Abstract
Rapid progress has been made in quantum secure direct communication in recent years. For practical application, it is important to improve the performances, such as the secure information rate and the communication distance. In this paper, we report an elaborate physical system design and protocol with much enhanced performance. This design increased the secrecy capacity greatly by achieving an ultralow quantum bit error rate of <0.1%, one order of magnitude smaller than that of existing systems. Compared to previous systems, the proposed scheme uses photonic timebin and phase states, operating at 50 MHz of repetition rate, which can be easily upgraded to over 1 GHz using current ontheshelf technology. The results of our experimentation demonstrate that the proposed system can tolerate more channel loss, from 5.1 dB, which is about 28.3 km in fiber in the previous scheme, to 18.4 dB, which corresponds to fiber length of 102.2 km. Thus, the experiment shows that intercity quantum secure direct communication through fiber is feasible with presentday technology.
Similar content being viewed by others
Introduction
Confidentiality of message is essential in modern communication. Traditional secure communication is using encryption, based on the computational difficulty of certain mathematical problems such as factorization large integers^{1}. The rapid progress of quantum computing^{2,3,4} causes anxiety over the security of those traditional communication. Physical layer security based on information theory and coding is a unique way of achieving secure communications from a more fundamental level, using Wyner’s wiretap channel model^{5}. Quantum secure direct communication (QSDC) is capable of estimating the secrecy capacity of realistic quantum channels enabled by the principles of quantum physics. QSDC has attracted much attention, and has become one of the strongest candidates for secure communication in the future^{6}.
QSDC is different from quantum key distribution (QKD)^{7,8}, which negotiates a secure key using quantum technology. QSDC and QKD perform different tasks. QSDC securely and reliably transmits information through a quantum channel with both noise and eavesdropping. Compared to classical communication where reliable transmission of information over a noisy channel is concerned, QSDC has the additional capability to ensure its security using the properties of quantum information carriers^{9}. Since QSDC is a kind of communication, it is flexible to construct networks using techniques such as packet switching and so on. It has great potential for 6 G wireless communication as well^{6}.
The first QSDC protocol was proposed by Long and Liu in the new millennium^{10}. Since its foundation, many QSDC protocols have been proposed and experimentally demonstrated^{11,12,13,14,15,16,17,18,19,20}. Recently, remarkable progress has been made, and major obstacles in its practical application have been overcome. Quantitatively security analysis and coding scheme in highloss quantum channel have been proposed and experimentally demonstrated^{21}. In that work, Qi et al. conceived a coding scheme using concatenation of lowdensity paritycheck (LDPC) codes, pseudorandom sequences, and universal hashing families (UHF)^{22,23}. This QSDC system is based on the DL04 single photon protocol^{12} with phase states. It achieved an average secure information rate of 50 bps through 1.5 km fiber. Its recent update achieves 4 kbps through fiber^{24}. Meanwhile, Sun et al. proposed the idea of quantummemoryfree (QMF) protocol and designed the QMFDL04 QSDC^{12,25}. This QSDC system has dispensed of quantum memory, and significantly increased the secure information rate as well. Explicitly, it realized secure transmission at 3.2 bps through an 18 km fiber at a clockrate of 1 MHz. The system has already transmitted message over a meaningful distance, but there are still badly need for improvement in tolerable communication loss, for support of a higher clockrate and more effective coding scheme to approach the secrecy capacity.
Against this background, we proposed a QSDC system with a new physical system design and a new efficient coding scheme, and experimentally demonstrated the system. Specifically, the primary contributions of this work are: (1) We proposed a novel design of physical system with a new protocol. We use both photonic timebin and phase states, and choose the timebin states for eavesdropping detection and use the phase states for communicating the message. The system is free from phase and polarization drift, does not use the complicated active compensation subsystem. This enables an ultralow quantum bit error rate (QBER) and the longterm stability against environmental noises. The new optical design uses a twoway structure, and it allows the returned pulses to bypass the modulators, which supports high clockrate modulation up to 1 GHz, hence giving a high transmission rate; (2) We designed a QMF QSDC scheme using lowdensity BoseChaudhuriHocquenghem (LDBCH) codes^{26,27,28}; (3) We implemented the system and tested it with a clockrate of 50 MHz through fiber at different distance. The results show that the system can resist extremely great loss. In particular, the system can communicate at 22.4 kbps through about 30 km commercial fiber and 0.54 bps through 100 km ultralow loss fiber.
Results
The protocol
Similar to protocols in Refs. ^{12,21,25}, this protocol is based on nonorthogonal states. Specifically, the timebin states in Z: \(\{ 0\rangle ,1\rangle \}\) basis are used for eavesdropping detection and the phase states in X: \(\{  + \rangle ,  \rangle \}\) basis are used for message delivery. The protocol is illustrated in Fig. 1. The basic steps of the protocol are:

