Skip to main content

Showing 1–50 of 167 results for author: Lo, H

  1. arXiv:2407.08009  [pdf, other

    quant-ph

    Long-fiber Sagnac interferometers for twin field quantum key distribution networks

    Authors: Reem Mandil, Li Qian, Hoi-Kwong Lo

    Abstract: A Sagnac loop structure can help overcome the major difficulty in the practical implementation of a twin field quantum key distribution (TFQKD) network, namely, the need to stabilize the phase of a quantum state over many kilometers of fiber. Unfortunately, Rayleigh backscattering noise limits the signal-to-noise ratio for Sagnac systems containing long fibers and lossy photonic devices. Here, we… ▽ More

    Submitted 15 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: Updated to include one missing citation

  2. arXiv:2404.14216  [pdf, other

    quant-ph

    Security flaws from time-varying active encoding in high-speed measurement-device-independent quantum key distribution

    Authors: Amita Gnanapandithan, Li Qian, Hoi-Kwong Lo

    Abstract: Quantum key distribution (QKD) can transmit secret keys with, in principle, information-theoretic security. However, bandwidth limitations in practical equipment threaten the security of high-speed (GHz) QKD systems. We propose and characterize a new side channel which arises when using active encoding. As an illustrative example, we focus on electro-optic phase modulation for polarization encodin… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  3. arXiv:2402.09285  [pdf, other

    quant-ph

    GraphiQ: Quantum circuit design for photonic graph states

    Authors: Jie Lin, Benjamin MacLellan, Sobhan Ghanbari, Julie Belleville, Khuong Tran, Luc Robichaud, Roger G. Melko, Hoi-Kwong Lo, Piotr Roztocki

    Abstract: GraphiQ is a versatile open-source framework for designing photonic graph state generation schemes, with a particular emphasis on photon-emitter hybrid circuits. Built in Python, GraphiQ consists of a suite of design tools, including multiple simulation backends and optimization methods. The library supports scheme optimization in the presence of circuit imperfections, as well as user-defined opti… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: 8+10 pages, 4+5 figures

  4. arXiv:2401.00635  [pdf, other

    quant-ph

    Optimization of deterministic photonic graph state generation via local operations

    Authors: Sobhan Ghanbari, Jie Lin, Benjamin MacLellan, Luc Robichaud, Piotr Roztocki, Hoi-Kwong Lo

    Abstract: Realizing photonic graph states, crucial in various quantum protocols, is challenging due to the absence of deterministic entangling gates in linear optics. To address this, emitter qubits are leveraged to establish and transfer the entanglement to photons. We introduce an optimization method for such protocols based on the local Clifford equivalency of states and the graph-shape correlated genera… ▽ More

    Submitted 31 December, 2023; originally announced January 2024.

    Comments: 12 pages, 13 figures

  5. arXiv:2309.07673  [pdf, other

    quant-ph

    Fully Passive Measurement-Device-Independent Quantum Key Distribution

    Authors: Jinjie Li, Wenyuan Wang, Hoi-Kwong Lo

    Abstract: A recently proposed fully passive QKD removes all source modulator side channels. In this work, we combine the fully passive sources with MDI-QKD to remove simultaneously side channels from source modulators and detectors. We show a numerical simulation of the passive MDI-QKD, and we obtain an acceptable key rate while getting much better implementation security, as well as ease of implementation,… ▽ More

    Submitted 5 December, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

  6. arXiv:2304.13789  [pdf, other

    cs.CR quant-ph

    Composable Security of Distributed Symmetric Key Exchange Protocol

    Authors: Jie Lin, Manfred von Willich, Hoi-Kwong Lo

    Abstract: The Distributed Symmetric Key Exchange (DSKE) protocol provides secure secret exchange (e.g., for key exchange) between two honest parties that need not have had prior contact, and use intermediaries with whom they each securely share confidential data. We show the composable security of the DSKE protocol in the constructive cryptography framework of Maurer. Specifically, we prove the security (co… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 15+6 pages, 5 figures

  7. arXiv:2304.12062  [pdf, other

    quant-ph

    Fully-Passive Twin-Field Quantum Key Distribution

    Authors: Wenyuan Wang, Rong Wang, Hoi-Kwong Lo

    Abstract: We propose a fully-passive twin-field quantum key distribution (QKD) setup where basis choice, decoy-state preparation and encoding are all implemented entirely by post-processing without any active modulation. Our protocol can remove the potential side-channels from both source modulators and detectors, and additionally retain the high key rate advantage offered by twin-field QKD, thus offering g… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

