Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Feihu Xu is active.

Publication


Featured researches published by Feihu Xu.


Physical Review Letters | 2014

Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.

Zhiyuan Tang; Zhongfa Liao; Feihu Xu; Bing Qi; Li Qian; Hoi-Kwong Lo

We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.


Nature Communications | 2014

Finite-key analysis for measurement-device-independent quantum key distribution.

Marcos Curty; Feihu Xu; Wei Cui; Charles Ci Wen Lim; Kiyoshi Tamaki; Hoi-Kwong Lo

Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.


Physical Review A | 2014

Concise security bounds for practical decoy-state quantum key distribution

Charles Ci Wen Lim; Marcos Curty; Nino Walenta; Feihu Xu; Hugo Zbinden

Due to its ability to tolerate high channel loss, decoy-state quantum key distribution (QKD) has been one of the main focuses within the QKD community. Notably, several experimental groups have demonstrated that it is secure and feasible under real-world conditions. Crucially, however, the security and feasibility claims made by most of these experiments were obtained under the assumption that the eavesdropper is restricted to particular types of attacks or that the finite-key effects are neglected. Unfortunately, such assumptions are not possible to guarantee in practice. In this work, we provide concise and tight finite-key security bounds for practical decoy-state QKD that are valid against general attacks.


Optics Express | 2012

Ultrafast quantum random number generation based on quantum phase fluctuations

Feihu Xu; Bing Qi; Xiongfeng Ma; He Xu; Haoxuan Zheng; Hoi-Kwong Lo

A quantum random number generator (QRNG) can generate true randomness by exploiting the fundamental indeterminism of quantum mechanics. Most approaches to QRNG employ single-photon detection technologies and are limited in speed. Here, we experimentally demonstrate an ultrafast QRNG at a rate over 6 Gbits/s based on the quantum phase fluctuations of a laser operating near threshold. Moreover, we consider a potential adversary who has partial knowledge on the raw data and discuss how one can rigorously remove such partial knowledge with postprocessing. We quantify the quantum randomness through min-entropy by modeling our system and employ two randomness extractors--Trevisans extractor and Toeplitz-hashing--to distill the randomness, which is information-theoretically provable. The simplicity and high-speed of our experimental setup show the feasibility of a robust, low-cost, high-speed QRNG.


Physical Review A | 2014

Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution

Feihu Xu; He Xu; Hoi-Kwong Lo

Measurement-device-independent quantum key distribution (MDI-QKD) has been demonstrated in both laboratories and field tests using attenuated lasers combined with the decoy-state technique. Although researchers have studied various decoy-state MDI-QKD protocols with two or three decoy states, a clear comparison between these protocols is still missing. This invokes the question of how many types of decoy states are needed for practical MDI-QKD. Moreover, the system parameters to implement decoy-state MDI-QKD are only partially optimized in all previous works, which casts doubt on the actual performance of former demonstrations. Here, we present analytical and numerical decoy-state methods with one, two, and three decoy states. We provide a clear comparison among these methods and find that two decoy states already enable a near-optimal estimation and more decoy states cannot improve the key rate much in either asymptotic or finite-data settings. Furthermore, we perform a full optimization of system parameters and show that full optimization can significantly improve the key rate in the finite-data setting. By simulating a real experiment, we find that full optimization can increase the key rate by more than one order of magnitude compared to nonoptimization. A local search method to optimize efficiently the system parameters is proposed. This method can be four orders of magnitude faster than a trivial exhaustive search to achieve a similar optimal key rate. We expect that this local search method could be valuable for general fields in physics.


