Abstract
Recent field demonstrations of quantum key distribution (QKD) networks hold promise for unconditionally secure communication. However, owing to loss in optical fibres, the length of point-to-point links is limited to a hundred kilometers, restricting the QKD networks to intracity. A natural way to expand the QKD network in a secure manner is to connect it to another one in a different city with quantum repeaters. But, this solution is overengineered unless such a backbone connection is intercontinental. Here we present a QKD protocol that could supersede even quantum repeaters for connecting QKD networks in different cities below 800 km distant. Nonetheless, in contrast to quantum repeaters, this protocol uses only a single intermediate node with optical devices, requiring neither quantum memories nor quantum error correction. Our all-photonic ‘intercity’ QKD protocol bridges large gaps between the conventional intracity QKD networks and the future intercontinental quantum repeaters, conceptually and technologically.
Similar content being viewed by others
Introduction
In the conventional world, communication networks are connected to each other with backbone links. This way, a worldwide communication network such as the Internet is formed. Analogously, although recent field demonstrations for intracity quantum key distribution (QKD) networks hold promise for unconditionally secure communication with point-to-point links up to a 100 km (refs 1, 2), such intracity networks will be connected by a backbone quantum link to build a worldwide QKD network in the future. In principle, from its core role, such a backbone quantum link might use more demanding devices than the usual links in the intracity QKD network, for example, in contrast to the cost-effective last-mile service3,4. Quantum repeaters5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22 could be adopted as the backbone quantum link, given that the communication efficiency scales polynomially with the communication distance, compared with the exponential scaling of the conventional QKD links1,2. This polynomial scaling of quantum repeaters is necessary for intercontinental backbone quantum links. But, otherwise, quantum repeaters are overengineered from the following reasons: Major cities to be equipped with an intracity QKD network may be within a radius <1,000 km, and the polynomial scaling of quantum repeaters usually necessitates quantum memories5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20 or quantum error correction5,7,11,13,17,18,19,20,21—which is extremely challenging as it requires a huge number of qubits as well as many repeater nodes. Therefore, an intercity backbone quantum link—which would be more effective in connecting intracity QKD networks in different major cities than quantum repeaters—may be in greater demand than an intercontinental one based on quantum repeaters, to compose the future worldwide QKD network.
The main point of this paper is to present such an intercity QKD protocol using only a single untrusted intermediate node between communicators. The node uses only single-photon sources, linear optical elements, single-photon detectors, optical switches and active feedforward techniques, requiring neither quantum memories nor quantum error correction, in contrast to other known protocols5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24. This implies that our protocol also has the following distinct advantages for the implementation. First, the absence of memories implies that the repetition rate can be increased as high as one wants within those allowed by the assumed optical devices. Second, the absence of matter systems makes coherent frequency converters for photons (to strengthen the coupling to matter25 and to optical fibres26) unnecessary. Finally, our protocol could work at room temperature in principle, thanks to its all-photonic nature. Nonetheless, our scheme leads to a square root improvement in the secret key rate over conventional QKD schemes1,2,27. Moreover, our scheme could supersede even quantum repeater schemes6,10,14 with atomic ensembles for the communication distances below 800 km. From a fundamental viewpoint, our scheme highlights conceptual differences between an entanglement-based QKD scheme28,29 and its time-reversed version30,31,32—now called32 measurement-device-independent QKD (mdiQKD) for the sake of closing all the security loopholes of measurement devices—as well as between QKD protocols and quantum repeaters for providing entanglement.
