Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 17 de 17
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Proc Natl Acad Sci U S A ; 117(52): 33107-33116, 2020 Dec 29.
Artigo em Inglês | MEDLINE | ID: mdl-33310902

RESUMO

The celebrated Hong-Ou-Mandel effect is the paradigm of two-particle quantum interference. It has its roots in the symmetry of identical quantum particles, as dictated by the Pauli principle. Two identical bosons impinging on a beam splitter (of transmittance 1/2) cannot be detected in coincidence at both output ports, as confirmed in numerous experiments with light or even matter. Here, we establish that partial time reversal transforms the beam splitter linear coupling into amplification. We infer from this duality the existence of an unsuspected two-boson interferometric effect in a quantum amplifier (of gain 2) and identify the underlying mechanism as time-like indistinguishability. This fundamental mechanism is generic to any bosonic Bogoliubov transformation, so we anticipate wide implications in quantum physics.

2.
Nat Commun ; 7: 11720, 2016 05 31.
Artigo em Inglês | MEDLINE | ID: mdl-27241946

RESUMO

Entanglement distribution between distant parties is an essential component to most quantum communication protocols. Unfortunately, decoherence effects such as phase noise in optical fibres are known to demolish entanglement. Iterative (multistep) entanglement distillation protocols have long been proposed to overcome decoherence, but their probabilistic nature makes them inefficient since the success probability decays exponentially with the number of steps. Quantum memories have been contemplated to make entanglement distillation practical, but suitable quantum memories are not realised to date. Here, we present the theory for an efficient iterative entanglement distillation protocol without quantum memories and provide a proof-of-principle experimental demonstration. The scheme is applied to phase-diffused two-mode-squeezed states and proven to distil entanglement for up to three iteration steps. The data are indistinguishable from those that an efficient scheme using quantum memories would produce. Since our protocol includes the final measurement it is particularly promising for enhancing continuous-variable quantum key distribution.

3.
Phys Rev Lett ; 113(14): 140405, 2014 Oct 03.
Artigo em Inglês | MEDLINE | ID: mdl-25325624

RESUMO

In this Letter we exploit the recently solved conjecture on the bosonic minimum output entropy to show the optimality of Gaussian discord, so that the computation of quantum discord for bipartite Gaussian states can be restricted to local Gaussian measurements. We prove such optimality for a large family of Gaussian states, including all two-mode squeezed thermal states, which are the most typical Gaussian states realized in experiments. Our family also includes other types of Gaussian states and spans their entire set in a suitable limit where they become Choi matrices of Gaussian channels. As a result, we completely characterize the quantum correlations possessed by some of the most important bosonic states in quantum optics and quantum information.

4.
Phys Rev Lett ; 111(3): 030503, 2013 Jul 19.
Artigo em Inglês | MEDLINE | ID: mdl-23909302

RESUMO

We prove the equivalence of an arbitrary single-mode Gaussian quantum channel and a newly defined fiducial channel preceded by a phase shift and followed by a Gaussian unitary operation. This equivalence implies that the energy-constrained classical capacity of any single-mode Gaussian channel can be calculated based on this fiducial channel, which is furthermore simply realizable with a beam splitter, two identical single-mode squeezers, and a two-mode squeezer. In a large domain of parameters, we also provide an analytical expression for the Gaussian classical capacity, exploiting its additivity, and prove that the classical capacity cannot exceed it by more than 1/ln2 bits.

5.
Phys Rev Lett ; 110(3): 030502, 2013 Jan 18.
Artigo em Inglês | MEDLINE | ID: mdl-23373907

RESUMO

We prove the security of Gaussian continuous-variable quantum key distribution with coherent states against arbitrary attacks in the finite-size regime. In contrast to previously known proofs of principle (based on the de Finetti theorem), our result is applicable in the practically relevant finite-size regime. This is achieved using a novel proof approach, which exploits phase-space symmetries of the protocols as well as the postselection technique introduced by Christandl, Koenig, and Renner [Phys. Rev. Lett. 102, 020504 (2009)].

6.
Phys Rev Lett ; 108(11): 110505, 2012 Mar 16.
Artigo em Inglês | MEDLINE | ID: mdl-22540448

RESUMO

A long-standing open problem in quantum information theory is to find the classical capacity of an optical communication link, modeled as a Gaussian bosonic channel. It has been conjectured that this capacity is achieved by a random coding of coherent states using an isotropic Gaussian distribution in phase space. We show that proving a Gaussian minimum entropy conjecture for a quantum-limited amplifier is actually sufficient to confirm this capacity conjecture, and we provide a strong argument towards this proof by exploiting a connection between quantum entanglement and majorization theory.

