Skip to main content
Science Advances logoLink to Science Advances
. 2024 Aug 23;10(34):eadp2877. doi: 10.1126/sciadv.adp2877

Experimental quantum Byzantine agreement on a three-user quantum network with integrated photonics

Xu Jing 1,, Cheng Qian 1,, Chen-Xun Weng 2,, Bing-Hong Li 2,, Zhe Chen 1, Chen-Quan Wang 3, Jie Tang 3, Xiao-Wen Gu 3, Yue-Chan Kong 3, Tang-Sheng Chen 3, Hua-Lei Yin 4,2,*, Dong Jiang 5,*, Bin Niu 2,3,*, Liang-Liang Lu 1,2,3,6,*
PMCID: PMC11809609  PMID: 39178268

Abstract

Quantum communication networks are crucial for both secure communication and cryptographic networked tasks. Building quantum communication networks in a scalable and cost-effective way is essential for their widespread adoption. Here, we establish a complete polarization entanglement–based fully connected network, which features an ultrabright integrated Bragg reflection waveguide quantum source, managed by an untrusted service provider, and a streamlined polarization analysis module, which requires only one single-photon detector for each user. We perform a continuously working quantum entanglement distribution and create correlated bit strings between users. Within the framework of one-time universal hashing, we provide the experimental implementation of source-independent quantum digital signatures using imperfect keys circumventing the necessity for private amplification. We further beat the 1/3 fault tolerance bound in the Byzantine agreement, achieving unconditional security without relying on sophisticated techniques. Our results offer an affordable and practical route for addressing consensus challenges within the emerging quantum network landscape.


The quantum Byzantine agreement with imperfect keys is demonstrated in a fully and simultaneously connected quantum network.

INTRODUCTION

Quantum communication (16) is one of the most mature quantum technologies. It enables the generation of secure keys between distant parties, even under the surveillance of an eavesdropper with unlimited computing power. A quantum link comprises fiber or free-space optical channels, along with a specific type of communication protocol. For example, quantum teleportation allows the transmission of fragile quantum information between remote parties using previously shared entanglement and classical communication (7). Quantum secure direct communication, another important branch of quantum communication, has offered opportunities for directly sending secret information over secure quantum channels (810). Quantum key distribution (QKD) is the fastest growing fields in quantum communication and has been implemented on a great variety of platforms, such as long-distance fiber (11, 12) and free-space links (13, 14). Scaling the standard two-user protocols to many users is essential for its large-scale adoption (1517). Up to this point, several QKD networks have undergone trials with trusted nodes (1820) or passive/active switching (2124) at the cost of sacrificing security or functionality. In theory, quantum repeaters (25, 26) have the potential to facilitate a global network, but the technology is still in its early stages. Recently, a fully and simultaneously connected quantum network architecture has been proposed without relying on trusted nodes (27), which enables widespread connectivity with security guaranteed by the laws of quantum physics. Several notable entanglement-based multiuser networks were reported, showing great promise for forming scalable quantum networks (2834).

As quantum networks approach maturity, various networked tasks have emerged, such as quantum digital signatures (QDS) (3539), quantum e-commerce (40), secret sharing (4143), secure anonymous protocols (44, 45), and quantum Byzantine agreement (QBA) (4653). Among them, QBA, a quantum approach for handling the Byzantine generals problem, can effectively achieve a consensus despite the presence of malicious players (54). QBA is equipped to manage decentralized communication and computation tasks in upcoming quantum networks, applicable to various aspects of daily life like blockchain, distributed storage, distributed computation, and electronic voting (55). In general, it offers information-theoretic security and superior fault tolerance performance compared to classical Byzantine agreement (CBA). There are two fundamental differences between QBA and CBA protocols. One is the security loopholes of public-key encryption methods used in CBA (5658), which is under the threat of quantum computation (59, 60). The other lies in the 1/3 fault tolerance bound for CBA protocols, which requires a minimum of 3f+1 players to tolerate f malicious players (61, 62). Consequently, the three-party consensus problem is unsolvable for CBA even if the authentication classical channel is used (63). The first quantum solution to the three-party consensus was proposed in 2001 (46), with an experimental demonstration using a four-photon entangled state in 2008 (49). Several relevant QBA protocols using some special entangled states or qudits were subsequently reported (47, 48, 50, 51). Although these protocols offer levels of security unattainable through classical means, they deviate from Lamport’s two original Byzantine conditions by using additional assumptions. For example, the unavoidable occurrence of unreliable measurement results leads to a certain probability of failure and thus needs to be discarded. The main reason is that they do not fully use the correlation to protect the unforgeability and nonrepudiation of information. Moreover, these protocols suffer from low efficiency as they require multipartite entanglement and entanglement swapping, which are unscalable and remain largely impractical due to the probabilistic nature of a spontaneous parametric down-conversion (SPDC) source. In addition, they are limited to reaching only a one-bit message consensus. Fortunately, QDS (36, 38, 64) is a potential tool to overcome all these obstacles by establishing a multiparty correlation among users. QDS can protect data integrity, authenticity, and nonrepudiation with information-theoretic security. Nonetheless, there are still three main challenges of contemporary QDS related to the complexity and cost of their implementations. First, the well-known single-bit QDS protocols have a low signature rate, rendering them impractical for signing long messages. Second, most schemes require perfect keys with complete secrecy, which often entails substantial computational overhead and results in considerable delays in performing privacy amplification procedures. Third, the high demand for system manufacturability and accessibility for consumers in the network often leads to difficulty in their practical deployment.

Here, we counter the above challenges by implementing an efficient one-time universal hashing (OTUH) QDS protocol (39) on a cost-effective source-independent quantum network. By exploiting OTUH-QDS without perfect keys, we experimentally beat the limitation of 1/3 fault tolerance bound and security loopholes of CBA, indicating the quantum advantage in resolving consensus problems. This is possible owing to several recent advances. It was previously shown (65) that imperfect quantum keys with partial information leakage can be used for digital signatures and authentication without compromising security while having orders of magnitude improvement on signature rate compared with conventional single-bit schemes. Moreover, practical implementation of QBA not only requires a decentralized protocol design but also necessitates experimental equipment without additional trustworthiness assumptions. Intriguingly, the low-complexity fully connected quantum network architecture is an excellent experimental solution to decentralized protocols (27), resulting in practical QBA within a strict information-theoretic secure framework. It can use an untrusted entanglement source to establish simultaneous communication between one node and all other nodes, which is different from proof-of-principle experimental demonstrations using pairwise BB84 QKD (66). The last advance is the development of scalable architecture and integrated hardware for the creation of broadband bipartite entanglement, which is compatible with complementary metal-oxide semiconductor processes (3134). AlGaAs semiconductor material is an outstanding platform due to its strong second-order nonlinearities, reconfigurability, and small birefringence enabling the generation of polarization-entangled states without requiring additional walk-off compensation or interferometric schemes. Moreover, as a direct bandgap III-V compound semiconductor, AlGaAs is well suited for lasing, which paves the way for developing monolithic integration of quantum light source (67). Integrating these ideas, we implement the protocols using an integrated AlGaAs Bragg reflection waveguide (BRW) quantum source managed by an untrusted service provider and a time-multiplexed decoding module, composed of two unbalanced polarization maintaining interferometers (UPMIs) and a single-photon detector (SPD), held by each end user. Our monolithic source maintains polarization entanglement fidelity exceeding 94.6% across a 26-nm bandwidth, with a high brightness of 45.6 MHz/mW. Our complete entanglement distribution experiment proves the viability of practical and affordable quantum networks and identifies pathways for solving practical quantum cryptography tasks without trusted nodes. It will be of interest to a more accessible quantum internet.

