Building a quantum internet requires efficient and reliable quantum hardware, from photonic sources to quantum repeaters and detectors, ideally operating at telecommunication wavelengths. Thanks to their high brightness and single-photon purity, quantum dot (QD) sources hold the promise to achieve high communication rates for quantum-secured network applications. Furthermore, it was recently shown that excitation schemes such as longitudinal acoustic phonon-assisted (LA) pumping provide security benefits by scrambling the coherence between the emitted photon-number states. In this work, we investigate further advantages of LA-pumped quantum dots with emission in the telecom C-band as a core hardware component of the quantum internet. We experimentally demonstrate how varying the pump power and spectral detuning with respect to the excitonic transition can improve quantum-secured communication rates and provide stable emission statistics regardless of network-environment fluctuations. These findings have significant implications for general implementations of QD single-photon sources in practical quantum communication networks.

The emergence of practical quantum technology paves the way to a quantum internet—a network of connected quantum computers capable of reaching computational speed-ups in various tasks such as prime factoring,1 machine learning,2 and the verification of NP-complete problems with limited information.3 Although such schemes are appealing, most are technologically challenging, while the security advantages provided by quantum cryptography are more tangible.4–6 A broad range of quantum-cryptographic primitives including quantum key distribution (QKD),4–6 quantum coin flipping,7–9 unforgeable quantum tokens,10–12 and quantum bit commitment13–15 have been developed to demonstrate some security advantage over their classical counterparts. The success of a future quantum internet then relies on the development of fundamental quantum hardware (sources, repeaters, and detectors), which should adhere to these primitives' security standards, provide high communication rates, and operate reliably in a real-world environment.16 

Non-classical light sources such as spontaneous parametric downconversion,17,18 nitrogen-vacancy centers,19 and trapped atoms20 have been used as hardware for the first quantum networks. In recent years, semiconductor quantum dots (QDs) have materialized as highly versatile and quality single-photon sources,21–25 with outstanding end-to-end efficiencies overcoming 57% and the potential to reach repetition rates of tens of GHz.24 Such emission properties of QDs have led to the implementation of complex network building blocks relying on quantum teleportation26,27 and quantum entanglement swapping.22,23,28 Regarding the emission wavelength, the spectral regime of the telecom C-band (1530–1565 nm) is highly appealing, due to its global absorption minimum in standard silica fibers, the possibility to implement daylight satellite communication,29 and the compatibility with the mature silicon photonic platforms.30 QDs with emission wavelengths in and around the C-band are available on indium phosphide (InP)31–33 and gallium arsenide (GaAs) material system,34–36 and circumvent the technical overhead and losses of quantum frequency conversion.37 Embedded in circular Bragg cavities, QDs based on the well-established GaAs platform have simultaneously demonstrated high brightness and high purity values recently.36 

Previous works have investigated the advantages and drawbacks of various optical pumping schemes (resonant, phonon-assisted, and two-photon excitation) in terms of efficiency, single-photon purity, and indistinguishability.38–40 On the other hand, it was recently shown that such schemes must be carefully tuned to satisfy the security assumptions of each quantum-cryptographic application.41 Crucially, quantum coherences between the emitted photon-number components must be scrambled for optimal performance, which is inherently provided by some optical pumping schemes such as longitudinal phonon-assisted (LA) excitation and two-photon excitation (TPE).41 On top of their intrinsic security benefits, LA schemes are fairly insensitive to pump instabilities like power or polarization fluctuations, making them suitable for real-life communication networks.38,39 These excitation schemes are also beneficial for QDs with a complex charge environment, while other pumping schemes such as TPE can typically only address charge-neutral transitions. Moreover, unlike for neutral transitions, charged excitons can enhance polarized emission in polarized cavities, an important feature for most applications.24 Finally, LA schemes do not require challenging single-photon polarization filtering (contrary to the resonant counterpart), and, thus, promise an experimentally straightforward way to obtain simultaneously high brightness and purity with high reproducibility in quantum dot fabrication and experimental setups.38 

In this work, we combine all aforementioned advantages of LA excitation in the C-band and exploit its tunable parameters to investigate the complex dependence of brightness and purity on pump power and spectral detuning. We illustrate how this non-trivial behavior affects the security of quantum-cryptographic primitives with the example of single-photon QKD, and how the optimal operation conditions depend on the communication distance. In agreement with theoretical findings,42 our results show that the characteristics of LA excitation can be tuned to achieve the ideal photon-number statistics. This optimization is reminiscent of the mean-photon adjustment required in weak coherent state (WCS) implementations.43 

To start investigating and optimizing our excitation parameters, it is important to note that most quantum-secured applications rely on few trusted parameters that are typically not all experimentally accessible. Here, we infer the photon-number probabilities { p k } from two measurements, the brightness B = k = 1 p k and the single-photon purity P = 1 g ( 2 ) ( 0 ), where g ( 2 ) ( 0 ) is the second-order auto-correlation measurement evaluated at zero time delay. We use an InAs QD based on an InGaAs metamorphic buffer layer enabling emission in the telecommunication C-band.35 The tunable excitation is provided by a mode-locked fiber laser with a pulse length of 17(1) ps and a FWHM spectral width of 210(20) pm. The QD transition line is filtered by a set of volume Bragg grating filters (FWHM = 0.2 nm). The total setup efficiency is determined to be 13%. For more experimental details, see supplementary material Note 1. The highest single-photon purity under pulsed LA excitation was measured as P = 0.982, the corresponding second-order auto-correlation measurement is shown in Fig. 1.

FIG. 1.

