Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Field test of quantum key distribution over aerial fiber based on simple and stable modulation

Open Access Open Access

Abstract

We have developed a simple time-bin phase encoding quantum key distribution system, using the optical injection locking technique. This setup incorporates both the merits of simplicity and stability in encoding, and immunity to channel disturbance. We have demonstrated the field implementation of quantum key distribution over long-distance deployed aerial fiber automatically. During the 70-day field test, we achieved approximately a 1.0 kbps secure key rate with stable performance. Our work takes an important step toward widespread implementation of QKD systems in diverse and complex real-life scenarios.

© 2023 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement

1. Introduction

In today’s information age, various demands of data transmission arise every day, with growing requirements of the bandwidth [1]. Optical fiber, due to its ultra-high bandwidth and ultra-low loss, is a suitable candidate as the medium for data transmission. Optical fiber communication has become the foundation of modern communication, and most data are transmitted through optical fiber networks. However, the security of optical fiber communication is becoming increasingly prominent due to the threat posed by quantum computing [2,3] to asymmetric-key cryptosystems [4]. To combat these threats, it is urgent to find new secure communication methods. One promising solution is quantum key distribution (QKD) [46], which shares secure keys between separated parties by transmitting quantum states in the physical layer. When combined with the symmetric encryption approach, information-theoretically secure communication can be achieved [5,6]. Since the first QKD protocol proposed in 1984 (BB84) [7], QKD has achieved considerable developments both theoretically and experimentally [46,8]. In particular, the decoy-state scheme has been proposed [1012] to resist photon-number-splitting (PNS) attack [13] assuring the security of weak coherent photon sources, and the measurement-device-independent (MDI) QKD [14] as well as the twin-field (TF) QKD [15] were proposed to resist all detection-side attacks. Experimental research into QKD has been extensively conducted both in the laboratory [1619] and in deployed networks [2024], and its effective distance has extended to 421 km using point-to-point fiber link [25], 1000km using the TF QKD [26,27], and 1200 km using free-space link [28]. The achievable secure key rate has exceeded 100Mbps [29]. QKD has now entered the large-scale application stage [9], being employed in backbone QKD networks [3032] and metropolitan QKD networks [33,34]. Chip-based integrated QKD systems have also been reported [35,36].

In optical fiber communication networks, besides the buried and ducted fiber, aerial fiber is also widely used [37]. Aerial fiber is a preferred choice in suburban and rural aeras, where it is difficult to lay buried fiber or ducted fiber cables. In particular, aerial fiber cables are widely deployed in the power supply network, known as the Optical Fiber Composite Overhead Ground Wire (OPGW) [38,39]. However, unlike the buried and ducted fiber, aerial fiber is more susceptible to external conditions such as natural climate and human factors [40,41], making it challenging for long-distance quantum key distribution in this fast-changing scenario.

In this work, we propose a time-bin phase encoding setup for quantum key distribution based on optical injection locking (OIL) [42]. Unlike the traditional approach, this new setup is modulator-free and does not require an intensity modulator or phase modulator for quantum state encoding. As a result, it offers intrinsic stability, simplicity, and practical security advantages. Furthermore, it is immune to channel disturbance and has a low insertion loss of time-bin basis decoding, making it ideal for stable and high-speed secure key generation. We develop compact terminals for a quantum key distribution system based on this setup and conduct experiments over an aerial fiber link deployed in Urumqi City, Xinjiang Province, China. Our scheme can be used also for establish QKD network between different countries [32].

2. Experimental setup

The field experiment in an aerial fiber scenario was implemented in Urumqi City, Xinjiang Province, China. The transmitter Alice is placed at the node of Xinjiang Astronomical Observatory (N43$^{\circ }$51’56.29", E87$^{\circ }$34’18.71"). The receiver Bob is placed at Nanshan Observation Stationare (N43$^{\circ }$28’42.16", E87$^{\circ }$11’11.62"). The link of the field test is shown in Fig. 1. It features a fiber length of 87.28 km and an overall attenuation of 23.27 dB, including 60.95-km-long aerial fiber and 26.33-km-long buried fiber, separated in the Cangfanggou telecom business hall (N43$^{\circ }$45’51.05", E87$^{\circ }$35’16.34"). This region is special in the geographical and climatic conditions, and there are often strong winds which affect the deployment environment of aerial fiber.

 figure: Fig. 1.

Fig. 1. Plan view showing the experimental site in the field test of QKD over the deployed aerial fiber link. The fiber length is 87.28 km for the whole link, with the overall loss of 23.27 dB. LD: laser diode, BS: beam splitter, ISO: isolator, PM: phase modulator, FDL: fiber delay line, CIR: circulator, VOA: variable optical attenuator, FBG: fiber Bragg grating, DWDM: dense wavelength-division multiplexer, FM: Faraday Mirror, APD: avalanche photodiode.

Download Full Size | PDF

At the transmitter, the time-phase encoding scheme is realized based on the OIL technique. The pulses from the master laser #0 pass through the AMZI in a reverse manner to lock both master lasers #1 and #2. Thus, these master lasers can share the same original global phase, as well as the same wavelength to avoid any potential information leakage through wavelength difference [43]. Then, the pulses of master lasers #1 and #2 are inputted to the same AMZI through the first BS from two different ports with an intrinsic $\pi /2$ phase difference. After passing through the AMZI, the pulse of master laser #1 (#2) splits into two equal parts with a phase difference of $\Delta (\Delta + \pi )$, where $\Delta$ is determined by the path length of the AMZI. The AMZI has a 1.6 ns time delay between its two arms. Subsequently, the two equal parts of master laser #1 (#2) are injected into the slave laser via a circulator or a BS to lock the slave laser.

