}(0)$ [41] of the heralded single photons. For the pump power below 600 $\mu$W, the antibunching ($g^{(2)}(0) < 0.5$) is clearly evident.

 figure: Fig. 2.

Fig. 2. (a) Experimental setup of the miniature room-temperature 1550-nm single-photon source based on the monolithic doubly resonant parametric down-conversion. The abbreviations stand for the data acquisition (DAQ), beamsplitter (BS), polarizing beamsplitter (PBS), and electro-optic modulator (EOM). (b) The generation rate versus the time. (c) The pump power is kept low to ensure good single-photon quality ($g^{(2)}(0) < 0.5$). Due to the finite dead time ($\sim 2\ \mu$s) and the lack of the photon-number resolvability of the detectors, the measured $g^{(2)}(0)$ saturates when the pump power is above 600 $\mu$W. (d) The temporal wavepacket (blue area) of the heralded single photons. The red curve is the fit of the double-exponential function. (e) The electro-optic modulation of the single-photon wavepacket into a pulse train. The integration times are 180 s and 120 s in (d) and (e), respectively.

Download Full Size | PDF

As shown in Fig. 2(d) (blue area), the wavepacket of the single photons has a long temporal length and a double-exponential waveform. The wavepacket is described by the Glauber correlation function [38],

$$G^{(2)}(\tau)=R^2+\frac{4\kappa ^2\Gamma_s \Gamma_i}{(\Gamma_s+\Gamma_i)^2}\times \left \{\begin{array}{ll} e^{\Gamma_s\tau}, & \mbox{if} \tau\,<\,0 \\ e^{-\Gamma_i\tau}, & \mbox{if} \tau\,>\,0 \end{array} \right.$$
where $\tau$ is the time delay between the detection of the signal and idler photons, $\kappa$ is the parametric coupling constant, and $R$ is the generation rate. By fitting the measured wavepacket to $G^{(2)}(\tau )$ [red curve in Fig. 2(d)], the $1/e^2$ width of the wavepacket is found to be 198.8 ns with the total cavity decay rates of the signal and idler photons being $\Gamma _s=1/(45.3\ {\rm ns})$ and $\Gamma _i=1/(44.1\ {\rm ns})$, respectively. To implement the time slots, the heralded single photons are shaped by a fiber-coupled electro-optic intensity modulator [40,42] using a square wave. The detection of the idler photons is used to trigger an arbitrary function generator or a field-programmable gate array (FPGA), which drives the electro-optic modulator. To ensure the arrival of the signal photons at the modulator to be synchronized with the amplitude modulation, the signal photons are optically delayed by an optical fiber. An example of the modulated wavepacket is shown in Fig. 2(e), where the number of time slots is controlled by the prescribed modulation function. The optical delay is necessary for synchronizing the arrival of the single photons at the modulator and the start of the electro-optic modulation, which is triggered by the detection of the idler photons. The long temporal length also infers a nannorwband bandwidth [38] of $\Delta f=[(\sqrt {\Gamma ^4_s+6\Gamma ^2_s\Gamma ^2_i+\Gamma ^4_i}-\Gamma ^2_s-\Gamma ^2_i)/2]^{1/2}/2\pi = 2.3$ MHz and a spectral brightness of $1.8 \times 10^5$ s$^{-1}$mW$^{-1}$MHz$^{-1}$. The narrow bandwidth is beneficial for reducing the QBER of the DPS QKD because the probability distribution of a photon’s frequency causes the photon to exit at the wrong port of the one-bit delay Mach-Zehnder interferometer, which acts as a filter in the frequency domain with a sinusoidal transmittance. For our single photons, the QBER induced by the narrow bandwidth [35] is estimated to be $\int _{-\infty }^{\infty } \sin ^2(\pi x/f_{\rm FSR}) \Delta f /\{2\pi [x^2 + (\Delta f/2)^2]\} dx \cong 1.2$%, where $f_{\rm FSR} = 0.3$ GHz is the free spectral range of the Mach-Zehnder interferometer.