Characterization of the positively charged exciton transition under pulsed LA excitation. Second-order auto-correlation measurement g(2)(τ) for an excitation field strength of 0.46a.u. and a detuning of 1.5 nm. The well-suppressed peak at zero time delay confirms the high single-photon purity [g(2)(0)=0.018(1)]. Further details on the analysis of g(2)(0) can be found in supplementary material Note 2. The inset shows a micro photoluminescence (μ-PL) spectrum of the studied transition, including spectral suppression of the laser with an excitation field strength of 0.89a.u. and a detuning of 1.5 nm from the QD resonance.

FIG. 1.

Characterization of the positively charged exciton transition under pulsed LA excitation. Second-order auto-correlation measurement g(2)(τ) for an excitation field strength of 0.46a.u. and a detuning of 1.5 nm. The well-suppressed peak at zero time delay confirms the high single-photon purity [g(2)(0)=0.018(1)]. Further details on the analysis of g(2)(0) can be found in supplementary material Note 2. The inset shows a micro photoluminescence (μ-PL) spectrum of the studied transition, including spectral suppression of the laser with an excitation field strength of 0.89a.u. and a detuning of 1.5 nm from the QD resonance.

Close modal

While scanning both the power and wavelength of the pump laser, we simultaneously measure the brightness B [experimentally evaluated according to Eq. (S2) and corresponding to first-lens brightness] and single-photon purity P. We then compile the results in 2D maps as shown in Figs. 2(a) and 2(b), respectively. Due to the low phonon density at a sample temperature of  4 K, we excite the QD only with positive detunings Δ = ( ω laser ω dot ) > 0. The brightness map features a single, broad maximum around Δ 0.8 meV ( Δ λ 1.5 nm) agreeing with similar experimental findings44,45 and theoretical studies.46,47 LA excitation with sufficiently smooth pulses48 achieves a population inversion of the QD ground and excited state if the effective Rabi splitting of the laser-dressed states, Ω eff = ( Ω ) 2 + Δ 2, ensures an efficient exciton-phonon coupling that is characterized by the spectral phonon density J ( ω ).44,46 The robustness of this scheme against power and wavelength fluctuations of the excitation laser is demonstrated by the broad maximum of the brightness in Fig. 2(a) and stems from the spectral width of J ( ω ). Thus, the large bandwidth of the phonon interaction directly benefits a stable operation of the QD source. Only for large detunings and weak fields, the phonon-induced relaxation to the exciton level fails and the brightness drops significantly. Similarly, for high powers, the effective Rabi splitting is no longer in resonance with the phonon interaction resulting in reduced brightness.

FIG. 2.

Measured photon-number statistics and extrapolated QKD secure key bits per pulse for LA excitation. Scanning the excitation parameters while simultaneously measuring (a) brightness B=k=1pk and (b) single-photon purity P=1g(2)(0) of the QD emission. The white circle (square) marks the set of excitation parameters achieving the optimal brightness (purity). From the photon-number populations {pk}, the secure key bits per pulse (SK) are calculated for zero distance based on the BB84 QKD protocol without (c) and with two decoy states (d). For more details on the parameter estimation, see supplementary material Note 3. The equipotential lines indicate where the SK has dropped to {99%, 95%, and 90%} of their individual SK maxima. The SK was estimated in the asymptotic limit,49  SK=ηsif[Q1(1H2(E1))f(E)QtotH2(Etot)], where H2 is the binary Shannon entropy and ηsif=1/2. Extrapolation for two-state decoy includes an intensity modulator loss of 3 dB. Parameters for all plots are single-photon detection error ed=0.02, detection efficiency ηd=0.86, dark-count probability Y0=1.6×106, and error-correction code inefficiency f = 1.2.

FIG. 2.

Measured photon-number statistics and extrapolated QKD secure key bits per pulse for LA excitation. Scanning the excitation parameters while simultaneously measuring (a) brightness B=k=1pk and (b) single-photon purity P=1g(2)(0) of the QD emission. The white circle (square) marks the set of excitation parameters achieving the optimal brightness (purity). From the photon-number populations {pk}, the secure key bits per pulse (SK) are calculated for zero distance based on the BB84 QKD protocol without (c) and with two decoy states (d). For more details on the parameter estimation, see supplementary material Note 3. The equipotential lines indicate where the SK has dropped to {99%, 95%, and 90%} of their individual SK maxima. The SK was estimated in the asymptotic limit,49  SK=ηsif[Q1(1H2(E1))f(E)QtotH2(Etot)], where H2 is the binary Shannon entropy and ηsif=1/2. Extrapolation for two-state decoy includes an intensity modulator loss of 3 dB. Parameters for all plots are single-photon detection error ed=0.02, detection efficiency ηd=0.86, dark-count probability Y0=1.6×106, and error-correction code inefficiency f = 1.2.

Close modal

In addition to emission efficiency, the single-photon purity of the quantum-light source is crucial to the performance of cryptographic protocols.41 Therefore, we analyze the purity P, depicted in Fig. 2(b), for the same parameter range as the brightness. We identify a broad region of high purity at similar detunings but shifted toward lower powers. At large detunings, the purity degrades because the exciton state preparation via LA phonons becomes less efficient [evident by the low brightness in the same area of Fig. 2(a)] and spurious contributions to the emission, including neighboring QDs or a quasi-continuum of transitions, are no longer negligible. Considering a perfect two-level system, Ref. 42 predicts an enhanced purity for increasing excitation field strength because the phonon-induced level inversion is delayed until the end of the pulse. As a consequence, the chance of a re-excitation event during the same pulse, as it is known for resonant pumping,38,50 would be reduced. In our experiment, however, this process competes with, and is eventually out-weighed by, the aforementioned unintended emission decreasing the purity at high powers significantly.

