Abstract
Quantum communication complexity explores the minimum amount of communication required to achieve certain tasks using quantum states. One representative example is quantum fingerprinting, in which the minimum amount of communication could be exponentially smaller than the classical fingerprinting. Here, we propose a quantum fingerprinting protocol where coherent states and channel multiplexing are used, with simultaneous detection of signals carried by multiple channels. Compared with an existing coherent quantum fingerprinting protocol, our protocol could consistently reduce communication time and the amount of communication by orders of magnitude by increasing the number of channels. Our proposed protocol can even beat the classical limit without using superconductingnanowire single photon detectors. We also report a proofofconcept experimental demonstration with six wavelength channels to validate the advantage of our protocol in the amount of communication. The experimental results clearly prove that our protocol not only surpasses the bestknown classical protocol, but also remarkably outperforms the existing coherent quantum fingerprinting protocol.
Similar content being viewed by others
Introduction
Quantum communication is the study of informationtransmission tasks that can be facilitated by using quantum mechanical systems^{1}. The power of quantum mechanics enables quantum communication to perform tasks that could not be accomplished in a classical system. One of the bestknown examples is quantum cryptography that enables informationtheoretically secure communication between two parties that share random keys through quantum key distribution (QKD)^{2,3,4,5,6}. Apart from quantum cryptography, quantum communication complexity (QCC)^{7,8,9,10} is another important example that shows quantum superiority over its classical counterpart–classical communication complexity^{11,12,13,14}. In the basic model of communication complexity^{13}, Alice and Bob each is given an nbit string x and y, respectively. The classical communication complexity exploits the minimum amount of communication necessary among participants, namely the minimum number of bits of communication, such that they could compute a certain function f(x, y) correctly. This exploitation of a minimum amount of communication provides a lower bound for many related research areas, such as the study of VLSI circuit design, data structure and computer networks^{13,14}. In the quantum version of communication complexity, the involved participants are allowed to communicate with quantum states instead of classical bits and QCC is then defined as the minimum number of qubits of communication exchanged between Alice and Bob^{10}. It has been proven that, by using quantum superposition or entanglement, many quantum protocols of communication complexity are more efficient, that is, they require less communication (fewer qubits) than their classical counterparts^{15,16,17,18,19,20}.
One remarkable protocol in QCC is quantum fingerprinting (QF)^{21,22} where quantum mechanics can help reducing the communication complexity exponentially compared with the classical case. In the fingerprinting mechanism, the simultaneous messagepassing model is considered^{11}. In this particular model, Alice and Bob have no shared randomness and are not allowed to communicate with each other. But they want to determine whether their inputs x and y are the same or different. In this case, a third party, the referee (Charlie), is involved and will solve this equality problem based on the inputs’ fingerprints that Alice and Bob send to her. The communication complexity in this model is defined as the amount of information communicated between Alice (Bob) and Charlie, which is equivalent to the minimum length of the fingerprints. Note that QF protocol is not concerned with communication security. It has been proven that, without any correlations or entanglement shared among the parties, quantum fingerprints require \(O({{{{\rm{log}}}}}_{2}n)\) qubits^{21}, which are exponentially smaller than the classical case where \(O(\sqrt{n})\) bits are required^{23,24,25}. To experimentally verify the advantage of quantum fingerprinting in small instances, a singlequbit fingerprinting protocol^{26} has been experimentally demonstrated in refs. ^{27,28} and has been shown to outperform the classical onebit fingerprinting protocol. However, to demonstrate the exponential advantage of quantum fingerprinting, one must create fingerprints consisting of highly entangled qubit states^{21}, which are beyond the reach of current technology. In ref. ^{29}, a more practical QF protocol has been proposed and coherent states are used to construct the fingerprint. The minimum amount of communication required in this protocol is proven to be
For simplicity, we call this coherent quantum fingerprinting protocol as CQF protocol in this letter. The total mean photon number of the fingerprint in this coherent quantum fingerprinting (CQF) protocol is μ. Therefore, for CQF protocol with a fixed μ, the minimum amount of communication can still be exponentially smaller than the classical fingerprinting protocol. Refs. ^{30,31} have successfully demonstrated the proofofprinciple experiment of CQF protocol and prove that less information is communicated in the CQF system compared with the bestknown classical protocol^{25}. Nonetheless, this CQF protocol uses a number of optical modes that is proportional to the input size n, hence the communication time is quadratically increased compared with the classical system^{30,31}. In addition, the minimum amount of communication in CQF protocol has a dependence on μ, a value that has a lower limit due to experimental imperfections^{29}, among which the dark counts from the singlephoton detector (SPD) (used for Charlie’s detection) are a dominant factor^{30}. As indicated in ref. ^{31} where superconductingnanowire singlephoton detectors (SNSPD) with very low dark count rates (<0.1 Hz) are applied, the performance of the CQF system is significantly improved and can even beat the classical limit. (Here, the classical limit refers to the lower bound of the amount of communication in any classical fingerprinting system. In our work, the lower bound given in Ref. ^{31} is used.) However, such SNSPDs are costly and will be impractical to implement on a large scale.
In this work, we propose a fingerprinting protocol utilizing the wavelengthdivision multiplexing (WDM) to reduce the communication time and improve the performance of CQF protocol. We call this protocol the WDM–CQF protocol. As a mature technique, WDM has been widely employed in classical communication systems to broaden the communication bandwidth and improve the communication efficiency^{32,33}. It is natural to extend such an advantage into quantum communication systems. A lot of applications of WDM in quantum communication focus on providing shared infrastructure for both classical and quantum communication. There have been few studies using WDM to enlarge the quantum channel capacity^{34,35,36}. Especially in ref. ^{35}, coherentstate fingerprints are also used to study another QCC protocol–Euclidean problem, which aims at calculating the Euclidean distance of two real vectors of Alice and Bob. The authors similarly propose to employ multiplexing technique to improve the communication efficiency. However, demultiplexing followed by multiple individual detection systems are always needed in these studies. In this paper, WDM is used to increase the quantum channel capacity to reduce the communication time needed in the original CQF protocol without demultiplexing. All the quantum channels share the same detection system. More importantly, by removing demultiplexing and detecting the signals from different wavelength channels simultaneously, we can lower the value of μ in Eq. (1), thus reducing the amount of communication required in the original CQF protocol. With a large number of wavelength channels, it is in principle possible for our scheme to beat the classical limit without using SNSPDs. Here, we also report a proofofprinciple experimental implementation of the WDM–CQF protocol with six wavelength channels over 40km fibers. Because of the use of time multiplexing during the process of information encoding, our implementation does not strictly show the reduction of communication time (this will be discussed in detail later). But the experimental results successfully validate that, with WDM being applied and with demultiplexing being removed for simultaneous detection, our system not only transmits much less information than the bestknown classical protocol, but also reduces the amount of information transmitted in the original CQF protocol by more than half for large inputs.
