Abstract
We propose a scheme for performing quantum key distribution (QKD) which has the potential to beat schemes based on the direct transmission of photons between the communicating parties. In our proposal, the communicating parties exchange photons with two quantum memories placed between them. This is a very simple quantum repeater scheme and can be implemented with currently available technology. Ideally, its secret key rate scales as the square root of the transmittivity of the optical channel, which is superior to QKD schemes based on direct transmission because key rates for the latter scale at best linearly with transmittivity. Taking into account various imperfections in each component of our setup, we present parameter regimes in which our protocol outperforms protocols based on direct transmission.
Similar content being viewed by others
Notes
This does not quite apply to the TGW bound, which goes to infinity as \(L \rightarrow 0\). In this case, one must continue the \(e^{-L/L_{\text {att}}}\) behavior all the way to \(L=0\), so that \(R_{b,0} = 2/\ln 2\).
References
M. Takeoka, S. Guha, M.M. Wilde, IEEE Trans. Inf. Theory 60, 4987 (2014)
S. Guha et al., Rate-loss analysis of an efficient quantum repeater architecture (2014). arXiv:1404.7183
H.J. Briegel, W. Dür, J.I. Cirac, P. Zoller, Phys. Rev. Lett. 81, 5932 (1998)
L.M. Duan, M.D. Lukin, J.I. Cirac, P. Zoller, Nature 414, 413 (2001)
N. Sangouard, C. Simon, H. de Riedmatten, N. Gisin, Rev. Mod. Phys. 83, 33 (2011)
L. Jiang et al., Phys. Rev. A 79, 032325 (2009)
W. Munro, A. Stephens, S. Devitt, K. Harrison, K. Nemoto, Nat. Photonics 6, 777 (2012)
M. Razavi, M. Piani, N. Lütkenhaus, Phys. Rev. A 80, 032301 (2009)
A.G. Fowler et al., Phys. Rev. Lett. 104, 180503 (2010)
R. Van Meter, T. Satoh, T.D. Ladd, W.J. Munro, K. Nemoto, Netw. Sci. 3, 82 (2013)
S. Muralidharan, J. Kim, N. Lütkenhaus, M.D. Lukin, L. Jiang, Phys. Rev. Lett. 112, 250501 (2014)
L. Hartmann, B. Kraus, H.-J. Briegel, W. Dür, Phys. Rev. A 75, 032310 (2007)
C. Panayi, M. Razavi, X. Ma, N. Lütkenhaus, New J. Phys. 16, 043005 (2014)
B. Blinov, D. Moehring, L.-M. Duan, C. Monroe, Nature 428, 153 (2004)
H.K. Lo, F. Chau, M. Ardehali, J. Cryptol. 18, 133 (2005)
N.J. Beaudry, T. Moroder, N. Lütkenhaus, Phys. Rev. Lett. 101, 093601 (2008)
V. Scarani et al., Rev. Mod. Phys. 81, 1301 (2009)
E.W. Streed, B.G. Norton, A. Jechow, T.J. Weinhold, D. Kielpinski, Phys. Rev. Lett. 106, 010502 (2011)
S. Olmschenk et al., Phys. Rev. A 76, 052314 (2007)
J. Benhelm, G. Kirchmair, C.F. Roos, R. Blatt, Nat. Phys. 4, 463 (2008)
T. Kim, P. Maunz, J. Kim, Phys. Rev. A 84, 063423 (2011)
T.P. Harty et al., Phys. Rev. Lett. 113, 220501 (2014)
H.-K. Lo, X. Ma, K. Chen, Phys. Rev. Lett. 94, 230504 (2005)
Acknowledgments
We would like to thank Mohsen Razavi for insightful discussions, including a hint regarding the relevance of the high-loss limit to quantum networks. We also thank Ryo Namiki for many fruitful discussions. This work has been supported by an NSERC Discovery Grant, the DARPA QUINESS program, and Industry Canada.
Author information
Authors and Affiliations
Corresponding author
Additional information
This paper is part of the topical collection “Quantum Repeaters: From Components to Strategies” guest edited by Manfred Bayer, Christoph Becher and Peter van Loock.
Appendices
Appendix 1: benchmark key rates
In this appendix, we give expressions for the secret key rates of benchmarks 2–5 in Sect. 3. For this purpose we model the observables in an experimental demonstration operating normally—that is, in the absence of eavesdropping activity.
For benchmarks 2, 3, and 5, Alice transmits single photons to Bob. In this case the efficient BB84 key rate per mode is lower bounded by [15, 17]
where
Here \(Y_1\) and \(e_1\) are the yield and QBER for single photons, f is the error correction inefficiency, L is the length of the optical channel between Alice and Bob, and \(e_m\) is the setup misalignment error probability. The other variables are as defined in Sect. 4. The factor of 1/2 comes from the fact that BB84 uses two optical modes.
