Lsa 2016144
Lsa 2016144
144
OPEN & 2016 CIOMP. All rights reserved 2047-7538/16
[Link]/lsa
ORIGINAL ARTICLE
Quantum secure direct communication is an important mode of quantum communication in which secret messages are securely
communicated directly over a quantum channel. Quantum secure direct communication is also a basic cryptographic primitive
for constructing other quantum communication tasks, such as quantum authentication and quantum dialog. Here, we report the
first experimental demonstration of quantum secure direct communication based on the DL04 protocol and equipped with
single-photon frequency coding that explicitly demonstrated block transmission. In our experiment, we provided 16 different
frequency channels, equivalent to a nibble of four-bit binary numbers for direct information transmission. The experiment firmly
demonstrated the feasibility of quantum secure direct communication in the presence of noise and loss.
Light: Science & Applications (2016) 5, e16144; doi:10.1038/lsa.2016.144; published online 9 September 2016
Keywords: block transmission; channel loss and noise; DL04 protocol; quantum secure direct communication; single-photon frequency
coding
INTRODUCTION over the past decade. The secure direct nature of QSDC also makes it
Secure communication is not only vital in military use and national an important cryptographic primitive. Protocols of quantum
security, but also important in modern everyday life. Quantum signature16, quantum dialog17,18 and quantum direct secret
communication provides a novel way of communication with sharing19,20 were all constructed on the basis of QSDC. The security
unconditional security. The fundamental difference between quantum of QSDC relies on quantum principles, such as the no-cloning
communication and classical communication is on the capability to theorem, the uncertainty principle, correlation of entangled particles
detect eavesdropping on-site. There are different modes of quantum and nonlocality. In addition, QSDC has been enhanced by a block
communication: quantum key distribution (QKD)1, quantum secret transmission technique that was proposed in the first QSDC protocol
sharing2, quantum secure direct communication (QSDC)3, quantum by Long and Liu3. For entanglement carriers, in 2003, Deng et al.21
teleportation4 and quantum dense coding5. proposed a two-step QSDC protocol where the criteria for QSDC
Since the earliest BB84 protocol was proposed1, QKD has been were explicitly stated. QSDC protocols based on high-dimensional
researched extensively, and the application over a distance of a few entanglement22–24, multipartite entanglement25–27 and hyperentangle-
hundreds of kilometers has been achieved6. QKD can be completed ment28 were developed one by one. For single photons carriers, the
non-deterministically, for instance, in the BB84 and BBM92 first QSDC protocol was proposed in Ref. 29, the so-called DL04
protocols1,7, where the key is distributed indeterminately. Alterna- protocol, wherein, the information was directly encoded in the single
tively, deterministic QKD communication8–13 is essentially a determi- photons. Here, 0 is encoded with I = |0〉〈0|+|1〉〈1| and 1 with
nistic QKD process plus a classical communication. Alice first chooses U = iσy = |0〉〈1| − |1〉〈0|. High-capacity QSDC protocols were proposed
a random key and uses it to encrypt the secret message into ciphertext, with single photons carriers30, which can carry 2 bits of information
and then transmits the ciphertext to Bob through a quantum channel. with a single photon, as the sender encodes the message in both the
If both of them are certain that no eavesdroppers exist, Alice sends the polarization state and the spatial-mode state, independently.
key to Bob through a classical channel. However, the channel loss of the photons would lead to the loss of
In contrast to QKD communication, QSDC sends secret informa- the secret information when it is encoded in the individual photons.