The master and slave lasers are triggered at 312.5 MHz and 625 MHz respectively, thereby giving an effective system repetition rate of 312.5 MHz because two time-bins are required for a single qubit state. To prepare the states in the phase basis, two successive electrical signals of the slave laser in one system period should be above the lasing threshold, and master laser #1 (#2) outputs a seed pulse to modulate the $|{X_0}\rangle (|{X_1}\rangle )$ state. Since the phase difference of the two pulse parts of master laser #1 differs from that of master laser #2 by $\pi$, the two successive pulses of the slave laser locked by two pulse parts of master laser #1 can maintain a phase difference of $\pi$ from that locked by master laser #2. To prepare states on a time-bin basis, two successive electrical signals of the slave laser should be above and below the lasing threshold, respectively, for the $|{Z_0}\rangle$ state, and vice versa for the $|{Z_1}\rangle$ state. In this situation, either master laser #1 or #2 is required to output a seed pulse to lock the slave laser. As seen, this scheme takes advantage of the phase difference between the two arms of AMZI to modulate $|{X_0}\rangle$ and $|{X_1}\rangle$, thereby avoiding the use of phase modulators or high-performance driving electrics. Furthermore, it utilizes gain switching of the pulse laser instead of IM to modulate $|{Z_0}\rangle$ and $|{Z_1}\rangle$, and thus have the merit of stable encoding of the time-bin basis.

A Sagnac-based IM (Sag-IM) [4446] is used to realize the decoy state modulation [1012] and normalize the average photon numbers in the two bases. Intrinsic intensity stability is maintained due to the inherent common-path interference mechanism in the Sagnac interferometer. Then a 99:1 BS and one PIN detector are adopted to monitor the signal intensity for feedback. An isolator and a fiber Bragg grating (FBG) filter with a circulator are used to prevent against any injected attacking light [47]. Another PIN detector is connected to the circulator and actively detects injected attacking light [47].

At the receiver, a BS is used for measurement basis choice with an asymmetric splitting ratio of 70%:30% for the Z:X basis. For the Z basis, the BS output port is directly connected to an InGaAs/InP avalanche photodiode (APD0), and the detection of the former or latter time position in one period will be decoded for bit 0 or 1. For the X basis, the other BS output port is connected to a Michelson interferometer followed by APD1 and APD2, whereupon the detection of APD1 or APD2 is decoded to bit 0 or 1. Here we used the Michelson interferometer [48] instead of AMZI because it allows polarization-independent interference without polarization stabilization. This greatly simplifies the complexity of the receiver by removing the electric polarization controller and polarization beam splitter components. Furthermore, it reduces the insertion loss and thus increases the secure key rate. Details of the setup can be found in Appendix A1.

3. Results and discussion

The system ran continuously and automatically for more than two months without any human intervention. Active phase tracking and feedback method is adopted to reduce the QBER in the X basis. Details can be found in Appendix A2. The measured secure key rate and QBER are shown in sections of a) and b), respectively, of Fig. 2. The QBER of the Z basis in signal state was about 1.25%, and maintained quite stable throughout the whole test period. The QBER of X basis can be maintained at approximately 3% with the help of the feedback scheme. Throughout the whole test period, the average secure key rate was 945.77 bps and the standard deviation was 13.43%. Details of data post-processing are presented in Appendix A3. We speculate that the fluctuation of the secure key rate (and QBER in the X basis), in the later part (from 40th day to 70th day) is likely due to the count rate fluctuation caused by the detection efficiency changes of APD1 and APD2, especially the relative effciency changes. This, in turn, results in an increase in voltage error on the FPS after phase feedback. We would like to leave the solution of this problem for future work.

 figure: Fig. 2.

Fig. 2. Measured secure key rate and QBER over 70 days between 2022.01.18 and 2022.03.28 during the field test. The overall loss of the quantum link is 23.27 dB.

Download Full Size | PDF

We compare our result with few attempts of quantum key distribution over aerial fiber from previous works [49,50], as shown in Table 1. First, in terms of the total distance of the quantum link, we have achieved the long-distance transmission in a field-installation environment by utilizing an 87-km mixed link comprising both aerial and buried fibers. If only considering the length of the aerial fiber, it is approximately 61km in our experiment, slightly shorter than Ref. [50]. Second, we have achieved the largest link loss by more than 8 dB. Furthermore, our system features the highest secure key rate among all field tests of aerial fiber links. Due to the differences in attenuation, it is inconvenient to directly compare the secure key rate. We therefore normalize the secure key rate to that of the 10 dB transmission loss. These results demonstrate that the secure key rate in our experiments is improved more than 175% compared with those reported in previous experiments.

Tables Icon

Table 1. Comparison of our results with previous work.

Apart from our scheme, several other approaches may also help to settle the problem of quantum key distribution through aerial fiber link, such as adopting the reference-frame-independent (RFI) QKD protocol [51], and using a BB84 phase-coding scheme [5]. The RFI QKD protocol exploits six states (eigenstates of the X/Y/Z bases) to eliminate the requirement of reference frame alignment between the transmitter and receiver, thereby rendering the QKD system more adaptive to changing environments. The RFI QKD protocol requires more quantum states for encoding and decoding than the original BB84 protocol, which is more complex and less efficient. Moreover, the RFI QKD is limited to retrieve slow perturbations. BB84 phase-encoding systems are intrinsically immune to channel disturbance because relative phase between successive pulses is not disturbed by the environment, making them more adaptable to changing environments. Regrettably, their performance is limited due to the high insertion loss introduced by the phase modulator (PM) for decoding. Thus, all these approaches have obvious drawbacks compared to our solution.

