Abstract
The development of quantum networks will be paramount towards practical and secure telecommunications. These networks will need to sign and distribute information between many parties with informationtheoretic security, requiring both quantum digital signatures (QDS) and quantum key distribution (QKD). Here, we introduce and experimentally realise a quantum network architecture, where the nodes are fully connected using a minimum amount of physical links. The central node of the network can act either as a totally untrusted relay, connecting the end users via the recently introduced measurementdeviceindependent (MDI)QKD, or as a trusted recipient directly communicating with the end users via QKD. Using this network, we perform a proofofprinciple demonstration of QDS mediated by MDIQKD. For that, we devised an efficient protocol to distil multiple signatures from the same block of data, thus reducing the statistical fluctuations in the sample and greatly enhancing the final QDS rate in the finitesize scenario.
Introduction
Cryptography is ubiquitous in modern society and essential to countless applications relying on the confidentiality, integrity and nonrepudiation of sensible data^{1}. Currently, the security of these applications is largely based on publickey cryptography^{2, 3}, which is supposedly secure against an eavesdropper with limited computational power. Quantum key distribution (QKD), on the other hand, poses no restrictions on the attacker, apart from obeying the laws of nature, and one only makes assumptions on the devices owned by the authorised users, which can be directly tested^{4}. In addition, the recent introduction of measurement device independent (MDI)QKD^{5, 6} further enhances the positive features of QKD. By clever use of the teleportation gate^{7}, MDIQKD turns the receiving side of QKD into a transmitter, thus removing all the security assumptions on the detecting devices, which are arguably most exposed to external attacks^{8,9,10,11,12}. Moreover, it allows two parties to connect through a totally untrusted node, which is particularly important in a network configuration^{13}. Recent experiments have shown that it can be implemented with key rates commensurate to those of QKD^{14}, while extending its transmission distance^{15}.
Different from encryption, digital signatures play a vital role in software distribution, modern communication and financial transactions, where the integrity of the data against forgery is of utmost importance. While they are currently implemented using publickey cryptography, quantum digital signatures (QDS) have recently been introduced^{16,17,18} to allow users to sign a document by quantum means and transfer it to other users with informationtheoretical security. Quantum signatures were introduced in ref. ^{16}, but that scheme was impractical as it required the use of a quantum memory. Recent developments have removed this limitation^{17, 18} and made the QDS techniques closer to those employed in QKD^{19} and MDIQKD^{20}. The resulting schemes, however, have limitations. The one in ref. ^{19} needs essentially one QKD link for each pair of users taking part in the distribution of QDS. In a network with N users, this would amount to N(N − 1)/2 direct physical links, an impractically high number for a large number of users. In the configuration described in ref. ^{20}, on the other hand, a central node connects pairs of users via MDIQKD, but cannot directly communicate with them. So a simple yet crucial operation like a digitally signed firmware update from the central node to the end users would be impossible with this scheme.
Here, we propose and experimentally realise a quantum network concept to overcome all of the above limitations. The network can connect three users by means of only two optical links, entailing a favourable scaling of N − 1 links for an Nnode network. This is achieved by configuring the central node as an entirely untrusted relay that connects the end users via MDIQKD. However, the central node can also be reconfigured so to act as a trusted recipient and communicate directly and securely with the end users via QKD. Because the network is fully connected, we could use it to distil quantum encryption keys and quantum digital signatures between all pairs of users. In particular, this allows us to extract the first QDS rates mediated by MDIQKD. Using newly adapted finitesize distillation protocols (all details are given in Supplementary Note 1), we obtain key rates around 10^{4} bits per second (bps) for MDIQKD on a 50km optical fibre and 10^{6} bps for QKD on a 25km optical fibre, as well as an MDIQKDmediated QDS rate of 1 signed bit every 45 s and a QKDmediated QDS rate of 1 signed bit every 72 ms. This performance would enable highspeed applications in future quantum networks.