7.
Phys Rev Lett ; 102(12): 120501, 2009 Mar 27.
Artigo em Inglês | MEDLINE | ID: mdl-19392258

RESUMO

We prove that Gaussian operations are of no use for protecting Gaussian states against Gaussian errors in quantum communication protocols. Specifically, we introduce a new quantity characterizing any single-mode Gaussian channel, called entanglement degradation, and show that it cannot decrease via Gaussian encoding and decoding operations only. The strength of this no-go theorem is illustrated with some examples of Gaussian channels.

8.
Phys Rev Lett ; 102(13): 130501, 2009 Apr 03.
Artigo em Inglês | MEDLINE | ID: mdl-19392336

RESUMO

A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne detection is introduced and shown to attain higher secret key rates over a noisy line than any other one-way Gaussian protocol. This increased resistance to channel noise can be understood as resulting from purposely adding noise to the signal that is converted into the secret key. This notion of noise-enhanced tolerance to noise also provides a better physical insight into the poorly understood discrepancies between the previously defined families of Gaussian protocols.

9.
Phys Rev Lett ; 98(3): 030503, 2007 Jan 19.
Artigo em Inglês | MEDLINE | ID: mdl-17358671

RESUMO

An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigated experimentally. By varying the interception fraction, one can implement a family of attacks where the eavesdropper totally controls the channel parameters. In general, such attacks add excess noise in the channel, and may also result in non-Gaussian output distributions. We implement and characterize the measurements needed to detect these attacks, and evaluate experimentally the information rates available to the legitimate users and the eavesdropper. The results are consistent with the optimality of Gaussian attacks resulting from the security proofs.

10.
Phys Rev Lett ; 97(19): 190503, 2006 Nov 10.
Artigo em Inglês | MEDLINE | ID: mdl-17155606

RESUMO

A fully general approach to the security analysis of continuous-variable quantum key distribution (CV-QKD) is presented. Provided that the quantum channel is estimated via the covariance matrix of the quadratures, Gaussian attacks are shown to be optimal against all collective eavesdropping strategies. The proof is made strikingly simple by combining a physical model of measurement, an entanglement-based description of CV-QKD, and a recent powerful result on the extremality of Gaussian states [M. M. Wolf, Phys. Rev. Lett. 96, 080502 (2006)10.1103/PhysRevLett.96.080502].

11.
Phys Rev Lett ; 96(16): 163602, 2006 Apr 28.
Artigo em Inglês | MEDLINE | ID: mdl-16712228

RESUMO

We propose and experimentally realize a new scheme for universal phase-insensitive optical amplification. The presented scheme relies only on linear optics and homodyne detection, thus circumventing the need for nonlinear interaction between a pump field and the signal field. The amplifier demonstrates near optimal quantum noise limited performance for a wide range of amplification factors.

12.
Phys Rev Lett ; 93(18): 180501, 2004 Oct 29.
Artigo em Inglês | MEDLINE | ID: mdl-15525141

RESUMO

A scheme for the optimal Gaussian cloning of coherent light states at the interface between light and atoms is proposed. The distinct feature of this proposal is that the clones are stored in an atomic quantum memory, which is important for applications in quantum communication. The atomic quantum cloning machine requires only a single passage of the light pulse through the atomic ensembles followed by the measurement of a light quadrature and an appropriate feedback, which renders the protocol experimentally feasible. An alternative protocol, where one of the clones is carried by the outgoing light pulse, is discussed in connection with eavesdropping on quantum key distribution.

13.
Phys Rev Lett ; 93(6): 063601, 2004 Aug 06.
Artigo em Inglês | MEDLINE | ID: mdl-15323630

RESUMO

We propose a scheme for measuring the squeezing, purity, and entanglement of Gaussian states of light that does not require homodyne detection. The suggested setup needs only beam splitters and single-photon detectors. Two-mode entanglement can be detected from coincidences between photodetectors placed on the two beams.

14.
Phys Rev Lett ; 92(4): 047905, 2004 Jan 30.
Artigo em Inglês | MEDLINE | ID: mdl-14995411

RESUMO

A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

15.
Nature ; 421(6920): 238-41, 2003 Jan 16.
Artigo em Inglês | MEDLINE | ID: mdl-12529636

RESUMO

Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1 dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.

16.
Phys Rev Lett ; 89(8): 080402, 2002 Aug 19.
Artigo em Inglês | MEDLINE | ID: mdl-12190449

RESUMO

We construct Greenberger-Horne-Zeilinger (GHZ) contradictions for three or more parties sharing an entangled state, the dimension of each subsystem being an even integer d. The simplest example that goes beyond the standard GHZ paradox (three qubits) involves five ququats (d=4). We then examine the criteria that a GHZ paradox must satisfy in order to be genuinely M partite and d dimensional.

17.
Phys Rev Lett ; 88(12): 127902, 2002 Mar 25.
Artigo em Inglês | MEDLINE | ID: mdl-11909502

RESUMO

We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...