Photons are central to quantum technologies, with photonic qubits offering a promising platform for quantum communication. Semiconductor quantum dots stand out for their ability to generate single photons on demand, a key capability for enabling long-distance quantum networks. In this work, we utilize high-purity single-photon sources based on self-assembled InAs(Ga)As quantum dots as quantum information carriers. We demonstrate that such on-demand single photons can generate quantum contextuality. This capability enables a novel protocol for semi-device-independent quantum key distribution over free-space channels. Crucially, our method does not require ideal or perfectly projective measurements, opening a new pathway for robust and practical quantum communication.
- Paper ID: 2510.12761
- Title: Contextuality-based quantum key distribution with deterministic single-photon sources
- Authors: Yu Meng, Debashis Saha, Mikkel Thorbjørn Mikkelsen, Clara Henke, Ying Wang, Nikolai Bart, Arne Ludwig, Peter Lodahl, Adán Cabello, Leonardo Midolo
- Category: quant-ph (Quantum Physics)
- Publication Date: October 16, 2025
- Paper Link: https://arxiv.org/abs/2510.12761
This paper demonstrates that high-purity single-photon sources based on self-assembled InAs(Ga)As quantum dots can generate quantum contextuality when serving as quantum information carriers. This capability enables the implementation of a contextuality-based semi-device-independent quantum key distribution protocol over free-space channels. Crucially, the method does not require ideal or complete projective measurements, opening new pathways for robust and practical quantum communication.
- Core Problem: Traditional quantum key distribution (QKD) protocols such as BB84 face security vulnerabilities in practical applications due to device imperfections, particularly when using weak coherent laser sources with multi-photon components that are susceptible to photon-number-splitting attacks.
- Problem Significance: The ultimate goal of quantum communication is to achieve device-independent quantum key distribution (DI-QKD), which requires loophole-free Bell tests with extremely stringent experimental conditions. Therefore, a balance between security and practicality must be found.
- Limitations of Existing Approaches:
- The Poissonian distribution of weak coherent laser sources leads to multi-photon emission, reducing security
- Fully device-independent protocols require entanglement distribution and near-perfect quantum measurements
- Traditional protocols primarily rely on quantum bit error rates without proving the fundamental source of quantum randomness
- Research Motivation: To leverage quantum contextuality as a security verification mechanism for semi-device-independent QKD, combining the advantages of deterministic single-photon sources to achieve higher security levels in quantum communication within a prepare-and-measure architecture.
- First Implementation of Contextuality-based Semi-Device-Independent QKD: Demonstrates a prototype of contextuality-based QKD protocol using quantum dot single-photon sources in free space.
- Proof of Fundamental Advantages of Single-Photon Sources: Comparative experiments demonstrate that deterministic single-photon sources possess fundamental advantages over weak coherent lasers in both contextuality violation and key generation rate.
- Relaxation of Measurement Requirements: The protocol does not require ideal or complete projective measurements, significantly lowering experimental barriers.
- Quantum Random Number Generation Application: Implements quantum random number generation within a semi-device-independent framework, providing 0.86 bits of certified randomness.
Implementation of semi-device-independent quantum key distribution based on quantum contextuality, where:
- Input: Alice's preparation device and Bob's measurement device are treated as black boxes, but constrained to three-dimensional Hilbert space
- Output: Security verification through violation of non-contextuality inequalities, with key generation
- Constraints: System dimensionality is known, but internal device mechanisms are unknown
- Self-assembled InGaAs quantum dots operating at 4K
- Resonant excitation wavelength 938nm, repetition rate 80MHz
- Detection count rate approximately 3MHz
- Second-order correlation function g²(0) = 3.6±0.2%, confirming high-purity single-photon characteristics
Hybrid encoding utilizing polarization and path degrees of freedom of single photons to implement qutrit states:
- |0⟩ = |UH⟩ (upper path, horizontal polarization)
- |1⟩ = |UV⟩ (upper path, vertical polarization)
- |2⟩ = |LH⟩ (lower path, horizontal polarization)
- Calcite beam displacers (BD) for controlling path degrees of freedom
- Half-wave plates (HWP) for adjusting polarization states
- Passively phase-stabilized optical modules implementing Alice's state preparation and Bob's measurements
- Contextuality Witness Function: Designed a dimensional witness S = S₁ + S₂, where:
- S₁ quantifies orthogonality between preparation and measurement bases
- S₂ corresponds to the KCBS non-contextuality inequality
- Semi-Device-Independent Security: Security is guaranteed solely by violation of non-contextuality inequalities, without requiring entanglement distribution or loophole-free Bell tests.