  8. arXiv:2304.10374  [pdf, other

    quant-ph

    Proof-of-Principle Demonstration of Fully-Passive Quantum Key Distribution

    Authors: Chengqiu Hu, Wenyuan Wang, Kai-Sum Chan, Zhenghan Yuan, Hoi-Kwong Lo

    Abstract: Quantum key distribution (QKD) offers information-theoretic security based on the fundamental laws of physics. However, device imperfections, such as those in active modulators, may introduce side-channel leakage, thus compromising practical security. Attempts to remove active modulation, including passive decoy intensities preparation and polarization encoding, have faced theoretical constraints… ▽ More

    Submitted 9 May, 2023; v1 submitted 20 April, 2023; originally announced April 2023.

    Comments: 9 pages, 7 figures

  9. Generation of a time-bin Greenberger--Horne--Zeilinger state with an optical switch

    Authors: Hsin-Pin Lo, Takuya Ikuta, Koji Azuma, Toshimori Honjo, William J. Munro, Hiroki Takesue

    Abstract: Multipartite entanglement is a critical resource in quantum information processing that exhibits much richer phenomenon and stronger correlations than in bipartite systems. This advantage is also reflected in its multi-user applications. Although many demonstrations have used photonic polarization qubits, polarization-mode dispersion confines the transmission of photonic polarization qubits throug… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    Comments: 8 pages, 4 figures, 1 table

    Journal ref: Quantum Science and Technology 8, 035003 (2023)

  10. arXiv:2303.11167  [pdf, other

    quant-ph

    Quantum Discord Witness with Uncharacterized Devices

    Authors: Rong Wang, Yao Yao, Zhen-Qiang Yin, Hoi-Kwong Lo

    Abstract: Quantum discord represents a correlation beyond classicality that could be useful for many quantum information tasks, and therefore is viewed as a valuable quantum resource. Theoretically, whether a bipartite quantum state has a non-zero amount of quantum discord or not can be determined once its density matrix is given. Experimentally, however, it is not easy to perform a reliable tomography on t… ▽ More

    Submitted 15 April, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  11. arXiv:2302.10452  [pdf, other

    physics.optics quant-ph

    Observation of binary phase states of time-multiplexed degenerate optical parametric oscillator pulses generated using a nonlinear fiber Sagnac loop

    Authors: Hsin-Pin Lo, Takahiro Inagaki, Toshimori Honjo, Hiroki Takesue

    Abstract: We generated time-multiplexed degenerate optical parametric oscillator (DOPO) pulses using a nonlinear fiber Sagnac loop as a phase-sensitive amplifier (PSA) where the pump and amplified light in pump-signal-idler degenerate four-wave mixing can be spatially separated. By placing the PSA in a fiber cavity, we successfully generated more than 5,000 time-multiplexed DOPO pulses. We confirmed the bif… ▽ More

    Submitted 21 February, 2023; originally announced February 2023.

    Comments: 5 pages, 3 figures, 1 table

  12. Quantum repeaters: From quantum networks to the quantum internet

    Authors: Koji Azuma, Sophia E. Economou, David Elkouss, Paul Hilaire, Liang Jiang, Hoi-Kwong Lo, Ilan Tzitrin

    Abstract: A quantum internet is the holy grail of quantum information processing, enabling the deployment of a broad range of quantum technologies and protocols on a global scale. However, numerous challenges exist before the quantum internet can become a reality. Perhaps the most crucial of these is the realization of a quantum repeater, an essential component in the long-distance transmission of quantum i… ▽ More

    Submitted 18 July, 2023; v1 submitted 21 December, 2022; originally announced December 2022.

    Comments: 75 pages, 23 figures

    Journal ref: Rev. Mod. Phys. 95, 045006 (2023)

  13. arXiv:2212.01876  [pdf, other

    quant-ph

    Passive continuous variable quantum key distribution

    Authors: Chenyang Li, Chengqiu Hu, Wenyuan Wang, Rong Wang, Hoi-Kwong Lo

    Abstract: Passive quantum key distribution (QKD) has been proposed for discrete variable protocols to eliminate side channels in the source. Unfortunately, the key rate of passive DV-QKD protocols suffers from sifting loss and additional quantum errors. In this work, we propose the general framework of passive continuous variable quantum key distribution. Rather surprisingly, we find that the passive source… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

    Comments: 5 pages,4figures

  14. arXiv:2209.02707  [pdf, other

    quant-ph

    Resource-Efficient Real-Time Polarization Compensation for MDI-QKD with Rejected Data

    Authors: Olinka Bedroya, Chenyang Li, Wenyuan Wang, Jianyong Hu, Hoi-Kwong Lo, Li Qian

    Abstract: Measurement-device-independent quantum key distribution (MDI-QKD) closes all the security loopholes in the detection system and is a promising solution for secret key sharing. Polarization encoding is the most common QKD encoding scheme, as it is straightforward to prepare and measure. However, implementing polarization encoding in MDI QKD imposes extra challenges, as polarization alignment must b… ▽ More

    Submitted 23 April, 2024; v1 submitted 6 September, 2022; originally announced September 2022.

