Noiseless linear amplification for the single-photon entanglement of arbitrary polarization–time-bin qudit
Chen Ling-Quan1, 2, Sheng Yu-Bo3, 4, Zhou Lan1, 3, †
School of Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
College of Electronic and Optical Engineering & College of Microelectronics, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Key Laboratory of Broadband Wireless Communication and Sensor Network Technology (Ministry of Education), Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Institute of Signal Processing Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003, China

 

† Corresponding author. E-mail: zhoul@njupt.edu.cn

Project supported by the National Natural Science Foundation of China (Grant Nos. 11474168 and 11747161), the Priority Academic Program Development of Jiangsu Higher Education Institutions, China, and the China Postdoctoral Science Foundation (Grant No. 2018M642293).

Abstract

Single-photon entanglement (SPE) is an important source in quantum communication. In this paper, we put forward a single-photon-assisted noiseless linear amplification protocol to protect the SPE of an arbitrary polarization–time-bin qudit from the photon transmission loss caused by the practical channel noise. After the amplification, the fidelity of the SPE can be effectively increased. Meanwhile, the encoded polarization–time-bin features of the qudit can be well preserved. The protocol can be realized under the current experimental conditions. Moreover, the amplification protocol can be extended to resist complete photon loss and partial photon loss during the photon transmission. After the amplification, we can not only increase the fidelity of the target state, but also solve the decoherence problem simultaneously. Based on the above features, our amplification protocol may be useful in future quantum communication.

1. Introduction

Entanglement is an important source in quantum communication. In the past few decades, entanglement has been widely used in quantum teleportation,[14] quantum secure direct communication,[512] quantum key distribution,[1316] and so on.[1724] Among the various entanglement forms, single-photon entanglement (SPE) with the form of (A and B are two distant locations) is the simplest but most important entanglement mode. SPE has important applications in cryptography[25,26] and quantum repeater protocols.[27,28] For example, in 2010, Salart et al. reported that the purification of SPE could be applied in remote quantum communication based on quantum repeaters.[28] Recently, the Guerreiro group used SPE combined with superconducting detectors to demonstrate the quantum nonlocality and related device-independent applications.[29] In previous applications of SPE, the information was often encoded in the spatial modes (A and B) of the single-photon qubit. Actually, besides the spatial-mode, there are several other degrees of freedom (DOFs) in the photonic system which can become sources to encode quantum information, such as polarization, time-bin, frequency, and orbit-angular-momentum. In recent years, the qudits which encode a higher d-dimensional quantum state (d > 2) in single photons have attracted much attention in the quantum communication field due to their superior properties over qubits. For instance, it has been proved that in quantum key distribution, encoding secret keys in qudits rather than qubits can increase security against eavesdropping attacks and the noise threshold during the communication.[3032] Among the various DOFs in the photonic system, polarization and time-bin are widely used in quantum communication. Polarization is easy to manipulate and measure,[3335] and the time-bin entanglement is a robust form of optical quantum information. Time-bin entanglement has been successfully used in the transmission of qubits over hundreds of kilometers[3639] and in teleportation using real-world fiber networks.[40,41] For example, in 2013, Inagaki et al. reported the distribution of time-bin entangled photon pairs over 300 km in an optical fiber.[39] Combining the advantages of polarization and time-bin entanglement, the polarization–time-bin qudit is attractive in the future quantum communication field. In 2018, Yoo et al. reported their experimental preparation and characterization of four-dimensional polarization–time-bin quantum states.[42] Based on the above research, in this paper, we consider the SPE of the polarization–time-bin qudit, which has potential application in future quantum secure communication.

Unfortunately, during the distribution in a practical quantum channel, the single-photon qudit may be lost due to the channel noise. Photon transmission loss is a fundamental limitation in quantum communication, and will make the communication fidelity decrease exponentially with the channel length.[43] Noiseless linear amplification (NLA) is an effective method to overcome the photon transmission loss problem, and was first proposed by Ralph and Lund in 2009.[44] Since then, a large number of NLA protocols have been proposed successively.[4564] In 2010, Gisin et al. proposed a theoretical heralded qubit amplifier for single-photon qubits. They first used this heralded qubit amplifier in device-independent quantum key distribution (DI-QKD) to lengthen the communication distance.[45] In 2012, Osorio et al. realized the heralded noiseless amplification of the single-photon qubit in linear optics in an experiment.[49] Later, Zhang et al. first used Gisin’s amplifier to protect the two-mode SPE.[50] In 2015, Zhou put forward the first nonlinear recyclable amplification protocol for SPE with the help of cross-Kerr nonlinearity.[56] In 2017, Monteiro et al. proposed a heralded amplification protocol of SPE and they adopted this amplification protocol in the DI-QKD. They showed that by exploiting the amplification protocol, they can maintain high-fidelity entangled states over loss-equivalent distances longer than 50 km.[57] Besides single-photon-assisted NLA protocols, in 2013, Scott et al. proposed an entanglement-assisted NLA protocol of a single-photon qubit.[58] Later, considering that ideal auxiliary single photons and auxiliary photon entanglement are difficult to obtain under current experimental conditions, the group of Sheng extended the entanglement-assisted amplification protocol to protect the SPE under imperfect auxiliary photon states generated by a current spontaneous parametric down-conversion source.[5961] Although the amplification of SPE has been widely discussed, the previous NLA protocols cannot be used to protect the SPE of the polarization–time-bin qudit from photon loss. In this paper, we put forward an NLA protocol for protecting the SPE of the polarization–time-bin qudit assisted with some auxiliary polarized single photons. This NLA protocol only requires some common linear optical devices, which makes it realizable using current experimental technology. After the amplification, the polarization–time-bin encoding features of the single photon can be perfectly retained. Moreover, we will discuss the application of our NLA protocol to resist complete photon loss and partial photon loss. After performing the NLA protocol, we can not only increase the fidelity of the SPE, but also solve the decoherence problem in the spatial mode simultaneously.

The paper is organized as follows. In Section 2, we explain the NLA protocol for the SPE of an arbitrary polarization–time-bin qudit in detail. In Section 3, we extend the NLA protocol to solve complete photon loss and partial photon loss in spatial mode simultaneously. In Sections 4 and 5, we present a discussion and give the conclusion.

2. NLA for the SPE of arbitrary polarization–time-bin qudit

In this section, we will explain the amplification protocol for the SPE of an arbitrary polarization–time-bin qudit. We assume that the photon source S generates an arbitrary polarization–time-bin qudit with the form where |H⟩ represents the horizontal polarization and |V⟩ represents the vertical polarization. |S⟩ and |L⟩ mean the short and long time-bins, respectively. The four coefficients α, β, δ, and η meet |α|2 + |β|2 = 1 and |δ|2 + |η|2 = 1. Here, we suppose that all the four coefficients are real for simplicity. The polarization–time-bin qudit |ψin⟩ is distributed to Alice (A) and Bob (B) with equal probability, which can create a maximally entangled SPE as Unfortunately, after transmission through a practical noisy quantum channel, the qudit may be completely lost with the probability of 1 − F, which makes the SPE degrade into a mixed state as

The schematic principle of this protocol is shown in Fig. 1. In order to realize the amplification, Alice and Bob should perform the same operations simultaneously. In detail, they need to prepare two auxiliary single photons in the spatial modes b1, c1, e1, and f1, respectively. One is in |H⟩ and the other is in |V⟩. Alice makes the two auxiliary photons in b1 (c1) mode pass through PBS2a and PBS3a (PBS6a and PBS7a), successively. Bob makes the two auxiliary photons in e1 (f1) mode pass through PBS2b and PBS3b (PBS6b and PBS7b) successively. PBS represents a polarization beam splitter, which can totally transmit the photon in |H⟩ and reflect the photon in |V⟩. Alice and Bob should precisely control the path length of the long (L) and short (S) paths, which makes the time-bins of the photons in |H⟩ and |V⟩ be precisely |S⟩ and |L⟩, respectively. As a result, with the help of PBSs, Alice and Bob are able to create an auxiliary photon state as |φ1⟩ = |HSb2 ⊗ |VLb2 ⊗ |HSc2 ⊗ |VLc2 ⊗ |HSe2 ⊗ |VLe2 ⊗ |HSf2 ⊗ |VLf2.

