Anahita Khodadad Kashi and Prof. Dr. Michael Kues demonstrated for the first time entanglement-based quantum key distribution using the frequency degree of freedom to enable scalable quantum networks. Credit: Leibniz University Hannover

Light-Based Quantum Networks: A Breakthrough in Secure Data

Scientists at Leibniz University Hannover have developed a cost-effective quantum network security system using frequency-bin coding of light particles, which reduces complexity and equipment costs by 75% while enhancing security against quantum computer threats through a simplified single-detector design that enables dynamic, scalable quantum key distribution.

Proposed scheme for two-dimensional states generation.

MacZac: A High-Stability Time-Bin Encoder for Quantum Key Distribution

A novel quantum key distribution encoder called MacZac combines Sagnac and Mach-Zehnder interferometers with a single phase modulator to achieve exceptionally low error rates and high stability in time-bin encoded quantum communications, while simplifying the optical setup and eliminating the need for active compensation.

Protocol scheme with arbitrary modes.

High-dimensional coherent one-way Quantum Key Distribution (QKD)

Scientists have introduced and analyzed a high-dimensional QKD protocol that requires only standard two-dimensional hardware. They have provided security analysis against individual and coherent attacks, establishing upper and lower bounds on the secure key rates.

The chain complex relevant to the distance balancing construction.

Local testability of distance-balanced quantum codes

npj Quantum Information, Published online: 20 November 2024; doi:10.1038/s41534-024-00908-8 In this paper, scientists proved a lower bound on the soundness of quantum locally testable codes under the distance balancing construction of Evra et al. Their […]

Roberto Morandotti. Credits : Josée Lecompte

Quantum research breakthrough uses synthetic dimensions to efficiently process quantum information

A new study opens the door to cutting-edge solutions that could contribute to the realization of a system capable of processing quantum information in a simple yet powerful way. The work presents a method for manipulating the photonic states of light in a never-before-seen way, offering greater control over the evolution of photon propagation. This control makes it possible to improve the detection and number of photon coincidences, as well as the efficiency of the system.

Long-range quantum key exchange with an untrusted satellite.

Long-range QKD without trusted nodes is not possible with current technology

The ARQ19 patent’s claim of achieving long-range quantum key distribution without trusted nodes is unfounded because it relies on an unexplained confidential classical channel between end users that cannot be quantum-based due to distance limitations, making the system’s security ultimately dependent on this non-quantum channel rather than achieving true quantum security.

Quantum communication chain within a network.

Composable Security Analysis of Gaussian Quantum Networks

A theoretical study advancing the composable security analysis of Gaussian quantum networks in finite-size regimes, introducing a novel parameter estimation methodology based on end-user data sharing, while demonstrating potential breakthroughs in surpassing the PLOB bound through quantum amplifier-assisted chains, though practical implementation remains challenging.

Source comparison for three main QKD schemes.

Enhancing quantum cryptography with quantum dot single-photon sources

Quantum dot-based single-photon sources offer superior security for quantum cryptography through their unique combination of on-demand emission, high brightness, low multiphoton contribution, and tunable coherence in photon-number states, outperforming traditional Poisson-distributed sources across multiple cryptographic primitives.

Quantum physics: record entanglement of quantum memories

Record entanglement of quantum memories

Researchers from LMU and Saarland University have entangled two quantum memories over a 33-kilometer-long fiber optic connection — a record and an important step toward the Quantum Internet. This is the longest distance so far […]

A particle of light from the single photon source (below) is stored in the vapor cell (above). A simultaneously emitted second photon is revealed by a detector (right), which triggers the control laser pulse and thereby initiates the storage process. (Image: Department of Physics/University of Basel)

Quantum network nodes with warm atoms

Physicists at the University of Basel, Switzerland, have now developed a network node for quantum communication networks that can store single photons in a vapor cell and pass them on later. In quantum communication networks, […]

Part of the photon pair source with the luminous glass fibres of the optical fibre amplifier.

New QKD stable secure protocol

Based on the so-called Quantum Key Distribution (QKD), researchers at TU Darmstadt have developed a new, tap-proof communication network. The new system is used to exchange symmetric keys between parties in order to encrypt messages […]

Qunnect Logo

Qunnect aims to Quantum Repeater Commercialization

Qunnect was awarded two SBIR awards from the US Department of Energy totaling $1.85M for the development and commercialization of the company’s Quantum Repeater product suite. When complete, this collection of devices supports the next generation […]

Schematic setup for our one cycle implementation of Salih et al.’s 2013 counterfactual communication protocol.

The laws of physics do not prohibit counterfactual communication

It has been conjectured that counterfactual communication is impossible, even for post-selected quantum particles. A team of researchers has strongly challenged this by proposing precisely such a counterfactual scheme where—unambiguously—none of Alice’s photons that correctly […]

Fusion success creates a 7-GHZ state and failure performs X-basis measurements on the fused qubits, resulting in two 2-GHZ states (Bell pairs) and a 3-GHZ state. Even though the states are represented using graphs, they are not cluster states.

Entanglement generation in a quantum network at distance-independent rate

Researchers have developed a protocol for entanglement generation in the Quantum Internet that allows a repeater node to use n-qubit Greenberger-Horne-Zeilinger (GHZ) projective measurements that can fuse n successfully entangled links, i.e., two-qubit entangled Bell pairs shared across n network edges, […]

2 × N plug-and-play (PnP) twin-field quantum key distribution (TF-QKD) network scheme.

2×N twin-field quantum key distribution network configuration

Developing Quantum Key Distribution (QKD) has been recently directed toward distance extension and network expansion for real-world secure communications. Considering a recent report on a quantum communication network over 4,600 km, it seems that QKD networks […]