All-photonic intercity quantum key distribution


Recent field demonstrations of quantum key distribution (QKD) networks hold promise for unconditionally secure communication. However, owing to loss in optical fibres, the length of point-to-point links is limited to a hundred kilometers, restricting the QKD networks to intracity. A natural way to expand the QKD network in a secure manner is to connect it to another one in a different city with quantum repeaters. But, this solution is overengineered unless such a backbone connection is intercontinental. Here we present a QKD protocol that could supersede even quantum repeaters for connecting QKD networks in different cities below 800 km distant. Nonetheless, in contrast to quantum repeaters, this protocol uses only a single intermediate node with optical devices, requiring neither quantum memories nor quantum error correction. Our all-photonic ‘intercity’ QKD protocol bridges large gaps between the conventional intracity QKD networks and the future intercontinental quantum repeaters, conceptually and technologically.


In the conventional world, communication networks are connected to each other with backbone links. This way, a worldwide communication network such as the Internet is formed. Analogously, although recent field demonstrations for intracity quantum key distribution (QKD) networks hold promise for unconditionally secure communication with point-to-point links up to a 100 km (refs 1, 2), such intracity networks will be connected by a backbone quantum link to build a worldwide QKD network in the future. In principle, from its core role, such a backbone quantum link might use more demanding devices than the usual links in the intracity QKD network, for example, in contrast to the cost-effective last-mile service3,4. Quantum repeaters5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22 could be adopted as the backbone quantum link, given that the communication efficiency scales polynomially with the communication distance, compared with the exponential scaling of the conventional QKD links1,2. This polynomial scaling of quantum repeaters is necessary for intercontinental backbone quantum links. But, otherwise, quantum repeaters are overengineered from the following reasons: Major cities to be equipped with an intracity QKD network may be within a radius <1,000 km, and the polynomial scaling of quantum repeaters usually necessitates quantum memories5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20 or quantum error correction5,7,11,13,17,18,19,20,21—which is extremely challenging as it requires a huge number of qubits as well as many repeater nodes. Therefore, an intercity backbone quantum link—which would be more effective in connecting intracity QKD networks in different major cities than quantum repeaters—may be in greater demand than an intercontinental one based on quantum repeaters, to compose the future worldwide QKD network.

The main point of this paper is to present such an intercity QKD protocol using only a single untrusted intermediate node between communicators. The node uses only single-photon sources, linear optical elements, single-photon detectors, optical switches and active feedforward techniques, requiring neither quantum memories nor quantum error correction, in contrast to other known protocols5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24. This implies that our protocol also has the following distinct advantages for the implementation. First, the absence of memories implies that the repetition rate can be increased as high as one wants within those allowed by the assumed optical devices. Second, the absence of matter systems makes coherent frequency converters for photons (to strengthen the coupling to matter25 and to optical fibres26) unnecessary. Finally, our protocol could work at room temperature in principle, thanks to its all-photonic nature. Nonetheless, our scheme leads to a square root improvement in the secret key rate over conventional QKD schemes1,2,27. Moreover, our scheme could supersede even quantum repeater schemes6,10,14 with atomic ensembles for the communication distances below 800 km. From a fundamental viewpoint, our scheme highlights conceptual differences between an entanglement-based QKD scheme28,29 and its time-reversed version30,31,32—now called32 measurement-device-independent QKD (mdiQKD) for the sake of closing all the security loopholes of measurement devices—as well as between QKD protocols and quantum repeaters for providing entanglement.


