In a quantum network involving multiple communicating parties, an important goal is to establish high-quality pairwise entanglement among the users without introducing multiple entangled-photon sources which would necessarily complicate the overall network setup. Moreover, it is preferable that the pairwise entanglement of photons is in the time-bin degree of freedom as the photonic time-bin qubit is ideally suited for fiber-optic distribution. Here, we report an experimental demonstration of a field-deployable quantum communication network involving multiple users, all of whom share pairwise entanglement in the time-bin degree of freedom of photons. In particular, by utilizing a single spontaneous-parametric down-conversion source which produces a broadband pair of photons and the wavelength-division demultiplexing/multiplexing technology, all the communicating parties within the network are always simultaneously ready for quantum communication. To further demonstrate the practical feasibility of a quantum network with time-bin entanglement over a wavelength-multiplexed fiber network, we demonstrate entangled-photon quantum key distribution with three users, each separated by 60 km of optical fibers.
I. INTRODUCTION
One of the principal goals in quantum communication is to distribute photonic entanglement to distant parties, thereby establishing a quantum channel, to enable implementations of certain entanglement-based communication protocols that are not possible classically, e.g., quantum teleportation,1–5 quantum key distribution (QKD),6–9 dense coding,10–12 and quantum secret sharing.13–15 In recent years, tremendous technical achievements toward long-distance quantum communication have been reported via free-space16,17 and via optical fiber links.18,19 Nevertheless, it remains to be a formidable problem to expand quantum communication to include multiple communicating parties, i.e., to build a quantum network, as it requires overcoming many fundamental and technical challenges. Given the importance of the quantum network in quantum information technology, a number of interesting ideas and technical achievements toward the quantum network have been reported, including the quantum repeater,20–22 quantum memory,23–27 generalized quantum measurement,28–31 qudit entanglement,32–35 hyper-entanglement,36–39 trusted nodes,40–43 active-switching,44–47 wavelength-division multiplexing (WDM),48–52 wavelength selective switch,53–55 decoy state QKD,56,57 and twin-field QKD.58–61 While these developments certainly constitute important building blocks toward the global quantum network, a full-fledged quantum network is likely to be years away from fruition.
On the other hand, an elementary quantum network involving multiple communicating parties sharing bipartite entanglement is of practical significance as it can be used for certain important quantum communication tasks, such as teleportation and quantum key distribution. In this work, we report an experimental implementation of a field-deployable fiber-optic quantum communication network involving multiple users, all of whom share pairwise entanglement in the time-bin degree of freedom of photons. The fiber optic quantum network is based on a single entangled-photon source which distributes a pair of time-bin entangled qubits to any two members of the quantum network, and through the use of the wavelength-division demultiplexing/multiplexing technology, all the network members are simultaneously ready for quantum communication. The fact that each network member does not have to be equipped with its own entangled-photon source (only the network provider needs to be equipped with the entangled-photon source) greatly reduces the complexity and the cost of the network setup. Moreover, the network can be easily scaled up to include more users due to the use of the WDM technology without requiring trusted nodes or trusting the network provider. To further demonstrate the practical feasibility of a quantum network with entangled time-bin qubits over a wavelength-multiplexed fiber network, we demonstrate entangled-photon quantum key distribution with three users, each separated by 60 km of optical fibers.
II. RESULTS AND DISCUSSION
A. Experimental setup
The simplified experimental schematic of the quantum network, involving the network provider and three users, is shown in Fig. 1. The network provider consists of the source of entangled time-bin qubit pairs and the network nodes based on WDM technology. We first describe the source of entangled time-bin qubit pairs. A picosecond mode-locked fiber laser (FPL-02CTT, Calmar Laser) operating at the wavelength of 1552.52 nm (the FWHM bandwidth is 0.4 nm) and at the repetition rate of 18.02 MHz is frequency-doubled to 776.26 nm via the second harmonic generation (SHG) process at the type-0 bulk PPLN crystal (which is 35 mm long and has the polling period of 19.3 μm; HC Photonics). Before the SHG process, the laser pulse goes through an unbalanced Michelson interferometer (UMI) to create a pair of pulses separated by 3.6 ns, which defines the time bins in our experiment. To prevent the thermal phase drift of the UMI, which consists of fiber-optic couplers, Faraday mirrors (FMs), a variable attenuator, a variable delay line, and a piezo-actuated fiber stretcher, an auxiliary CW laser of 1553.33 nm is used to actively stabilize the interferometer. The coherence length of the auxiliary CW laser is much larger than the path length difference of the UMI and the interference signal of the auxiliary CW laser is used to feedback-control the piezo-actuated fiber stretcher, thus stabilizing the interferometer. Note that the UMI auto-compensates for the polarization-mode dispersion due to the use of Faraday mirrors.
