Quantum Teleportation

Similar documents
A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

Transmitting and Hiding Quantum Information

SUPPLEMENTARY INFORMATION

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

Entanglement and Quantum Teleportation

A single quantum cannot be teleported

Quantum Gates, Circuits & Teleportation

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

TELEPORTATION OF ATOMIC STATES VIA CAVITY QUANTUM ELECTRODYNAMICS

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

Similarities and Differences Between Two-Particle and Three-Particle Interference

Quantum Dense Coding and Quantum Teleportation

Quantum Information Types

Lecture 11 September 30, 2015

Entanglement and information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Probabilistic exact cloning and probabilistic no-signalling. Abstract

Quantum Teleportation. Gur Yaari for HEisenberg's Seminar on Quantum Optics

Quantum Teleportation Pt. 3

Quantum Teleportation Pt. 1

arxiv:quant-ph/ v2 22 May 1998

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Hardy s Paradox. Chapter Introduction

arxiv:quant-ph/ v1 1 Jun 2000

Optik 122 (2011) Contents lists available at ScienceDirect. Optik. journal homepage:

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

On balance of information in bipartite quantum communication systems: entanglement-energy analogy

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Teleportation: Dream or Reality?

Entanglement Manipulation

Measuring Quantum Teleportation. Team 10: Pranav Rao, Minhui Zhu, Marcus Rosales, Marc Robbins, Shawn Rosofsky

Two-mode excited entangled coherent states and their entanglement properties

Lecture 4: Postulates of quantum mechanics

Quantum Cloning WOOTTERS-ZUREK CLONER

Teleportation of a Zero- and One-photon Running Wave State by Projection Synthesis

CSE 599d - Quantum Computing The No-Cloning Theorem, Classical Teleportation and Quantum Teleportation, Superdense Coding

Incompatibility Paradoxes

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.

quantum distribution of a sudoku key Sian K. Jones University of South Wales

Deterministic secure communications using two-mode squeezed states

Entangled Frankenstein Photons

Concentrating partial entanglement by local operations

arxiv:quant-ph/ v2 3 Oct 2000

o. 5 Proposal of many-party controlled teleportation for by (C 1 ;C ; ;C ) can be expressed as [16] j' w i (c 0 j000 :::0i + c 1 j100 :::0i + c

arxiv:quant-ph/ v1 14 Jun 1999

1 1D Schrödinger equation: Particle in an infinite box

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

Technical Report Communicating Secret Information Without Secret Messages

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Teleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels 1

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v1 2 Oct 1997

Counterfactual quantum protocols

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Teleportation

arxiv: v4 [quant-ph] 11 Jun 2016

10 - February, 2010 Jordan Myronuk

Introduction to Quantum Information Hermann Kampermann

Probabilistic quantum cloning via Greenberger-Horne-Zeilinger states

Flocks of Quantum Clones: Multiple Copying of Qubits

arxiv: v3 [quant-ph] 17 Dec 2018

Quantum Computing: Foundations to Frontier Fall Lecture 3

Instantaneous Nonlocal Measurements

This is a repository copy of Unite to build a quantum internet. White Rose Research Online URL for this paper:

Gilles Brassard. Université de Montréal

LECTURE NOTES ON Quantum Cryptography

1. Basic rules of quantum mechanics

arxiv:quant-ph/ v1 7 Oct 1999

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Mixed-state sensitivity of several quantum-information benchmarks

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Compression and entanglement, entanglement transformations

Introduction to Quantum Mechanics

arxiv: v1 [quant-ph] 3 Jan 2008

1 1D Schrödinger equation: Particle in an infinite box

Simple scheme for efficient linear optics quantum gates

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

arxiv:quant-ph/ v1 13 Jan 2003

example: e.g. electron spin in a field: on the Bloch sphere: this is a rotation around the equator with Larmor precession frequency ω

Security Implications of Quantum Technologies

Problem Set: TT Quantum Information

arxiv:quant-ph/ v1 27 Dec 2004

Lecture 6: QUANTUM CIRCUITS

Is Entanglement Sufficient to Enable Quantum Speedup?

A quantum analog of Huffman coding

Quantum Cryptographic Network based on Quantum Memories. Abstract

Basics on quantum information

The information content of a quantum

Lecture: Quantum Information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Teleportation of a two-atom entangled state via cavity decay

Perfect quantum-error-correction coding in 24 laser pulses

Quantum Cryptography

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

B. BASIC CONCEPTS FROM QUANTUM THEORY 93

Preparing multi-partite entanglement of photons and matter qubits

arxiv: v7 [quant-ph] 20 Mar 2017

Quantum communications

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Interference Between Distinguishable States. Thomas Alexander Meyer

Transcription:

Fortschr. Phys. 50 (2002) 5 7, 608 613 Quantum Teleportation Samuel L. Braunstein Informatics, Bangor University, Bangor LL57 1UT, UK schmuel@sees.bangor.ac.uk Abstract Given a single copy of an unknown quantum state, it is impossible in principle to identify it. The mostly inaccessible information carried by the state is termed quantum information. In contrast to classical information, it cannot be copied or cloned. This concept provides a theoretical underpinning for all aspects of quantum communication and quantum computation. Here we use it to consider quantum teleportation. 1. Introduction During this symposium we have heard many things about Heisenberg s life as a brilliant physicist, including his struggles with both scientific and moral questions. While preparing to give this talk I looked at information about his life and found a very surprising fact: he nearly failed his final Ph.D. orals. The difficulty arose when Wien, who was on his examining committee, moved from mathematical questions to those on experimental physics. Heisenberg was unable to derive the resolving power of such devices as microscopes and telescopes. In the end, Heisenberg received a III, equivalent perhaps to a C, as the overall grade for his doctorate. This was in 1923. It is perhaps ironic then, that this young man had within 4 years understood the limits to resolution better than anyone else of his time. The Heisenberg microscope gedanken experiment helped lay the foundations of quantum mechanics and the uncertainty principle. This principle has re-emerged as a corner stone of our understanding of the limitations of quantum information processing. Here we will consider its role in our understanding of quantum teleportation. 2. What s in a Name Before we begin we shall discuss the term teleportation which has only recently appeared within the scientific literature [1]. Having seen sufficient science-fiction movies in my time, I can make an initial stab at defining teleportation as: Some kind of instantaneous disembodied transport. Now, this is inconsistent with relativity, so let s immediately change our definition to Some kind of disembodied transport. The term disembodied requires some explanation, however, we shall prefer to be vague about it: The object moves from one place to another without manifestly appearing within the intervening space. # WILEY-VCH Verlag Berlin GmbH, 13086 Berlin, 2002 0015-8208/02/5-705-0608 $ 17.50þ.50/0

Fortschr. Phys. 50 (2002) 5 7 609 In the classical day-to-day world we already have many examples which could fit this definition: a fax machine transports an image as electricity; a telephone transporting sound waves; overhead projectors, etc. Should these really count as teleportation? After all they are all really copying processes. They leave the image, the sound, what-have-you behind and send the copy across space in some disembodied way. An object is scanned, the information is transmitted in a different form and a copy is reconstructed. Let us keep away from philosophical questions at the moment. However, we note that the above procedure has intrinsic limitations. It will not work, in general, for quantum systems. Consider for example a single-photon wavepacket prepared in a state of linear polarization down to a 1 accuracy. This means that the preparation procedure requires almost 8 bits worth of polarization orientation information. Any attempt at measuring this orientation, will yield at most one bit s worth of information. For example, simply running this photon through a polarization-dependent beamsplitter will cause the photon to be transmitted or reflected. Yielding at most one bit. This demonstrates the principle, that in general, it is impossible to accurately determine an unknown quantum state. This is essentially a general statement of the Heisenberg uncertainty principle for quantum systems. A consequence of this is that it is likewise impossible to perfectly copy an unknown quantum state. For if a device were capable of perfect copying, we could apply it many times to our original system, yielding a vast ensemble. Then with this ensemble we could then measure the system s state to any desired accuracy. This latter form of the quantum limitation is today called the no-cloning theorem [2] and embodies many of the key features of Heisenberg s original principle. 3. Teleportation Protocol If no-cloning appears to forbid a copying mechanism for performing disembodied transport, what can teleportation of an unknown quantum state be? Clearly, it cannot be a copying procedure. Nonetheless, the aim of quantum teleportation is to: move an unknown quantum state across a classical communication channel. Let us call the sender Alice and the receiver Bob. There is no in-principle restriction to the eavesdropping on a classical communication channel (classical information may be freely copied). So it would seem that another agent Bob 0 could receive a copy of Alice s message and follow the same protocol as the real Bob. His actions would produce a copy of Alice s state! However, this cannot be, as it would violate the no-cloning theorem. To get around this problem quantum teleportation, distinguishes the real Bob as special, since only he shares one-half of a maximally entangled state with Alice, whose half is somehow used in her part of the protocol. Even if another agent were to share such a state with her, it would not participate in her actions. This quantum link between Alice and Bob is sufficient to get around the limitations placed on transport through a classical communication channel. To see how this works, we shall give the mathematics here only for the teleportation of a state from a two-dimensional Hilbert space. A key feature which allows the protocol to work is that there is, in general, a basis of maximally entangled states jent 1 i / jl$i j$li jent 2 i / jl$i þ j$li jent 3 i / jlli j$$i jent 4 i / jlli þ j$$i : ð1þ

610 S. L. Braunstein, Quantum Teleportation Let us label the incoming state given to Alice as jwi in and suppose that Alice and Bob share between themselves the first of these entangled states. The total state would then be described as jfi in; A; B ¼jwi in jent 1 i A; B : ð2þ Since Eqs. (1) describe a complete set for a four-dimensional Hilbert space, we may decompose the states in Alice s hand. Formally we have jfi in; A; B ¼ 1 2 P 4 j¼1 jent j i in; A U j jwi B ; ð3þ where U j are fixed unitary operators on a two-dimensional Hilbert space suitably chosen for this decomposition to hold. It is clear from the linearity of this equation that the U j cannot depend on the state jwi itself. Let us now suppose that Alice makes a measurement in this basis identifying her result by the associated subscripts j 0 ¼ 1; 2; 3; 4. Conditioned on knowing this value the best description of the state remaining in Bob s hand is then given by! U j0 jwi B : ð4þ If Alice now communicates this identification j 0 to Bob (requiring two bits of classical communication) then Bob knows which basis state Alice found. Based on this knowledge, he then operates U y j 0 on his state, yielding! U y j 0 U j0 jwi B ¼jwi B : ð5þ At this stage the protocol is complete and the state has been transferred between Alice and Bob. This procedure utilizes two channels: one potentially pre-existing channel of shared quantum entanglement; and one of classical communication used for Alice to transmit her measurement result to Bob. Neither by themselves contains any information about the original state. This form of transport would seem qualify as disembodied. Further, at no stage did we produce a copy of the original, nor has either Alice or Bob discovered any details about the state they participated in transporting. 4. Continuous Quantum Variables Here we shall discuss one particular implementation of quantum teleportation based, not on states from a finite-dimensional Hilbert space, but on coherent and squeezed states of the electromagnetic field. An idealized version was first discussed by Vaidman [3]. This assumed maximally entangled states which in infinite Hilbert space dimensions corresponds to infinite energy states. Here we discuss a realizable scheme as originated by Braunstein and Kimble [4]. Optical entanglement is easily created. It turns out that almost any pure states (excluding coherent states) combined at a beamsplitter will yield entanglement. The simplest choice is of a pair of squeezed states with opposite squeezing, as shown in Fig. 1. In this case, a pair of so-called twin beams are generated. To detect this kind of entanglement, one simply reverses the procedure: twin beams of this sort recombined at a beamsplitter resolve into unentangled squeezed states. The identity of the specific twin-beam state may be determined by measuring the displacement of the position-squeezed beam and the

Fortschr. Phys. 50 (2002) 5 7 611 twin beams Fig. 1. Twin-beam entanglement created by combining squeezed states on a beamsplitter. Entanglement is resolved into unentangled states by the time-reversed procedure. kick of the momentum squeezed one. As we saw in the previous section the ability to create and detect entanglement are the key requirements in implementing teleportation. This also holds for teleportation in infinite dimensional Hilbert spaces. More details about the scheme for continuous quantum variables may be found in Ref. [4]. 5. Criteria and Evidence for Teleporting Unknown Coherent States In any realistic experiment we will not be able to consider teleporting completely unknown states. We will have some partial information about them. For example, we may wish to consider the teleportation of a limited class of easily constructed states, such as coherent states with a limited peak amplitude [5]. What criteria shall we test in such a circumstance? The limited set of states may be described as an alphabet of states fjw a ig with some associated probabilities P a for their selection in any given run. If Alice and Bob follow a teleportation protocol, Bob hopes to have recreated the original state jw a i during each run. However, in a real experiment he will only achieve an approximate (probably mixed) state q a compared to the original. The average overlap probability F ¼ Ð da P a hw a j q a jw a i ; ð6þ will be a measure of the performance of the teleportation. It is called the average fidelity of the teleportation. The criteria we consider requires that this mean fidelity be better than Alice and Bob could achieve using a classical communication channel alone. Such a performance cannot be reproduced by a conventional copy-and-send strategy. Demonstrating a quantum state transfer protocol with mean fidelity better than could be achieved without entanglement guarantees that a quantum channel has been utilized. In teleportation protocols the only quantum channel is due to the entanglement. For an alphabet of coherent states it can be shown that no more than a 50% mean fidelity is possible in the absence of shared entanglement [5]. This criteria assumes that Alice and Bob know only the form of the alphabet, but not the actual state being transmitted during each run. It makes no other assumption about their actions provided only that they communicate via a classical communication channel.

612 S. L. Braunstein, Quantum Teleportation Quantum Classical Fig. 2. Data from Ref. [6]. The lower plot shows the mean fidelity achievable in the absence of shared entanglement. Even at optimal feed-forward gain it never exceeds 50%. The upper plot shows the mean fidelity with twin-beam entanglement shared between sending and receiving stations. Furusawa et al. implemented just such a protocol and criteria in their experimental demonstration of teleportation [6]. Data from that experiment is shown in Fig. 2. The bound of 50% mean fidelity was beaten only when sender and receiver had access to shared entanglement. 6. Conclusion Quantum teleportation is a wholly new protocol for the transmission of quantum states. No experiments so far have demonstrated all of the features which teleportation has to offer. A preliminary list of these features reads: Quantum transport through a classical channel, Entanglement assisted transport of a quantum state, Many bits can be sent via few bits, Can teleport to an unknown location, Can teleport half of an entangled state, Can teleport an entire space or filter a subspace. Ultimately, which features are most important to achieve will depend on the applications to which teleportation is put. After all these years of our studying quantum mechanics, it still has beautiful surprises for us. There is no uncertainty about that.

Fortschr. Phys. 50 (2002) 5 7 613 References [1] C. H. Bennett, G. Brassard, C. Crepeau, R. Jozsa A. Peres, and W. K. Wootters, Phys. Rev. Lett. 70 (1993) 1895. [2] W. K. Wootters and W. H. Zurek, Nature 299 (1982) 802. [3] L. Vaidman, Phys. Rev. A 49 (1994) 1473. [4] S. L. Braunstein and H. J. Kimble, Phys. Rev. Lett. 80 (1998) 869. [5] S. L. Braunstein, C. A. Fuchs, and H. J. Kimble, J. Mod. Opt. 47 (2000) 267. [6] A. Furusawa, J. L. Sørensen, S. L. Braunstein, C. A. Fuchs, H. J. Kimble, and E. S. Polzik, Science 282 (1998) 706.