For an ideal single-photon source (benchmark 3), \(\eta _p = \eta _c = 1\). For an ideal detector setup (benchmark 2), \(\eta _d = 1\) and \(p_d = e_m = 0\). This amounts to setting \(e_1 = 0\) and results in \(R = e^{-L/L_{\text {att}}}/2 = \eta _{\text {ch}}/2\).
The key rate for decoy-state BB84 with a laser (benchmark 4) is [23]
where
Here \(\mu \) is the average photon number for signal states; \(Y_1\), \(e_1\), f, and \(e_m\) are as defined above.
Appendix 2: approximation of crossover regions in \(\eta _{\text {tot}}\)-\(T_2\) space
Throughout this appendix, we will assume that the QMs are loaded sequentially and that the central station is at L / 2. Let \(R_b\) be the key rate for the benchmark whose crossover region we wish to approximate.
We will first derive (25). As outlined in the discussion leading up to that equation, our approach is to equate the intersection of the curves \(R_0 e^{-L/(2 L_{\text {att}})}\) and \(R_{b,0} e^{-L/L_{\text {att}}}\) with some characteristic dephasing length \(L_{\text {dp}}\) in order to find the boundary of the crossover region. (\(R_0\) and \(R_{b,0}\) are the key rates at \(L=0\) of our protocol and of the benchmark, respectively.)
The first step is to find conditions under which
If \(p_d\) is small and \(T_p \ll T_2\), then \(e_X\) and \(e_Z\) are approximately independent of \(\eta _{\text {tot}}\)—see (7) and (23)—and \(R_0\) only depends on \(\eta _{\text {tot}}\) through Y. If we further assume that \(\eta '_A \approx \eta _A\), then
to first order in \(\eta _{\text {tot}}\). These conditions are therefore sufficient for the approximation in (32) to hold, with proportionality constant 2/3.
Given this fact, the intersection of the two curves is at
where Q is defined in (26). Note that \(T_p \ll T_2\) implies that Q is independent of \(T_2\).
We now derive a characteristic dephasing length by determining the distance at which Alice’s QM dephases for a significant fraction of \(T_2\). (Recall that Alice’s QM always dephases longer than Bob’s.) That is, we put
where we have again used \(\eta '_A \approx \eta _A\). The fitting parameter K determines the amount of time \(T_2/K\) that the QMs can dephase for before dephasing errors become significant. It was found in Sect. 6.2 that \(K = 14\) fits well.
Equation (35) cannot be solved for the dephasing length \(L_{\text {dp}}\) using elementary functions, but this is unnecessary: to find the crossover boundary, we need only substitute \(L_{\text {int}}\) for \(L_{\text {dp}}\). After a minor rearrangement of terms, this yields (25).
It may appear that a small \(p_d\) implies that \(\eta '_A \approx \eta _A\). It is true that \(p_d \ll 1\) implies \(|\eta '_A - \eta _A| \ll 1\), but since \(\eta _A \ll 1\) and \(\eta _A' \ll 1\) in general, this is not strong enough to meaningfully say that \(\eta '_A \approx \eta _A\). We require instead that \(|\eta '_A - \eta _A|/\eta _A \ll 1\). Moreover, because we have used \(\eta '_A \approx \eta _A\) in deriving (35), we require this to hold for all L up to \(L_{\text {dp}}\)—or, equivalently, up to \(L_{\text {int}}\). By manipulating (13), we can write
If \(\eta _A\) is close to 1, then \((1/\eta _A - 1) p_d\) is already small and the approximation holds. If \(\eta _A \ll 1\), then \((1/\eta _A - 1)p_d \approx p_d/\eta _A\), which is small for all L up to \(L_{\text {int}}\) when \(p_d \ll \eta _{\text {tot}}^2/Q\). This condition, then, together with \(T_p \ll T_2\), guarantees the validity of (25).
Let us now derive (27). This time, we will compare \(L_{\text {int}}\) with a length \(L_d\) at which errors due to dark counts become significant.
The error due to dark counts is related to \(\alpha (\eta _A)\), defined in (13). We will put \(1-\xi = \alpha (\eta _A)\) where \(\xi \) is a parameter indicating the amount of error the system can tolerate due to dark counts. Rearranging this equation, we obtain
By equating \(L_d\) and \(L_{\text {int}}\), we obtain (27).
In deriving this equation, we have made no assumptions beyond those required for (32). In particular, we do not require \(\eta '_A \approx \eta _A\) for all L up to \(L_{\text {int}}\), but only at \(L = 0\). This means that the condition on \(p_d\) is less strict: \(p_d \ll \eta _{\text {tot}}\).
Finally, we note that the condition \(p_d \ll \eta _{\text {tot}}^2/Q\), required for (25), can be obtained from a linearization of the square of (27).
Rights and permissions
About this article
Cite this article
Luong, D., Jiang, L., Kim, J. et al. Overcoming lossy channel bounds using a single quantum repeater node. Appl. Phys. B 122, 96 (2016). https://doi.org/10.1007/s00340-016-6373-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00340-016-6373-4