- Single-Photon Advantage: Deterministic single-photon emission suppresses multi-photon components while supporting strong contextuality violation and robust key generation.
- Quantum Dot Source: Time window 13ns, 4 million time bins recorded
- Weak Coherent Source: Time window 100ns-4000ns, 1 million bins recorded per setting
- Temperature: Quantum dots operated in a 4K closed-cycle cryostat
- KCBS inequality violation value S₂
- Dimensional witness function S = S₁ + S₂
- Secure key generation rate
- Number of certified random bits
Comparison between quantum dot single-photon sources and weak coherent laser sources with varying average photon numbers μ.
- Contextuality Violation:
- Quantum dot source: S₂ = 2.2463±0.0091 (assuming μ=1)
- Total witness function: S = 32.0701±0.0221, exceeding classical bound Sc = 32
- Key Generation Rate:
- Ideal case: up to 0.174
- Considering practical imperfections: 0.1004
- Weak Coherent Source Comparison: When S₂ < 2.1762, no positive key rate can be generated, requiring μ < 0.129, severely limiting the number of detected events.
By varying the average photon number of weak coherent lasers, the impact of multi-photon components on contextuality violation was systematically investigated, demonstrating that KCBS inequality violation monotonically decreases with increasing μ.
- Single-photon sources exhibit no trade-off between brightness and security, whereas weak coherent sources face fundamental trade-offs
- Multi-photon components not only reduce security but also weaken contextuality violation at the protocol level
- Deterministic single-photon sources are essential for contextuality-based QKD protocols
- Device-Independent QKD: Based on Bell inequality violation, requiring loophole-free Bell tests
- Semi-Device-Independent QKD: Exploiting quantum non-locality under known dimensionality constraints
- Single-Photon Source QKD: Improving traditional protocols using deterministic single-photon sources
Compared to fully device-independent protocols, this approach:
- Does not require entanglement distribution
- Compatible with prepare-and-measure architecture
- Reduces experimental complexity
- Provides higher security levels than traditional protocols
- Successfully demonstrated a prototype of contextuality-based semi-device-independent QKD
- Proved the fundamental advantages of deterministic single-photon sources in contextuality-based QKD
- Implemented quantum communication protocols without requiring ideal measurements
- Current work is a proof-of-principle experiment using manual settings rather than randomized inputs
- Requires fair sampling assumption
- System dimensionality must be known in advance (semi-device-independent)
- Implementation of fully automated QKD systems
- Extension to higher-dimensional systems
- Optimization of key generation rate and transmission distance
- Exploration of other quantum communication applications
- Theory-Experiment Integration: Successfully applies quantum contextuality theory to practical QKD systems
- Technical Innovation: First implementation of contextuality-based QKD using quantum dot single-photon sources
- Systematic Analysis: Comprehensive performance comparison of different light sources
- Practical Value: Provides new pathways for practical quantum communication
- Transmission Distance Constraints: Currently demonstrated only in laboratory environments
- Efficiency Issues: Key generation rate still has room for improvement
- Device Dependence: Reliance on cryogenic quantum dot systems limits practical applicability
- Academic Contribution: Provides new theoretical and experimental frameworks for quantum communication
- Technological Advancement: Promotes application of single-photon sources in quantum communication
- Industrial Prospects: Provides technical foundation for future quantum network construction
- Quantum communication networks requiring high security levels
- Communication environments with limited device trustworthiness
- Quantum random number generation applications
- Future metropolitan-area quantum networks
The paper cites important works in quantum key distribution, quantum contextuality, and single-photon sources, including:
- Bennett & Brassard's BB84 protocol
- Klyachko et al.'s KCBS inequality
- Navascués-Pironio-Acín hierarchy
- Related research on quantum dot single-photon sources