Results
Entanglement-based QKD and mdiQKD
Our protocol emerges from highlighting a difference between an entanglement-based QKD scheme28,29 and the mdiQKD scheme32. Let us start by considering this. The schemes assume a single untrusted node C in the middle of communicators Alice and Bob, separated over distance L (Fig. 1). Here node C shares optical channels with Alice and Bob, whose transmittance is described by with attenuation length latt. The transmittance is equal to the arrival probability of a single photon through the lossy channels. Those protocols could provide Alice and Bob with a pair of bits for the secret key only when both photons—exchanged between node C and Alice and between node C and Bob—survive the loss in the optical channels. Hence, the number of trials required on average to obtain a pair of bits for the secret key is in both of the protocols. In fact, all known QKD protocols—including prepare-and-measure QKD schemes1,2 whose final key rates G per pulse are now limited27 by the Takeoka–Guha–Wilde (TGW) bound because of the lack of intermediate nodes—share1,2 this scaling without quantum memories5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,23,24 or quantum error correction5,7,11,13,17,18,19,20,21. In contrast, our protocol improves the scaling from to only with the help of a single node without any of such demanding devices. The essence of our idea is to notice that the original scaling is caused by a fact that the pairings at node C for Bell pairs in the entanglement-based QKD scheme or for Bell measurements in the mdiQKD scheme (cf. Fig. 1) are predetermined independently of the occurrence of photon losses. In other words, to outperform the scaling, we need to make the pairings depend on the occurrences of photon losses. Interestingly, this is possible solely for the mdiQKD protocol, because it entangles photons after the transmission in contrast to the entanglement-based QKD scheme (cf. Fig. 1).
Basic idea of our adaptive mdiQKD
To be precise, we introduce our protocol regarded as an mdiQKD scheme, where node C adaptively performs the Bell measurements only on surviving photons under losses (Fig. 2). This protocol proceeds as follows: (i) Alice and Bob send m optical pulses in single-photon states—each of which is randomly selected from the eigenstates of complementary observables and —to node C simultaneously, using multiplexing. (ii) On receiving the pulses, node C applies quantum non-demolition (QND) measurements to the pulses to confirm the arrival of the single photons over lossy channels. (iii) Then, successfully arriving photons from Alice are paired with ones from Bob via optical switches at node C. (iv) Node C then performs a Bell measurement on each of these pairs. (v) Node C then announces the pairings and the measurement outcomes of the Bell measurements. (vi) Finally, as bits for the secret key, Alice and Bob keep the eigenvalues corresponding to their sent eigenstates to which the Bell measurements have been successfully applied. The bits obtained in step (vi) will be processed with a manner similar to the data that are kept after the quantum communication phase of the original mdiQKD protocol32.
Let us consider the scaling of our protocol. When Alice’s and Bob’s pulses are perfectly in single-photon states, the transmittance ηL/2 of the channels affects only the probability of confirming the arrival of single photons via QND measurements in step (ii). Since this probability is proportional to, if the number m of multiplexing is larger than , one or more single photons arrive at node C from each of Alice and Bob with a high probability. Since the successful application of the Bell measurement to these single photons leads to a pair of bits for the secret key in step (vi), the communication resources such as required optical pulses and devices—which are proportional to the number m of the multiplexing—are in the order of . This is a square root improvement over conventional protocols1,2, which results from making the pairings for the Bell measurement depend on the successful arrival of single photons.
More precisely, our protocol has a direct impact on the asymptotic sifted-key generation rate , where is the average number of the sifted pairs for the number m of multiplexing. R is included in the final key rate formula G per pulse (normalized by the number of events of the same basis choice by Alice and Bob) as1
where h(x) is the binary entropy function defined by and eZ (eX) is the error rate for Alice’s and Bob’s choice of Z-basis (X-basis)—called the bit-error rate (the phase-error rate). R for our protocol is given by
for Alice’s and Bob's photon sources with efficiency ηs, QND measurements with success probability pQND and Bell measurements with success probability pBM (see Methods). As the rate of the original mdiQKD protocol is , our protocol necessitates, at least,
to outperform it in terms of R. Given that pBM contributes to independently of m (see Methods), the number of multiplexing should be to obtain R in the order of equation (2).