RESULTS

Before demonstrating the three-user QBA, we briefly review the protocol developed in (66). For a strict Byzantine agreement, there are two necessary interactive consistency (IC) Byzantine conditions (68). The first is that all loyal lieutenants obey the same order (IC1), and the second is that every loyal lieutenant obeys the order of the commanding general if the commanding general is loyal (IC2). Only when both conditions are satisfied can the system reach a consensus. As shown in Fig. 1A, we define Alice as commanding general, Bob as lieutenant 1, and Charlie as lieutenant 2. The main process includes three steps.

Fig. 1. Implementation of three-party QBA.

Fig. 1.

(A) The Byzantine generals must coordinate together to launch an attack that can overcome enemy defenses. It can be turned into a “commanding general–lieutenants” model, where the commanding general is randomly selected from among all the Byzantine generals and the others become lieutenants to reach a consensus on the commanding general’s order. (B) Alice is loyal. The loyal lieutenant, Bob, can deduce the correct message m1 from Alice, which satisfies IC2. (C) Alice is disloyal. The loyal lieutenants, Bob and Charlie, can independently deduce the consistent output message Δ, which satisfies IC1.

1) Alice as the signer, Bob as the forwarder, and Charlie as the verifier, they perform OTUH-QDS (see the Supplementary Materials) on the message Alice wants to send. If the signing is successful, Bob and Charlie add this valid message m1 to their own lists LB and LC, respectively.

2) Alice as the signer, Charlie as the forwarder, and Bob as the verifier (Bob and Charlie exchange the role in QDS), they perform OTUH-QDS on Alice’s message again. If the signing is successful, Bob and Charlie add this valid message m2 to their own lists LB and LC, respectively.

3) Bob and Charlie will output mB(C) = majority(m1, m2) (see the Supplementary Materials) as their own final decisions.

To demonstrate OTUH-QDS and three-user QBA, we need to generate correlated keys between each user with the source-independent security, where entangled photon pairs are generated by an untrusted provider (69). We refrain from presumptions regarding the light source within the protocol, allowing the adversary to produce any state desired. However, it is essential to presume perfect Z and X bases measurements for all participants. As participants randomly select one basis for measurement, any flaws of light source inevitably result in heightened error rates, which are inherently detectable via error rate estimation. Consequently, the protocol is deemed source-independent (14, 70), thereby circumventing the vulnerabilities inherent in traditional prepare-and-measure protocols. The scheme of our experimental setup is shown in Fig. 2 and includes four parts: quantum server (A) and polarization analysis module (PAM) with a detector for each user (B to D). The server is composed of an AlGaAs BRW source to prepare bipartite polarization-entangled states and a wavelength allocation unit. Owing to the dispersion and nonlinear properties of the source, the temporal walk-off between orthogonally polarized photons is so small that no compensation is required to obtain the polarization-entangled state Ψ+=12HV+VH , positioning it as a promising candidate for the implementation of quantum networks. The generated photon pairs can be separated into different channels using standard telecom dense wavelength division multiplexing (DWDM) filters and shared between users receiving wavelength-correlated channels due to energy conservation during the SPDC process (27). Ultimately, we selected three pairs of channels ({CH19, CH20}, {CH18, CH21}, and {CH16, CH23}) to incorporate into our network architecture, with each user (that is Alice, Bob, and Charlie) receiving two channels.

Fig. 2. Experimental setup, which is mainly composed of four parts.

Fig. 2.

(A) Quantum server. A 780.9-nm continuous laser is coupled into fiber and split by a 1:99 BS, where 1% of the light is injected into the optical spectrum analyzer (OSA) to monitor the laser wavelength. The remaining light is polarized and coupled into the BRW source to directly generate broadband polarization-entangled photon pairs. The inset shows the scanning electron microscopy image of the fabricated BRW sample. The source is mounted on a copper plate whose temperature is stabilized by a temperature controller. After passing through the long-pass filters, three bipartite states are selected and distributed to form a three-user fully connected network. (B to D) Decoding module for three users, including PAM and one detector. (E) In the PAM, each user implements basis choice by nested unbalanced interferometers and transfers polarization to photon arrival time with a single detector. Abbreviations of components: LS, laser source; WDM, wavelength division multiplexer; PC, polarization controller; PD, power detector; LPF, long-pass filter; PBS, polarization BS; HWP, half-wave plate; QWP, quarter-wave plate; PMF, polarization-maintaining fiber; SMF, single-mode fiber; SPD, single-photon detector.

To intuitively illustrate the performance of the entangled source, we measured the interference curves as a function of the half-wave plate (HWP) angle in Z and X bases as shown in Fig. 3A. This measurement was conducted directly after demultiplexing but before multiplexing correlated channels to each user. The visibility of the fringe is defined as V = (CCmax − CCmin)/(CCmax + CCmin), where CCmax and CCmin are the maximum and minimum of the coincidence counts within a coincidence window of 300 ps. The fitting results show that all the raw visibilities are above 0.9, which is greater than the classical bound ( 2/2 ), required for the violation of the Clauser-Horne-Shimony-Holt form of the Bell’s inequality. The lower bound on entanglement fidelity can be calculated by the averaged visibilities in Z (HV) and X (AD) bases (71), where H represents the horizontal polarization and V the vertical, and D=12H+V and A=12HV . All the fidelities can exceed 0.945 over the range. The visibility drop for large detuning with degeneracy wavelength is because of the effect of the occurrence of birefringence in the modes. To further confirm the quality of entanglement, we then perform quantum state tomography of the polarization entanglement for the frequency-correlated pairs used in the network. The photons are projected into the bases H/V,D/A,andR/L, where R=12H+iV and L=12HiV . After coincidence measurements in nine different settings, the fidelity to the Bell state Ψ+=12HV+VH is estimated. Figure 3B displays the reconstructed density matrix of the states, showing good agreement between the maximally entangled and measured quantum states with fidelities of 98.87 ± 0.06%, 98.94 ± 0.05%, and 99.03 ± 0.04%, respectively. The maximum matrix elements of the imaginary part are smaller than 0.077. After verifying that the source can provide high-quality entanglement, we multiplexed and sent two channels to each of the three users.

Fig. 3. Characterization of the BRW source.

Fig. 3.

(A) Interference curves in Z and X bases for seven different channels. The points are experimental data, and the curves are fits. The reconstructed density matrix ρ of the polarization entanglement states used in the network are shown in (B). Column heights and colors represent the absolute values ∣ρ∣ and phases ∣ arg (ρ)∣, respectively. The uncertainties in the fidelities extracted from these density matrices are calculated using a Monte Carlo routine, assuming Poissonian errors.

To demonstrate that the bipartite states were created simultaneously in paired channels, we independently compensated all channels in two mutually unbiased bases from the source to the measurement module. Meanwhile, the multiplexing was implemented to direct two channels to each user. We connect Alice via a 3.022-km fiber spool and Bob and Charlie with 4.025- and 4.024-km spools, respectively. As shown in Fig. 2E, the PAM is composed of nested UPMIs (see the Supplementary Materials), in which we randomly chose the measurement basis by a 50:50 beam splitter (BS) and projected the photons to X (up) or Z (down) bases with different delays. Furthermore, entangled photon pairs were identified by their arrival time. We can consequently obtain the number of coincidence counts in 16 configurations in one data accumulation for each channel pair. Figure 4A shows the time-correlation histograms for the three links with a data accumulation time of 20 min. The simultaneous projection measurements on the Z and X bases are indicated by the marked 16 coincidence combinations between each pair. The four error terms ∣HH〉, ∣VV〉, ∣DA〉, and ∣AD〉 are almost submerged in accidental counts owing to the high degree of entanglement and manual optimization of the polarization. With the nonclassical correlation counts measured in HV and DA bases, we calculated the lower bound on the Bell-state fidelities as 91.92 ± 0.57% (Alice and Bob), 92.54 ± 0.46% (Alice and Charlie), and 91.17 ± 0.74% (Bob and Charlie). These results show that we have successfully shared entanglement in all channels.