Results
System schematics
The schematics of the network are shown in Fig. 1. Two distant users, Alice and Bob, are connected through a central node, Charlie, who normally acts as an untrusted relay between the users. In this case, the confidentiality of the communication between Alice and Bob is guaranteed by the fact that they use the two intensity modulators (IM) to run the decoystate^{21,22,23,24} MDIQKD protocol^{6}. The resulting key will then be unknown to Charlie and to any external eavesdropper, and secure against attacks directed at Charlie’s equipment. To let Alice and Bob communicate directly with Charlie, pointtopoint QKD links can be activated, as explained shortly. If the users’ devices are trusted, the transmission in the QKD modality will feature quantum security against external eavesdroppers and will be fast, with megabits of key material distributed every second. In the scheme in Fig. 1, a QKD transmission between Alice (Bob) and Charlie is enabled by stopping the light emitted by Bob (Alice) through the same IMs employed for the decoystate MDIQKD protocol. Hence, the IMs are key components in the setup, allowing switching between QKD and MDIQKD and, simultaneously, the implementation of the decoystate technique. The possibility to switch between QKD and MDIQKD constitutes a “reconfigurable MDI/QKD network”, a concept similar to the one introduced in ref. ^{25} for freespace quantum communications.
Experimental setup
To implement the network in Fig. 1, we adopt a polarisationbased setup. We denote by H, V, D and A the horizontal, vertical, diagonal and antidiagonal states of linear polarisation, respectively, and with Z and X the rectilinear and diagonal bases, composed of the states {H, V} and {D, A}, respectively. The setup makes use of the decoystate technique to improve the key rate and extend the transmission distance. Therefore, the preparation step also includes the selection of the intensity of the pulses to be sent to Charlie. In this case, we adopt the scheme with four intensity classes^{14, 26}, indicated as s (“signal”), u (“decoy1”), v (“decoy2”) and w (“vacuum”). The signal s is the only one prepared in the Z basis, whereas u, v and w are all prepared in the X basis. The quantum keys and signatures are extracted from the s pulses in the Z basis, whereas the X basis is for testing the quantum channel against the presence of an eavesdropper. To increase the final key rate, the basis Z is selected more often than X.
The preparation of the pulses in the experimental setup is effected through the transmitter depicted in Fig. 2. Alice and Bob create lowjitter 32ps light pulses at 1549.8 nm using the pulsed laser seeding technique^{14}. The master laser is input to the slave via a circulator and the AC voltage is temporally offset between the two lasers to ensure injection occurs at the correct time. The 1GHz gain switching of both lasers ensures that all pulses are phase randomised^{27, 28}. Alice and Bob’s pulses are then passed through separate 30 GHz bandwidth filters to remove noise. The polarisation of the pulses is controlled using electric polarisation controllers, which can create all of the required polarisation states. An attenuator provides the four photon fluxes (s, u, v, w) before they are sent to Charlie.
Charlie is composed of the interfering beam splitter (BS), two polarising BS (PBS) aligned along the Z axis, one polarisation rotator (R) and four InGaAs selfdifferencing avalanche photodiodes, run at room temperature, clocked at 1 GHz and featuring an average efficiency of 20.9%. The rotator R placed after one output port of Charlie’s BS turns a Zbasis analyser into an Xbasis analyser. This is important for enabling reconfigurable MDI/QKD as it allows the realisation of a full QKD receiver, measuring the incoming pulses in two complementary bases. On the other hand, all the coincidence counts from detectors H and V can be treated as in the original MDIQKD scheme, whereas coincidence counts from detectors on different output ports of Charlie’s BS cannot be used to distil key bits, as they belong to different bases. A coincidence count between H and V indicates projection onto the triplet Bell state \(\left {{\psi ^ + }} \right\rangle = 1{\rm{/}}\sqrt 2 \left( {\left {HV} \right\rangle + \left {VH} \right\rangle } \right) = 1{\rm{/}}\sqrt 2 \left( {\left {DD} \right\rangle  \left {AA} \right\rangle } \right)\). In this case, Bob flips (does not flip) his bit to match Alice’s bit if the rectilinear (diagonal) basis was used in the preparation step. The same argument applies to the Xbasis branch, by replacing H with D and V with A. Alice, Bob and Charlie share a common reference clock, allowing Alice and Bob to align their pulses, so to arrive coincidentally at Charlie, and allowing Charlie to align his detectors.
To effect the selection between MDIQKD and QKD, Alice and Bob act on their IMs to send or stop the light directed to Charlie. In particular, when Alice (Bob) prepares the vacuum state w, the amount of light travelling towards Charlie is so small that the situation is virtually identical to having the AC (BC) link disconnected and QKD enabled on the BC (AC) link. Any potential residual light in the vacuum state does not affect the security of the scheme, as it directly translates into an increase of the measured quantum bit error rate (QBER). Also, if there are multiple counts in Charlie’s detectors during the QKD sessions, they can be treated using the squashing model for the passive BB84 protocol^{29, 30}. Finally, in some cases, neither Alice nor Bob will prepare a vacuum state, whereas in other cases they both will. Such instances can be employed to enable an MDIQKD communication (see details in Supplementary Note 1).