Scheme for the multi-party quantum network in which every member shares entangled time-bin qubit pairs. The network provider consists of the source of entangled time-bin qubit pairs and the network nodes based on dense wavelength-division multiplexing (DWDM) technology. The channel numbers follow the DWDM ITU grid specification for the telecom C-band 100 GHz grid. The users (Alice, Bob, and Charlie) are connected to the nodes via 30 km optical fiber spools, and every user shares entangled time-bin qubit pairs. To establish the time-bin entanglement in the experiment, three frequency-correlated pairs, simultaneously present with time-bin entanglement, are utilized and distributed among three users so that each frequency pair could be shared by each user pair. The frequency pairs are symbolically represented by pairs of blue triangles, green squares, and red circles. All interferometers (an UMI and three UMZIs) are actively stabilized using auxiliary lasers and feedback control. UMI: unbalanced Michelson interferometer, FM: Faraday mirror, PC: polarization controller, PPLN: periodically poled lithium niobite, SHG: second harmonic generation, SPDC: spontaneous parametric down-conversion, UMZI: unbalanced Mach–Zehnder interferometer, and PM: phase modulator.
Scheme for the multi-party quantum network in which every member shares entangled time-bin qubit pairs. The network provider consists of the source of entangled time-bin qubit pairs and the network nodes based on dense wavelength-division multiplexing (DWDM) technology. The channel numbers follow the DWDM ITU grid specification for the telecom C-band 100 GHz grid. The users (Alice, Bob, and Charlie) are connected to the nodes via 30 km optical fiber spools, and every user shares entangled time-bin qubit pairs. To establish the time-bin entanglement in the experiment, three frequency-correlated pairs, simultaneously present with time-bin entanglement, are utilized and distributed among three users so that each frequency pair could be shared by each user pair. The frequency pairs are symbolically represented by pairs of blue triangles, green squares, and red circles. All interferometers (an UMI and three UMZIs) are actively stabilized using auxiliary lasers and feedback control. UMI: unbalanced Michelson interferometer, FM: Faraday mirror, PC: polarization controller, PPLN: periodically poled lithium niobite, SHG: second harmonic generation, SPDC: spontaneous parametric down-conversion, UMZI: unbalanced Mach–Zehnder interferometer, and PM: phase modulator.
Spontaneous parametric down-conversion (SPDC) of the pump pulse pair of 776.26 nm at the type-0 waveguide PPLN (20 mm in length and has the poling period of 17.0 μm; HC Photonics) prepares the two-photon state of the form62–64
where |S⟩s|S⟩i denotes the probability amplitude that the SPDC photon pair (often termed the signal and the idler, as identified by the subscript s and i) is created by the earlier pump pulse and |L⟩s|L⟩i denotes the probability amplitude for the SPDC photon pair created by the latter pump pulse. The joint spectral intensity |f(ωs, ωi)|2 defines the spectral correlation between the signal and the idler photons as well as the marginal spectral distribution of the individual SPDC photons. In the experiment, due to the use of type-0 PPLN for SPDC, the SPDC bandwidth is over 80 nm in the FWHM, centered at 1552.52 nm. The relative phase term ϕp may be controlled by fine-tuning the piezo-actuated fiber stretcher at the UMI. Any residual telecomband laser light behind the SHG module and near-IR pump light behind the SPDC module are suppressed by filter 1 and filter 2, respectively, which are composed of dichroic mirrors designed to reflect the unwanted light. They have the rejection ratio of 80 dB (at 1550 ± 30 nm for filter 1 and at 775 ± 30 nm for filter 2) and the insertion loss of 2.0 dB (at 775 ± 30 nm for filter 1 and at 1550 ± 30 nm for filter 2).