4. Conclusion

In summary, we have developed a novel time-bin phase encoding setup that utilizes both the OIL technique and intrinsic phase difference between two AMZI input ports. This modulator-free setup provides inherent stability and simplicity in quantum state encoding, and is immune to channel disturbance. We successfully implemented quantum key distribution over a hybrid 87-km-long deployed aerial fiber link, with an overall loss of up to 23.27 dB. During the 70-day continuous operation in the field test, we achieved a secure key rate of approximately 1.0 kbps and a quantum bit error rate below 1.3%. Our work demonstrates high performance and stability of quantum key distribution over long aerial fiber link, paving the way for widespread implementation and diverse applications of QKD systems in complex real-life scenarios.

Appendix

A1. Experiment details of the setup

Up till now, there are various kinds of time-bin phase-encoding schemes [35,5255]. Traditional time-bin phase-encoding setups require an asymmetric Mach-Zehnder interferometer (AMZI) to split pulses into two time-bins. Subsequently, an intensity modulator (IM) is employed to encode the time-bin basis (Z basis), and a PM is employed to encode the phase basis (X basis) [52]. This setup requires two modulators, and the IM operates at twice the system frequency and needs to be stabilized, rendering the encoding setup either complex or unstable. To avoid the use of modulators, several other schemes are proposed. One kind of setup utilizes the OIL technique [35,53] to directly modulate the phase and intensity on phase and time-bin bases. Encoding on the time-bin basis can be intrinsically stable since it is carried out by gain switching of pulse lasers instead of using IM. However, encoding on the phase basis requires high-performance driving electrics to modulate a wide electronic pulse on the master laser, capable of covering two successive time-bins. Additionally, the difference in the electronic pulse between the first and the second time-bins, especially the chirp, could cause a wavelength difference between the two time-bins, opening a potential loophole in terms of practical security. Another kind of setups also utilizes the OIL technique [54], and the difference is that to modulate the phase basis, it ultilizes a phase modulator instead of a wide electronic pulse modulation on the master laser. Besides, a fully passive time-bin phase encoding scheme is recently proposed [55], with an asymmetric interferometer and a post-selection module to avoid active modulation. But an optical switch operating at high speed is needed to break the interference of adjacent time bins.

In this paper, we propose a new time-phase encoding scheme based on the OIL technique. This approach is modulator-free for the preparation of quantum states. The complete QKD system based on this scheme is shown in Fig. 1. The status of the electrical driving signals of these lasers corresponding to four quantum states is shown in Fig. 3.

 figure: Fig. 3.

Fig. 3. Status of electrical driving signals of lasers (three master lasers and one slave laser) corresponding to four quantum states.

Download Full Size | PDF

At the transmitter, three master lasers and one slave laser operate in a two-stage cascade injection-locked mode to make the spectra of all output signals consistent. The measured spectra are shown in Fig. 4. It is clear that the center wavelengths of the $0$ pulse and the $\pi$ pulse are essentially the same when the master laser #0 is turned on (both are the same as the center wavelength of the master laser #0), while the $0$ pulse and the $\pi$ pulse deviate by approximately 0.1 nm when the master laser #0 is turned off.

 figure: Fig. 4.

Fig. 4. Spectrum of the 0 pulse and the $\pi$ pulse. When master laser #0 is on, both master lasers #1 and #2 with different initial wavelengths are locked to master laser #0 and share the same wavelength, and thus the 0 pulses and the $\pi$ pulse can also share the same wavelength.

Download Full Size | PDF

The lasers ensure a temperature control accuracy of 0.01$^{\circ }$C. Even in the case of a temperature control drift reaching 10 times the accuracy (i.e., 0.1$^{\circ }$C), supplementary tests have shown that the central wavelength variation after injection locking does not exceed 0.1 pm [56]. It is because the wavelength and phase of the generated slave laser emission is fully determined by the injected master laser #0 [57]. In this scenario, the phase difference caused by the wavelength deviation of master laser #1 and #2 does not exceed $< 0.125 rad$, resulting in an impact of $<0.2{\% }$ on the error rate of the X basis. Therefore, our approach ensures the stability of the X basis encoding.

In terms of time-domain characteristics, we measured the pulse waveforms of $|{Z_0}\rangle$, $|{X_0}\rangle$ and $|{X_1}\rangle$ from different bases, as shown in Fig. 5. These pulse waveforms indicate no significant differences, with only minor variations observed at the falling edges due to the limited tunable accuracy of the master laser in the time domain. This minor deviation can be further optimized by fine-tuning the driving signals for the master lasers. We will consider this optimization of our system and further comprehensive research on the quantum security aspects in future work.

 figure: Fig. 5.

Fig. 5. The measured waveform of quantum state after injection locking.

Download Full Size | PDF

The decoy state method is considered to resist the photon-number splitting attack, implemented by the Sag-IM modulator. Here, we use a vacuum + weak decoy state scheme [58], and the photon numbers are set to $\mu =0.33$, $\nu =0.1$, and $\omega \ll 0.001$ for the signal, decoy, and vacuum state, respectively. Two Micro-Electro-Mechanical System variable optical attenuator (MEMS VOA) are employed for suitable attenuation to this photon number level. A true random number generator sets the probabilities of sending a signal or a decoy and vacuum state to $P_\mu =1/2$, $P_\nu =3/8$, and $P_\omega =1/8$ respectively. For the signal state (decoy state), the basis probabilities are set to $P_z = 7/8$ and $P_x = 1/8$ ($P_z = 2/8$ and $P_x = 6/8$). Here the true random number generator is a high-speed multi-channel physical random number generator [59].

