Multi-Particle Entanglement & It s Application in Quantum Networks
|
|
- Betty Ford
- 6 years ago
- Views:
Transcription
1 Lecture Note 5 Multi-Particle Entanglement & It s Application in Quantum Networks
2 Polarization Entangled Photons ( ) ( ) ± = Ψ ± = Φ ± ± H V V H V V H H [P. G. Kwiat et al., Phys. Rev. Lett. 75, 4337 (995).]
3 Post Selection H + V H + V ( ) ( ) H + iv H + iv ( ) ( ) ' ' ' ' ( ) HH VV + i VH + HV ( ) ( ) ( ) ' ' ' ' ' ' ( HH VV) ' ' ' '
4 Initial State: 3-Photon ' ' ' ) ( ' avb Va H b H avb Va H b ( H Four-fold coincidence H H H V or H VV H T 3 T 3 ) Final State: H T ( H H V + V V 3 H 3 )
5 Bell s Inequality and Violation of Local Realism [J. S. Bell, Physics, 95 (964)] Bell s inequality states that certain statistical correlations predicted by QM for measurements on two-particle ensembles cannotbe understood within a realistic picture based on local properties of each individual particle. LR prediction: MAX An unstatisfactory feature! QM prediction: S = S MAX In the derivation of BI such a local realistic and thus classical picture can explain perfect correlations and is only in conflict with statistical prediction of quantum mechanics.
6 conflict with local realism Consider a three-photon GHZ state written in ψ = + ( H H H V V V ) H =, V = denotes the ± eigenstate of σ z respectively 0 σ z basis Linear polarizatoin basis σ : ' ( ) x H = H + V, V ' = ( H V ). circular polarization basis σ : ( ) y R = H + i V, L = ( H i V ).
7 σ σ σ : = = = ( ' ' ' ' RLH LRH RRV LLV ) y y 3x σ σ σ : ( ' ' ' ' RH L LH R RVR LVL ) y x 3y σ σ σ : ψ ψ ψ conflict with local realism ( ' ' ' ' H RL HLR VRR VLL) x y 3 y therefore state ψ is the eigenstate of operators 3 σ σ σ σ σ σ σ σ σ y y 3x y x 3y x y 3y with value -
8 EPR reality criterion: the individual value of any local operator is predetermined. There exists an element of local reality S ix corresponding to σ i =,, 3. operator ( ) ix conflict with local realism All six of the elements of reality S ix and S iy have to be there, each with the values + and! S S S =, y y 3x S S S y x 3y S S S x y 3y =, =.
9 What outcomes are possible? Consider measurement of 45 linear polarization basis local realism S S S = S ( S ) S ( S ) S ( S ) x x 3x x y x y 3x 3y = ( S S S )( S S S )( S S S ) = Possible outcomes: x y 3y y x 3y y y 3y VVV, HHV, HVH, V H H ' ' ' ' ' ' ' ' ' ' ' '
10 quantum physics What outcomes are possible? ψ = Possible outcomes: ( H ' HH ' ' HVV ' ' ' VHV ' ' ' VVH ' ' ' ) HHH S S S =! x x 3 x, HVV, VHV, VVH ' ' ' ' ' ' ' ' ' ' ' ' Whenever local realism predicts a specific result definitely to occur for a measurement for one of the photons based on the results for the other two, quantum physics definitely predicts the opposite result!
11 Experimental Results J.-W. Pan et al., Nature (London) 403, 55 (000)
12 An improved 3- & 4-photon source + + Φ Φ = 34 H H + V V H H + V V ( H H H H V V V V ) ( H V )( H H H V V V ) [J.-W. Pan et al., Rev. Lett. 86, 4435 (00) ]
13 Advanced Quantum Cryptography Quantum secret sharing A procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. [M. Hillery et al., Phys. Rev. A 59, 89 (999).] Third-Man Quantum Cryptography A procedure that the third man, a controller, can control whether the users, say Alice and Bob, can communicate in a secure way while he has no access whatsoever on the content of the communication between Alice and Bob. [M. Żukowski et al., Acta Phys. Pol. 93, 87 (998).]
14 Schemes for QSS and TQC ψ = + ( H H H V V V ) abc a b c a b c x y ± ± = = ( H ± V ), ( H ± i V ) A xxx measurement + Ψ = (( x x + x x ) x abc + a + b a b + c ( x+ x a x b x a + b) x c) + +
15 Quantum Secret Sharing = = = = ( ) ( ) ( x x x x x x x x x x ) ψ + a + b a b + c + a b a + b c ( ) ( ) ( y y y y x y y y y x ) a b a b c a b a b c ( ) ( ) ( y x y x y y x y x y ) a b a b c a b a b c ( ) ( ) ( x y x y y x y x y y ) a b a b c a b a b c xxx, xyy, yxy, yyx xyx, yxx, xxy, xyx
16 Setup A ultra-stable high intensity source: four-fold coincidence per second! 00 times brighter! stable for a few months! [Z. Zhao et al., Phy. Rev. Lett (003).
17 Result for QSS From bits of raw key with a QBER of.9%, after security check and error reduction, Alice and Bob jointly generate bits cured key with Charlie with a QBER of 0.3%.
18 Third-Man s Control If all of them randomly select the base to measure the polarization. Any two of them can create a coding by being told the other one s measurement result. If Charlie rejects to tell them his selection or just does not make any selection then Alice and Bob can get nothing useful for the cryptography.
19 Result for TQC With the permission of Charlie, after security check and error reduction Alice can generate a bits cured key with Bob, with the same QBER. Otherwise, Without knowing Charlie's results, the only thing Alice and Bob can do is to randomly guess Charlie's results and continue the same encoding and error reduction procedure. In our experiment, after performing twice error reductions, the QBER remains %. [Y.-A. Chen et al., Phy. Rev. Lett. 95, 0050 (005) ]
20 conflict with local realism in 4-photon case ψ = H V V H + V H H V ( ) σ xσσσ x x x, σσσσ x y x y, σσσσ x x y y σ xσ yσ yσ x σ yσσσ y y y, σσσσ y x y x, σσσσ y y x x σ yσ xσ xσ y σ xσσσ x x x : σx: H' = H + V V = H V σy: R = H + iv L = H iv ψ = ( H ' H ' H ' H ' H ' H ' V ' V ' H ' V ' H ' V ' + H ' V ' V ' H ' ( ) ' ( ) ( ) ( ) + V ' H ' H ' V ' V ' H ' V ' H ' V ' V ' H ' H ' + V ' V ' V ' V ' )
21 Violation of Local Realism [Z. Zhao et al., Phy. Rev. Lett (003).
22 A new protocol for 3-Photon ( H + V ) ( HH + VV ) 3 3 ( HHH VVV ) [J. G. Rarity and P. R. Tapster, Phys. Rev. A 59, R35 (999).]
23 5-Photon ( H + V ) ( HH + VV ) ( HH + ) VV Five-fold Coincidence: ( HHHHH + ) 345 VVVVV
24 Encoding operation for simple quantum error correction Ψ = Ψ Φ [ + = Φ ( α H 3 H 4 H 5+ β V 3 V 4 V 5 ) + Φ ( α H H H β V V V ) Ψ ( α V V V + β H H H ) Ψ ( α V V V β H H H )] This implies that a joint Bell measurement on photons and would project the state of photons 3, 4 and 5 into one of the four corresponding states, which can be used for either one bit-flip error or phase-shift error correction in quantum communication.
25 Quantum State Sharing & Open-destination Teleportation α H + β V α HHH β VVV 345 If we perform a +45- degree measurement on photons 4 and 5, then photon 3 is left in the state of photon. In a similar manner the initial state of photon can also be teleported either onto photon 4 or photon 5. [A. Karlsson, et al., Phys. Rev. A 58, 4394 (998) ]
26 Further Demonstration In contrast to the original teleportation scheme, after the encoding operation the destination of teleportation is left open until we perform a polarization measurement on two of the remaining three photons. Even though photons 3, 4 and 5 are far away from each other, one can still choose which particle should act as the output where the initial state of photon is transferred to. This is why we have called the encoding-decoding procedure as open-destination teleportation. It is therefore a generalization of standard teleportation, when no prior agreement on the final destination of the teleportation is necessary. It is also a generalization of Quantum State Sharing. No subset of parts is sufficient to decode the state, but the entire set is. It broadens the scope of quantum information networks allowing quantum communication between multiple nodes, while providing security against malicious parties in the network as well as node and channel failures.
27 Setup for Five-photon GHZ Entanglement [Z. Zhao et al., Nature 430, 54 (004). ]
28 CNOT operation for twoindependent photons +/-? H/V? ( α H + β V ) ( HV + VH ) ( γ H + δ V ) 34 5 ( α HH V β VV H ) ( γ H δ V ) PBS + + T( H); R( V) ( α HH β VV )( γ δ)( H V )( H V ) PBS T( H+ V); R( H V) Conditional 3 at H+V Conditional 4 at H ( α HH β VV )( γ δ)( H V )( H V ) α H ( γ V + δ H ) + β V ( γ H + δ V )
29 CNOT Gate A full Bell state Measurement for 00% Teleportation Control H Target H Control H Target V [T. B. Pittman, PRA 64,063(00)] H V V V H V H V V H H V [S. Gasparoni et al., Phys. Rev. Lett. 93, (004); Z. Zhao et al., Phys. Rev. Lett. 94, (005).]
30 Most recently... 6-Photon [Q. Zhang et al.,in preparation for Science ]
A Superluminal communication solution based on Four-photon entanglement
A Superluminal communication solution based on Four-photon entanglement Jia-Run Deng cmos001@163.com Abstract : Based on the improved design of Four-photon entanglement device and the definition of Encoding
More informationarxiv:quant-ph/ v2 25 May 2005
Experimental Quantum Secret Sharing and Third-Man Quantum Cryptography Yu-Ao Chen, 1, An-Ning Zhang, 1 Zhi Zhao, 1, Xiao-Qi Zhou, 1 Chao-Yang Lu, 1 Cheng-Zhi Peng, 1 Tao Yang, 1 and Jian-Wei Pan 1, 1 Hefei
More informationJian-Wei Pan
Lecture Note 6 11.06.2008 open system dynamics 0 E 0 U ( t) ( t) 0 E ( t) E U 1 E ( t) 1 1 System Environment U() t ( ) 0 + 1 E 0 E ( t) + 1 E ( t) 0 1 0 0 1 1 2 * 0 01 E1 E0 q() t = TrEq+ E = * 2 1 0
More informationquantum error-rejection
Lecture Note 7 Decoherence-free sub-space space and quantum error-rejection rejection.06.006 open system dynamics ψ = α 0 + α 0 Decoherence System Environment 0 E 0 U ( t) ( t) 0 E ( t) E U E ( t) U()
More informationQuantum Dense Coding and Quantum Teleportation
Lecture Note 3 Quantum Dense Coding and Quantum Teleportation Jian-Wei Pan Bell states maximally entangled states: ˆ Φ Ψ Φ x σ Dense Coding Theory: [C.. Bennett & S. J. Wiesner, Phys. Rev. Lett. 69, 88
More informationExperimental Demonstration of Five-photon Entanglement and Open-destination Teleportation
Experimental Demonstration of Five-photon Entanglement and Open-destination Teleportation Zhi Zhao, Yu-Ao Chen, An-Ning Zhang, Tao Yang, ans Briegel & Jian-Wei Pan, Department of Modern Physics, University
More informationarxiv:quant-ph/ v1 27 Dec 2004
Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,
More informationEntanglement and Quantum Teleportation
Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,
More informationGreenberger Horne Zeilinger (GHZ) Entanglement and Local Realism Analyzed Using Tensor Algebra
Greenberger Horne Zeilinger (GHZ) Entanglement and Local Realism Analyzed Using Tensor Algebra Frank Rioux Chemistry Department CSB SJU This tutorial analyses experimental results on a GHZ entanglement
More informationProblem Set: TT Quantum Information
Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C
More informationEntanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017
Entanglement Michelle Victora Advisor: Paul G. Kwiat Physics 403 talk: March 13, 2017 Introduction to entanglement Making entanglement in the lab Applications Quantum states describing more than one system
More informationEntanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen
Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can
More informationQuantum secret sharing based on quantum error-correcting codes
Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,
More informationAnalysing the role of entanglement in the three-qubit Vaidman s game
Analysing the role of entanglement in the three-qubit Vaidman s game arxiv:807.056v [quant-ph] Jul 08 Hargeet Kaur Department of Chemistry Indian Institute of Technology Jodhpur, Rajasthan Email: kaur.@iitj.ac.in
More informationarxiv:quant-ph/ v2 2 Jan 2007
Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1
More informationMultiparty Quantum Remote Control
Multiparty Quantum Remote Control Yu-Ting Chen and Tzonelih Hwang Abstract This paper proposes a multiparty quantum remote control (MQRC) protocol, which allows several controllers to perform remote operations
More informationQuantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.
Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G. Kwiat Physics 403 talk: December 2, 2014 Entanglement is a feature of compound
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationQuantum Teleportation Pt. 3
Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation
More informationEfficient controlled quantum secure direct communication based on GHZ-like states
Efficient controlled quantum secure direct communication based on GHZ-like states Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International
More informationPhysics is becoming too difficult for physicists. David Hilbert (mathematician)
Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving
More informationA scheme for generation of multi-photon GHZ states with cross-kerr nonlinearities
J. At. Mol. Sci. doi: 10.408/jams.030111.0311a Vol. 4, No. 1, pp. 7-78 February 013 A scheme for generation of multi-photon GHZ states with cross-kerr nonlinearities Ting-Ting Xu, Wei Xiong, and Liu Ye
More informationQuantum Information & Quantum Computation
CS90A, Spring 005: Quantum Information & Quantum Computation Wim van Dam Engineering, Room 509 vandam@cs http://www.cs.ucsb.edu/~vandam/teaching/cs90/ Administrative The Final Examination will be: Monday
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =
More informationarxiv: v1 [quant-ph] 25 Apr 2017
Deterministic creation of a four-qubit W state using one- and two-qubit gates Firat Diker 1 and Can Yesilyurt 2 1 Faculty of Engineering and Natural Sciences, arxiv:170.0820v1 [quant-ph] 25 Apr 2017 Sabanci
More informationSelection of unitary operations in quantum secret sharing without entanglement
. RESEARCH PAPERS. SCIENCE CHINA Information Sciences September 2011 Vol. 54 No. 9: 1837 1842 doi: 10.1007/s11432-011-4240-9 Selection of unitary operations in quantum secret sharing without entanglement
More informationIntroduction to Quantum Key Distribution
Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is
More informationEPR paradox, Bell inequality, etc.
EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project
More informationarxiv:quant-ph/ v1 10 Apr 2006
Fake-signal-and-cheating attack on quantum secret sharing Fu-Guo Deng, 1,,3 Xi-Han Li, 1, Pan Chen, 4 Chun-Yan Li, 1, and Hong-Yu Zhou 1,,3 1 The Key Laboratory of Beam Technology and Material Modification
More informationBell s inequalities and their uses
The Quantum Theory of Information and Computation http://www.comlab.ox.ac.uk/activities/quantum/course/ Bell s inequalities and their uses Mark Williamson mark.williamson@wofson.ox.ac.uk 10.06.10 Aims
More informationContextuality and the Kochen-Specker Theorem. Interpretations of Quantum Mechanics
Contextuality and the Kochen-Specker Theorem Interpretations of Quantum Mechanics by Christoph Saulder 19. 12. 2007 Interpretations of quantum mechanics Copenhagen interpretation the wavefunction has no
More informationD. Bouwmeester et. al. Nature (1997) Joep Jongen. 21th june 2007
al D. Bouwmeester et. al. Nature 390 575 (1997) Universiteit Utrecht 1th june 007 Outline 1 3 4 5 EPR Paradox 1935: Einstein, Podolsky & Rosen Decay of a π meson: π 0 e + e + Entangled state: ψ = 1 ( +
More informationQuantum key distribution for the lazy and careless
Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center
More informationThe information content of a quantum
The information content of a quantum A few words about quantum computing Bell-state measurement Quantum dense coding Teleportation (polarisation states) Quantum error correction Teleportation (continuous
More informationThe controlled-not (CNOT) gate exors the first qubit into the second qubit ( a,b. a,a + b mod 2 ). Thus it permutes the four basis states as follows:
C/CS/Phys C9 Qubit gates, EPR, ell s inequality 9/8/05 Fall 005 Lecture 4 Two-qubit gate: COT The controlled-not (COT) gate exors the first qubit into the second qubit ( a,b a,a b = a,a + b mod ). Thus
More informationMultiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State
Commun. Theor. Phys. (Beijing, China) 49 (2008) pp. 1468 1472 c Chinese Physical Society Vol. 49, No. 6, June 15, 2008 Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure
More informationarxiv: v2 [quant-ph] 9 Nov 2011
Intercept-resend attacks on Semiquantum secret sharing and the Improvements arxiv:1106.4908v2 [quant-ph] 9 Nov 2011 Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, and Tzonelih Hwang Abstract Recently, Li et
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationQuantum Computing: Foundations to Frontier Fall Lecture 3
Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about
More informationSingle qubit + CNOT gates
Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose
More informationExperimental demonstrations of teleportation of photons. Manuel Chinotti and Nikola Đorđević
Experimental demonstrations of teleportation of photons Manuel Chinotti and Nikola Đorđević Outline Quantum teleportation (QT) protocol. Laboratory experimental demonstration: Bouwmeester at al. (1997).
More informationQuantum Communication
Quantum Communication Nicolas Gisin, Hugo Zbinden, Mikael Afzelius Group of Applied Physics Geneva University, Switzerland Nonlocal Secret Randomness Quantum Key Distribution Quantum Memories and Repeaters
More informationQuantum Teleportation Pt. 1
Quantum Teleportation Pt. 1 PHYS 500 - Southern Illinois University April 17, 2018 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 1 April 17, 2018 1 / 13 Types of Communication In the
More informationarxiv:quant-ph/ May 2002
Multiparty -imensional quantum information splitting Anrze Gruka* an Antoni Wócik** Faculty of Physics, Aam Mickiewicz University, arxiv:quant-ph/5 7 May 8PXOWRZVND3R]QD3RODQG Abstract Generalization of
More informationarxiv: v3 [quant-ph] 6 Sep 2009
Semi-quantum secret sharing using entangled states Qin Li, 1 W. H. Chan, and Dong-Yang Long 1 1 Department of Computer Science, Sun Yat-sen University, Guangzhou 51075, China Department of Mathematics,
More informationAnswers to exercises. Part I: Quantum information. 1. Quantum bits and quantum gates
Answers to exercises Here we provide answers to all the exercises in the book; in some cases we only provide brief numerical answers, while in other cases we provide more explanation. Part I: Quantum information.
More informationAP/P387 Note2 Single- and entangled-photon sources
AP/P387 Note Single- and entangled-photon sources Single-photon sources Statistic property Experimental method for realization Quantum interference Optical quantum logic gate Entangled-photon sources Bell
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More information10 - February, 2010 Jordan Myronuk
10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States
More informationQuantum Gates, Circuits & Teleportation
Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary
More informationAll Optical Quantum Gates
All Optical Quantum Gates T.C.Ralph Centre for Quantum Computer Technology Department of Physics University of Queensland ralph@physics.uq.edu.au LOQC People Staff T.C.Ralph A.G.White G.J.Milburn Postdocs
More informationLecture 20: Bell inequalities and nonlocality
CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 0: Bell inequalities and nonlocality April 4, 006 So far in the course we have considered uses for quantum information in the
More informationPHYS 215C: Quantum Mechanics (Spring 2016) Problem Set 1 Solutions
PHYS 15C: Quantum Mechanics Spring 016 Problem Set 1 Solutions TA: Chaitanya Murthy April 7, 016 Problem 1. Correlations for two spin-1/ s The singlet state of the two spin-1/ particles can be written
More informationQuantum information and quantum computing
Middle East Technical University, Department of Physics January 7, 009 Outline Measurement 1 Measurement 3 Single qubit gates Multiple qubit gates 4 Distinguishability 5 What s measurement? Quantum measurement
More informationMassachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.
More informationPerfect quantum teleportation and dense coding protocols via the 2N-qubit W state
Perfect quantum teleportation and dense coding protocols via the -qubit W state Wang Mei-Yu( ) a)b) and Yan Feng-Li( ) a)b) a) College of Physics Science and Information Engineering, Hebei ormal University,
More informationarxiv:quant-ph/ v1 6 Dec 2005
Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School
More informationExperimental Quantum Teleportation of a Two-Qubit
Experimental Quantum Teleportation of a Two-Qubit Composite System Qiang Zhang,1, Alexander Goebel 1, Claudia Wagenknecht 1, Yu-Ao Chen 1, Bo Zhao 1, Tao Yang, Alois Mair 1, Jörg Schmiedmayer 1,3 & Jian-Wei
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationBidirectional quantum teleportation and secure direct communication via entanglement swapping
Bidirectional quantum teleportation and secure direct communication via entanglement swapping Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International
More informationDetection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations
Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum
More informationExperimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger
Experimental quantum teleportation Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger NATURE VOL 390 11 DECEMBER 1997 Overview Motivation General theory behind
More informationTutorial: Device-independent random number generation. Roger Colbeck University of York
Tutorial: Device-independent random number generation Roger Colbeck University of York Outline Brief motivation of random number generation Discuss what we mean by a random number Discuss some ways of
More informationQuantum Communication. Serge Massar Université Libre de Bruxelles
Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?
More informationBit-Commitment and Coin Flipping in a Device-Independent Setting
Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).
More informationLecture 6: Quantum error correction and quantum capacity
Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde The quantum capacity theorem is one of the most important theorems in quantum hannon theory. It is a fundamentally quantum theorem
More informationGisin s theorem for three qubits Author(s) Jing-Ling Chen, Chunfeng Wu, L. C. Kwek and C. H. Oh Source Physical Review Letters, 93,
Title Gisin s theorem for three qubits Author(s) Jing-Ling Chen, Chunfeng Wu, L. C. Kwek and C. H. Oh Source Physical Review Letters, 93, 140407 This document may be used for private study or research
More informationQuantum non-demolition measurements:
Quantum non-demolition measurements: One path to truly scalable quantum computation Kae Nemoto Tim Spiller Sean Barrett Ray Beausoleil Pieter Kok Bill Munro HP Labs (Bristol) Why should optical quantum
More informationInstantaneous Nonlocal Measurements
Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.
More informationMultiparty Quantum Secret Sharing Using Quantum Fourier Transform
Commun. Theor. Phys. (Beijing, China) 51 (2009) pp. 221 226 c Chinese Physical Society and IOP Publishing Ltd Vol. 51, No. 2, February 15, 2009 Multiparty Quantum Secret Sharing Using Quantum Fourier Transform
More informationQUANTUM INFORMATION with light and atoms. Lecture 2. Alex Lvovsky
QUANTUM INFORMATION with light and atoms Lecture 2 Alex Lvovsky MAKING QUANTUM STATES OF LIGHT 1. Photons 2. Biphotons 3. Squeezed states 4. Beam splitter 5. Conditional measurements Beam splitter transformation
More informationQuantum Optical Implementation of Quantum Communication
Quantum Optical Implementation of Quantum Communication Li Yongmin, Zhang Kuanshou State Key Lab of Quantum Optics and Quantum Optics Devices, Institute of Opto-Electronics, Shanxi University, Taiyuan,
More informationQuantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer
Centre for Quantum Technologies, Singapore QUANTUM OPTICS Entanglement-based Free Space Quantum Cryptography in Full Daylight, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer
More informationLinear optical implementation of a single mode quantum filter and generation of multi-photon polarization entangled state
Linear optical implementation of a single mode quantum filter and generation of multi-photon polarization entangled state XuBo Zou, K. Pahlke and W. Mathis Electromagnetic Theory Group at THT Department
More informationarxiv:quant-ph/ v2 3 Oct 2000
Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping
More informationUnitary evolution: this axiom governs how the state of the quantum system evolves in time.
CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the
More informationA review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels
JOURNAL OF CHEMISTRY 57 VOLUME NUMBER DECEMBER 8 005 A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels Miri Shlomi
More informationHow to use the simulator
How to use the simulator Overview The application allows for the exploration of four quantum circuits in all. Each simulator grants the user a large amount of freedom in experments they wish to conduct.
More informationTechnical Report Communicating Secret Information Without Secret Messages
Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,
More information5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes
5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.
More informationA single quantum cannot be teleported
1 quant-ph/010060 A single quantum cannot be teleported Daniele Tommasini Departamento de Física Aplicada, Universidad de Vigo, 3004 Ourense, Spain Due to the Heisemberg uncertainty principle, it is impossible
More informationTitle Experimental long-distance quantum secure direct communication
Title Experimental long-distance quantum secure direct communication The authors Feng Zhu, Tsinghua National Laboratory for Information Science and Technology, Department of Electronic Engineering, Tsinghua
More informationBell tests in physical systems
Bell tests in physical systems Seung-Woo Lee St. Hugh s College, Oxford A thesis submitted to the Mathematical and Physical Sciences Division for the degree of Doctor of Philosophy in the University of
More informationExample: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.
Lecture 20 Page 1 Lecture 20 Quantum error correction Classical error correction Modern computers: failure rate is below one error in 10 17 operations Data transmission and storage (file transfers, cell
More informationHilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.
CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as
More informationQuantum mechanics and reality
Quantum mechanics and reality Margaret Reid Centre for Atom Optics and Ultrafast Spectroscopy Swinburne University of Technology Melbourne, Australia Thank you! Outline Non-locality, reality and quantum
More informationQuantum information processing. Two become one
Quantum information processing Two become one Scientists experimentally demonstrate a scheme for quantum joining, which allow the number of qubits encoded per photon to be varied while keeping the overall
More informationTransmitting and Hiding Quantum Information
2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationSingle-photon quantum error rejection and correction with linear optics
Single-photon quantum error rejection and correction with linear optics Demetrios Kalamidas Institute for ltrafast Spectroscopy and Lasers, City College of the City niversity of New York, 138 Street &
More informationCircular Semi-Quantum Secret Sharing Using Single Particles
Commun. Theor. Phys. 70 (018) 661 671 Vol. 70 No. 6 December 1 018 Circular Semi-Quantum Secret Sharing Using Single Particles Chong-Qiang Ye ( 叶崇强 ) and Tian-Yu Ye ( 叶天语 ) College of Information & Electronic
More informationTeleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)
Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis
More informationSUPERDENSE CODING AND QUANTUM TELEPORTATION
SUPERDENSE CODING AND QUANTUM TELEPORTATION YAQIAO LI This note tries to rephrase mathematically superdense coding and quantum teleportation explained in [] Section.3 and.3.7, respectively (as if I understood
More informationResearch, Development and Simulation of Quantum Cryptographic Protocols
http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:
More informationPractical quantum-key. key- distribution post-processing
Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert
More informationQuantum Communication
Quantum Communication Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers ) Enables continuing miniaturization ) Fundamentally
More informationQuantum Wireless Sensor Networks
Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.
More information