Result
WDM–CQF protocol
In the CQF protocol^{29}, Alice first prepares her coherent fingerprint \({\left\alpha \right\rangle }_{{{{\rm{A}}}}}\) as
Bob’s fingerprint \({\left\alpha \right\rangle }_{{{{\rm{B}}}}}\) has the same expression as Eq. (2) with changing subscript A into B and changing input x into y. The mbit strings E(x) and E(y) are the codewords of Alice and Bob, respectively, obtained by applying errorcorrection code (ECC) to the nbit input strings x and y. The ECC has a code rate c (\(=\frac{n}{m} < 1\)) and a Hamming distance δm. The use of ECC guarantees that when Alice’s and Bob’s inputs are different, the minimum number of different bits of E(x) and E(y) is δm. The codewords contain the information of the original inputs and are encoded into the phase of the coherent states (either 0 or π phase is added to the states). As indicated in Eq. (2), this coherent fingerprint is made up of mcoherent states. The mean photon number of each state is \(\frac{ \alpha { }^{2}}{m}(=\frac{\mu }{m})\). Then Alice and Bob forward their fingerprints to Charlie’s station through two optical channels, where each pair of Alice’s and Bob’s coherent states interferes with each other and is detected by Charlie’s SPDs. At Alice’s and Bob’s encoders, the amount of information sent by Alice and Bob (to the recipient Charlie) is shown in ref. ^{29} to be
Since Alice and Bob each send mcoherent states to Charlie, the communication time is proportional to the input size n (as m = n/c).
To implement WDM–CQF protocol, Alice and Bob only need to divide their coherent fingerprints into k subfingerprints. Each subfingerprint consists of m/kcoherent states and is described as
E_{j}(x)_{i} is the ith bit of the jth subcodeword E_{j}(x) (j ∈ [1, k]). Figure 1 shows the schematic setup of the WDM–CQF protocol. As shown in Fig. 1, Alice and Bob assign each subfingerprint to a wavelength channel and multiplex the kwavelength channels into a single optical channel. Then they send their fingerprints to Charlie for detection through the optical channels. In total, m/kwavelengthcomposite pulses are sent from Alice/Bob to Charlie. On Charlie’s side, each pair of the wavelengthcomposite pulses interferes at the balanced beam splitter (BS) and is measured by two SPDs D_{0} and D_{1}. Note that, the k pairs of coherent states at different wavelengths in each pulse interfere at the BS independently but simultaneously. Hence, the communication time is shortened to 1/k times of its original value. We remark that, all the wavelength channels share the same BS and SPDs, thus saving experimental components. Since the coherent fingerprints used in our protocol are the same as that in the original CQF protocol, the amount of information transmitted from Alice and Bob to Charlie is still \(O(\mu {{{{\rm{log}}}}}_{2}m)\). In fact, except for adding the additional wavelength channels, the WDM–CQF system is very similar to the original CQF system. One could treat CQF protocol as a special case of WDM–CQF protocol with a singlewavelength channel (k = 1).
After the measurement, Charlie has to determine whether Alice’s and Bob’s inputs are the same or not by checking the total counts at D_{0} and D_{1}. Ideally, if there is any count at D_{1}, the inputs x and y should be different. This is because, if Alice and Bob have the same inputs, their coherent fingerprints are the same and the phase interference of the same states results in clicks only at D_{0}. If the inputs are different, a portion of the interfering states have a πphase difference. The photons in these states are registered at D_{1}. However, experimental imperfections, such as dark counts of SPD, would also give clicks in D_{1} even when the inputs are the same. Here we adopt the decision mechanism introduced in ref. ^{30}. In ref. ^{30}, for the equal and different inputs cases, photon counts at detector D_{1} have the binomial distributions B(m, P_{E}), and B(m, P_{D}) respectively. P_{E} and P_{D} are the probabilities of D_{1} obtaining a click in a singledetection window. Based on these distributions, a threshold C_{1,th} is chosen. Charlie then compares the total counts at D_{1} with C_{1,th}. If the total counts are smaller than C_{1,th}, Charlie concludes that the inputs are equal. Otherwise, Charlie concludes that the inputs are different. In our WDM–CQF system, since each detection event is independent, the photon counts at D_{1} also have the binomial distributions B(M, P_{E}) and B(M, P_{D}). Note that m is replaced by M, since in total, Mwavelengthcomposite pulses are sent from Alice/Bob to Charlie in the WDM–CQF protocol. The amplitude of each pulse is
The detection probabilities P_{E} and P_{D} are
For the probability P_{D}, we assume the worstcase scenario that the codewords E(x) and E(y) have the minimum distance. ν is the interference visibility that considers the imperfect interference due to various factors. For example, the interfering states from Alice and Bob might not arrive at Charlie’s station simultaneously. Their polarization states might not be exactly the same after traveling a long distance and the phase drift could also be different. To maximize ν, one must minimize these mismatches. η is the optical channel transmittance. Here we consider that the optical channel loss between Alice and Charlie is the same as the loss between Bob and Charlie, i.e., η_{A} = η_{B} = η. If the channel losses are different, Alice and Bob simply use different signal intensities μ_{A} and μ_{B} such that μ_{A} × η_{A} = μ_{B} × η_{B}. If the detector’s efficiency η_{dec} is taken into consideration, then η = η_{A/B} × η_{dec}. P_{dark} is the darkcount probability per detection gate of the SPDs. The error probability for this decision mechanism is
and it should be smaller than the tolerable probability ϵ. C_{1,E} and C_{1,D} are the detected total counts at detector D_{1} for the equal and different input cases, respectively. For each input size n, the choice of threshold C_{1,th} depends on the total mean photon number μ. As indicated in Eq. (6) and Eq. (7), when μ is so small such that P_{E/D,signal} ≪ P_{dark}, the probabilities P_{E} and P_{D} are dominated by P_{dark} and the distributions B(m/k, P_{E}) and B(m/k, P_{D}) are fairly close to each other. Consequently, the error probability would be very large. Therefore, a large value of μ is preferred for minimizing the error probability. However, as mentioned before, the amount of communication required by the coherent fingerprint is proportional to the mean photon number μ. So, for each input size n, one has to balance the two demands of low error probability and a small amount of communication. That is to say, one has to find the minimum μ (and its corresponding threshold C_{1,th}), which gives the error probability P_{error} smaller than ϵ. More details about the optimization of μ can be found in “Method”.