tion securely through a quantum channel directly without setting up a When there is noise in the quantum channel, an adversary Eve can
prior key3,14,15. Since the first QSDC protocol was proposed3, it has gain a certain amount of information by hiding her presence in the
become one of the hot research topics in quantum communication channel noise. In this case, the information leakage may be eliminated
1
State Key Laboratory of Quantum Optics and Quantum Optics Devices, Institute of Laser Spectroscopy, Shanxi University, Taiyuan, Shanxi 030006, China; 2Collaborative
Innovation Center of Extreme Optics, Shanxi University, Taiyuan 030006, China; 3State Key Laboratory of Low-Dimensional Quantum Physics and Department of Physics,
Tsinghua University, Beijing 100084, China; 4Collaborative Innovation Center of Quantum Matter, Beijing 100084, China and 5Tsinghua National Laboratory for Information
Science and Technology, Tsinghua University, Beijing 100084, China
Correspondence: LT Xiao, Email: xlt@[Link]; GL Long, Email: gllong@[Link]
Received 6 September 2015; revised 31 March 2016; accepted 1 April 2016; accepted article preview online 7 April 2016
Experimental QSDC with single photons
JY Hu et al
2
polarization flip operation of the four states of single photons is 0 100 200 300 400 500
realized using the two serially aligned electro-optical modulators (EO- Frequency (kHz)
AM-NR-C3)36. The optical axis of the two modulators is adjusted to a Figure 2 The experimental results of the modulation frequency spectrum.
45° angle. The single photons are detected using a single-photon The y-axis is the Fourier-transformed amplitude in Equation (3). The
detector (QCD300). During the eavesdropping detection procedure of different color lines represent different modulation frequencies. These 16
the block, an optical fiber (with length L2) is used as a delay line to modulation frequency spectrum lines correspond to binary numbers from
synchronize the encoded photons. 0000 to 1111. The systematic pulse repetition frequency is 10 MHz.
In our experiment, the highest modulation frequency f is limited by
the time jitter of the single-photon detector, the computing rate of
the microprocessor and the frequency response of the modulator. 0.00
60 Modulation signal
The channel spacing is determined by the full width at half maximum 0.03
of the characteristic spectrum, which depends on the length of the 0.10
50 0.19
photon block and the mean photon count per pulse. Here, the channel
spacing is 25 kHz, which is determined by the 80 end-detected photon 0.28
counts and 1 ms block time, and could be smaller under the increscent 40 0.38
photon counts and block time. 0.43
|X(Ω)|
0.50
30 0.60
Laser1 PC1 0.73
Att Forward BS Delay line 1.00
PBS1 20
Laser2 CM
f1
Classical f2 10
FPGA FPGA PC3
SPD2 channel fr
Frequency coding
SPD1 PBS2 0
0 1 2 3 4 5 6 7 8
PC2
Backward Mean photon number/pulse (×10–3)
Alice Bob
Figure 3 The characteristic spectrum and background noise distribution of
Figure 1 Schematic diagram of the experimental setup of the FRECO-DL04 the modulation frequency spectrum. The x-axis is the mean photon count
protocol. PBS, Polarization beam splitter; Att, Variable attenuator; per pulse that Alice detects. The green colored areas are the background
PC, Polarization controller; BS, Beam splitter; CM, Control mode; FPGA, white noise in the experiment, where the color depth represents the relative
Field programmable gate array; SPD, Single-photon detector. The distance probability distribution of the noise. The red line represents the amplitude of
between Alice and Bob is L1, and the delay line length is L2. the characteristic spectrum. The modulation frequency is 200 kHz.
onefold frequency component, we provided a nibble of four-bit binary 19 Zhang ZJ. Multiparty quantum secret sharing of secure direct communication. Phys Lett
A 2005; 342: 60–66.
numbers for direct information transmission using 16 different 20 Lai H, Xiao JH, Orgun MA, Xue LY, Pieprzyk J. Quantum direct secret sharing with
frequency channels. A transmission rate of 4 kbps has been achieved. efficient eavesdropping-check and authentication based on distributed fountain codes.
The experiment firmly demonstrated the principle of QSDC with the Quantum Inf Process 2014; 13: 895–907.
21 Deng FG, Long GL, Liu XS. Two-step quantum direct communication protocol using the
presence of practical channel noise and loss. The FRECO-DL04 Einstein-Podolsky–Rosen pair block. Phys Rev A 2003; 68: 042317.
protocol could adopt multifold frequency components simultaneously, 22 Wang C, Deng FG, Li YS, Liu XS, Long GL. Quantum secure direct communication with
high-dimension quantum superdense coding. Phys Rev A 2005; 71: 044305.
considerably increasing the amount of information that a block of 23 Shi J, Gong YX, Xu P, Zhu SN, Zhan YB. Quantum secure direct communication by
single photons can carry. using three-dimensional hyperentanglement. Commun Theor Phys 2011; 56:
831–836.
24 Meslouhi A, Hassouni Y. A quantum secure direct communication protocol
ACKNOWLEDGEMENTS using entangled modified spin coherent states. Quantum Inf Process 2013; 12: 2603–
JY Hu, B Yu, MY Jing, LT Xiao and ST Jia are sponsored by the 973 Program 2621.
25 Wang C, Deng FG, Long GL. Multi-step quantum secure direct communication using
(No. 2012CB921603), 863 Program (No. 2011AA010801), the Natural Science
multi-particle Green–Horne–Zeilinger state. Opt Commun 2005; 253: 15–20.
Foundation of China (Nos. 61527824, 11374196, 10934004 and 11204166) and 26 Sun ZW, Du RG, Long DY. Quantum secure direct communication with two-photon
PCSIRT (No. IRT 13076). GQ Qin and GL Long are supported by the Natural four-qubit cluster states. Int J Theor Phys 2012; 51: 1946–1952.
Science Foundation of China (Nos. 11175094 and 91221205) and the National 27 Zhang QN, Li CC, Li YH, Nie YY. Quantum secure direct communication based on
four-qubit cluster states. Int J Theor Phys 2013; 52: 22–27.
Basic Research Program of China (No. 2015CB921001). 28 Wang TJ, Li T, Du FF, Deng FG. High-capacity quantum secure direct communication
based on quantum hyperdense coding with hyperentanglement. Chin Phys Lett 2011;
28: 040305.
29 Deng FG, Long GL. Secure direct communication with a quantum one-time pad. Phys
Rev A 2004; 69: 052319.
1 Bennett CH, Brassard G. Quantum cryptography: public key distribution and coin 30 Liu D, Chen JL, Jiang W. High-capacity quantum secure direct communication with
tossing. In: Proceedings of the IEEE International Conference on Computers, Systems single photons in both polarization and spatial-mode degrees of freedom. Int J Theor
and Signal Processing, Bangalore, India. IEEE: New York, USA; 1984, pp 175–179. Phys 2012; 51: 2923–2929.
2 Hillery M, Bužek V, Berthiaume A. Quantum secret sharing. Phys Rev A 1999; 59: 31 Wen K, Long GL. One-party quantum-error-correcting codes for unbalanced errors:
1829–1834. principles and application to quantum dense coding and quantum secure direct
3 Long GL, Liu XS. Theoretically efficient high-capacity quantum-key- communication. Int J Quant Inform 2010; 8: 697–719.
distribution scheme. Phys Rev A 2002; 65: 032302. 32 Deng FG, Long GL. Quantum privacy amplification for a sequence of single qubits.
4 Bennett CH, Brassard G, Crépeau C, Jozsa R, Peres A et al. Teleporting an unknown Commun Theor Phys 2006; 46: 443–446.
quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys Rev Lett 33 Sasaki T, Yamamoto Y, Koashi M. Practical quantum key distribution protocol without
1993; 70: 1895–1899. monitoring signal disturbance. Nature 2014; 509: 475–478.
5 Bennett CH, Wiesner SJ. Communication via one- and two-particle operators on 34 Shor PW, Preskill J. Simple proof of security of the BB84 quantum key distribution
Einstein–Podolsky–Rosen states. Phys Rev Lett 1992; 69: 2881–2884. protocol. Phys Rev Lett 2000; 85: 441–444.