Fig. 1. The basic principle of the NLA protocol for the SPE of arbitrary polarization–time-bin qudit. The protocol requires some auxiliary polarized single photons and some common linear optical devices. Here, BS, PBS, and VBS represent the 50:50 beam splitter, polarization beam splitter, and variable beam splitter, respectively. A Pockel cell (PC) is used to reverse the polarization of photons. The Dia and Dib (i = 1,2,…,8) represent the photon-number-resolving detectors.

Then, Alice and Bob make the two auxiliary photons in each of the four spatial modes b1, c1, e1, and f1 enter a VBS with the transmittance of t. Here, we name the four VBSs as VBS1a, VBS2a, VBS1b, and VBS2b, respectively. After the VBSs, the auxiliary photon state will evolve to

On one hand, we first consider that the photonic qudit is not lost with the probability of F. In this case, the whole photon state is |Ψ1⟩ = |ΦAB ⊗|φ2⟩. Alice and Bob make the single photon in a1 and g1 modes pass through PBS1a and PBS1b, respectively, which makes |ΦAB in Eq. (2) become Then, they make the photons in both a2 and g2 modes pass through the PCS, and the photons in both a3 and g3 modes pass through the PCL. The PCS (PCL) can swap the polarization under the temporal mode S (L). After that, |Φ1AB further evolves to

Afterwards, Alice and Bob let the photons in a4b3, a5c3, g4e3, and g5f3 modes enter four 50:50 BSs, respectively. We mark the four BSs as BS1a, BS2a, BS1b, and BS2b, respectively, which can make

Based on the Hong–Ou–Mandel bunching effect, Alice and Bob should make the photons in the two input modes arrive at the BS at the same time. In this way, the parties must accurately adjust the length of each line. After the BSs, |Φ2AB in Eq. (6) and the auxiliary photon state |φ2⟩ in Eq. (4) will turn into

Next, Alice and Bob respectively detect the output photons in the d1d2d3d4 and k1k2k3k4 modes with the help of the PBSs and single-photon detectors Dia and Dib (i = 1,2,…,8). We can deduce that |HSd1(d3), |HSd2(d4), |HSk1(k3), and |HSk2(k4) will be respectively detected by D2a(6a), D4a(8a), D2b(6b), and D4b(8b), while |VLd1(d3), |VLd2(d4), |VLk1(k3), and |VLk2(k4) will be respectively detected by D1a(5a), D3a(7a), D1b(5b), and D3b(7b). It is worth noting that all the photon detectors Dia and Dib (i = 1,2,…,8) are required to be able to distinguish the input photon number. After the photon detection, Alice and Bob can determine whether the protocol is successful based on the photon detection results. Here, we only list the 16 successful detection results of Alice in Table 1. The successful detection results of Bob are the same as those of Alice. In this way, we can see that there are a total of 16 × 16 = 256 successful cases in our protocol.

Table 1.

The successful photon detection results of Alice. Here, the • means our protocol is successful under the detection result (each of the detectors registers exactly one photon).

.

Here, we take the detection results of D1aD2aD5aD6aD1b D2bD5bD6b each registering exactly one photon for example. Under the detection results, the whole-photon state |Φ3AB ⊗|φ3⟩ will collapse to with the probability of t7(1 − t)/256.

Then, Alice and Bob make the photons in b4e4 modes pass through the PCS and the photons in c4f4 modes pass through the PCL. After that, the state |Φ4AB will turn into

Finally, Alice makes the output photons in b5c5 modes pass through PBS10a and Bob makes the output photons in e5f5 modes pass through PBS10b. These operations make |Φ5AB finally evolve to which has the same form of |ΦAB.