    Comments: 14 pages, 5 figures and 3 tables

  15. Fully-Passive Quantum Key Distribution

    Authors: Wenyuan Wang, Rong Wang, Victor Zapatero, Li Qian, Bing Qi, Marcos Curty, Hoi-Kwong Lo

    Abstract: Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed. Nonetheless, passive decoy-state generation and passive encoding have never been simultaneously implemented with linear optical elements before, whic… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  16. Characterisation of state-preparation uncertainty in quantum key distribution

    Authors: Anqi Huang, Akihiro Mizutani, Hoi-Kwong Lo, Vadim Makarov, Kiyoshi Tamaki

    Abstract: To achieve secure quantum key distribution, all imperfections in the source unit must be incorporated in a security proof and measured in the lab. Here we perform a proof-of-principle demonstration of the experimental techniques for characterising the source phase and intensity fluctuation in commercial quantum key distribution systems. When we apply the measured phase fluctuation intervals to the… ▽ More

    Submitted 9 January, 2023; v1 submitted 24 May, 2022; originally announced May 2022.

    Comments: 14 pages, 12 figures

    Journal ref: Phys. Rev. Appl. 19, 014048 (2023)

  17. arXiv:2205.00615  [pdf, other

    quant-ph cs.CR

    Distributed Symmetric Key Exchange: A scalable, quantum-proof key distribution system

    Authors: Hoi-Kwong Lo, Mattia Montagna, Manfred von Willich

    Abstract: We propose and implement a protocol for a scalable, cost-effective, information-theoretically secure key distribution and management system. The system, called Distributed Symmetric Key Exchange (DSKE), relies on pre-shared random numbers between DSKE clients and a group of Security Hubs. Any group of DSKE clients can use the DSKE protocol to distill from the pre-shared numbers a secret key. The c… ▽ More

    Submitted 24 November, 2022; v1 submitted 1 May, 2022; originally announced May 2022.

    Comments: Our protocol has been renamed Distributed Symmetric Key Exchange (DSKE). 11 pages, 6 figures

    MSC Class: 94A60 ACM Class: E.3

  18. arXiv:2111.13855  [pdf, other

    quant-ph

    Quantum Complementarity Approach to Device-Independent Security

    Authors: Xingjian Zhang, Pei Zeng, Tian Ye, Hoi-Kwong Lo, Xiongfeng Ma

    Abstract: Complementarity is an essential feature of quantum mechanics. The preparation of an eigenstate of one observable implies complete randomness in its complementary observable. In quantum cryptography, complementarity allows us to formulate security analyses in terms of phase-error correction. However, in the device-independent regime that offers security without device characterization, the concept… ▽ More

    Submitted 11 October, 2022; v1 submitted 27 November, 2021; originally announced November 2021.

    Comments: 57 pages, 21 figures, 4 tables; In this version, we have (1) added security statements for general device-independent tasks; (2) updated the finite-size analysis with Kato's inequality; (3) presented more numerical simulation results, including a detailed presentation of analysing the reported data from the recent ion-trap DIQKD experiment; (4) fixed a few typos

  19. Measurement device-independent quantum key distribution with passive, time-dependent source side-channels

    Authors: J. Eli Bourassa, Amita Gnanapandithan, Li Qian, Hoi-Kwong Lo

    Abstract: While measurement-device-independent (MDI) quantum key distribution (QKD) allows two trusted parties to establish a shared secret key from a distance without needing to trust a central detection node, their quantum sources must be well-characterized, with side-channels at the source posing the greatest loophole to the protocol's security. In this paper, we identify a time-dependent side-channel in… ▽ More

    Submitted 19 August, 2021; originally announced August 2021.

