40 research outputs found
Source attack of decoy-state quantum key distribution using phase information
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to
achieve information-theoretically secure key generation. This field is now
approaching the stage of commercialization, but many practical QKD systems
still suffer from security loopholes due to imperfect devices. In fact,
practical attacks have successfully been demonstrated. Fortunately, most of
them only exploit detection-side loopholes which are now closed by the recent
idea of measurement-device-independent QKD. On the other hand, little attention
is paid to the source which may still leave QKD systems insecure. In this work,
we propose and demonstrate an attack that exploits a source-side loophole
existing in qubit-based QKD systems using a weak coherent state source and
decoy states. Specifically, by implementing a linear-optics
unambiguous-state-discrimination measurement, we show that the security of a
system without phase randomization --- which is a step assumed in conventional
security analyses but sometimes neglected in practice --- can be compromised.
We conclude that implementing phase randomization is essential to the security
of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure
Dipole-field-assisted charge extraction in metal-perovskite-metal back-contact solar cells
Hybrid organic-inorganic halide perovskites are low-cost solution-processable
solar cell materials with photovoltaic properties that rival those of
crystalline silicon. The perovskite films are typically sandwiched between thin
layers of hole and electron transport materials, which efficiently extract
photogenerated charges. This affords high-energy conversion efficiencies but
results in significant performance and fabrication challenges. Herein we
present a simple charge transport layer-free perovskite solar cell (PSC),
comprising only a perovskite layer with two interdigitated gold back-contacts.
Charge extraction is achieved via self-assembled molecular monolayers (SAMs)
and their associated dipole fields at the metal/perovskite interface.
Photovoltages of approximately 600 mV generated by SAM-modified PSCs are
equivalent to the built-in potential generated by individual dipole layers.
Efficient charge extraction results in photocurrents of up to 12.1 mA/cm2 under
simulated sunlight, despite a large electrode spacing.Comment: 18 pages, 5 figure
Measurement-device-independent quantum key distribution over untrustful metropolitan network
Quantum cryptography holds the promise to establish an
information-theoretically secure global network. All field tests of
metropolitan-scale quantum networks to date are based on trusted relays. The
security critically relies on the accountability of the trusted relays, which
will break down if the relay is dishonest or compromised. Here, we construct a
measurement-device-independent quantum key distribution (MDIQKD) network in a
star topology over a 200 square kilometers metropolitan area, which is secure
against untrustful relays and against all detection attacks. In the field test,
our system continuously runs through one week with a secure key rate ten times
larger than previous result. Our results demonstrate that the MDIQKD network,
combining the best of both worlds --- security and practicality, constitutes an
appealing solution to secure metropolitan communications.Comment: 17 pages, 4 figure
Experimental measurement-device-independent quantum digital signatures over a metropolitan network
Quantum digital signatures (QDS) provide a means for signing electronic
communications with informationtheoretic security. However, all previous
demonstrations of quantum digital signatures assume trusted measurement
devices. This renders them vulnerable against detector side-channel attacks,
just like quantum key distribution. Here, we exploit a
measurement-device-independent (MDI) quantum network, over a
200-square-kilometer metropolitan area, to perform a field test of a
three-party measurement-device-independent quantum digital signature (MDI-QDS)
scheme that is secure against any detector side-channel attack. In so doing, we
are able to successfully sign a binary message with a security level of about
1E-7. Remarkably, our work demonstrates the feasibility of MDI-QDS for
practical applications.Comment: 5 pages, 1 figure, 2 tables, supplemental materials included as
ancillary fil
Experimental exploration of five-qubit quantum error correcting code with superconducting qubits
Quantum error correction is an essential ingredient for universal quantum
computing. Despite tremendous experimental efforts in the study of quantum
error correction, to date, there has been no demonstration in the realisation
of universal quantum error correcting code, with the subsequent verification of
all key features including the identification of an arbitrary physical error,
the capability for transversal manipulation of the logical state, and state
decoding. To address this challenge, we experimentally realise the
code, the so-called smallest perfect code that permits
corrections of generic single-qubit errors. In the experiment, having optimised
the encoding circuit, we employ an array of superconducting qubits to realise
the code for several typical logical states including the magic
state, an indispensable resource for realising non-Clifford gates. The encoded
states are prepared with an average fidelity of while with a high
fidelity of in the code space. Then, the arbitrary single-qubit
errors introduced manually are identified by measuring the stabilizers. We
further implement logical Pauli operations with a fidelity of
within the code space. Finally, we realise the decoding circuit and recover the
input state with an overall fidelity of , in total with gates.
Our work demonstrates each key aspect of the code and verifies
the viability of experimental realization of quantum error correcting codes
with superconducting qubits.Comment: 6 pages, 4 figures + Supplementary Material