Interestingly, our experimental findings imply the absence of a trivial set of optimal parameters (simultaneously maximizing brightness and single-photon purity), which confirms some of the complex behaviors predicted in previous theory works.41,42 Instead, a careful tuning of the excitation parameters is required for each quantum-cryptographic application. Depending on the desired security of merit, the correct weighting of the photon-number populations { p k } used for the optimization41 must be defined. At the same time, fluctuations in the excitation parameters produce only small changes in photon-number populations. Furthermore, optimal brightness and near-optimal purity are achieved for a pump pulse detuned by  1.5 nm from the QD transition that can be readily separated from the single-photon emission using efficient, off-the-shelf spectral filters. This simplifies source operation and optimizes brightness by removing the need for a cross-polarization setup, further underlining the practicality of LA excitation for network applications.4–9,11–15,51

We now experimentally show how to perform the excitation parameter optimization for the example of QKD, arguably the best-known primitive in quantum communication. QKD allows two parties to establish a secret key over an eavesdropped channel.4,52 In that sense, the most natural figure of merit is the number of secure bits communicated per round of the protocol. This quantity can be computed from two experimental parameters: the total gain Q tot, corresponding to the probability of detecting at least one photon from a given pulse sent by Alice, and the total error rate E tot, indicating the fraction of states for which the wrong (polarization) detector clicks. Naturally, only the error-free single-photon states contribute positively to the secure key, while the multi-photon contribution p m leaks significant amounts of information. Starting from experimental data, one therefore needs to estimate the values of the single-photon gain Q1 and the single-photon error rate E1, which are not directly accessible. In supplementary material Note 3, we infer these quantities in two ways: first by deriving an upper bound on the multi-photon emission probability
(1)
and second by employing the two-state decoy approach.53,54 Compared to previous work,55 Eq. (1) gives an explicit expression for p m relying only on the experimentally accessible B and g ( 2 ) ( 0 ) and provides additional intuition to Ref. 56.

Following the parameter estimation, we calculate the attainable secure key bits per pulse (SK) in the asymptotic regime for standard and decoy-state BB84 QKD for each set of excitation parameters as shown for zero communication distance in Figs. 2(c) and 2(d), respectively. For the decoy protocol, we include a typical 3 dB loss for a high-bandwidth intensity modulator required to produce the decoys. While the qualitative dependence of the SK is very similar for both protocols, the performance gap is evident in the absolute values. Decoy states have been introduced to handle the risk of multi-photon contributions p m, but since these are inherently small for QDs, introducing the constant loss of the intensity modulator outweighs the effect of an exact bounding of p m. Furthermore, recalling that quantum cryptography with off-resonantly or two-photon excited QDs does not require any modulator for phase scrambling, adding an intensity modulator for decoy would increase the setup complexity. Comparing Fig. 2 finally shows that for zero distance the brightness (more accurately, p1) dominates the SK map making a tight bounding of p m even less relevant.

However, the impact of the multi-photon events on the SK comes into play for non-zero communication distances making the ideal set of { p k } no longer trivial but dependent on the channel loss. Computing SK maps at four distances, as depicted in Figs. 3(a)–3(d), visualizes the shift in source requirements. Short-distance transmissions benefit most from a bright source, whereas high-loss scenarios such as long-distance communication call for sources with high purity. Figure 3(e) then shows how these four ideal parameter sets behave over distances. The difference in performance underlines the potential of individually adjusting the excitation conditions with respect to the channel loss. Note that the joint optimization of { p k } by tuning the pump conditions is possible with resonant or two-photon excitation but less performant. In supplementary material Note 4, we also present the optimal finite-size SK for various block sizes.

FIG. 3.

Secure key rates of BB84 QKD for varying communication distances. Secure key bits per pulse for the LA excitation parameter space in a standard BB84 QKD scenario for increasing channel length {50, 90, 130, and 170 km} (a)–(d), where we assumed a fiber attenuation of α = 0.17 dB/km, typical for the telecom C-band. The white circle (square) marks the set of excitation parameters achieving the optimal brightness (purity) as shown in Fig. 2, whereas the colored hexagon marks the trade-off between the two, optimizing the SK at the given distance. The color scale of each map is normalized to its maximum SK that is noted in the bottom right corner of each map. (e) Calculating the SK for each highlighted parameter set from (a) to (d) as a function transmission loss demonstrates how the tunability of LA excitation helps to adapt the emission statistics to the channel. The two-state decoy protocol reduces the SK by a factor of ∼3 at short and medium distances but performs better in the high-loss regime. The parameters used to calculate the SK are the same as for Fig. 2.

FIG. 3.

Secure key rates of BB84 QKD for varying communication distances. Secure key bits per pulse for the LA excitation parameter space in a standard BB84 QKD scenario for increasing channel length {50, 90, 130, and 170 km} (a)–(d), where we assumed a fiber attenuation of α = 0.17 dB/km, typical for the telecom C-band. The white circle (square) marks the set of excitation parameters achieving the optimal brightness (purity) as shown in Fig. 2, whereas the colored hexagon marks the trade-off between the two, optimizing the SK at the given distance. The color scale of each map is normalized to its maximum SK that is noted in the bottom right corner of each map. (e) Calculating the SK for each highlighted parameter set from (a) to (d) as a function transmission loss demonstrates how the tunability of LA excitation helps to adapt the emission statistics to the channel. The two-state decoy protocol reduces the SK by a factor of ∼3 at short and medium distances but performs better in the high-loss regime. The parameters used to calculate the SK are the same as for Fig. 2.

Close modal
The maximum distance for which the generation of a secure key is still possible is of great interest for applications. Since there is no analytical expression, we state the maximal communication distance as minimal channel transmission η ch min and find that the approximation
(2)
where Y0 is the dark-count probability, which captures the breakdown of secure key generation due to multi-photon contributions well under realistic assumptions. Due to its construction (effectively lower bounding η ch min), Eq. (2) always overestimates the distance by 30 km (see supplementary material Note 5). Equation (2) also implies that, within the limits of the approximation, a brighter source reduces the maximum communication distance. Counter-intuitive at first sight, this is readily explained as the multi-photon probability p m increases with the source brightness if g ( 2 ) ( 0 ) is unchanged [see Eq. (1)]. While brighter QDs further improve the SK at short to medium distances, one must reduce the multi-photon component when communicating over large distances. For this purpose, simply attenuating the signal before launching it into the untrusted channel is sufficient.55 Note how this approach resembles the mean-photon number optimization used for QKD with WCS.43 Considering a detector dark-count probability Y 0 = 10 7, single-photon detection error e d = 0.02 and a highly pure source ( g ( 2 ) ( 0 ) = 0.02), our numerical analysis (see supplementary material Note 5) identifies the ideal brightness for maximum distance as B 0.9 %. This is well within range of today's telecom C-band QD-technology.

Finally, we remark that implementing decoy states could be advantageous in the long-distance regime even for highly pure single-photon sources such as QDs, as reflected in Fig. 3(e). However, for low to moderate loss, standard BB84 outperforms the decoy-state protocol.

In conclusion, we have investigated the benefits that phonon-assisted excitation of a telecom C-band QD provides for quantum-secured applications. In addition to the convenient wavelength for communication applications, the InAs QDs provide a deep confinement potential, typically spanning over several hundred millielectron volts. As a consequence, their photon-number statistics are relatively insensitive to temperature fluctuations.57 Moreover, the source can be operated at 25 K, which is feasible for a low-cost Stirling cryostat.36 

In addition to the previously simulated low photon-number coherence,41 the robustness to environmental fluctuations,39 and the efficient single-photon filtering, we have shown that LA excitation allows to effectively optimize the photon-number statistics with respect to the desired application. This feature originates from interaction with the phonon environment and is, therefore, not common to resonant excitation schemes but can be exploited by tailoring the LA pumping conditions. The complex implications of phonon interactions for brightness and single-photon purity have also been theoretically predicted for idealized systems.42 Therefore, our observations can be generalized to other QD-based sources.

As a means of improving the emission statistics independently of the excitation mechanism, temporal filtering of the signal was proposed58,59 but requires special hardware and comes at the price of additional loss. Moreover, we show in supplementary material Note 6 that optimizing { p k } using only the LA pump power is as efficient as temporal filtering with a fast and lossless modulator. Only at very large distances, temporal filtering performs better since it also reduces the source brightness and detector dark counts.

However, we note that two-photon excitation can simultaneously yield a higher brightness and purity than achievable for any parameter set using the LA scheme.50 Nevertheless, two-photon excitation—being a resonant process—is sensitive to environmental fluctuations and is, thus, less suitable for real-world implementations.

Furthermore, we found that even for quantum light sources with inherently low multi-photon contribution, decoy states can push the maximum attainable distance in QKD. However, in consideration of the low SK at these distances and the experimental overhead involved, we believe that decoy states are not beneficial for QD implementations.

Finally, we would like to stress that we optimized the photon-number statistics in LA excitation with respect to QKD as an example, but the process is transferable to other quantum-secured applications7–15 and prone to improve their performance.

See the supplementary material for a detailed description of the experimental setup and the data processing methods.

We thank R. Joos for fruitful discussions. This research was funded in whole, or in part, from the European Union's Horizon 2020 and Horizon Europe Research and Innovation programme under Grant Agreement No. 899368 (EPIQUS), the Marie Skłodowska-Curie Grant Agreement No. 956071 (AppQInfo), and the QuantERA II Programme under Grant Agreement No. 101017733(PhoMemtor); from the Austrian Science Fund (FWF) through [F7113] (BeyondC) and [FG5] (Research group 5); and from the Austrian Federal Ministry for Digital and Economic Affairs, the National Foundation for Research, Technology and Development, the Christian Doppler Research Association, the German Federal Ministry of Education and Research (BMBF) via the project QR.X (No.16KISQ013), and the European Union's Horizon 2020 Research and Innovation Program under Grant Agreement No. 899814 (Qurope). Furthermore, this project (20FUN05 SEQUME) has received funding from the EMPIR programme co-financed by the Participating States and from the European Union's Horizon 2020 Research and Innovation programme.

The authors have no conflicts to disclose.

Michal Vyvlecka and Lennart Jehle contributed equally to this work.

Michal Vyvlecka: Conceptualization (equal); Data curation (equal); Methodology (equal); Resources (equal); Validation (equal); Visualization (equal); Writing – original draft (equal). Lennart Jehle: Conceptualization (equal); Data curation (equal); Formal analysis (equal); Investigation (equal); Methodology (equal); Software (equal); Visualization (equal); Writing – original draft (equal). Cornelius Nawrath: Formal analysis (equal); Resources (equal); Software (equal); Validation (equal); Writing – original draft (equal). Francesco Giorgino: Software (equal); Validation (equal); Writing – original draft (equal). Mathieu Bozzio: Conceptualization (equal); Methodology (equal); Software (equal); Writing – original draft (equal). Robert Sittig: Resources (equal). Michael Jetter: Resources (equal); Supervision (equal). Simone Luca Portalupi: Funding acquisition (equal); Supervision (equal); Writing – review & editing (equal). Peter Michler: Funding acquisition (equal); Supervision (equal); Writing – review & editing (equal). Philip Walther: Funding acquisition (equal); Resources (equal); Supervision (equal); Writing – review & editing (equal).