(1)
States Preparation: Bob prepares a sequence of timebin and phase states, \(\left 0 \right\rangle\), \(\left 1 \right\rangle\), \( + \rangle\), \(  \rangle\). States in Z basis, \(\left 0 \right\rangle\) and \(\left 1 \right\rangle\), represent the states passing through the short and long path of an asymmetric MachZehnder interferometer, respectively. States in X basis, \( + \rangle\) and \(  \rangle\), are superposition states of \(\left 0 \right\rangle\) and \(\left 1 \right\rangle\). The \(\left 0 \right\rangle\) and \(\left 1 \right\rangle\) states are prepared with probability \(p_z\), and the \( + \rangle\) and \(  \rangle\) states are prepared with probability \(p_x\), respectively. \(p_x + p_z = 1\). Then Bob sends the sequence of states to Alice over the quantum channel.

(2)
Eavesdropping Detection: After receiving the sequence of states, Alice randomly chooses some of them and measures those states in Z basis. Alice announces the result through the service channel. Bob compares the result with his preparations of the states in Z basis. Then Bob estimates the parameters of forward channel, such as QBER and loss, and tells the results to Alice through the service channel.

(3)
Encoding: According to the parameters of forward channel and the estimated parameters of the backwards channel from the previous frame, Alice encodes the message. We have conceived a variant of QMF scheme and corresponding encoding methods to dispense with quantum memory during the eavesdropping detection. Please refer to materials and methods section for more detail of encoding method.

(4)
Modulation: According to the encoded sequence, Alice operates those remain states with two unitary operations \({{{\mathbf{I}}}} = \left 0 \right\rangle \langle 0 + \left 1 \right\rangle \langle 1\) and \({{{\mathbf{\sigma }}}}_{{{\mathbf{Z}}}} = \left 0 \right\rangle \langle 0  \left 1 \right\rangle \langle 1\) corresponding to bits ‘0’ and ‘1’, respectively. Next, Alice sends the modulated states to Bob.

(5)
Demodulation: Bob measures the received states that he prepared in X basis. Bob can obtain the sequence of operations I and \(\sigma _Z\) corresponding to bits ‘0’ and ‘1’ by comparing the initial states and measurement results.