    Comments: 19 pages, 10 figures

  20. arXiv:2106.07768  [pdf, other

    quant-ph physics.optics

    Experiment on scalable multi-user twin-field quantum key distribution network

    Authors: Xiaoqing Zhong, Wenyuan Wang, Reem Mandil, Hoi-Kwong Lo, Li Qian

    Abstract: Twin-field quantum key distribution (TFQKD) systems have shown great promise for implementing practical long-distance secure quantum communication due to its measurement-device-independent nature and its ability to offer fundamentally superior rate-loss scaling than point-to-point QKD systems. A surge of research and development effort in the last two years has produced many variants of protocols… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

    Comments: 8 pages, 3 figures and 2 tables

  21. arXiv:2010.06054  [pdf, other

    quant-ph

    Detecting Entanglement in Unfaithful States

    Authors: Yongtao Zhan, Hoi-Kwong Lo

    Abstract: Entanglement witness is an effective method to detect entanglement in unknown states without doing full tomography. One of the most widespread schemes of witnessing entanglement is measuring its fidelity with respect to a pure entangled state. Recently, a large class of states whose entanglement can not be detected with the fidelity witness has been discovered in Phys.Rev.Lett \textbf{124},200502(… ▽ More

    Submitted 18 March, 2021; v1 submitted 12 October, 2020; originally announced October 2020.

    Comments: 9 pages

  22. arXiv:2010.03442  [pdf, other

    quant-ph

    Tagging idea in continuous variable quantum key distribution and its application

    Authors: Chenyang Li, Thomas Van Himbeeck, Li Qian, Hoi-Kwong Lo

    Abstract: Despite tremendous theoretical and experimental progress in continuous variable (CV) quantum key distribution (QKD), its security has not been rigorously established for practical systems with multiple imperfections. The idea of tagging is widely used in security proofs of discrete variable quantum key distribution with imperfect devices. In this paper, we generalize the tagging idea from discrete… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 8pages, 3 figures

  23. arXiv:2008.11628  [pdf, other

    quant-ph

    Tomography-based Quantum Key Distribution

    Authors: Yongtao Zhan, Hoi-Kwong Lo

    Abstract: It has previously been shown that quantum state tomography can be used to increase the key rate of quantum key distribution (QKD) for the special case of qubits (i.e.,d=2). Here, we consider the case of higher dimensions, i.e., qudits, and show that, for a prime number d>2, quantum state tomography can also improve the key rate of d-dimensional qudit-based QKD schemes, compared to the standard (d+… ▽ More

    Submitted 26 August, 2020; originally announced August 2020.

    Comments: 13 pages

  24. Loss-tolerant quantum key distribution with a twist

    Authors: J. Eli Bourassa, Ignatius William Primaatmaja, Charles Ci Wen Lim, Hoi-Kwong Lo

    Abstract: The security of measurement device-independent quantum key distribution (MDI QKD) relies on a thorough characterization of one's optical source output, especially any noise in the state preparation process. Here, we provide an extension of the loss-tolerant protocol [Phys. Rev. A 90, 052314 (2014)], a leading proof technique for analyzing the security of QKD, to MDI QKD protocols that employ mixed… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: 15 pages, 3 figures (including supplementary materials). Comments welcome

    Journal ref: Phys. Rev. A 102, 062607 (2020)

  25. arXiv:2005.06049  [pdf, other

    quant-ph physics.optics

    Efficient experimental quantum fingerprinting with wavelength division multiplexing

    Authors: Xiaoqing Zhong, Feihu Xu, Hoi-Kwong Lo, Li Qian

    Abstract: Quantum communication complexity studies the efficiency of information communication (that is, the minimum amount of communication required to achieve a certain task) using quantum states. One representative example is quantum fingerprinting, in which the simultaneous message passing model is considered and the minimum amount of communication could be exponentially smaller than the classical finge… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

    Comments: 11 pages, 5 figures

    Journal ref: Nat Commun 12, 4464 (2021)

  26. Precise tuning of single-photon frequency using optical single sideband modulator

    Authors: Hsin-Pin Lo, Hiroki Takesue

    Abstract: Frequency translation of single photons while preserving their quantum characteristics is an important technology for flexible networking of photonic quantum communication systems. Here we demonstrate a flexible scheme to interface different-color photons using an optical single sideband (OSSB) modulator. By changing the radio-frequency signal that drives the modulators, we can easily shift and pr… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

    Journal ref: Optica Vol. 4, Issue 8, pp. 919-923 (2017)

  27. Entanglement generation using a controlled-phase gate for time-bin qubits

    Authors: Hsin-Pin Lo, Takuya Ikuta, Nobuyuki Matsuda, Toshimori Honjo, Hiroki Takesue

    Abstract: Quantum logic gates are important for quantum computations and quantum information processing in numerous physical systems. While time-bin qubits are suited for quantum communications over optical fiber, many essential quantum logic gates for them have not yet been realized. Here, we demonstrated a controlled-phase (C-Phase) gate for time-bin qubits that uses a 2x2 optical switch based on an elect… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