If we get one of the other 255 successful detection results, we can also finally obtain the output state the same as |ΦoutAB with the help of the phase-flip operation. Therefore, the total success probability for Alice and Bob obtaining |ΦoutAB is

On the other hand, we consider the case in which the single photon is lost with the probability of 1 − F. Under this case, the input state is the vacuum state and the whole photon state is the auxiliary photon state |φ2⟩. After the auxiliary photons pass through the BSs, it can be found that only the item t|HSVLb3t|HSVLc3t|HSVLe3t|HSVLf3 can lead to successful photon detection results. In detail, after the BSs, such item will evolve to On the other hand, we consider the case in which the single photon is lost with the probability of 1−F. Under this case, the input state is the vacuum state and the whole photon state is the auxiliary photon state |φ2⟩. After the auxiliary photons pass through the BSs, it can be found that only the item t|HSVLb3t|HSVLc3t|HSVLe3t|HSVLf3 can lead to successful photon detection results. In detail, after the BSs, such item will evolve to which can lead to the 256 successful detection results described above. Under any one of the 256 detection results, |φ4⟩ will finally collapse to the vacuum state.

From Eqs. (4) and (14), the success probability of finally obtaining the vacuum state is t8. Therefore, under the case where the initial single photon is lost, the success probability of our protocol is

Until now, the entire amplification process is completed. When the protocol is successful, Alice and Bob will share a new mixed state with a total success probability of The fidelity of the target state |ΦoutAB is

The fidelity F′ of the new mixed state does not relate to the four coefficients α, β, δ, and η, but is only determined by the fidelity F of the initial input mixed state and the transmittance t of the VBSs. We define the amplification factor g as To realize the amplification, we need F′ > F, that is, g > 1. It can be calculated that as long as we provide suitable VBSs with t < 1/2, we can obtain g > 1.

3. Application of the amplification protocol to resist complete photon loss and partial photon loss

Interestingly, besides realizing the amplification of SPE, our protocol can be extended to resist decoherence in the spatial DOF. This means our protocol can simultaneously protect the SPE of the polarization–time-bin qudit from complete transmission photon loss and partial photon loss caused by environmental noise.

Here, we suppose that the photon source S generates a polarization–time-bin qudit with the form of |ψin⟩ in Eq. (1). The qudit is sent to Alice and Bob to generate a maximally entangled SPE. Unfortunately, the environmental noise may cause both photon transmission loss and decoherence in the spatial DOF. As a result, after the photon transmission, Alice and Bob share a mixed state as where the state |Φ′⟩AB is a less entangled SPE with the form Here, a and b are two entanglement coefficients, which meet |a|2 + |b|2 = 1. We also assume that the values of a and b are real for simplicity. Moreover, we need to know the values of the two coefficients in advance, which can be obtained by measuring a large number of the target state.

Our protocol can be extended to increase the fidelity of the target state, while recovering the two entanglement coefficients a and b to be the same. To achieve this goal, we only need to adjust the transmittance of the four VBSs. Here, we define the transmittance of VBS1a, VBS2a to be ta and that of VBS1b, VBS2b to be tb. If the single photon is not lost, after the BSs, the single photon state and auxiliary photon state can be written as After the photon detection, we also take the detection results of D1aD2aD5aD6aD1bD2bD5bD6b each registering one photon for example. Combining Eqs. (22) and (23), the whole state |Φ3AB ⊗ |φ3⟩ will collapse to

Here, by adjusting the two entanglement coefficients of the spatial modes to be the same, we can control the transmittance of the four VBSs to meet . This transmittance requirement can be simplified as As the values of a and b are known, tb can be expressed as a function of ta. That is to say, as long as the value of ta is fixed, we can deterministically obtain the value of tb. Under this case, the state in Eq. (24) can finally evolve to maximally entangled SPE with the form The success probability can be written as

On the other hand, if the initial single photon is lost, by selecting the item corresponding to one of the 256 successful detection results, we can also obtain the vacuum state with the probability of In this way, after operating the protocol, Alice and Bob can finally share a new mixed state as

The total success probability can be calculated as and the fidelity F″ equals Similar to in Section 2, by adjusting the transmittance ta, we can also make F″ > F and realize the amplification.

