Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

Similar documents
Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

Quantum Communication. Serge Massar Université Libre de Bruxelles

Entanglement and Quantum Teleportation

Security Implications of Quantum Technologies

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Entanglement and information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Problem Set: TT Quantum Information

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger

An Introduction to Quantum Information and Applications

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Quantum Gates, Circuits & Teleportation

Multi-Particle Entanglement & It s Application in Quantum Networks

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Lecture: Quantum Information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

arxiv:quant-ph/ v1 2 Oct 1997

Quantum Information Transfer and Processing Miloslav Dušek

A Superluminal communication solution based on Four-photon entanglement

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Quantum Teleportation Pt. 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

CS120, Quantum Cryptography, Fall 2016

LECTURE NOTES ON Quantum Cryptography

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

A central problem in cryptography: the key distribution problem.

Uncertainty Principle

The Relativistic Quantum World

Title Experimental long-distance quantum secure direct communication

Quantum Teleportation with Photons. Bouwmeester, D; Pan, J-W; Mattle, K; et al. "Experimental quantum teleportation". Nature 390, 575 (1997).

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Quantum Teleportation Pt. 3

Basics on quantum information

Quantum Entanglement, Beyond Quantum Mechanics, and Why Quantum Mechanics

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Quantum key distribution with 2-bit quantum codes

Lecture 20: Bell inequalities and nonlocality

Quantum Cryptography

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Basics on quantum information

Quantum Dense Coding and Quantum Teleportation

A probabilistic quantum key transfer protocol

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

INTRODUCTION TO QUANTUM COMPUTING

Technical Report Communicating Secret Information Without Secret Messages

Labs 3-4: Single-photon Source

Playing Games with Quantum Information: Experiments with Photons and Laser-Cooled Atoms

Seminar 1. Introduction to Quantum Computing

Quantum Interference. Andrew M. Sessler Lawrence Berkeley Laboratory

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Other Topics in Quantum Information

arxiv:quant-ph/ v1 13 Jan 2003

The information content of a quantum

arxiv:quant-ph/ v1 6 Dec 2005

arxiv:quant-ph/ v1 5 Aug 2004

quantum distribution of a sudoku key Sian K. Jones University of South Wales

The controlled-not (CNOT) gate exors the first qubit into the second qubit ( a,b. a,a + b mod 2 ). Thus it permutes the four basis states as follows:

D. Bouwmeester et. al. Nature (1997) Joep Jongen. 21th june 2007

Analysis of the Influenceof the Rate of Spies Measure on the Quantum Transmission

Linear optical implementation of a single mode quantum filter and generation of multi-photon polarization entangled state

1.1.1 Bell Inequality - Spin correlation

Lecture 14, Thurs March 2: Nonlocal Games

Quantum Cryptography. Marshall Roth March 9, 2007

b) (5 points) Give a simple quantum circuit that transforms the state

Single-photon quantum error rejection and correction with linear optics

Quantum Cryptography

Quantum Measurements: some technical background

Odd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initi

arxiv: v7 [quant-ph] 20 Mar 2017

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

CSE 599d - Quantum Computing The No-Cloning Theorem, Classical Teleportation and Quantum Teleportation, Superdense Coding

Secrets of Quantum Information Science

Quantum Teleportation

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum Communication Complexity

Quantum sampling of mixed states

arxiv:quant-ph/ v1 27 Dec 2004

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Experimental realization of quantum cryptography communication in free space

Quantum Information & Quantum Computation

Short introduction to Quantum Computing

AP/P387 Note2 Single- and entangled-photon sources

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

Toward the Generation of Bell Certified Randomness Using Photons

Measuring Quantum Teleportation. Team 10: Pranav Rao, Minhui Zhu, Marcus Rosales, Marc Robbins, Shawn Rosofsky

Perfectly secure cipher system.

arxiv:quant-ph/ v2 2 Jan 2007

How to Train Your Photon Dragon

Multiparty Quantum Remote Control

Cryptography in a quantum world

Simulation of BB84 Quantum Key Distribution in depolarizing channel

arxiv:quant-ph/ v2 3 Oct 2000

Transcription:

Entanglement Michelle Victora Advisor: Paul G. Kwiat Physics 403 talk: March 13, 2017

Introduction to entanglement Making entanglement in the lab Applications

Quantum states describing more than one system can be separable or entangled System A (a photon) System B (another photon) ȁ Ψ AB = Two-photon state of A and B States that can be written ȁψ AB = ȁφ 1 A ȁ are separable Example: ȁ Ψ AB = ȁh A ȁ V B φ2 B States that cannot be written this way are entangled Example: ȁ Ψ AB = 1 (ȁh 2 A ȁv B + ȁv A ȁh B )

Is this state entangled? ȁψ AB = 1 2 ( ȁh ȁ A V B + ȁv ȁ A H +ȁ B V ȁ A V B + ȁh ȁ A H B )

Is this state entangled? No! ȁψ AB = 1 2 ( ȁh A + ȁv )(ȁ A H B + ȁv B )

Measurement outcomes are random and correlated ȁψ AB = 1 2 ( ȁh ȁ A V B + ȁv ȁ A H B ) 50% chance to measure H or V for either photon (random) But the photons always have orthogonal polarization (correlated) But classical things can be random and correlated too what s special about entanglement?