(6)
Decoding: Bob can decode the message successfully if the codes used in step 3 can completely remove the impact from QBER and loss. Then, Alice and Bob can repeat these steps again to transmit more information in the next frame. If Bob fails to decode the message, they can adjust the coding parameters to the appropriate. But when the channel is too noisy to convey information securely, they terminate the process. Please refer to materials and methods section for more detail of decoding method.
Security analysis
According to wiretap channel theory^{29,30,31}, the secrecy capacity \(C_s\) of the proposed protocol is
and the secure information rate \(R_s\) is
where \(I(A:B)\) and \(I(A:E)\) are the mutual information between Alice and Bob, and between Alice and Eve respectively, R represents the error correction rate.
Normally, the channel between Alice and Bob can be assumed as a cascaded channel consisting of a binary symmetric channel (BSC) and a binary erasure channel (BEC) concatenated in series^{21,25}. According to noisychannel coding theorem, \(I(A:B)\) cannot break Shannon limit,
where \(Q_{Bob}\) is the total gain at Bob, \(e_x\) is the QBER of received states in X basis, \(h(x) =  xlog_2x  (1  x)log_2(1  x)\). represents the binary Shannon entropy.
We consider the case of collective attack^{31,32}, where Eve attaches her ancillary state \(\left E \right\rangle\) to the state that Bob prepares and performs a unitary operation U. The initial state can be described as a density matrix \(\rho ^B\),
when Alice receives the states which has been disturbed by Eve, its density matrix becomes
After Alice encodes the state, it becomes
where \(\left 0 \right\rangle _A\) and \(\left 1 \right\rangle _A\) are classical bits ‘0’ and ‘1’ that Alice encodes, so that \(\rho _0^{BE} = I\rho ^{BE}I^ +\) and \(\rho _1^{BE} = \sigma _Z\rho ^{BE}\sigma _Z^ +\) represent the states carrying the bits ‘0’ and ‘1’, respectively. We assume the probability of encoding bits ‘0’ and ‘1’ is roughly equal. For a single photon, the mutual information between Eve and Alice’ classical bit is
where \(S(\rho )\) represent the von Neumann entropy. Using the Gram matrix method^{21,33,34}, we obtain
where \(e_z\) is the QBER of states in Z basis. Thus, we get \(I(A:E)\),
where \(Q^{Eve}\) is the is the maximum gain at which Eve can access the qubits. Similarly, we get,
where g represents the gap between \(Q^{Eve}\) and \(Q^{Bob}\).
System implementation
The experimental setup is shown in Fig. 2. Bob uses an asymmetric MachZehnder interferometer to split one pulse into two subpulses. The relative phases and intensity of subpulses are modulated by a phase modulator and an intensity modulator respectively. For the information carrier states \( + \rangle\) and \(  \rangle\), the birefringence drift is autocompensated by the twoway structure with a Faraday rotator. These subpulses are generated and demodulated accurately by the same asymmetric MachZehnder interferometer at Bob’s end. This plugandplay design also allows the returned pulses to bypass the modulators, which can support much higher clockrate over 1 GHz for modulation^{34}. For the states \(0\rangle\) and \(1\rangle\) for eavesdropping detection, the time of arrival at Alice’ end could be directly detected by a singlephoton detector. Thus, the whole system is robust for both polarization and phase without active feedback, and without a pair of matching interferometers, which greatly increases the reliability of the system with an ultralow QBER.
The experimental parameters and performances of the system are shown in Table 1 at typical distance of 30 km and 100 km. We adjusted the channel loss to 6 dB using 25.2 km fiber and attenuator, which represents 30 km commercial fiber. Then, we replaced them with a 100 km ultralow loss fiber to estimate the longest communication distance. For simplification and optimization, we consider the case of infinite length code. The transmittance at Alice’s end is \(\eta ^{Alice}\), and the efficiency of demodulation at Bob’s end is \(\eta ^{Bob}\).
Comparisons of secrecy capacity and secure information rate
Here, we compare the secrecy capacity and secure information rate of the proposed QSDC system with previous works^{21,25}, which is shown in Fig. 3. The red curve and blue curve are the evaluated secrecy capacity using the parameters at distance of 30 and 100 km, respectively. The red and blue dots are the secure information rate at distance of 30 and 100 km, respectively. The details of coding method will be described in materials and methods section.
Although this plugandplay design without active feedback eliminates the mismatching and phase drift of interferometer^{34}, the QBER, especially in X basis, becomes larger as the distance gets longer due to the Rayleigh backscattering. Since the system operates at a repetition rate of 50 MHz, the backscattering photons are evenly distributed over the entire time domain. Therefore, the use of dispersion compensating fiber at Bob’ end can reduce the count of backscattering photons, which realized our system to transmit the secure information over 100 km. We assume that the QBER with different channel loss is approximately between the QBER in the above two situations, so the actual secrecy capacity curve will be between the red curve and blue curve. Some fiber manufacturing processes, lower repetition rate or time division method can further reduce the impact of Rayleigh backscattering^{34}, which can make actual secrecy capacity approach the red line at long distance. From Fig. 3, it can be seen clearly that a huge improvement of performance of this work over the results in previous works^{21,25} is obtained. For a detailed comparison, some specific results are shown in Table 2. The secrecy capacity is much larger than the previous works under the same channel loss, especially in the high channel loss parts. Meanwhile, the maximum tolerable communication loss is improved from 5.1 to 18.4 dB, which is over 100 km when using low loss fiber of \(0.18\,dB/km\).
Discussion
In this work, a QMF QSDC with photonic timebin and phase quantum states is proposed. We designed a new physical system and constructed the QSDC protocol. The QBER and instability are improved to an ultralow level due to the intrinsic properties of the system. Then, a variant of QMF QSDC was constructed using the secure coding, it dispenses the use of quantum memory. Finally, we implemented the scheme, conducted tests at distance of 30 km and 100 km, and compared the results with previous works.
Consequently, this system has a much higher clockrate and maximum tolerable channel loss. Meanwhile, a new coding method using masking can further improve the performance of the system^{35}. We realized the highperformance QSDC system, which is promising for the use in future intercity communication.
Materials and methods
Coding method for quantummemoryfree QSDC
In this section, we introduce the QMF QSDC protocol used in our system. It is a variant of the QMFDL04 QSDC protocol, conforming to the general idea of QMF QSDC^{25}. The main difference is that the joint encryption and errorcontrol (JEEC) coding is replaced by the secure coding based on UHF^{21,22}. Meanwhile, the generalized LDPC code based on the Hadamard codes and repetition (GLHR) codes in QMFDL04 QSDC is replaced by the LDBCH concatenated with repetition (LDBCHR) codes to enhance the reliability of the communication. All the vectors in the rest of this paper are row vectors, unless stated otherwise.
Protocol structure
Figure 4 details how Alice sends the ith frame of message to Bob over the quantum channel with the aid of the classical service channel in our variant of QMF QSDC protocol.
The symbols’ definitions are introduced in the ascending order of the numbers beside them:

1.
\(k_i\) is the selected information length of the ith frame.

2.
\({{{\mathrm{M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\) is a \(k_i\)bit message, which will be encoded by the secure encoding module. \({{{\mathrm{K}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\) taken from the key pool is the key to encrypt \({{{\mathrm{M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\).

3.
\({{{\mathrm{Y}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\), one input of the preprocessing module, represents the ciphertext given by \({{{\mathrm{Y}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}} = {{{\mathrm{ M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}} \oplus {{{\mathrm{ K}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\). The other two inputs are a local random bit sequence \({{{\mathrm{R}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{l  k}}}}_{{{\mathrm{i}}}}}\) and a random bit sequence \(S_i^{l  1}\) shared over the service channel.

4.
\({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\) is the output of the preprocessing and an input of the LDBCHR (\(n_i\), l).

5.
\({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}}\) is the codeword to be modulated on qubits using the method in Section II.

6.
Qubits are transmitted to Bob through the quantum channel.

7.
\({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}\prime }\) is the received codeword and an input of LDBCHR decoding module.

8.
After the transmission of \({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}}\), Alice and Bob can obtain the \(I_i(A:B)\), \(I_i(A:E)\) and \(C_{s_i}\) of the ith frame. If the decoding of LDBCH code is correct, \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\) can further be used as an input of the distillation module and the UHF module.

9.
Alice and Bob can distill a same secret key \({{{\mathrm{P}}}}_{{{\mathrm{i}}}}\) from \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\) according to the results of eavesdropping detection and secrecy capacity calculation, also making use of UHF^{21,22}. \({{{\mathrm{P}}}}_{{{\mathrm{i}}}}\) is stored in a firstin firstout (FIFO) pool.
Work flow
The quantum processes of delivering \({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}}\) through the quantum channel and estimating \(I_i(A:E)\) are the same as those of the proposed scheme in results section. Here we only concentrate on the classical data stream. The details of the preprocessing, LDBCH encoding/decoding and UHF modules will be clarified in the following.
Note that \(I_i(A:E)\) cannot be acquired until the ith \({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}}\) has been transmitted. In fact, this is exactly why the previous QSDC protocols relied on quantum memory. Hence, if Alice wants to communicate the ith frame to Bob, she has to determine \(k_i\) and \(n_i\) first, which should satisfy following equations:
in which (\(I_i(A:B)\), \(I_i(A:E)\)) of the ith frame are predicted by those of the (\(i  1\))th frame. Equation (12) is for the communication reliability^{36}, while Eq. (11) is the requirement of security^{22,25}.
During the whole communication process, the system operates in two different states depending on whether there is enough secret key (no shorter than \(k_i\) in Eq. (11)) for the transmission of ith information frame:

Preparing State: There is insufficient key to encrypt \({{{\mathrm{M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\). Information source and preprocessing modules do not work. Meanwhile, \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\) is a random bit sequence produced by a random number generator^{37,38}. If Bob flawlessly receives the random \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\), from which Alice and Bob can distill a common key \({{{\mathrm{P}}}}_{{{\mathrm{i}}}}\) whose length is \(n_i \cdot [R_i  I_i(A:E)]\), where \(R_i = l/n_i\). Otherwise, if Bob fails decoding the codeword, Alice have to send another random bit sequence. The workflow of this state is summarized as follows:

1.
Alice generates a sequence of random bits \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\).

2.
\({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\) is encoded to \({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}}\) by the LDBCHR encoder, where \(n_i\) satisfies Eq. (12).

3.
Alice sends \({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}}\) to Bob.

4.
Bob receives \({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}\prime }\) from the quantum channel.

5.
If the decoding of \({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}\prime }\) is incorrect, return to step 2. If not, Alice and Bob distill \({{{\mathrm{P}}}}_{{{\mathrm{i}}}}\) from \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\) according to \(R_i = l/n_i\) and \(I_i(A:E)\).
Loop through above 5 steps until the key is long enough to encrypt \({{{\mathrm{M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\) and change to the communication state.

Communication state: The system has enough key to encrypt \({{{\mathrm{M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\): All modules works. If \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\) is successfully recovered by the LDBCHR encoder, Bob can get the message \({{{\mathrm{M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\) included in the ith frame. Alice and Bob can also distill a common \({{{\mathrm{P}}}}_{{{\mathrm{i}}}}\) from \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\). Or else, if the decoding fails, Alice has to retransmit the corresponding message by a new key from the pool. Similarly, the workflow of this state is summarized as follows:

1.
Information source outputs a message \({{{\mathrm{M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\), whose length \(k_i\) satisfies Eq. (11).

2.
XOR module encrypts \({{{\mathrm{M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\): \({{{\mathrm{Y}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}} = {{{\mathrm{ M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}} \oplus {{{\mathrm{ K}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\), where \({{{\mathrm{K}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\) is from the key pool.

3.
Preprocessing: \(\left( {{{{\mathrm{Y}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}{{{\mathrm{,S}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{1}}}}}{{{\mathrm{,R}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{k}}}}_{{{\mathrm{i}}}}}} \right)\mathop{\longrightarrow}\limits^{{f^{  1}}}{{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\), where we denote the preprocessing process as \(f^{  1}\).

4.
Encode \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\) to get the codeword \({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}}\).

5.
Modulate \({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}}\) onto the qubits.

6.
Alice sends the modulated qubits to Bob. Bob demodulates them and receives \({{{\mathrm{C}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{i}}}}\prime }\).

7.
The LDBCHR decoder try to recover \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\). If it succeeds, continue to the next step. In case of a failure, return to step 2.

8.
Universal hashing: \(({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}{{{\mathrm{,S}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{l  1}}}}})\mathop{\longrightarrow}\limits^{f}{{{\mathrm{Y}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\), where f represents the universal hashing process. Meanwhile, Alice and Bob distill a key \({{{\mathrm{P}}}}_{{{\mathrm{i}}}}\) from \({{{\mathrm{X}}}}_{{{\mathrm{i}}}}^{{{\mathrm{l}}}}\).

9.
Bob uses \({{{\mathrm{K}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\)to decrypt \({{{\mathrm{Y}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\): \({{{\mathrm{M}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}} = {{{\mathrm{ Y}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}} \oplus {{{\mathrm{ K}}}}_{{{\mathrm{i}}}}^{{{{\mathrm{k}}}}_{{{\mathrm{i}}}}}\). Meanwhile, Alice and Bob put \({{{\mathrm{P}}}}_{{{\mathrm{i}}}}\) into the pool for later use.
Loop through these steps until the key is insufficient or all messages have been successfully transmitted. Then, the system changes to the preparing state or finish the communication process, respectively.
Secure coding scheme
Figure 5 represents the structure of the secure coding scheme. The XOR module perform the bitbybit exclusive or operations. The details of other modules are as follows. Note that the subscript i is omitted in the following of this part.

Preprocessing, \(({{{\mathrm{Y}}}}^{{{\mathrm{k}}}}{{{\mathrm{,S}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{1}}}}}{{{\mathrm{,R}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{k}}}}})\mathop{\longrightarrow}\limits^{{f^{  1}}}{{{\mathrm{X}}}}^{{{\mathrm{l}}}}.{{{\mathrm{Y}}}}^{{{\mathrm{k}}}}\) is the input encrypted bit sequence. \({{{\mathrm{S}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{1}}}}} = (s_1,s_2, \cdots ,s_{l  1})\) is a shared random bit sequence, which is used to construct the Toeplitz matrix \({{{\mathbf{T}}}}^{(l  k) \times k}\):
$${{{\mathbf{T}}}}^{(l  k) \times k} = \left[ {\begin{array}{*{20}{c}} {s_{l  k}} & {s_{l  k + 1}} & \cdots & {s_{l  1}} \\ {s_{l  k  1}} & {s_{l  k}} & \cdots & {s_{l  2}} \\ \vdots & \vdots & \ddots & \vdots \\ {s_1} & {s_2} & \cdots & {s_k} \end{array}} \right]$$(13)Another input \({{{\mathrm{R}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{k}}}}} = (r_1,\;r_2, \cdots ,\;r_{l  k})\) is a local random bit sequence. Then, the output \({{{\mathrm{X}}}}^{{{\mathrm{l}}}}\) of preprocessing is \({{{\mathrm{X}}}}^{{{\mathrm{l}}}} = \left[ {{{{\mathrm{R}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{k}}}}}{{{\mathrm{,}}}}\;{{{\mathrm{Y}}}}^{{{\mathrm{k}}}}  {{{\mathrm{R}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{k}}}}}{{{\mathbf{T}}}}^{(l  k) \times k}} \right]\).

UHF, \(({{{\mathrm{X}}}}^{{{\mathrm{l}}}}{{{\mathrm{,S}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{1}}}}})\mathop{\longrightarrow}\limits^{f}{{{\mathrm{Y}}}}^{{{\mathrm{k}}}}\) The UHF module of Bob also uses \({{{\mathbf{T}}}}^{(l  k) \times k}\) to recover the \({{{\mathrm{Y}}}}^{{{\mathrm{k}}}}\):
$${{{\mathrm{X}}}}^{{{\mathrm{l}}}}\left[ {\begin{array}{*{20}{c}} {{{{\mathbf{T}}}}^{(l  k) \times k}} \\ {{{{\mathbf{I}}}}^{k \times k}} \end{array}} \right] = \left[ {{{{\mathrm{R}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{k}}}}}{{{\mathrm{,Y}}}}^{{{\mathrm{k}}}}  {{{\mathrm{R}}}}^{{{{\mathrm{l}}}}  {{{\mathrm{k}}}}}{{{\mathbf{T}}}}^{(l  k) \times k}} \right]\left[ {\begin{array}{*{20}{c}} {{{{\mathbf{T}}}}^{(l  k) \times k}} \\ {{{{\mathbf{I}}}}^{k \times k}} \end{array}} \right] = {{{\mathrm{Y}}}}^{{{\mathrm{k}}}}$$(14) 
LDBCHR codes, LDBCHR is a kind of cascaded codes based on LDBCH^{26,28} and repetition codes. The encoding and decoding procedures are as follows.
The input \({{{\mathrm{X}}}}^{{{\mathrm{l}}}}\) is first encoded by a \((n_1,l)\) LDBCH encoder^{25,27}. Denote the output as \({{{\mathrm{C}}}}_{{{\mathrm{L}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{1}}}}} = (c_{L,1},c_{L,2}, \cdots ,c_{L,n_1})\). Then, map \(c_{L,i}\;(i = 1,2, \cdots ,n_1)\) to a codeword of the \((n/n_1,1)\) repetition code, \({{{\mathrm{C}}}}_{{{{\mathrm{R,i}}}}}^{{{{\mathrm{n/n}}}}_{{{\mathrm{1}}}}} = (\underbrace {c_{L,i},c_{L,i}, \cdots ,c_{L,i}}_{n/n_1{{{\mathrm{times}}}}})\). Hence, we get the codeword \({{{\mathrm{C}}}}^{{{\mathrm{n}}}} = \left( {{{{\mathrm{C}}}}_{{{{\mathrm{R,1}}}}}^{{{{\mathrm{n/n}}}}_{{{\mathrm{1}}}}}{{{\mathrm{,C}}}}_{{{{\mathrm{R,2}}}}}^{{{{\mathrm{n/n}}}}_{{{\mathrm{1}}}}}{{{\mathrm{,}}}} \cdots {{{\mathrm{,C}}}}_{{{{\mathrm{R,n}}}}_{{{\mathrm{1}}}}}^{{{{\mathrm{n/n}}}}_{{{\mathrm{1}}}}}} \right)\) of a \((n,l)\) LDBCHR code.
As for decoding, Bob first calculates the loglikelihood ratio (LLR) sequence \({{{\mathrm{U}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{1}}}}}{{{\mathrm{ = }}}}(u_1,u_2, \cdots ,u_{n_1})\) of the received \(\widehat {{{{\mathrm{C}}}}_{{{\mathrm{L}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{1}}}}}}\). Then, input \({{{\mathrm{U}}}}^{{{{\mathrm{n}}}}_{{{\mathrm{1}}}}}\) to the decoding algorithm of LDBCH codes^{25} and Bob can recover \({{{\mathrm{X}}}}^{{{\mathrm{l}}}}\) if the decoding is correct.
Error rate performance
This evaluation compares the error rate performances of the LDBCHR codes and the GLHR codes over the cascaded BSCBEC channel whose error rate of BSC is set to \(e_x = 0.01\) (the same as ref. ^{25}). All the code parameters of the GLHR codes are also consistent with that in ref. ^{39}. A (4000, 2000) random Mackay LDPC code with column weight 3 and row weight 6 and the Hadamard code of order 4 are used for constructing the GLHR codes. We designed the LDBCHR codes with similar parameters. Specifically, the original LDPC for LDBCHR is a (4000, 2000) code generated by the mixed progressive edge growth  approximate cycle extrinsic message degree (PEGACE) algorithm^{40}, whose node perspective degree distributions of variable nodes (VNs) and variable nodes (CNs) are
where the maximal degrees of VNs and CNs are 6 and 7, respectively. Moreover, the (15, 5) and (31, 6) BCH code constraints are used to replace the single parity check constraints of the degree 6 CNs and degree 7 CNs, respectively^{28}. The repeating times of LDBCHR and GLHR codes in Fig. 6a both are 61 while those in Fig. 6b both are 131. The overall coding rates are \(R = 0.00135\) and \(R = 0.00063\). We set the maximum number of iterations \(I_{max} = 30\) for both the GLHR decoder and the LDBCHR decoder. As demonstrated in Fig. 6a, b, the LDBCHR designed in this work outperform GLHR codes in work^{24} on the aspects of error rate performances. Specifically, the required receiving rates of LDBCHR are about 8% lower than that of GLHR for the bit error rate after decoding around 10^{−5}.