At the receiver, the optical module of a BS for basis choice and an asymmetric Michelson interferometer with a fiber phase shifter (FPS) [60] inside for phase demodulation are designed. The followed three detectors used at the receiver are operated at a gate frequency of 1.25 GHz, a detection efficiency of approximately 15%, and a dark count rate below 800 Hz. When using a time window of 600 ps and a system period of 3.2 ns, the effective dark count rate can be reduced to below 150 Hz.

With the scheme of the high-speed QKD transmitter and receiver, we develop a compact QKD system for real-time operation, including automatic feedback system (detailed in Appendix A2) and complete data sifting module fulfilling error correction and privacy amplification (detailed in Appendix A3). Standard 1G Ethernet interfaces are used for classical communication between the transmitter and receiver.

A2. Phase shift tracking and feedback

For a continuous operation of this system, we should maintain the stability of the QBER of X basis which shifts over time, mainly due to the slow phase shift of the unbalanced interferometer, i.e., the AMZI in the transmitter and the Michelson interferometer in the receiver. Hence, we propose a real-time feedback scheme as shown in Fig. 6, which adopts the feedback frame of the large pulse intensity, time-multiplexed with the quantum frame by 20% time consumption. This feedback frame is modulated with a fixed 0 phase, and detected by the same APDs (APD1 and APD2) to obtain its real-time visibility. Compared with the calibrated maximum visibility (as a target) in the calibration procedure before continuous operation, it is then possible to calculate phase shift for compensating the voltage of the FPS [60] within the Michelson interferometer in the receiver. One MEMS VOA in the transmitter is used switch the pulse intensity between the feedback frame and the quantum frame. An appropriate voltage on the VOA of the feedback frame is set to ensure that the detector obtains a count rate of about one order lower than its saturation count rate to reduce the effects of its saturation count rate and dark count rate.

 figure: Fig. 6.

Fig. 6. Feedback scheme using feedback frame time-multiplexed with the quantum frame by 20% time consumption.

Download Full Size | PDF

A3. Data post-processing

Here we present details of data post-processing using an FPGA implementation for real-time secure key extraction. After the pulses are registered at Bob’s detectors, key sifting and basis sifting are executed, followed by error correction using Winnow algorithm and an error verification using CRC-64. Here we set the initial segment length to be 15 (we note that this parameter can be optimized to be 31 to improve the error correction efficiency), and thus the error correction efficiency is resulted to be about 1.7 when the overall QBER is around 1.3%. Afterwards, when the corrected key had been accumulated to be approximately 500 kbits, privacy amplification is performed to eliminate information leakage to Eve including that during the error correction and the error verification. A Toeplitz matrix is constructed to extract secure keys from the corrected keys by a compression ratio, i.e., the ratio of the estimated secure key length to the corrected key length after error verification. The secure key length $L$ is calculated by the following formula according to the theory of decoy state QKD [6163]:

$$L = M_{1zz}^L [1-H_2 (e_{1zz}^{pU} )]+M_{1xx}^L [1-H_2 (e_{1xx}^{pU} )]-leak_{EC}.$$
Here, subscripts $\mu, \nu$ denote the average photon numbers per signal in the signal and decoy states, respectively, $H_2(x)$ is the binary entropy function given by $H_2(x) = -x\log _2x -(1-x)\log _2(1-x)$, and $leak_{EC}$ is the information leakage during the error correction process.

$M_{1zz}^L (M_{1xx}^L)$ is the lower bound of the single photon number of the Z (X) basis after basis sift in signal state, $e_{1zz}^{pU} (e_{1xx}^{pU})$ is the upper bound of the single photon phase error rate of the Z (X) basis after basis sift in signal state. Here we added details about the parameter estimation. $M_{1zz}^L$ is calculated using the following formula (similar for $M_{1xx}^L$):

$$M_{1zz}^L=F_L( Q_{1zz}^L p_{bz} N_{\mu z},Q_{1zz}^L p_{bz} N_{\mu z}),$$
where $F_L(x,N)=x(1-\delta /\sqrt (N)$, $F_U(x,N)=x(1+\delta /\sqrt (N)$ are the lower and upper bounds, respectively, when considering statistical fluctuations with $\delta = 6.5$ corresponding to a failure probability of $\varepsilon =10^{-9}$ [62], $p_{bz}(p_{bx})$ is the probability of Z/X measurement basis choice, and $N_{\mu z}(N_{\mu x})$ is the count corresponding to the Z (X) basis sent in the signal state.

We here follow the method developed in [6163] to estimate the lower bound of gain $Q_{1zz}^L$ (similar for $Q_{1xx}^L$) according to the following formula:

$$Q_{1zz}^L=\frac{\mu^2 e^{-\mu}}{\mu \nu-\nu^2}(Q_{\nu zz}^L e^\nu-Q_{\mu zz}^U e^\mu \frac{\nu^2}{\mu^2} -Y_{0z}^U \frac{\mu^2-\nu^2}{\mu^2} ) ,$$
where $Q_{\nu zz}^L=F_L (F_L (Q_{\nu zz},M_{\nu zz} ),N_{\nu zz} )$, $Q_{\nu zz}=M_{\nu zz}/N_{\nu zz}$, $M_{\nu zz}$ is the measured detection count on the Z basis after basis sift in the decoy state, and $N_{\nu zz}=p_{bz}N_{\nu z}$, $N_{\nu z}$ is the sent count on the Z basis in the decoy state. $Q_{\mu zz}^U=F_U (F_U (Q_{\mu zz},M_{\mu zz} ),N_{\mu zz})$ and $Y_{0z}^U=F_U (F_U (Y_{0z},M_{0zz} ),N_{0zz} )$. The corresponding parameters on the X basis are calculated similarly.