All-photonic implementation
To implement our protocol, we only need optical devices. The Bell measurement in step (iv) can be conducted just by using linear optical elements and single-photon detectors33, similarly to the original mdiQKD scheme32. A challenging technique in our protocol is the QND measurement in step (ii). Besides many schemes for the QND measurement involving matter qubits or matter quantum memories, fortunately, there are several all-photonic schemes for the QND measurement for single photons33. Here we focus on a simple example, that is, a QND measurement for a single photon34 based on quantum teleportation35. This scheme teleports the single-photon state of the incoming pulse to that of a half of a photonic Bell pair via the linear-optics-based Bell measurement, using the feature that the teleportation fails when the incoming pulse is in the vacuum state.
The protocol composed of steps (i)–(vi) is now implementable by using optical devices alone. However, the optical switch required in step (iii) may still be challenging because it should have the input modes in the order of (for one or a few output modes). In particular, a large-scale optical switch to route a single photon in one of the many input modes into a Bell measurement module in step (iv) may be much more difficult than the existing ones36,37,38 with a small number of input modes. For instance, although we can realize an m × 1 optical switch by concatenating 2 × 1 optical switches with transmittance ηsw in a knockout tournament manner with depth , the transmittance of the large-scale optical switch decreases as , which may thus be needed to be taken care of in this case. However, remarkably, it is also possible to perform our protocol without using such a large-scale optical switch, that is, by using only single-mode on/off switches, a passive Hadamard linear optical circuit and single-photon detectors.
To achieve our protocol without large-scale optical switches, steps (iii)–(v) can be replaced with the followings: (iii’) Then, a mode i (i=1, 2, …, m) with a successfully arriving photon from Alice and a mode j (j=m+1, m+2, …, 2m) with a successfully arriving photon from Bob are directly sent to the Hadamard linear optical circuit that acts on the 2m modes of node C as with an orthogonal 2m × 2m Hadamard matrix H=[hμν] and annihilation operators for the input (output) modes and their orthogonal polarizations H and V. Except for two modes i and j, all the optical modes are blocked off with the single-mode on/off switches. (iv’) Node C then measures all the 2m output modes of the Hadamard linear optical circuit with polarization discriminating photon counters, and, if a photon with polarization H is found in output mode k and a photon with polarization V is found in output mode l (k, l=1, 2, …, 2m), it regards this trial as successful application of a Bell measurement showing that input modes i and j have been in unnormalized Bell state . (v’) Node C then announces input modes i and j and output modes k and l.
In the modified protocol here, since the sifted-key generation rate R=Pm/m with success probability Pm of the protocol and error rates eX and eZ in the formula for the final key rate G per pulse are the functions of the number m of multiplexing, m should be chosen to maximize G, but gives the maximum of G. The property of the Hadamard matrix that all the elements are or would be needed to suit the phase-error estimation in the mdiQKD (ref. 32). In fact, thanks to this property, the sequence of (iii’)–(v’) essentially performs a Bell measurement to distinguish Bell states from the other states, and the phase-error estimation in the original mdiQKD protocol32 thus works even for our modified mdiQKD scheme in the same way. However, the Hadamard matrix exists only on restricted dimensional vector spaces, in contrast to a general Fourier transformation. For instance, it exists on 2s-dimensional vector spaces with s=1, 2, …. Hence, we use the Hadamard matrix on 2s-dimensional vector spaces with 2s=2m, based on Sylvester’s construction. The symmetry of this construction is indeed favourable for calculating the performance of the modified protocol, because the effects of non-unity quantum efficiency of single-photon detectors in step (iv’) can be regarded as losses in the input modes of the Hadamard linear optical circuit.
