2025-11-24T17:22:16.632854

Contextuality-based quantum key distribution with deterministic single-photon sources

Meng, Saha, Mikkelsen et al.
Photons are central to quantum technologies, with photonic qubits offering a promising platform for quantum communication. Semiconductor quantum dots stand out for their ability to generate single photons on demand, a key capability for enabling long-distance quantum networks. In this work, we utilize high-purity single-photon sources based on self-assembled InAs(Ga)As quantum dots as quantum information carriers. We demonstrate that such on-demand single photons can generate quantum contextuality. This capability enables a novel protocol for semi-device-independent quantum key distribution over free-space channels. Crucially, our method does not require ideal or perfectly projective measurements, opening a new pathway for robust and practical quantum communication.
academic

Contextuality-based quantum key distribution with deterministic single-photon sources

Basic Information

  • Paper ID: 2510.12761
  • Title: Contextuality-based quantum key distribution with deterministic single-photon sources
  • Authors: Yu Meng, Debashis Saha, Mikkel Thorbjørn Mikkelsen, Clara Henke, Ying Wang, Nikolai Bart, Arne Ludwig, Peter Lodahl, Adán Cabello, Leonardo Midolo
  • Category: quant-ph (Quantum Physics)
  • Publication Date: October 16, 2025
  • Paper Link: https://arxiv.org/abs/2510.12761

Abstract

This paper demonstrates that high-purity single-photon sources based on self-assembled InAs(Ga)As quantum dots can generate quantum contextuality when serving as quantum information carriers. This capability enables the implementation of a contextuality-based semi-device-independent quantum key distribution protocol over free-space channels. Crucially, the method does not require ideal or complete projective measurements, opening new pathways for robust and practical quantum communication.

Research Background and Motivation

  1. Core Problem: Traditional quantum key distribution (QKD) protocols such as BB84 face security vulnerabilities in practical applications due to device imperfections, particularly when using weak coherent laser sources with multi-photon components that are susceptible to photon-number-splitting attacks.
  2. Problem Significance: The ultimate goal of quantum communication is to achieve device-independent quantum key distribution (DI-QKD), which requires loophole-free Bell tests with extremely stringent experimental conditions. Therefore, a balance between security and practicality must be found.
  3. Limitations of Existing Approaches:
    • The Poissonian distribution of weak coherent laser sources leads to multi-photon emission, reducing security
    • Fully device-independent protocols require entanglement distribution and near-perfect quantum measurements
    • Traditional protocols primarily rely on quantum bit error rates without proving the fundamental source of quantum randomness
  4. Research Motivation: To leverage quantum contextuality as a security verification mechanism for semi-device-independent QKD, combining the advantages of deterministic single-photon sources to achieve higher security levels in quantum communication within a prepare-and-measure architecture.

Core Contributions

  1. First Implementation of Contextuality-based Semi-Device-Independent QKD: Demonstrates a prototype of contextuality-based QKD protocol using quantum dot single-photon sources in free space.
  2. Proof of Fundamental Advantages of Single-Photon Sources: Comparative experiments demonstrate that deterministic single-photon sources possess fundamental advantages over weak coherent lasers in both contextuality violation and key generation rate.
  3. Relaxation of Measurement Requirements: The protocol does not require ideal or complete projective measurements, significantly lowering experimental barriers.
  4. Quantum Random Number Generation Application: Implements quantum random number generation within a semi-device-independent framework, providing 0.86 bits of certified randomness.

Methodology Details

Task Definition

Implementation of semi-device-independent quantum key distribution based on quantum contextuality, where:

  • Input: Alice's preparation device and Bob's measurement device are treated as black boxes, but constrained to three-dimensional Hilbert space
  • Output: Security verification through violation of non-contextuality inequalities, with key generation
  • Constraints: System dimensionality is known, but internal device mechanisms are unknown

Model Architecture

1. Quantum Dot Single-Photon Source

  • Self-assembled InGaAs quantum dots operating at 4K
  • Resonant excitation wavelength 938nm, repetition rate 80MHz
  • Detection count rate approximately 3MHz
  • Second-order correlation function g²(0) = 3.6±0.2%, confirming high-purity single-photon characteristics

2. Encoding Scheme

Hybrid encoding utilizing polarization and path degrees of freedom of single photons to implement qutrit states:

  • |0⟩ = |UH⟩ (upper path, horizontal polarization)
  • |1⟩ = |UV⟩ (upper path, vertical polarization)
  • |2⟩ = |LH⟩ (lower path, horizontal polarization)

3. Experimental Setup

  • Calcite beam displacers (BD) for controlling path degrees of freedom
  • Half-wave plates (HWP) for adjusting polarization states
  • Passively phase-stabilized optical modules implementing Alice's state preparation and Bob's measurements

Technical Innovations

  1. Contextuality Witness Function: Designed a dimensional witness S = S₁ + S₂, where:
    • S₁ quantifies orthogonality between preparation and measurement bases
    • S₂ corresponds to the KCBS non-contextuality inequality
  2. Semi-Device-Independent Security: Security is guaranteed solely by violation of non-contextuality inequalities, without requiring entanglement distribution or loophole-free Bell tests.
  3. Single-Photon Advantage: Deterministic single-photon emission suppresses multi-photon components while supporting strong contextuality violation and robust key generation.