We also use the method developed in [6163] to estimate the upper bound of phase error rate $e_{1zz}^{pU}$ (similar for $e_{1xx}^{pU}$ ) according to the following formula:

$$e_{1zz}^{pU}=e_{1xx}^U+\theta_x\ge min\left\{\frac{(E_{\mu xx} Q_{\mu xx})^U e^\mu-e_0 Y_{0x}^L}{Y_{1xx}^L \mu},\frac{(E_{\nu xx} Q_{\nu xx})^U e^\nu-e_0 Y_{0x}^L}{Y_{1xx}^L \nu}\right\}+\theta_x,$$
where $Y_{1xx}^L=(Q_{1xx}^L)/(\mu e^{-\mu } )$, $E_{\mu xx}=(ME_{\mu xx})/M_{\mu xx}$, where $ME_{\mu xx}$ is the measured detection error count on the X basis after basis sift in signal state. $(E_{\mu xx} Q_{\mu xx})^U=F_U (F_U (E_{\mu xx} Q_{\mu xx},ME_{\mu xx} ),N_{\mu xx} )$, $(E_{\nu xx} Q_{\nu xx})^U=F_U (F_U (E_{\nu xx} Q_{\nu xx},ME_{\nu xx}),N_{\nu xx})$, $Y_{0x}^L=F_L (F_L (Y_{0x},M_{0xx} ),N_{0xx})$. $\theta _x$ is calculated according to the following equation [63]:
$$\theta_x=\sqrt{\frac{2X_{tmp}(1-e_{1xx}^U)e_{1xx}^U}{\ln2 (1-q_x ) q_x}},$$
$$X_{tmp}={-}\frac{1}{M_{1xx}^L+M_{1zz}^L}\log_2(\frac{\xi_{rs}\sqrt{e_{1xx}^U (1-e_{1xx}^U ) M_{1xx}^L M_{1zz}^L}}{\sqrt{M_{1xx}^L+M_{1zz}^L}}),$$
where $\xi _{rs}$ is the failure probability of random sampling.

A4. Lab experiment

We verified the performance of the QKD system via lab experiment before we deployed the terminals in the field test. The overall efficiency of the test link is set to 25 dB to assume an extreme condition, which was composite of 90-km-long fiber pools and attenuators. The quantum bit error rate (QBER) was measured to be approximately 1.2% for the Z basis and 2.9% for the X basis. After experimentally measuring the relevant parameters, we calculated the final key length $L$. The relevant parameters are listed in Table 2 for a accumulate time of $t_{accu}=105$ s to accumulate approximately 500 kbits (the block size used in our experiment). The final key rate $R= L/t_{accu}$ is 1.1 kbps.

Tables Icon

Table 2. Measured and derived specifications based on decoy states.

Funding

Major Scientific and Technological Special Project of Anhui Province (202103a13010004); Key R & D Plan of Shandong Province (2020CXGC010105); Major Scientific and Technological Special Project of Hefei City (2021DX007); China Postdoctoral Science Foundation (2021M700315).

Acknowledgments

We thank Prof. Teng-Yun Chen, Prof. Sheng-Kai Liao and Prof. Feihu Xu for helpful discussions. We thank colleagues at QuantumCTek, especially Lian-Jun Jiang, Guo-Qing Liu, Ze-Xu Zhang, Liang Zhu, and Zhao-Jie Diao for experimental assistance. We also thank Enago for its linguistic assistance during the preparation of this paper.

Disclosures

The authors declare no conflicts of interest.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

References

1. Cisco public White Paper, “Cisco Annual Internet Report (2018–2023),” https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.pdf.

2. J. Preskill, “Quantum computing in the NISQ era and beyond,” Quantum 2, 79 (2018). [CrossRef]  

3. P. W. Shor, “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer,” SIAM J. Sci. Statist. Comput. 41(2), 303–332 (1999). [CrossRef]  

4. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys. 81(3), 1301–1350 (2009). [CrossRef]  

5. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74(1), 145–195 (2002). [CrossRef]  

6. F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, “Secure quantum key distribution with realistic devices,” Rev. Mod. Phys. 92(2), 025002 (2020). [CrossRef]  

7. C. H. Bennett and G. Brassard, “Public key distribution and coin tossing,” Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, IEEE, Bangalore; 175–179 (1984).

8. C.-Y. Lu, Y. Cao, C.-Z. Peng, and J.-W. Pan, “Micius quantum experiments in space,” Rev. Mod. Phys. 94(3), 035001 (2022). [CrossRef]  

9. Q. Zhang, F. Xu, Y. A. Chen, C. Z. Peng, and J. W. Pan, “Large scale quantum key distribution: Challenges and solutions [Invited],” Opt. Express 26(18), 24260–24273 (2018). [CrossRef]  

10. W.-Y. Hwang, “Quantum key distribution with high loss: Toward global secure communication,” Phys. Rev. Lett. 91(5), 057901 (2003). [CrossRef]  

11. X.-B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Phys. Rev. Lett. 94(23), 230503 (2005). [CrossRef]  

12. H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94(23), 230504 (2005). [CrossRef]  

13. G. Brassard, N. Lutkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85(6), 1330–1333 (2000). [CrossRef]  

14. H.-K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution,” Phys. Rev. Lett. 108(13), 130503 (2012). [CrossRef]  

15. M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, “Overcoming the rate–distance limit of quantum key distribution without quantum repeaters,” Nature 557(7705), 400–403 (2018). [CrossRef]  

