Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2013:4:2871.
doi: 10.1038/ncomms3871.

Long-distance distribution of genuine energy-time entanglement

Affiliations
Free PMC article

Long-distance distribution of genuine energy-time entanglement

A Cuevas et al. Nat Commun. 2013.
Free PMC article

Abstract

Any practical realization of entanglement-based quantum communication must be intrinsically secure and able to span long distances avoiding the need of a straight line between the communicating parties. The violation of Bell's inequality offers a method for the certification of quantum links without knowing the inner workings of the devices. Energy-time entanglement quantum communication satisfies all these requirements. However, currently there is a fundamental obstacle with the standard configuration adopted: an intrinsic geometrical loophole that can be exploited to break the security of the communication, in addition to other loopholes. Here we show the first experimental Bell violation with energy-time entanglement distributed over 1 km of optical fibres that is free of this geometrical loophole. This is achieved by adopting a new experimental design, and by using an actively stabilized fibre-based long interferometer. Our results represent an important step towards long-distance secure quantum communication in optical fibres.

PubMed Disclaimer

Figures

Figure 1
Figure 1. Energy-time Bell test configurations.
(a) Typical fibre-based implementation of Franson’s scheme. (b) Fibre-based version of the hug configuration. (c) Experimental setup used for implementing the hug configuration with a long fibre-based interferometer. Photon pairs generated in a non-linear crystal are sent through two cross-linked unbalanced Mach–Zehnder interferometers at Alice and Bob’s sites. An optical delay line is used to set the indistinguishability between the short–short and long–long two-photon paths (see the main text for details). The long interferometer comprises a 1-km long telecom single-mode fibre spool in each arm. An extra 40 m of optical fibre is added in the SB arm by the fibre stretcher, which is then balanced by an equal amount of fibre in the other arm. The total arm length in this interferometer is then 1.04 km. The long–short path length difference in both interferometers is 2 m of optical fibres.
Figure 2
Figure 2. Net coincident counts versus the delay line position.
Two-photon interference pattern is observed in case (a) with the stabilization system active, whereas (b) shows a second measurement over the same range of the delay line with stabilization turned off. The error bars shows the s.d. assuming a poissonian distribution for the photon statistics.
Figure 3
Figure 3. Coincidence interference curves and Bell CHSH inequality violation.
Graphs (ad) show the normalized coincidence detections across Alice and Bob’s detectors without accidental subtraction. (a) and (b) correspond to the cases where φb=0 and (c) and (d) to the cases where φb=π/2. Integration time for each data point is 1 s with an average rate of ≈100 coincidences counts. The rate of single counts is ≈74,000 and 54,000 detections per second for each detector of Alice and Bob, respectively. The curves are obtained varying the phase difference φa in Alice’s interferometer with the moving mirror, while actively keeping fixed the relative phase φb. (e) Shows the measured value for each probability correlation function (E) appearing in the Bell CHSH inequality. Solid black lines show the maximum possible value for each function E. The corresponding experimental Bell violation yields S=2.39±0.12. The difference between the fit curve and the data points in (ad) is due to random drifts in the piezo movement and the statistical distribution of the single-photon detections. The error bars shows the s.d. assuming a poissonian distribution for the photon statistics.

References

    1. Gisin N., Ribordy G., Tittel W. & Zbinden H. Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002).
    1. Lydersen L. et al. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon. 4, 686–689 (2010).
    1. Bell J. S. Speakable and Unspeakable in Quantum Mechanics: Collected Papers on Quantum Philosophy Cambridge University Press (2004).
    1. Ekert A. K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991). - PubMed
    1. Barrett J., Hardy L. & Kent A. No signaling and quantum key distribution. Phys. Rev. Lett. 95, 010503 (2005). - PubMed

Publication types

LinkOut - more resources