Performance of our all-photonic scheme
We now estimate the final key rate G for the original protocol with (iii)–(v) and the modified one with (iii’)–(v’), assuming the all-photonic QND measurement based on quantum teleportation for step (ii). Our protocol needs an active feedforward technique with an optical switch. Suppose that a single active feedforward can be completed within time τa, during which photons run in optical fibres, being subject to the corresponding loss. In addition, we assume single-photon sources with efficiency ηs that emit pulses with duration τs and single-photon detectors with quantum efficiency ηd and with dark count rate νd. For simplicity, despite the being of various schemes for single-photon sources39, since our protocol, in any case, necessitates the active feedforward technique, we assume a single-photon source36,37,40 based on multiplexing of heralded single-photon sources. In fact, this photon source holds40 promise for producing high-fidelity telecom single photons with the repetition rate of the slowest optical device at the expense of the use of (at least) one active feedforward, and it would be realizable just by using only a small amount of multiplexing41,42. Bell pairs for the all-photonic QND measurements in step (ii) can be generated in constant time τa with single-photon sources rather than a Bell-pair photon source, by paralleling a probabilistic procedure43 with the active feedforward technique. In practice, this kind of step-wise preparation of Bell pairs may be useful for suppressing the unnecessary multi-photon components, because such multi-photon components may just contribute to events to be discarded as failure (as this kind of phenomenon indeed occurs sometimes44). In addition, note that we need to use one active feedforward in step (iii) or (iii’).
Under these assumptions, the final key rates G are illustrated in Fig. 3 by assuming a collection of the state-of-art technologies36,40,45,46,47,48,49. Although the modified protocol merely uses the Hadamard matrix on 2s-dimensional vector spaces with 2s=2m, the key rates G labelled line (II) in Fig. 3 look like continuous for distance L, implying that the restricted choice of the Hadamard matrices is not a problem. Figure 3 shows that both of our original and modified protocols outperform the original mdiQKD protocol32 (the TGW bound27) for distances L larger than ∼100 km (∼200 km). These crossing distances are much smaller than those for quantum repeaters (for example, ∼500 km for protocols14 based on atomic ensembles). Moreover, the performance of both our protocols is seven orders of magnitude better than that of the original mdiQKD protocol for L=800 km. Since the assumed state-of-art technologies36,40,45,46,47,48,49—including the synchronization as seen in the experimental demonstrations50,51,52,53,54,55 of the original mdiQKD (ref. 32)—work with 15 MHz at least36, the key generation rate per second of our original protocol (the modified one) is then 1.7 kHz (0.69 kHz) for L=307 km, which is a couple orders of magnitude better than experimental demonstrations47,56 of QKD over the current record distance. More interestingly, the rate is 13 mHz (3.8 mHz) for L=800 km, which is the same order of (only one order of magnitude less than) that of the best quantum repeater scheme10 with atomic ensembles14. It is then clear that both of our schemes outperform the best quantum repeater scheme10 below 800 km, if all the optical components work with 1 GHz as predicted to be possible14,36,53,54. The cutoff distances of km for both protocols in Fig. 3 are determined by the signal-to-noise ratio associated with the dark counting of the single-photon detectors. But the cutoff distances could be extended57 if we replace the prepare-and-measure scheme of Fig. 2 between Alice (Bob) and node C with an entanglement-based one by putting an additional node with Bell-pair sources in between them.
Discussion
We have presented an adaptive mdiQKD scheme that can present a square root improvement over conventional QKD schemes1,2,27, superseding even quantum repeaters14 for intercity distances. The ‘adaptive’ Bell measurement performed by node C in our scheme is also useful for providing a square root improvement for any single-photon-based entanglement generation protocol, for example, entanglement generation schemes for quantum repeaters with atomic ensembles14. However, note that it is impossible for our protocol alone to serve as quantum repeaters blessing an exponential improvement. In fact, although we can use our protocols as the entanglement generation for Alice’s and Bob’s stationary qubits by starting from entangling their photons with their stationary qubits, they need to wait the arrival of the heralding signals from node C in step (v) or (v’) to identify the stationary qubits that have successfully been entangled, which is impossible without the memory function of their stationary qubits. This is an unbridgeable gap between our QKD protocol and quantum repeaters, and hence, for extremely long distances such as thousands of kilometres, quantum repeaters are needed. However, combined with all-photonic quantum repeaters21, our protocol certainly paves a seamless route towards the all-optical realization of a worldwide QKD network—which would be not only a certain milestone21 towards the all-photonic quantum computation43,58 but also an ultimate challenge for the all-optical approach59 in the field of conventional communication. Our protocol would also lead to unforeseeable attractive new twists—such as the realization of telescope arrays with much longer baselines than existing facilities60 without quantum repeaters, the understanding of the fundamental limit for intercity/intercontinental quantum communication beyond the TGW bound and the finding of more practical variants of our protocol (for example, based on the combination of the time multiplexing with ultrafast single-photon sources for reducing the number of the QND measurement modules and on the hybridization of moderate-size optical switches and Hadamard-circuit-based Bell measurements for decreasing the number of the required single-photon detectors).