Quantum cakes Lucy Ricardo Does the cake taste good or bad? Has the cake risen or not risen early? Only one measurement can be made on any particular cake!

Lucy and Ricardo randomly decide which measurement to make on each cake, and record their results. There are three cases: 1. They both check their ovens midway 9% of the time, both cakes rise early (the rest of the time, only one or neither does) 2. One checks midway and the other waits Whenever Lucy s cake rises early, Ricardo s tastes good Whenever Ricardo s cake rises early, Lucy s tastes good 3. They both wait Do the cakes taste good or bad?

When they both check midway 9% of the time, both cakes rise early Whenever Lucy s cake rises early, Ricardo s cake tastes good Whenever Ricardo s cake rises early, Lucy s cake tastes good When they both wait How often do both cakes taste good? Both cakes never taste good!

This experiment isn t really possible with cakes, but it is possible with photons Tasted good Source θ Rose early Tasted bad Didn t rise early Tasted good = 0 (horizontal) Tasted bad = 90 (vertical) Rose early = -50.8 Didn t rise early = 39.2

This all means that entanglement violates local realism Realism = all physical properties (tasting good or bad) are defined, even if we don t measure them Local = measurements of one thing don t affect another (possibly far away) thing

Potential Loopholes

Potential Loopholes Detection Efficiency/Fair Sampling Assumption

Potential Loopholes Detection Efficiency/Fair Sampling Assumption Communication/Locality Loophole

Basic introduction to entanglement Making entanglement in the lab Applications

Downconversion produces pairs of photons Laser Momentum conservation k 1 k 2 ω laser ω 1 ω 2 Energy conservation Nonlinear crystal k laser Source: David Guzman, Universidad de los Andes

Downconversion is polarization-dependent Vertical Horizontal Horizontal Horizontal Vertical Vertical

Two crystals can create polarization entanglement Horizontal Vertical ȁv หH ȁh ȁh หV ȁv Superposition Polarization entanglement ȁh + e iφ ȁv หV ȁv + e iφ หH ȁh

Basic introduction to entanglement Making entanglement in the lab Applications

Quantum Teleportation

Lucy wants to communicate an unknown quantum state to Ricardo Bell-state measurement Ricardo now has the state of photon 1 Unitary Transformation Lucy Unknown state: photon 1 2 3

Quantum Teleportation Total System of Three Particles

Quantum Teleportation Total System of Three Particles Which equals

Quantum Teleportation

But wait, there s more!

Classical Cryptography One-Time Pad Alice uses a one-time pad that she shares with Bob to encode a message. Bob uses his identical one-time pad to decode Alice s string Y 0 1 1 1 1 0 0 1 + 1 0 0 0 1 1 1 0 = 1 1 1 1 0 1 1 1 1 1 1 1 0 1 1 1-1 0 0 0 1 1 1 0 0 1 1 1 1 0 0 1 Y Not random + Completely random = Completely random Message + Secret key - Secret Key = Message Without access to the completely random key, it is impossible for Eve to decode the string

Classical Cryptography Quantum One-Time Pad Quantum Key Distribution Alice uses a one-time pad that she shares with Bob to encode a message. Bob uses his identical one-time pad to decode Alice s string Y 0 1 1 1 1 0 0 1 + 1 0 0 0 1 1 1 0 = 1 1 1 1 0 1 1 1 1 1 1 1 0 1 1 1-1 0 0 0 1 1 1 0 0 1 1 1 1 0 0 1 Y Not random + Completely random = Completely random Message + Secret key - Secret Key = Message Without access to the completely random key, it is impossible for Eve to decode the string

C. H. Bennett and G. Brassard, Quantum Cryptography: Public key distribution and coin tossing, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, 175 (1984). Quantum Key Distribution Detectors Entanglement Source HWP + PBS Alice Eve Bob Alice's Basis Choice: H/V H/V H/V H/V D/A D/A H/V D/A Alice's Measurements: H V H H A D V A Eve Basis Choice: D/A D/A D/A H/V D/A D/A D/A H/V Eve's Measurements: D A D H A D D V Bob's Basis Choice: D/A H/V H/V H/V D/A H/V H/V D/A Bob's Measurements: D V V H A V H A

Summary Entangled systems can t be completely described independently (not separable) Entanglement is a type of correlation between quantum systems that is stronger than any classical correlation, and violates local realism Entanglement is fairly easy to create in the lab Entanglement plays a central role in quantum information applications