References
Rivest, R. L., Shamir, A. & Adleman, L. A method for obtaining digital signatures and publickey cryptosystems. Commun. ACM 21, 120–126 (1978).
Shor, PW. Algorithms for quantum computation: discrete logarithms and factoring. In Proc. 35th Annual Symposium on Foundations of Computer Science 124–134 (IEEE, Santa Fe, 1994).
Long, G. L. Grover algorithm with zero theoretical failure rate. Phys. Rev. A 64, 022307 (2001).
Arute, F. et al. Quantum supremacy using a programmable superconducting processor. Nature 574, 505–510 (2019).
Wyner, A. D. The wiretap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975).
You, X. H. et al. Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci. China Inf. Sci. 64, 110301 (2021).
Bennett, C. H. & Brassard, G. Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7–11 (2014).
Kwek, L. C. et al. Chipbased quantum key distribution. AAPPS Bulletin 31, 15 (2021).
Pan, D. et al. Singlephotonmemory twostep quantum secure direct communication relying on EinsteinPodolskyRosen pairs. IEEE Access 8, 121146–121161 (2020).
Long, G. L. & Liu, X. S. Theoretically efficient highcapacity quantumkeydistribution scheme. Phys. Rev. A 65, 032302 (2002).
Deng, F. G., Long, G. L. & Liu, X. S. Twostep quantum direct communication protocol using the EinsteinPodolskyRosen pair block. Phys. Rev. A 68, 042317 (2003).
Deng, F. G. & Long, G. L. Secure direct communication with a quantum onetime pad. Phys. Rev. A 69, 052319 (2004).
Hu, J. Y. et al. Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5, e16144 (2016).
Niu, P. H. et al. Measurementdeviceindependent quantum communication without encryption. Sci. Bull. 63, 1345–1350 (2018).
Wang, C., Deng, F. G. & Long, G. L. Multistep quantum secure direct communication using multiparticle Green–Horne–Zeilinger state. Opt. Commun. 253, 15–20 (2005).
Wang, C. et al. Quantum secure direct communication with highdimension quantum superdense coding. Phys. Rev. A 71, 044305 (2005).
Zhou, Z. R. et al. Measurementdeviceindependent quantum secure direct communication. Sci. China: Phys. Mech. Astron. 63, 230362 (2020).
Wang, X. F. et al. Transmission of photonic polarization states from geosynchronous earth orbit satellite to the ground. Quantum Engineering 3, e73 (2021).
Qi, Z. T. et al. A 15user quantum secure direct communication network. Light Sci. Appl. 10, 183 (2021).
Pan, D. et al. Experimental freespace quantum secure direct communication and its security analysis. Photonics Res. 8, 1522–1531 (2020).
Qi, R. Y. et al. Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 8, 22 (2019).
Tyagi, H. & Vardy, A. Universal hashing for informationtheoretic security. Proc. IEEE 103, 1781–1795 (2015).
Carter, J. L. & Wegman, M. N. Universal classes of hash functions. J. Comput. Syst. Sci. 18, 143–154 (1979).
Wang, C. Quantum secure direct communication: intersection of communication and cryptography. Fundam. Res. 1, 91–92 (2021).
Sun, Z. et al. Toward practical quantum secure direct communication: a quantummemoryfree protocol and code design. IEEE T. Commun. 68, 5778–5792 (2020).
Li, Q. et al. Generalized lowdensity paritycheck coding scheme with partialband jamming. Tsinghua Sci. Technol. 19, 203–210 (2014).
Wang, P. et al. Spatially coupled LDPCBCH codes in quantum secure direct communications. Tsinghua Sci. Technol. 59, 737–742 (2019).