Entanglement-based QKD and mdiQKD

Our protocol emerges from highlighting a difference between an entanglement-based QKD scheme28,29 and the mdiQKD scheme32. Let us start by considering this. The schemes assume a single untrusted node C in the middle of communicators Alice and Bob, separated over distance L (Fig. 1). Here node C shares optical channels with Alice and Bob, whose transmittance is described by with attenuation length latt. The transmittance is equal to the arrival probability of a single photon through the lossy channels. Those protocols could provide Alice and Bob with a pair of bits for the secret key only when both photons—exchanged between node C and Alice and between node C and Bob—survive the loss in the optical channels. Hence, the number of trials required on average to obtain a pair of bits for the secret key is in both of the protocols. In fact, all known QKD protocols—including prepare-and-measure QKD schemes1,2 whose final key rates G per pulse are now limited27 by the Takeoka–Guha–Wilde (TGW) bound because of the lack of intermediate nodes—share1,2 this scaling without quantum memories5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,23,24 or quantum error correction5,7,11,13,17,18,19,20,21. In contrast, our protocol improves the scaling from to only with the help of a single node without any of such demanding devices. The essence of our idea is to notice that the original scaling is caused by a fact that the pairings at node C for Bell pairs in the entanglement-based QKD scheme or for Bell measurements in the mdiQKD scheme (cf. Fig. 1) are predetermined independently of the occurrence of photon losses. In other words, to outperform the scaling, we need to make the pairings depend on the occurrences of photon losses. Interestingly, this is possible solely for the mdiQKD protocol, because it entangles photons after the transmission in contrast to the entanglement-based QKD scheme (cf. Fig. 1).

Figure 1: Entanglement-based QKD and mdiQKD.

T is the trial number. (a) In the entanglement-based QKD protocol, node C sends halves of Bell pairs (BP) to Alice and Bob who randomly perform Z-basis or X-basis measurement (M), respectively. (b) In the mdiQKD protocol, node C performs Bell measurements (BM) on photons that have been prepared randomly in one of the eigenstates of complementary observables and and sent simultaneously by Alice and Bob. These protocols are related by a simple time reversal32, requiring trials on average to obtain a pair of bits for the secret key.

Basic idea of our adaptive mdiQKD

To be precise, we introduce our protocol regarded as an mdiQKD scheme, where node C adaptively performs the Bell measurements only on surviving photons under losses (Fig. 2). This protocol proceeds as follows: (i) Alice and Bob send m optical pulses in single-photon states—each of which is randomly selected from the eigenstates of complementary observables and —to node C simultaneously, using multiplexing. (ii) On receiving the pulses, node C applies quantum non-demolition (QND) measurements to the pulses to confirm the arrival of the single photons over lossy channels. (iii) Then, successfully arriving photons from Alice are paired with ones from Bob via optical switches at node C. (iv) Node C then performs a Bell measurement on each of these pairs. (v) Node C then announces the pairings and the measurement outcomes of the Bell measurements. (vi) Finally, as bits for the secret key, Alice and Bob keep the eigenvalues corresponding to their sent eigenstates to which the Bell measurements have been successfully applied. The bits obtained in step (vi) will be processed with a manner similar to the data that are kept after the quantum communication phase of the original mdiQKD protocol32.

Figure 2: Basic idea of our mdiQKD protocol with an adaptive Bell measurement.

M is the pulse number. In this protocol, the node C first performs quantum non-demolition (QND) measurements to confirm the successful arrival of single photons, followed by optical switches (SW) to send the surviving photons to Bell measurement (BM) modules.

Let us consider the scaling of our protocol. When Alice’s and Bob’s pulses are perfectly in single-photon states, the transmittance ηL/2 of the channels affects only the probability of confirming the arrival of single photons via QND measurements in step (ii). Since this probability is proportional to, if the number m of multiplexing is larger than , one or more single photons arrive at node C from each of Alice and Bob with a high probability. Since the successful application of the Bell measurement to these single photons leads to a pair of bits for the secret key in step (vi), the communication resources such as required optical pulses and devices—which are proportional to the number m of the multiplexing—are in the order of . This is a square root improvement over conventional protocols1,2, which results from making the pairings for the Bell measurement depend on the successful arrival of single photons.