Key rates for encryption
Using the described setup, we run QKD and MDIQKD experiments, deriving key rates vs. distance, as depicted in Fig. 3. We performed two sets of experiments. In the first, we used variable optical attenuators to simulate a lossy channel with 0.2 dB/km, as in a typical optical fibre at 1550 nm. In the second, we used two 25km reels of a standard optical fibre. The circles (squares) are for the attenuatorbased MDIQKD link (QKD links), whereas the stars represent the points obtained using a real fibre. Finally, the solid lines are theoretical simulations tailored to our experimental setup. Tables containing all the measured counts are reported in Supplementary Tables.
From Fig. 3, it is apparent that the theory reproduces the experimental results well, both for attenuators and real fibre, with only a slightly lower experimental rate for the fibre due to a correspondingly higher QBER. This allowed us to use a simulation to optimise the system before performing real experiments. The key rates for MDIQKD are between 606 bps for an equivalent distance of 90 km and 134 kbps for 0 km. QKD is faster, providing key rates ranging from about 0.5 Mbps at 45 km to almost 5 Mbps at 0 km. This difference in the key rates led us to set the probability of an MDIQKD run equal to 500 times that of a QKD run. In a network with three users, this would provide comparable key rates for all users, on average, over all distances. Before performing the experiment, the setup was optimised for MDIQKD. Then, key rates were acquired for both MDIQKD and QKD without additional calibrations.
Key rates in Fig. 3 were calculated using composable security proofs in the finitesize scenario^{31, 32} with a procedure similar to the one described in ref. ^{14}. With the proviso that the key bits are extracted in the Z basis, we drop the index Z and write them as:
In Eqs. (1) and (2), the labels “MDI” and “QKD” refer to MDIQKD and QKD, respectively. The quantities S and e _{ph} indicate singlephoton counts and singlephoton phaseerror rate, respectively, in the Z basis and intensity class s, estimated by applying the decoystate technique to the Xbasis data sample and then extending to the Z basis using standard statistical tools (see Supplementary Note 1). The function h is the binary entropy. The upper and lower bars are for upper and lower bounds and the superscripts “1” or “1,1” refer to one sender (QKD) or two senders (MDIQKD) emitting single photons. The quantity leak_{EC} is the amount of bits used to correct errors in the Z basis, while the Δ terms take into account the finitesize effect.
Quantum digital signatures
Having demonstrated the capability to distil encryption keys between all the nodes in the network, we now turn on QDS and describe specifically our method to extract QDS rates from an MDIQKD link. This is not a trivial extension of the previous cases because, differently from encryption, the goal of digital signatures is demonstrating the authenticity of a signed message to multiple recipients rather than keeping it secret. So the quantum protocols devised for encryption keys have to be adapted to QDS (see Supplementary Note 1).
So far, various proofofconcept experiments have been performed on QDS^{33,34,35}, with the most recent ones reaching distances up to 90 km in optical fibre^{35}. However, this was achieved using a protocol secure only against individual attacks in the asymptotic scenario. Moreover, previous schemes were either realised over very short distances^{33, 34} or on a single optical fibre to represent two of the three necessary links for QDS^{35}. Finally, no previous experiment has used MDIQKD to implement QDS.
In the simplest case, a QDS scheme involves three parties, as depicted in Fig. 4. One of them, Alice, signs a document and sends it to a receiver, Bob, who accepts it after checking that the signature is genuine. The same document can also be transferred to a third user, Charlie, for verification purposes. We implement QDS using the quantum network in Fig. 1. Two 25km optical fibres connect Alice and Bob to Charlie, whereas there is no direct fibre between Alice and Bob, who are linked only by the intermediate node using MDIQKD. We choose this particular realisation of QDS to demonstrate signature distribution based on MDIQKD. However, given the key rates represented by stars in Fig. 3, we could also have used the setup with the signing party at the “Charlie” node, in which case MDIQKD would be used to encrypt the symmetrising exchange of signature bits between the two recipients at the “Alice” and “Bob” nodes. Therefore, our demonstration is not limited to the particular case represented in Fig. 4. Let us also remark that, to strengthen our demonstration, we used real fibre to perform the QDS experiment.