4. Field test of high-KCE DPS QKD

The field test of the DPS QKD is carried out in the daytime using a pair of the inter-university fibers between the campuses of National Tsing Hua University (NTHU) and National Yang Ming Chiao Tung University (NYCU) in the Hsinchu City, Taiwan. The fiber pair, both extending from the General II Building in NTHU to the IT Service Center in NYCU [Fig. 3(a)], are connected at the NYCU site to form a fiber loop with a total length of 3.4 km. The attenuation of the fiber pair is 2 dB mainly due to the existing fiber-to-fiber connectors in the network. Figure 3(b) illustrates Alice’s setup at the NTHU site. The single photons, after being shaped into multiple time slots with a pulse width of 1.65 ns by an electro-optic intensity modulator (EOIM) with an insertion loss of 1.7 dB, are sent into a fiber-coupled electro-optic phase modulator (EOPM) with an insertion loss of 1.6 dB. Alice uses the phase modulator to code the bits by applying random phase differences 0 and $\pi$ on adjacent time slots. To account for the broadening of the time slots by the modulator’s finite bandwidth, the pulse width of the phase modulation is chosen to be wider than the pulse width of the intensity modulation.

 figure: Fig. 3.

Fig. 3. (a) The field test exploits the inter-university optical fiber network (orange line) between the General II Building (yellow dot) at NTHU (bounded by the yellow dash line) and the IT Service Center (red dot) at NYCU (bounded by the red dash line) in Hsinchu City, Taiwan. Alice’s and Bob’s setup are illustrated in (b) and (c), respectively. The abbreviations stand for half-wave plate (HWP), beamsplitter (BS), polarizing beamsplitter (PBS), piezoelectric actuator (PZT), photodiode (PD), and superconducting nanowire single-photon detector (SNSPD). (d) The interference visibility of the Mach-Zehnder interferometer with (black curve) and without (red curve) the active stabilization. (e) The Poincaré sphere shows the fluctuation of a single-frequency laser’s polarization state after passing through the fiber pair. The polarization state starts at the green arrow (the horizontal) and ends up in the orange arrow after 24 hours. (f) The time-resolved interference of single photons prepared in 20, 30, and 50 time slots (from the left to right). The integration time and coincidence time bin are 600 s and 0.2 ns, respectively.

Download Full Size | PDF

The bits are later decoded by Bob with a one-bit delay Mach-Zehnder interferometer [Fig. 3(c)] at the NTHU site. To keep the interferometer stable during the field test, the long arm (total length of 1.1 m) is folded to reduce the overall size. In addition, the interference of a counter-propagating single-frequency laser, offseted in position to avoid the light leaking into the detectors, is continuously monitored. The interference signal is then fed to a piezoelectric actuator on a mirror to actively stabilize the optical path difference. As shown in Fig. 3(d), the interference visibility with the active stabilization (black curve) is nearly unchanged compared to that without the stabilization (red curve). In practice, the fluctuation of polarization in the fibers can also degrade the interference visibility. Such fluctuation is shown in Fig. 3(e), where a single-frequency laser’s polarization state (initially prepared in the horizontal) after transmitting through the fiber loop is recorded over 24 hours by a polarimeter. To achieve high visibility and low QBER, a polarizing beamsplitter is placed in front of the interferometer as a polarization filter, resulting in a reduction of the count rate and key rate by 2%.

After a single photon enters the first beamsplitter of the interferometer, the wavefunctions taking the short and long paths interfere at the second beamsplitter. Depending on the phase difference between the adjacent time slots, constructive or destructive interference occurs between the time slots of the two wavefunctions, resulting in a click at one detector in the corresponding time slot. The time tags of these detection events are then sent back to Alice through a public channel for generating the bit string. In the demonstration of the field test, the single-photon counting modules are replaced by the superconducting nanowire single-photon detectors (Single Quantum Eos), which have a quantum efficiency higher than $82$% at 1550 nm. Examples of the single-photon interference are shown in Fig. 3(f) for single photons prepared in 20, 30, and 50 time slots. All phase differences between the adjacent time slots are set to 0 in these examples. By analyzing these time-resolved interferences, useful parameters can be obtained. Figure 4(a) (dots) shows the KCE, which is given by the probability of the successful interference, for different numbers of time slots. When the single photons are prepared in 50 time slots, the KCE reaches 97% and is in good agreement with the theory (solid curve). The probability of the failed interference (in the time slots except the first and last ones), on the other hand, can cause the photons to show up at the wrong exit ports, thus resulting in bit error and QBER as shown in Fig. 4(b) (circular dots). Finally, as the photons taking part in the interference contribute to the key, the count rate of the single photons gives an estimate of the achievable sifted key rates, provided that the modulation bandwidths are not limited. Such sifted key rates are also plotted in Fig. 4(b) (triangles). At higher numbers of time slots, because a larger portion of the single-photo wavepacket is used and the KCEs are higher, the sifted key rates are also higher.

 figure: Fig. 4.

Fig. 4. (a) The key creation efficiency (dots) versus the number of time slots. The solid and dash curves correspond to the theory considering realistic and 100% interference visibility, respectively. (b) The sifted key rates and the QBERs versus the number of time slots. The red dashed line at 4.12% represents the threshold level for the unconditional security [36]. (c) The QBER recorded over a two-hour of operation. (d) The sifted key rates (black dots) and secure key rates (blue dots) against the general attack of individual photons recorded over a two-hour of operation. The lengths of the outdoor fibers used in (a) [or (b)] and (c) [or (d)] are 3.4 km and 4.8 km, respectively.

Download Full Size | PDF

With 50 time slots and 97% KCE, we obtain an average sifted key rate of $R_s = 3048$ bps and an average QBER of $e_b = 3.2$%, which is below the threshold level of the unconditionally secure DPS QKD [36]. Assuming an error correction coding efficiency approaching the Shannon limit and an ideal single-photon source, the secure key rates are $R_s\{-\log _2[1-e_b^2-(1-6e_b)^2/2]-H(e_b)\}=1117$ bps against the general attack of individual photons [36,43] and $R_s[1-H(e_b)-H((3+\sqrt {5})e_b)]=433$ bps against the coherent attack [36], where $H(x)=-x\log _2x-(1-x)\log _2(1-x)$ is the binary Shannon entropy. Figures 4(c) and (d) show the QBER, sifted key rate (black dots), and secure key rate (blue dots) against the general attack of individual photons in the QKD operation over two hours. For these measurements, the fiber pair are further extended from the General II Building in NTHU to the IT Service Center in NYCU to the Science Building III in NCYU, with a total length of 4.8 km and a total attenuation of 5 dB.

5. Conclusion

We have shown that both the single-photon waveform and the number of time slots in DPS QKD play important roles in enhancing the KCE. To generate the single photons with the waveform for achieving the perfect KCE, we implement a miniature room-temperature 1550-nm single-photon source based on the monolithic doubly resonant parametric down-conversion. The single-photon wavepacket has a nearly ideal waveform (double exponential) with a $1/e^2$ width of 198.8 ns and a generation rate of $4.2 \times 10^5$ s$^{-1}$mW$^{-1}$. With each photon shaped into 50 time slots, we demonstrate the field test of DPS QKD with 97% KCE and a QBER below the threshold level of unconditional security. To estimate the influence of the multiphoton emission, we approximate the photon statistics of our heralded single-photon source by a Poisson distribution (weak coherent state) with an average photon number of 0.37 [43]. We find that the secure key rate would decrease by 2%. By increasing the number of time slots and interference visibility, which require faster modulation and shorter optical path difference of the interferometer, the KCE can be further increased [see the dash line in Fig. 4(b)] and the QBER can be reduced. The approach demonstrated here can also be used for the narrowband single-photon sources based on the thermal atoms [4447], integrated photonics [48,49], or cold atoms [5055], provided that the operating wavelengths of the thermal- or cold- atom-based sources can be converted to the telecom band. Recently, a QKD network with a trusted relay have been set up across the campuses of NTHU and NYCU in Taiwan. The QKD system demonstrated here will be incorporated in this network to work with other QKD systems based on the weak coherent states. Our work shows that the practical QKD can benefit from the single photons with long coherence time, narrow bandwidth, and controlled waveforms.

Funding

National Science and Technology Council (110-2112-M-007-021-MY3, 111-2119-M-007-007).

Acknowledgments

The authors would like to thank the Computer and Communication Center of NTHU and the Information Technology Service Center of NYCU for their kind assistance with the inter-university optical fiber network. We also thank D.-S. Chuu, C.-Y. Mou, H.-S. Goan, I. A. Yu, C.-M. Li, A. Yabushita, Y.-C. Liang, Y.-N. Chen, R.-K. Lee, and C.-M. Wu for the fruitful discussion and experimental assistance.

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request

References

1. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74(1), 145–195 (2002). [CrossRef]  

2. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptology 5(1), 3–28 (1992). [CrossRef]  

3. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing pp. 175–179 (1984).