    Journal ref: Appl. Phys. Express 11 092801 (2018)

  28. Quantum process tomography of a controlled-phase gate for time-bin qubits

    Authors: Hsin-Pin Lo, Takuya Ikuta, Nobuyuki Matsuda, Toshimori Honjo, William J. Munro, Hiroki Takesue

    Abstract: Time-bin qubits, where information is encoded in a single photon at different times, have been widely used in optical fiber and waveguide based quantum communications. With the recent developments in distributed quantum computation, it is logical to ask whether time-bin encoded qubits may be useful in that context. We have recently realized a time-bin qubit controlled-phase (C-Phase) gate using a… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

    Comments: 10 pages, 5 figures, 1 table

    Journal ref: Phys. Rev. Applied 13, 034013(2020)

  29. arXiv:2001.10599  [pdf, other

    quant-ph physics.optics

    Proof-of-principle experimental demonstration of twin-field quantum key distribution over optical channels with asymmetric losses

    Authors: Xiaoqing Zhong, Wenyuan Wang, Li Qian, Hoi-Kwong Lo

    Abstract: Twin-field (TF) quantum key distribution (QKD) is highly attractive because it can beat the fundamental limit of secret key rate for point-to-point QKD without quantum repeaters. Many theoretical and experimental studies have shown the superiority of TFQKD in long-distance communication. All previous experimental implementations of TFQKD have been done over optical channels with symmetric losses.… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

    Comments: 6 pages, 3 figures and 1 table

    Journal ref: npj Quantum Information 7, 8 (2021)

  30. arXiv:1910.10137  [pdf, other

    quant-ph

    Prefixed-threshold Real-Time Selection for Free-Space Measurement-Device-Independent Quantum Key Distribution

    Authors: Wenyuan Wang, Feihu Xu, Hoi-Kwong Lo

    Abstract: Measurement-Device-Independent (MDI) QKD eliminates detector side channels in QKD and allows an untrusted relay between two users. A desirable yet highly challenging application is to implement MDI-QKD through free-space channels. One of the major factors that affect the secure key rate in free-space MDI-QKD is atmospheric turbulence. In this work we show two important results: First, the independ… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

    Comments: This is a draft version of the manuscript submitted to QCrypt 2019 on April 10th, and presented as a poster on August 26th. We are still working on more results based on finite-size scenario and will later update the manuscript when finished

  31. Simple security proofs for continuous-variable quantum key distribution with intensity fluctuating sources

    Authors: Chenyang Li, Li Qian, Hoi-Kwong Lo

    Abstract: Quantum Key Distribution (QKD) in principle offers unconditional security based on the laws of physics. Continuous variable (CV) quantum key distribution has the potential for high-key-rate and low-cost implementations using standard telecom components. Despite tremendous theoretical and experimental progress in continuous-variable quantum key distribution, the security has not been rigorously est… ▽ More

    Submitted 17 October, 2021; v1 submitted 29 August, 2019; originally announced August 2019.

    Comments: 16 pages, 11 figures

    Journal ref: npj Quantum Inf 7, 150 (2021)

  32. Simple Method for Asymmetric Twin-Field Quantum Key Distribution

    Authors: Wenyuan Wang, Hoi-Kwong Lo

    Abstract: Twin-Field quantum key distribution (TF-QKD) can beat the linear bound of repeaterless QKD systems. After the proposal of the original protocol, multiple papers have extended the protocol to prove its security. However, these works are limited to the case where the two channels have equal amount of loss (i.e. are symmetric). In a practical network setting, it is very likely that the channels are a… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

  33. Secure quantum key distribution with realistic devices

    Authors: Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, Jian-Wei Pan

    Abstract: In principle, quantum key distribution (QKD) offers information-theoretic security based on the laws of physics. In practice, however, the imperfections of realistic devices might introduce deviations from the idealized models used in security analyses. Can quantum code-breakers successfully hack real systems by exploiting the side channels? Can quantum code-makers design innovative counter-measur… ▽ More

    Submitted 19 February, 2020; v1 submitted 21 March, 2019; originally announced March 2019.

