• Featured in Physics
  • Editors' Suggestion

Experimental Measurement-Device-Independent Quantum Key Distribution

Yang Liu, Teng-Yun Chen, Liu-Jun Wang, Hao Liang, Guo-Liang Shentu, Jian Wang, Ke Cui, Hua-Lei Yin, Nai-Le Liu, Li Li, Xiongfeng Ma, Jason S. Pelc, M. M. Fejer, Cheng-Zhi Peng, Qiang Zhang, and Jian-Wei Pan
Phys. Rev. Lett. 111, 130502 – Published 23 September 2013
Physics logo See Viewpoint: Foiling Quantum Hackers
PDFHTMLExport Citation

Abstract

Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  • Figure
  • Figure
  • Figure
  • Received 21 April 2013

DOI:https://doi.org/10.1103/PhysRevLett.111.130502

© 2013 American Physical Society

Viewpoint

Key Image

Foiling Quantum Hackers

Published 23 September 2013

Researchers have implemented a new quantum encryption method that, in principle, may provide the ultimate security against hackers in real-world cryptography applications.

See more in Physics

Authors & Affiliations

Yang Liu1, Teng-Yun Chen1, Liu-Jun Wang1, Hao Liang1, Guo-Liang Shentu1, Jian Wang1, Ke Cui1, Hua-Lei Yin1, Nai-Le Liu1, Li Li1, Xiongfeng Ma2,*, Jason S. Pelc3, M. M. Fejer3, Cheng-Zhi Peng1, Qiang Zhang1,†, and Jian-Wei Pan1,‡

  • 1Department of Modern Physics and Hefei National Laboratory for Physical Sciences at Microscale, Shanghai Branch, University of Science and Technology of China, Hefei, Anhui 230026, People’s Republic of China
  • 2Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing 100084, People’s Republic of China
  • 3E. L. Ginzton Laboratory, Stanford University, 348 Via Pueblo Mall, Stanford, California 94305, USA

  • *xma@tsinghua.edu.cn
  • qiangzh@ustc.edu.cn
  • pan@ustc.edu.cn

See Also

Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks

A. Rubenok, J. A. Slater, P. Chan, I. Lucio-Martinez, and W. Tittel
Phys. Rev. Lett. 111, 130501 (2013)

Article Text (Subscription Required)

Click to Expand

Supplemental Material (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 111, Iss. 13 — 27 September 2013

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review Letters

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×