Experimental Setup

Experimental Parameters

  • Quantum Dot Source: Time window 13ns, 4 million time bins recorded
  • Weak Coherent Source: Time window 100ns-4000ns, 1 million bins recorded per setting
  • Temperature: Quantum dots operated in a 4K closed-cycle cryostat

Evaluation Metrics

  • KCBS inequality violation value S₂
  • Dimensional witness function S = S₁ + S₂
  • Secure key generation rate
  • Number of certified random bits

Comparison Methods

Comparison between quantum dot single-photon sources and weak coherent laser sources with varying average photon numbers μ.

Experimental Results

Main Results

  1. Contextuality Violation:
    • Quantum dot source: S₂ = 2.2463±0.0091 (assuming μ=1)
    • Total witness function: S = 32.0701±0.0221, exceeding classical bound Sc = 32
  2. Key Generation Rate:
    • Ideal case: up to 0.174
    • Considering practical imperfections: 0.1004
  3. Weak Coherent Source Comparison: When S₂ < 2.1762, no positive key rate can be generated, requiring μ < 0.129, severely limiting the number of detected events.

Ablation Studies

By varying the average photon number of weak coherent lasers, the impact of multi-photon components on contextuality violation was systematically investigated, demonstrating that KCBS inequality violation monotonically decreases with increasing μ.

Experimental Findings

  1. Single-photon sources exhibit no trade-off between brightness and security, whereas weak coherent sources face fundamental trade-offs
  2. Multi-photon components not only reduce security but also weaken contextuality violation at the protocol level
  3. Deterministic single-photon sources are essential for contextuality-based QKD protocols

Main Research Directions

  1. Device-Independent QKD: Based on Bell inequality violation, requiring loophole-free Bell tests
  2. Semi-Device-Independent QKD: Exploiting quantum non-locality under known dimensionality constraints
  3. Single-Photon Source QKD: Improving traditional protocols using deterministic single-photon sources

Advantages of This Work

Compared to fully device-independent protocols, this approach:

  • Does not require entanglement distribution
  • Compatible with prepare-and-measure architecture
  • Reduces experimental complexity
  • Provides higher security levels than traditional protocols

Conclusions and Discussion

Main Conclusions

  1. Successfully demonstrated a prototype of contextuality-based semi-device-independent QKD
  2. Proved the fundamental advantages of deterministic single-photon sources in contextuality-based QKD
  3. Implemented quantum communication protocols without requiring ideal measurements

Limitations

  1. Current work is a proof-of-principle experiment using manual settings rather than randomized inputs
  2. Requires fair sampling assumption
  3. System dimensionality must be known in advance (semi-device-independent)

Future Directions

  1. Implementation of fully automated QKD systems
  2. Extension to higher-dimensional systems
  3. Optimization of key generation rate and transmission distance
  4. Exploration of other quantum communication applications

In-Depth Evaluation

Strengths

  1. Theory-Experiment Integration: Successfully applies quantum contextuality theory to practical QKD systems
  2. Technical Innovation: First implementation of contextuality-based QKD using quantum dot single-photon sources
  3. Systematic Analysis: Comprehensive performance comparison of different light sources
  4. Practical Value: Provides new pathways for practical quantum communication

Limitations

  1. Transmission Distance Constraints: Currently demonstrated only in laboratory environments
  2. Efficiency Issues: Key generation rate still has room for improvement
  3. Device Dependence: Reliance on cryogenic quantum dot systems limits practical applicability

Impact

  1. Academic Contribution: Provides new theoretical and experimental frameworks for quantum communication
  2. Technological Advancement: Promotes application of single-photon sources in quantum communication
  3. Industrial Prospects: Provides technical foundation for future quantum network construction

Applicable Scenarios

  1. Quantum communication networks requiring high security levels
  2. Communication environments with limited device trustworthiness
  3. Quantum random number generation applications
  4. Future metropolitan-area quantum networks

References

The paper cites important works in quantum key distribution, quantum contextuality, and single-photon sources, including:

  • Bennett & Brassard's BB84 protocol
  • Klyachko et al.'s KCBS inequality
  • Navascués-Pironio-Acín hierarchy
  • Related research on quantum dot single-photon sources