Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2019 Feb 28;9(1):3045.
doi: 10.1038/s41598-019-39454-1.

Measurement-Device-Independent Twin-Field Quantum Key Distribution

Affiliations

Measurement-Device-Independent Twin-Field Quantum Key Distribution

Hua-Lei Yin et al. Sci Rep. .

Abstract

The ultimate aim of quantum key distribution (QKD) is improving the transmission distance and key generation speed. Unfortunately, it is believed to be limited by the secret-key capacity of quantum channel without quantum repeater. Recently, a novel twin-field QKD (TF-QKD) is proposed to break through the limit, where the key rate is proportional to the square-root of channel transmittance. Here, by using the vacuum and one-photon state as a qubit, we show that the TF-QKD can be regarded as a measurement-device-independent QKD (MDI-QKD) with single-photon Bell state measurement. Therefore, the MDI property of TF-QKD can be understood clearly. Importantly, the universal security proof theories can be directly used for TF-QKD, such as BB84 encoding, six-state encoding and reference-frame-independent scheme. Furthermore, we propose a feasible experimental scheme for the proof-of-principle experimental demonstration.

PubMed Disclaimer

Conflict of interest statement

The authors declare no competing interests.

Figures

Figure 1
Figure 1
Scheme to overcome the PLOB bound of QKD. (a) Setup for entanglement-based MDI-QKD with single-photon BSM. Alice and Bob prepare single-photon Bell state, while Charlie implements entanglement swapping. M represents the measurement operation, such as Z, X and Y basis. Alice and Bob implement the M measurement operation after Charlie performs the single-photon BSM. (b) Prepare-and-measure MDI-QKD with single-photon BSM. Alice and Bob directly prepare the qubit with superpositions of the vacuum and one-photon states. Alice and Bob implement the M measurement operation before Charlie performs the single-photon BSM. (c) Effective TF-QKD with single-photon and laser sources. The photons from single-photon source and laser source are indistinguishable in every degree of freedom. The phase-reference of long-distance should be stabilized to implement laser interference. The single-photon source is used to implement Z basis encoding, while the laser source is used to implement the phase encoding, such as X and Y basis.
Figure 2
Figure 2
The practical TF-QKD setup. (a) practical TF-QKD with independent lasers. The phase modulator (PM) can realize phase encoding and random phase modulation at one time. CW-Laser: continuous-wave laser, AM: amplitude modulator, VOA, variable optical attenuator, BPF: band pass filter, PC: polarization controller, BS: beam splitter, RNG: random number generator. (b) Phase self-aligned TF-QKD with single laser. The Faraday mirror (FM) or the polarization beam splitter (PBS) and the π/2 Faraday rotator (FR) are exploited to realize the transformation between horizontal and vertical polarizations. Alice and Bob could choose to prepare the qubit in Z basis by using Charlie’s laser or their own pulse lasers. The security will be enhanced if they use their own laser. Some polarization-maintaining fiber are required to keep the polarization in the systems of Alice, Bob and Charlie. P-Laser: pulse laser, OS: optical switch, PD, photoelectric detector, Cir: circulator.
Figure 3
Figure 3
The key rate of practical TF-QKD with BB84 encoding in the asymptotic limit. For each transmission loss, we optimize the parameters μ and t with eopt = 1%, ν = 0.1, ω = 0.02 and M = 16. For the PLOB bound, we use RPLOB=log2(1ηPLOB), ηPLOB = ηd × 10−0.02L. The secure key rate of TF-QKD with BB84 encoding can surpass the PLOB bound under the case of detector with ηd = 40%, pd = 10−7, the performance of detector has been realized much more.
Figure 4
Figure 4
The key rates of practical TF-QKD with BB84 encoding and RFI scheme in the asymptotic limit. For each transmission loss, we optimize the parameters μ and t with ηd = 90%, pd = 10−9, ν = 0.1, ω = 0.02 and M = 16. The secure key rate of practical TF-QKD with RFI scheme do not change obviously with optical error rate eopt. The secure key rate of practical TF-QKD with BB84 encoding can also beat the PLOB bound even the optical error rate up to eopt = 20%.

References

    1. Bennett, C. H. & Brassard, G. Quantum cryptography: public key distribution and coin tossing. In Proceedings of the Conference on Computers, Systems and Signal Processing, 175–179 (IEEE Press, New York, 1984).
    1. Scarani V, et al. The security of practical quantum key distribution. Rev. Mod. Phys. 2009;81:1301–1350. doi: 10.1103/RevModPhys.81.1301. - DOI
    1. Weedbrook C, et al. Gaussian quantum information. Rev. Mod. Phys. 2012;84:621–669. doi: 10.1103/RevModPhys.84.621. - DOI
    1. Boaron A, et al. Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 2018;121:190502. doi: 10.1103/PhysRevLett.121.190502. - DOI - PubMed
    1. Liao S-K, et al. Satellite-to-ground quantum key distribution. Nature. 2017;549:43. doi: 10.1038/nature23655. - DOI - PubMed