N ov 2 01 3 Entanglement-based quantum key distribution with biased basis choice via free space
Yuan Cao,Hao Liang,Juan Yin,Hai-Lin Yong,Fei Zhou,Yu-Ping,Wu,Ji-Gang Ren,Yu-Huai Li,Ge-Sheng Pan,Tao Yang,Xiongfeng Ma,Cheng-Zhi Peng,Jian-Wei Pan
2019-01-01
Abstract:We report a free-space entanglement-based quantum key distribution experiment, implementing the biased basis proto c l between two sites which are 15 .3 km apart. Photon pairs from a polarization-entangled source are distributed through two 7.8-km free-space optic al l nks. An optimal bias 20:80 between the X andZ basis is used. A post-processing scheme with finite-key analysis is applied to extract the fina l secure key. After three-hour continuous operation at night, a 4293-bit secure key is obtained, with a final key rate of 0.124 bit per raw key bit whic h ncreases the final key rate by 14 .8% comparing to the standard BB84 case. Our results experimentally demonstrate that the efficient BB84 protocol, which increases key generation efficiency by biasing Alice and Bob ’s basis choices, is potentially useful for the ground-satellite qu antum communication. © 2019 Optical Society of America OCIS codes: (270.0270) Quantum optics; (270.5565) Quantum communicat ions; (270.5585) Quantum information and processing. References and links 1. C. H. Bennett, and G. Brassard, “Quantum Cryptography: Pu blic Key Distribution and Coin Tossing,” inProceedings of the IEEE International Conference on Computers, Systems and Signal Processing, New York, 175 (1985). 2. C. H. Bennett, “Quantum cryptography using any two nonort hogonal states,” Phys. Rev. Lett. 68, 3121–3124 (1992). 3. A. K. Ekert, “Quantum cryptography based on Bell’s theore m,” Phys. Rev. Lett. 67, 661–663 (1991). 4. C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryp tography without Bell’s theorem,” Phys. Rev. Lett. 68, 557–559 (1992). 5. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” Journal of Cryptology(5), 3–28 (1992). 6. In fact, commercial QKD systems have already been availab le in the market, for example, www.magiqtech.com; www.idquantique.com; www.quantum-info.com. 7. A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe and A. J. Shi elds, “Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate,” Opt. Express 16, 18790–18979 (2008). 8. Z. L. Yuan, A. R. Dixon, J. F. Dynes, A. W. Sharpe, and A. J. Sh ields, “Practical gigahertz quantum key distribution based on avalanche photodiodes,” New Journal of Physic s 11, 045019 (2009). 9. Y. Liu, T.-Y. Chen, J. Wang, W.-Q. Cai, X. Wan, L.-K. Chen, J .-H. Wang, S.-B. Liu, H. Liang, L. Yang, C.Z. Peng, K. Chen, Z.-B. Chen and J.-W. Pan, “Decoy-state quan tum key distribution with polarized photons over 200 km,” Opt. Express18, 8587–8594 (2010). 10. M. Aspelmeyer, T. Jennewein, M. Pfennigbauer, W. Leeb, a nd A. Zeilinger, “Long-distance quantum communication with entangled photons using satellites,” Selected Topics in Quantum Electron 9, 1514–1551 (2003). 11. T. Schmitt-Manderbach, H. Weier, M. Furst, R. Ursin, F. T iefenbacher, T. Scheidl, J. Perdigues, Z. Sodnik, J. G. Rarity, A. Zeilinger, and H. Weinfurter, “Experimental d emonstration of free-space decoy-state quantum key distribution over 144 km,” Phys. Rev. Lett. 98, 010504 (2007). 12. R. Ursin, F. Tiefenbacher, T. Schmitt-Manderbach, H. We ier, T. Scheidl, M. Lindenthal, B. Blauensteiner, T. Jennewein, J. Perdigues, P. Trojek, B. Omer, M. Frst, M. Meyenbu rg, J. Rarity, Z. Sodnik, C. Barbieri, H. Weinfurter, and A. Zeilinger, “Entanglement-based quantum com munication over 144 km,” Nature Physics 3, 481–486 (2007). 13. C.-Z. Peng, T. Yang, X.-H. Bao, J. Zhang, X.-M. Jin, F.-Y. Feng, B. Yang, J. Yang, J. Yin, Q. Zhang, N. Li, B.-L. Tian, and J.-W. Pan, “Experimental free-space distri bu ion of entangled photon pairs over 13 km: towards satellite-based global quantum communication,” Phys. Rev L tt. 94, 150501 (2005). 14. C. Erven, C. Couteau, R. Laflamme, and G. Weihs, “Entangle d quantum key distribution over two free-space optical links,” Opt. Express16, 16840–16853 (2008). 