The data that support the findings of this study are available from the corresponding authors upon reasonable request.

1.
E.
Martín-López
,
A.
Laing
,
T.
Lawson
,
R.
Alvarez
,
X.-Q.
Zhou
, and
J. L.
O'Brien
, “
Experimental realization of Shor's quantum factoring algorithm using qubit recycling
,”
Nat. Photonics
6
,
773
776
(
2012
).
2.
V.
Saggio
,
B. E.
Asenbeck
,
A.
Hamann
,
T.
Strömberg
,
P.
Schiansky
,
V.
Dunjko
,
N.
Friis
,
N. C.
Harris
,
M.
Hochberg
,
D.
Englund
,
S.
Wölk
,
H. J.
Briegel
, and
P.
Walther
, “
Experimental quantum speed-up in reinforcement learning agents
,”
Nature
591
,
229
233
(
2021
).
3.
F.
Centrone
,
N.
Kumar
,
E.
Diamanti
, and
I.
Kerenidis
, “
Experimental demonstration of quantum advantage for NP verification with limited information
,”
Nat. Commun.
12
,
850
(
2021
).
4.
F.
Xu
,
X.
Ma
,
Q.
Zhang
,
H.-K.
Lo
, and
J.-W.
Pan
, “
Secure quantum key distribution with realistic devices
,”
Rev. Mod. Phys.
92
,
025002
(
2020
).
5.
R.
Bedington
,
J.-M.
Arrazola
, and
A.
Ling
, “
Progress in satellite quantum key distribution
,”
npj Quantum Inf.
3
,
30
(
2017
).
6.
A.
Boaron
,
G.
Boso
,
D.
Rusca
,
C.
Vulliez
,
C.
Autebert
,
M.
Caloz
,
M.
Perrenoud
,
G.
Gras
,
F.
Bussières
,
M.-J.
Li
,
D.
Nolan
,
A.
Martin
, and
H.
Zbinden
, “
Secure quantum key distribution over 421 km of optical fiber
,”
Phys. Rev. Lett.
121
,
190502
(
2018
).
7.
S.
Neves
,
V.
Yacoub
,
U.
Chabaud
,
M.
Bozzio
,
I.
Kerenidis
, and
E.
Diamanti
, “
Experimental cheat-sensitive quantum weak coin flipping
,”
Nat. Commun.
14
,
1855
(
2023
).
8.
G.
Berlín
,
G.
Brassard
,
F.
Bussières
,
N.
Godbout
,
J. A.
Slater
, and
W.
Tittel
, “
Experimental loss-tolerant quantum coin flipping
,”
Nat. Commun.
2
,
561
(
2011
).
9.
A.
Pappa
,
P.
Jouguet
,
T.
Lawson
,
A.
Chailloux
,
M.
Legré
,
P.
Trinkler
,
I.
Kerenidis
, and
E.
Diamanti
, “
Experimental plug and play quantum coin flipping
,”
Nat. Commun.
5
,
3717
(
2014
).
10.
P.
Schiansky
,
J.
Kalb
,
E.
Sztatecsny
,
M.-C.
Roehsner
,
T.
Guggemos
,
A.
Trenti
,
M.
Bozzio
, and
P.
Walther
, “
Demonstration of quantum-digital payments
,”
Nat. Commun.
14
,
3849
(
2023
).
11.
A.
Kent
,
D.
Lowndes
,
D.
Pitalúa-García
, and
J.
Rarity
, “
Practical quantum tokens without quantum memories and experimental tests
,”
npj Quantum Inf.
8
,
28
(
2022
).
12.
J.-Y.
Guan
,
J.-M.
Arrazola
,
R.
Amiri
,
W.
Zhang
,
H.
Li
,
L.
You
,
Z.
Wang
,
Q.
Zhang
, and
J.-W.
Pan
, “
Experimental preparation and verification of quantum money
,”
Phys. Rev. A
97
,
032338
(
2018
).
13.
S. K.
Ng
,
N.
Huei
,
Y.
Joshi
,
C.
Chen Ming
,
C.
Kurtsiefer
, and
S.
Wehner
, “
Experimental implementation of bit commitment in the noisy-storage model
,”
Nat. Commun.
3
,
1326
(
2012
).
14.
T.
Lunghi
,
J.
Kaniewski
,
F.
Bussières
,
R.
Houlmann
,
M.
Tomamichel
,
A.
Kent
,
N.
Gisin
,
S.
Wehner
, and
H.
Zbinden
, “
Experimental bit commitment based on quantum communication and special relativity
,”
Phys. Rev. Lett.
111
,
180504
(
2013
).
15.
Y.
Liu
,
Y.
Cao
,
M.
Curty
,
S.-K.
Liao
,
J.
Wang
,
K.
Cui
,
Y.-H.
Li
,
Z.-H.
Lin
,
Q.-C.
Sun
,
D.-D.
Li
,
H.-F.
Zhang
,
Y.
Zhao
,
T.-Y.
Chen
,
C.-Z.
Peng
,
Q.
Zhang
,
A.
Cabello
, and
J.-W.
Pan
, “
Experimental unconditionally secure bit commitment
,”
Phys. Rev. Lett.
112
,
010504
(
2014
).
16.
H. J.
Kimble
, “
The quantum internet
,”
Nature
453
,
1023
1030
(
2008
).
17.
J.-G.
Ren
,
P.
Xu
,
H.-L.
Yong
,
L.
Zhang
,
S.-K.
Liao
,
J.
Yin
,
W.-Y.
Liu
,
W.-Q.
Cai
,
M.
Yang
,
L.
Li
,
K.-X.
Yang
,
X.
Han
,
Y.-Q.
Yao
,
J.
Li
,
H.-Y.
Wu
,
S.
Wan
,
L.
Liu
,
D.-Q.
Liu
,
Y.-W.
Kuang
,