    Comments: to appear in Rev. Mod. Phys

    Journal ref: Rev. Mod. Phys. 92, 025002 (2020)

  34. Remote blind state preparation with weak coherent pulses in the field

    Authors: Yang-Fan Jiang, Kejin Wei, Liang Huang, Ke Xu, Qi-Chao Sun, Yu-Zhe Zhang, Weijun Zhang, Hao Li, Lixing You, Zhen Wang, Hoi-Kwong Lo, Feihu Xu, Qiang Zhang, Jian-Wei Pan

    Abstract: Quantum computing has seen tremendous progress in the past years. Due to the implementation complexity and cost, the future path of quantum computation is strongly believed to delegate computational tasks to powerful quantum servers on cloud. Universal blind quantum computing (UBQC) provides the protocol for the secure delegation of arbitrary quantum computations, and it has received significant a… ▽ More

    Submitted 5 September, 2019; v1 submitted 19 March, 2019; originally announced March 2019.

    Comments: 11 pages, 9 figures

    Journal ref: Phys. Rev. Lett. 123, 100503 (2019)

  35. Proof-of-principle experimental demonstration of twin-field type quantum key distribution

    Authors: X. Zhong, J. Hu, M. Curty, L. Qian, H. -K. Lo

    Abstract: The twin-field (TF) quantum key distribution (QKD) protocol and its variants are highly attractive because they can beat the well-known rate-loss limit (i.e., the PLOB bound) for QKD protocols without quantum repeaters. In this paper, we perform a proof-of-principle experimental demonstration of TF-QKD based on the protocol proposed by Curty et al. which removes from the original TF-QKD scheme the… ▽ More

    Submitted 26 February, 2019; originally announced February 2019.

    Comments: 7 pages, 3 figures

    Journal ref: Phys. Rev. Lett. 123, 100506 (2019)

  36. Machine Learning for Optimal Parameter Prediction in Quantum Key Distribution

    Authors: Wenyuan Wang, Hoi-Kwong Lo

    Abstract: For a practical quantum key distribution (QKD) system, parameter optimization - the choice of intensities and probabilities of sending them - is a crucial step in gaining optimal performance, especially when one realistically considers finite communication time. With the increasing interest in the field to implement QKD over free-space on moving platforms, such as drones, handheld systems, and eve… ▽ More

    Submitted 5 June, 2019; v1 submitted 18 December, 2018; originally announced December 2018.

    Comments: Added benchmarking data on hardware devices; More emphasis on generality of our method (with extended numerical results for three different protocols)

    Journal ref: Phys. Rev. A 100, 062334 (2019)

  37. Entropic uncertainty relations and the measurement range problem, with consequences for high-dimensional quantum key distribution

    Authors: J. Eli Bourassa, Hoi-Kwong Lo

    Abstract: The measurement range problem, where one cannot determine the data outside the range of the detector, limits the characterization of entanglement in high-dimensional quantum systems when employing, among other tools from information theory, the entropic uncertainty relations. Practically, the measurement range problem weakens the security of entanglement-based large-alphabet quantum key distributi… ▽ More

    Submitted 12 December, 2018; v1 submitted 12 October, 2018; originally announced October 2018.

    Comments: 18 pages, 3 figures

  38. Experimental demonstration of high-rate measurement-device-independent quantum key distribution over asymmetric channels

    Authors: Hui Liu, Wenyuan Wang, Kejin Wei, Xiao-Tian Fang, Li Li, Nai-Le Liu, Hao Liang, Si-Jie Zhang, Weijun Zhang, Hao Li, Lixing You, Zhen Wang, Hoi-Kwong Lo, Teng-Yun Chen, Feihu Xu, Jian-Wei Pan

    Abstract: Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate all detector side channels and it is practical with current technology. Previous implementations of MDI-QKD all use two symmetric channels with similar losses. However, the secret key rate is severely limited when different channels have different losses. Here we report the results of the first high-rate MDI-QKD experi… ▽ More

    Submitted 27 April, 2019; v1 submitted 26 August, 2018; originally announced August 2018.

    Comments: 20 pages, 4 figures

    Journal ref: Phys. Rev. Lett. 122, 160501 (2019)

  39. arXiv:1807.07667  [pdf, other

    quant-ph

    Simple security proof of twin-field type quantum key distribution protocol

    Authors: Marcos Curty, Koji Azuma, Hoi-Kwong Lo

    Abstract: Twin-field (TF) quantum key distribution (QKD) was conjectured to beat the private capacity of a point-to-point QKD link by using single-photon interference in a central measuring station. This remarkable conjecture has recently triggered an intense research activity to prove its security. Here, we introduce a TF-type QKD protocol which is conceptually simpler than the original proposal. It relies… ▽ More

    Submitted 18 December, 2018; v1 submitted 19 July, 2018; originally announced July 2018.

