Multi-Particle Entanglement & It s Application in Quantum Networks

Size: px
Start display at page:

Download "Multi-Particle Entanglement & It s Application in Quantum Networks"

Transcription

1 Lecture Note 5 Multi-Particle Entanglement & It s Application in Quantum Networks

2 Polarization Entangled Photons ( ) ( ) ± = Ψ ± = Φ ± ± H V V H V V H H [P. G. Kwiat et al., Phys. Rev. Lett. 75, 4337 (995).]

3 Post Selection H + V H + V ( ) ( ) H + iv H + iv ( ) ( ) ' ' ' ' ( ) HH VV + i VH + HV ( ) ( ) ( ) ' ' ' ' ' ' ( HH VV) ' ' ' '

4 Initial State: 3-Photon ' ' ' ) ( ' avb Va H b H avb Va H b ( H Four-fold coincidence H H H V or H VV H T 3 T 3 ) Final State: H T ( H H V + V V 3 H 3 )

5 Bell s Inequality and Violation of Local Realism [J. S. Bell, Physics, 95 (964)] Bell s inequality states that certain statistical correlations predicted by QM for measurements on two-particle ensembles cannotbe understood within a realistic picture based on local properties of each individual particle. LR prediction: MAX An unstatisfactory feature! QM prediction: S = S MAX In the derivation of BI such a local realistic and thus classical picture can explain perfect correlations and is only in conflict with statistical prediction of quantum mechanics.

6 conflict with local realism Consider a three-photon GHZ state written in ψ = + ( H H H V V V ) H =, V = denotes the ± eigenstate of σ z respectively 0 σ z basis Linear polarizatoin basis σ : ' ( ) x H = H + V, V ' = ( H V ). circular polarization basis σ : ( ) y R = H + i V, L = ( H i V ).

7 σ σ σ : = = = ( ' ' ' ' RLH LRH RRV LLV ) y y 3x σ σ σ : ( ' ' ' ' RH L LH R RVR LVL ) y x 3y σ σ σ : ψ ψ ψ conflict with local realism ( ' ' ' ' H RL HLR VRR VLL) x y 3 y therefore state ψ is the eigenstate of operators 3 σ σ σ σ σ σ σ σ σ y y 3x y x 3y x y 3y with value -

8 EPR reality criterion: the individual value of any local operator is predetermined. There exists an element of local reality S ix corresponding to σ i =,, 3. operator ( ) ix conflict with local realism All six of the elements of reality S ix and S iy have to be there, each with the values + and! S S S =, y y 3x S S S y x 3y S S S x y 3y =, =.

9 What outcomes are possible? Consider measurement of 45 linear polarization basis local realism S S S = S ( S ) S ( S ) S ( S ) x x 3x x y x y 3x 3y = ( S S S )( S S S )( S S S ) = Possible outcomes: x y 3y y x 3y y y 3y VVV, HHV, HVH, V H H ' ' ' ' ' ' ' ' ' ' ' '

10 quantum physics What outcomes are possible? ψ = Possible outcomes: ( H ' HH ' ' HVV ' ' ' VHV ' ' ' VVH ' ' ' ) HHH S S S =! x x 3 x, HVV, VHV, VVH ' ' ' ' ' ' ' ' ' ' ' ' Whenever local realism predicts a specific result definitely to occur for a measurement for one of the photons based on the results for the other two, quantum physics definitely predicts the opposite result!

11 Experimental Results J.-W. Pan et al., Nature (London) 403, 55 (000)

12 An improved 3- & 4-photon source + + Φ Φ = 34 H H + V V H H + V V ( H H H H V V V V ) ( H V )( H H H V V V ) [J.-W. Pan et al., Rev. Lett. 86, 4435 (00) ]

13 Advanced Quantum Cryptography Quantum secret sharing A procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. [M. Hillery et al., Phys. Rev. A 59, 89 (999).] Third-Man Quantum Cryptography A procedure that the third man, a controller, can control whether the users, say Alice and Bob, can communicate in a secure way while he has no access whatsoever on the content of the communication between Alice and Bob. [M. Żukowski et al., Acta Phys. Pol. 93, 87 (998).]