It is straightforward to think that the lower the darkcount probability P_{dark} is, the smaller μ can be found. Ref. ^{31} uses SNSPDs with ultralow dark count rate (0.11 Hz) significantly reduces the value of μ, hence, it can beat the classical limit. However, SNSPDs are much more expensive than the regular SPDs and require very low temperature. Instead of using SNSPDs to decrease P_{dark}, our WDM–CQF protocol simply increases the signal probability P_{E/D,signal} in Eq. (6) and Eq. (7) by simultaneously detecting k pairs of wavelength components. Because a low value of μ is preferred in the protocol, most of the coherent states are empty when they arrive at Charlie’s station. The signal probability P_{E/D,signal} primarily comes from the photons in onewavelength component. With a reasonable number of wavelength channels (say 1 ≤ k ≤ 1000), the probability of more than onewavelength component containing photons when arriving at Charlie’s station is so low (even lower than P_{dark}) that we can simply ignore the multiwavelength contributions to the detection event (detailed analysis can be found in Methods) Moreover, the information of which wavelength component carries a photon is not important and only the total counts detected on D_{1} are valued. Therefore, demultiplexing is not necessary on Charlie’s station. k pairs of coherent states at different wavelengths interfere simultaneously and are detected by a single pair of detectors in each detection window. Compared with the singlewavelength CQF protocol, the signal probability P_{E/D,signal} is increased without changing μ and the error P_{error} is then decreased. Therefore, to achieve the same tolerable error probability ϵ, our WDM–CQF protocol requires a lower value of μ than the singlewavelength CQF protocol. Consequently, as indicated in Eq. (3), less amount of communication is required in our WDM–CQF protocol than the singlewavelength CQF protocol. More wavelength channels are used, less μ is needed, and greater gain of the amount of communication is obtained by our protocol.
Figure 2 shows the amount of communication between Alice/Bob and Charlie over 0 km, 40 km, and 80 km fibers in different fingerprinting protocols as a function of the input size n. Note that the distance considered in the work is the total length of fibers that connect between Alice and Charlie and fibers that connect between Bob and Charlie. In short, we just call it the overall distance between Alice and Bob. In this log–log plot, practical experimental parameters are considered. The interference visibility is assumed to be 97%. The darkcount rate and the detector’s efficiency are 100 Hz and 25%, respectively. (We use the parameters from the best available commercial SPD ID230 from ID Quantique to show the best performance of our protocol.) The detection window is 500 ps. The tolerable error probability is chosen to be ϵ = 10^{−5}. The input size n varies from 10^{5} to 10^{18}. (Details about the simulation are discussed in Methods.) As shown in Fig. 2, for different distances, all the WDM–CQF protocols require less communication than the bestknown classical fingerprinting protocol. As k gets larger, the advantage of WDM–CQF protocol is more evident. Compared with the original CQF protocol (k = 1), our WDM–CQF protocol with k≥100 reduces the amount of communication by at least one order of magnitude. In fact, with the parameters used in this simulation, the original CQF protocol (k = 1) cannot beat the classical limit even when the overall distance between Alice and Bob is 0 km. However, with only k = 10 wavelength channels applied, our WDM–CQF protocol can transmit less information than the classical limit for 0 km. When the distance increases, more photons are needed to compensate the channel loss. Hence, the amount of communication in the coherent fingerprinting system increases with the channel distance. But, in our WDM–CQF protocol, the channel loss can be compensated by adding wavelength channels. Therefore, even when the distance increases, our WDM–CQF protocol can always beat the classical limit without using SNSPDs, as depicted in Fig. 2. Remarkably, when the overall distance between Alice and Bob is 40 km, our WDM–CQF protocol requires around 100wavelength channels to beat the limit. We remark that it is currently feasible to achieve around 100 simultaneous channels by using WDM, since there have been many reports of classical transmission experiments with WDM over more than 100 channels^{37,38}. Moreover, the total cost of adding wavelength channels is much lower compared with applying SNSPDs. When the distance is longer, more channels are required by our WDM–CQF protocol to beat the classical limit. The implementation of WDM–CQF with a large number of wavelength channels is very challenging. To circumvent this issue, one can combine other multiplexing schemes with wavelength multiplexing to reduce the number of wavelength channels. For example, one can use timedivision multiplexing (TDM), i.e., use fast modulators to add more temporal channels within one detection window. We would like to emphasize that our WDM–CQF protocol takes the advantage of the simultaneous detection of many bits of information within one detection window. These bits of information can be distributed in, but not confined to the wavelength channels.