4. Discussion

This paper mainly describes a simple and efficient amplification protocol for the SPE of an arbitrary polarization–time-bin qudit. This protocol only needs some auxiliary single photons in |H⟩ or |V⟩ polarization. After performing the protocol, we can judge whether the protocol is successfully heralded by the single-photon detection results. As long as the protocol is successful, we can effectively increase the fidelity of SPE by adjusting the transmittance of the VBSs. Moreover, after the amplification, the encoded polarization and time-bin features of the single-photon qudit can be well preserved and cannot be leaked to either Alice or Bob. This amplification protocol is based on linear optics, which can be implemented under the current experimental condition. Meanwhile, the distilled new mixed state with high fidelity can be retained and used in other applications. Moreover, we also discuss the application of our protocol by adjusting the transmittance of the four VBSs, and we can protect the SPE of the polarization–time-bin qudit from complete photon loss and partial photon {loss}, simultaneously.

It is important to discuss the fidelity F′, the amplification factor g, and the total success probability P of the protocol. From Eqs. (17)–(19), it can be found that the three factors have nothing to do with the coefficients α, β, δ, and η, but are only determined by the transmittance t of the VBSs and the fidelity F of the initial input state. We calculate the values of F′, g, and P as a function of the transmittance t under the initial fidelity F = 0.2, 0.4, 0.6, 0.8, respectively. As shown in Figs. 2 and 3, the amplification can be realized when t < 1/2. The smaller t is, the higher value F′ and g will achieve. When t is close to 0, F′ is close to 1 and g is close to 1/F. In Fig. 3, when t = 1/2, the four curves intersect at one point of g = 1. On the other hand, as shown in Fig. 4, the lower value of t leads to the lower P. When t is close to 0, P is also close to 0. As the amplification is realized only when t < 1/2, we control the scale of t to be [0, 0.5]. When t is 0.5, the maximum value of P is 1/256. The success probability of our protocol is lower than that of the previous amplification protocol.[63,64] The reason is that for preserving the polarization and time-bin features of the qudit, we have to use more auxiliary photons and perform more parity checks. As the success probability of the parity check is less than 1, the more parity checks lead to the lower total success probability of the protocol. On the other hand, it can be found that there is a trade-off between P and F′. In practical application, we should consider both factors and select suitable VBSs.

Fig. 2. The fidelity F′ as a function of the transmittance t of the VBSs with different initial fidelity F = 0.2, 0.4, 0.6, and 0.8. The smaller t is, the higher value F′ will achieve. When t → 0, F′ under arbitrary initial fidelity F will be close to 1.
Fig. 3. The amplification factor g as a function of the transmittance t with different initial fidelity F = 0.2, 0.4, 0.6, and 0.8. When t = 0.5, the four curves intersect at one point of g = 1, which indicates that the fidelity of the distilled new mixed state equals that of the initial mixed state. The amplification only occurs under t < 1/2.
Fig. 4. The total success probability P as a function of the transmittance t with different initial fidelity F = 0.2, 0.4, 0.6, and 0.8. A higher value of t leads to a higher value of P. Therefore, there is a trade-off between F′ and P. A higher F′ leads to a lower P.
5. Conclusion

In summary, we propose an efficient NLA protocol to protect the SPE of an arbitrary polarization–time-bin qudit assisted by some auxiliary polarized photons, some linear optical devices, and photon-number-resolving detectors. In this protocol, Alice and Bob individually perform similar operations in her/his location simultaneously. Each of them adopts some PBSs and Pockel cells to convert the original photon state into two polarization components, which will be individually amplified simultaneously. During the operation, with the help of a 50:50 BS and single-photon detection, the parties can judge whether the protocol is successful according to the photon detection results. When the protocol is successful, the parties can finally distill a new mixed state with higher fidelity by adjusting the transmittance of the VBS. The amplification protocol can be realized under current experimental conditions. Moreover, after the amplification, the encoded polarization and time-bin features of the single-photon qudit can be well preserved and cannot be leaked to either Alice or Bob. We also discuss the application of our amplification protocol to resist complete photon loss and partial photon loss problems during photon transmission. After the amplification, Alice and Bob can not only increase the fidelity of the target state, but also solve the decoherence problem. Based on the above features, our amplification protocol may be useful in the future quantum communication field.