Methods
Asymptotic sifted-key generation rate
The asymptotic sifted-key generation rate R of our protocol can be evaluated as follows. The probability pk|m with which node C finds the existence of k(≤m) single photons from Alice or Bob via QND measurements in step (ii) is
where Bk|m(p) is the binomial distribution with To make l pairs in step (iii), the node C should have found the existence of single photons ≥l from both of Alice and Bob in step (ii), which occurs with probability . Hence, the probability with which our protocol provides n pairs of bits for the sifted key in step (vi) is described as
The average number of sifted pairs is then
where gm is shown to be
by using lBl|m(p)=mpBl−1|m−1(p) for l>0 and Bk|m(p)=(1−p)Bk|m−1(p)+pBk−1|m−1(p) for 0<k<m. Since the maximum of Bl|m−1(p) over l goes to zero in the limit of m→∞, we have limm→∞ gm=0. Therefore, the asymptotic sifted-key generation rate is described by equation (2).
Additional information
How to cite this article: Azuma, K. et al. All-photonic intercity quantum key distribution. Nat. Commun. 6:10171 doi: 10.1038/ncomms10171 (2015).
References
Scarani, V. et al. The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009).
Lo, H.-K., Curty, M. & Tamaki, K. Secure quantum key distribution. Nat. Photon. 8, 595–604 (2014).
Fröhlich, B. et al. A quantum access network. Nature 501, 69–72 (2013).
Hughes, R. J. et al. Network-centric quantum communications with application to critical infrastructure protection, Preprint at http://arxiv.org/abs/1305.0305.
Briegel, H. J., Dür, W., Cirac, J. I. & Zoller, P. Quantum repeaters: the role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932–5935 (1998).
Duan, L.-M., Lukin, M. D., Cirac, J. I. & Zoller, P. Long-distance quantum communication with atomic ensembles and linear optics. Nature 414, 413–418 (2001).
Kok, P., Williams, C. P. & Dowling, J. P. Construction of a quantum repeater with linear optics. Phys. Rev. A 68, 022301 (2003).
Childress, L., Taylor, J. M., Sørensen, A. S. & Lukin, M. D. Fault-tolerant quantum communication based on solid-state photon emitters. Phys. Rev. Lett. 96, 070504 (2006).
van Loock, P. et al. Hybrid quantum repeater using bright coherent light. Phys. Rev. Lett. 96, 240501 (2006).
Simon, C. et al. Quantum repeaters with photon pair sources and multimode memories. Phys. Rev. Lett. 98, 190503 (2007).
Jiang, L. et al. Quantum repeater with encoding. Phys. Rev. A 79, 032325 (2009).
Azuma, K. et al. Optimal entanglement generation for efficient hybrid quantum repeaters. Phys. Rev. A 80, 060303 (2009).
Munro, W. J., Harrison, K. A., Stephens, A. M., Devitt, S. J. & Nemoto, K. From quantum multiplexing to high-performance quantum networking. Nat. Photon. 4, 792–796 (2010).
Sangouard, N., Simon, C., de Riedmatten, N. & Gisin, N. Quantum repeaters based on atomic ensembles and linear optics. Rev. Mod. Phys. 83, 33–80 (2011).
Azuma, K., Takeda, H., Koashi, M. & Imoto, N. Quantum repeaters and computation by a single module: remote nondestructive parity measurement. Phys. Rev. A 85, 062309 (2012).
Azuma, K. & Kato, G. Optimal entanglement manipulation via coherent-state transmission. Phys. Rev. A 85, 060303 (2012).
Zwerger, M., Dür, W. & Briegel, H. J. Measurement-based quantum repeaters. Phys. Rev. A 85, 062326 (2012).
Munro, W. J., Stephens, A. M., Devitt, S. J., Harrison, K. A. & Nemoto, K. Quantum communication without the necessity of quantum memories. Nat. Photon. 6, 777–781 (2012).
Li, Y., Barrett, S. D., Stace, T. M. & Benjamin, S. C. Long range failure-tolerant entanglement distribution. New J. Phys. 15, 023012 (2013).
Grudka, A. et al. Long-distance quantum communication over noisy networks without long-time quantum memory. Phys. Rev. A 90, 062311 (2014).
Azuma, K., Tamaki, K. & Lo, H.-K. All-photonic quantum repeaters. Nat. Commun. 6, 6787 (2015).
Munro, W. J., Azuma, K., Tamaki, K. & Nemoto, K. Inside quantum repeaters. IEEE J. Sel. Top. Quantum Electrons. 21, 6400813 (2015).
Abruzzo, S., Kampermann, H. & Bruß, D. Measurement-device-independent quantum key distribution with quantum memories. Phys. Rev. A 89, 012301 (2014).
Panayi, C., Razavi, M., Ma, X. & Lütkenhaus, N. Memory-assisted measurement-device-independent quantum key distribution. New J. Phys. 16, 043005 (2014).
Tanzilli, S. et al. A photonic quantum information interface. Nature 437, 116–120 (2005).
Ikuta, R. et al. Wide-band quantum interface for visible-to-telecommunication wavelength conversion. Nat. Commun. 2, 537 (2011).
Takeoka, M., Guha, S. & Wilde, M. M. Fundamental rate-loss tradeoff for optical quantum key distribution. Nat. Commun. 5, 5235 (2014).
Ekert, A. K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991).
Bennett, C. H., Brassard, G. & Mermin, N. D. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68, 557–559 (1992).
Biham, E., Huttner, B. & Mor, T. Quantum cryptographic network based on quantum memories. Phys. Rev. A 54, 2651–2658 (1996).
Inamori, H. Security of practical time-reversed EPR quantum key distribution. Algorithmica 34, 340–365 (2002).
Lo, H.-K., Curty, M. & Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012).
Kok, P. et al. Linear optical quantum computing with photonic qubits. Rev. Mod. Phys. 79, 135–174 (2007).
Kok, P., Lee, H. & Dowling, J. P. Single-photon quantum-nondemolition detectors constructed with linear optics and projective measurements. Phys. Rev. A 66, 063814 (2002).
Bennett, C. H. et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993).
Ma, X.-S., Zotter, S., Kofler, J., Jennewein, T. & Zeilinger, A. Experimental generation of single photons via active multiplexing. Phys. Rev. A 83, 043814 (2011).
Collins, M. J. et al. Integrated spatial multiplexing of heralded single-photon sources. Nat. Commun. 4, 2582 (2013).
Takesue, H. Entangling time-bin qubits with a switch. Phys. Rev. A 89, 062328 (2014).
Eisaman, M. D., Fan, J., Migdall, A. & Polyakov, S. V. Invited review article: single-photon sources and detectors. Rev. Sci. Instrum. 82, 071101 (2011).
Migdall, A. L., Branning, D. & Castelletto, S. Tailoring single-photon and multiphoton probabilities of a single-photon on-demand source. Phys. Rev. A 66, 053805 (2002).
Christ, A. & Silberhorn, C. Limits on the deterministic creation of pure single-photon states using parametric down-conversion. Phys Rev. A 85, 023829 (2012).
Bonneau, D., Mendoza, G. J., O’Brien, J. L. & Thompson, M. G. Effect of loss on multiplexed single-photon sources. New J. Phys. 17, 043057 (2015).