4. C. H. Bennett, “Quantum cryptography using any two nonorthogonal states,” Phys. Rev. Lett. 68(21), 3121–3124 (1992). [CrossRef]  

5. K. Inoue, E. Waks, and Y. Yamamoto, “Differential phase shift quantum key distribution,” Phys. Rev. Lett. 89(3), 037902 (2002). [CrossRef]  

6. D. Stucki, C. Barreiro, S. Fasel, J.-D. Gautier, O. Gay, N. Gisin, R. Thew, Y. Thoma, P. Trinkler, F. Vannel, and H. Zbinden, “Continuous high speed coherent one-way quantum key distribution,” Opt. Express 17(16), 13326–13334 (2009). [CrossRef]  

7. H.-K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution,” Phys. Rev. Lett. 108(13), 130503 (2012). [CrossRef]  

8. T. Sasaki, Y. Yamamoto, and M. Koashi, “Practical quantum key distribution protocol without monitoring signal disturbance,” Nature 509(7501), 475–478 (2014). [CrossRef]  

9. A. Boaron, B. Korzh, R. Houlmann, G. Boso, D. Rusca, S. Gray, M.-J. Li, D. Nolan, A. Martin, and H. Zbinden, “Simple 2.5 ghz time-bin quantum key distribution,” Appl. Phys. Lett. 112(17), 171108 (2018). [CrossRef]  

10. M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, “Overcoming the rate–distance limit of quantum key distribution without quantum repeaters,” Nature 557(7705), 400–403 (2018). [CrossRef]  

11. C. Marand and P. D. Townsend, “Quantum key distribution over distances as long as 30 km,” Opt. Lett. 20(16), 1695–1697 (1995). [CrossRef]  

12. X.-F. Mo, B. Zhu, Z.-F. Han, Y.-Z. Gui, and G.-C. Guo, “Faraday–michelson system for quantum cryptography,” Opt. Lett. 30(19), 2632–2634 (2005). [CrossRef]  

13. H. Takesue, W. Nam Sae, Q. Zhang, H. R. H. T. Honjo, K. Tamaki, and Y. Yamamoto, “Quantum key distribution over a 40-db channel loss using superconducting single-photon detectors,” Nat. Photonics 1(6), 343–348 (2007). [CrossRef]  

14. C.-Z. Peng, J. Zhang, D. Yang, W.-B. Gao, H.-X. Ma, H. Yin, H.-P. Zeng, T. Yang, X.-B. Wang, and J.-W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98(1), 010505 (2007). [CrossRef]  

15. G. B. Xavier, N. Walenta, G. V. de Faria, G. P. Tempor ao, N. Gisin, H. Zbinden, and J. P. von der Weid, “Experimental polarization encoded quantum key distribution over optical fibres with real-time continuous birefringence compensation,” New J. Phys. 11(4), 045015 (2009). [CrossRef]  

16. M. Peev, C. Pacher, R. Alléaume, et al., “The SECOQC quantum key distribution network in vienna,” New J. Phys. 11(7), 075001 (2009). [CrossRef]  

17. Y. Liu, T.-Y. Chen, J. Wang, W.-Q. Cai, X. Wan, L.-K. Chen, J.-H. Wang, S.-B. Liu, H. Liang, L. Yang, C.-Z. Peng, K. Chen, Z.-B. Chen, and J.-W. Pan, “Decoy-state quantum key distribution with polarized photons over 200 km,” Opt. Express 18(8), 8587–8594 (2010). [CrossRef]  

18. D. Stucki, M. Legré, F. Buntschu, et al., “Long-term performance of the SwissQuantum quantum key distribution network in a field environment,” New J. Phys. 13(12), 123001 (2011). [CrossRef]  

19. M. Sasaki, M. Fujiwara, H. Ishizuka, et al., “Field test of quantum key distribution in the tokyo QKD network,” Opt. Express 19(11), 10387 (2011). [CrossRef]  

20. S. Wang, W. Chen, J.-F. Guo, Z.-Q. Yin, H.-W. Li, Z. Zhou, G.-C. Guo, and Z.-F. Han, “2 ghz clock quantum key distribution over 260 km of standard telecom fiber,” Opt. Lett. 37(6), 1008–1010 (2012). [CrossRef]  

21. B. Korzh, C. C. W. Lim, R. Houlmann, N. Gisin, M. J. Li, D. Nolan, B. Sanguinetti, R. Thew, and H. Zbinden, “Provably secure and practical quantum key distribution over 307 km of optical fibre,” Nat. Photonics 9(3), 163–168 (2015). [CrossRef]  

22. H.-L. Yin, T.-Y. Chen, Z.-W. Yu, H. Liu, L.-X. You, Y.-H. Zhou, S.-J. Chen, Y. Mao, M.-Q. Huang, W.-J. Zhang, H. Chen, M. J. Li, D. Nolan, F. Zhou, X. Jiang, Z. Wang, Q. Zhang, X.-B. Wang, and J.-W. Pan, “Measurement-device-independent quantum key distribution over a 404 km optical fiber,” Phys. Rev. Lett. 117(19), 190501 (2016). [CrossRef]  

23. S.-K. Liao, W.-Q. Cai, W.-Y. Liu, et al., “Satellite-to-ground quantum key distribution,” Nature 549(7670), 43–47 (2017). [CrossRef]  

24. J. Yin, Y. Cao, Y.-H. Li, et al., “Satellite-to-ground entanglement-based quantum key distribution,” Phys. Rev. Lett. 119(20), 200501 (2017). [CrossRef]  

25. N. T. Islam, C. C. W. Lim, C. Cahall, J. Kim, and D. J. Gauthier, “Provably secure and high-rate quantum key distribution with time-bin qudits,” Sci. Adv. 3(11), e1701491 (2017). [CrossRef]  

26. A. Boaron, G. Boso, D. Rusca, C. Vulliez, C. Autebert, M. Caloz, M. Perrenoud, G. Gras, F. Bussières, M.-J. Li, D. Nolan, A. Martin, and H. Zbinden, “Secure quantum key distribution over 421 km of optical fiber,” Phys. Rev. Lett. 121(19), 190502 (2018). [CrossRef]  

27. D. Bunandar, A. Lentine, C. Lee, H. Cai, C. M. Long, N. Boynton, N. Martinez, C. DeRose, C. Chen, M. Grein, D. Trotter, A. Starbuck, A. Pomerene, S. Hamilton, F. N. C. Wong, R. Camacho, P. Davids, J. Urayama, and D. Englund, “Metropolitan quantum key distribution with silicon photonics,” Phys. Rev. X 8(2), 021009 (2018). [CrossRef]  

28. M. Minder, M. Pittaluga, G. L. Roberts, M. Lucamarini, J. F. Dynes, Z. L. Yuan, and A. J. Shields, “Experimental quantum key distribution beyond the repeaterless secret key capacity,” Nat. Photonics 13(5), 334–338 (2019). [CrossRef]  

29. J.-P. Chen, C. Zhang, Y. Liu, C. Jiang, W.-J. Zhang, Z.-Y. Han, S.-Z. Ma, X.-L. Hu, Y.-H. Li, H. Liu, F. Zhou, H.-F. Jiang, T.-Y. Chen, H. Li, L.-X. You, Z. Wang, X.-B. Wang, Q. Zhang, and J.-W. Pan, “Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas,” Nat. Photonics 15(8), 570–575 (2021). [CrossRef]  

30. N. Lütkenhaus, “Security against individual attacks for realistic quantum key distribution,” Phys. Rev. A 61(5), 052304 (2000). [CrossRef]  

31. Q. Wang, W. Chen, G. Xavier, M. Swillo, T. Zhang, S. Sauge, M. Tengner, Z.-F. Han, G.-C. Guo, and A. Karlsson, “Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source,” Phys. Rev. Lett. 100(9), 090501 (2008). [CrossRef]  

32. S. Wang, Z.-Q. Yin, W. Chen, D.-Y. He, X.-T. Song, H.-W. Li, L.-J. Zhang, Z. Zhou, G.-C. Guo, and Z.-F. Han, “Experimental demonstration of a quantum key distribution without signal disturbance monitoring,” Nat. Photonics 9(12), 832–836 (2015). [CrossRef]  

33. H.-J. Briegel, W. Dür, J. I. Cirac, and P. Zoller, “Quantum repeaters: The role of imperfect local operations in quantum communication,” Phys. Rev. Lett. 81(26), 5932–5935 (1998). [CrossRef]  

34. C. Liu, S. Zhang, L. Zhao, P. Chen, C. H. F. Fung, H. F. Chau, M. M. T. Loy, and S. Du, “Differential-phase-shift quantum key distribution using heralded narrow-band single photons,” Opt. Express 21(8), 9505–9513 (2013). [CrossRef]  