Fig. 4. Experimental results.

Fig. 4.

(A) Temporal cross-correlation histograms among three two-user links with 20 min of real-time data. The lower coincidence counts in the X basis are mainly due to the additional coupling losses in the analysis module. (B). Long-term performance of the network. The average QBER = (QBERx + QBERz)/2 and sifted key rate in bits per minute (bpm) are measured for more than 68 hours.

Having established high-quality bipartite states, we proceed to perform the BBM92 protocol (69) to establish keys between each user in the network. Figure 4B displays the evolution of the averaged quantum bit error rate (QBER) and sifted key rates per minute in more than 68 hours of testing. Steep spikes in the QBER and key rates are mainly caused by room temperature variations, which result in disturbances to the fiber coupling efficiency. The QBERs in Z and X bases are 3.42 and 4.76% (Alice and Bob), 3.40 and 3.67% (Alice and Charlie), and 3.60 and 5.43% (Bob and Charlie), respectively (see the Supplementary Materials). The corresponding averaged sifted key rates are 459.54, 628.35, and 293.07 bits per minute. After key sifting, three users reconcile their keys and adopt low-density parity-check codes for error correction. The scheme was optimized for graphics processing unit (GPU) utilization and implemented on a workstation equipped with an Intel Xeon Gold 6226R central processing unit @2.9 GHz, NVIDIA GeForce RTX 3090 GPU, and 64-gigabyte RAM (random-access memory). By leveraging the high parallelism advantage of the GPU, the deployed reconciliation scheme achieved an average throughput exceeding 80 Mbps. The average correction efficiencies are 1.1648, 1.1627, and 1.1468, respectively (see the Supplementary Materials).

Last, let us show the practical implementation of our three-user QBA. The requirement of the theory is to construct multiparty correlation of these three players to generate correlated quantum keys for three-party QDS in steps 1 and 2 of QBA. As shown in Fig. 5A, the secret keys of Alice, Bob, and Charlie in the two steps are generated by our three-user source-independent quantum network and satisfy the relationship XA12=XB12XC12 and YA12=YB12YC12 . XA12 and YA12 are used for one-time pad to encrypt the hash function and digest by Alice. XB12 and YB12 are owned by Bob, and XC12 and YC12 are owned by Charlie. We consider the two situations in detail: (a) Alice is loyal, and (b) Alice is disloyal.

Fig. 5. The process of our QBA when Alice is loyal.

Fig. 5.

(A) Key generation. Through our source-independent entangled network, Alice shares four key strings XB1 , XB2 , YB1 , and YB2 with Bob and four key strings XC1 , XC2 , YC1 , and YC2 with Charlie, respectively. Alice obtains his key strings XA1 , XA2 , YA1 , and YA2 by XORing operation. (B) Schematic of step 1. Alice generates DigB through a generalized division hash function decided by an irreciduble polynomial and encrypt the digest and polynomial by XA1 and YA1 through one-time pad (OTP). Alice sends m1 as well as SigB and p1 to Bob. Bob then sends m1, SigB, p1, and his keys XB1 and YB1 to Charlie. Thereafter, Charlie sends his keys XC1 and YC1 to Bob. Bob and Charlie independently recover Alice’s keys to verify the signature. (C) Schematic of step 2. Similar to step 1, Alice performs OTUH-QDS to sign m1 by XA2 and YA2 to Charlie. (D) Detailed schematic of QBA when Alice is loyal. The hash function is h(M) = M(x)x64 mod pai(x) (64), where i ∈ {1,2} represents different steps, pai(x) is a randomly selected irreducible polynomial of order 64 in GF(256), and the coefficients of M(x) correspond to every char (ASCII) of the message to be signed. The digest is Dig = h(M), and the signature is SigBC=DigB(c)XA12 and p12=pa12YA12.

(a) The commanding general Alice is loyal. In step 1, as shown in Fig. 5B, Alice signs his order, m1, using his keys XA1 and YA1 , and then sends the message and signature SigB to Bob. Bob forwards them and his own secret keys XB1 and YB1 to Charlie. After Charlie receives them, Charlie sends his keys XC1 and YC1 to Bob. When and only when both Bob and Charlie verify the signature successfully, the signing is valid, and then Bob and Charlie add this valid message to their lists, LB and LC, respectively. In step 2, as shown in Fig. 5C, Charlie and Bob change their roles in QDS and follow the same process as step 1. Note that if malicious Charlie wishes that Bob would not distinguish the two messages, Charlie must forward the incorrect message m2 instead of m1 in step 2. However, because of the unforgeability of QDS, Charlie can only forge the message with a negligible probability εfor. In step 3, loyal Bob outputs his final decision, mB = majority(m1, m1) = m1, which is consistent with loyal Alice’s order and satisfies IC2.

Here, we describe the OTUH-QDS without perfect keys in step 1 in detail, which is also used in step 2. Specifically, we use generalized division hash functions to generate the signature, which involve an irreducible polynomial in a Galois field. The security parameter, i.e., the maximum probability that an attack is successfully performed in OTUH-QDS, is determined by the signature length that is usually chosen as the power of two for simplicity of encoding. The polynomial is of order n in GF(2l), and the signature length is nl. We choose l = 8 and n = 64 so that the length of the hash value, i.e., the signature length is 512 (64 × 8), and thus the probability of forgery in our experiment, is εfor = 2.93 × 10−16, which is negligible (see the Supplementary Materials).

Alice first generates a random irreducible polynomial in GF(256) of order 64 with pa1(x) = x64 + x63 + 0Ex62 + … + 2Bx + 01, where the coefficient, such as 0E and 2B, are elements in GF(256). The digest of m1, i.e., DigB, is generated by performing a generalized division hash function decided by pa1(x) on m1. Before being input to the hash function, the command m1 is encoded into a polynomial m1(x) by transforming every char into an element in GF(256) according to the American Standard Code for Information Interchange (ASCII) code and mapping every element into the coefficients of the polynomial in turn. The process of hashing is h(m1) = m1(x)x64 mod pa1(x). The output is also a polynomial and is then transformed into a string DigB consisting of 64 elements in GF(256). Meanwhile, pa1(x) is also transformed into a string pa1 consisting of 64 elements in GF(256). DigB and pa1 are encrypted by the imperfect quantum keys through one-time pad to generate SigB=DigBXA1 and p1=pa1YA1.

Alice sends the commanding general’s order m1 as well as SigB and p1 to Bob. Bob then sends m1, SigB, p1, and his keys XB1 and YB1 to Charlie. Thereafter, Charlie sends his keys XC1 and YC1 to Bob. After the process above, Bob and Charlie successfully share their keys. They can recover Alice’s keys XA1 and YA1 by exclusive ORing (XORing) XB1 and YB1 and XC1 and YC1 . Bob and Charlie independently check the signature. They will obtain the actual digest by performing the hash function derived by received p1 and recovered YA1 on the received m1 and obtain the expected digest through recovered XA1 and received SigB. If the actual digest is identical to the expected, the command is valid. The details can be found in Fig. 5D.

