




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、experimental demonstration of counterfactual quantum communicationuniversity of science and technology of china第十五届全国量子光学会议广州, 2012.07.15kai chenin collaboration with yang liu, lei ju, xiao-lei liang, shi-biao tang, guo-liang shen tu, lei zhou, cheng-zhi peng, teng-yun chen, zeng-bing chen, and jian
2、-wei panmotivations and backgroundcqc schemeexperimental cqccounterfactual quantum communicationoutlooksecure communicationalicebobeve classical cryptography modern cryptography rsa, rabin, diffie-hellman, elgamal etc. aes, md5 etc. quantum key distribution (quantum cryptography) bb84 e91 continuous
3、 variable dps based (differential phase shift quantum key distribution )classical and quantum cryptographyapplications of counterfactual quantum phenomenathe presence of a non-t r a n s m i t t i n g o b j e c t i s ascertained seemingly without interacting with it, i.e., with no photon absorbed or
4、scattered by the object.theory: a.c. elitzur, l. vaidman, found. phys. 23, 987 (1993). experiment: p. g. kwiat et al., phys. rev. lett. 83, 4725 (1999).“interaction-free” quantum interrogation measurements applications of counterfactual quantum phenomenacounterfactual quantum computation through qua
5、ntum interrogationtheory: g. mitchison, r. jozsa, proc. r. soc. lond. a 457, 1175 (2001).experiment: o. hosten, m.t. rakher, j.t. barreiro, n.a. peters, p.g. kwiat, nature 439, 949 (2006).counterfactual computation is accomplished by putting the computer in a superposition of running and not running
6、 states, and then interfering the two histories. conditional on the as-yet-unknown outcome of the computation, it is sometimes possible to counterfactually infer information about the solution.cqc schemeexperimental cqccounterfactual quantum communicationoutlookmotivations and backgrounda novel new
7、scheme!based on orthogonal quantum statein normal scheme, the security is based on non- orthogonal quantum states, e.g., bb84 protocolenable to generate keys when “no photon” travelsin normal paradigm for communication, keys can only be generated when photons travel across two stationscounterfactual
8、 quantum communicationt.g. noh, phys. rev. lett. 103, 230501 (2009)t.g. noh, phys. rev. lett. 103, 230501 (2009)cqc schemet.g. noh, phys. rev. lett. 103, 230501 (2009)cqc schemeprotocol:1. a triggering single-photon source s, which emits a short optical pulse containing a single photon. the polariza
9、tion is chosen at random to have either horizontal polarization h representing the bit value 0, or vertical polarization v representing 1.2. bob also randomly chooses one of the two polarizations representing his bit value. bob blocks the optical path b of the single-photon pulse if the polarization
10、 of the pulse is identical to his polarization. the blocking of optical path b in such a polarization-selective way can be suitably accomplished, for instance, using the setup depicted in bobs site.3. on the other hand, if the single-photon pulse has a polarization orthogonal to bobs, its optical pa
11、th b is not affected by the sw. hence, a split pulse travelling through path b may be reflected by the fm in bobs site and is returned back to the bs.4. the interferometer can be stabilized using feedback control.cqc schemeanalysis:1.if alices and bobs bit values differ, the photon leaves the interf
12、erometer going toward detector d2 with certainty owing to the interference effect. 2. if, however, alices and bobs bit values are equal, the split pulse in path b is blocked by detector d3 and the interference is destroyed. in this case, there are three possibilities for a single photon: (i) the pho
13、ton travels through path a and is detected at detector d1 with probability rt; (ii) the photon travels through path a and is detected at detector d2 with probability r2; (iii) the photon goes to bob through path b and is detected at detector d3 with probability t. 3. after the detection of a photon
14、is completed, alice and bob tell each other whether or not each of the detectors clicked. if d1 clicks alone, alice compares the detected polarization state to her initial polarization state: if they are consistent, she does not reveal any information about the polarization states; otherwise, she al
15、so announces her measurement results. alice and bob can then establish an identical bit string (a sifted key) by selecting only the events for which d1 alone detects a photon with a correct final polarization state. they disregard all other events.4. monitoring: if d2 or d3 clicks, they also announc
16、e both the detected polarization state and the initial polarization states that were chosen. this is intended to detect eves intervention by monitoring the correct operation of the interferometer. no-cloning principle of orthogonal states in a composite system which consists of two subsystems.if red
17、uced density matrices of an available system are non orthogonal and if the other subsystem is not allowed access, it is impossible to distinguish two orthogonal quantum states without disturbing them.cqc-why is it secure?t.g. noh, phys. rev. lett. 103, 230501 (2009)according to the chosen bit value,
18、 the initial quantum state after the bs is given by one of the two orthogonal states in our cqc schemequantum states utilizeda sifted key is created by selecting only the events during which a single photon is detected at d1. in ideal cases, the photons used to create a sifted key have not travelled
