We present a novel, to the best of our knowledge, InGaAs/InAlAs single-photon avalanche diode (SPAD) with a triple-mesa structure. Compared with the traditional mesa structures, the horizontal distribution of the electric field decreases dramatically, while the peaks of the electric field at the mesa edges are well eliminated in the triple-mesa structure, leading to an excellent suppression of the surface leakage current and premature breakdown. Furthermore, the temperature coefficient of the breakdown voltage was measured to be as small as 37.
View Article and Find Full Text PDFThe security of real-world quantum key distribution (QKD) critically depends on the number of data points the system can collect in a finite time interval. To date, state-of-the-art finite-key security analyses require block lengths in the order of 10^{4} bits to obtain positive secret keys. This requirement, however, can be very difficult to achieve in practice, especially in the case of entanglement-based satellite QKD, where the overall channel loss can go up to 70 dB or more.
View Article and Find Full Text PDFEntropy (Basel)
December 2020
Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. Unconditionally secure SPIR solutions with multiple databases are known classically, but are unrealistic because they require long shared secret keys between the parties for secure communication and shared randomness in the protocol.
View Article and Find Full Text PDFIt is well-known that no local model-in theory-can simulate the outcome statistics of a Bell-type experiment as long as the detection efficiency is higher than a threshold value. For the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality this theoretical threshold value is [Formula: see text]. On the other hand, Phys.
View Article and Find Full Text PDFThe security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems.
View Article and Find Full Text PDFThe generation of random numbers is a task of paramount importance in modern science. A central problem for both classical and quantum randomness generation is to estimate the entropy of the data generated by a given device. Here we present a protocol for self-testing quantum random number generation, in which the user can monitor the entropy in real time.
View Article and Find Full Text PDFQuantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise.
View Article and Find Full Text PDFDistributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof of these schemes in a realistic setting has been elusive. We solve this long-standing problem and present a generic method to prove the security of such protocols against general attacks.
View Article and Find Full Text PDFDespite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M.
View Article and Find Full Text PDF