New Journal of Physics | 2013

Practical aspects of measurement-device-independent quantum key distribution

Feihu Xu; Marcos Curty; Bing Qi; Hoi-Kwong Lo

A novel protocol, measurement-device-independent quantum key distribution (MDI-QKD), removes all attacks from the detection system, the most vulnerable part in QKD implementations. In this paper, we present an analysis for practical aspects of MDI-QKD. To evaluate its performance, we study various error sources by developing a general system model. We find that MDI-QKD is highly practical and thus can be easily implemented with standard optical devices. Moreover, we present a simple analytical method with only two (general) decoy states for the finite decoy-state analysis. This method can be used directly by experimentalists to demonstrate MDI-QKD. By combining the system model with the finite decoy-state method, we present a general framework for the optimal choice of the intensities of the signal and decoy states. Furthermore, we consider a common situation, namely asymmetric MDI-QKD, in which the two quantum channels have different transmittances. We investigate its properties and discuss how to optimize its performance. Our work is of interest not only to experiments demonstrating MDI-QKD but also to other non-QKD experiments involving quantum interference.


Physical Review A | 2013

Postprocessing for quantum random-number generators: Entropy evaluation and randomness extraction

Xiongfeng Ma; Feihu Xu; He Xu; Xiaoqing Tan; Bing Qi; Hoi-Kwong Lo

Quantum random-number generators (QRNGs) can offer a means to generate information-theoretically provable random numbers, in principle. In practice, unfortunately, the quantum randomness is inevitably mixed with classical randomness due to classical noises. To distill this quantum randomness, one needs to quantify the randomness of the source and apply a randomness extractor. Here, we propose a generic framework for evaluating quantum randomness of real-life QRNGs by min-entropy, and apply it to two different existing quantum random-number systems in the literature. Moreover, we provide a guideline of QRNG data postprocessing for which we implement two information-theoretically provable randomness extractors: Toeplitz-hashing extractor and Trevisans extractor.


Applied Physics Letters | 2013

Long distance measurement-device-independent quantum key distribution with entangled photon sources

Feihu Xu; Bing Qi; Zhongfa Liao; Hoi-Kwong Lo

We present a feasible method that can make quantum key distribution (QKD), both ultra-long-distance and immune, to all attacks in the detection system. This method is called measurement-device-independent QKD (MDI-QKD) with entangled photon sources in the middle. By proposing a model and simulating a QKD experiment, we find that MDI-QKD with one entangled photon source can tolerate 77 dB loss (367 km standard fiber) in the asymptotic limit and 60 dB loss (286 km standard fiber) in the finite-key case with state-of-the-art detectors. Our general model can also be applied to other non-QKD experiments involving entanglement and Bell state measurements.


Optics Express | 2016

Computational multi-depth single-photon imaging

Dongeek Shin; Feihu Xu; Franco N. C. Wong; Jeffrey H. Shapiro; Vivek K. Goyal

We present an imaging framework that is able to accurately reconstruct multiple depths at individual pixels from single-photon observations. Our active imaging method models the single-photon detection statistics from multiple reflectors within a pixel, and it also exploits the fact that a multi-depth profile at each pixel can be expressed as a sparse signal. We interpret the multi-depth reconstruction problem as a sparse deconvolution problem using single-photon observations, create a convex problem through discretization and relaxation, and use a modified iterative shrinkage-thresholding algorithm to efficiently solve for the optimal multi-depth solution. We experimentally demonstrate that the proposed framework is able to accurately reconstruct the depth features of an object that is behind a partially-reflecting scatterer and 4 m away from the imager with root mean-square error of 11 cm, using only 19 signal photon detections per pixel in the presence of moderate background light. In terms of root mean-square error, this is a factor of 4.2 improvement over the conventional method of Gaussian-mixture fitting for multi-depth recovery.


Physical Review A | 2015

Experimental quantum key distribution with source flaws

Feihu Xu; Kejin Wei; Shihan Sajeed; Sarah Kaiser; Shi-Hai Sun; Zhiyuan Tang; Li Qian; Vadim Makarov; Hoi-Kwong Lo

Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be secure in practice. Here, we perform an experiment that for the first time shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments and our theory can be applied to general QKD systems. These features constitute a step towards secure QKD with imperfect devices.

Collaboration


Dive into the Feihu Xu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeffrey H. Shapiro

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Franco N. C. Wong

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bing Qi

University of Toronto

View shared research outputs
Top Co-Authors

Avatar

Charles Ci Wen Lim

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Li Qian

University of Toronto

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Murphy Yuezhen Niu

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Zheshen Zhang

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge