




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、experimental demonstration of counterfactual quantum communicationuniversity of science and technology of china第十五届全国量子光学会议广州, 2012.07.15kai chenin collaboration with yang liu, lei ju, xiao-lei liang, shi-biao tang, guo-liang shen tu, lei zhou, cheng-zhi peng, teng-yun chen, zeng-bing chen, and jian
2、-wei panmotivations and backgroundcqc schemeexperimental cqccounterfactual quantum communicationoutlooksecure communicationalicebobeve classical cryptography modern cryptography rsa, rabin, diffie-hellman, elgamal etc. aes, md5 etc. quantum key distribution (quantum cryptography) bb84 e91 continuous
3、 variable dps based (differential phase shift quantum key distribution )classical and quantum cryptographyapplications of counterfactual quantum phenomenathe presence of a non-t r a n s m i t t i n g o b j e c t i s ascertained seemingly without interacting with it, i.e., with no photon absorbed or
4、scattered by the object.theory: a.c. elitzur, l. vaidman, found. phys. 23, 987 (1993). experiment: p. g. kwiat et al., phys. rev. lett. 83, 4725 (1999).“interaction-free” quantum interrogation measurements applications of counterfactual quantum phenomenacounterfactual quantum computation through qua
5、ntum interrogationtheory: g. mitchison, r. jozsa, proc. r. soc. lond. a 457, 1175 (2001).experiment: o. hosten, m.t. rakher, j.t. barreiro, n.a. peters, p.g. kwiat, nature 439, 949 (2006).counterfactual computation is accomplished by putting the computer in a superposition of running and not running
6、 states, and then interfering the two histories. conditional on the as-yet-unknown outcome of the computation, it is sometimes possible to counterfactually infer information about the solution.cqc schemeexperimental cqccounterfactual quantum communicationoutlookmotivations and backgrounda novel new
7、scheme!based on orthogonal quantum statein normal scheme, the security is based on non- orthogonal quantum states, e.g., bb84 protocolenable to generate keys when “no photon” travelsin normal paradigm for communication, keys can only be generated when photons travel across two stationscounterfactual
8、 quantum communicationt.g. noh, phys. rev. lett. 103, 230501 (2009)t.g. noh, phys. rev. lett. 103, 230501 (2009)cqc schemet.g. noh, phys. rev. lett. 103, 230501 (2009)cqc schemeprotocol:1. a triggering single-photon source s, which emits a short optical pulse containing a single photon. the polariza
9、tion is chosen at random to have either horizontal polarization h representing the bit value 0, or vertical polarization v representing 1.2. bob also randomly chooses one of the two polarizations representing his bit value. bob blocks the optical path b of the single-photon pulse if the polarization
10、 of the pulse is identical to his polarization. the blocking of optical path b in such a polarization-selective way can be suitably accomplished, for instance, using the setup depicted in bobs site.3. on the other hand, if the single-photon pulse has a polarization orthogonal to bobs, its optical pa
11、th b is not affected by the sw. hence, a split pulse travelling through path b may be reflected by the fm in bobs site and is returned back to the bs.4. the interferometer can be stabilized using feedback control.cqc schemeanalysis:1.if alices and bobs bit values differ, the photon leaves the interf
12、erometer going toward detector d2 with certainty owing to the interference effect. 2. if, however, alices and bobs bit values are equal, the split pulse in path b is blocked by detector d3 and the interference is destroyed. in this case, there are three possibilities for a single photon: (i) the pho
13、ton travels through path a and is detected at detector d1 with probability rt; (ii) the photon travels through path a and is detected at detector d2 with probability r2; (iii) the photon goes to bob through path b and is detected at detector d3 with probability t. 3. after the detection of a photon
14、is completed, alice and bob tell each other whether or not each of the detectors clicked. if d1 clicks alone, alice compares the detected polarization state to her initial polarization state: if they are consistent, she does not reveal any information about the polarization states; otherwise, she al
15、so announces her measurement results. alice and bob can then establish an identical bit string (a sifted key) by selecting only the events for which d1 alone detects a photon with a correct final polarization state. they disregard all other events.4. monitoring: if d2 or d3 clicks, they also announc
16、e both the detected polarization state and the initial polarization states that were chosen. this is intended to detect eves intervention by monitoring the correct operation of the interferometer. no-cloning principle of orthogonal states in a composite system which consists of two subsystems.if red
17、uced density matrices of an available system are non orthogonal and if the other subsystem is not allowed access, it is impossible to distinguish two orthogonal quantum states without disturbing them.cqc-why is it secure?t.g. noh, phys. rev. lett. 103, 230501 (2009)according to the chosen bit value,
18、 the initial quantum state after the bs is given by one of the two orthogonal states in our cqc schemequantum states utilizeda sifted key is created by selecting only the events during which a single photon is detected at d1. in ideal cases, the photons used to create a sifted key have not travelled
19、 through path b but only through path a (if the photons have traveled through the path b, they must have been detected at d3). the task of a secret key distribution, therefore, can be accomplished without any photon carrying secret information being sent through the quantum channel (path b). a photo
20、n that carries secret information has been confined from its birth to death within alices secure station, and eve can never access the photon. bob in fact extracts a secret key from the non-detection events.cqc-why counterfactual?experimental cqccqc schemecounterfactual quantum communicationoutlookm
21、otivations and background full implementation with table and 1 km fiber spoolexperimental setupsingle mode fiber up to 1 km lengthusing on-shelf componentssimilar condition with real world environmentpolarization adjustment is capableoriginal experiment setup and implementationmonitor all detect eve
22、ntsimplementation of experiment random data generation modulation sequential logicmassive data and logical controlspecial designed fpgafast analog signal (from fpga)high speed switch (100 ns)proper tie sequencesfast pulse switch bob needs to choose fastly “which pulse to detect” key to enhance syste
23、m working frequencybasis for successful realizationfiber length estimation & adjusting (10cm)optical delay line (0.1 mm)fiber stretcher (0.01 m)accurate optical delay adjustment accurate optical delay adjustment(98%)optical misalignment of about 1%contributing about 3.8% error ratedetector events fo
24、r keys are much smaller than that of othersextinction ratio of optical switch (17 db)contributing about 2% error ratedetector dark count rate (1e-5)contributing to about 0.5% error rate5.8% total 3.8%+2%+0.5%error analysisoutlookcqc schemecounterfactual quantum communicationexperimental cqcmotivatio
25、ns and backgroundunconditional security with single photon sourcez.q. yin et al., pra 82, 042335 (2010)method to enhance efficiencyy. sun et al., pra 82, 052318 (2010)an experiment to modified schemem. ren et al., laser physics 21, 755 (2011)a simple desktop experimentg. brida et al., laser physics
26、letters 9, 247 (2012)direct counterfactual quantum communicationh. salih et al., /abs/1206.2042v2 (2012) current status of cqc n novel scheme of secure key distribution: counterfactual quantum communication realizationliu et al., to appear in prl (2012)r demonstrations implemented wit
27、h a desktop setup, and with 1 km fiber cable, respectively.r developments of high-precision active feed-back control technology for maintaining real-time stabilization of michelson-type interferometer with high visibilities of greater than 98%, which ensures high-speed and steady generation of keys
28、if alices and bobs choices for bit values does not destroy interference, only detector d2 will click due to interference effect. if detector d1 clicks, alices and bobs choices for polarizations will destroy interference. particularly, the photon does not travel along path b (counterfactual).summary
29、and outlookwe have achieved the first faithfully proof-in-principle demonstrations realization of counterfactual quantum communication, in which process information carriers are seemingly not traveled in the quantum channel. from a desktop test to a setup with 1 km fiber cable, we have given a confi
30、rming answer for feasibility of cqcone can infer that the mere possibility for signal particles to be transmitted is sufficient to create a secret key. we remark that, to ensure such possibility, partial signal particles still need to randomly travel along quantum channel for detection of possible e
31、avesdropping. summary and outlooksuch a implementation by exploiting counterfactual effect has revealed new surprising physics behind quantum mechanics, in addition to existing experimental demonstrations of “interaction-free” measurements, and counterfactual quantum computation.active feed-back con
32、trol technology for maintaining real-time stabilization of michelson-type interferometer. tailored optical, controlling electronics designs, and special optical switch are made and chosen for attaining high visibilities.long-distance realization are ahead with by utilizing state-of-the-art technolog
33、y.other cqc schemes demonstrationssummary and outlook陈凯中国科学技术大学mobile:el. complete analysis of the qkd security, including various experimental imperfections, is very challenging and open for future studyweak coherent pulses realizations:eve cannot determine the number of photons in each pulse because she is not allowed to access path a. it is impossible for eve to measure even the number of photons travelling through the quantum channel (path b), provided that she does not disturb the states. eve ob
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 学校目标化管理制度
- 学校里学生管理制度
- 学生小菜园管理制度
- 完善危机值管理制度
- 实体化公司管理制度
- 实验室仪器管理制度
- 审计清单式管理制度
- 家具厂环境管理制度
- 库房进出入管理制度
- 征收办公章管理制度
- 2025年广东省广州市南沙区中考二模道德与法治试题
- 2025届重庆市普通高中学业水平选择性考试预测历史试题(含答案)
- 2025-2030中国眼底照相机行业市场发展趋势与前景展望战略研究报告
- 2024年深圳市大鹏新区区属公办中小学招聘教师真题
- 人教版小学语文四年级下册作文范文2
- 大学语文试题及答案琴
- 实验题(7大类42题)原卷版-2025年中考化学二轮复习热点题型专项训练
- CJ/T 362-2011城镇污水处理厂污泥处置林地用泥质
- 红十字会资产管理制度
- 2025安全宣传咨询日活动知识手册
- T/CSPSTC 112-2023氢气管道工程施工技术规范
评论
0/150
提交评论