(b) Alice is disloyal. This situation is similar to situation (a) above. As shown in Fig. 6, the difference is that Alice signs different messages, m1 and m2, in steps 1 and 2, respectively, because he wants to confuse loyal Bob and Charlie to make them output different decisions. However, because of the natural nonrepudiation of OTUH-QDS, loyal Bob and Charlie can confirm that m1 and m2 are both signed by Alice, and Alice is disloyal. Thus, they will output the same decision from the same information lists, i.e., Δ = majority(m1, m2), where Δ is a predetermined value (see the Supplementary Materials). This satisfies IC1.

Fig. 6. Detailed schematic of QBA when Alice is loyal.

Fig. 6.

The process is similar to the situation when Alice is loyal, and the difference is that disloyal Alice signs two different messages to disturb the decisions of Bob and Charlie. Here, the time of attack and the plan in m1 (2:00 p.m. and plan A) and m2 (3:00 p.m. and plan B) are different.

DISCUSSION

We have demonstrated the three-party QBA with imperfect keys in a fully and simultaneously connected source-independent quantum network powered by a semiconductor chip. We accomplished this by directly producing high-quality broadband polarization-entangled states with exceptional brightness using an integrated AlGaAs BRW quantum source. We realize a three-user entanglement distribution network by multiplexing six correlated DWDM channels. To reduce the financial cost and increase the scalability of such a network, we use a time-multiplexed decoding module. This module integrates two nested UPMIs and an SPD at the expense of a slight increase in noise originating from accidentals. We implemented complete quantum communication with one detector per user in a fully connected quantum network. The combination of a cost-effective decoding module and BRW entangled source is an important step toward an affordable and practical large-scale quantum network. With the help of QKD links in our network, we generate correlated bit strings among three parties and implement OTUH-QDS with imperfect quantum keys. The signature rate can be the order of magnitude improvement owing to directly signing the hash value of long messages and the removal of cumbersome privacy amplification operations without compromising security (65).

Within the framework of OTUH-QDS, we experimentally beat the 1/3 fault tolerance bound of source-independent QBA, which is unable to be achieved with classical resources. That is because OTUH-QDS can provide decentralized multiparty correlation, where all three parties participate in QDS with equal status, to remove the independence of channels with information-theoretic security, while classical digital signature schemes require a trusted third-party for signing, which disobey the decentralization of the Byzantine agreement (see the Supplementary Materials). The above protocols can be used as primitives for practical multiparty quantum cryptography tasks without trusted nodes such as quantum blockchain and quantum consensus problems (60), paving the way for a more accessible quantum internet.

MATERIALS AND METHODS

BRW sample and experimental setup

Here, we consider the properties of biphotons generated from a 7.3-mm nonideal quarter-wavelength BRW in the process of degenerate type II SPDC, i.e., one transverse electric (TE)-polarized pump photon at frequency ωp is converted into a pair of cross-polarized signal and idler photons at frequency ωs and ωi, respectively, with the conservation of energy ωp = ωs + ωi. The structure with a high figure of merit total nonlinearity is designed (see the Supplementary Materials), which contains a core AlxcGa1 − xcAs layer with xc = 0.17 and a thickness of 230 nm, sandwiched between a six-period Bragg stack composed of alternative 127-nm high (Al0.28Ga0.72As) and 622-nm low (Al0.72Ga0.28As) index layers. The sample is grown along the [001] crystal axis and etched with a width of 4.8 µm and a depth of 4.15 µm. The waveguide achieves phase matching by using bounded total internal reflection (TIR) modes and quasi-bounded BRW modes. TIR modes are formed between high- and low-index claddings, while BRW modes are guided through transverse Bragg reflections at the interface between core and periodic claddings.

In the experiment, the BRW source is pumped by a fiber-coupled continuous wave laser centered at 780.9 nm. Lens-tapered fibers, which are used for coupling light into and out of the chip, are mounted on high-precision servo motors. We use a 980/1550 DWDM to separate the pump and parametric lights, where the residual pump laser is simultaneously detected by a photodetector and acts as a feedback signal. Thereafter, the hill-climbing algorithm is adopted for real-time optimization of the coupling. The photons are further filtered by a 1500-nm long-pass filter with a high extinction ratio, which can efficiently suppress the effects of broadband photoluminescence. The photon pairs are symmetrically distributed to the degenerated wavelength. We select three pairs of correlated channels by cascaded DWDM filters with 100-GHz spacing to form a fully connected three-user network. The decoding module held by each user consists of a PAM and an InGaAs avalanche detector, implementing a passive basis choice. In the PAM, the Z basis is realized by a UPMI, where the polarization can be distinguished by the relative arrival times of photons in detectors. The X basis works alike except for an HWP set to 22.5° before the UPMI, effectively rotating the polarization by 45°. The Z and X bases with different delays are combined by a coupler (see the Supplementary Materials), and the channel is distinguished by implementing wavelength-dependent time multiplexing. The single-photon detection events are recorded using a field programmable gate array (FPGA)-based time tag unit. Then, the information on photons’ polarization and wavelength can be transferred into their arrival time, and each user will obtain eight peaks in their temporal histogram. We used three free-running SPDs, operated at a detection efficiency of 25% and a dark count rate of 1.7 kHz with a dead time of 10 µs.

Scalability

One major goal of quantum communication is to establish a network that allows for widespread connectivity, similar to the classical internet but with unconditional security based on the laws of quantum mechanics. In terms of a fully connected network, the capacity is directly proportional to the available bandwidth resource (27). Therefore, a broader polarization-entangled photon source designed with low group birefringence (72), closer-spaced WDM (30), or a combination of WDM and passive beam splitters (28) can extend the network to a larger scale. Intriguingly, multiplexing quantum sources in different spatial modes is also a promising solution to scalability, allowing high efficiency while preserving high fidelity (73). Integrated quantum sources provide an ideal platform for implementing this scheme, which can offer stable and alignment-free operations with mature packaging technique. In the experiment, arrays of BRW samples with similar performance can be fabricated in a photonic foundry (74). By pumping the BRWs simultaneously, we can create k subnets between n users, where each BRW forms a fully connected nk-user subnet using nknk1 wavelength channels. Each subnet can be optimized independently by adjusting the pump power to its optimal level and treated as a single user in a k-user network. To construct the connections between subnets, additional k(k − 1) wavelength channels are required and randomly distributed to all nk users in a subnet by passive BS. Thereby, the n-user network requires a total of nknk1+kk1 wavelength channels. After some trivial calculation, the optimal value of k is simply equal to n . The result is valid only when n, k, and n are all integers. Furthermore, unlike the scenario of using a single source, the source multiplexing can compensate for the beam splitting–induced losses. The unique advantage of integrating the laser directly within the AlGaAs platform can promote the network architecture in a more efficient and scalable manner (67). After properly designing the propagation delays for photon pairs from different BRWs, the interconnection between any users in a large network can be realized without the need for a trusted node. The net effect of source multiplexing is akin to optionally constructing a two-layer fully connected network and independently controlling each subnet. One drawback of such a quantum network is the increased contribution from accidental counts resulting from the multiplexing of channels onto a single detector. It can be mitigated by shorting the coincidence window or demultiplexing the signal to multiple detectors. A pulsed pump scheme would further reduce the impact of accidental coincidence by specifying the arrival time of each channel at the detector (27).