Reference
[1] Bennett C H Brassard G Crepeau C Jozsa R Peres A Wootters W K 1993 Phys. Rev. Lett. 70 1895
[2] Wang M Y Yan F L 2016 Quantum Inf. Process. 15 3383
[3] Li T C Yin Z Q 2016 Sci. Bull. 61 163
[4] Yang G Lian B W Nie M Jin J 2017 Chin. Phys. B 26 040305
[5] Gisin N Ribordy G Tittel W Zbinden H 2002 Rev. Mod. Phys. 74 145
[6] Long G L Liu X S 2002 Phys. Rev. A 65 032302
[7] Deng F G Long G L Liu X S 2003 Phys. Rev. A 68 042317
[8] Zhang W Ding D S Sheng Y B Zhou L Shi B S Guo G C 2017 Phys. Rev. Lett. 118 220501
[9] Zhu F Zhang W Sheng Y B Huang Y D 2017 Sci. Bull. 62 1519
[10] Wang C Deng F G Li Y S Liu X S Long G L 2005 Phys. Rev. A 71 044305
[11] Tan X Q Zhang X Q 2016 Quantum Inf. Process. 15 2137
[12] Zhao X L Li J L Niu P H Ma H Y Ruan D 2017 Chin. Phys. B 26 030302
[13] Ekert A K 1991 Phys. Rev. Lett. 67 661
[14] Cao D Y Liu B H Wang Z Huang Y F Li C F Guo G C 2015 Sci. Bull. 60 1128
[15] Ma H X Bao W S Li H W Chou C 2016 Chin. Phys. B 25 080309
[16] Bao H Z Bao W S Wang Y Chen R K Ma H X Zhou C Li H W 2017 Chin. Phys. B 26 050302
[17] Sheng Y B Zhou L 2017 Sci. Bull. 62 1025
[18] Guerra A G D H Rios F F S Ramos R V 2016 Quantum Inf. Process. 15 4747
[19] Huang W Su Q Xu B J Liu B Fan F Jia H Y Yang Y H 2016 Sci. China-Phys. Mech. Astron. 59 120311
[20] Ye T Y 2015 Sci. China-Phys. Mech. Astron. 58 1
[21] Heng Y B Pan J Guo R Zhou L Wang L 2015 Sci. China-Phys. Mech. Astron. 58 1
[22] Zhang J Mu Q X Zhang W Z 2018 Chin. Phys. B 27 040304
[23] Shi X 2017 Chin. Phys. B 26 120303
[24] Yang F L Guo Y Shi J J Wang H L Pan J J 2017 Chin. Phys. B 26 100303
[25] Silberhorn C Ralph T C Lütkenhaus N Leuchs G 2002 Phys. Rev. Lett. 89 167901
[26] Silberhorn C Korolkova N Leuchs G 2002 Phys. Rev. Lett. 88 167902
[27] Duan L M Lukin M D Cirac J T Zoller P 2001 Nature 414 413
[28] Salart D Landry O Sangouard N Gisin N Herrmann H Sanguinetti B Simon C Sohler W Thew R T Thomas A Zbinden H 2010 Phys. Rev. Lett. 104 180504
[29] Guerreiro T Monteiro F Martin A 2016 Phys. Rev. Lett. 117 070404
[30] Cerf N J Bourennane M Karlsson A Gisin N 2002 Phys. Rev. Lett. 88 127902
[31] Sheridan L Scarani V 2010 Phys. Rev. A 82 030301
[32] Mafu M Dudley A Goyal S Giovannini D McLaren M Padgett M J Konrad T Petruccione F Lütkenhaus N Forbes A 2013 Phys. Rev. A 88 032305
[33] Bennett C H Brassard G 1984 Proceedings of the IEEE Internaitional Conference Computers, Systems, and Signal Processing, 1984 Bangalore, India 175 195
[34] Bouwmeester D Pan J W Mattle K Eibl M Weinfurter H Zeilinger A 1997 Nature 390 575