To demonstrate QDS mediated by MDIQKD, we adopt MDIQKD without error correction and privacy amplification (denoted “MDIQKD\EP”) for the signature between Alice and Bob, and QKD without error correction and privacy amplification (QKD\EP) for the signature between Alice and Charlie. Full QKD between Bob and Charlie is also used, to enable the symmetrisation step of the protocol (see Supplementary Note 1 for details). All the results in the X basis are publicly revealed, whereas only a small portion of the Z basis results is disclosed, to estimate the QBER in this basis. The remaining undisclosed bits are used for quantum digital signatures.
Quantum digital signature rates
Here, we extract the specific parameters of a QDS protocol, i.e., the size of signatures and the security parameters against forging and nonrepudiation^{19, 20}. For that, we introduce a protocol with a refined finitesize analysis, to increase the QDS rate. In the finitesize scenario, the users acquire data for a finite amount of time, until the data block is large enough to guarantee small statistical fluctuations in the parameters estimated from the data set. Then they proceed and acquire the next block of data. The current approach for QDS is to distil a single signature from every block of data. Therefore, to increase the QDS rate, it is optimal to keep the data block as small as possible, so as to have more blocks in a given time interval. This, however, is highly inefficient. It makes statistical fluctuations larger, thus worsening the estimation of the quantumrelated parameters and the QDS rate.
In our protocol, we still perform a single decoystate parameter estimation per each block of data, but we extract multiple signatures from the same data block (see details in Supplementary Note 1). This allows us to acquire a large data set, minimising the statistical fluctuations, and at the same time distil as many signatures as possible from each acquired block. We estimate that this improves the standard QDS rate by about 10 times at short distances and even more at longer distances.
We start from analysing the MDIQKDmediated QDS rate on the link connecting Alice and Bob. Then, we will apply an analogous procedure in order to estimate the QDS rate on the QKD link between Alice and Charlie. The QDS protocol also includes a symmetrization step between Bob and Charlie performed on a secure channel (see Supplementary Note 1 for details)^{19, 20}. This can be enabled by running QKD on the remaining link between Bob and Charlie. The specific key rate for this scheme would be the one showed in the bottom diagram of Fig. 3.
As a first QDSspecific quantity, we evaluate the minimum rate \(p_{\rm{E}}^{{\rm{MDI}}}\) at which Eve can introduce errors on the MDIQKD link. This is given by:
which is derived from Eq. (1), omitting the error correction and, for simplicity, the finitesize terms^{20}. In Eq. (3), the subscript “sig” indicates that the quantities refer to the block from which signatures are extracted. In the QDS protocol, Alice randomly selects \(C_{{\rm{sig}}}^{s,s} = 2.5 \times {10^6}\) bits from the Zbasis block, to form one of the signature blocks. Because this size is smaller than the Zbasis data set, she will be able to extract multiple signature blocks from it, all with size \(C_{{\rm{sig}}}^{s,s}\). She then applies decoystate estimation to find, for the signature block, the lower bound for Charlie’s counts due to singlephoton pulses and the corresponding upper bound for the phaseerror rate. In our experiment, the two bounds are \(\underline S _{{\rm{sig}}}^{1,1} = 666,345\) bits and \(\overline e _{{\rm{ph,sig}}}^{{\rm{1,1}}} = 0.053\), respectively, leading to \(p_{\rm{E}}^{{\rm{MDI}}}\) = 0.0286.
