40 research outputs found

    Source attack of decoy-state quantum key distribution using phase information

    Get PDF
    Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security loopholes due to imperfect devices. In fact, practical attacks have successfully been demonstrated. Fortunately, most of them only exploit detection-side loopholes which are now closed by the recent idea of measurement-device-independent QKD. On the other hand, little attention is paid to the source which may still leave QKD systems insecure. In this work, we propose and demonstrate an attack that exploits a source-side loophole existing in qubit-based QKD systems using a weak coherent state source and decoy states. Specifically, by implementing a linear-optics unambiguous-state-discrimination measurement, we show that the security of a system without phase randomization --- which is a step assumed in conventional security analyses but sometimes neglected in practice --- can be compromised. We conclude that implementing phase randomization is essential to the security of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure

    Dipole-field-assisted charge extraction in metal-perovskite-metal back-contact solar cells

    Full text link
    Hybrid organic-inorganic halide perovskites are low-cost solution-processable solar cell materials with photovoltaic properties that rival those of crystalline silicon. The perovskite films are typically sandwiched between thin layers of hole and electron transport materials, which efficiently extract photogenerated charges. This affords high-energy conversion efficiencies but results in significant performance and fabrication challenges. Herein we present a simple charge transport layer-free perovskite solar cell (PSC), comprising only a perovskite layer with two interdigitated gold back-contacts. Charge extraction is achieved via self-assembled molecular monolayers (SAMs) and their associated dipole fields at the metal/perovskite interface. Photovoltages of approximately 600 mV generated by SAM-modified PSCs are equivalent to the built-in potential generated by individual dipole layers. Efficient charge extraction results in photocurrents of up to 12.1 mA/cm2 under simulated sunlight, despite a large electrode spacing.Comment: 18 pages, 5 figure

    Measurement-device-independent quantum key distribution over untrustful metropolitan network

    Full text link
    Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD) network in a star topology over a 200 square kilometers metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate ten times larger than previous result. Our results demonstrate that the MDIQKD network, combining the best of both worlds --- security and practicality, constitutes an appealing solution to secure metropolitan communications.Comment: 17 pages, 4 figure

    Experimental measurement-device-independent quantum digital signatures over a metropolitan network

    Get PDF
    Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable against detector side-channel attacks, just like quantum key distribution. Here, we exploit a measurement-device-independent (MDI) quantum network, over a 200-square-kilometer metropolitan area, to perform a field test of a three-party measurement-device-independent quantum digital signature (MDI-QDS) scheme that is secure against any detector side-channel attack. In so doing, we are able to successfully sign a binary message with a security level of about 1E-7. Remarkably, our work demonstrates the feasibility of MDI-QDS for practical applications.Comment: 5 pages, 1 figure, 2 tables, supplemental materials included as ancillary fil

    Experimental exploration of five-qubit quantum error correcting code with superconducting qubits

    Full text link
    Quantum error correction is an essential ingredient for universal quantum computing. Despite tremendous experimental efforts in the study of quantum error correction, to date, there has been no demonstration in the realisation of universal quantum error correcting code, with the subsequent verification of all key features including the identification of an arbitrary physical error, the capability for transversal manipulation of the logical state, and state decoding. To address this challenge, we experimentally realise the [ ⁣[5,1,3] ⁣][\![5,1,3]\!] code, the so-called smallest perfect code that permits corrections of generic single-qubit errors. In the experiment, having optimised the encoding circuit, we employ an array of superconducting qubits to realise the [ ⁣[5,1,3] ⁣][\![5,1,3]\!] code for several typical logical states including the magic state, an indispensable resource for realising non-Clifford gates. The encoded states are prepared with an average fidelity of 57.1(3)%57.1(3)\% while with a high fidelity of 98.6(1)%98.6(1)\% in the code space. Then, the arbitrary single-qubit errors introduced manually are identified by measuring the stabilizers. We further implement logical Pauli operations with a fidelity of 97.2(2)%97.2(2)\% within the code space. Finally, we realise the decoding circuit and recover the input state with an overall fidelity of 74.5(6)%74.5(6)\%, in total with 9292 gates. Our work demonstrates each key aspect of the [ ⁣[5,1,3] ⁣][\![5,1,3]\!] code and verifies the viability of experimental realization of quantum error correcting codes with superconducting qubits.Comment: 6 pages, 4 figures + Supplementary Material
    corecore