6 Korzh B, Lim CCW, Houlmann R, Gisin N, Li MJ et al. Provably secure and practical 35 Win MZ, Scholtz RA. Ultra-wide bandwidth time-hopping spread-spectrum impulse
quantum key distribution over 307 km of optical fibre. Nat Photonics 2015; 9: radio for wireless multiple-access communications. IEEE Trans Commun 2000; 48:
163–168. 679–689.
7 Bennett CH. Quantum cryptography using any two nonorthogonal states. Phys Rev Lett 36 Abdul Khir MF, Mohd Zain MN, Suryadi, Saharudin S, Shaari S. Characterization
1992; 68: 3121–3124. of four states polarization flipper for single photon application. In: Proceedings of IEEE
8 Goldenberg L, Vaidman L. Quantum cryptography based on orthogonal states. Phys Rev International Conference on Photonics. IEEE: Langkawi, Kedah; 2010.
Lett 1995; 75: 1239–1243. 37 Hu JY, Liu Y, Liu LL, Yu B, Zhang GF et al. Quantum description and measurement for
9 Shimizu K, Imoto N. Communication channels secured from eavesdropping via single photon modulation. Photon Res 2015; 3: 24–27.
transmission of photonic Bell states. Phys Rev A 1999; 60: 157–166. 38 Scarani V, Acín A, Ribordy G, Gisin N. Quantum cryptography protocols robust against
10 Beige A, Englert BG, Kurtsiefer C, Weinfurter H. Secure communication with a publicly photon number splitting attacks for weak laser pulse implementations. Phys Rev Lett
known key. Acta Phys Pol A 2002; 101: 357–368. 2004; 92: 057901.
11 Boström K, Felbinger T. Deterministic secure direct communication using entangle- 39 Zhang J, Itzler MA, Zbinden H, Pan JW. Advances in InGaAs/InP single-photon
ment. Phys Rev Lett 2002; 89: 187902. detector systems for quantum communication. Light Sci Appl 2015; 4: e286,
12 Cai QY, Li BW. Improving the capacity of the Boström–Felbinger protocol. Phys Rev A doi:10.1038/lsa.2015.59.
2004; 69: 054301. 40 Liang Y, Zeng HP. Single-photon detection and its applications. Sci China-Phys Mech
13 Lucamarini M, Mancini S. Secure deterministic communication without entanglement. Astron 2014; 57: 1218–1232.
Phys Rev Lett 2005; 94: 140501. 41 Pryde GJ, O'Brien JL, White AG, Bartlett SD. Demonstrating superior discrimination of
14 Long GL, Deng FG, Wang C, Li XH, Wen K et al. Quantum secure direct communication locally prepared states using nonlocal measurements. Phys Rev Lett 2005; 94:
and deterministic secure quantum communication. Front Phys China 2007; 2: 251– 220406.
272. 42 Bartlett SD, Rudolph T, Spekkens RW. Optimal measurements for relative quantum
15 Zhu ZC, Hu AQ, Fu AM. Cryptanalysis and improvement of the controlled quantum information. Phys Rev A 2004; 70: 032321.
secure direct communication by using four particle cluster states. Int J Theor Phys
2014; 53: 1495–1501.
16 Yoon CS, Kang MS, Lim JI, Yang HJ. Quantum signature scheme based on a quantum This work is licensed under a Creative Commons Attribution 4.0
search algorithm. Phys Scr 2015; 90: 15103–15108. International License. The images or other third party material in this
17 Gao G. Two quantum dialogue protocols without information leakage. Opt Commun article are included in the article’s Creative Commons license, unless indicated otherwise
2010; 283: 2288–2293. in the credit line; if the material is not included under the Creative Commons license, users
18 Zheng C, Long GF. Quantum secure direct dialogue using Einstein–Podolsky– will need to obtain permission from the license holder to reproduce the material. To view a
Rosen pairs. Sci China-Phys Mech Astron 2014; 57: 1238–1243. copy of this license, visit [Link]
Supplementary Information for this article can be found on the Light: Science & Applications' website ([Link]