{"id":108705,"date":"2020-06-15T11:43:19","date_gmt":"2020-06-15T18:43:19","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2020\/06\/entanglement-based-secure-quantum-cryptography-over-1120-kilometres"},"modified":"2020-06-15T11:43:19","modified_gmt":"2020-06-15T18:43:19","slug":"entanglement-based-secure-quantum-cryptography-over-1120-kilometres","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2020\/06\/entanglement-based-secure-quantum-cryptography-over-1120-kilometres","title":{"rendered":"Entanglement-based secure quantum cryptography over 1,120 kilometres"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/entanglement-based-secure-quantum-cryptography-over-1120-kilometres.jpg\"><\/a><\/p>\n<p>Quantum key distribution (QKD)<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Bennett, C. H. & Brassard, G. Quantum cryptography: public key distribution and coin tossing. In Proc. Int. Conf. on Computers, Systems and Signal Processing 175&ndash;179 (1984).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR1\" id=\"ref-link-section-d123510e587\">1<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Ekert, A. K. Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661 (1991).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR2\" id=\"ref-link-section-d123510e587_1\">2<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 3\" title=\"Bennett, C. H., Brassard, G. & Mermin, N. D. Quantum cryptography without Bell\u2019s theorem. Phys. Rev. Lett. 68, 557 (1992).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR3\" id=\"ref-link-section-d123510e590\">3<\/a><\/sup> is a theoretically secure way of sharing secret keys between remote users. It has been demonstrated in a laboratory over a coiled optical fibre up to 404 kilometres long<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Peng, C.-Z. et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys. Rev. Lett. 98, 010505 (2007).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR4\" id=\"ref-link-section-d123510e594\">4<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Rosenberg, D. et al. Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett. 98, 010503 (2007).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR5\" id=\"ref-link-section-d123510e594_1\">5<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Yin, H.-L. et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett. 117, 190501 (2016).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR6\" id=\"ref-link-section-d123510e594_2\">6<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 7\" title=\"Boaron, A. et al. Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 121, 190502 (2018).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR7\" id=\"ref-link-section-d123510e597\">7<\/a><\/sup>. In the field, point-to-point QKD has been achieved from a satellite to a ground station up to 1,200 kilometres away<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Liao, S.-K. et al. Satellite-to-ground quantum key distribution. Nature 549, 43 (2017).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR8\" id=\"ref-link-section-d123510e601\">8<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Liao, S.-K. et al. Space-to-ground quantum key distribution using a small-sized payload on Tiangong-2 Space Lab. Chin. Phys. Lett. 34, 090302 (2017).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR9\" id=\"ref-link-section-d123510e601_1\">9<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 10\" title=\"Yin, J. et al. Satellite-to-ground entanglement-based quantum key distribution. Phys. Rev. Lett. 119, 200501 (2017).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR10\" id=\"ref-link-section-d123510e604\">10<\/a><\/sup>. However, real-world QKD-based cryptography targets physically separated users on the Earth, for which the maximum distance has been about 100 kilometres<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 11\" title=\"Schmitt-Manderbach, T. et al. Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys. Rev. Lett. 98, 010504 (2007).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR11\" id=\"ref-link-section-d123510e608\">11<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 12\" title=\"Ursin, R. et al. Entanglement-based quantum communication over 144 km. Nat. Phys. 3, 481 (2007).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR12\" id=\"ref-link-section-d123510e611\">12<\/a><\/sup>. The use of trusted relays can extend these distances from across a typical metropolitan area<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Elliott, C. et al. Current status of the DARPA quantum network. In Quantum Information and Computation III Vol. 5815, 138&ndash;150 (International Society for Optics and Photonics, 2005).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR13\" id=\"ref-link-section-d123510e615\">13<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Peev, M. et al. The SECOQC quantum key distribution network in Vienna. New J. Phys. 11, 075001 (2009).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR14\" id=\"ref-link-section-d123510e615_1\">14<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" title=\"Chen, T.-Y. et al. Field test of a practical secure communication network with decoy-state quantum cryptography. Opt. Express 17, 6540 (2009).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR15\" id=\"ref-link-section-d123510e615_2\">15<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 16\" title=\"Sasaki, M. et al. Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19, 10387&ndash;10409 (2011).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR16\" id=\"ref-link-section-d123510e618\">16<\/a><\/sup> to intercity<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 17\" title=\"Qiu, J. et al. Quantum communications leap out of the lab. Nature 508, 441 (2014).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR17\" id=\"ref-link-section-d123510e623\">17<\/a><\/sup> and even intercontinental distances<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 18\" title=\"Liao, S.-K. et al. Satellite-relayed intercontinental quantum network. Phys. Rev. Lett. 120, 030501 (2018).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR18\" id=\"ref-link-section-d123510e627\">18<\/a><\/sup>. However, relays pose security risks, which can be avoided by using entanglement-based QKD, which has inherent source-independent security<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 19\" title=\"Koashi, M. & Preskill, J. Secure quantum key distribution with an uncharacterized source. Phys. Rev. Lett. 90, 057902 (2003).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR19\" id=\"ref-link-section-d123510e631\">19<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 20\" title=\"Ma, X., Fung, C.-H. F. & Lo, H.-K. Quantum key distribution with entangled photon sources. Phys. Rev. A 76, 012307 (2007).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR20\" id=\"ref-link-section-d123510e634\">20<\/a><\/sup>. Long-distance entanglement distribution can be realized using quantum repeaters<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 21\" title=\"Briegel, H.-J., Dur, W., Cirac, J. I. & Zoller, P. Quantum repeaters: the role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932&ndash;5935 (1998).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR21\" id=\"ref-link-section-d123510e638\">21<\/a><\/sup>, but the related technology is still immature for practical implementations<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 22\" title=\"Yang, S.-J., Wang, X.-J., Bao, X.-H. & Pan, J.-W. An efficient quantum light&ndash;matter interface with sub-second lifetime. Nat. Photon. 10, 381 (2016).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR22\" id=\"ref-link-section-d123510e642\">22<\/a><\/sup>. The obvious alternative for extending the range of quantum communication without compromising its security is satellite-based QKD, but so far satellite-based entanglement distribution has not been efficient<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 23\" title=\"Yin, J. et al. Satellite-based entanglement distribution over 1200 kilometers. Science 356, 1140 (2017).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR23\" id=\"ref-link-section-d123510e646\">23<\/a><\/sup> enough to support QKD. Here we demonstrate entanglement-based QKD between two ground stations separated by 1,120 kilometres at a finite secret-key rate of 0.12 bits per second, without the need for trusted relays. Entangled photon pairs were distributed via two bidirectional downlinks from the Micius satellite to two ground observatories in Delingha and Nanshan in China. The development of a high-efficiency telescope and follow-up optics crucially improved the link efficiency. The generated keys are secure for realistic devices, because our ground receivers were carefully designed to guarantee fair sampling and immunity to all known side channels<sup><a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 24\" title=\"Lo, H.-K., Curty, M. & Tamaki, K. Secure quantum key distribution. Nat. Photon. 8, 595 (2014).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR24\" id=\"ref-link-section-d123510e651\">24<\/a>,<a data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 25\" title=\"Xu, F., Ma, X., Zhang, Q., Lo, H.-K. & Pan, J.-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020).\" href=\"https:\/\/www.nature.com\/articles\/s41586-020-2401-y#ref-CR25\" id=\"ref-link-section-d123510e654\">25<\/a><\/sup>. Our method not only increases the secure distance on the ground tenfold but also increases the practical security of QKD to an unprecedented level.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quantum key distribution (QKD)1,2,3 is a theoretically secure way of sharing secret keys between remote users. It has been demonstrated in a laboratory over a coiled optical fibre up to 404 kilometres long4,5,6,7. In the field, point-to-point QKD has been achieved from a satellite to a ground station up to 1,200 kilometres away8,9,10. However, real-world [\u2026]<\/p>\n","protected":false},"author":513,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1625,418,1617,1492,8],"tags":[],"class_list":["post-108705","post","type-post","status-publish","format-standard","hentry","category-encryption","category-internet","category-quantum-physics","category-security","category-space"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/108705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/513"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=108705"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/108705\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=108705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=108705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=108705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}