19、 through path b but only through path a (if the photons have traveled through the path b, they must have been detected at d3). the task of a secret key distribution, therefore, can be accomplished without any photon carrying secret information being sent through the quantum channel (path b). a photo
20、n that carries secret information has been confined from its birth to death within alices secure station, and eve can never access the photon. bob in fact extracts a secret key from the non-detection events.cqc-why counterfactual?experimental cqccqc schemecounterfactual quantum communicationoutlookm
21、otivations and background full implementation with table and 1 km fiber spoolexperimental setupsingle mode fiber up to 1 km lengthusing on-shelf componentssimilar condition with real world environmentpolarization adjustment is capableoriginal experiment setup and implementationmonitor all detect eve
22、ntsimplementation of experiment random data generation modulation sequential logicmassive data and logical controlspecial designed fpgafast analog signal (from fpga)high speed switch (100 ns)proper tie sequencesfast pulse switch bob needs to choose fastly “which pulse to detect” key to enhance syste
23、m working frequencybasis for successful realizationfiber length estimation & adjusting (10cm)optical delay line (0.1 mm)fiber stretcher (0.01 m)accurate optical delay adjustment accurate optical delay adjustment(98%)optical misalignment of about 1%contributing about 3.8% error ratedetector events fo
24、r keys are much smaller than that of othersextinction ratio of optical switch (17 db)contributing about 2% error ratedetector dark count rate (1e-5)contributing to about 0.5% error rate5.8% total 3.8%+2%+0.5%error analysisoutlookcqc schemecounterfactual quantum communicationexperimental cqcmotivatio
25、ns and backgroundunconditional security with single photon sourcez.q. yin et al., pra 82, 042335 (2010)method to enhance efficiencyy. sun et al., pra 82, 052318 (2010)an experiment to modified schemem. ren et al., laser physics 21, 755 (2011)a simple desktop experimentg. brida et al., laser physics
26、letters 9, 247 (2012)direct counterfactual quantum communicationh. salih et al., /abs/1206.2042v2 (2012) current status of cqc n novel scheme of secure key distribution: counterfactual quantum communication realizationliu et al., to appear in prl (2012)r demonstrations implemented wit
27、h a desktop setup, and with 1 km fiber cable, respectively.r developments of high-precision active feed-back control technology for maintaining real-time stabilization of michelson-type interferometer with high visibilities of greater than 98%, which ensures high-speed and steady generation of keys
28、if alices and bobs choices for bit values does not destroy interference, only detector d2 will click due to interference effect. if detector d1 clicks, alices and bobs choices for polarizations will destroy interference. particularly, the photon does not travel along path b (counterfactual).summary
29、and outlookwe have achieved the first faithfully proof-in-principle demonstrations realization of counterfactual quantum communication, in which process information carriers are seemingly not traveled in the quantum channel. from a desktop test to a setup with 1 km fiber cable, we have given a confi
30、rming answer for feasibility of cqcone can infer that the mere possibility for signal particles to be transmitted is sufficient to create a secret key. we remark that, to ensure such possibility, partial signal particles still need to randomly travel along quantum channel for detection of possible e
31、avesdropping. summary and outlooksuch a implementation by exploiting counterfactual effect has revealed new surprising physics behind quantum mechanics, in addition to existing experimental demonstrations of “interaction-free” measurements, and counterfactual quantum computation.active feed-back con
32、trol technology for maintaining real-time stabilization of michelson-type interferometer. tailored optical, controlling electronics designs, and special optical switch are made and chosen for attaining high visibilities.long-distance realization are ahead with by utilizing state-of-the-art technolog
33、y.other cqc schemes demonstrationssummary and outlook陈凯中国科学技术大学mobile:el. complete analysis of the qkd security, including various experimental imperfections, is very challenging and open for future studyweak coherent pulses realizations:eve cannot determine the number of photons in each pulse because she is not allowed to access path a. it is impossible for eve to measure even the number of photons travelling through the quantum channel (path b), provided that she does not disturb the states. eve ob
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025-2030中国创新药研发趋势及国际合作模式与投资风险评估报告
- 2025至2030咖啡伴侣行业产业运行态势及投资规划深度研究报告
- 国际投标书5篇
- 2025至2030铝合金汽车零部件行业发展趋势分析与未来投资战略咨询研究报告
- 第六章 质量与密度 单元测试卷 (含答案)2025-2026学年人教版(2024)八年级物理上册
- 塔里木油田分公司高校毕业生招聘考试真题2024
- 2025年上海市测绘院公开招聘高层次专业技术人员模拟试卷及1套参考答案详解
- 2025年海洋能源利用:海水淡化反渗透膜技术创新在海洋波浪能中的应用
- 2025北京海关所属事业单位招聘5人模拟试卷及答案详解一套
- 2025广东清远市连州市教育局招聘高中教师10人(编制)模拟试卷及答案详解(各地真题)
- 2025河北水发节水有限公司公开招聘工作人员16人笔试参考题库附答案解析
- 新版中华民族共同体概论课件第十二讲民族危亡与中华民族意识觉醒(1840-1919)-2025年版
- 2025-2026学年人教版(2024)九年级物理全册第十四章 内能的利用(单元同步检测练习)(含答案)
- 第1课时 10的加、减法(教学设计)-2024-2025学年一年级上册数学人教版
- 2025至2030中国聚烯烃行业项目调研及市场前景预测评估报告
- 夜间红外成像算法优化-洞察及研究
- 2025四川达州宣汉县国有资产管理服务中心县属国有企业招聘劳动合同职工26人笔试历年参考题库附带答案详解
- 外国戏剧史课件
- (正式版)DB15∕T 4179-2025 《输氢管道工程施工规范》
- 新教科版小学1-6年级科学需做实验目录
- WS/T 102-1998临床检验项目分类与代码
评论
0/150
提交评论