The scalable source-independent fully connected network architecture is naturally suitable for the decentralized multiparty QBA scenarios. The multiparty QBA protocol can be implemented by treating three-party QDS as a basic unit and introducing a recursive structure to distribute and gather information layer by layer (66). The lieutenants will output the final decision according to the information they gather in different layers. Because the basic unit of a QBA system with more than three players is three-party QDS, the full-connected network architecture can generate multiparty correlation of every three players and thus correlated quantum keys for three-party QDS. In addition, for an N-party system, the communication complexity, defined as the times of performing QDS, of our QBA is C=m=0f1AN12+m , where Aab=a!ab! is b permutations of a, f is the number of dishonest players, and N is the number of all players (N ≥ 2f + 1). It is evident that, as the number of players grows, the communication complexity exponentially increases. This limitation is attributed to the blockchain trilemma, which demonstrates that a decentralized system cannot achieve a harmonious balance among its essential elements: decentralization, security (fault tolerance), and scalability (75). It is an open challenge to explore if quantum resources can break the blockchain trilemma or facilitate the relaxation of decentralization and security for designing a QBA with polynomial communication complexity.

Acknowledgments

We thank X. Gu for helpful discussions.

Funding: This work was supported by the National Natural Science Foundation of China [12274233 (L.-L.L.) and 12274223 (H.-L.Y.)], the Program of Song Shan Laboratory (included in the management of the Major Science and Technology Program of Henan Province) [221100210800-02 (H.-L.Y.)], the Innovation Program for Quantum Science and Technology [2021ZD0300700 (L.-L.L.)], and the Postgraduate Research & Practice Innovation Program of Jiangsu Province [SJCX23_0569 (C.Q.)].

Author contributions: Conceptualization: L.-L.L., H.-L.Y., B.N., and D.J. Investigation: X.J., C.Q., C.-X.W., B.-H.L., Z.C., C.-Q.W., J.T., and X.-W.G. Visualization: X.J., C.Q., C.-X.W., and B.-H.L. Data curation: X.J., C.Q., Z.C., and J.T. Formal analysis: X.J., C.-X.W., and B.-H.L. Supervision: L.-L.L., H.-L.Y., B.N., and D.J. Project administration: L.-L.L., H.-L.Y., B.N., D.J., Y.-C.K., and T.-S.C. Writing—original draft: X.J., L.-L.L., H.-L.Y., D.J., C.-X.W., and B.-H.L. Writing—review and editing: All authors. Funding acquisition: L.-L.L., H.-L.Y., and C.Q.

Competing interests: The authors declare that they have no competing interests.

Data and materials availability: All data needed to evaluate the conclusions in the paper are present in the paper and/or the Supplementary Materials.

Supplementary Materials

This PDF file includes:

Sections S1 to S4

Figs. S1 to S11

Tables S1 to S3

References

sciadv.adp2877_sm.pdf (16.7MB, pdf)