35. T. Honjo, T. Inoue, and K. Inoue, “Influence of light source linewidth in differential-phase-shift quantum key distribution systems,” Opt. Commun. 284(24), 5856–5859 (2011). [CrossRef]  

36. K. Wen, K. Tamaki, and Y. Yamamoto, “Unconditional security of single-photon differential phase shift quantum key distribution,” Phys. Rev. Lett. 103(17), 170503 (2009). [CrossRef]  

37. M. Lucamarini, K. A. Patel, J. F. Dynes, B. Fröhlich, A. W. Sharpe, A. R. Dixon, Z. L. Yuan, R. V. Penty, and A. J. Shields, “Efficient decoy-state quantum key distribution with quantified security,” Opt. Express 21(21), 24550 (2013). [CrossRef]  

38. C.-S. Chuu and S. E. Harris, “Ultrabright backward-wave biphoton source,” Phys. Rev. A 83(6), 061803 (2011). [CrossRef]  

39. C.-S. Chuu, G. Y. Yin, and S. E. Harris, “A miniature ultrabright source of temporally long, narrowband biphotons,” Appl. Phys. Lett. 101(5), 051108 (2012). [CrossRef]  

40. C.-H. Wu, T.-Y. Wu, Y.-C. Yeh, P.-H. Liu, C.-H. Chang, C.-K. Liu, T. Cheng, and C.-S. Chuu, “Bright single photons for light-matter interaction,” Phys. Rev. A 96(2), 023811 (2017). [CrossRef]  

41. P. Grangier, “G. Roger, and A. Aspect,” Europhys. Lett. 1(4), 173–179 (1986). [CrossRef]  

42. C.-H. Wu, C.-K. Liu, Y.-C. Chen, and C.-S. Chuu, “Revival of quantum interference by modulating the biphotons,” Phys. Rev. Lett. 123(14), 143601 (2019). [CrossRef]  

43. E. Waks, H. Takesue, and Y. Yamamoto, “Security of differential-phase-shift quantum key distribution against individual attacks,” Phys. Rev. A 73(1), 012344 (2006). [CrossRef]  

44. C. Shu, P. Chen, T. K. A. Chow, L. Zhu, Y. Xiao, M. M. T. Loy, and S. Du, “Subnatural-linewidth biphotons from a doppler-broadened hot atomic vapour cell,” Nat. Commun. 7(1), 12783 (2016). [CrossRef]  

45. L. Zhu, X. Guo, C. Shu, H. Jeong, and S. Du, “Bright narrowband biphoton generation from a hot rubidium atomic vapor cell,” Appl. Phys. Lett. 110(16), 161101 (2017). [CrossRef]  

46. T. Jeong and H. S. Moon, “Temporal- and spectral-property measurements of narrowband photon pairs from warm double-λ-type atomic ensemble,” Opt. Express 28(3), 3985 (2020). [CrossRef]  

47. J.-M. Chen, C.-Y. Hsu, W.-K. Huang, S.-S. Hsiao, F.-C. Huang, Y.-H. Chen, C.-S. Chuu, Y.-C. Chen, Y.-F. Chen, and I. A. Yu, “Room-temperature biphoton source with a spectral brightness near the ultimate limit,” Phys. Rev. Res. 4(2), 023132 (2022). [CrossRef]  

48. K.-H. Luo, H. Herrmann, S. Krapick, B. Brecht, R. Ricken, V. Quiring, H. Suche, W. Sohler, and C. Silberhorn, “Direct generation of genuine single-longitudinal-mode narrowband photon pairs,” New J. Phys. 17(7), 073039 (2015). [CrossRef]  

49. F. Samara, A. Martin, C. Autebert, M. Karpov, T. J. Kippenberg, H. Zbinden, and R. Thew, “High-rate photon pairs and sequential time-bin entanglement with Si3N4 microring resonators,” Opt. Express 27(14), 19309 (2019). [CrossRef]  

50. V. Balić, D. A. Braje, P. Kolchin, G. Y. Yin, and S. E. Harris, “Generation of paired photons with controllable waveforms,” Phys. Rev. Lett. 94(18), 183601 (2005). [CrossRef]  

51. S. Chen, Y.-A. Chen, T. Strassel, Z.-S. Yuan, B. Zhao, J. Schmiedmayer, and J.-W. Pan, “Deterministic and storable single-photon source based on a quantum memory,” Phys. Rev. Lett. 97(17), 173004 (2006). [CrossRef]  