    Comments: 11 pages, 5 figures

    Journal ref: npj Quantum Information 5, 64 (2019)

  40. Secure quantum communication in the presence of phase and polarization dependent loss

    Authors: Chenyang Li, Marcos Curty, Feihu Xu, Olinka Bedroya, Hoi-Kwong Lo

    Abstract: Silicon photonics holds the promise of the miniaturization of quantum communication devices. Recently, silicon chip optical transmitters for quantum key distribution (QKD) have been built and demonstrated experimentally. Nonetheless, these silicon chips suffer substantial polarization and phase dependent loss which, if unchecked, could compromise the security of QKD systems. Here, we first restore… ▽ More

    Submitted 20 October, 2018; v1 submitted 11 July, 2018; originally announced July 2018.

    Comments: 10 pages, 7 figures

    Journal ref: Phys. Rev. A 98, 042324 (2018)

  41. Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks

    Authors: Wenyuan Wang, Feihu Xu, Hoi-Kwong Lo

    Abstract: Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate detector side channels and prevent all attacks on detectors. The future of MDI-QKD is a quantum network that provides service to many users over untrusted relay nodes. In a real quantum network, the losses of various channels are different and users are added and deleted over time. To adapt to these features, we propos… ▽ More

    Submitted 26 February, 2019; v1 submitted 9 July, 2018; originally announced July 2018.

    Comments: Changed the title to better represent the generality of our method, and added more discussions on its application to alternative protocols (in Sec. II, the new Table II, and Appendix E with new Fig. 9). Added more conceptual explanations in Sec. II on the difference between X and Z bases in MDI-QKD. Added additional discussions on security of the scheme in Sec. II and Appendix D

    Journal ref: Phys. Rev. X 9, 041012 (2019)

  42. arXiv:1805.05511  [pdf, other

    quant-ph

    Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound

    Authors: Kiyoshi Tamaki, Hoi-Kwong Lo, Wenyuan Wang, Marco Lucamarini

    Abstract: Quantum key distribution is a way to distribute secret keys to distant users with information theoretic security and key rates suitable for real-world applications. Its rate-distance figure, however, is limited by the natural loss of the communication channel and can never surpass a theoretical limit known as point-to-point secret key capacity. Recently, a new type of quantum key distribution with… ▽ More

    Submitted 11 September, 2018; v1 submitted 14 May, 2018; originally announced May 2018.

    Comments: 25 pages, 3 figures

  43. arXiv:1804.09703  [pdf, other

    quant-ph physics.atom-ph

    Repeated multi-qubit readout and feedback with a mixed-species trapped-ion register

    Authors: Vlad Negnevitsky, Matteo Marinelli, Karan Mehta, Hsiang-Yu Lo, Christa Flühmann, Jonathan P. Home

    Abstract: Quantum error correction will be essential for realizing the full potential of large-scale quantum information processing devices. Fundamental to its experimental realization is the repetitive detection of errors via projective measurements of quantum correlations among qubits, and correction using conditional feedback. Performing these tasks repeatedly requires a system in which measurement and f… ▽ More

    Submitted 26 April, 2018; v1 submitted 25 April, 2018; originally announced April 2018.

    Comments: 9 pages including methods, 6 figures; v2: typos and minor edits

    Journal ref: Nature 563, 527-531 (2018)

  44. Quantum key distribution with setting-choice-independently correlated light sources

    Authors: Akihiro Mizutani, Go Kato, Koji Azuma, Marcos Curty, Rikizo Ikuta, Takashi Yamamoto, Nobuyuki Imoto, Hoi-Kwong Lo, Kiyoshi Tamaki

    Abstract: Despite the enormous theoretical and experimental progress made so far in quantum key distribution (QKD), the security of most existing QKD implementations is not rigorously established yet. A critical obstacle is that almost all existing security proofs make ideal assumptions on the QKD devices. Problematically, such assumptions are hard to satisfy in the experiments, and therefore it is not obvi… ▽ More

    Submitted 26 March, 2018; originally announced March 2018.

    Comments: 27 pages, 5 figures

    Journal ref: npj Quantum Information 5, 8 (2019)

  45. Pre-fixed Threshold Real Time Selection Method in Free-space Quantum Key Distribution

    Authors: Wenyuan Wang, Feihu Xu, Hoi-Kwong Lo

    Abstract: Free-space Quantum key distribution (QKD) allows two parties to share a random key with unconditional security, between ground stations, between mobile platforms, and even in satellite-ground quantum communications. Atmospheric turbulence causes fluctuations in transmittance, which further affect the quantum bit error rate (QBER) and the secure key rate. Previous post-selection methods to combat a… ▽ More

    Submitted 24 December, 2017; originally announced December 2017.