The next step is to determine an upper bound for the QBER in the signature blocks, \(\overline E _{{\rm{sig}}}^{s,s}\). For that, the QBER was directly measured on a sample set of \(C_{{\rm{test}}}^{s,s} = 1,714,426\) bits and found to be \(E_{{\rm{test}}}^{s,s} = 0.5\%\) (see also Supplementary Table 3). The measured block can be thought of as a random sample drawn from the overall Zbasis population. Therefore, the measured QBER is representative of the QBER in the nonmeasured fraction of the population. From this fraction, the users select several blocks of size \(C_{{\rm{sig}}}^{s,s}\) to form the signatures. The QBER in each signature block is then estimated, by applying Serfling’s inequality^{36}, to be:
The estimation in Eq. (4) provides \(\overline E _{{\rm{sig}}}^{s,s} = 0.0085\) when we set \({\epsilon _H}\) = 2 × 10^{−11}. After calculating suitable authentication and verification parameters, s _{ab} = 0.0152 and s _{vb} = 0.0219, we obtain the length of a signature \(L_{{\rm{sig}}}^{{\rm{MDI}}}\) by inverting the relation
which sets the repudiation probability \(P_{{\rm{rep}}}^{{\rm{MDI}}}\) to less than 0.5 × 10^{−10} ^{19, 20}. The resulting value for \(L_{{\rm{sig}}}^{{\rm{MDI}}}\) is 2.11 × 10^{6}, which is smaller than the set value of \(C_{{\rm{sig}}}^{s,s}\), showing that Eq. (5) holds in our experiment when we take \(C_{{\rm{sig}}}^{s,s}\) as the signature length. The overall failure probability at the end of the QDS distillation is less than 10^{−10}, which is orders of magnitude smaller than in previous experiments^{33,34,35}.
A signature of size \(C_{{\rm{sig}}}^{s,s}\) can be generated with our system in 45 s on average. This is a remarkable speed for MDIQKDmediated QDS, if the increased security level entailed by the MDIQKD link, by the lower failure probability and by the finitesize security against the most general attacks is taken into account. The average time results from the ratio of the total acquisition time in an experiment with an 80:20 bias between the Z and the X bases divided by the 1974 different signatures generated from the acquired data block. The reported average time includes the QKD operations on the other two links.
The analysis of MDIQKDbased signatures is completed by calculating the probabilities of honest abort, P _{hab}, and forging, P _{for}, which are confirmed to be much smaller than the set threshold 10^{−10} with our experimental parameters.
As an additional step in the QDS scheme, we now evaluate the QDS rate on the 25km QKD link between Alice and Charlie (see Fig. 4). We repeat similar calculations as for the MDIQKD link. We set the size of the signature block to \(C_{{\rm{sig}}}^s = 150,\!000\) bits, randomly selected in the Zbasis data block acquired by operating QKD on the AC link. In the signature block, the lower bound for Charlie’s counts due to singlephoton pulses amounts to \(\underline S _{{\rm{sig}}}^{\rm{1}} = 86,\!563\) and the upper bound for the phaseerror rate is \(\overline e _{{\rm{ph,sig}}}^{\rm{1}} = 0.0237\), leading to \(p_{\rm{E}}^{^{{\rm{QKD}}}}\) = 0.105.
The actual QBER in the Z basis was measured on a sample of 46, 979, 354 bits and amounts to \(E_{{\rm{test}}}^s = 0.0017\) (see also Supplementary Table 2). From it, using an equation similar to Eq. (4), we obtain an upper bound \(\overline E _{{\rm{sig}}}^s = 0.0108\), which is less than \(p_{\rm{E}}^{^{{\rm{QKD}}}}\), thus providing a positive QDS rate. To determine the rate, we calculate s _{ac} = 0.0421 and s _{vc} = 0.0734 and obtain a signature length \(L_{{\rm{sig}}}^{{\rm{QKD}}} = 103,336\) by inverting an equation similar to Eq. (5), but with \(p_{{\rm{rep}}}^{{\rm{QKD}}}\) replacing \(p_{{\rm{rep}}}^{{\rm{MDI}}}\). The total repudiation probability is then given by the sum \(p_{{\rm{rep}}}^{{\rm{QKD}}} + p_{{\rm{rep}}}^{{\rm{MDI}}}\).
The total time the system would spend acquiring QKD data on the AC link is about 36 s. The resulting data block would be enough to distil signatures for 2506 1bit messages, thus providing an average time for the QKDonly operations on the AC link equal to 72 ms for each signed bit. A similar value of 74 ms could have been obtained on the QKD link between Bob and Charlie if we had used it to distil signatures rather than for encryption. Although the reported values can be further improved by optimising the initial parameters set by Alice and Bob, they are already in line with stateoftheart QDS, especially when considering the fact that the present scheme offers security in the finitesize scenario against the most general attack allowed by the laws of physics.
Realworld implementation
As a final point, let us briefly discuss the possibility to export our methods to a realworld platform. Our quantum network features a majority of QKD links, used to distil informationtheoretically secure encryption keys and digital signatures for the network’s users. This would ease the transition to a realworld system, as QKD offers excellent stability^{37} and has already been implemented in field trials^{38,39,40}. The polarisation encoding used in our setup has been used in previous quantum communications experiments and is controllable with high accuracy^{41}. The polarisation drift is negligible in our laboratory for the duration of the experiment. Similar or more favourable conditions are expected in underground fibres^{42}, where the polarisation drift is not a limiting factor. The necessary synchronisation of the signals has been demonstrated in the QKD field trials as well as in an MDIQKD network^{13}. The effect of stray photons due to the multiplexing of classical signals can be also effectively handled, either using two different fibres^{37} or multiplexing the clock and data signals with the quantum signals. Distances up to 200 km have been reached in this configuration^{43}. Finally, the stringent modematching conditions necessary for highspeed MDIQKD have been recently considerably relaxed using laser seeding^{44, 45}, which is the same enabling technology adopted in this work (see Fig. 2). For these reasons, we would not expect a major reduction of the rates presented in Fig. 3 if we turned our setup into a prototype suitable for longterm deployment in the field, as it contains already the necessary enabling technology.
Methods
Experimental details
Alice and Bob use the experimental setup shown in Fig. 2 to independently produce 32 ps pulses at 1549.8 nm. The two parties create lowjitter (1.7 ps) signals using pulsed laser seeding. To enable this, the master and slave laser in each source are driven by an AC bias and a DC bias. The AC biases are equal, however the DC bias for the master laser is higher than that of the slave laser. This ensures that the master laser has a shorter turnon time, emitting longer pulses of around 250 ps. The master laser is input to the slave via a circulator and the AC bias is temporally offset between the two lasers to ensure injection occurs at the correct time. Each of the laser diodes are independently temperature controlled to ensure the emission wavelengths are stable and identical. The 1 GHz gain switching of both lasers ensures that all pulses are perfectly phase randomised.
Alice and Bob’s pulses are then passed through 30 GHz bandwidth filters to remove noise. The polarisation of the pulses is controlled using an electric polarisation controller, which can create all of the required polarisation states. The polarisation is set once prior to each measurement using Charlie’s detectors as a reference for each polarisation state. The polarisation drift is negligible for the duration of the data acquisition due to the controlled temperature of the laboratory.
An attenuator provides the four photon fluxes (s, u, v, w) before they are sent to Charlie. Following this, fixed optical attenuators simulate a lossy channel at all distances reported in Fig. 3, assuming the loss rate is 0.2 dB/km as in a standard singlemode optical fibre in the third telecom window. In one case, we replaced attenuators with real optical fibre. The star points in Fig. 3 were obtained using two 25km reels of standard optical fibre, one connecting Alice’s setup to Charlie and the other connecting Bob to Charlie. The photon flux of the u state is set for each distance to produce 5.8 × 10^{6} photons/s at Charlie’s detectors to avoid saturation of the singlephoton counter. An emulator incorporating finitekey size analysis is then used to determine the optimal photon fluxes of the other states to maximise the MDIQKD key rate.
Alice, Bob and Charlie share a common 10MHz reference clock. This is then regenerated to the master clock frequency of 1 GHz at each of the users. This allows Alice and Bob to precisely overlap their optical pulses on Charlie’s BS and at the same time permits Charlie to time align the detector gates to the received optical pulses. This is the same method employed in QKD experiments^{37, 43} and QKD field trials^{39, 43} to distribute the clock between the users. In some cases^{37}, the clock is distributed using two different fibres. In other cases^{43}, the clock is multiplexed with the quantum channel in the same optical fibre.
At Charlie’s side, the photons from Alice and Bob interfere on a BS. One output is incident on a PBS and the other output passes through a fixed 45° polarisation rotator before travelling to a different PBS. With this design, one arm detects photons in the rectilinear basis and the other arm detects photons in the diagonal basis. The overall insertion loss of Charlie’s setup up to this point is 1 dB. The outputs from the PBS’s are detected by four InGaAs selfdifferencing avalanche photodiodes. These detectors are gated at 1 GHz and have an intrinsic deadtime of 1 ns. They feature an average efficiency of 20.9%, a dark count rate of 16 kHz and an afterpulsing probability of 3.9%. They are maintained at a temperature of 273 K for all measurements. The resultant signals, when neither party is transmitting in the Z basis, are counted in real time using a multipleevent time digitizer with 100 ps time bins and a saturation value of 6.5 × 10^{6} counts/s. Counts when either party, or both parties, are sending the Zbasis state are detected on an oscilloscope and analysed with Matlab because the highphoton levels would saturate the digitizer. The single counts, coincidence counts and transmitted photon fluxes are collected at each distance for analysis.