16. C. Gobby, Z. L. Yuan, and A. J. Shields, “Quantum key distribution over 122 km of standard telecom fiber,” Appl. Phys. Lett. 84(19), 3762–3764 (2004). [CrossRef]  

17. C.-Z. Peng, J. Zhang, D. Yang, W.-B. Gao, H.-X. Ma, H. Yin, H.-P. Zeng, T. Yang, X.-B. Wang, and J.-W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98(1), 010505 (2007). [CrossRef]  

18. S. Wang, W. Chen, J.-F. Guo, Z.-Q. Yin, H.-W. Li, Z. Zhou, G.-C. Guo, and Z.-F. Han, “2 GHz clock quantum key distribution over 260 km of standard telecom fiber,” Opt. Lett. 37(6), 1008–1010 (2012). [CrossRef]  

19. Z. L. Yuan, A. Plews, R. Takahashi, K. Doi, W. Tam, A. W. Sharpe, A. R. Dixon, E. Lavelle, J. F. Dynes, A. Murakamim, M. Kujiroka, M. Lucamarini, Y. Tanizawa, H. Sato, and A. J. Shields, “10-Mb/s Quantum Key Distribution,” J. Lightwave Technol. 36(16), 3427–3433 (2018). [CrossRef]  

20. M. Peev, C. Pacher, R. Alléaume, et al., “The SECOQC quantum key distribution network in Vienna,” New J. Phys. 11(7), 075001 (2009). [CrossRef]  

21. T.-Y. Chen, J. Wang, H. Liang, W.-Y. Liu, Y. Liu, X. Jiang, Y. Wang, X. Wan, W.-Q. Cai, L. Ju, L.-K. Chen, L.-J. Wang, Y. Gao, K. Chen, C.-Z. Peng, Z.-B. Chen, and J.-W. Pan, “Metropolitan all-pass and inter-city quantum communication network,” Opt. Express 18(26), 27217–27225 (2010). [CrossRef]  

22. M. Sasaki, M. Fujiwara, H. Ishizuka, et al., “Field test of quantum key distribution in the Tokyo QKD Network,” Opt. Express 19(11), 10387–10409 (2011). [CrossRef]  

23. S. Wang, W. Chen, Z.-Q. Yin, et al., “Field and long-term demonstration of a wide area quantum key distribution network,” Opt. Express 22(18), 21739–21756 (2014). [CrossRef]  

24. Y.-L. Tang, H.-L. Yin, Q. Zhao, H. Liu, X.-X. Sun, M.-Q. Huang, W.-J. Zhang, S.-J. Chen, L. Zhang, L.-X. You, Z. Wang, Y. Liu, C.-Y. Lu, X. Jiang, X. Ma, Q. Zhang, T.-Y. Chen, and J.-W. Pan, “Measurement-device-independent quantum key distribution over untrustful metropolitan network,” Phys. Rev. X 6(1), 011024 (2016). [CrossRef]  

25. A. Boaron, G. Boso, D. Rusca, C. Vulliez, C. Autebert, M. Caloz, M. Perrenoud, G. Gras, F. Bussières, M. J. Li, D. Nolan, A. Martin, and H. Zbinden, “Secure Quantum Key Distribution over 421 km of Optical Fiber,” Phys. Rev. Lett. 121(19), 190502 (2018). [CrossRef]  

26. Y. Liu, W.-J. Zhang, C. Jiang, J.-P. Chen, C. Zhang, W.-X. Pan, D. Ma, H. Dong, J.-M. Xiong, C.-J. Zhang, H. Li, R.-C. Wang, J. Wu, T.-Y. Chen, L. You, X.-B. Wang, Q. Zhang, and J.-W. Pan, “Experimental Twin-Field Quantum Key Distribution over 1000 km Fiber Distance,” Phys. Rev. Lett. 130(21), 210801 (2023). [CrossRef]  

27. S. Wang, Z.-Q. Yin, D.-Y. He, W. Chen, R.-Q. Wang, P. Ye, Y. Zhou, G.-J. Fan-Yuan, F.-X. Wang, W. Chen, Y.-G. Zhu, P. V. Morozov, A. V. Divochiy, Z. Zhou, G.-C. Guo, and Z.-F. Han, “Twin-field quantum key distribution over 830-km fibre,” Nat. Photonics 16(2), 154–161 (2022). [CrossRef]  

28. S. K. Liao, W. Q. Cai, W. Y. Liu, et al., “Satellite-to-ground quantum key distribution,” Nature 549(7670), 43–47 (2017). [CrossRef]  

29. W. Li, L. Zhang, H. Tan, Y. Lu, S.-K. Liao, J. Huang, H. Li, Z. Wang, H.-K. Mao, B. Yan, Q. Li, Y. Liu, Q. Zhang, C.-Z. Peng, L. You, F. Xu, and J.-W. Pan, “High-rate quantum key distribution exceeding 1‘0Mbps,” Nat. Photonics 17(5), 416–421 (2023). [CrossRef]  

30. Y.-A. Chen, Q. Zhang, T.-Y. Chen, et al., “An integrated space-to-ground quantum communication network over 4,600 kilometers,” Nature 589(7841), 214–219 (2021). [CrossRef]  

31. A. Acín, I. Bloch, H. Buhrman, T. Calarco, C. Eichler, J. Eisert, D. Esteve, N. Gisin, S. J. Glaser, and F. Jelezko, “The quantum technologies roadmap: a European community view,” New J. Phys 20(8), 080201 (2018). [CrossRef]  