Experimental setup
In this section, we show a proofofconcept experimental demonstration of our WDM–CQF protocol. Sixwavelength channels are used and a twoway quantum communication system consisting of a Sagnac interferometer is employed. This system configuration is similar to that of a twinfield QKD system^{39}. The Sagnac arrangement is chosen to provide a phase reference between Alice and Bob. Moreover, the common path feature of Sagnac interferometer automatically stabilizes the phase fluctuation along the optical channel and ensures that two beams emerge at the beam splitter simultaneously. The schematic experimental setup is shown in Fig. 3. On Charlie’s station, the continuous waves (cw) coming out of six laser modules (PRO 800, wavelength \(\lambda \in \left\{1542.9,1545.3,1547.7,1550.1,1552.5,1554.9\right\}\) nm) are multiplexed into a singlemode fiber (SMF) through a multiplexer (Jobin YvonSpex, Stimax WDM, 100 GHz) and are forwarded to Charlie’s intensity modulator (IM_{C}) through a polarizer. The output power of each laser module is individually adjusted such that the signal in each wavelength channel has the same intensity. IM_{C} is used together with an optical attenuator (Att_{C}) to create weak wavelengthcomposite pulses (500 ps pulse width) at a repetition rate of 50 MHz. Then Charlie sends the pulses to Alice and Bob through an optical circulator and a 50:50 fiberbased beam splitter (BS). After passing through the BS, the pulses split into clockwise and counterclockwise traveling beams and travel through a 20km singlemode fiber spool SMF_{B} or SMF_{A}, respectively. When the clockwise (counterclockwise) traveling pulses arrive at Bob’s (Alice’s) station, the fiberbased phase modulator PM_{B} (PM_{A}) is turned off and no information is encoded into the pulses. This is important because it guarantees that no information is communicated between Alice and Bob, even though they are connected directly through fibers. We remark that security is not a concern in quantum fingerprinting, since the main purpose is to reduce communication complexity. Then the clockwise (counterclockwise) traveling pulses go through 6.9 km dispersioncompensation fibers (DCF) before arriving at Alice’s (Bob’s) station. Note that this 6.9 km DCF is designed for temporal dispersion. In our system, each pulse created by Charlie has sixwavelength components. To modulate the phase of each component individually, we use the natural property of fiber, that is chromatic dispersion, to separate these wavelength components in time. The dispersion parameters (around 1550 nm) of the SMF and DCF in our setup are D_{SMF} = 17 ps/(nm ⋅ km) and D_{DCF} = −99 ps/(nm ⋅ km), respectively. Given that the wavelength difference between two adjacent modes is δλ = 2.4 nm, we can estimate the time difference of arrival δT_{A/B} at Alice’s/Bob’s station between the adjacentwavelength components by
l_{SMF} and l_{DCF} are the lengths of the singlemode fibers and dispersioncompensation fibers, respectively. Figure 4a shows the different arrival times of the six wavelength components at Bob’s station after traveling through 20 km SMFA and 6.9 km DCF. As indicated, δT_{A/B} in our experiment is around 820 ps, which enables Alice (Bob) to modulate the phases of the sixwavelength components sequentially by using an 800 ps phasemodulation window for each component. After the phase modulation, Alice (Bob) forwards the pulses to Charlie’s BS through another 20 km fiber spool SMF_{A} (SMF_{B}). The length of the DCF is designed to ensure that the sixwavelength components overlap with each other in time and become a singlewavelengthcomposite pulse at Charlie’s BS. The time difference of arrival at Charlie’s station can be estimated by
which is around 0 ps. As shown in Fig. 4b, after traveling through the whole loop, the sixwavelength components arrive at Charlie’s BS at the time and overlap with each other. The clockwise and counterclockwise traveling pulses interfere with each other at Charlie’s BS and are detected by two SPDs D_{0} and D_{1}. We emphasize that demultiplexing is not needed on Charlie’s station. As mentioned before, the wavelength information of the detected photon is not important. Only the total counts at D_{1} determine Charlie’s output. Therefore, the six pairs of coherent states at different wavelengths share the same BS and detectors. The SPDs are commercial avalanche photodiodes (ID220) with an efficiency of 20% and a darkcount rate of 1000 Hz. The detection window is about 500 ps. After the measurement, Charlie counts the total number of click events in detector D_{1} only and compares it with a predetermined threshold value C_{1,th}. If the number is smaller than the threshold C_{1,th}, he announces that the inputs of Alice and Bob are equal. Otherwise, he concludes that the inputs are different.
The most challenging problem in our experiment is the wavelengthdependent polarizationmode dispersion of long optical fibers^{40,41,42}. Due to the birefringence of the optical fiber, the polarization state varies along the fiber. To guarantee the highinterference visibility, the polarization of the interfering pulses should be aligned with each other. This alignment could be easily accomplished with one polarization controller (PC) if only onewavelength channel is applied. However, the variation of polarization strongly depends on wavelength, especially for long fibers. Therefore, when multiplewavelength channels are used, the polarization states at different wavelengths evolve differently, making the polarization alignment difficult. As a result, the interference visibility would be affected significantly. To solve this issue, we utilize the principal state of polarization (PSP)^{41}. For a fiber system, there are always two orthogonal PSPs, the polarization evolution of which does not depend on the wavelength to the first order. That is to say, if the input polarization states of the different wavelength components are the same and aligned to the input psp of the optical fibers, the output polarization states should also be the same. Note that we ignore the highorder polarizationmode dispersion since that the wavelength range in our experiment is only 12 nm. In our setup, there are three longfiber spools and two polarizers (integrated with the phase modulators) used in the Sagnac loop. Therefore, six polarization controllers are inserted into the Sagnac loop for the alignment, as shown in Fig. 3. One PC at one end of a fiber spool is designed to align the inputpolarization state to the input PSP, the other PC at the other end is used to align the polarization state to the output PSP of the fibers. With such alignment scheme, we are able to maintain our interference visibility to be 97% over a 12 nm bandwidth.
Another challenge in our implementation is the calibration of the fiber length. First of all, as indicated in Eq. (9), the lengths of SMF and DCF determine the time difference of arrival δT among different wavelength components. On one hand, we must ensure that on Alice’s and Bob’s stations, δT_{A/B} is large enough such that Alice and Bob can modulate the different wavelength components separately, on the other hand, when the pulses travel back to Charlie’s station, δT_{C} should be 0 ps. Therefore, the fiber lengths of SMF_{A}, SMF_{B}, and DCF are carefully calibrated to fulfill these two conditions. Additionally, it is also crucial to ensure that the clockwise and counterclockwise traveling pulses should never “collide” at Alice’s and Bob’s phase modulators. This is because Alice (Bob) should only modulate the clockwise (counterclockwise) traveling pulses. To avoid the pulse collision, small segments of fibers can be added or deleted on Alice’s and Bob’s station. Meanwhile, all the phase and intensity modulators are driven and synchronized by a highspeed arbitrarywaveform generator (AWG, Keysight M8195A). The delays of Alice’s and Bob’s phasemodulation signals are well adjusted to ensure that the modulation signals only act on the intended pulses.