14 Schemes for QSS and TQC ψ = + ( H H H V V V ) abc a b c a b c x y ± ± = = ( H ± V ), ( H ± i V ) A xxx measurement + Ψ = (( x x + x x ) x abc + a + b a b + c ( x+ x a x b x a + b) x c) + +

15 Quantum Secret Sharing = = = = ( ) ( ) ( x x x x x x x x x x ) ψ + a + b a b + c + a b a + b c ( ) ( ) ( y y y y x y y y y x ) a b a b c a b a b c ( ) ( ) ( y x y x y y x y x y ) a b a b c a b a b c ( ) ( ) ( x y x y y x y x y y ) a b a b c a b a b c xxx, xyy, yxy, yyx xyx, yxx, xxy, xyx

16 Setup A ultra-stable high intensity source: four-fold coincidence per second! 00 times brighter! stable for a few months! [Z. Zhao et al., Phy. Rev. Lett (003).

17 Result for QSS From bits of raw key with a QBER of.9%, after security check and error reduction, Alice and Bob jointly generate bits cured key with Charlie with a QBER of 0.3%.

18 Third-Man s Control If all of them randomly select the base to measure the polarization. Any two of them can create a coding by being told the other one s measurement result. If Charlie rejects to tell them his selection or just does not make any selection then Alice and Bob can get nothing useful for the cryptography.

19 Result for TQC With the permission of Charlie, after security check and error reduction Alice can generate a bits cured key with Bob, with the same QBER. Otherwise, Without knowing Charlie's results, the only thing Alice and Bob can do is to randomly guess Charlie's results and continue the same encoding and error reduction procedure. In our experiment, after performing twice error reductions, the QBER remains %. [Y.-A. Chen et al., Phy. Rev. Lett. 95, 0050 (005) ]

20 conflict with local realism in 4-photon case ψ = H V V H + V H H V ( ) σ xσσσ x x x, σσσσ x y x y, σσσσ x x y y σ xσ yσ yσ x σ yσσσ y y y, σσσσ y x y x, σσσσ y y x x σ yσ xσ xσ y σ xσσσ x x x : σx: H' = H + V V = H V σy: R = H + iv L = H iv ψ = ( H ' H ' H ' H ' H ' H ' V ' V ' H ' V ' H ' V ' + H ' V ' V ' H ' ( ) ' ( ) ( ) ( ) + V ' H ' H ' V ' V ' H ' V ' H ' V ' V ' H ' H ' + V ' V ' V ' V ' )

21 Violation of Local Realism [Z. Zhao et al., Phy. Rev. Lett (003).

22 A new protocol for 3-Photon ( H + V ) ( HH + VV ) 3 3 ( HHH VVV ) [J. G. Rarity and P. R. Tapster, Phys. Rev. A 59, R35 (999).]

23 5-Photon ( H + V ) ( HH + VV ) ( HH + ) VV Five-fold Coincidence: ( HHHHH + ) 345 VVVVV

24 Encoding operation for simple quantum error correction Ψ = Ψ Φ [ + = Φ ( α H 3 H 4 H 5+ β V 3 V 4 V 5 ) + Φ ( α H H H β V V V ) Ψ ( α V V V + β H H H ) Ψ ( α V V V β H H H )] This implies that a joint Bell measurement on photons and would project the state of photons 3, 4 and 5 into one of the four corresponding states, which can be used for either one bit-flip error or phase-shift error correction in quantum communication.

25 Quantum State Sharing & Open-destination Teleportation α H + β V α HHH β VVV 345 If we perform a +45- degree measurement on photons 4 and 5, then photon 3 is left in the state of photon. In a similar manner the initial state of photon can also be teleported either onto photon 4 or photon 5. [A. Karlsson, et al., Phys. Rev. A 58, 4394 (998) ]

26 Further Demonstration In contrast to the original teleportation scheme, after the encoding operation the destination of teleportation is left open until we perform a polarization measurement on two of the remaining three photons. Even though photons 3, 4 and 5 are far away from each other, one can still choose which particle should act as the output where the initial state of photon is transferred to. This is why we have called the encoding-decoding procedure as open-destination teleportation. It is therefore a generalization of standard teleportation, when no prior agreement on the final destination of the teleportation is necessary. It is also a generalization of Quantum State Sharing. No subset of parts is sufficient to decode the state, but the entire set is. It broadens the scope of quantum information networks allowing quantum communication between multiple nodes, while providing security against malicious parties in the network as well as node and channel failures.

27 Setup for Five-photon GHZ Entanglement [Z. Zhao et al., Nature 430, 54 (004). ]

28 CNOT operation for twoindependent photons +/-? H/V? ( α H + β V ) ( HV + VH ) ( γ H + δ V ) 34 5 ( α HH V β VV H ) ( γ H δ V ) PBS + + T( H); R( V) ( α HH β VV )( γ δ)( H V )( H V ) PBS T( H+ V); R( H V) Conditional 3 at H+V Conditional 4 at H ( α HH β VV )( γ δ)( H V )( H V ) α H ( γ V + δ H ) + β V ( γ H + δ V )

29 CNOT Gate A full Bell state Measurement for 00% Teleportation Control H Target H Control H Target V [T. B. Pittman, PRA 64,063(00)] H V V V H V H V V H H V [S. Gasparoni et al., Phys. Rev. Lett. 93, (004); Z. Zhao et al., Phys. Rev. Lett. 94, (005).]

30 Most recently... 6-Photon [Q. Zhang et al.,in preparation for Science ]

A Superluminal communication solution based on Four-photon entanglement

A Superluminal communication solution based on Four-photon entanglement A Superluminal communication solution based on Four-photon entanglement Jia-Run Deng cmos001@163.com Abstract : Based on the improved design of Four-photon entanglement device and the definition of Encoding

More information

arxiv:quant-ph/ v2 25 May 2005

arxiv:quant-ph/ v2 25 May 2005 Experimental Quantum Secret Sharing and Third-Man Quantum Cryptography Yu-Ao Chen, 1, An-Ning Zhang, 1 Zhi Zhao, 1, Xiao-Qi Zhou, 1 Chao-Yang Lu, 1 Cheng-Zhi Peng, 1 Tao Yang, 1 and Jian-Wei Pan 1, 1 Hefei

More information

Jian-Wei Pan

Jian-Wei Pan Lecture Note 6 11.06.2008 open system dynamics 0 E 0 U ( t) ( t) 0 E ( t) E U 1 E ( t) 1 1 System Environment U() t ( ) 0 + 1 E 0 E ( t) + 1 E ( t) 0 1 0 0 1 1 2 * 0 01 E1 E0 q() t = TrEq+ E = * 2 1 0

More information

quantum error-rejection

quantum error-rejection Lecture Note 7 Decoherence-free sub-space space and quantum error-rejection rejection.06.006 open system dynamics ψ = α 0 + α 0 Decoherence System Environment 0 E 0 U ( t) ( t) 0 E ( t) E U E ( t) U()

More information

Quantum Dense Coding and Quantum Teleportation

Quantum Dense Coding and Quantum Teleportation Lecture Note 3 Quantum Dense Coding and Quantum Teleportation Jian-Wei Pan Bell states maximally entangled states: ˆ Φ Ψ Φ x σ Dense Coding Theory: [C.. Bennett & S. J. Wiesner, Phys. Rev. Lett. 69, 88

More information

Experimental Demonstration of Five-photon Entanglement and Open-destination Teleportation

Experimental Demonstration of Five-photon Entanglement and Open-destination Teleportation Experimental Demonstration of Five-photon Entanglement and Open-destination Teleportation Zhi Zhao, Yu-Ao Chen, An-Ning Zhang, Tao Yang, ans Briegel & Jian-Wei Pan, Department of Modern Physics, University

More information

arxiv:quant-ph/ v1 27 Dec 2004

arxiv:quant-ph/ v1 27 Dec 2004 Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

Greenberger Horne Zeilinger (GHZ) Entanglement and Local Realism Analyzed Using Tensor Algebra

Greenberger Horne Zeilinger (GHZ) Entanglement and Local Realism Analyzed Using Tensor Algebra Greenberger Horne Zeilinger (GHZ) Entanglement and Local Realism Analyzed Using Tensor Algebra Frank Rioux Chemistry Department CSB SJU This tutorial analyses experimental results on a GHZ entanglement

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017 Entanglement Michelle Victora Advisor: Paul G. Kwiat Physics 403 talk: March 13, 2017 Introduction to entanglement Making entanglement in the lab Applications Quantum states describing more than one system

More information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can

More information

Quantum secret sharing based on quantum error-correcting codes

Quantum secret sharing based on quantum error-correcting codes Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,

More information

Analysing the role of entanglement in the three-qubit Vaidman s game

Analysing the role of entanglement in the three-qubit Vaidman s game Analysing the role of entanglement in the three-qubit Vaidman s game arxiv:807.056v [quant-ph] Jul 08 Hargeet Kaur Department of Chemistry Indian Institute of Technology Jodhpur, Rajasthan Email: kaur.@iitj.ac.in

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

Multiparty Quantum Remote Control

Multiparty Quantum Remote Control Multiparty Quantum Remote Control Yu-Ting Chen and Tzonelih Hwang Abstract This paper proposes a multiparty quantum remote control (MQRC) protocol, which allows several controllers to perform remote operations

More information

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G. Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G. Kwiat Physics 403 talk: December 2, 2014 Entanglement is a feature of compound

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Quantum Teleportation Pt. 3

Quantum Teleportation Pt. 3 Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation

More information

Efficient controlled quantum secure direct communication based on GHZ-like states

Efficient controlled quantum secure direct communication based on GHZ-like states Efficient controlled quantum secure direct communication based on GHZ-like states Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

A scheme for generation of multi-photon GHZ states with cross-kerr nonlinearities

A scheme for generation of multi-photon GHZ states with cross-kerr nonlinearities J. At. Mol. Sci. doi: 10.408/jams.030111.0311a Vol. 4, No. 1, pp. 7-78 February 013 A scheme for generation of multi-photon GHZ states with cross-kerr nonlinearities Ting-Ting Xu, Wei Xiong, and Liu Ye

More information

Quantum Information & Quantum Computation

Quantum Information & Quantum Computation CS90A, Spring 005: Quantum Information & Quantum Computation Wim van Dam Engineering, Room 509 vandam@cs http://www.cs.ucsb.edu/~vandam/teaching/cs90/ Administrative The Final Examination will be: Monday

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =

More information

arxiv: v1 [quant-ph] 25 Apr 2017

arxiv: v1 [quant-ph] 25 Apr 2017 Deterministic creation of a four-qubit W state using one- and two-qubit gates Firat Diker 1 and Can Yesilyurt 2 1 Faculty of Engineering and Natural Sciences, arxiv:170.0820v1 [quant-ph] 25 Apr 2017 Sabanci

More information

Selection of unitary operations in quantum secret sharing without entanglement

Selection of unitary operations in quantum secret sharing without entanglement . RESEARCH PAPERS. SCIENCE CHINA Information Sciences September 2011 Vol. 54 No. 9: 1837 1842 doi: 10.1007/s11432-011-4240-9 Selection of unitary operations in quantum secret sharing without entanglement

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

EPR paradox, Bell inequality, etc.

EPR paradox, Bell inequality, etc. EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project

More information

arxiv:quant-ph/ v1 10 Apr 2006

arxiv:quant-ph/ v1 10 Apr 2006 Fake-signal-and-cheating attack on quantum secret sharing Fu-Guo Deng, 1,,3 Xi-Han Li, 1, Pan Chen, 4 Chun-Yan Li, 1, and Hong-Yu Zhou 1,,3 1 The Key Laboratory of Beam Technology and Material Modification

More information

Bell s inequalities and their uses

Bell s inequalities and their uses The Quantum Theory of Information and Computation http://www.comlab.ox.ac.uk/activities/quantum/course/ Bell s inequalities and their uses Mark Williamson mark.williamson@wofson.ox.ac.uk 10.06.10 Aims

More information

Contextuality and the Kochen-Specker Theorem. Interpretations of Quantum Mechanics

Contextuality and the Kochen-Specker Theorem. Interpretations of Quantum Mechanics Contextuality and the Kochen-Specker Theorem Interpretations of Quantum Mechanics by Christoph Saulder 19. 12. 2007 Interpretations of quantum mechanics Copenhagen interpretation the wavefunction has no

More information

D. Bouwmeester et. al. Nature (1997) Joep Jongen. 21th june 2007

D. Bouwmeester et. al. Nature (1997) Joep Jongen. 21th june 2007 al D. Bouwmeester et. al. Nature 390 575 (1997) Universiteit Utrecht 1th june 007 Outline 1 3 4 5 EPR Paradox 1935: Einstein, Podolsky & Rosen Decay of a π meson: π 0 e + e + Entangled state: ψ = 1 ( +

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

The information content of a quantum

The information content of a quantum The information content of a quantum A few words about quantum computing Bell-state measurement Quantum dense coding Teleportation (polarisation states) Quantum error correction Teleportation (continuous

More information

The controlled-not (CNOT) gate exors the first qubit into the second qubit ( a,b. a,a + b mod 2 ). Thus it permutes the four basis states as follows:

The controlled-not (CNOT) gate exors the first qubit into the second qubit ( a,b. a,a + b mod 2 ). Thus it permutes the four basis states as follows: C/CS/Phys C9 Qubit gates, EPR, ell s inequality 9/8/05 Fall 005 Lecture 4 Two-qubit gate: COT The controlled-not (COT) gate exors the first qubit into the second qubit ( a,b a,a b = a,a + b mod ). Thus

More information

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State Commun. Theor. Phys. (Beijing, China) 49 (2008) pp. 1468 1472 c Chinese Physical Society Vol. 49, No. 6, June 15, 2008 Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure

More information

arxiv: v2 [quant-ph] 9 Nov 2011

arxiv: v2 [quant-ph] 9 Nov 2011 Intercept-resend attacks on Semiquantum secret sharing and the Improvements arxiv:1106.4908v2 [quant-ph] 9 Nov 2011 Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, and Tzonelih Hwang Abstract Recently, Li et

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Quantum Computing: Foundations to Frontier Fall Lecture 3

Quantum Computing: Foundations to Frontier Fall Lecture 3 Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about

More information

Single qubit + CNOT gates

Single qubit + CNOT gates Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose

More information

Experimental demonstrations of teleportation of photons. Manuel Chinotti and Nikola Đorđević

Experimental demonstrations of teleportation of photons. Manuel Chinotti and Nikola Đorđević Experimental demonstrations of teleportation of photons Manuel Chinotti and Nikola Đorđević Outline Quantum teleportation (QT) protocol. Laboratory experimental demonstration: Bouwmeester at al. (1997).

More information

Quantum Communication

Quantum Communication Quantum Communication Nicolas Gisin, Hugo Zbinden, Mikael Afzelius Group of Applied Physics Geneva University, Switzerland Nonlocal Secret Randomness Quantum Key Distribution Quantum Memories and Repeaters

More information

Quantum Teleportation Pt. 1

Quantum Teleportation Pt. 1 Quantum Teleportation Pt. 1 PHYS 500 - Southern Illinois University April 17, 2018 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 1 April 17, 2018 1 / 13 Types of Communication In the

More information

arxiv:quant-ph/ May 2002

arxiv:quant-ph/ May 2002 Multiparty -imensional quantum information splitting Anrze Gruka* an Antoni Wócik** Faculty of Physics, Aam Mickiewicz University, arxiv:quant-ph/5 7 May 8PXOWRZVND3R]QD3RODQG Abstract Generalization of

More information

arxiv: v3 [quant-ph] 6 Sep 2009

arxiv: v3 [quant-ph] 6 Sep 2009 Semi-quantum secret sharing using entangled states Qin Li, 1 W. H. Chan, and Dong-Yang Long 1 1 Department of Computer Science, Sun Yat-sen University, Guangzhou 51075, China Department of Mathematics,

More information

Answers to exercises. Part I: Quantum information. 1. Quantum bits and quantum gates

Answers to exercises. Part I: Quantum information. 1. Quantum bits and quantum gates Answers to exercises Here we provide answers to all the exercises in the book; in some cases we only provide brief numerical answers, while in other cases we provide more explanation. Part I: Quantum information.

More information

AP/P387 Note2 Single- and entangled-photon sources

AP/P387 Note2 Single- and entangled-photon sources AP/P387 Note Single- and entangled-photon sources Single-photon sources Statistic property Experimental method for realization Quantum interference Optical quantum logic gate Entangled-photon sources Bell

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Quantum Gates, Circuits & Teleportation

Quantum Gates, Circuits & Teleportation Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary

More information

All Optical Quantum Gates

All Optical Quantum Gates All Optical Quantum Gates T.C.Ralph Centre for Quantum Computer Technology Department of Physics University of Queensland ralph@physics.uq.edu.au LOQC People Staff T.C.Ralph A.G.White G.J.Milburn Postdocs

More information

Lecture 20: Bell inequalities and nonlocality

Lecture 20: Bell inequalities and nonlocality CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 0: Bell inequalities and nonlocality April 4, 006 So far in the course we have considered uses for quantum information in the

More information

PHYS 215C: Quantum Mechanics (Spring 2016) Problem Set 1 Solutions

PHYS 215C: Quantum Mechanics (Spring 2016) Problem Set 1 Solutions PHYS 15C: Quantum Mechanics Spring 016 Problem Set 1 Solutions TA: Chaitanya Murthy April 7, 016 Problem 1. Correlations for two spin-1/ s The singlet state of the two spin-1/ particles can be written

More information

Quantum information and quantum computing

Quantum information and quantum computing Middle East Technical University, Department of Physics January 7, 009 Outline Measurement 1 Measurement 3 Single qubit gates Multiple qubit gates 4 Distinguishability 5 What s measurement? Quantum measurement

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.

More information

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state Perfect quantum teleportation and dense coding protocols via the -qubit W state Wang Mei-Yu( ) a)b) and Yan Feng-Li( ) a)b) a) College of Physics Science and Information Engineering, Hebei ormal University,

More information

arxiv:quant-ph/ v1 6 Dec 2005

arxiv:quant-ph/ v1 6 Dec 2005 Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School

More information

Experimental Quantum Teleportation of a Two-Qubit

Experimental Quantum Teleportation of a Two-Qubit Experimental Quantum Teleportation of a Two-Qubit Composite System Qiang Zhang,1, Alexander Goebel 1, Claudia Wagenknecht 1, Yu-Ao Chen 1, Bo Zhao 1, Tao Yang, Alois Mair 1, Jörg Schmiedmayer 1,3 & Jian-Wei

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Bidirectional quantum teleportation and secure direct communication via entanglement swapping

Bidirectional quantum teleportation and secure direct communication via entanglement swapping Bidirectional quantum teleportation and secure direct communication via entanglement swapping Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger Experimental quantum teleportation Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger NATURE VOL 390 11 DECEMBER 1997 Overview Motivation General theory behind

More information

Tutorial: Device-independent random number generation. Roger Colbeck University of York

Tutorial: Device-independent random number generation. Roger Colbeck University of York Tutorial: Device-independent random number generation Roger Colbeck University of York Outline Brief motivation of random number generation Discuss what we mean by a random number Discuss some ways of

More information

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Communication. Serge Massar Université Libre de Bruxelles Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?

More information

Bit-Commitment and Coin Flipping in a Device-Independent Setting

Bit-Commitment and Coin Flipping in a Device-Independent Setting Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).

More information

Lecture 6: Quantum error correction and quantum capacity

Lecture 6: Quantum error correction and quantum capacity Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde The quantum capacity theorem is one of the most important theorems in quantum hannon theory. It is a fundamentally quantum theorem

More information

Gisin s theorem for three qubits Author(s) Jing-Ling Chen, Chunfeng Wu, L. C. Kwek and C. H. Oh Source Physical Review Letters, 93,

Gisin s theorem for three qubits Author(s) Jing-Ling Chen, Chunfeng Wu, L. C. Kwek and C. H. Oh Source Physical Review Letters, 93, Title Gisin s theorem for three qubits Author(s) Jing-Ling Chen, Chunfeng Wu, L. C. Kwek and C. H. Oh Source Physical Review Letters, 93, 140407 This document may be used for private study or research

More information

Quantum non-demolition measurements:

Quantum non-demolition measurements: Quantum non-demolition measurements: One path to truly scalable quantum computation Kae Nemoto Tim Spiller Sean Barrett Ray Beausoleil Pieter Kok Bill Munro HP Labs (Bristol) Why should optical quantum

More information

Instantaneous Nonlocal Measurements

Instantaneous Nonlocal Measurements Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.

More information

Multiparty Quantum Secret Sharing Using Quantum Fourier Transform

Multiparty Quantum Secret Sharing Using Quantum Fourier Transform Commun. Theor. Phys. (Beijing, China) 51 (2009) pp. 221 226 c Chinese Physical Society and IOP Publishing Ltd Vol. 51, No. 2, February 15, 2009 Multiparty Quantum Secret Sharing Using Quantum Fourier Transform

More information

QUANTUM INFORMATION with light and atoms. Lecture 2. Alex Lvovsky

QUANTUM INFORMATION with light and atoms. Lecture 2. Alex Lvovsky QUANTUM INFORMATION with light and atoms Lecture 2 Alex Lvovsky MAKING QUANTUM STATES OF LIGHT 1. Photons 2. Biphotons 3. Squeezed states 4. Beam splitter 5. Conditional measurements Beam splitter transformation

More information

Quantum Optical Implementation of Quantum Communication

Quantum Optical Implementation of Quantum Communication Quantum Optical Implementation of Quantum Communication Li Yongmin, Zhang Kuanshou State Key Lab of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan,

More information

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer Centre for Quantum Technologies, Singapore QUANTUM OPTICS Entanglement-based Free Space Quantum Cryptography in Full Daylight, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer

More information

Linear optical implementation of a single mode quantum filter and generation of multi-photon polarization entangled state

Linear optical implementation of a single mode quantum filter and generation of multi-photon polarization entangled state Linear optical implementation of a single mode quantum filter and generation of multi-photon polarization entangled state XuBo Zou, K. Pahlke and W. Mathis Electromagnetic Theory Group at THT Department

More information

arxiv:quant-ph/ v2 3 Oct 2000

arxiv:quant-ph/ v2 3 Oct 2000 Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping

More information

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

Unitary evolution: this axiom governs how the state of the quantum system evolves in time. CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the

More information

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels JOURNAL OF CHEMISTRY 57 VOLUME NUMBER DECEMBER 8 005 A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels Miri Shlomi

More information

How to use the simulator

How to use the simulator How to use the simulator Overview The application allows for the exploration of four quantum circuits in all. Each simulator grants the user a large amount of freedom in experments they wish to conduct.

More information

Technical Report Communicating Secret Information Without Secret Messages

Technical Report Communicating Secret Information Without Secret Messages Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

A single quantum cannot be teleported

A single quantum cannot be teleported 1 quant-ph/010060 A single quantum cannot be teleported Daniele Tommasini Departamento de Física Aplicada, Universidad de Vigo, 3004 Ourense, Spain Due to the Heisemberg uncertainty principle, it is impossible

More information

Title Experimental long-distance quantum secure direct communication

Title Experimental long-distance quantum secure direct communication Title Experimental long-distance quantum secure direct communication The authors Feng Zhu, Tsinghua National Laboratory for Information Science and Technology, Department of Electronic Engineering, Tsinghua

More information

Bell tests in physical systems

Bell tests in physical systems Bell tests in physical systems Seung-Woo Lee St. Hugh s College, Oxford A thesis submitted to the Mathematical and Physical Sciences Division for the degree of Doctor of Philosophy in the University of

More information

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p. Lecture 20 Page 1 Lecture 20 Quantum error correction Classical error correction Modern computers: failure rate is below one error in 10 17 operations Data transmission and storage (file transfers, cell

More information

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding. CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as

More information

Quantum mechanics and reality

Quantum mechanics and reality Quantum mechanics and reality Margaret Reid Centre for Atom Optics and Ultrafast Spectroscopy Swinburne University of Technology Melbourne, Australia Thank you! Outline Non-locality, reality and quantum

More information

Quantum information processing. Two become one

Quantum information processing. Two become one Quantum information processing Two become one Scientists experimentally demonstrate a scheme for quantum joining, which allow the number of qubits encoded per photon to be varied while keeping the overall

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Single-photon quantum error rejection and correction with linear optics

Single-photon quantum error rejection and correction with linear optics Single-photon quantum error rejection and correction with linear optics Demetrios Kalamidas Institute for ltrafast Spectroscopy and Lasers, City College of the City niversity of New York, 138 Street &

More information

Circular Semi-Quantum Secret Sharing Using Single Particles

Circular Semi-Quantum Secret Sharing Using Single Particles Commun. Theor. Phys. 70 (018) 661 671 Vol. 70 No. 6 December 1 018 Circular Semi-Quantum Secret Sharing Using Single Particles Chong-Qiang Ye ( 叶崇强 ) and Tian-Yu Ye ( 叶天语 ) College of Information & Electronic

More information

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis

More information

SUPERDENSE CODING AND QUANTUM TELEPORTATION

SUPERDENSE CODING AND QUANTUM TELEPORTATION SUPERDENSE CODING AND QUANTUM TELEPORTATION YAQIAO LI This note tries to rephrase mathematically superdense coding and quantum teleportation explained in [] Section.3 and.3.7, respectively (as if I understood

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

Quantum Communication

Quantum Communication Quantum Communication Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers ) Enables continuing miniaturization ) Fundamentally

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information