32. D. Ribezzo, M. Zahidy, I. Vagniluca, et al., “Deploying an Inter-European Quantum Network,” Adv. Quantum Technol. 6(2), 2200061 (2023). [CrossRef]  

33. T.-Y. Chen, X. Jiang, S.-B. Tang, et al., “Implementation of a 46-node quantum metropolitan area network,” npj Quantum Inf. 7(1), 134 (2021). [CrossRef]  

34. J. F. Dynes, A. Wonfor, W. W.-S. Tam, A. W. Sharpe, R. Takahashi, M. Lucamarini, A. Plews, Z. L. Yuan, A. R. Dixon, J. Cho, Y. Tanizawa, J.-P. Elbers, H. Greißer, I. H. White, R. V. Penty, and A. J. Shields, “Cambridge quantum network,” npj Quantum Inf. 5(1), 101 (2019). [CrossRef]  

35. T. Paraiso, T. Roger, D. G. Marangon, I. D. Marco, M. Sanzaro, R. I. Woodward, J. F. Dynes, Z. L. Yuan, and A. J. Shields, “A photonic integrated quantum secure communication system,” Nat. Photonics 15(11), 850–856 (2021). [CrossRef]  

36. R. Sax, A. Boaron, G. Boson, S. Atzeni, A. Crespi, F. Grunenfelder, D. Rusca, A. Al-Saadi, D. Bronzi, S. Kupijai, H Rhee, R. Osellame, and H. Zbinden, “High-speed integrated QKD system,” Photonics Res. 11(6), 1007–1014 (2023). [CrossRef]  

37. J. K. Cooper, “Aerial fiber optic cables maximize profitability of utility rights of way,” in 2000 Rural Electric Power Conference, paper D1/1-D1/6 (2000).

38. K. Tsujimoto, H. Sakurada, T. Kato, and A. Okazato, “Development and Application of Composite Overhead Ground Wire with Optical Fibers,” IEEE Trans. Power Appar. Syst. PAS-102(5), 1378–1383 (1983). [CrossRef]  

39. L. Faltin, “Laboratory and Field Tests on Composite Fiber Optic Overhead Ground Wire,” J. Opt. Commun. 7(4), 144–146 (1986). [CrossRef]  

40. D. S. Waddy, P. Lu, L. Chen, and X. Bao, “Fast state of polarization changes in aerial fiber under different climatic conditions,” IEEE Photonics Technol. Lett. 13(9), 1035–1037 (2001). [CrossRef]  

41. J. Wuttke, P. M. Krummrich, and J. Rosch, “Polarization oscillations in aerial fiber caused by wind and power-line current,” IEEE Photonics Technol. Lett. 15(6), 882–884 (2003). [CrossRef]  

42. Y.-L. Tang, “Quantum key distribution system based on time phase coding without phase modulator and assembly thereof,” Chinese Patent application CN108933661A (04 Dec 2018).

43. S. Nauerth, M. Furst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, “Information leakage via side channels in freespace BB84 quantum cryptography,” New J. Phys. 11(6), 065001 (2009). [CrossRef]  

44. X.-T. Fang, P. Zeng, H. Liu, et al., “Implementation of quantum key distribution surpassing the linear rate-transmittance bound,” Nat. Photonics 14(7), 422–425 (2020). [CrossRef]  

45. G. L. Roberts, M. Pittaluga, M. Minder, M. Lucamarini, J. F. Dynes, Z. L. Yuan, and A. J. Shields, “Patterning-effect mitigating intensity modulator for secure decoy-state quantum key distribution,” Opt. Lett. 43(20), 5110 (2018). [CrossRef]  

46. C. Agnesi, M. Avesani, A. Stanco, P. Villoresi, and G. Vallone, “All-fiber self-compensating polarization encoder for quantum key distribution,” Opt. Lett. 44(10), 2398–2401 (2019). [CrossRef]  

47. A. Huang, Á. Navarrete, S.-H. Sun, P. Chaiwongkhot, M. Curty, and V. Makarov, “Laser-seeding attack in quantum key distribution,” Phys. Rev. Appl. 12(6), 064043 (2019). [CrossRef]  

48. X.-F. Mo, B. Zhu, Z.-F. Han, Y.-Z. Gui, and G.-C. Guo, “Faraday-Michelson system for quantum cryptography,” Opt. Lett. 30(19), 2632–2634 (2005). [CrossRef]  

49. D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, “Quantum key distribution overe 67 km with a plug&play system,” New J. Phys. 4, 41 (2002). [CrossRef]  

50. D.-D. Li, S. Gao, G.-C. Li, L. Xue, L.-W. Wang, C.-B. Lu, Y. Xiang, Z.-Y. Zhao, L.-C. Yan, Z.-Y. Chen, G. Yu, and J.-H. Liu, “Field implementation of long-distance quantum key distribution over aerial fiber with fast polarization feedback,” Opt. Express 26(18), 22793–22800 (2018). [CrossRef]  

51. A. Laing, V. Scarani, J. G. Rarity, and J. L. O’Brien, “Reference-frame-independent quantum key distribution,” Phys. Rev. A 82(1), 012304 (2010). [CrossRef]  

52. A. Tanaka, M. Fujiwara, K. I. Yoshino, S. Takahashi, Y. Nambu, A. Tomita, S. Miki, T. Yamashita, Z. Wang, M. Sasaki, and A. Tajima, “High-speed quantum key distribution system for 1-mbps real-time key generation,” IEEE J. Quantum Electron. 48(4), 542–550 (2012). [CrossRef]  

53. Y. S. Lo, R. I. Woodward, N. Walk, M. Lucamarini, I. De Marco, T. K. Parïso, M. Pittaluga, T. Roger, M. Sanzaro, Z. L. Yuan, and A. J. Shields, “Simplified intensity- and phase-modulated transmitter for modulator-free decoy-state quantum key distribution,” APL Photonics 8(3), 036111 (2023). [CrossRef]  

54. Y.-L. Tang, “Light source for quantum communication system and encoding device,” U. S. Patent US20210083776A1 (18 Mar 2021).

