Plato Data Intelligence.
Vertical Search & Ai.

Solve single photon detector problems

Date:

Hao Shu

Shenzhen University South China University of Technology

Find this paper interesting or want to discuss? Scite or leave a comment on SciRate.

Abstract

Single photon detector(SPD) problems arise in most quantum tasks, especially for measuring states going through high-lost channels. They are particularly prominent in quantum key distribution(QKD), which could be the most significant application in quantum information theory. In recent years, QKD distance has been improved dramatically but is still restricted because the bit error rate(QBER) caused by SPD dark counts will be out of control as the distance increases. If this problem can be solved, QKD can be implemented over arbitrarily long distances. However, previous solutions often result in impractical requirements such as superconductors while they can only reduce the dark count rate to finite low levels. In this paper, we solve SPD problems with today’s technologies only. Although it is the no-cloning theorem that prevents a state from being measured multiple times to obtain a more reliable result, we propose a scheme circumventing the no-cloning theorem in certain tasks to allow a single state to be employed several times. The scheme demonstrates that imperfect detectors can provide nearly perfect results, namely, the QBER caused by dark counts can be reduced to arbitrarily low while in the meantime, detective efficiency can be improved to arbitrarily high. Consequently, QKD distance is not limited by the imperfect SPD anymore and can be improved from hundreds of kilometers to thousands without high-technology detectors. Furthermore, similar schemes can be applied for reducing measurement errors or improving the performance of sources. Finally, it is worth noting that although the paper is mainly discussed in the context of QKD, our scheme is an independent scheme that could be employed in other protocols wherever SPD are employed.

The paper solves single photon detector problems, including dark count effects, detective efficiency, and others, without high-technology detectors by circumventing the no-cloning theorem in certain tasks. It demonstrates that such problems could be not essential in certain quantum information tasks.

â–º BibTeX data

â–º References

[1] C. H. Bennett and G. Brassard. “Quantum cryptography: Public key distribution and coin tossing”. In Proceedings of IEEE International Conference on Computers (1984).
https:/​/​doi.org/​10.1016/​j.tcs.2014.05.025

[2] A. K. Ekert. “Quantum cryptography based on bell’s theorem”. Physical Review Letters 67, 661–663 (1991).
https:/​/​doi.org/​10.1103/​PhysRevLett.67.661

[3] C. H. Bennett. “Quantum cryptography using any two nonorthogonal states”. Physical Review Letters 68, 3121 (1992).
https:/​/​doi.org/​10.1103/​PhysRevLett.68.3121

[4] C. Bennett, G. Brassard, and N. Mermin. “Quantum cryptography without bell’s theorem”. Physical Review Letters 68, 557–559 (1992).
https:/​/​doi.org/​10.1103/​PhysRevLett.68.557

[5] L. Goldenberg and L. Vaidman. “Quantum cryptography based on orthogonal states”. Physical Review Letters 75, 1239–1243 (1995).
https:/​/​doi.org/​10.1103/​physrevlett.75.1239

[6] M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields. “Overcoming the rate–distance limit of quantum key distribution without quantum repeaters”. Nature 557, 400–403 (2018).
https:/​/​doi.org/​10.1038/​s41586-018-0066-6

[7] P. W. Shor and J. Preskill. “Simple proof of security of the bb84 quantum key distribution protocol”. Physical Review Letters 85, 441–444 (2000).
https:/​/​doi.org/​10.1103/​PhysRevLett.85.441

[8] X. F. Ma, P. Zeng, and H. Y. Zhou. “Phase-matching quantum key distribution”. Physical Review X 8 (2018).
https:/​/​doi.org/​10.1103/​physrevx.8.031043

[9] H. K. Lo, M. Curty, and B. Qi. “Measurement-device-independent quantum key distribution”. Physical Review Letters 108 (2012).
https:/​/​doi.org/​10.1103/​physrevlett.108.130503

[10] H. Shu. “Quantum key distribution based on orthogonal state encoding”. International Journal of Theoretical Physics 61 (2022).
https:/​/​doi.org/​10.1007/​s10773-022-05257-w

[11] H. Shu. “Asymptotically optimal prepare-measure quantum key distribution protocol”. International Journal of Theoretical Physics 62 (2023).
https:/​/​doi.org/​10.1007/​s10773-023-05447-0