    Journal ref: Phys. Rev. A 97, 032337 (2018)

  46. arXiv:1711.08724  [pdf, other

    quant-ph

    Foiling covert channels and malicious classical post-processing units in quantum key distribution

    Authors: Marcos Curty, Hoi-Kwong Lo

    Abstract: Existing security proofs of quantum key distribution (QKD) suffer from two fundamental weaknesses. First, memory attacks have emerged as an important threat to the security of even device-independent quantum key distribution (DI-QKD), whenever QKD devices are re-used. This type of attacks constitutes an example of covert channels, which have attracted a lot of attention in security research in con… ▽ More

    Submitted 23 November, 2017; originally announced November 2017.

    Comments: 16 pages, 8 figures

    Journal ref: npj Quantum Information 5, 14 (2019)

  47. Space QUEST mission proposal: Experimentally testing decoherence due to gravity

    Authors: Siddarth Koduru Joshi, Jacques Pienaar, Timothy C. Ralph, Luigi Cacciapuoti, Will McCutcheon, John Rarity, Dirk Giggenbach, Jin Gyu Lim, Vadim Makarov, Ivette Fuentes, Thomas Scheidl, Erik Beckert, Mohamed Bourennane, David Edward Bruschi, Adan Cabello, Jose Capmany, Alberto Carrasco-Casado, Eleni Diamanti, Miloslav Duusek, Dominique Elser, Angelo Gulinatti, Robert H. Hadfield, Thomas Jennewein, Rainer Kaltenbaek, Michael A. Krainak , et al. (20 additional authors not shown)

    Abstract: Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph,… ▽ More

    Submitted 9 January, 2018; v1 submitted 23 March, 2017; originally announced March 2017.

    Comments: 18 pages, 13 figures, included radiation damage to detectors in appendix

    Journal ref: New J. Phys. 20, 063016 (2018)

  48. arXiv:1612.05570  [pdf, other

    quant-ph physics.atom-ph

    Quantum harmonic oscillator state control in a squeezed Fock basis

    Authors: D. Kienzler, H. -Y. Lo, V. Negnevitsky, C. Flühmann, M. Marinelli, J. P. Home

    Abstract: We demonstrate control of a trapped-ion quantum harmonic oscillator in a squeezed Fock state basis, using engineered Hamiltonians analogous to the Jaynes-Cummings and anti-Jaynes-Cummings forms. We demonstrate that for squeezed Fock states with low $n$ the engineered Hamiltonians reproduce the $\sqrt{n}$ scaling of the matrix elements which is typical of Jaynes-Cummings physics, and also examine d… ▽ More

    Submitted 2 August, 2017; v1 submitted 16 December, 2016; originally announced December 2016.

    Comments: Added short discussion of possible applications of presented techniques, replaced figures with higher quality versions, typographical corrections

    Journal ref: Phys. Rev. Lett. 119, 033602 (2017)

  49. Security of quantum key distribution with iterative sifting

    Authors: Kiyoshi Tamaki, Hoi-Kwong Lo, Akihiro Mizutani, Go Kato, Charles Ci Wen Lim, Koji Azuma, Marcos Curty

    Abstract: Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. The quantum phase of the protocol then ends when the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al. [N… ▽ More

    Submitted 30 May, 2017; v1 submitted 20 October, 2016; originally announced October 2016.

    Comments: 9 pages. We have found a flaw in the first version, which we have corrected in the revised version

    Journal ref: Quantum Science and Technology, vol. 3, no. 1, 014002 (2018)

  50. Large Cross-Phase Modulations at the Few-Photon Level

    Authors: Zi-Yu Liu, Yi-Hsin Chen, Yen-Chun Chen, Hsiang-Yu Lo, Pin-Ju Tsai, Ite A. Yu, Ying-Cheng Chen, Yong-Fan Chen

    Abstract: We demonstrate an efficient cross-phase modulation (XPM) based on a closed-loop double-Λ system. The property of the double-Λ medium can be controlled by changing the phases of the applied optical fields. This phase-dependent XPM scheme can achieve large phase modulations at low-light intensities without requiring cavities or tightly focusing of laser beams. With this scheme, we observe a π-level… ▽ More

    Submitted 4 July, 2016; originally announced July 2016.

    Comments: 5 pages, 4 figures, supplemental matrial: 7 pages, 6 figures. arXiv admin note: substantial text overlap with arXiv:1409.4153, arXiv:1302.1744

    Journal ref: Phys. Rev. Lett. 117, 203601 (2016)