Z.-P.
He
,
P.
Shang
,
C.
Guo
,
R.-H.
Zheng
,
K.
Tian
,
Z.-C.
Zhu
,
N.-L.
Liu
,
C.-Y.
Lu
,
R.
Shu
,
Y.-A.
Chen
,
C.-Z.
Peng
,
J.-Y.
Wang
, and
J.-W.
Pan
, “
Ground-to-satellite quantum teleportation
,”
Nature
549
,
70
73
(
2017
).
18.
X.-S.
Ma
,
T.
Herbst
,
T.
Scheidl
,
D.
Wang
,
S.
Kropatschek
,
W.
Naylor
,
B.
Wittmann
,
A.
Mech
,
J.
Kofler
,
E.
Anisimova
,
V.
Makarov
,
T.
Jennewein
,
R.
Ursin
, and
A.
Zeilinger
, “
Quantum teleportation over 143 kilometres using active feed-forward
,”
Nature
489
,
269
273
(
2012
).
19.
B.
Hensen
,
H.
Bernien
,
A. E.
Dréau
,
A.
Reiserer
,
N.
Kalb
,
M. S.
Blok
,
J.
Ruitenberg
,
R. F. L.
Vermeulen
,
R. N.
Schouten
,
C.
Abellán
,
W.
Amaya
,
V.
Pruneri
,
M. W.
Mitchell
,
M.
Markham
,
D. J.
Twitchen
,
D.
Elkouss
,
S.
Wehner
,
T. H.
Taminiau
, and
R.
Hanson
, “
Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres
,”
Nature
526
,
682
686
(
2015
).
20.
S.
Ritter
,
C.
Nölleke
,
C.
Hahn
,
A.
Reiserer
,
A.
Neuzner
,
M.
Uphoff
,
M.
Mücke
,
E.
Figueroa
,
J.
Bochmann
, and
G.
Rempe
, “
An elementary quantum network of single atoms in optical cavities
,”
Nature
484
,
195
200
(
2012
).
21.
H.
Wang
,
Y. M.
He
,
T. H.
Chung
,
H.
Hu
,
Y.
Yu
,
S.
Chen
,
X.
Ding
,
M. C.
Chen
,
J.
Qin
,
X.
Yang
,
R. Z.
Liu
,
Z. C.
Duan
,
J. P.
Li
,
S.
Gerhardt
,
K.
Winkler
,
J.
Jurkat
,
L. J.
Wang
,
N.
Gregersen
,
Y. H.
Huo
,
Q.
Dai
,
S.
Yu
,
S.
Höfling
,
C. Y.
Lu
, and
J. W.
Pan
, “
Towards optimal single-photon sources from polarized microcavities
,”
Nat. Photonics
13
,
770
775
(
2019
).
22.
F.
Basso Basset
,
M. B.
Rota
,
C.
Schimpf
,
D.
Tedeschi
,
K. D.
Zeuner
,
S. F.
Covre da Silva
,
M.
Reindl
,
V.
Zwiller
,
K. D.
Jöns
,
A.
Rastelli
, and
R.
Trotta
, “
Entanglement swapping with photons generated on demand by a quantum dot
,”
Phys. Rev. Lett.
123
,
160501
(
2019
).
23.
M.
Zopf
,
R.
Keil
,
Y.
Chen
,
J.
Yang
,
D.
Chen
,
F.
Ding
, and
O. G.
Schmidt
, “
Entanglement swapping with semiconductor-generated photons violates Bell's inequality
,”
Phys. Rev. Lett.
123
,
160502
(
2019
).
24.
N.
Tomm
,
A.
Javadi
,
N. O.
Antoniadis
,
D.
Najer
,
M. C.
Löbl
,
A. R.
Korsch
,
R.
Schott
,
S. R.
Valentin
,
A. D.
Wieck
,
A.
Ludwig
, and
R. J.
Warburton
, “
A bright and fast source of coherent single photons
,”
Nat. Nanotechnol.
16
,
399
(
2021
).
25.
L.
Zhai
,
G. N.
Nguyen
,
C.
Spinnler
,
J.
Ritzmann
,
M. C.
Löbl
,
A. D.
Wieck
,
A.
Ludwig
,
A.
Javadi
, and
R. J.
Warburton
, “
Quantum interference of identical photons from remote GaAs quantum dots
,”
Nat. Nanotechnol.
17
,
829
833
(
2022
).
26.
M.
Anderson
,
T.
Müller
,
J.
Huwer
,
J.
Skiba-Szymanska
,
A. B.
Krysa
,
R. M.
Stevenson
,
J.
Heffernan
,
D. A.
Ritchie
, and
A. J.
Shields
, “
Quantum teleportation using highly coherent emission from telecom C-band quantum dots
,”
npj Quantum Inf.
6
,
14
(
2020
).
27.
F. B.
Basset
,
F.
Salusti
,
L.
Schweickert
,
M. B.
Rota
,
D.
Tedeschi
,
S. F. C.
da Silva
,
E.
Roccia
,
V.
Zwiller
,
K. D.
Jöns
,
A.
Rastelli
, and
R.
Trotta
, “
Quantum teleportation with imperfect quantum dots
,”
npj Quantum Inf.
7
,
7
(
2021
).
28.
P.
Lodahl
, “
Quantum-dot based photonic quantum networks
,”
Quantum Sci. Technol.
3
,
013001
(
2018
).
29.
S. K.
Liao
,
H. L.
Yong
,
C.
Liu
,
G. L.
Shentu
,
D. D.
Li
,
J.
Lin
,
H.
Dai
,
S. Q.
Zhao
,
B.
Li
,
J. Y.
Guan
,
W.
Chen
,
Y. H.
Gong
,
Y.
Li
,
Z. H.
Lin
,
G. S.
Pan
,
J. S.
Pelc
,
M. M.
Fejer
,
W. Z.
Zhang
,
W. Y.
Liu
,
J.
Yin
,
J. G.
Ren
,
X. B.
Wang
,
Q.
Zhang
,
C. Z.
Peng
, and
J. W.
Pan
, “
Long-distance free-space quantum key distribution in daylight towards inter-satellite communication