[12] D. Gottesman, H. K. Lo, N. Lütkenhaus, and J. Preskill. “Security of quantum key distribution with imperfect devices”. Quantum Information and Computation 4, 325–360 (2004).
https:/​/​doi.org/​10.26421/​QIC4.5-1

[13] W. H. Jiang, J. H. Liu, Y. Liu, G. Jin, J. Zhang, and J. W. Pan. “1.25ghz sine wave gating ingaas/​inp single-photon detector with a monolithically integrated readout circuit”. Optics Letters 42, 5090–5093 (2017).
https:/​/​doi.org/​10.1364/​OL.42.005090

[14] M. A. Albota and F. N. C. Wong. “Efficient single-photon counting at 1.55 um by means of frequency upconversion”. Optics Letters 29, 1449–1451 (2004).
https:/​/​doi.org/​10.1364/​OL.29.001449

[15] L. X. You. “Superconducting nanowire single-photon detectors for quantum information”. Nanophotonics 9, 2673–2692 (2020).
https:/​/​doi.org/​10.1515/​nanoph-2020-0186

[16] Z. Wang, S. Miki, and M. Fujiwara. “Superconducting nanowire single-photon detectors for quantum information and communications”. IEEE Journal of Selected Topics in Quantum Electronics 15, 1741–1747 (2009).
https:/​/​doi.org/​10.1109/​JSTQE.2009.2034616

[17] W. J. Zhang, Q. Jia, L. X. You, X. Ou, H. Huang, L. Zhang, H. Li, Z. Wang, and X. M. Xie. “Saturating intrinsic detection efficiency of superconducting nanowire single-photon detectors via defect engineering”. Physical Review Applied 12, 044040 (2019).
https:/​/​doi.org/​10.1103/​PhysRevApplied.12.044040

[18] S. Pirandola, R. García-Patrón, S. L. Braunstein, and S. Lloyd. “Direct and reverse secret-key capacities of a quantum channel”. Physical Review Letters 102, 050503 (2009).
https:/​/​doi.org/​10.1103/​PhysRevLett.102.050503

[19] M. Takeoka, S. Guha, and M. Wilde. “Fundamental rate-loss tradeoff for optical quantum key distribution”. Nature Communications 5 (2014).
https:/​/​doi.org/​10.1038/​ncomms6235

[20] S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi. “Fundamental limits of repeaterless quantum communications”. Nature Communications 8 (2017).
https:/​/​doi.org/​10.1038/​ncomms15043

[21] A. Kandala, K. X. Wei, S. Srinivasan, E. Magesan, S. Carnevale, G. A. Keefe, D. Klaus, O. Dial, and D. C. McKay. “Demonstration of a high-fidelity cnot gate for fixed-frequency transmons with engineered $zz$ suppression”. Physical Review Letters 127, 130501 (2021).
https:/​/​doi.org/​10.1103/​PhysRevLett.127.130501

[22] A. Noiri, K. Takeda, T. Nakajima, T. Kobayashi, A. Sammak, G. Scappucci, and S. Tarucha. “Fast universal quantum gate above the fault-tolerance threshold in silicon”. Nature 601, 338–342 (2022).
https:/​/​doi.org/​10.1038/​s41586-021-04182-y

[23] H. K. Lo, X. F. Ma, and K. Chen. “Decoy state quantum key distribution”. Physical Review Letters 94 (2005).
https:/​/​doi.org/​10.1103/​physrevlett.94.230504

[24] H. Shu. “Measurement-device-independenization of quantum key distribution protocols”. Chinese Journal of Physics 85, 135–142 (2023).
https:/​/​doi.org/​10.1016/​j.cjph.2023.06.019

Cited by

[1] Hao Shu, “Reduce dark count effects by optimizing measurements”, arXiv:2306.10525, (2023).

[2] Hao Shu, Chang-Yue Zhang, Yue-Qiu Chen, Zhu-Jun Zheng, and Shao-Ming Fei, “Quantum Key Distribution Over Noisy Channels by the Testing State Method”, International Journal of Theoretical Physics 62 8, 160 (2023).

The above citations are from SAO/NASA ADS (last updated successfully 2023-11-22 14:40:52). The list may be incomplete as not all publishers provide suitable and complete citation data.

On Crossref’s cited-by service no data on citing works was found (last attempt 2023-11-22 14:40:50).

spot_img

Latest Intelligence

spot_img

Chat with us

Hi there! How can I help you?