Data availability
The data that support the findings of this study are available from the corresponding author on reasonable request.
References
Menezes, A. J., van Oorschot, P. C. & Vanstone S. A. Handbook of Applied Cryptography (CRC Press, Boca Raton, FL, 1996).
Diffie, W. & Hellman, M. New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976).
Rivest, R. L., Shamir, A. & Adleman, L. M. A Method for obtaining digital signatures and publickey cryptosystems. Commun. ACM 21, 120–126 (1978).
Bennett, C. H. & Brassard, G. Proc. IEEE Int. Conf. on Comp. Syst. and Sign. Proc., 175–179 (Bangalore, India, 1984).
Braunstein, S. L. & Pirandola, S. Sidechannelfree quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012).
Lo, H.K., Curty, M. & Qi, B. Measurementdeviceindependent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012).
Bennett, C. H. et al. Teleporting an unknown quantum state via dual classical and EinsteinPodolskyRosen channels. Phys. Rev. Lett. 70, 1895 (1993).
Gerhardt, I. et al. Fullfield implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2011).
Lydersen, L. et al. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon. 4, 686–689 (2010).
Xu, F., Qi, B. & Lo, H.K. Experimental demonstration of phaseremapping attack in a practical quantum key distribution system. New J. Phys. 12, 113026 (2010).
Zhao, Y., Fung, C.H. F., Qi, B., Chen, C. & Lo, H.K. Quantum hacking: experimental demonstration of timeshift attack against practical quantumkeydistribution systems. Phys. Rev. A 78, 042333 (2008).
Qi, B., Fung, C.H. F., Lo, H.L. & Ma, X. Timeshift attack in practical quantum cryptosystems. Quant. Inf. Comp. 7, 73–82 (2007).
Tang, Y.L. et al. Measurementdeviceindependent quantum key distribution over untrustful metropolitan network. Phys. Rev. X 6, 011024 (2016).
Comandar, L. C. et al. Quantum key distribution without detector vulnerabilities using optically seeded lasers. Nat. Photon. 10, 312–315 (2016).
Yin, H.L. et al. Measurementdeviceindependent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett. 117, 190501 (2016).
Gottesman D. & Chuang, I. Quantum digital signatures. Preprint at http://arXiv.org/abs/quantph/0105032 (2001).
Andersson, E., Curty, M. & Jex, I. Experimentally realizable quantum comparison of coherent states and its applications. Phys. Rev. A 74, 022304 (2006).
Amiri, R. & Andersson, E. Unconditionally secure quantum signatures. Entropy 17, 5635–5659 (2015).
Amiri, R., Wallden, P., Kent, A. & Andersson, E. Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93, 032325 (2016).
Puthoor, I. V., Amiri, R., Wallden, P., Curty, M. & Andersson, E. Measurementdeviceindependent quantum digital signatures. Phys. Rev. A 94, 022328 (2016).
Hwang, W.Y. Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003).
Wang, X.B. Beating the photonnumbersplitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005).
Lo, H.K., Ma, X. & Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005).
Ma, X., Qi, B., Zhao, Y. & Lo, H.K. Practical decoy state for quantum key distribution. Phys. Rev. A 72, 012326 (2005).
Qi, B. et al. in 2015 IEEE Int. Conf. on Space Opt. Syst. and Appl. (ICSOS) 1–6 (New Orleans, LA, 2015).
Zhou, Y.H., Yu, Z.W. & Wang, X.B. Making the decoystate measurementdeviceindependent quantum key distribution practically useful. Phys. Rev. A 93, 042324 (2016).
Jofre, M. et al. True random numbers from amplified quantum vacuum. Opt. Express 19, 20665–20672 (2011).
Yuan, Z. L. et al. Robust random number generation using steadystate emission of gainswitched laser diodes. Appl. Phys. Lett. 104, 261112 (2014).
Beaudry, N. J., Moroder, T. & Lütkenhaus, N. Squashing models for optical measurements in quantum communication. Phys. Rev. Lett. 101, 093601 (2008).
Tsurumaru, T. & Tamaki, K. Security proof for quantumkeydistribution systems with threshold detectors. Phys. Rev. A 78, 032302 (2008).