The distribution nodes of the time-bin entangled photon pair to the network users are made up with various WDM modules for demultiplexing (DEMUX) and multiplexing (MUX) correlated-frequency components of the time-bin entangled SPDC photon pairs to the network users (see Fig. 1). As seen in Eq. (1), the signal and idler photons of SPDC are frequency-time entangled (in addition to the time-bin entanglement), i.e., if the signal photon is measured to have the wavelength λs, the idler photon must have the wavelength λi determined by the phase-matching condition. Since the spectral bandwidth of SPDC is roughly 80 nm in the FWHM with the flat-top region of the spectrum spanning ∼40 nm (due to the use of type-0 SPDC), the frequency-correlated photon pairs can be selectively transmitted to any pair of the network users to establish an entangled quantum channel by using commercially available telecom C-band dense wavelength-division multiplexing (DWDM) components. First, DWDM demultiplexers are used to discretize the incoming entangled photons into several different spatial modes according to the correlated frequencies. In this work, we consider three end users, i.e., Alice, Bob, and Charlie, each sharing time-bin entanglement with each other, so six DWDM channels are utilized: DWDM channels 35, 37, and 39 are used for the signal photons and 23, 25, and 27 are used for the idler photons. The frequency-correlated DWDM channel pairs are {35, 27}, {37, 25}, and {39, 23}, and the channel numbers follow the DWDM ITU grid specification for the telecom C-band 100 GHz grid. The DWDM components in use have the 3 dB spectral bandwidth of 150 GHz. Then, to distribute time-bin entangled photon pairs to every user, two uncorrelated DWDM channels are multiplexed into a single fiber optic mode, resulting in three output nodes to which network users are connected. In this work, Alice, Bob, and Charlie are connected via 30 km long dispersion-shifted fiber spools (FSC-DSF-spool; Lucent), and therefore, time-bin entanglement is established between Alice–Bob, Bob–Charlie, and Alice–Charlie via 60 km long optical fibers. Note that the distribution nodes can be easily expanded to include more network users by using additional DWDM channels in the fashion described above. To prepare a fully connected network with N users, we need to establish N(N − 1)/2 links, so the total number of necessary DWDM channels is calculated to be N(N − 1). Considering the 40 nm flat-top spectral bandwidth of SPDC photons (our experimental condition), we estimate that roughly 11 network users can be accommodated easily in our setup if we exploit the 50-GHz grid DWDM channels. To add more users, even narrower-band DWDM channels and an SPDC source of broader bandwidth would be needed.
At the analysis and measurement stage, the end users are equipped with his/her own unbalanced Mach–Zehnder interferometers (UMZI) and InGaAs single-photon detectors (SPD-A-NIR; AUREA Technology), as shown in Fig. 1. The path length difference of the UMZI is set to the same as that of the UMI (i.e., the time-bin separation of 3.6 ns), and UMZIs include a fiber-optic phase modulator in the short arm and in the long arm a set of a variable delay line, a piezo-actuated fiber stretcher, and an electronically driven fiber polarization controller. Similar to the UMI, the UMZI is actively stabilized by using an auxiliary CW laser of 1553.33 nm, which has the coherence length much larger than the path length difference of the UMZI, to feedback-control the piezo-actuated fiber stretcher. The measurement bases for the time-bin qubits are set by appropriately choosing the phases of the UMZIs (ϕA, ϕB, and ϕC) via the fiber-optic phase modulators. The InGaAs detectors, operated in the triggered mode synchronized to the repetition rate of the pulsed laser, are set at the quantum efficiency of 15% with the dead time of 10 µs. The detection window is set to 1.5 ns to suppress the possibility of noise clicks.
In our work, to verify the practical feasibility of a quantum network with time-bin entanglement, we have demonstrated the Ekert91 protocol, one of the entangled-photon QKD protocols, with three users. The time synchronization information needs to be distributed as all time-correlated devices belonging to communicating users should be synchronized in performing the communication protocol. The time synchronization information is also needed to operate the detectors in the gated mode. The sync-information is further needed for the key sifting process. Hence, from the practical point of view, the network provider needs to provide the clock signal to all users. The network provider, however, does not need to provide global phase reference signals to users. The time-bin entanglement utilizes a relative phase between successive temporal modes in encoding qubit information. For this reason, a global phase reference is not required in time-bin mode quantum communication.
B. Simultaneous distribution of time-bin entanglement
The quality of two-qubit time-bin entanglement distributed over 60 km optical fibers can be tested by measuring time-bin two-photon interference (Franson interference)62–64 or by testing the violation of the CHSH inequality.65,66 Ideally, for the time-bin entangled state in Eq. (1) with ϕp = 0, i.e., , the coincidence probabilities between the detectors at Alice and Bob’s setups are calculated to be
where the subscripts are defined in Fig. 1. The coincidence probabilities between the detectors at Bob–Charlie and Charlie–Alice are similarly calculated. In the experiment, the twofold coincidence rate is given by Rc ∝ 1 ± V cos(ϕA + ϕB), where V is the two-photon interference visibility, and it is well known that the condition for violating the CHSH inequality is .65
The experimental data for the time-bin entanglement distribution are summarized in Table I. We first measured the two-photon interference and the CHSH S parameter without the 30 km long dispersion-shifted-fiber (DSF) spools installed. With the observed two-photon interference visibility greater than 0.94, we find that the CHSH inequality is violated for all three pairs of users by at least seven standard deviations. Next, with the 30 km long DSF spools installed, all pairs of users are now fiber-optically linked with 60 km separations. Due to the fiber attenuation of ∼0.2 dB/km and additional fiber-optic couplers, the coincidence count rates have become smaller. However, the visibilities of the two-photon interference and the experimental values of the CHSH S parameter have been only minimally affected: we observe the CHSH inequality violation of ∼5 standard deviations. An example set of the two-photon interference measurements is shown in Fig. 2. Every user in the quantum network is sharing time-bin entangled qubit pairs with another user via the 60 km long optical fiber spool, and sharing of high-quality entanglement is clearly demonstrated in the data. As mentioned earlier already, Charlie’s measurement setup has a slightly lower efficiency, which results in lower coincidence count rates in Figs. 2(b) and 2(c).
Time-bin two-photon interference data. The 60 km long optical fiber spool does reduce the rate of coincidence counts but hardly affects the two-photon visibilities and the CHSH S parameter values. The coincidence rates for Bob–Charlie and Charlie–Alice are smaller due to the slightly higher loss at Charlie’s measurement setup.
. | Distance (km) . | Coincidence (Hz) . | Visibility . | CHSH S . |
---|---|---|---|---|
Alice–Bob | No DSF spool | 22.382 ± 0.346 | 0.940 ± 0.002 | 2.663 ± 0.088 |
Bob–Charlie | No DSF spool | 15.728 ± 0.119 | 0.948 ± 0.003 | 2.665 ± 0.089 |
Charlie–Alice | No DSF spool | 16.606 ± 0.133 | 0.942 ± 0.003 | 2.679 ± 0.089 |
Alice–Bob | 60 | 1.262 ± 0.060 | 0.931 ± 0.008 | 2.627 ± 0.117 |
Bob–Charlie | 60 | 1.057 ± 0.057 | 0.932 ± 0.009 | 2.648 ± 0.122 |
Charlie–Alice | 60 | 0.952 ± 0.053 | 0.926 ± 0.010 | 2.615 ± 0.124 |
. | Distance (km) . | Coincidence (Hz) . | Visibility . | CHSH S . |
---|---|---|---|---|
Alice–Bob | No DSF spool | 22.382 ± 0.346 | 0.940 ± 0.002 | 2.663 ± 0.088 |
Bob–Charlie | No DSF spool | 15.728 ± 0.119 | 0.948 ± 0.003 | 2.665 ± 0.089 |
Charlie–Alice | No DSF spool | 16.606 ± 0.133 | 0.942 ± 0.003 | 2.679 ± 0.089 |
Alice–Bob | 60 | 1.262 ± 0.060 | 0.931 ± 0.008 | 2.627 ± 0.117 |
Bob–Charlie | 60 | 1.057 ± 0.057 | 0.932 ± 0.009 | 2.648 ± 0.122 |
Charlie–Alice | 60 | 0.952 ± 0.053 | 0.926 ± 0.010 | 2.615 ± 0.124 |
Two-photon interference due to time-bin entangled photons over 60 km optical fibers as functions of the local phase setting in measuring the idler photon ϕi between (a) Alice and Bob, (b) Bob and Charlie, and (c) Charlie and Alice. The blue (red) solid circles represent the local phase setting in measuring the signal photon at ϕs = π (ϕs = 0). The solid lines are numerical fits to experimental data. The error bars represent one standard deviation assuming Poissonian statistics.
Two-photon interference due to time-bin entangled photons over 60 km optical fibers as functions of the local phase setting in measuring the idler photon ϕi between (a) Alice and Bob, (b) Bob and Charlie, and (c) Charlie and Alice. The blue (red) solid circles represent the local phase setting in measuring the signal photon at ϕs = π (ϕs = 0). The solid lines are numerical fits to experimental data. The error bars represent one standard deviation assuming Poissonian statistics.
C. Analysis of the system performance
Ultimately, the system performance is limited by the quality of the two-photon interference, i.e., visibility, as functions of external parameters, such as the SPDC generation rate, the channel efficiency, the detector dark counts, and the quality of interferometers. For the time-bin entangled state considered in our work, , the probability of a coincidence event Pc between the detectors at the two network users (Alice and Bob in Fig. 1, for instance) can be expressed as67
where μ is the average number of SPDC photon pairs (which can be varied by the pump power), ηA (ηB) is the overall channel efficiency (including fiber transmission efficiency, efficiencies of the various fiber optical components, and the detector efficiency but excluding the DSF spool) measured by Alice (Bob), V0 is the maximum achievable visibility (experimentally limited by the interferometer implementation), ϕA(ϕB) is the local phase of Alice’s (Bob’s) UMZI, and dA (dB) is the dark count probability of the detector belonging to Alice (Bob). Note that the average number of SPDC photon pairs μ is estimated from the coincidence to accidental ratio (CAR) using the relation .67 The coincidence probabilities Pc between the detectors at Bob and Charlie and those of the detectors at Charlie–Alice are similarly calculated. The first term in Eq. (3) refers to the contribution by the entangled photon pair, while the second term represents accidental contributions to the coincidence counts. The accidental coincidence term, of course, limits the two-photon interference visibility V achievable in the experiment as
where the approximation considers the limiting case , i.e., a small dark count contribution to the signal. This approximation is justified, given the experimental condition that the detectors are gated for 1.5 ns time window, giving the dark count probability of 6 × 10−6/gate. The two-photon visibility measurements as a function of the average number of SPDC photon pairs μ with no DSF spools are shown in Fig. 3(a), and the linear decrease in two-photon visibility with the increase in μ (implemented by increasing the pump power) is observed in accordance with Eq. (4), . The visibilities gradually decrease due to the increased probabilities of generating multiple SPDC photon pairs with a larger μ.
(a) Two-photon visibility as a function of the average number SPDC photon pairs μ with no DSF spool. A linear decrease in two-photon visibility with the increase in μ (implemented by increasing the pump power) is observed in accordance with Eq. (4), (dotted lines). (b) Two-photon visibility as a function of the channel distance (attenuation at the fiber is α = 0.20 dB/km) at μ ≈ 0.049. The visibility degradation (dotted lines) is consistent with Eq. (5). The slightly different tendency for Alice–Bob is due to the fact that Charlie’s setup has a lower system efficiency. The overall channel efficiencies are ηA = 1.39%, ηB = 1.36%, and ηC = 1.02%. The data points are slightly displaced horizontally for easier reading.
(a) Two-photon visibility as a function of the average number SPDC photon pairs μ with no DSF spool. A linear decrease in two-photon visibility with the increase in μ (implemented by increasing the pump power) is observed in accordance with Eq. (4), (dotted lines). (b) Two-photon visibility as a function of the channel distance (attenuation at the fiber is α = 0.20 dB/km) at μ ≈ 0.049. The visibility degradation (dotted lines) is consistent with Eq. (5). The slightly different tendency for Alice–Bob is due to the fact that Charlie’s setup has a lower system efficiency. The overall channel efficiencies are ηA = 1.39%, ηB = 1.36%, and ηC = 1.02%. The data points are slightly displaced horizontally for easier reading.
We can now estimate the two-photon visibility degradation as a function of the channel distances LA (source to Alice) and LB (source to Bob) using the known fiber attenuation constant of α = 0.20 dB/km. With the added fiber channel of length LA, the overall channel efficiency for Alice is changed to and similarly for Bob. The two-photon visibility expression in Eq. (4) is then changed to
The experimental data and the numerical simulation according to Eq. (5) are shown in Fig. 3(b). Here, the channel distances are LA = LB, which are implemented with a set of 30 km long DSF spools. The observed two-photon visibility data and the numerical simulation results are consistent and show clearly that the unavoidable channel loss of the optical fiber (α = 0.20 dB/km) do contribute to the visibility decrease due to the fact that the environmental noise and the detector dark counts are constant.
D. Entanglement-based QKD over the quantum network
While the high two-photon interference visibility is a good indicator that entanglement may be distributed, to confirm the successful distribution of time-bin entanglement, , to pairs of the network users, e.g., Alice–Bob, Bob–Charlie, and Charlie–Alice, it is necessary to measure the CHSH S parameter as the entanglement-based Ekert QKD protocols require the CHSH-Bell inequality violation to test for the presence of eavesdropping.6,65 Ideally, for an initial pure maximally entangled two-qubit state, the CHSH S parameter is related to the two-photon visibility as , with V defined in Eq. (5). Independent verification of the CHSH inequality for the photon pair shared by Alice and Bob, however, requires measuring the CHSH S parameter defined as
where the experimentally measured correlation E(ϕA, ϕB) is defined as
Here, RA1,B1 refers to the measured coincidence count between the detectors A1 and B1 for Alice’s interferometer set at ϕA and Bob’s interferometer set at ϕB, as shown in Fig. 1. Others for different detector combinations are similarly defined. For the maximum violation of the CHSH inequality, we used the measurement bases defined by the local phases ϕA and ϕB tabulated in the Appendix. The CHSH inequalities for the photon pair shared by Bob and Charlie and by Charlie and Alice may be evaluated by using similarly defined S parameters.
Depending on the choices of the measurement bases shown in the Appendix, two sets of S measurements (namely, set 1 and set 2) are possible. Both measurement sets show clear violation of the CHSH inequality, as summarized in Table II. The CHSH S parameters for set 1 measurements are shown in Fig. 4(a). The data clearly show the CHSH inequality violation at 60 km of optical fiber separation between the network users. Using the relation between the CHSH S parameter and the two-photon visibility, with V defined in Eq. (5), it is estimated that the CHSH inequality violation will vanish at 170 km.
Experimental pairwise QKD in a wavelength-multiplexed fiber network.
. | Distance . | QBER (%) . | Sifted key rate (bits/s) . | Secure key rate (bits/s) . | S parameter (set 1/set 2) . |
---|---|---|---|---|---|
Alice–Bob | No DSF spool | 2.76 ± 0.11 | 8.087 ± 0.050 | 5.137 ± 0.093 | 2.680 ± 0.030/2.633 ± 0.029 |
Bob–Charlie | No DSF spool | 3.21 ± 0.14 | 5.055 ± 0.040 | 2.984 ± 0.075 | 2.579 ± 0.038/2.688 ± 0.038 |
Charlie–Alice | No DSF spool | 3.14 ± 0.13 | 5.629 ± 0.042 | 3.364 ± 0.079 | 2.737 ± 0.036/2.586 ± 0.036 |
Alice–Bob | 60 km | 3.58 ± 0.20 | 0.467 ± 0.005 | 0.259 ± 0.009 | 2.618 ± 0.051/2.607 ± 0.051 |
Bob–Charlie | 60 km | 3.73 ± 0.25 | 0.327 ± 0.004 | 0.177 ± 0.008 | 2.598 ± 0.060/2.639 ± 0.060 |
Charlie–Alice | 60 km | 3.81 ± 0.26 | 0.317 ± 0.004 | 0.169 ± 0.008 | 2.716 ± 0.062/2.615 ± 0.063 |
. | Distance . | QBER (%) . | Sifted key rate (bits/s) . | Secure key rate (bits/s) . | S parameter (set 1/set 2) . |
---|---|---|---|---|---|
Alice–Bob | No DSF spool | 2.76 ± 0.11 | 8.087 ± 0.050 | 5.137 ± 0.093 | 2.680 ± 0.030/2.633 ± 0.029 |
Bob–Charlie | No DSF spool | 3.21 ± 0.14 | 5.055 ± 0.040 | 2.984 ± 0.075 | 2.579 ± 0.038/2.688 ± 0.038 |
Charlie–Alice | No DSF spool | 3.14 ± 0.13 | 5.629 ± 0.042 | 3.364 ± 0.079 | 2.737 ± 0.036/2.586 ± 0.036 |
Alice–Bob | 60 km | 3.58 ± 0.20 | 0.467 ± 0.005 | 0.259 ± 0.009 | 2.618 ± 0.051/2.607 ± 0.051 |
Bob–Charlie | 60 km | 3.73 ± 0.25 | 0.327 ± 0.004 | 0.177 ± 0.008 | 2.598 ± 0.060/2.639 ± 0.060 |
Charlie–Alice | 60 km | 3.81 ± 0.26 | 0.317 ± 0.004 | 0.169 ± 0.008 | 2.716 ± 0.062/2.615 ± 0.063 |
(a) Measured CHSH S parameters for the distance of zero and 60 km long optical fiber channels between the users (using the measurement basis set 1 in the Appendix). The CHSH inequality violation vanishes (S = 2) roughly at 170 km. The dotted lines are calculated from Eq. (5) using . (b) Secure key generation rates for the Ekert protocol. Roughly at 150 km of optical fiber transmission, the secure key generation rate Rs is expected to drop to zero. The dotted lines are due to Eq. (6). All the measurements are done with μ ≈ 0.049. The error bars represent one standard deviation, and the data points are slightly displaced for easier reading.
(a) Measured CHSH S parameters for the distance of zero and 60 km long optical fiber channels between the users (using the measurement basis set 1 in the Appendix). The CHSH inequality violation vanishes (S = 2) roughly at 170 km. The dotted lines are calculated from Eq. (5) using . (b) Secure key generation rates for the Ekert protocol. Roughly at 150 km of optical fiber transmission, the secure key generation rate Rs is expected to drop to zero. The dotted lines are due to Eq. (6). All the measurements are done with μ ≈ 0.049. The error bars represent one standard deviation, and the data points are slightly displaced for easier reading.
In entanglement-photon QKD, the sifted key is established from the joint-detection events by using the measurement basis settings that are not used for the eavesdropping detection, i.e., CHSH S parameter measurements, and the basis settings for the sifted key extraction are shown in the Appendix. The secure key is then extracted from the sifted key by considering a few conditions, and the secure key rate Rs is given by68,69
where q is the basis reconciliation factor (1/4 for the Ekert protocol), Qλ is the overall gain or the probability of a joint-detection event given a pump pulse (μ = 2λ is the average number of the SPDC photon pair),69 δb is the bit error rate, δp is the phase error rate, f(δb) is the error correction efficiency, and H(x) = − x log 2(x) − (1 − x) log 2(1 − x) is the binary entropy function. The secure key rate Rs in Eq. (6) is derived for coherent attacks, so it provides an optimal security guarantee and is valid for the asymptotic limit of an infinitely long key string.68,69 In this work, we assume δb = δp as the measurement basis is symmetric, and hence, we have , where is the quantum bit error rate (QBER) for the system and is evaluated from the two-photon interference visibility V. The secure key rate Rs can be estimated from the experimental sifted key rate using Eq. (6) assuming f(δb) = 1 (the Shannon limit), and the results are shown in Fig. 4(b) as well as summarized in Table II. The secure key rates are expected to drop to zero at around 150 km, which corresponds to Rs = 0 at .
Using super-conducting nanowire single-photon detectors (SNSPDs), instead of InGaAs single-photon detectors, would significantly improve the QKD performance due to low dark counts and higher quantum efficiency, and the improvement can be estimated by starting from Eq. (5). For SNSPDs, the quantum efficiency is at least five times better than those of InGaAs single-photon detectors and the dark count probability is about 100 times lower. Then, the relevant parameters are μ ≈ 0.049, ηA = 5 × 1.39%, ηB = 5 × 1.36%, ηC = 5 × 1.02%, and the dark count probability of 6 × 10−8/gate which would result the maximum achievable visibilities , , and . Based on the above parameters, the secure key rates Rs can be evaluated. The simulation results show that if SNSPDs were used instead of InGaAs detectors, there would be significant improvement in the maximum channel distance for quantum key distribution: up to 420 km compared to 150 km for the case of InGaAs detectors.