15. S. Nauerth, F. Moll, M. Rau, J. Horwath, S. Frick, C. Fuchs , and H. Weinfurter, “Air-to-ground quantum communication,” Nature Photonics 7, 382–386 (2013). 16. J.-Y. Wang, B. Yang, S.-K. Liao, L. Zhang, Q. Shen, X.-F. H u, J.-C. Wu, S.-J. Yang, H. Jiang, Y.-L. Tang, B. Zhong, H. Liang, W.-Y. Liu, Y.-H. Hu, Y.-M. Huang, B. Qi, J.-G . Ren, G.-S. Pan, J. Yin, J.-J. Jia, Y.-A.Chen, K. Chen, C.-Z.Peng, J.-W. Pan, “Direct and full-scale experim ntal verifications towards ground-satellite quantum key distribution,” Nature Photonics 7, 387–393 (2013). 17. J. Yin, J.-G. Ren, H. Lu, Y. Cao, H.-L. Yong, Y.-P. Wu, C. Li u, S.-K. Liao, F. Zhou, Y. Jiang, X.-D. Cai, P. Xu, G.-S. Pan, J.-J. Jia, Y.-M. Huang, H. Yin, J.-Y. Wang, Y.-A. C hen, C.-Z. Peng, J.-W. Pan, “Quantum teleportation and entanglement distribution over 100-kilometre free-sp ace channels,” Nature 488, 185–188 (2012). 18. X.-S. Ma, T. Herbst, T. Scheidl, D. Wang, S. Kropatschek, W. Naylor, B. Wittmann, A. Mech, J. Kofler, E. Anisimova, V. Makarov, T. Jennewein, R. Ursin, and A. Zeilin ger, “Quantum teleportation over 143 kilometres using active feed-forward,” Nature 489, 269–273 (2012). 19. H.-K. Lo, H. F. Chau, M. Ardehali “Efficient quantum key di stribution scheme and a proof of its unconditional security,” Journal of Cryptology18, 133–165 (2005). 20. C. Erven, X. Ma, R. Laflamme, and G. Weihs, “Entangled quan tum key distribution with a biased basis choice,” New Journal of Physics 11, 045025 (2009). 21. X. Ma, C.-H. F. Fung, J.-C. Boileau, and H.F. Chau, “Unive rsally composable and customizable post-processing for practical quantum key distribution,” Computers & Secur ity 30, 172–177 (2011). 22. C.-H. F. Fung, X. Ma, and H. F. Chau, “Practical issues in q uantum-key-distribution postprocessing,” Phys. Rev. A 81, 012318 (2010). 23. X.-Y. Hu, E. Eleftheriou, and D. M. Arnold, “Regular and i rregular progressive edge-growth tanner graphs,” Information Theory, IEEE Transactions on 51, 386 (2005). 24. M. Koashi and J. Preskill, “Secure quantum key distribut ion with an uncharacterized source,” Phys. Rev. Lett. 90, 057902 (2003). 25. This can be simply calculated by comparing the basis-sif t factor of 0.22+0.82 = 0.68 to 1/2. 26. F. Steinlechner, P. Trojek, M. Jofre, H. Weier, D. Perez, T. Jennewein, R. Ursin, J. Rarity, M. W. Mitchell, J. P. Torres, H. Weinfurter, and V. Pruneri, “A high-brightness s ource of polarization-entangled photons optimized for applications in free space,” Opt. Express 20, 9640–9649 (2012). 27. H. Xin, “Chinese academy takes space under its wing,” Sci ence332, 904 (2011). 28. R. Stone, “Entangled Secret Messages From Space,” Scien ce336, 1632 (2012). 29. C. Bonato, A. Tomaello, V. D. Deppo, G. Naletto and P. Vill oresi, “Feasibility of satellite quantum key distribution,” New Journal of Physics 11, 045017 (2005). 30. J. Yin, Y. Cao, S.-B. Liu, G.-S. Pan, J.-H. Wang, T. Yang, Z .-P. Zhang, F.-M. Yang, Y.-A. Chen, C.-Z. Peng, and J.-W Pan, “Experimental quasi-single-photon transmissio n fr m satellite to earth,” Opt. Express 21 20032-20040 (2013) 31. M. J. LaGasse, “Secure use of a single single-photon dete ctor in a QKD system,” US patent application 20050190922, (2005). 32. B. Qi, C.-H. F. Fung, H.-K. Lo, and X. Ma, “Time-shift atta ck in practical quantum cryptosystems,” Quantum Inf. Comput.7, 073 (2007). 33. Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen, and H.-K. Lo, “Quant um hacking: Experimental demonstration of timeshift attack against practical quantum-key-distribution systems,” Phys. Rev. A78, 042333 (2008). 34. V. Makarov, A. Anisimov, and J. Skaar, “Effects of detect or efficiency mismatch on security of quantum cryptosystems,” Phys. Rev. A74, 022313 (2006). 35. N. Jain, C. Wittmann, L. Lydersen, C. Wiechers, D. Elser, C. Marquardt, V. Makarov, and G. Leuchs, “Device calibration impacts security of quantum key distribution, ” Phys. Rev. Lett.107, 110501 (2011). 36. J. Yin, Y. Cao, H.-L. Yong, J.-G. Ren, H. Liang, S.-K. Liao , F. Zhou, C. Liu, Y.-P. Wu, G.-S. Pan, L. Li, N.-L. Liu, Q. Zhang, C.-Z. Peng, and J.-W. Pan, “Lower bound on the s peed of nonlocal correlations without locality and measurement choice loopholes,” Phys. Rev. Lett. 110, 260407 (2013).