Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2024 Jan 5;10(1):eadi9474.
doi: 10.1126/sciadv.adi9474. Epub 2024 Jan 3.

Long-distance continuous-variable quantum key distribution over 100-km fiber with local local oscillator

Affiliations

Long-distance continuous-variable quantum key distribution over 100-km fiber with local local oscillator

Adnan A E Hajomer et al. Sci Adv. .

Abstract

Quantum key distribution (QKD) enables two remote parties to share encryption keys with security based on the laws of physics. Continuous-variable (CV) QKD with coherent states and coherent detection integrates well with existing telecommunication networks. Thus far, long-distance CV-QKD has only been demonstrated using a highly complex scheme where the local oscillator is transmitted, opening security loopholes for eavesdroppers and limiting potential applications. Here, we report a long-distance CV-QKD experiment with a locally generated local oscillator over a 100-kilometer fiber channel with a total loss of 15.4 decibels. This record-breaking distance is achieved by controlling the phase noise-induced excess noise through a machine learning framework for carrier recovery and optimizing the modulation variance. We implement the full CV-QKD protocol and demonstrate the generation of keys secure against collective attacks in the finite-size regime. Our results mark a substantial milestone for realizing CV quantum access networks with a high loss budget and pave the way for large-scale deployment of secure QKD.

PubMed Disclaimer

Figures

Fig. 1.
Fig. 1.. Long-distance continuous-variable–quantum key distribution (CV-QKD) system.
Alice’s station consists of a continuous-wave (CW) laser operating at 1550 nm, an in-phase and quadrature (IQ) modulator with an automatic bias controller (ABC) for producing coherent states at sideband frequencies. A digital-to-analog converter (DAC) with a resolution of 16 bits and a sampling rate of 1 gigasample/s was used to drive the IQ modulator. A variable optical attenuator (VOA) was used after the IQ modulator to adjust the modulation variance of the quantum signal. A Faraday isolator (FI), whose forward direction is indicated by the arrow, is used before a 100-km ultralow-loss fiber channel that constitutes the quantum channel. Bob’s station consists of a polarization controller (PC) to adjust the polarization of the incoming signal and a balanced beam splitter to overlap this signal with a LO generated from another CW laser (unlocked/free-running with respect to Alice’s laser). The signal was detected and digitized using a balanced detector (BD), followed by an analog-to-digital converter (ADC) with a sampling rate of 1 gigasample/s. EC, electric connection; SMF, single-mode fiber; PMF, polarization-maintaining fiber.
Fig. 2.
Fig. 2.. DSP routines of the long-distance local local oscillator (LLO) continuous-variable–quantum key distribution (CV-QKD) system.
See Materials and Methods for the details. a.u., arbitrary units.
Fig. 3.
Fig. 3.. Modulation variance optimization.
Experimentally obtained reconciliation efficiency β, frame error rate (FER), and asymptotic secret key rate (SKR) against the modulation variance Vmod.
Fig. 4.
Fig. 4.. Performance of long-distance continuous-variable–quantum key distribution (CV-QKD).
(A) The secret key rate (SKR) versus fiber channel length with an attenuation factor of 0.146 dB/km (taking into account additional coupling loss of 82%) in asymptotic (dashed) and finite-size (solid) regimes. Points correspond to experimentally achieved results. (B) Cumulative excess noise as a function of the number of acquired frames.

References

    1. Hellman M., New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976).
    1. Rivest R. L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978).
    1. P. W. Shor, Algorithms for quantum computation: Discrete logarithms and factoring, in Proceedings 35th Annual Symposium on Foundations of Computer Science (IEEE, 1994), pp. 124–134.
    1. Arute F., Arya K., Babbush R., Bacon D., Bardin J. C., Barends R., Biswas R., Boixo S., Brandao F. G. S. L., Buell D. A., Burkett B., Chen Y., Chen Z., Chiaro B., Collins R., Courtney W., Dunsworth A., Farhi E., Foxen B., Fowler A., Gidney C., Giustina M., Graff R., Guerin K., Habegger S., Harrigan M. P., Hartmann M. J., Ho A., Hoffmann M., Huang T., Humble T. S., Isakov S. V., Jeffrey E., Jiang Z., Kafri D., Kechedzhi K., Kelly J., Klimov P. V., Knysh S., Korotkov A., Kostritsa F., Landhuis D., Lindmark M., Lucero E., Lyakh D., Mandrà S., McClean J. R., McEwen M., Megrant A., Mi X., Michielsen K., Mohseni M., Mutus J., Naaman O., Neeley M., Neill C., Niu M. Y., Ostby E., Petukhov A., Platt J. C., Quintana C., Rieffel E. G., Roushan P., Rubin N. C., Sank D., Satzinger K. J., Smelyanskiy V., Sung K. J., Trevithick M. D., Vainsencher A., Villalonga B., White T., Yao Z. J., Yeh P., Zalcman A., Neven H., Martinis J. M., Quantum supremacy using a programmable superconducting processor. Nature 574, 505–510 (2019). - PubMed
    1. Bennett C. H., Brassard G., Quantum cryptography: Public key distribution and coin tossing. Theor. Comp. Sci. 560, 7– 11547 (2014).