Experimental result
The experiment was run over seven different values of the input size n, ranging from 1.4 × 10^{6} to 1.1 × 10^{9}. For each input size n, we tested both the case where the inputs are the same (x = y) and the case where the inputs have onebit difference (x ≠ y, E(x) and E(y) have (δm)bit difference). δ = 0.22 and the code rate c = 0.2398. The total photon numbers sent out by Alice (μ_{A}) and Bob (μ_{B}) for different input sizes are listed in Table 1. The reason why Alice and Bob have different μ is that the channel loss between Alice and Charlie is slightly different from the loss between Bob and Charlie. Based on the average photon numbers reported, we can determine the threshold value of the total counts C_{1,th} at detector D_{1} as well as its corresponding error probability P_{error}. Note that the total mean photon numbers in this implementation are close to but not exactly the optimal values. Therefore, the error probabilities for some cases are larger than ϵ = 10^{−5}. Nevertheless, the largest P_{error} is 2.7 × 10^{−5} that is tolerable^{30}. The total counts recorded by detector D_{1} for the equalinput case (C_{1,E}) and the different input cases (C_{1,D}) are also listed in Table 1. For all the seven different input sizes, Charlie could successfully differentiate between the equal and different inputs by comparing the total counts at D_{1} with the threshold C_{1,th}. Q is the total amount of information that has been transmitted to Charlie by Alice and Bob. It is calculated as the equivalent number of qubits that has been transmitted. To show the advantage of our WDM–CQF protocol, we calculated the ratio \({\gamma }_{{{{\rm{C}}}}}=32\sqrt{n}/Q\) (\(32\sqrt{n}\) is the minimum amount of communication required in the bestknown classical fingerprinting protocol^{25}), as well as the ratio of the amount of communication in the original CQF^{29} to Q (γ_{Q}). As shown in Table 1, for all the tested input sizes, γ_{C} and γ_{Q} are always larger than one, indicating that our WDM–CQF protocol not only requires less communication than the bestknown classical protocol, but also beats the original CQF protocol. For large input size, our implementation even reduces more than half of the amount of communication in the CQF protocol.
The experimental results are also illustrated in Fig. 5, which is a log–log plot of the amount of communication in different fingerprinting protocols as a function of input size n. The solid red line represents the amount of communication required in the bestknown classical fingerprinting protocol^{25}. Our experimental results are represented by purple squares. The orange circles correspond to the simulation of the original CQF system with the same experimental parameters. Figure 5 clearly shows that our WDM–CQF system can beat the bestknown classical fingerprinting protocol. More importantly, even with only sixwavelength channels, out system still significantly reduces the amount of communication in the original CQF protocol. For input size 1.44 × 10^{6} and 2.16 × 10^{6}, the amount of communication in the CQF system with a single wavelength is even higher than the classical system. In our experiment, the amount of communication is always less than the bestknown classical protocol. Especially for large input size, the advantage of using WDM is remarkable. For further comparison, we plot the experimental results reported in ref. ^{30}, which uses the same SPDs (ID220) to demonstrate the original CQF protocol with a singlewavelength channel. Note that the total distance implemented in ref. ^{30} is only about 5 km, which is much shorter than the 40 km total distance in our implementation. Yet, the amount of information communicated in ref. ^{30} is much higher than our experimental results. This comparison further validates the fact that by applying WDM and using simultaneous detection, one can remarkably improve the performance of the original CQF protocol and make the system more robust to experimental imperfections (such as dark counts and channel losses).
Discussion
Ideally, through applying sixwavelength channels, the communication time can also be decreased by a factor of six if all the wavelength components in each pulse are modulated simultaneously. But in our demonstration, we utilize the inherent chromatic dispersion of singlemode fibers to simplify the phasemodulation process. Considering that the sixwavelength components are phasemodulated one by one on Alice’s and Bob’s stations, our implementation does not strictly shorten the communication time. As a proofofconcept demonstration, our experiment mainly proves that applying WDM to the CQF system can significantly reduce the amount of communication. To strictly show that our WDM–CQF protocol can also reduce the communication time in experiment, one can simply change the phasemodulation process to enable Alice and Bob to phasemodulate the wavelength components simultaneously. This can be done by replacing the use of temporal dispersion for phase modulation in our demonstration by the use of spatial dispersion.
The main limitation of our experimental implementation is the tolerable wavelength channels of our system. In order to avoid the pulse collision during the phasemodulation process, the span of different wavelength components on Alice’s and Bob’s stations should be at most half of the pulserepetition period, that is, 10 ns in our system. Given the 800 ps modulation time for each channel and a channel spacing of 2.4 nm, at most 12wavelength channels with a bandwidth around 26 nm can be applied to our system. One can change the corresponding experimental parameters (such as repetition rate, modulation window, and δλ) to increase the tolerable channel numbers. More importantly, through using spatial dispersion to replace temporal dispersion, the above limitation can be removed. When the number of wavelength channels is increased, the current polarizationalignment method may not work due to the increased bandwidth. In this case, one can use a polarizer at the end of a longfiber spool to enforce the same polarization on different wavelength components. Since different wavelength components would undergo different attenuations by the polarizer, the signal intensities should be well adjusted to guarantee the same arrival intensities at Charlie’s station for different wavelength components. In our implementation, the intensity (μ/m) of each wavelength component is very low and channel spacing is not too narrow. Therefore, we ignore the possible cross talk^{43,44} between the adjacent channels and assume that the interference of pluses in each wavelength channel is independent. Further study about the crosstalk effect may be necessary if ultradense WDM (with a very small channel spacing δλ) is used.
In summary, we propose a variant of coherentstatebased quantum fingerprinting protocol with the use of WDM and simultaneous detection. We show that by using WDM, our proposed protocol can reduce the communication time of the original CQF protocol. More importantly, because of the simultaneous detection of many bits of information, the required amount of communication is significantly reduced in our WDM–CQF protocol. For an overall distance of as long as 40 km, our protocol with 100wavelength channels can still beat the limit of classical fingerprinting without using SNSPDs. We also show that compared with the original CQF protocol, our WDM–CQF protocol can surpass the bestknown classical fingerprinting protocol over a much longer distance. We have performed a proofofconcept experimental demonstration of the WDM–CQF protocol with sixwavelength channels. The experimental results clearly show that the WDM–CQF scheme significantly outperforms both the classical and coherent fingerprinting protocols. Our practical and economical demonstration of quantum fingerprinting further validates the superiority of quantum communication complexity over its classical counterpart and shows the feasibility of real applications.