Lim, C. C. W., Curty, M., Walenta, N., Xu, F. & Zbinden, H. Concise security bounds for practical decoystate quantum key distribution. Phys. Rev. A 89, 022307 (2014).
Curty, M. et al. Finitekey analysis for measurementdeviceindependent quantum key distribution. Nat. Commun. 5, 3732 (2014).
Clarke, P. J. et al. Experimental demonstration of quantum digital signatures using phaseencoded coherent states of light. Nat. Commun. 3, 1174 (2012).
Collins, R. J. et al. Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113, 040502 (2014).
Collins, R. J. et al. Experimental transmission of quantum digital signatures over 90 km of installed optical fiber using a differential phase shift quantum key distribution system. Opt. Lett. 41, 4883–4886 (2016).
Serfling, R. J. Probability inequalities for the sum in sampling without replacement. Ann. Statist. 2, 3948 (1974).
Dynes, J. F. et al. Stability of high bit rate quantum key distribution on installed fiber. Opt. Express 20, 16339–16347 (2012).
Sasaki, M. et al. Field test of quantum key distribution in the Tokyo QKD Network. Opt. Express 19, 10387–10409 (2011).
Dixon, A. R. et al. High speed prototype quantum key distribution system and long term field trial. Opt. Express 23, 7583–7592 (2015).
Dixon, A. R. et al. Quantum key distribution with hacking countermeasures and long term field trial. Sci. Rep. 7, 1978 (2017).
Xavier, G. B., Vilela de Faria, G., Temporão, G. P. & von der Weid, J. P. Full polarization control for fiber optical quantum communication systems using polarization encoding. Opt. Express 16, 1867–1873 (2008).
Grosche, G. et al. Optical frequency transfer via 146 km fiber link with 10^{19} relative accuracy. Opt. Lett. 34, 2270–2272 (2009).
Fröhlich, B. et al. Longdistance quantum key distribution secure against coherent attacks. Optica 4, 163–167 (2017).
Yuan, Z. L. et al. Interference of short optical pulses from independent gainswitched laser diodes for quantum secure communications. Phys. Rev. Appl. 2, 064006 (2014).
Comandar, L. C. et al. Near perfect mode overlap between independently seeded, gainswitched lasers. Opt. Express 24, 17849–17859 (2016).
Acknowledgements
We acknowledge Ryan Amiri and Petros Wallden for their useful discussions. G.L.R. gratefully acknowledges financial support from the EPSRC CDT in Integrated Photonic and Electronic Systems and Toshiba Research Europe Ltd. M.C. acknowledges support from the Galician Regional Government (Grant No. EM2014/033, and consolidation of Research Units: AtlantTIC), the Spanish Ministry of Economy and Competitiveness (MINECO), the Fondo Europeo de Desarrollo Regional (FEDER) through Grant No. TEC201454898R, and the European Commission (Project QCALL). I.V.P. and E.A. acknowledge financial support by EPSRC Grant EP/M013472/1.
Author information
Authors and Affiliations
Contributions
E.A. and M.L. conceived the work. G.L.R., L.C.C., J.F.D., A.W.S. and Z.L.Y. developed the experimental setup. The experiment was performed by G.L.R. who also analysed the data. M.C. and M.L. adapted the finitesize quantum encryption protocols to the network and performed numerical analysis. The distillation method for multiple signatures was introduced by M.L. and then refined by M.C. The quantum signature protocol was adapted by I.V.P. and E.A. Z.L.Y. and A.J.S. guided the work. M.L. and G.L.R. wrote the manuscript with contributions from the other authors.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Additional information
Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Electronic supplementary material
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Roberts, G.L., Lucamarini, M., Yuan, Z.L. et al. Experimental measurementdeviceindependent quantum digital signatures. Nat Commun 8, 1098 (2017). https://doi.org/10.1038/s41467017012455
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41467017012455
Further reading

New quantum circuit implementations of SM4 and SM3
Quantum Information Processing (2022)

Cryptanalysis and improvement of a (t, n) threshold group signature scheme
Quantum Information Processing (2022)

Quantum digital signature based on measurementdeviceindependent continuousvariable scheme
Quantum Information Processing (2021)

StateoftheArt Survey of Quantum Cryptography
Archives of Computational Methods in Engineering (2021)

Practical quantum digital signature with configurable decoy states
Quantum Information Processing (2020)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.