,”
Nat. Photonics
11
,
509
513
(
2017
).
30.
J.
Wang
,
F.
Sciarrino
,
A.
Laing
, and
M. G.
Thompson
, “
Integrated photonic quantum technologies
,”
Nat. Photonics
14
,
273
284
(
2020
).
31.
T.
Miyazawa
,
K.
Takemoto
,
Y.
Nambu
,
S.
Miki
,
T.
Yamashita
,
H.
Terai
,
M.
Fujiwara
,
M.
Sasaki
,
Y.
Sakuma
,
M.
Takatsu
,
T.
Yamamoto
, and
Y.
Arakawa
, “
Single-photon emission at 1.5 μm from an InAs/InP quantum dot with highly suppressed multi-photon emission probabilities
,”
Appl. Phys. Lett.
109
,
132106
(
2016
).
32.
M.
Anderson
,
T.
Müller
,
J.
Skiba-Szymanska
,
A. B.
Krysa
,
J.
Huwer
,
R. M.
Stevenson
,
J.
Heffernan
,
D. A.
Ritchie
, and
A. J.
Shields
, “
Gigahertz-clocked teleportation of time-bin qubits with a quantum dot in the telecommunication C band
,”
Phys. Rev. Appl.
13
,
054052
(
2020
).
33.
G.
Shooter
,
Z.-H.
Xiang
,
J. R. A.
Müller
,
J.
Skiba-Szymanska
,
J.
Huwer
,
J.
Griffiths
,
T.
Mitchell
,
M.
Anderson
,
T.
Müller
,
A. B.
Krysa
,
R.
Mark Stevenson
,
J.
Heffernan
,
D. A.
Ritchie
, and
A. J.
Shields
, “
1GHz clocked distribution of electrically generated entangled photon pairs
,”
Opt. Express
28
,
36838
(
2020
).
34.
T.
Lettner
,
S.
Gyger
,
K. D.
Zeuner
,
L.
Schweickert
,
S.
Steinhauer
,
C.
Reuterskiöld Hedlund
,
S.
Stroj
,
A.
Rastelli
,
M.
Hammar
,
R.
Trotta
,
K. D.
Jöns
, and
V.
Zwiller
, “
Strain-controlled quantum dot fine structure for entangled photon generation at 1550 nm
,”
Nano Lett.
21
,
10501
10506
(
2021
).
35.
R.
Sittig
,
C.
Nawrath
,
S.
Kolatschek
,
S.
Bauer
,
R.
Schaber
,
J.
Huang
,
P.
Vijayan
,
P.
Pruy
,
S. L.
Portalupi
,
M.
Jetter
, and
P.
Michler
, “
Thin-film InGaAs metamorphic buffer for telecom C-band InAs quantum dots and optical resonators on GaAs platform
,”
Nanophotonics
11
,
1109
1116
(
2022
).
36.
C.
Nawrath
,
R.
Joos
,
S.
Kolatschek
,
S.
Bauer
,
P.
Pruy
,
F.
Hornung
,
J.
Fischer
,
J.
Huang
,
P.
Vijayan
,
R.
Sittig
,
M.
Jetter
,
S. L.
Portalupi
, and
P.
Michler
, “
Bright source of purcell-enhanced, triggered, single photons in the telecom c-band
,”
Adv. Quantum Technol.
2023
,
2300111
.
37.
T.
van Leent
,
M.
Bock
,
R.
Garthoff
,
K.
Redeker
,
W.
Zhang
,
T.
Bauer
,
W.
Rosenfeld
,
C.
Becher
, and
H.
Weinfurter
, “
Long-distance distribution of atom-photon entanglement at telecom wavelength
,”
Phys. Rev. Lett.
124
,
010510
(
2020
).
38.
S. E.
Thomas
,
M.
Billard
,
N.
Coste
,
S. C.
Wein
,
H.
Ollivier
,
O.
Krebs
,
L.
Tazaïrt
,
A.
Harouri
,
A.
Lemaitre
,
I.
Sagnes
,
C.
Anton
,
L.
Lanco
,
N.
Somaschi
,
J. C.
Loredo
, and
P.
Senellart
, “
Bright polarized single-photon source based on a linear dipole
,”
Phys. Rev. Lett.
126
,
233601
(
2021
).
39.
M.
Reindl
,
K. D.
Jöns
,
D.
Huber
,
C.
Schimpf
,
Y.
Huo
,
V.
Zwiller
,
A.
Rastelli
, and
R.
Trotta
, “
Phonon-assisted two-photon interference from remote quantum emitters
,”
Nano Lett.
17
,
4090
4095
(
2017
).
40.
M.
Reindl
,
J. H.
Weber
,
D.
Huber
,
C.
Schimpf
,
S. F. C.
da Silva
,
S. L.
Portalupi
,
R.
Trotta
,
P.
Michler
, and
A.
Rastelli
, “
Highly indistinguishable single photons from incoherently excited quantum dots
,”
Phys. Rev. B
100
,
155420
(
2019
).
41.
M.
Bozzio
,
M.
Vyvlecka
,
M.
Cosacchi
,
C.
Nawrath
,
T.
Seidelmann
,
J. C.
Loredo
,
S. L.
Portalupi
,
V. M.
Axt
,
P.
Michler
, and
P.
Walther
, “
Enhancing quantum cryptography with quantum dot single-photon sources
,”
npj Quantum Inf.
8
,
104
(
2022
).
42.
M.
Cosacchi
,
F.
Ungar
,
M.
Cygorek
,
A.
Vagov
, and
V. M.
Axt
, “
Emission-frequency separated high quality single-photon sources enabled by phonons
,”
Phys. Rev. Lett.