We remark that we propose to use WDM to improve the performance of the CQF protocol in this work. But WDM is not the only way. The key feature of our method is to take the advantage of detecting many bits of information simultaneously. One can use other types of multiplexing techniques, such as TDM, or even use a combination of various multiplexing schemes. Note that WDM would not help classical fingerprinting protocol reduce the amount of communication. This is because, in the classical fingerprinting protocol, no matter how many wavelength channels are used, at most one bit of information can be processed with a single pair of detectors. Moreover, in the classical fingerprinting scheme, each classical bit is often sent with many photons. While in our WDM–CQF protocol, many fewer photons are sent from the users to the central node. So, there is a huge saving in terms of the energy cost of communication too. It would be interesting to expand our method to other quantum communication protocols. In fact, in the coherent quantum fingerprinting system, the measurement on Charlie’s side is equivalent to a swap test, which has been applied in many other quantum communication protocols, such as quantum digital signature^{45}. Our study introduces a promising method of using WDM to do such a test and shows the feasibility of applying WDM to other protocols.
Last but not least, in our implementation (and also in ref. ^{30,31}), a twoway quantum communication system is used to ensure that Alice and Bob have the matched global phase. In this case, Alice’s and Bob’s station are actually physically connected. To remove this connection and to enable Alice and Bob independently prepare their fingerprints, one could also employ the method in ref. ^{46}, where quantum fingerprinting based on higherorder interference is proposed and phase reference is not needed. An interesting question for future study could be whether we can still apply WDM to this method to further improve the communication efficiency. It would also be interesting to explore the possibility of using other degrees of freedom to increase the quantum channel capacity and make quantum communication more efficient.
Methods
Charlie’s decision mechanism
For Charlie to determine whether the inputs of Alice and Bob are equal or not, we adopt the method introduced in ref. ^{30} where a threshold value C_{1,th} is needed. When the total counts detected at Charlie’s detector D_{1} are smaller than the threshold C_{1,th}, Charlie announces that the inputs x and y are the same. Otherwise, Charlie announces that the inputs are different. The choice of threshold C_{1,th} is dependent on the input size n and the total average photon number μ. The details of this decision mechanism are described as follows.
In each detection window, the probabilities for D_{1} obtaining a click for the equal inputs (P_{E}) and 1bit different inputs (P_{D}) are given by Eqs. (6) and (7). In these two equations, M is the total number of pulses sent from Alice/Bob to Charlie and equals to
As mentioned before, since each detection event is independent, the distributions of the total counts registered at D_{1} f or the equal and different input cases can be modeled as the binomial distributions B(M, P_{E}) and B(M, P_{D}), respectively. Moreover, in each detection window, there are k pairs of coherent states at different wavelengths interfering simultaneously. The distributions of the total counts at D_{1} depend on the total number of pulses M sent to Charlie and the total mean photon number μ. Moreover, for the same M and μ, the distributions of the total counts at D_{1} for the equal and different input cases are different, leading to different expectation values
In the coherent fingerprinting scheme, the size of the inputs of interest is very large (n > 10^{5}) and the detection probabilities P_{E} and P_{D} are always as small as the darkcount probability. Therefore, the above binomial distributions in this case are well described by the Poisson distributions Poi(λ_{E}) and Poi(λ_{D}).
Figure 6 shows an example of the distributions of the total counts at D_{1} for both the sameinput case (blue curve) and differentinput (red curve) cases. As indicated, the probability distributions for the two cases are away from each other. For most of the time, the total counts for differentinput cases C_{1,D} are larger than the counts for the equalinput cases C_{1,E}. Therefore, Charlie could choose a threshold total count C_{1,th} and compare C_{1,th} with the detected photon counts at D_{1}. If the number of the detected counts is smaller (larger) than C_{1,th}, Charlie concludes that Alice and Bob have the same (different) inputs. The errors exist when C_{1,E} is actually larger than the threshold, or C_{1,D} is smaller than the threshold. The error probability for Charlie’s decision is indicated by Eq. (8). As long as P_{error} is smaller than the tolerable error probability ϵ, Charlie’s conclusion is acceptable.
Upper bound of error probability
In this section, an upper bound of Charlie’s error probability is discussed. For Poisson distributions, the Chernoff bound provides the upper bounds of probabilities P_{r}(C_{1,E} > C_{1,th}) and P_{r}(C_{1,D} < C_{1,th}) in Eq. (8) as
as long as the threshold C_{1,th} is chosen to satisfy
Moreover, if threshold C_{1,th} is the cross point of the two distributions Poi(λ_{E}) and Poi(λ_{D}), i.e.,
then the upper bounds for the error probabilities P_{r}(C_{1,E} > C_{1,th}) and P_{r}(C_{1,D} < C_{1,th}) are the same. In this case,
and the upper bound for Charlie’s error probability is
Optimization of μ
As indicated by the above equations, the error probability depends on the total number of pulses M and the total mean photon number μ. If M and μ are known, one can use Eq. (8) to search an optimal threshold C_{1,th} (between λ_{E} and λ_{D}) which gives the minimum error probability. As shown in Eq. (11), for a given system (ECC and k are fixed), M is only determined by the input size n. Now, the question is how to determine the average photon number μ for each value of M, as well as its corresponding optimal threshold C_{1,th}. On one hand, μ should be large enough such that the detection probabilities (P_{E} and P_{D}) are not dominated by P_{dark} and the error probability is below ϵ. On the other hand, since the amount of communication required is \(Q=O(\mu {{{{\rm{log}}}}}_{2}n)\), μ should be as small as possible. Therefore, there is a tradeoff between P_{error} and the minimum amount of communication Q. In our work, C_{1,th} is given by Eq. (16), which is a function of M and μ. Then for each value of M, the optimization of μ can be done by searching the minimum value of μ and the corresponding C_{1,th}, which satisfies the errorprobability condition, i.e., P_{error} < ϵ. As shown in Fig. 7a, the solid curves are the error probability P_{error} given in Eq. (8) as a function of the total number of photons μ for three different values of M (5 × 10^{7}, 5 × 10^{8}, and 5 × 10^{9}). The optimal μ for different M is indicated by the yellow circle, the corresponding P_{error} of which is just below the tolerable error probability ϵ = 10^{−5} (black solid line).
