Quantum encryption could work across city-sized distances

Publicly released:
International
PHOTO: Compare Fibre on Unsplash
PHOTO: Compare Fibre on Unsplash

It may be possible to use a quantum mechanics-based secure communication method over distances up to 100 km, according to an international study. The method involves sending photons (light particles) through fibre optic cables between two quantum entangled atoms, to create a secure ‘quantum key’. Using advanced techniques in a lab, the researchers showed that this could be done over much longer distances than previously achieved. These results indicate that ultra-secure quantum encryption could eventually be used at the scales of cities, the researchers said.

News release

From: AAAS

Major step toward a quantum-secure internet demonstrated over city-scale distance

Marking a significant step toward a quantum-secure internet, researchers have demonstrated device-independent quantum key distribution over optical fibers spanning 100 kilometers (km). The findings show that cryptographic security can be guaranteed with this method, at the metropolitan scale – which represents a much greater distance than previous efforts – and help to close the gap between proof-of-principle quantum network experiments and real-world applications. Quantum key distribution (QKD) is a leading application of quantum technologies, enabling ultra-secure digital communications. Early forms of QKD derive security using trusted devices yet suffer from technical limitations and vulnerabilities. A more advanced approach – device-independent QKD (DI-QKD) – derives its security directly from fundamental quantum phenomena, specifically the violation of Bell inequalities, without requiring trust in quantum devices’ internal workings. However, DI-QKA is extremely demanding and requires the creation of high-quality entanglement and efficient detection over long distances. To date, DI-QKD has only been demonstrated over short distances and in laboratory-based proof-of-principle experiments. Here, Bo-Wei Lu and colleagues report the realization of DI-QKD between two entangled atoms linked by 100-kilometer (km) optical fibers. By combining advanced techniques such as single-photon interference, quantum frequency conversion to low-loss telecom wavelengths, and noise-suppressed photon emission, Lu et al. successfully distributed high-fidelity entanglement over long distances, achieving provably secure quantum key generation over 11 km with finite data, and showed that positive key rates are possible even at 100 km. According to the authors, the achievement extends DI-QKD distances by more than two orders of magnitude compared to previous demonstrations.

Expert Reaction

These comments have been collated by the Science Media Centre to provide a variety of expert perspectives on this issue. Feel free to use these quotes in your stories. Views expressed are the personal opinions of the experts named. They do not represent the views of the SMC or any other organisation unless specifically stated.

Associate Professor Jevon Longdell, Science Lead Quantum Technologies Aotearoa

“Achieving device independent quantum key distribution over such a long distance is an important step forward towards quantum networks. QKD has been achieved over such distances before but this work demonstrates the gold standard device independent version which is guaranteed secure even if your measuring apparatus
isn’t trustworthy.

"At the heart of this achievement is a quantum memory for light using trapped neutral atoms. In New Zealand, among other quantum technologies, solid state versions of
these memories are being  developed based on rare earths.

"This work is taking place in the context of ever improving quantum computers, computers that could eventually break many of the cryptographic codes currently in
use. It's widely believed that post-quantum cryptography will be required from around 2030 when quantum computers may be less error-prone and able to operate with a high number of qubits. Governments and companies in the USA, Australia and the UK are all working to meet this milestone or earlier.”

Last updated:  05 Feb 2026 10:36am
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest Conflict of interest statement: "No conflicts of interest."

Carlos Sabín, Ramón y Cajal researcher in the Department of Theoretical Physics at the Autonomous University of Madrid (UAM)

"In a future quantum communications network, a sufficiently large and reliable quantum computer (far removed from those we have today) could break the cryptographic keys used to protect our data and operations. The solution is to use new cryptographic keys based on the properties of quantum physics.

"These new keys are also vulnerable to certain types of attacks, but a particularly secure way to generate them is to have the receiver and sender share a quantum system with the famous property of quantum entanglement. Attacks would destroy the entanglement, and this would be easily detectable by measuring the so-called Bell inequalities. This is the principle behind device-independent quantum key distribution (DI-QKD).

"If we really want it to have practical application in a future communications network, we must be able to perform DI-QKD between network nodes that are separated by sufficiently large distances. In this article in Science, researchers manage to perform DI-QKD between parties separated by distances of between 10 and 100 kilometres. The quantum systems that become entangled are neutral rubidium atoms.

"The method for entangling them was proposed, among others, by Ignacio Cirac in 2001 and consists of detecting the light emitted halfway between the atoms. Since that light can come from either of the two atoms indiscriminately, the rules of quantum physics tell us that, when a photon of light is measured, the atoms become entangled. Although in this experiment the atoms are not actually separated by tens of kilometres, as they are in the same laboratory, the distance is simulated by circulating the light through coiled fibre optic cables of those lengths.

"Quantum entanglement is a very fragile property: as light travels through the fibre, small losses accumulate and the entanglement generated is of poorer quality, which translates into higher error rates in the cryptographic keys generated. The results of the experiment show that errors in the key range from 3% when the distance is 11 kilometres to more than 7% for 100 kilometres. Therefore, although this is an important step in the right direction, we are still a long way from being able to perform completely secure and error-free quantum key distribution on a scale of distances between cities."

Last updated:  05 Feb 2026 10:15am
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest No conflicts of interest.

Antonio Acín, ICREA research professor at the Institute of Photonic Sciences (ICFO)

"Cryptography is a very important field today: every day, a large amount of confidential information is exchanged. Quantum key distribution (QKD) cryptographic protocols allow two honest users, usually called Alice and Bob, to share a secret key, which can then be used to transmit confidential information privately. This is a paradigm shift: the security of the protocol is guaranteed in these schemes by the laws of quantum physics.
"Around 2010, a series of successful attacks on QKD implementations demonstrated that the security of these protocols can be compromised if the devices used in practice do not behave as assumed in the theoretical description of the protocol. In other words, any difference between theory and experiment opens up possibilities for adversaries to break security. To mitigate this weakness, device-independent QKD protocols were introduced. In these protocols, the theoretical description makes no assumptions about the devices (it is independent of them), which are viewed as black boxes. There is therefore no difference between theory and experiment that can be exploited by an adversary to break the communication, as in the previous successful attacks. Device-independent protocols provide the highest level of security guaranteed by quantum physics. The quantum property used to achieve this strong level of quantum security is the violation of Bell's inequalities observed when measuring entangled particles.
"The problem with device-independent protocols is that their implementation is complex. Prior to this experiment, it had only been demonstrated in a configuration where the distance between Alice and Bob was two metres. The result was remarkable as proof of principle, but in practice we do not usually need complete cryptographic schemes to guarantee a transaction between two people who are two metres apart. Taking two steps is more than enough.
"This article reports on the experimental implementation of a device-independent protocol for distances of tens of kilometres, which are much more interesting from a practical point of view and therefore pave the way for the viability of these protocols.
"Is the study of good quality?
"‘Excellent, it is a very important achievement and improvement on the state of the art: it is the first practical demonstration of device-independent quantum key distribution.’
"Are there any limitations to consider?
"Despite being an impressive breakthrough, it still has proof-of-concept aspects.
  1. The most important one: Alice and Bob are not separated by tens of kilometres. They are in the same laboratory, but connected by a fibre that is tens of kilometres long. In principle, this configuration simulates the situation where Alice and Bob are in separate locations tens of kilometres apart and connected by a fibre, but in practice it is not the same.
  2. To be a little more technical: the experiment reports that for fibre distances of hundreds of kilometres, the conditions that would allow the protocol to be successfully carried out are observed, but full implementation has not been achieved."
Last updated:  05 Feb 2026 10:17am
Contact information
Contact details are only visible to registered journalists.
Declared conflicts of interest No conflicts of interest.

Attachments

Note: Not all attachments are visible to the general public. Research URLs will go live after the embargo ends.

Research AAAS, Web page URL will go live after embargo ends.
Journal/
conference:
Science
Research:Paper
Organisation/s: University of Science and Technology of China, China
Funder: This research was supported by the Quantum Science and Technology-National Science and Technology Major Project (nos. 2021ZD0301101, 2021ZD0301104, 2021ZD0300802, and 2021ZD0300303); the National Natural Science Foundation of China (nos. T2525008, T2125010, 12274394, 62031024, 12475028, and 12505018); the National Key R&D Program of China (no. 2020YFA0309804); and the Chinese Academy of Sciences. C.-W.Y. acknowledges support from the China Postdoctoral Science Foundation (nos. BX20230105 and 2023M730901). B.-F.G. acknowledges support from the Natural Science Foundation of Shandong Province, China (no. ZR202211110166). Y.-Z.Z. acknowledges support from Anhui Provincial Natural Science Foundation (no. 2308085MA26) and the Fundamental Research Funds for the Central Universities (no. WK9990000125). T.A.H. was supported by the Koshland Research Fund and by the Air Force Office of Scientific Research under award no. FA9550-22-1-0391. E.Y.-Z.T. performed this research partly while at the National University of Singapore and partly while at the Institute for Quantum Computing (University of Waterloo), supported by Innovation, Science, and Economic Development Canada, as well as the Natural Sciences and Engineering Research Council of Canada (NSERC) under the Discovery Grants Program, grant no. 341495. F.X. acknowledges support from the New Cornerstone Science Foundation through the Xplorer Prize. The numerical calculations in this paper were performed on the supercomputing system in the Supercomputing Center of University of Science and Technology of China.
Media Contact/s
Contact details are only visible to registered journalists.