Sun, Z. et al. Design of LDBCH codes for ultra reliable low latency communications. IEEE Commun. Lett. 25, 2800–2804 (2021).
Devetak, I. The private classical capacity and quantum capacity of a quantum channel. IEEE Trans. Inf. Theory 51, 44–55 (2005).
Cai, N., Winter, A. & Yeung, R. W. Quantum privacy and quantum wiretap channels. Probl. Inf. Transm. 40, 318–336 (2004).
Wu, JW, Long, GL & Hayashi, M. Quantum secure direct communication with private dense coding using general preshared quantum state. arXiv https://arxiv.org/abs/2112.15113 (2022).
Wu, J. W. et al. Security of quantum secure direct communication based on Wyner’s wiretap channel theory. Quantum Engineering 1, e26 (2019).
Henao, C. I. & Serra, R. M. Practical security analysis of twoway quantumkeydistribution protocols based on nonorthogonal states. Phys. Rev. A 92, 052317 (2015).
Qi, R. Y. et al. Loopholefree plugandplay quantum key distribution. New J. Phys. 23, 063058 (2021).
Long, G. L. & Zhang, H. R. Drastic increase of channel capacity in quantum secure direct communication using masking. Sci. Bull. 66, 1267–1269 (2021).
Shannon, C. E. A mathematical theory of communication. The Bell Syst. Tech. J. 27, 379–423 (1948).
Zhou, Q. et al. Practical quantum randomnumber generation based on sampling vacuum fluctuations. Quantum Engineering 1, e8 (2019).
Zhou, H. H. et al. Quantum randomnumber generator based on tunneling effects in a Si diode. Phys. Rev. Appl. 11, 034060 (2019).
MacKay, D. J. C. Good errorcorrecting codes based on very sparse matrices. IEEE Trans. Inf. Theory 45, 399–431 (1999).
Xiao, H. & Banihashemi, A. H. Improved progressiveedgegrowth (PEG) construction of irregular LDPC codes. IEEE Commun. Lett. 8, 715–717 (2004).
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (Grant Nos. 62025110, 61871257, 11974205 and 11474181), in part by the NSAF (Grant No. U1530117), in part by the National Key R&D Program of China (Grant No. 2017YFA0303700), in part by the National Basic Research Program of China (Grant No. 2015CB921001), in part by the KeyArea Research and Development Program of Guangdong province (2018B030325002), in part by the Tsinghua University Initiative Scientific Research Program and in part by the Beijing Innovation Center for Future Chips(ICFC).
Author information
Authors and Affiliations
Contributions
H.Z. and Z.S. performed the experiment and coding, and analyzed the data. H.Z. and R.Q. developed ideas for both implementing methods and which physics to study. L.Y., G.L.L. and J.L. supervised all work, as well as contributed to deciding the experiment scheme and processing the data, and setting up the physical models. All authors discussed the results and contributed to the manuscript.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Zhang, H., Sun, Z., Qi, R. et al. Realization of quantum secure direct communication over 100 km fiber with timebin and phase quantum states. Light Sci Appl 11, 83 (2022). https://doi.org/10.1038/s4137702200769w
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1038/s4137702200769w
This article is cited by

Highdimensional single photon based quantum secure direct communication using time and phase mode degrees
Scientific Reports (2024)

Semideviceindependent quantum random number generator with a broadband squeezed state of light
npj Quantum Information (2024)

NOONstate interference in the frequency domain
Light: Science & Applications (2024)

Quantum secure direct communication with hybrid entanglement
Frontiers of Physics (2024)

Noiseless linear amplification of polarizationencoded quantum states with efficient quantum scissors
Quantum Information Processing (2024)