[35] Kok P Munro W J Nemoto K Dowling J P Milburn G J 2007 Rev. Mod. Phys. 79 135
[36] Marcikic I Riedmatten H de Tittel W Zbinden H Gisin N 2003 Nature 421 509
[37] Thew R T Tanzilli S Tittel W Zbinden H Gisin N 2002 Phys. Rev. A 66 062304
[38] Marcikic I Riedmatten H de Tittel W Zbinden H Legré M Gisin N 2004 Phys. Rev. Lett. 93 180502
[39] Inagaki T Matsuda N Tadanaga O Takesue H 2013 Opt. Express 21 23241
[40] Valivarthi R Puigibert M G Zhou Q Aguilar G H Verma V B Marsili F Shaw M D Nam S W Oblak D Tittel W 2016 Nat. Photon. 10 676
[41] Sun Q C Mao Y L Chen S J Zhang W Jiang Y F Zhang Y B Zhang W J Miki S Yamashita T Terai H Jiang X Chen T Y You L X Chen X F Wang Z Fan J Y Zhang Q Pan J W 2016 Nat. Photon. 10 671
[42] Yoo J Choi Y Cho Y W Han S W Lee S Y Moon S Oh K Kim Y S 2018 Opt. Commun. 419 30
[43] Duan L M Lukin M D Cirac J T Zoller P 2001 Nature 414 413
[44] Ralph T C Lund A P 2009 Proceedings of the 9th International Conference on Quantum Communication Measurement and Computing Lvovsky A 155 160
[45] Gisin N Pironio S Sangouard N 2010 Phys. Rev. Lett. 105 070501
[46] Xiang G Y Ralph T C Lund A P Walk N Pryde G J 2010 Nat. Photon. 4 316
[47] Curty M Moroder T 2011 Phys. Rev. A 84 010304
[48] Pitkanen D Ma X Wickert R Loock P van Lütkenhaus N 2011 Phys. Rev. A 84 022325
[49] Osorio C I Bruno N Sangouard N Zbinden H Gisin N Thew R T 2012 Phys. Rev. A 86 023815
[50] Zhang S L Yang S Zou X B Shi B S Guo G C 2012 Phys. Rev. A 86 034302
[51] Wang T J Cao C Wang C 2014 Phys. Rev. A 89 052303
[52] Wang T J Wang C 2015 Opt. Express 23 31550
[53] McMahon N A Lund A P Ralph T C 2014 Phys. Rev. A 89 023846
[54] Zhang S L Dong Y L Zou X B Shi B S Guo G C 2013 Phys. Rev. A 88 032324
[55] Minář J Riedmatten H de Sangouard N 2012 Phys. Rev. A 85 032313
[56] Zhou L Sheng Y B 2015 Laser Phys. Lett. 12 045203
[57] Monteiro F Verbanis E Vivoli Caprara V Martin A Gisin N Zbinden H Thew R T 2017 Quantum Sci. Technol. 2 024008
[58] Meyer Scott E Bula M Bartkiewicz K Černoch A Soubusta J Jennewein T Lemr K 2013 Phys. Rev. A 88 012327
[59] Ou Yang Y Feng Z F Zhou L Sheng Y B 2015 Quantum Inf. Process. 14 635
[60] Ou Yang Y Feng Z F Zhou L Sheng Y B 2016 Laser Phys. 26 015204
[61] Zhou L Ou Yang Y Wang L Sheng Y B 2017 Quantum Inf. Process. 16 151
[62] Feng Z F Ou Yang Y Zhou L Sheng Y B 2015 Quantum Inf. Process. 14 3693
[63] Bruno N Pini V Martin A Verma V B Nam S W Mirin R Lita A Marsili F Korzh B Bussieres F Sangouard N Zbinden H Gisin N Thew R 2016 Opt. Express 24 125
[64] Kocsis S Xiang G Y Ralph T C Pryde G J 2013 Nat. Phys. 9 23