REFERENCES AND NOTES

  • 1.C. H. Bennett, G. Brassard, Quantum cryptography: Public key distribution and coin tossing, in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing (Institute of Electrical and Electronics Engineers, 1984), pp. 175–179. [Google Scholar]
  • 2.Ekert A. K., Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991). [DOI] [PubMed] [Google Scholar]
  • 3.Lo H.-K., Chau H. F., Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999). [DOI] [PubMed] [Google Scholar]
  • 4.Gisin N., Ribordy G., Tittel W., Zbinden H., Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002). [Google Scholar]
  • 5.Scarani V., Bechmann-Pasquinucci H., Cerf N. J., Dušek M., Lütkenhaus N., Peev M., The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009). [Google Scholar]
  • 6.Xu F., Ma X., Zhang Q., Lo H.-K., Pan J.-W., Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020). [Google Scholar]
  • 7.Bouwmeester D., Pan J.-W., Mattle K., Eibl M., Weinfurter H., Zeilinger A., Experimental quantum teleportation. Nature 390, 575–579 (1997). [Google Scholar]
  • 8.Deng F.-G., Long G.-L., Liu X.-S., Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003). [Google Scholar]
  • 9.Sheng Y.-B., Zhou L., Long G.-L., One-step quantum secure direct communication. Sci. Bull. 67, 367–374 (2022). [DOI] [PubMed] [Google Scholar]
  • 10.Zhou L., Sheng Y.-B., One-step device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron. 65, 250311 (2022). [Google Scholar]
  • 11.Wang S., Yin Z.-Q., He D.-Y., Chen W., Wang R.-Q., Ye P., Zhou Y., Fan-Yuan G.-J., Wang F.-X., Chen W., Zhu Y.-G., Morozov P. V., Divochiy A., Zhou Z.-W., Guo G.-C., Han Z.-F., Twin-field quantum key distribution over 830-km fibre. Nat. Photonics 16, 154–161 (2022). [Google Scholar]
  • 12.Liu Y., Zhang W.-J., Jiang C., Chen J.-P., Zhang C., Pan W.-X., Ma D., Dong H., Xiong J.-M., Zhang C.-J., Li H., Wang R.-C., Wu J., Chen T.-Y., You L.-X., Wang X.-B., Zhang Q., Pan J.-W., Experimental twin-field quantum key distribution over 1000 km fiber distance. Phys. Rev. Lett. 130, 210801 (2023). [DOI] [PubMed] [Google Scholar]
  • 13.Liao S.-K., Cai W.-Q., Handsteiner J., Liu B., Yin J., Zhang L., Rauch D., Fink M., Ren J.-G., Liu W.-Y., Li Y., Shen Q., Cao Y., Li F.-Z., Wang J.-F., Huang Y.-M., Deng L., Xi T., Ma L., Hu T., Li L., Liu N.-L., Koidl F., Wang P.-Y., Chen Y.-A., Wang X.-B., Steindorfer M., Kirchner G., Lu C.-Y., Shu R., Ursin R., Scheidl T., Peng C.-Z., Wang J.-Y., Zeilinger A., Pan J.-W., Satellite-relayed intercontinental quantum network. Phys. Rev. Lett. 120, 030501 (2018). [DOI] [PubMed] [Google Scholar]
  • 14.Yin J., Li Y.-H., Liao S.-K., Yang M., Cao Y., Zhang L., Ren J.-G., Cai W.-Q., Liu W.-Y., Li S.-L., Shu R., Huang Y.-M., Deng L., Li L., Zhang Q., Liu N.-L., Chen Y.-A., Lu C.-Y., Wang X.-B., Xu F.-H., Wang J.-Y., Peng C.-Z., Ekert A. K., Pan J.-W., Entanglement-based secure quantum cryptography over 1,120 kilometres. Nature 582, 501–505 (2020). [DOI] [PubMed] [Google Scholar]
  • 15.Chen Y.-A., Zhang Q., Chen T.-Y., Cai W.-Q., Liao S.-K., Zhang J., Chen K., Yin J., Ren J.-G., Chen Z., Han S.-L., Yu Q.-Y., Liang K., Zhou F., Yuan X., Zhao M.-S., Wang T.-Y., Jiang X., Zhang L., Liu W.-Y., Li Y., Shen Q., Cao Y., Lu C.-Y., Shu R., Wang J.-Y., Li L., Liu N.-L., Xu F.-H., Wang X.-B., Peng C.-Z., Pan J.-W., An integrated space-to-ground quantum communication network over 4,600 kilometres. Nature 589, 214–219 (2021). [DOI] [PubMed] [Google Scholar]
  • 16.Long G.-L., Pan D., Sheng Y.-B., Xue Q.-K., Lu J.-H., Hanzo L., An evolutionary pathway for the quantum internet relying on secure classical repeaters. IEEE Netw. 36, 82–88 (2022). [Google Scholar]
  • 17.Pan D., Long G.-L., Yin L.-G., Sheng Y.-B., Ruan D., Ng S. X., Lu J.-H., Hanzo L., The evolution of quantum secure direct communication: On the road to the qinternet. IEEE Commun. Surv. Tutor. (Early Access) (2024). [Google Scholar]
  • 18.Peev M., Pacher C., Alléaume R., Barreiro C., Bouda J., Boxleitner W., Debuisschert T., Diamanti E., Dianati M., Dynes J. F., Fasel S., Fossier S., Fürst M., Gautier J.-D., Gay O., Gisin N., Grangier P., Happe A., Hasani Y., Hentschel M., Hübel H., Humer G., Länger T., Legré M., Lieger R., Lodewyck J., Lorünser T., Lütkenhaus N., Marhold A., Matyus T., Maurhart O., Monat L., Nauerth S., Page J.-B., Poppe A., Querasser E., Ribordy G., Robyr S., Salvail L., Sharpe A. W., Shields A. J., Stucki D., Suda M., Tamas C., Themel T., Thew R. T., Thoma Y., Treiber A., Trinkler P., Tualle-Brouri R., Vannel F., Walenta N., Weier H., Weinfurter H., Wimberger I., Yuan Z. L., Zbinden H., Zeilinger A., The SECOQC quantum key distribution network in Vienna. New J. Phys. 11, 075001 (2009). [Google Scholar]
  • 19.Stucki D., Legré M., Buntschu F., Clausen B., Felber N., Gisin N., Henzen L., Junod P., Litzistorf G., Monbaron P., Monat L., Page J.-B., Perroud D., Ribordy G., Rochas A., Robyr S., Tavares J., Thew R., Trinkler P., Ventura S., Voirol R., Walenta N., Zbinden H., Long-term performance of the SwissQuantum quantum key distribution network in a field environment. New J. Phys. 13, 123001 (2011). [Google Scholar]
  • 20.Wang S., Chen W., Yin Z.-Q., Li H.-W., He D.-Y., Li Y.-H., Zhou Z.-W., Song X.-T., Li F.-Y., Wang D., Chen H., Han Y.-G., Huang J.-Z., Guo J.-Q., Hao P.-L., Li M., Zhang C.-M., Liu D., Liang W.-Y., Miao C.-H., Wu P., Guo G. C., Han Z.-F., Field and long-term demonstration of a wide area quantum key distribution network. Opt. Express 22, 21739–21756 (2014). [DOI] [PubMed] [Google Scholar]
  • 21.Tang Y.-L., Yin H.-L., Zhao Q., Liu H., Sun X.-X., Huang M.-Q., Zhang W.-J., Chen S.-J., Zhang L., You L.-X., Wang Z., Liu Y., Lu C.-Y., Jiang X., Ma X.-F., Zhang Q., Chen T.-Y., Pan J.-W., Measurement-device-independent quantum key distribution over untrustful metropolitan network. Phys. Rev. X 6, 011024 (2016). [Google Scholar]
  • 22.Fröhlich B., Dynes J. F., Lucamarini M., Sharpe A. W., Yuan Z.-L., Shields A. J., A quantum access network. Nature 501, 69–72 (2013). [DOI] [PubMed] [Google Scholar]
  • 23.Lim H. C., Yoshizawa A., Tsuchida H., Kikuchi K., Broadband source of telecom-band polarization-entangled photon-pairs for wavelength-multiplexed entanglement distribution. Opt. Express 16, 16052–16057 (2008). [DOI] [PubMed] [Google Scholar]
  • 24.Aktas D., Fedrici B., Kaiser F., Lunghi T., Labonté L., Tanzilli S., Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptography. Laser Photonics Rev. 10, 451–457 (2016). [Google Scholar]
  • 25.Briegel H. J., Dür W., Cirac J. I., Zoller P., Quantum repeaters: The role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932–5935 (1998). [Google Scholar]
  • 26.Duan L.-M., Lukin M. D., Cirac I., Zoller P., Long-distance quantum communication with atomic ensembles and linear optics. Nature 414, 413–418 (2001). [DOI] [PubMed] [Google Scholar]
  • 27.Wengerowsky S., Joshi S. K., Steinlechner F., Hübel H., Ursin R., An entanglement-based wavelength-multiplexed quantum communication network. Nature 564, 225–228 (2018). [DOI] [PubMed] [Google Scholar]
  • 28.Joshi S. K., Aktas D., Wengerowsky S., Lončarić M., Neumann S. P., Liu B., Scheidl T., Lorenzo G. C., Samec Ž., Kling L., Qiu A., Razavi M., Stipčević M., Rarity J. G., Ursin R., A trusted node-free eight-user metropolitan quantum communication network. Sci. Adv. 6, eaba0959 (2020). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 29.Liu X., Yao X., Xue R., Wang H.-Q., Li H., Wang Z., You L.-X., Feng X., Liu F., Cui K.-Y., Huang Y.-D., Zhang W., An entanglement-based quantum network based on symmetric dispersive optics quantum key distribution. APL Photonics 5, 076104 (2020). [Google Scholar]
  • 30.Alshowkan M., Williams B. P., Evans P. G., Rao N. S. V., Simmerman E. M., Lu H.-H., Lingaraju N. B., Weiner A. M., Marvinney C. E., Pai Y.-Y., Lawrie B. J., Peters N. A., Lukens J. M., Reconfigurable quantum local area network over deployed fiber. PRX Quantum 2, 040304 (2021). [Google Scholar]
  • 31.Wen W.-J., Chen Z.-Y., Lu L.-L., Yan W.-H., Xue W.-Y., Zhang P.-Y., Lu Y.-Q., Zhu S.-N., Ma X.-S., Realizing an entanglement-based multiuser quantum network with integrated photonics. Phys. Rev. Appl. 18, 024059 (2022). [Google Scholar]
  • 32.Appas F., Baboux F., Amanti M. I., Lemaître A., Boitier F., Diamanti E., Ducci S., Flexible entanglement-distribution network with an algaas chip for secure communications. NPJ Quantum Inf. 7, 118 (2021). [Google Scholar]
  • 33.Zheng Y., Zhai C.-H., Liu D.-J., Mao J., Chen X.-J., Dai T.-X., Huang J.-S., Bao J.-M., Fu Z.-R., Tong Y.-Y., Zhou X.-T., Yang Y., Tang B., Li Z.-H., Li Y., Gong Q.-H., Tsang H. K., Dai D.-X., Wang J.-W., Multichip multidimensional quantum networks with entanglement retrievability. Science 381, 221–226 (2023). [DOI] [PubMed] [Google Scholar]
  • 34.Jing X., Qian C., Zheng X.-D., Nian H., Wang C.-Q., Tang J., Gu X.-W., Kong Y.-C., Chen T.-S., Liu Y.-C., Sheng C., Jiang D., Niu B., Lu L.-L., Coexistence of multiuser entanglement distribution and classical light in optical fiber network with a semiconductor chip. Chip 3, 100083 (2024). [Google Scholar]
  • 35.Collins R. J., Donaldson R. J., Dunjko V., Wallden P., Clarke P. J., Andersson E., Jeffers J., Buller G. S., Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113, 040502 (2014). [DOI] [PubMed] [Google Scholar]
  • 36.Roberts G. L., Lucamarini M., Yuan Z. L., Dynes J. F., Comandar L. C., Sharpe A. W., Shields A. J., Curty M., Puthoor I. V., Andersson E., Experimental measurement-device-independent quantum digital signatures. Nat. Commun. 8, 1098 (2017). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 37.Pelet Y., Puthoor I. V., Venkatachalam N., Wengerowsky S., Lončarić M., Neumann S. P., Liu B., Samec Ž., Stipčević M., Ursin R., Andersson E., Rarity J. G., Aktas D., Joshi S. K., Unconditionally secure digital signatures implemented in an eight-user quantum network. New J. Phys. 24, 093038 (2022). [Google Scholar]
  • 38.Qin J.-Q., Jiang C., Yu Y.-L., Wang X.-B., Quantum digital signatures with random pairing. Phys. Rev. Appl. 17, 044047 (2022). [Google Scholar]
  • 39.Yin H.-L., Fu Y., Li C.-L., Weng C.-K., Li B.-H., Gu J., Lu Y.-S., Huang S., Chen Z.-B., Experimental quantum secure network with digital signatures and encryption. Natl. Sci. Rev. 10, nwac228 (2023). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 40.Cao X.-Y., Li B.-H., Wang Y., Fu Y., Yin H.-L., Chen Z.-B., Experimental quantum e-commerce. Sci. Adv. 10, eadk3258 (2024). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 41.Hillery M., Bužek V., Berthiaume A., Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999). [Google Scholar]
  • 42.Chen Y.-A., Zhang A.-N., Zhao Z., Zhou X.-Q., Lu C.-Y., Peng C.-Z., Yang T., Pan J.-W., Experimental quantum secret sharing and third-man quantum cryptography. Phys. Rev. Lett. 95, 200502 (2005). [DOI] [PubMed] [Google Scholar]
  • 43.Williams B. P., Lukens J. M., Peters N. A., Qi B., Grice W. P., Quantum secret sharing with polarization-entangled photon pairs. Phys. Rev. A 99, 062311 (2019). [Google Scholar]
  • 44.Hahn F., de Jong J., Pappa A., Anonymous quantum conference key agreement. PRX Quantum 1, 020325 (2020). [Google Scholar]
  • 45.Huang Z.-X., Joshi S. K., Aktas D., Lupo C., Quintavalle A. O., Venkatachalam N., Wengerowsky S., Lončarić M., Neumann S. P., Liu B., Samec Ž., Kling L., Stipčević M., Ursin R., Rarity J. G., Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network. NPJ Quantum Inf. 8, 25 (2022). [Google Scholar]
  • 46.Fitzi M., Gisin N., Maurer U., Quantum solution to the Byzantine agreement problem. Phys. Rev. Lett. 87, 217901 (2001). [DOI] [PubMed] [Google Scholar]
  • 47.Iblisdir S., Gisin N., Byzantine agreement with two quantum-key-distribution setups. Phys. Rev. A 70, 034306 (2004). [Google Scholar]
  • 48.Neigovzen R., Rodó C., Adesso G., Sanpera A., Multipartite continuous-variable solution for the Byzantine agreement problem. Phys. Rev. A 77, 062307 (2008). [Google Scholar]
  • 49.Gaertner S., Bourennane M., Kurtsiefer C., Cabello A., Weinfurter H., Experimental demonstration of a quantum protocol for Byzantine agreement and liar detection. Phys. Rev. Lett. 100, 070504 (2008). [DOI] [PubMed] [Google Scholar]
  • 50.Rahaman R., Wieśniak M., Żukowski M., Quantum Byzantine agreement via Hardy correlations and entanglement swapping. Phys. Rev. A 92, 042302 (2015). [Google Scholar]
  • 51.Smania M., Elhassan A. M., Tavakoli A., Bourennane M., Experimental quantum multiparty communication protocols. NPJ Quantum Inf. 2, 16010 (2016). [Google Scholar]
  • 52.Taherkhani M. A., Navi K., Meter R. V., Resource-aware system architecture model for implementation of quantum aided Byzantine agreement on quantum repeater networks. Quantum Sci. Technol. 3, 014011 (2017). [Google Scholar]
  • 53.Sun X., Kulicki P., Sopek M., Multi-party quantum Byzantine agreement without entanglement. Entropy 22, 1152 (2020). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 54.M. Ben-Or, A. Hassidim, Fast quantum Byzantine agreement, in Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing (Association for Computing Machinery, 2005), pp. 481–485. [Google Scholar]
  • 55.Extance A., The future of cryptocurrencies: Bitcoin and beyond. Nature 526, 21–23 (2015). [DOI] [PubMed] [Google Scholar]
  • 56.Rivest R. L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978). [Google Scholar]
  • 57.M. Castro, B. Liskov, Practical Byzantine fault tolerance, in Proceedings of the Third Symposium on Operating Systems Design and Implementation (USENIX Association, 1999), pp. 173–186. [Google Scholar]
  • 58.A. Miller, Y. Xia, K. Croman, E. Shi, D. Song, The honey badger of BFT protocols, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Association for Computing Machinery, 2016), pp. 31–42. [Google Scholar]
  • 59.P. W. Shor, Algorithms for quantum computation: Discrete logarithms and factoring, in Proceedings 35th Annual Symposium on Foundations of Computer Science (IEEE, 1994), pp. 124–134. [Google Scholar]
  • 60.Fedorov A. K., Kiktenko E. O., Lvovsky A. I., Quantum computers put blockchain security at risk. Nature 563, 465–467 (2018). [DOI] [PubMed] [Google Scholar]
  • 61.Pease M., Shostak R., Lamport L., Reaching agreement in the presence of faults. J. ACM 27, 228–234 (1980). [Google Scholar]
  • 62.Dolev D., Halpern J. Y., Strong H. R., On the possibility and impossibility of achieving clock synchronization. J. Comput. Syst. Sci. 32, 230–250 (1986). [Google Scholar]
  • 63.Kiktenko E. O., Pozhar N. O., Anufriev M. N., Trushechkin A. S., Yunusov R. R., Kurochkin Y. V., Lvovsky A. I., Fedorov A. K., Quantum-secured blockchain. Quantum Sci. Technol. 3, 035004 (2018). [Google Scholar]
  • 64.D. Gottesman, I. Chuang, Quantum digital signatures. 10.48550/arXiv.quant-ph/0105032 (2001). [DOI]
  • 65.Li B.-H., Xie Y.-M., Cao X.-Y., Li C.-L., Fu Y., Yin H.-L., Chen Z.-B., One-time universal hashing quantum digital signatures without perfect keys. Phys. Rev. Appl. 20, 044011 (2023). [Google Scholar]
  • 66.Weng C.-X., Gao R.-Q., Bao Y., Li B.-H., Liu W.-B., Xie Y.-M., Lu Y.-S., Yin H.-L., Chen Z.-B., Beating the fault-tolerance bound and security loopholes for Byzantine agreement with a quantum solution. Research 6, 0272 (2023). [Google Scholar]
  • 67.Boitier F., Orieux A., Autebert C., Lemaître A., Galopin E., Manquest C., Sirtori C., Favero I., Leo G., Ducci S., Electrically injected photon-pair source at room temperature. Phys. Rev. Lett. 112, 183901 (2014). [DOI] [PubMed] [Google Scholar]
  • 68.Lamport L., Shostak R., Pease M., The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 382–401 (1982). [Google Scholar]
  • 69.Bennett C. H., Brassard G., Mermin N. D., Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68, 557–559 (1992). [DOI] [PubMed] [Google Scholar]
  • 70.Koashi M., Preskill J., Secure quantum key distribution with an uncharacterized source. Phys. Rev. Lett. 90, 057902 (2003). [DOI] [PubMed] [Google Scholar]
  • 71.Chang X.-Y., Deng D.-L., Yuan X.-X., Hou P.-Y., Huang Y.-Y., Duan L.-M., Experimental realization of an entanglement access network and secure multi-party computation. Sci. Rep. 6, 29453 (2016). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 72.Chen H., Laiho K., Pressl B., Schlager A., Suchomel H., Kamp M., Höfling S., Schneider C., Weihs G., Optimizing the spectro-temporal properties of photon pairs from Bragg-reflection waveguides. J. Opt. 21, 054001 (2019). [Google Scholar]
  • 73.Meyer-Scott E., Silberhorn C., Migdall A. L., Single-photon sources: Approaching the ideal through multiplexing. Rev. Sci. Instrum. 91, 041101 (2020). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 74.A. Raymond, A. Zecchetto, J. Palomo, M. Morassi, A. Lemaître, F. Raineri, M. I. Amanti, S. Ducci, F. Baboux, Reconfigurable generation of spatial entanglement in nonlinear waveguide arrays. 10.48550/arXiv.2405.08176 [quant-ph] (2024). [DOI] [PubMed]
  • 75.Zhou Q.-H., Huang H.-W., Zheng Z.-B., Bian J., Solutions to scalability of blockchain: A survey. IEEE Access 8, 16440–16455 (2020). [Google Scholar]
  • 76.Yang Q.-K., Passow T., Non-ideal quarter-wavelength Bragg-reflection waveguides for nonlinear interaction: Eigen equation and tolerance. Opt. Lett. 45, 4742–4745 (2020). [DOI] [PubMed] [Google Scholar]
  • 77.Pressl B., Laiho K., Chen H., Günthner T., Schlager A., Auchter S., Suchomel H., Kamp M., Höfling S., Schneider C., Weihs G., Semi-automatic engineering and tailoring of high-efficiency Bragg-reflection waveguide samples for quantum photonic applications. Quantum Sci. Technol. 3, 024002 (2018). [Google Scholar]
  • 78.Vurgaftman I., Meyer J. R., Ram-Mohan L. R., Band parameters for III-V compound semiconductors and their alloys. J. Appl. Phys. 89, 5815–5875 (2001). [Google Scholar]
  • 79.Auchter S., Schlager A., Thiel H., Laiho K., Pressl B., Suchomel H., Kamp M., Höfling S., Schneider C., Weihs G., Understanding photoluminescence in semiconductor Bragg-reflection waveguides. J. Opt. 23, 035801 (2021). [Google Scholar]
  • 80.Ohashi M., Kondo T., Ito R., Fukatsu S., Shiraki Y., Kumata K., Kano S. S., Determination of quadratic nonlinear optical coefficient of AlxGa1−xAs system by the method of reflected second harmonics. J. Appl. Phys. 74, 596–601 (1993). [Google Scholar]
  • 81.Schlager A., Götsch M., Chapman R. J., Frick S., Thiel H., Suchomel H., Kamp M., Höfling S., Schneider C., Weihs G., Difference-frequency generation in an algaas Bragg-reflection waveguide using an on-chip electrically-pumped quantum dot laser. J. Opt. 23, 085802 (2021). [Google Scholar]
  • 82.Bijlani B. J., Helmy A. S., Design methodology for efficient frequency conversion in Bragg reflection lasers. J. Opt. Soc. Am. B 29, 2484–2492 (2012). [Google Scholar]
  • 83.Abolghasem P., Han J.-B., Kang D.-P., Bijlani B. J., Helmy A. S., Monolithic photonics using second-order optical nonlinearities in multilayer-core Bragg reflection waveguides. IEEE J. Sel. Top. Quantum Electron. 18, 812–825 (2012). [Google Scholar]
  • 84.Vallés A., Hendrych M., Svozilík J., Machulka R., Abolghasem P., Kang D.-P., Bijlani B. J., Helmy A. S., Torres J. P., Generation of polarization-entangled photon pairs in a Bragg reflection waveguide. Opt. Express 21, 10841–10849 (2013). [DOI] [PubMed] [Google Scholar]
  • 85.Abolghasem P., Han J.-B., Bijlani B. J., Helmy A. S., Type-0 second order nonlinear interaction in monolithic waveguides of isotropic semiconductors. Opt. Express 18, 12681–12689 (2010). [DOI] [PubMed] [Google Scholar]
  • 86.Baboux F., Moody G., Ducci S., Nonlinear integrated quantum photonics with algaas. Optica 10, 917–931 (2023). [Google Scholar]
  • 87.Appas F., Meskine O., Lemaître A., Morassi M., Baboux F., Amanti M. I., Ducci S., Nonlinear quantum photonics with AlGaAs Bragg-reflection waveguides. J. Lightwave Technol. 40, 7658–7667 (2022). [Google Scholar]
  • 88.Matsuda N., Jeannic H. L., Fukuda H., Tsuchizawa T., Munro W. J., Shimizu K., Yamada K., Tokura Y., Takesue H., A monolithically integrated polarization entangled photon pair source on a silicon chip. Sci. Rep. 2, 817 (2012). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 89.Chen C.-J., Zhu E. Y., Riazi A., Gladyshev A. V., Corbari C., Ibsen M., Kazansky P. G., Qian L., Compensation-free broadband entangled photon pair sources. Opt. Express 25, 22667–22678 (2017). [DOI] [PubMed] [Google Scholar]
  • 90.Sun C.-W., Wu S.-H., Duan J.-C., Zhou J.-W., Xia J.-L., Xu P., Xie Z.-D., Gong Y.-X., Zhu S.-N., Compact polarization-entangled photon-pair source based on a dual-periodically-poled Ti:LiNbO3 waveguide. Opt. Lett. 44, 5598–5601 (2019). [DOI] [PubMed] [Google Scholar]
  • 91.Wei K.-J., Hu X., Du Y.-Q., Hua X., Zhao Z.-G., Chen Y., Huang C.-F., Xiao X., Resource-efficient quantum key distribution with integrated silicon photonics. Photon. Res. 11, 1364–1372 (2023). [Google Scholar]
  • 92.Kaltwasser J., Seip J., Fitzke E., Tippmann M., Walther T., Reducing the number of single-photon detectors in quantum-key-distribution networks by time multiplexing. Phys. Rev. A 109, 012618 (2024). [Google Scholar]
  • 93.Yin H.-L., Zhou M.-G., Gu J., Xie Y.-M., Lu Y.-S., Chen Z.-B., Tight security bounds for decoy-state quantum key distribution. Sci. Rep. 10, 14312 (2020). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 94.Fischer M. J., Lynch N. A., Merritt M., Easy impossibility proofs for distributed consensus problems. Distrib. Comput. 1, 26–39 (1985). [Google Scholar]
  • 95.M. Fitzi, D. Gottesman, M. Hirt, T. Holenstein, A. Smith, Detectable Byzantine agreement secure against faulty majorities, in Proceedings of the Twenty-First Annual Symposium on Principles of Distributed Computing (Association for Computing Machinery, 2002), pp. 118–126. [Google Scholar]
  • 96.Wallden P., Dunjko V., Kent A., Andersson E., Quantum digital signatures with quantum-key-distribution components. Phys. Rev. A 91, 042304 (2015). [Google Scholar]
  • 97.R. Amiri, A. Abidin, P. Wallden, E. Andersson, Efficient unconditionally secure signatures using universal hashing, in International Conference on Applied Cryptography and Network Security (Springer, 2018), pp. 143–162. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

Sections S1 to S4

Figs. S1 to S11

Tables S1 to S3

References

sciadv.adp2877_sm.pdf (16.7MB, pdf)

Articles from Science Advances are provided here courtesy of American Association for the Advancement of Science

RESOURCES