More precisely, our protocol has a direct impact on the asymptotic sifted-key generation rate , where is the average number of the sifted pairs for the number m of multiplexing. R is included in the final key rate formula G per pulse (normalized by the number of events of the same basis choice by Alice and Bob) as1

where h(x) is the binary entropy function defined by and eZ (eX) is the error rate for Alice’s and Bob’s choice of Z-basis (X-basis)—called the bit-error rate (the phase-error rate). R for our protocol is given by

for Alice’s and Bob's photon sources with efficiency ηs, QND measurements with success probability pQND and Bell measurements with success probability pBM (see Methods). As the rate of the original mdiQKD protocol is , our protocol necessitates, at least,

to outperform it in terms of R. Given that pBM contributes to independently of m (see Methods), the number of multiplexing should be to obtain R in the order of equation (2).

All-photonic implementation

To implement our protocol, we only need optical devices. The Bell measurement in step (iv) can be conducted just by using linear optical elements and single-photon detectors33, similarly to the original mdiQKD scheme32. A challenging technique in our protocol is the QND measurement in step (ii). Besides many schemes for the QND measurement involving matter qubits or matter quantum memories, fortunately, there are several all-photonic schemes for the QND measurement for single photons33. Here we focus on a simple example, that is, a QND measurement for a single photon34 based on quantum teleportation35. This scheme teleports the single-photon state of the incoming pulse to that of a half of a photonic Bell pair via the linear-optics-based Bell measurement, using the feature that the teleportation fails when the incoming pulse is in the vacuum state.

The protocol composed of steps (i)–(vi) is now implementable by using optical devices alone. However, the optical switch required in step (iii) may still be challenging because it should have the input modes in the order of (for one or a few output modes). In particular, a large-scale optical switch to route a single photon in one of the many input modes into a Bell measurement module in step (iv) may be much more difficult than the existing ones36,37,38 with a small number of input modes. For instance, although we can realize an m × 1 optical switch by concatenating 2 × 1 optical switches with transmittance ηsw in a knockout tournament manner with depth , the transmittance of the large-scale optical switch decreases as , which may thus be needed to be taken care of in this case. However, remarkably, it is also possible to perform our protocol without using such a large-scale optical switch, that is, by using only single-mode on/off switches, a passive Hadamard linear optical circuit and single-photon detectors.

To achieve our protocol without large-scale optical switches, steps (iii)–(v) can be replaced with the followings: (iii’) Then, a mode i (i=1, 2, …, m) with a successfully arriving photon from Alice and a mode j (j=m+1, m+2, …, 2m) with a successfully arriving photon from Bob are directly sent to the Hadamard linear optical circuit that acts on the 2m modes of node C as with an orthogonal 2m × 2m Hadamard matrix H=[hμν] and annihilation operators for the input (output) modes and their orthogonal polarizations H and V. Except for two modes i and j, all the optical modes are blocked off with the single-mode on/off switches. (iv’) Node C then measures all the 2m output modes of the Hadamard linear optical circuit with polarization discriminating photon counters, and, if a photon with polarization H is found in output mode k and a photon with polarization V is found in output mode l (k, l=1, 2, …, 2m), it regards this trial as successful application of a Bell measurement showing that input modes i and j have been in unnormalized Bell state . (v’) Node C then announces input modes i and j and output modes k and l.

In the modified protocol here, since the sifted-key generation rate R=Pm/m with success probability Pm of the protocol and error rates eX and eZ in the formula for the final key rate G per pulse are the functions of the number m of multiplexing, m should be chosen to maximize G, but gives the maximum of G. The property of the Hadamard matrix that all the elements are or would be needed to suit the phase-error estimation in the mdiQKD (ref. 32). In fact, thanks to this property, the sequence of (iii’)–(v’) essentially performs a Bell measurement to distinguish Bell states from the other states, and the phase-error estimation in the original mdiQKD protocol32 thus works even for our modified mdiQKD scheme in the same way. However, the Hadamard matrix exists only on restricted dimensional vector spaces, in contrast to a general Fourier transformation. For instance, it exists on 2s-dimensional vector spaces with s=1, 2, …. Hence, we use the Hadamard matrix on 2s-dimensional vector spaces with 2s=2m, based on Sylvester’s construction. The symmetry of this construction is indeed favourable for calculating the performance of the modified protocol, because the effects of non-unity quantum efficiency of single-photon detectors in step (iv’) can be regarded as losses in the input modes of the Hadamard linear optical circuit.

Performance of our all-photonic scheme

We now estimate the final key rate G for the original protocol with (iii)–(v) and the modified one with (iii’)–(v’), assuming the all-photonic QND measurement based on quantum teleportation for step (ii). Our protocol needs an active feedforward technique with an optical switch. Suppose that a single active feedforward can be completed within time τa, during which photons run in optical fibres, being subject to the corresponding loss. In addition, we assume single-photon sources with efficiency ηs that emit pulses with duration τs and single-photon detectors with quantum efficiency ηd and with dark count rate νd. For simplicity, despite the being of various schemes for single-photon sources39, since our protocol, in any case, necessitates the active feedforward technique, we assume a single-photon source36,37,40 based on multiplexing of heralded single-photon sources. In fact, this photon source holds40 promise for producing high-fidelity telecom single photons with the repetition rate of the slowest optical device at the expense of the use of (at least) one active feedforward, and it would be realizable just by using only a small amount of multiplexing41,42. Bell pairs for the all-photonic QND measurements in step (ii) can be generated in constant time τa with single-photon sources rather than a Bell-pair photon source, by paralleling a probabilistic procedure43 with the active feedforward technique. In practice, this kind of step-wise preparation of Bell pairs may be useful for suppressing the unnecessary multi-photon components, because such multi-photon components may just contribute to events to be discarded as failure (as this kind of phenomenon indeed occurs sometimes44). In addition, note that we need to use one active feedforward in step (iii) or (iii’).

Under these assumptions, the final key rates G are illustrated in Fig. 3 by assuming a collection of the state-of-art technologies36,40,45,46,47,48,49. Although the modified protocol merely uses the Hadamard matrix on 2s-dimensional vector spaces with 2s=2m, the key rates G labelled line (II) in Fig. 3 look like continuous for distance L, implying that the restricted choice of the Hadamard matrices is not a problem. Figure 3 shows that both of our original and modified protocols outperform the original mdiQKD protocol32 (the TGW bound27) for distances L larger than 100 km (200 km). These crossing distances are much smaller than those for quantum repeaters (for example, 500 km for protocols14 based on atomic ensembles). Moreover, the performance of both our protocols is seven orders of magnitude better than that of the original mdiQKD protocol for L=800 km. Since the assumed state-of-art technologies36,40,45,46,47,48,49—including the synchronization as seen in the experimental demonstrations50,51,52,53,54,55 of the original mdiQKD (ref. 32)—work with 15 MHz at least36, the key generation rate per second of our original protocol (the modified one) is then 1.7 kHz (0.69 kHz) for L=307 km, which is a couple orders of magnitude better than experimental demonstrations47,56 of QKD over the current record distance. More interestingly, the rate is 13 mHz (3.8 mHz) for L=800 km, which is the same order of (only one order of magnitude less than) that of the best quantum repeater scheme10 with atomic ensembles14. It is then clear that both of our schemes outperform the best quantum repeater scheme10 below 800 km, if all the optical components work with 1 GHz as predicted to be possible14,36,53,54. The cutoff distances of  km for both protocols in Fig. 3 are determined by the signal-to-noise ratio associated with the dark counting of the single-photon detectors. But the cutoff distances could be extended57 if we replace the prepare-and-measure scheme of Fig. 2 between Alice (Bob) and node C with an entanglement-based one by putting an additional node with Bell-pair sources in between them.

Figure 3: Secret key rates G per pulse versus distances L.

G is normalized by the number of events of the same basis choice by Alice and Bob. Here ηs=0.90 (refs 40, 45, 46), τs=100 ps (ref. 47), ηd=0.93 (ref. 48), νd=1 s−1 (refs 48, 49), τa=67 ns (ref. 36), latt=22 km and c=2.0 × 108 m s−1. Lines (I)–(IV) represent our original protocol with steps (iii)–(v), our modified protocol with steps (iii’)–(v’), the original mdiQKD protocol32 with the same single-photon sources and the TGW bound27 , respectively.


We have presented an adaptive mdiQKD scheme that can present a square root improvement over conventional QKD schemes1,2,27, superseding even quantum repeaters14 for intercity distances. The ‘adaptive’ Bell measurement performed by node C in our scheme is also useful for providing a square root improvement for any single-photon-based entanglement generation protocol, for example, entanglement generation schemes for quantum repeaters with atomic ensembles14. However, note that it is impossible for our protocol alone to serve as quantum repeaters blessing an exponential improvement. In fact, although we can use our protocols as the entanglement generation for Alice’s and Bob’s stationary qubits by starting from entangling their photons with their stationary qubits, they need to wait the arrival of the heralding signals from node C in step (v) or (v’) to identify the stationary qubits that have successfully been entangled, which is impossible without the memory function of their stationary qubits. This is an unbridgeable gap between our QKD protocol and quantum repeaters, and hence, for extremely long distances such as thousands of kilometres, quantum repeaters are needed. However, combined with all-photonic quantum repeaters21, our protocol certainly paves a seamless route towards the all-optical realization of a worldwide QKD network—which would be not only a certain milestone21 towards the all-photonic quantum computation43,58 but also an ultimate challenge for the all-optical approach59 in the field of conventional communication. Our protocol would also lead to unforeseeable attractive new twists—such as the realization of telescope arrays with much longer baselines than existing facilities60 without quantum repeaters, the understanding of the fundamental limit for intercity/intercontinental quantum communication beyond the TGW bound and the finding of more practical variants of our protocol (for example, based on the combination of the time multiplexing with ultrafast single-photon sources for reducing the number of the QND measurement modules and on the hybridization of moderate-size optical switches and Hadamard-circuit-based Bell measurements for decreasing the number of the required single-photon detectors).


Asymptotic sifted-key generation rate

The asymptotic sifted-key generation rate R of our protocol can be evaluated as follows. The probability pk|m with which node C finds the existence of k(≤m) single photons from Alice or Bob via QND measurements in step (ii) is

where Bk|m(p) is the binomial distribution with To make l pairs in step (iii), the node C should have found the existence of single photons ≥l from both of Alice and Bob in step (ii), which occurs with probability . Hence, the probability with which our protocol provides n pairs of bits for the sifted key in step (vi) is described as

The average number of sifted pairs is then

where gm is shown to be

by using lBl|m(p)=mpBl−1|m−1(p) for l>0 and Bk|m(p)=(1−p)Bk|m−1(p)+pBk−1|m−1(p) for 0<k<m. Since the maximum of Bl|m−1(p) over l goes to zero in the limit of m→∞, we have limm→∞ gm=0. Therefore, the asymptotic sifted-key generation rate is described by equation (2).

Additional information

How to cite this article: Azuma, K. et al. All-photonic intercity quantum key distribution. Nat. Commun. 6:10171 doi: 10.1038/ncomms10171 (2015).


  1. 1

    Scarani, V. et al. The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009).

    ADS  Article  Google Scholar 

  2. 2

    Lo, H.-K., Curty, M. & Tamaki, K. Secure quantum key distribution. Nat. Photon. 8, 595–604 (2014).

    CAS  ADS  Article  Google Scholar 

  3. 3

    Fröhlich, B. et al. A quantum access network. Nature 501, 69–72 (2013).

    ADS  Article  Google Scholar 

  4. 4

    Hughes, R. J. et al. Network-centric quantum communications with application to critical infrastructure protection, Preprint at

  5. 5

    Briegel, H. J., Dür, W., Cirac, J. I. & Zoller, P. Quantum repeaters: the role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932–5935 (1998).

    CAS  ADS  Article  Google Scholar 

  6. 6

    Duan, L.-M., Lukin, M. D., Cirac, J. I. & Zoller, P. Long-distance quantum communication with atomic ensembles and linear optics. Nature 414, 413–418 (2001).

    CAS  ADS  Article  Google Scholar 

  7. 7

    Kok, P., Williams, C. P. & Dowling, J. P. Construction of a quantum repeater with linear optics. Phys. Rev. A 68, 022301 (2003).

    ADS  Article  Google Scholar 

  8. 8

    Childress, L., Taylor, J. M., Sørensen, A. S. & Lukin, M. D. Fault-tolerant quantum communication based on solid-state photon emitters. Phys. Rev. Lett. 96, 070504 (2006).

    CAS  ADS  Article  Google Scholar 

  9. 9

    van Loock, P. et al. Hybrid quantum repeater using bright coherent light. Phys. Rev. Lett. 96, 240501 (2006).

    CAS  ADS  Article  Google Scholar 

  10. 10

    Simon, C. et al. Quantum repeaters with photon pair sources and multimode memories. Phys. Rev. Lett. 98, 190503 (2007).

    ADS  Article  Google Scholar 

  11. 11

    Jiang, L. et al. Quantum repeater with encoding. Phys. Rev. A 79, 032325 (2009).

    ADS  Article  Google Scholar 

  12. 12

    Azuma, K. et al. Optimal entanglement generation for efficient hybrid quantum repeaters. Phys. Rev. A 80, 060303 (2009).

    ADS  Article  Google Scholar 

  13. 13

    Munro, W. J., Harrison, K. A., Stephens, A. M., Devitt, S. J. & Nemoto, K. From quantum multiplexing to high-performance quantum networking. Nat. Photon. 4, 792–796 (2010).

    CAS  ADS  Article  Google Scholar 

  14. 14

    Sangouard, N., Simon, C., de Riedmatten, N. & Gisin, N. Quantum repeaters based on atomic ensembles and linear optics. Rev. Mod. Phys. 83, 33–80 (2011).

    ADS  Article  Google Scholar 

  15. 15

    Azuma, K., Takeda, H., Koashi, M. & Imoto, N. Quantum repeaters and computation by a single module: remote nondestructive parity measurement. Phys. Rev. A 85, 062309 (2012).

    ADS  Article  Google Scholar 

  16. 16

    Azuma, K. & Kato, G. Optimal entanglement manipulation via coherent-state transmission. Phys. Rev. A 85, 060303 (2012).

    ADS  Article  Google Scholar 

  17. 17

    Zwerger, M., Dür, W. & Briegel, H. J. Measurement-based quantum repeaters. Phys. Rev. A 85, 062326 (2012).

    ADS  Article  Google Scholar 

  18. 18

    Munro, W. J., Stephens, A. M., Devitt, S. J., Harrison, K. A. & Nemoto, K. Quantum communication without the necessity of quantum memories. Nat. Photon. 6, 777–781 (2012).

    CAS  ADS  Article  Google Scholar 

  19. 19

    Li, Y., Barrett, S. D., Stace, T. M. & Benjamin, S. C. Long range failure-tolerant entanglement distribution. New J. Phys. 15, 023012 (2013).

    ADS  Article  Google Scholar 

  20. 20

    Grudka, A. et al. Long-distance quantum communication over noisy networks without long-time quantum memory. Phys. Rev. A 90, 062311 (2014).

    ADS  Article  Google Scholar 

  21. 21

    Azuma, K., Tamaki, K. & Lo, H.-K. All-photonic quantum repeaters. Nat. Commun. 6, 6787 (2015).

    CAS  ADS  Article  Google Scholar 

  22. 22

    Munro, W. J., Azuma, K., Tamaki, K. & Nemoto, K. Inside quantum repeaters. IEEE J. Sel. Top. Quantum Electrons. 21, 6400813 (2015).

    Google Scholar 

  23. 23

    Abruzzo, S., Kampermann, H. & Bruß, D. Measurement-device-independent quantum key distribution with quantum memories. Phys. Rev. A 89, 012301 (2014).

    ADS  Article  Google Scholar 

  24. 24

    Panayi, C., Razavi, M., Ma, X. & Lütkenhaus, N. Memory-assisted measurement-device-independent quantum key distribution. New J. Phys. 16, 043005 (2014).

    ADS  Article  Google Scholar 

  25. 25

    Tanzilli, S. et al. A photonic quantum information interface. Nature 437, 116–120 (2005).

    CAS  ADS  Article  Google Scholar 

  26. 26

    Ikuta, R. et al. Wide-band quantum interface for visible-to-telecommunication wavelength conversion. Nat. Commun. 2, 537 (2011).

    Article  Google Scholar 

  27. 27

    Takeoka, M., Guha, S. & Wilde, M. M. Fundamental rate-loss tradeoff for optical quantum key distribution. Nat. Commun. 5, 5235 (2014).

    CAS  ADS  Article  Google Scholar 

  28. 28

    Ekert, A. K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991).

    CAS  ADS  MathSciNet  Article  Google Scholar 

  29. 29

    Bennett, C. H., Brassard, G. & Mermin, N. D. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68, 557–559 (1992).

    CAS  ADS  MathSciNet  Article  Google Scholar 

  30. 30

    Biham, E., Huttner, B. & Mor, T. Quantum cryptographic network based on quantum memories. Phys. Rev. A 54, 2651–2658 (1996).

    CAS  ADS  MathSciNet  Article  Google Scholar 

  31. 31

    Inamori, H. Security of practical time-reversed EPR quantum key distribution. Algorithmica 34, 340–365 (2002).

    MathSciNet  Article  Google Scholar 

  32. 32

    Lo, H.-K., Curty, M. & Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012).

    ADS  Article  Google Scholar 

  33. 33

    Kok, P. et al. Linear optical quantum computing with photonic qubits. Rev. Mod. Phys. 79, 135–174 (2007).

    CAS  ADS  Article  Google Scholar 

  34. 34

    Kok, P., Lee, H. & Dowling, J. P. Single-photon quantum-nondemolition detectors constructed with linear optics and projective measurements. Phys. Rev. A 66, 063814 (2002).

    ADS  Article  Google Scholar 

  35. 35

    Bennett, C. H. et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993).

    CAS  ADS  MathSciNet  Article  Google Scholar 

  36. 36

    Ma, X.-S., Zotter, S., Kofler, J., Jennewein, T. & Zeilinger, A. Experimental generation of single photons via active multiplexing. Phys. Rev. A 83, 043814 (2011).

    ADS  Article  Google Scholar 

  37. 37

    Collins, M. J. et al. Integrated spatial multiplexing of heralded single-photon sources. Nat. Commun. 4, 2582 (2013).

    CAS  Article  Google Scholar 

  38. 38

    Takesue, H. Entangling time-bin qubits with a switch. Phys. Rev. A 89, 062328 (2014).

    ADS  Article  Google Scholar 

  39. 39

    Eisaman, M. D., Fan, J., Migdall, A. & Polyakov, S. V. Invited review article: single-photon sources and detectors. Rev. Sci. Instrum. 82, 071101 (2011).

    CAS  ADS  Article  Google Scholar 

  40. 40

    Migdall, A. L., Branning, D. & Castelletto, S. Tailoring single-photon and multiphoton probabilities of a single-photon on-demand source. Phys. Rev. A 66, 053805 (2002).

    ADS  Article  Google Scholar 

  41. 41

    Christ, A. & Silberhorn, C. Limits on the deterministic creation of pure single-photon states using parametric down-conversion. Phys Rev. A 85, 023829 (2012).

    ADS  Article  Google Scholar 

  42. 42

    Bonneau, D., Mendoza, G. J., O’Brien, J. L. & Thompson, M. G. Effect of loss on multiplexed single-photon sources. New J. Phys. 17, 043057 (2015).

    ADS  Article  Google Scholar 

  43. 43

    Browne, D. E. & Rudolph, T. Resource-efficient linear optical quantum computation. Phys. Rev. Lett. 95, 010501 (2005).

    ADS  Article  Google Scholar 

  44. 44

    Zhao, B., Chen, Z. B., Chen, Y. A., Schmiedmayer, J. & Pan, J. W. Robust creation of entanglement between remote memory qubits. Phys. Rev. Lett. 98, 240502 (2007).

    ADS  Article  Google Scholar 

  45. 45

    Giustina, M. et al. Bell violation using entangled photons without the fair-sampling assumption. Nature 497, 227–230 (2013).

    CAS  ADS  Article  Google Scholar 

  46. 46

    Christensen, B. G. et al. Detection-loophole-free test of quantum nonlocality, and applications. Phys. Rev. Lett. 111, 130406 (2013).

    CAS  ADS  Article  Google Scholar 

  47. 47

    Shibata, H., Honjo, T. & Shimizu, K. Quantum key distribution over a 72 dB channel loss using ultralow dark count superconducting single-photon detectors. Opt. Lett. 39, 5078–5081 (2014).

    ADS  Article  Google Scholar 

  48. 48

    Marsili, F. et al. Detecting single infrared photons with 93% system efficiency. Nat. Photon. 7, 210–214 (2013).

    CAS  ADS  Article  Google Scholar 

  49. 49

    Shibata, H. et al. Single-photon detection using magnesium diboride superconducting nanowires. Appl. Phys. Lett. 97, 212504 (2010).

    ADS  Article  Google Scholar 

  50. 50

    Rubenok, A., Slater, J. A., Chan, P., Lucio-Martinez, I. & Tittel, W. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys. Rev. Lett. 111, 130501 (2013).

    CAS  ADS  Article  Google Scholar 

  51. 51

    Liu, Y. et al. Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111, 130502 (2013).

    ADS  Article  Google Scholar 

  52. 52

    Ferreira da Silva, T. et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits. Phys. Rev. A 88, 052303 (2013).

    ADS  Article  Google Scholar 

  53. 53

    Tang, Z. et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. Phys. Rev. Lett. 112, 190503 (2014).

    ADS  Article  Google Scholar 

  54. 54

    Tang, Y.-L. et al. Measurement-device-independent quantum key distribution over 200 km. Phys. Rev. Lett. 113, 190501 (2014).

    ADS  Article  Google Scholar 

  55. 55

    Tang, Y.-L. et al. Field test of measurement-device-independent quantum key distribution. IEEE J. Sel. Top. Quantum Electron. 21, 6600407 (2015).

    Google Scholar 

  56. 56

    Korzh, B. et al. Provably secure and practical quantum key distribution over 307 km of optical fibre. Nat. Photon. 9, 163–168 (2015).

    CAS  ADS  Article  Google Scholar 

  57. 57

    Jacobs, B. C., Pittman, T. B. & Franson, J. D. Quantum relays and noise suppression using linear optics. Phys. Rev. A 66, 052307 (2002).

    ADS  Article  Google Scholar 

  58. 58

    Knill, E., Laflamme, R. & Milburn, G. J. A scheme for efficient quantum computation with linear optics. Nature 409, 46–52 (2001).

    CAS  ADS  Article  Google Scholar 

  59. 59

    Shacham, A., Bergman, K. & Carloni, L. P. Photonic networks-on-chip for future generations of chip multiprocessors. IEEE Trans. Comput. 57, 1246–1260 (2008).

    MathSciNet  Article  Google Scholar 

  60. 60

    Gottesman, D., Jennewein, T. & Croke, S. Longer-baseline telescopes using quantum repeaters. Phys. Rev. Lett. 109, 070503 (2012).

    ADS  Article  Google Scholar 

Download references


We thank G. Kato, G. Knee, K. Matsumoto, F. Morikoshi, H. Takesue and A. Tomita, and especially M. Curty, H.-K. Lo and N. Lütkenhaus for valuable discussions. This research is in part supported by the Project UQCC by the National Institute of Information and Communications Technology.

Author information




K.A. conceived the first version of the main concepts for our protocols. Then, all the authors contributed to the refinement and generalization of the concept and its presentation of the present paper.

Corresponding author

Correspondence to Koji Azuma.

Ethics declarations

Competing interests

The authors declare no competing financial interests.

Rights and permissions

This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Azuma, K., Tamaki, K. & Munro, W. All-photonic intercity quantum key distribution. Nat Commun 6, 10171 (2015).

Download citation

Further reading


By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.


Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing