scispace - formally typeset
Search or ask a question
Author

Zong-Wen Yu

Bio: Zong-Wen Yu is an academic researcher from Tsinghua University. The author has contributed to research in topics: Quantum key distribution & Key (cryptography). The author has an hindex of 17, co-authored 46 publications receiving 1793 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This record-breaking implementation of the MDIQKD method provides a new distance record and achieves a distance that the traditional Bennett-Brassard 1984 QKD would not be able to achieve with the same detection devices even with ideal single-photon sources.
Abstract: A protocol for secure quantum communications has been demonstrated over a record-breaking distance of 404 km.

737 citations

Journal ArticleDOI
TL;DR: In this article, the authors proposed a sending or not sending (Sending or Not sending) protocol based on the twin-field quantum key distribution (TF-QKD), which can tolerate large misalignment error.
Abstract: Based on the novel idea of twin-field quantum key distribution [TF-QKD; Lucamarini et al., Nature (London) 557, 400 (2018)], we present a protocol named the ``sending or not sending TF-QKD'' protocol, which can tolerate large misalignment error. A revolutionary theoretical breakthrough in quantum communication, TF-QKD changes the channel-loss dependence of the key rate from linear to square root of channel transmittance. However, it demands the challenging technology of long-distance single-photon interference, and also, as stated in the original paper, the security proof was not finalized there due to the possible effects of the later announced phase information. Here we show by a concrete eavesdropping scheme that the later phase announcement does have important effects and the traditional formulas of the decoy-state method do not apply to the original protocol. We then present our ``sending or not sending'' protocol. Our protocol does not take postselection for the bits in $Z$-basis (signal pulses), and hence the traditional decoy-state method directly applies and automatically resolves the issue of security proof. Most importantly, our protocol presents a negligibly small error rate in $Z$-basis because it does not request any single-photon interference in this basis. Thus our protocol greatly improves the tolerable threshold of misalignment error in single-photon interference from the original a few percent to more than $45%$. As shown numerically, our protocol exceeds a secure distance of 700, 600, 500, or 300 km even though the single-photon interference misalignment error rate is as large as $15%, 25%, 35%$, or $45%$.

266 citations

Journal ArticleDOI
TL;DR: This work presents a four-intensity protocol for the decoy-state MDI-QKD that hugely raises the key rate, especially in the case in which the total data size is not large.
Abstract: The relatively low key rate seems to be the major barrier to its practical use for the decoy-state measurement-device-independent quantum key distribution (MDI-QKD). We present a four-intensity protocol for the decoy-state MDI-QKD that hugely raises the key rate, especially in the case in which the total data size is not large. Also, calculations show that our method makes it possible for secure private communication with fresh keys generated from MDI-QKD with a delay time of only a few seconds.

250 citations

Journal ArticleDOI
TL;DR: In this paper, the authors demonstrate a secure key distribution that breaks the absolute key-rate limit of repeaterless QKD over a 509km-long ultralow loss optical fiber.
Abstract: Twin-field (TF) quantum key distribution (QKD) promises high key rates over long distances to beat the rate-distance limit. Here, applying the sending-or-not-sending TF QKD protocol, we experimentally demonstrate a secure key distribution that breaks the absolute key-rate limit of repeaterless QKD over a 509-km-long ultralow loss optical fiber. Two independent lasers are used as sources with remote-frequency-locking technique over the 500-km fiber distance. Practical optical fibers are used as the optical path with appropriate noise filtering; and finite-key effects are considered in the key-rate analysis. The secure key rate obtained at 509 km is more than seven times higher than the relative bound of repeaterless QKD for the same detection loss. The achieved secure key rate is also higher than that of a traditional QKD protocol running with a perfect repeaterless QKD device, even for an infinite number of sent pulses. Our result shows that the protocol and technologies applied in this experiment enable TF QKD to achieve a high secure key rate over a long distribution distance, and is therefore practically useful for field implementation of intercity QKD.

233 citations

Journal ArticleDOI
TL;DR: This work adopts the technology developed in the frequency and time transfer to lock two independent laser wavelengths and utilizes additional phase reference light to estimate and compensate the fiber fluctuation and calculates the secure key rates with the finite size effect.
Abstract: Channel loss seems to be the most severe limitation on the practical application of long distance quantum key distribution. The idea of twin-field quantum key distribution can improve the key rate from the linear scale of channel loss in the traditional decoy-state method to the square root scale of the channel transmittance. However, the technical demands are rather tough because they require single photon level interference of two remote independent lasers. Here, we adopt the technology developed in the frequency and time transfer to lock two independent laser wavelengths and utilize additional phase reference light to estimate and compensate the fiber fluctuation. Further, with a single photon detector with a high detection rate, we demonstrate twin field quantum key distribution through the sending-or-not-sending protocol with a realistic phase drift over 300 km optical fiber spools. We calculate the secure key rates with the finite size effect. The secure key rate at 300 km (1.96×10^{-6}) is higher than that of the repeaterless secret key capacity (8.64×10^{-7}).

223 citations


Cited by
More filters
Journal ArticleDOI
09 Aug 2017-Nature
TL;DR: This work reports the development and launch of a low-Earth-orbit satellite for implementing decoy-state QKD—a form ofQKD that uses weak coherent pulses at high channel loss and is secure because photon-number-splitting eavesdropping can be detected.
Abstract: Quantum key distribution (QKD) uses individual light quanta in quantum superposition states to guarantee unconditional communication security between distant parties. However, the distance over which QKD is achievable has been limited to a few hundred kilometres, owing to the channel loss that occurs when using optical fibres or terrestrial free space that exponentially reduces the photon transmission rate. Satellite-based QKD has the potential to help to establish a global-scale quantum network, owing to the negligible photon loss and decoherence experienced in empty space. Here we report the development and launch of a low-Earth-orbit satellite for implementing decoy-state QKD-a form of QKD that uses weak coherent pulses at high channel loss and is secure because photon-number-splitting eavesdropping can be detected. We achieve a kilohertz key rate from the satellite to the ground over a distance of up to 1,200 kilometres. This key rate is around 20 orders of magnitudes greater than that expected using an optical fibre of the same length. The establishment of a reliable and efficient space-to-ground link for quantum-state transmission paves the way to global-scale quantum networks.

1,216 citations

Journal ArticleDOI
16 Jun 2017-Science
TL;DR: Satellite-based distribution of entangled photon pairs to two locations separated by 1203 kilometers on Earth, through two satellite-to-ground downlinks is demonstrated, with a survival of two-photon entanglement and a violation of Bell inequality.
Abstract: Long-distance entanglement distribution is essential for both foundational tests of quantum physics and scalable quantum networks. Owing to channel loss, however, the previously achieved distance was limited to ~100 kilometers. Here we demonstrate satellite-based distribution of entangled photon pairs to two locations separated by 1203 kilometers on Earth, through two satellite-to-ground downlinks with a summed length varying from 1600 to 2400 kilometers. We observed a survival of two-photon entanglement and a violation of Bell inequality by 2.37 ± 0.09 under strict Einstein locality conditions. The obtained effective link efficiency is orders of magnitude higher than that of the direct bidirectional transmission of the two photons through telecommunication fibers.

917 citations

Journal ArticleDOI
02 May 2018-Nature
TL;DR: This work introduces an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station, enabling a form of quantum key distribution that can exceed the secret-key capacity without using quantum repeaters and that has security independent of the measuring devices.
Abstract: Quantum key distribution (QKD)1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration4. Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters5–7, is overcoming the fundamental rate–distance limit of QKD8. This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are ‘twins’ and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate–distance limit of QKD and greatly extending the range of secure quantum communications. Twin optical fields enable a form of quantum key distribution that can exceed the secret-key capacity without using quantum repeaters and that has security independent of the measuring devices.

787 citations

Journal ArticleDOI
TL;DR: This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Abstract: Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this paper, we provide both a general introduction and a state-of-the-art description of the recent advances in the field, both theoretical and experimental. We start by reviewing protocols of quantum key distribution based on discrete variable systems. Next we consider aspects of device independence, satellite challenges, and protocols based on continuous-variable systems. We will then discuss the ultimate limits of point-to-point private communications and how quantum repeaters and networks may overcome these restrictions. Finally, we will discuss some aspects of quantum cryptography beyond standard quantum key distribution, including quantum random number generators and quantum digital signatures.

769 citations