Or, more simply, we do not have to search the optimal μ one by one. We can fix the upper bound of P_{error} to be equal to ϵ, i.e.,
Then for each given M, one can directly calculate μ from the above equation. In this case, P_{error} can be always smaller than ϵ. In Fig. 7a, the dash curves are the upper bounds of P_{error} as a function of μ for different sizes of M. The calculated μ based on Eq. (18) for different M is indicated by the blue triangle. As shown in Fig. 7a, this calculated μ is larger than the optimal μ. For a small size of M, as in our experiment, searching the optimal μ can be done very quickly. For a very large size of M, searching optimal μ might be timeconsuming, while directly calculating μ is very straightforward. Note that this calculated μ is actually the upper bound, as indicated in Fig. 7b. The black solid curve is the optimal μ as a function of M and the red dash curve is the upper bound of μ calculated based on Eq. (18). Since \(Q=O(\mu {{{{\rm{log}}}}}_{2}n)\), for a given n, this upper bound of μ also gives the upper bound of the amount of communication in our WDM–CQF protocol. We remark that this upper bound might not be precise but fair enough as long as the Poisson distribution approximation used in “section A” is valid. The strict proof of this conclusion is out of the scope our paper.
Validity of simultaneous detection of k pairs of wavelength components
The advantage of transmitting less amount of information in our WDM–CQF protocol benefits from the shared detecting system for the k pair of wavelength components. As shown in Fig. 7b, the total average photon number μ is a function of the total number of pulses M sent out by Alice and Bob. In other words, as long as M is fixed, the average photon number in each wavelengthcomposite pulse is fixed, no matter how many wavelength components (k) it contains. For a fixed input size n, if more wavelength channels are used, the number of pulses sent from Alice/Bob to Charlie is reduced (M = n/(ck)). Consequently, less μ is required and the total amount of communication is reduced. Figure 8 shows the total average photon number μ required as a function of input size n for different values of k. It is clear that for largeinput size, the more wavelength channels are applied, the smaller value of mean photon number is required.
In Eqs. (6) and (7), the k pair of wavelength components interferes simultaneously and are detected by a single pair of SPDs. As mentioned before, we assume that only the states in the samewavelength channel would interfere with each other. In fact, in the coherent quantum fingerprinting protocol, to minimize the amount of communication, μ is always chosen to be so small that most of the pulses arriving at Charlie’s station are vacuum. At Charlie’s station, before the interference, the probabilities of each wavelength component being vacuum or having photons are
and (1 − P_{vac}), respectively. For each pair of interfering pulses sent out by Alice and Bob, there are in total 2k components. Then, the probability that, more than one component, either from Alice or Bob, carries photons when arriving at Charlie’s station is given by
In Fig. 9, we plot out the probability P as a function of the total number of pulses M. As shown in Fig. 9, for different values of k, this probability is always few orders of magnitude smaller than the dark count probability, which is around 5 × 10^{−8} in our simulation, especially for large M. As indicated in the enlarged Fig. 9b and Fig. 9c, when k increases from k = 1 to k = 1000, the increase of this probability is very small. That is to say, even for a value of k as large as 1000, we could ignore the case that more than onewavelength component carries photons when each pair of pulses arrive at Charlie’s beam splitter. In this case, even there are k pairs of wavelength components that interfere simultaneously in each detection window, the multiwavelength contributions to the detection event are negligible. The detected clicks mainly come from the photons in onewavelength component as well as the dark counts. Moreover, the information about which wavelength component has a photon is irrelevant, since Charlie’s decision is only determined by the total number of counts at detector D_{1}. Therefore, in our scheme, demultiplexing is not needed on Charlie’s station and one pair of SPDs is adequate.
We remark that when M is relatively small (smaller than 10^{6}), the above discussion would not be valid anymore, since the probability of the interfering pulses having more than one nonempty wavelength component would be too large to be ignored. Therefore, for the WDM–CQF system with different wavelength channels, the smallest size of input of interest is different. To benefit from applying a large number of wavelength channels, the input size should also be large.
Data availability
The data generated during the study are available from the corresponding author upon reasonable request.
References
Gisin, N. & Thew, R. Quantum communication. Nat. Photonics 1, 165 (2007).
Bennett, C. H., & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proc. of IEEE Int. Conf. on Comp., Syst. and Signal Proc., Bangalore, India, Dec. 10–12 (1984).
Ekert, A. K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991).
Gisin, N., Ribordy, G., Tittel, W. & Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002).
Lo, H.K., Curty, M. & Tamaki, K. Secure quantum key distribution. Nat. Photonics 8, 595–604 (2014).
Xu, F., Ma, X., Zhang, Q., Lo, H. K., & Pan, J. W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020).
Yao, A. C.C. Quantum circuit complexity. In Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science (IEEE, 1993).
Klauck, H. Quantum communication complexity. Preprint at https://arxiv.org/abs/quantph/0005032 (2000).
De Wolf, R. Quantum communication and complexity. Theor. Computer Sci. 287, 337–353 (2002).
Brassard, G. Quantum communication complexity. Found. Phys. 33, 1593–1616 (2003).
Yao, A. C.C. Some complexity questions related to distributive computing. In Proceedings of the eleventh annual ACM symposium on Theory of computing, 209–213 (1979).
Papadimitriou, C. H. & Sipser, M. Communication complexity. In Proceedings of the fourteenth annual ACM symposium on Theory of computing, 196–200 (ACM, 1982).
Kushilevitz, E. Communication complexity. Adv. Computers 44, 331–360 (1997).
Miltersen, P. B., Nisan, N., Safra, S. & Wigderson, A. On data structures and asymmetric communication complexity. J. Computer Syst. Sci. 57, 37–49 (1998).
Cleve, R., Van Dam, W., Nielsen, M. and Tapp, A. Quantum entanglement and the communication complexity of the inner product function. In NASA International Conference on Quantum Computing and Quantum Communications (Springer, 1998).
Buhrman, H., Cleve, R., & Wigderson, A. Quantum vs. classical communication and computation. In Proceedings of the thirtieth annual ACM symposium on Theory of computing, 63–68 (ACM, 1998).
Raz, R. Exponential separation of quantum and classical communication complexity. In Proceedings of the thirtyfirst annual ACM symposium on Theory of computing (ACM, 1999).
Brukner, Č., Żukowski, M., Pan, J. W. & Zeilinger, A. Bell’s inequalities and quantum communication complexity. Phys. Rev. Lett. 92, 127901 (2004).