123
,
017403
(
2019
).
43.
X.
Ma
, “
Quantum cryptography: Theory and practice
,” arXiv:0808.1385 (
2008
).
44.
J. H.
Quilter
,
A. J.
Brash
,
F.
Liu
,
M.
Glässl
,
A. M.
Barth
,
V. M.
Axt
,
A. J.
Ramsay
,
M. S.
Skolnick
, and
A. M.
Fox
, “
Phonon-assisted population inversion of a single InGaAs/GaAs quantum dot by pulsed laser excitation
,”
Phys. Rev. Lett.
114
,
137401
(
2015
).
45.
S.
Bounouar
,
M.
Müller
,
A. M.
Barth
,
M.
Glässl
,
V. M.
Axt
, and
P.
Michler
, “
Phonon-assisted robust and deterministic two-photon biexciton preparation in a quantum dot
,”
Phys. Rev. B
91
,
161302
(
2015
).
46.
M.
Glässl
,
A. M.
Barth
, and
V. M.
Axt
, “
Proposed robust and high-fidelity preparation of excitons and biexcitons in semiconductor quantum dots making active use of phonons
,”
Phys. Rev. Lett.
110
,
147401
(
2013
).
47.
C.
Gustin
and
S.
Hughes
, “
Efficient pulse–excitation techniques for single photon sources from quantum dots in optical cavities
,”
Adv. Quantum Technol.
3
,
1900073
(
2020
).
48.
A. M.
Barth
,
S.
Lüker
,
A.
Vagov
,
D. E.
Reiter
,
T.
Kuhn
, and
V. M.
Axt
, “
Fast and selective phonon-assisted state preparation of a quantum dot by adiabatic undressing
,”
Phys. Rev. B
94
,
045306
(
2016
).
49.
D.
Gottesman
,
H.-K.
Lo
,
N.
Lütkenhaus
, and
J.
Preskill
, “
Security of quantum key distribution with imperfect devices
,”
Quantum Inf. Comput.
4
,
325
360
(
2004
).
50.
L.
Hanschke
,
K. A.
Fischer
,
S.
Appel
,
D.
Lukin
,
J.
Wierzbowski
,
S.
Sun
,
R.
Trivedi
,
J.
Vučković
,
J. J.
Finley
, and
K.
Müller
, “
Quantum dot single-photon sources with ultra-low multi-photon probability
,”
npj Quantum Inf.
4
,
43
(
2018
).
51.
M.
Bozzio
,
A.
Orieux
,
L. T.
Vidarte
,
I.
Zaquine
,
I.
Kerenidis
, and
E.
Diamanti
, “
Experimental investigation of practical unforgeable quantum money
,”
npj Quantum Inf.
4
,
5
(
2018
).
52.
C. H.
Bennett
and
G.
Brassard
, “
Quantum cryptography: Public key distribution and coin tossing
,” in
Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing
,
Bangalore, India
(IEEE, Piscataway, NJ,
1984
), Vol.
1
, pp.
175
179
.
53.
H.-K.
Lo
,
X.
Ma
, and
K.
Chen
, “
Decoy state quantum key distribution
,”
Phys. Rev. Lett.
94
,
230504
(
2005
).
54.
X.-B.
Wang
, “
Beating the photon-number-splitting attack in practical quantum cryptography
,”
Phys. Rev. Lett.
94
,
230503
(
2005
).
55.
E.
Waks
,
C.
Santori
, and
Y.
Yamamoto
, “
Security aspects of quantum key distribution with sub-Poisson light
,”
Phys. Rev. A
66
,
042315
(
2002
).
56.
P.
Grünwald
, “
Effective second-order correlation function and single-photon detection
,”
New J. Phys.
21
,
093003
(
2019
).
57.
C.
Carmesin
,
F.
Olbrich
,
T.
Mehrtens
,
M.
Florian
,
S.
Michael
,
S.
Schreier
,
C.
Nawrath
,
M.
Paul
,
J.
Höschele
,
B.
Gerken
,
J.
Kettler
,
S. L.
Portalupi
,
M.
Jetter
,
P.
Michler
,
A.
Rosenauer
, and
F.
Jahnke
, “
Structural and optical properties of InAs/(In)GaAs/GaAs quantum dots with single-photon emission in the telecom C-band up to 77 K
,”
Phys. Rev. B
98
,
125407
(
2018
).
58.
S.
Ates
,
I.
Agha
,
A.
Gulinatti
,
I.
Rech
,
A.
Badolato
, and
K.
Srinivasan
, “
Improving the performance of bright quantum dot single photon sources using temporal filtering via amplitude modulation
,”
Sci. Rep.
3
,
1397
(
2013
).
59.
T.
Kupko
,
M.
von Helversen
,
L.
Rickert
,
J.-H.
Schulze
,
A.
Strittmatter
,
M.
Gschrey
,
S.
Rodt
,
S.
Reitzenstein
, and
T.
Heindel
, “
Tools for the performance optimization of single-photon quantum key distribution
,”
npj Quantum Inf.
6
,
29
(
2020
).

Supplementary Material