E. Discussion
While our setup is, in principle, field-deployable, it is important to consider a few technical problems in actually implementing our setup in a real-world environment.70–72 First, synchronization among network nodes is one of the main issues. All electronic and electro-optic devices, e.g., detectors and phase modulators, must be synchronized to a reference clock for accurate qubit encoding and photon counting. In this work, we rely on electronic synchronization pulses from the main laser to synchronize all three users in the network. Second, the environmental change, including weather status, would directly affect the temperature fluctuation, birefringence, optical path length, and transmission loss in optic-fiber channels, which, in turn, cause unavoidable difficulties in performing field experiments. Moreover, these degradations accumulate with distance. Interestingly, the random birefringence effects induced in deployed fibers do not affect the time-bin entanglement because for a time-bin entanglement, quantum information is encoded in the relative phase between successive temporal modes. For this reason, the phase stability of the interferometer is a significant issue in time-bin based communication and needs to be well maintained using a feedback system, the details of which are well-described in Sec. II A. While time-bin entanglement does not degrade due to polarization effects in fiber transmission, environmental effects on the phase modulator’s optic axes could still affect the quality of time-bin entanglement, albeit small it may be. To fully prevent this effect, polarization compensation needs to be actively performed if the system is deployed in an outdoor environment.73
The optical noise in the fiber channel is also a major concern. The presence of channel noise is unavoidable because the noise is generated from stray light and the cross-talk of co-propagating classical signals. Then, a perfectly prepared entangled state on the noisy fiber channel could quickly degrade to a low-fidelity mixed state, precluding quantum communication in the end. Given the importance of high-quality entanglement distribution, effective noise suppression approaches have been performed, including passive strategies (e.g., adopting low-noise detectors) or the application of noise-resistant quantum communication protocol.74
III. CONCLUSION
We have reported an experimental demonstration of a quantum communication system capable of distributing time-bin entangled qubit pairs over a wavelength-multiplexed fiber network. Owing to the use of the broadband nature of type-0 SPDC process and WDM components, all network users are simultaneously ready for quantum communication with another user within the network. In addition, the use of time-bin entangled photonic qubits offers robustness for long-distance transmission compared with the case of polarization-entangled photonic qubits which are susceptible to various polarization-mode dispersion effects in the fibers. Moreover, the temporal degree of freedom is intrinsically easier for encoding high-dimensional quantum states, qudits, thus allowing us to more easily utilize qudit entanglement for quantum communication experiments.
The experimental demonstration reported here may be easily expanded, with minimal efforts, to include multiple network users by utilizing additional WDM components. This is made possible because only a single entangled-photon source, which distributes a pair of time-bin entangled qubits to any two members of the quantum network, is required and, through the use of the wavelength-division demultiplexing/multiplexing technology, all the network members are simultaneously ready for quantum communication. The fact that each network member does not have to be equipped with its own entangled-photon source (only the network provider needs to be equipped with the entangled-photon source) greatly reduces the complexity and the cost of the network setup.
The proposed quantum communication network setup, thus, is quite field-deployable in the sense that all the components used in the experiments are commercially and readily available.
ACKNOWLEDGMENTS
This work was supported, in part, by the National Research Foundation of Korea (Grant No. 2019R1A2C3004812), the Affiliated Institute of ETRI (Grant No. 2019-110), and the ITRC support program (Grant No. IITP-2021-2020-0-01606).
AUTHOR DECLARATIONS
Conflict of Interest
The authors have no conflicts to disclose.
DATA AVAILABILITY
The data that support the findings of this study are available from the corresponding author upon reasonable request.
APPENDIX: MEASUREMENT BASES
For QKD with time-bin entangled qubits, it is necessary to choose proper local phases at the end users’ interferometers to properly set the measurement bases. For Alice and Bob’s interferometers (UMI in Fig. 1), ϕA and ϕB need to be properly chosen for the eavesdropping detection via CHSH S parameter measurement and for key distribution, as shown in Table III. For the CHSH inequality measurement, two different measurement bases are available, referred to as set 1 and set 2. The phase settings for Bob–Charlie and Charlie–Alice are similarly defined.
The local phase settings for Alice and Bob’s interferometers, UMZIs shown in Fig. 1, to determine the measurement bases.
. | ϕA = 0° . | ϕA = 45° . | ϕA = 90° . | ϕA = 135° . |
---|---|---|---|---|
ϕB = 45° | CHSH inequality (set 1) | Not used | CHSH inequality (set 1) | Secret key |
ϕB = 90° | Not used | CHSH inequality (set 2) | Secret key | CHSH inequality (set 2) |
ϕB = 135° | CHSH inequality (set 1) | Secret key | CHSH inequality (set 1) | Not used |
ϕB = 180° | Secret key | CHSH inequality (set 2) | Not used | CHSH inequality (set 2) |
. | ϕA = 0° . | ϕA = 45° . | ϕA = 90° . | ϕA = 135° . |
---|---|---|---|---|
ϕB = 45° | CHSH inequality (set 1) | Not used | CHSH inequality (set 1) | Secret key |
ϕB = 90° | Not used | CHSH inequality (set 2) | Secret key | CHSH inequality (set 2) |
ϕB = 135° | CHSH inequality (set 1) | Secret key | CHSH inequality (set 1) | Not used |
ϕB = 180° | Secret key | CHSH inequality (set 2) | Not used | CHSH inequality (set 2) |