Gavinsky, D., Kempe, J., Kerenidis, I., Raz, R. & De Wolf, R. Exponential separations for oneway quantum communication complexity, with applications to cryptography. In Proceedings of the thirtyninth annual ACM symposium on Theory of computing, 516–525 (ACM, 2007).
Wei, K. et al. Experimental quantum switching for exponentially superior quantum communication complexity. Phys. Rev. Lett. 122, 120504 (2019).
Buhrman, H., Cleve, R., Watrous, J. & De Wolf, R. Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001).
Yao, A. C.C. On the power of quantum fingerprinting. In Proceedings of the thirtyfifth annual ACM symposium on Theory of computing, 77–81 (ACM, 2003).
Ambainis, A. Communication complexity in a 3computer model. Algorithmica 16, 298–301 (1996).
Newman, I. and Szegedy, M. Public vs. Private coin flips in one round communication games (Extended Abstract). In Proceedings of the twentyeighth annual ACM symposium on Theory of computing, 561–570 (ACM, 1996).
Babai, L. and Kimmel, P. G. Randomized simultaneous messages: Solution of a problem of Yao in communication complexity. In Proceedings of Computational Complexity. Twelfth Annual IEEE Conference, 239–246 (IEEE, 1997).
de Beaudrap, J. N. Onequbit fingerprinting schemes. Phys. Rev. A 69, 022307 (2004).
Hor, R. T., Babichev, S. A., Marzlin, K. P., Lvovsky, A. I. & Sanders, B. C. Singlequbit optical quantum fingerprinting. Phys. Rev. Lett. 95, 150502 (2005).
Du, J. et al. Experimental quantum multimeter and onequbit fingerprinting. Phys. Rev. A 74, 042319 (2006).
Arrazola, J. M. & Lütkenhaus, N. Quantum fingerprinting with coherent states and a constant mean number of photons. Phys. Rev. A 89, 062305 (2014).
Xu, F. et al. Experimental quantum fingerprinting with weak coherent pulses. Nat. Commun. 6, 8735 (2015).
Guan, J. Y. et al. Observation of quantum fingerprinting beating the classical limit. Phys. Rev. Lett. 116, 240502 (2016).
Ishio, H., Minowa, J. & Nosu, K. Review and status of wavelengthdivisionmultiplexing technology and its application. J. Lightwave Technol. 2, 448–463 (1984).
Banerjee, A. et al. Wavelengthdivisionmultiplexed passive optical network (WDMPON) technologies for broadband access: a review. J. Optical Netw. 4, 737–758 (2005).
Brassard, G., Bussieres, F., Godbout, N. and Lacroix, S. Multiuser quantum key distribution using wavelength division multiplexing. In Applications of Photonic Technology, 6, Vol. 5260 (International Society for Optics and Photonics, 2003).
Kumar, N., Diamanti, E. & Kerenidis, I. Efficient quantum communications with coherent state fingerprints over multiple channels. Phys. Rev. A 95, 032337 (2017).
Zhu, E. Y. et al. Toward a reconfigurable quantum network enabled by a broadband entangled source. JOSA B 36, B1–B6 (2019).
Vareille, G., Pitel, F. and Marcerou, J. F. 3 Tbit/s (300 × 11. 6 Gbit/s) transmission over 7380 km using C + L band with 25 GHz channel spacing and NRZ format. In Optical Fiber Communication Conference, p. PD22 (Optical Society of America, 2001).
Suzuki, H. et al. 12.5 GHz spaced 1.28 Tb/s (512channel × 2.5 Gb/s) superdense WDM transmission over 320 km SMF using multiwavelength generation technique. IEEE Photonics Technol. Lett. 14, 405–407 (2002).
Zhong, X., Hu, J., Curty, M., Qian, L. & Lo, H.K. Proofofprinciple experimental demonstration of twinfield type quantum key distribution. Phys. Rev. Lett. 123, 100506 (2019).
Rashleigh, S. C. & Ulrich, R. Polarization mode dispersion in singlemode fibers. Opt. Lett. 3, 60–62 (1978).
Poole, C. D. & Wagner, R. E. Phenomenological approach to polarisation dispersion in long singlemode fibres. Electron. Lett. 22, 1029–1030 (1986).
Gordon, J. P. & Kogelnik, H. PMD fundamentals: Polarization mode dispersion in optical fibers. Proc. Natl Acad. Sci. 97, 4541–4550 (2000).
Chraplyvy, A. R. & Henry, P. S. Performance degradation due to stimulated Raman scattering in wavelengthdivisionmultiplexed opticalfibre systems. Electron. Lett. 19, 641–643 (1983).
Agrawal, G. P., Nonlinear fiber optics 5th edn, Chapter 8, pp 295–352 (Academic Press, 2013).
Gottesman, D. & Chuang, I. Quantum digital signatures. arXiv preprint: https://arxiv.org/abs/quantph/0105032 (2001).
Jachura, M., Jarzyna, M., Lipka, M., Wasilewski, W. & Banaszek, K. Visibilitybased hypothesis testing using higherorder optical interference. Phys. Rev. Lett. 120, 110502 (2018).
Acknowledgements
We thank Shihan Sajeed, Olinka Bedroya, and Wenyuan Wang for their insightful discussion and suggestions. We also thank funding from NSERC, CFI, ORF, MITACS, US ONR, Royal Bank of Canada and Huawei Technologies Canada Inc, and the University of Hong Kong startup grant.
Author information
Authors and Affiliations
Contributions
X.Z., H.K.L., and L.Q. proposed this project. X.Z. built the theory model. F.X. and H.K.L. helped modify the theory model. X.Z. designed and performed the experiment. L.Q. helped design the experiment and contributed to the discussion of experimental results. H.K.L. and L.Q. supervised this project. X.Z. wrote the paper. All the authors commented and revised the paper.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Peer review information Nature Communications thanks Anthony Martin, Guilherme Temporão, Niraj Kumar and the other anonymous reviewer(s) for their contribution to the peer review of this work. Peer reviewer reports are available.
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary information
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Zhong, X., Xu, F., Lo, HK. et al. Efficient experimental quantum fingerprinting with channel multiplexing and simultaneous detection. Nat Commun 12, 4464 (2021). https://doi.org/10.1038/s4146702124745x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s4146702124745x
This article is cited by

Quantum NETwork: from theory to practice
Science China Information Sciences (2023)

600km repeaterlike quantum communications with dualband stabilization
Nature Photonics (2021)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.