52. S. Du, P. Kolchin, C. Belthangady, G. Y. Yin, and S. E. Harris, “Subnatural linewidth biphotons with controllable temporal length,” Phys. Rev. Lett. 100(18), 183603 (2008). [CrossRef]  

53. L. Zhao, X. Guo, C. Liu, Y. Sun, M. M. T. Loy, and S. Du, “Photon pairs with coherence time exceeding 1 µs,” Optica 1(2), 84 (2014). [CrossRef]  

54. R. Chinnarasu, C.-Y. Liu, Y.-F. Ding, C.-Y. Lee, T.-H. Hsieh, I. A. Yu, and C.-S. Chuu, “Efficient generation of subnatural-linewidth biphotons by controlled quantum interference,” Phys. Rev. A 101(6), 063837 (2020). [CrossRef]  

55. Y.-S. Wang, K.-B. Li, C.-F. Chang, T.-W. Lin, J.-Q. Li, S.-S. Hsiao, J.-M. Chen, Y.-H. Lai, Y.-C. Chen, Y.-F. Chen, C.-S. Chuu, and I. A. Yu, “Temporally-ultralong biphotons with a linewidth of 50 khz,” APL Photonics 7(12), 126102 (2022). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (4)

Fig. 1.
Fig. 1. (a) The calculated key creation efficiencies and (b) the QBERs for different numbers of time slots (colored areas) and waveforms or envelopes of the single-photon wavepackets (dash lines). The inset shows an example of single-photon wavepacket with a double-exponential waveform.
Fig. 2.
Fig. 2. (a) Experimental setup of the miniature room-temperature 1550-nm single-photon source based on the monolithic doubly resonant parametric down-conversion. The abbreviations stand for the data acquisition (DAQ), beamsplitter (BS), polarizing beamsplitter (PBS), and electro-optic modulator (EOM). (b) The generation rate versus the time. (c) The pump power is kept low to ensure good single-photon quality ( $g^{(2)}(0) < 0.5$ ). Due to the finite dead time ( $\sim 2\ \mu$ s) and the lack of the photon-number resolvability of the detectors, the measured $g^{(2)}(0)$ saturates when the pump power is above 600 $\mu$ W. (d) The temporal wavepacket (blue area) of the heralded single photons. The red curve is the fit of the double-exponential function. (e) The electro-optic modulation of the single-photon wavepacket into a pulse train. The integration times are 180 s and 120 s in (d) and (e), respectively.
Fig. 3.
Fig. 3. (a) The field test exploits the inter-university optical fiber network (orange line) between the General II Building (yellow dot) at NTHU (bounded by the yellow dash line) and the IT Service Center (red dot) at NYCU (bounded by the red dash line) in Hsinchu City, Taiwan. Alice’s and Bob’s setup are illustrated in (b) and (c), respectively. The abbreviations stand for half-wave plate (HWP), beamsplitter (BS), polarizing beamsplitter (PBS), piezoelectric actuator (PZT), photodiode (PD), and superconducting nanowire single-photon detector (SNSPD). (d) The interference visibility of the Mach-Zehnder interferometer with (black curve) and without (red curve) the active stabilization. (e) The Poincaré sphere shows the fluctuation of a single-frequency laser’s polarization state after passing through the fiber pair. The polarization state starts at the green arrow (the horizontal) and ends up in the orange arrow after 24 hours. (f) The time-resolved interference of single photons prepared in 20, 30, and 50 time slots (from the left to right). The integration time and coincidence time bin are 600 s and 0.2 ns, respectively.
Fig. 4.
Fig. 4. (a) The key creation efficiency (dots) versus the number of time slots. The solid and dash curves correspond to the theory considering realistic and 100% interference visibility, respectively. (b) The sifted key rates and the QBERs versus the number of time slots. The red dashed line at 4.12% represents the threshold level for the unconditional security [36]. (c) The QBER recorded over a two-hour of operation. (d) The sifted key rates (black dots) and secure key rates (blue dots) against the general attack of individual photons recorded over a two-hour of operation. The lengths of the outdoor fibers used in (a) [or (b)] and (c) [or (d)] are 3.4 km and 4.8 km, respectively.

Equations (1)

Equations on this page are rendered with MathJax. Learn more.

G ( 2 ) ( τ ) = R 2 + 4 κ 2 Γ s Γ i ( Γ s + Γ i ) 2 × { e Γ s τ , if τ < 0 e Γ i τ , if τ > 0
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.