55. F.-Y. Lu, Z.-H. Wang, J.-L. Chen, S. Wang, Z.-Q. Yin, D.-Y. He, R. Wang, W. Chen, G.-J. Fan-Yuan, G.-C. Guo, and Z.-F. Han, “Experimental demonstration of fully passive quantum key distribution,” arXiv, arXiv: 2304.11655v1 (2023). [CrossRef]  

56. We used an optical spectrum analyzer (AQ6370D), which provides an resolution of sub-pm (determined by the sampling interval and repeatability when focusing only on the relative wavelength deviation resolution. See User’s Manual, https://cdn.tmi.yokogawa.com/1/6058/files/IMAQ6370D-01EN.pdf.

57. T. K. Parïso, R. I. Woodward, D. G. Marangon, V. Lovic, Z.-L. Yuan, and A. J. Shields, “Advanced Laser Technology for Quantum Communications (Tutorial Review),” Adv. Quantum Technol. 4(10), 2100062 (2021). [CrossRef]  

58. X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Phys. Rev. A 72(1), 012326 (2005). [CrossRef]  

59. A high-speed multi-channel physical random number generator based on the clock jitter scheme, packaged in a 6mm x 6mm 48-pin QFN package. It can provide up to 10 channels of independent physical random number sequences, with maximum single-channel output of 625Mbps. Model: QCTWNG from QuantumCTek. See http://www.quantum-info.com/English/product/pfour/hexinqijian/2017/0831/310.html.

60. A piezoelectric-driven device that achieves precise phase control by stretching the length of the fiber. It can provide phase shift of several π with a response rate up to several kHz. Model: QFPS from QuantumCTek. See http://www.quantum-info.com/English/product/pfour/hexinqijian/2017/0831/310.html.

61. C. C. W. Lim, M. Curty, N. Walenta, F. Xu, and H. Zbinden, “Concise security bounds for practical decoy-state quantum key distribution,” Phys. Rev. A 89(2), 022307 (2014). [CrossRef]  

62. Z. Zhang, Q. Zhao, M. Razavi, and X. Ma, “Improved key-rate bounds for practical decoy-state quantum-key-distribution systems,” Phys. Rev. A 95(1), 012333 (2017). [CrossRef]  

63. C.-H. F. Fung, X. Ma, and H. F. Chau, “Practical issues in quantum-key-distribution postprocessing,” Phys. Rev. A 81(1), 012318 (2010). [CrossRef]  

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (6)

Fig. 1.
Fig. 1. Plan view showing the experimental site in the field test of QKD over the deployed aerial fiber link. The fiber length is 87.28 km for the whole link, with the overall loss of 23.27 dB. LD: laser diode, BS: beam splitter, ISO: isolator, PM: phase modulator, FDL: fiber delay line, CIR: circulator, VOA: variable optical attenuator, FBG: fiber Bragg grating, DWDM: dense wavelength-division multiplexer, FM: Faraday Mirror, APD: avalanche photodiode.
Fig. 2.
Fig. 2. Measured secure key rate and QBER over 70 days between 2022.01.18 and 2022.03.28 during the field test. The overall loss of the quantum link is 23.27 dB.
Fig. 3.
Fig. 3. Status of electrical driving signals of lasers (three master lasers and one slave laser) corresponding to four quantum states.
Fig. 4.
Fig. 4. Spectrum of the 0 pulse and the $\pi$ pulse. When master laser #0 is on, both master lasers #1 and #2 with different initial wavelengths are locked to master laser #0 and share the same wavelength, and thus the 0 pulses and the $\pi$ pulse can also share the same wavelength.
Fig. 5.
Fig. 5. The measured waveform of quantum state after injection locking.
Fig. 6.
Fig. 6. Feedback scheme using feedback frame time-multiplexed with the quantum frame by 20% time consumption.

Tables (2)

Tables Icon

Table 1. Comparison of our results with previous work.

Tables Icon

Table 2. Measured and derived specifications based on decoy states.

Equations (6)

Equations on this page are rendered with MathJax. Learn more.

L = M 1 z z L [ 1 H 2 ( e 1 z z p U ) ] + M 1 x x L [ 1 H 2 ( e 1 x x p U ) ] l e a k E C .
M 1 z z L = F L ( Q 1 z z L p b z N μ z , Q 1 z z L p b z N μ z ) ,
Q 1 z z L = μ 2 e μ μ ν ν 2 ( Q ν z z L e ν Q μ z z U e μ ν 2 μ 2 Y 0 z U μ 2 ν 2 μ 2 ) ,
e 1 z z p U = e 1 x x U + θ x m i n { ( E μ x x Q μ x x ) U e μ e 0 Y 0 x L Y 1 x x L μ , ( E ν x x Q ν x x ) U e ν e 0 Y 0 x L Y 1 x x L ν } + θ x ,
θ x = 2 X t m p ( 1 e 1 x x U ) e 1 x x U ln 2 ( 1 q x ) q x ,
X t m p = 1 M 1 x x L + M 1 z z L log 2 ( ξ r s e 1 x x U ( 1 e 1 x x U ) M 1 x x L M 1 z z L M 1 x x L + M 1 z z L ) ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.