Browne, D. E. & Rudolph, T. Resource-efficient linear optical quantum computation. Phys. Rev. Lett. 95, 010501 (2005).
Zhao, B., Chen, Z. B., Chen, Y. A., Schmiedmayer, J. & Pan, J. W. Robust creation of entanglement between remote memory qubits. Phys. Rev. Lett. 98, 240502 (2007).
Giustina, M. et al. Bell violation using entangled photons without the fair-sampling assumption. Nature 497, 227–230 (2013).
Christensen, B. G. et al. Detection-loophole-free test of quantum nonlocality, and applications. Phys. Rev. Lett. 111, 130406 (2013).
Shibata, H., Honjo, T. & Shimizu, K. Quantum key distribution over a 72 dB channel loss using ultralow dark count superconducting single-photon detectors. Opt. Lett. 39, 5078–5081 (2014).
Marsili, F. et al. Detecting single infrared photons with 93% system efficiency. Nat. Photon. 7, 210–214 (2013).
Shibata, H. et al. Single-photon detection using magnesium diboride superconducting nanowires. Appl. Phys. Lett. 97, 212504 (2010).
Rubenok, A., Slater, J. A., Chan, P., Lucio-Martinez, I. & Tittel, W. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys. Rev. Lett. 111, 130501 (2013).
Liu, Y. et al. Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111, 130502 (2013).
Ferreira da Silva, T. et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits. Phys. Rev. A 88, 052303 (2013).
Tang, Z. et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. Phys. Rev. Lett. 112, 190503 (2014).
Tang, Y.-L. et al. Measurement-device-independent quantum key distribution over 200 km. Phys. Rev. Lett. 113, 190501 (2014).
Tang, Y.-L. et al. Field test of measurement-device-independent quantum key distribution. IEEE J. Sel. Top. Quantum Electron. 21, 6600407 (2015).
Korzh, B. et al. Provably secure and practical quantum key distribution over 307 km of optical fibre. Nat. Photon. 9, 163–168 (2015).
Jacobs, B. C., Pittman, T. B. & Franson, J. D. Quantum relays and noise suppression using linear optics. Phys. Rev. A 66, 052307 (2002).
Knill, E., Laflamme, R. & Milburn, G. J. A scheme for efficient quantum computation with linear optics. Nature 409, 46–52 (2001).
Shacham, A., Bergman, K. & Carloni, L. P. Photonic networks-on-chip for future generations of chip multiprocessors. IEEE Trans. Comput. 57, 1246–1260 (2008).
Gottesman, D., Jennewein, T. & Croke, S. Longer-baseline telescopes using quantum repeaters. Phys. Rev. Lett. 109, 070503 (2012).
Acknowledgements
We thank G. Kato, G. Knee, K. Matsumoto, F. Morikoshi, H. Takesue and A. Tomita, and especially M. Curty, H.-K. Lo and N. Lütkenhaus for valuable discussions. This research is in part supported by the Project UQCC by the National Institute of Information and Communications Technology.
Author information
Authors and Affiliations
Contributions
K.A. conceived the first version of the main concepts for our protocols. Then, all the authors contributed to the refinement and generalization of the concept and its presentation of the present paper.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Rights and permissions
This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/
About this article
Cite this article
Azuma, K., Tamaki, K. & Munro, W. All-photonic intercity quantum key distribution. Nat Commun 6, 10171 (2015). https://doi.org/10.1038/ncomms10171
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/ncomms10171
This article is cited by
-
Breaking universal limitations on quantum conference key agreement without quantum memory
Communications Physics (2023)
-
A quantum router architecture for high-fidelity entanglement flows in quantum networks
npj Quantum Information (2022)
-
2×N twin-field quantum key distribution network configuration based on polarization, wavelength, and time division multiplexing
npj Quantum Information (2022)
-
Tight finite-key security for twin-field quantum key distribution
npj Quantum Information (2021)
-
Simple security proof of twin-field type quantum key distribution protocol
npj Quantum Information (2019)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.