Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &

Slides:



Advertisements
Similar presentations
Introduction to Quantum Teleportation
Advertisements

Quantum Cryptography Post Tenebras Lux!
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Quantum data locking, enigma machines and entropic uncertainty relations Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro,
Trojan-horse attacks on practical continuous-variable quantum key distribution systems Imran Khan, Nitin Jain, Birgit Stiller, Paul Jouguet, Sébastien.
Modern Physics 5/10/11 Spring 2011 Ben Miller, Alexander DeCarli, Kevin Shaw.
Ilja Gerhardt QUANTUM OPTICS CQT GROUP Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Entanglement-based Free.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Universal Optical Operations in Quantum Information Processing Wei-Min Zhang ( Physics Dept, NCKU )
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Quantum Entanglement David Badger Danah Albaum. Some thoughts on entanglement... “Spooky action at a distance.” -Albert Einstein “It is a problem that.
Future Challenges in Long-Distance Quantum Communication Jian-Wei Pan Hefei National Laboratory for Physical Sciences at Microscale, USTC and Physikalisches.
Deterministic teleportation of electrons in a quantum dot nanostructure Deics III, 28 February 2006 Richard de Visser David DiVincenzo (IBM, Yorktown Heights)
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Single Photon Emitters and their use in Quantum Cryptography Presentation by: Bram Slachter Supervision: Dr. Ir. Caspar van der Wal.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 16 (3/31/2014) Slide Introduction to Quantum Optics.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Security of practical quantum cryptography with heralded single photon sources Mikołaj Lasota 1, Rafał Demkowicz-Dobrzański 2, Konrad Banaszek 2 1 Nicolaus.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Jian-Wei Pan Decoherence-free sub-space and quantum error-rejection Jian-Wei Pan Lecture Note 7.
Witnessing Quantum Coherence IWQSE 2013, NTU Oct. 15 (2013) Yueh-Nan Chen ( 陳岳男 ) Dep. of Physics, NCKU National Center for Theoretical Sciences (South)
Trondheim 2003 NTNU Vadim Makarov Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Practical Aspects of Quantum Coin Flipping Anna Pappa Presentation at ACAC 2012.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 16 (3/31/2014) Slide Introduction to Quantum Optics.
Blake Morell Daniel Bowser Trenton Wood. Contents Background Experimental Design & Outcome Implications Future Applications.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 6 (2/5/2014) Slide Introduction to Quantum Optics &
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 3 (1/27/2014) Slide Introduction to Quantum Optics.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Information Science The size of transistors decreases by half every eighteen months Intel’s 20 and 45 nm transistor Laser MRI Information Theory.
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 16 (3/31/2014) Slide Introduction to Quantum Optics.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 10 (2/16/2014) Slide Introduction to Quantum Optics.
FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important.
Quantum Optics II – Cozumel December 2004 Quantum key distribution with polarized coherent states Quantum Optics Group Instituto de Física “Gleb Wataghin”
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 16 (3/31/2014) Slide Introduction to Quantum Optics.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 16 (3/31/2014) Slide Introduction to Quantum Optics.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Purdue University Spring 2016 Prof. Yong P. Chen Lecture 18 (3/24/2016) Slide Introduction to Quantum Photonics.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Osamu Hirota Quantum ICT Research Institute Tamagawa University, Tokyo
J. Miranda University of Ottawa 21 November 2003
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Lecture 21 Photon Statistics (detecting sub-poissoinian light) application 1 of single photons: quantum communication Read: FQ5, FQ12.
Quantum Cryptography Quantum Teleportation
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Presentation transcript:

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Lecture 5 Quantum Information 1: Quantum Communication & Quantum Cryptography Note: HWK2 posted on course web, due next Wed 2/12 in class

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Course Outline Part 1: basic review: Optics+Quantum; Part 2: Basic Light- matter interaction; laser; Part 3: Quantum Optics of photons Part 4: More advanced light-matter interaction Part 5: Quantum information/photonics/ applications Subject to change; Check updates on course web/wiki

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) This Lecture Quantum Information Science 1: quantum (secure) communication & quantum cryptography (photon based) (cf. *FQ Chap12) Shapiro-Wong Group: MIT course on quantum communication Learn more: M. Le Blanc: A Short Introduction to Quantum Information and Quantum Computation Chuang & Nielson, QCQI David Mermin, Quantum Computer Science: An Introduction Good to reach on beach or train: J. Dowling’s Schrodinger’s Killer App L. Susskind, Quantum Mechanics: The Theoretical Minimum (see also Stanford course lectures/videos of same title) N. Gisin et al. Rev. Mod. Phys. 74, 145–195 (2002) J.W.Pan Lecture:

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) From :C. Bennett lecture “Information is quantum” [highly recommended to read] See also watch?v=tKfyw-uAgac

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”)

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Classical Cryptography (Secure Communication) ENIGMA RSA RSA-100 = RSA-100= × Earn $200,000 to factorize RSA-2048 Later quantum computing will break this

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) The purpose of quantum cryptography is to provide a reliable method for transmitting a secret key and knowing that no-one has intercepted it along the way. The method is founded on the fundamental laws of quantum physics, and the process of sharing a secret key in a secure way is called quantum key distribution. Two basic schemes for quantum cryptography, using basic principles of quantum measurements on single particles (photons) The properties of entangled photon properties of entangled states.

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Classical communication & evesdropper

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Photon polarization qbits

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Review 2-state QM (d=2 Hilbert space) R 2 representation

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Quantum No Cloning Theorem cse599d/06wi/lecturenotes4.pdf

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) QKD by BB84 Protocol (ex.12.3) Interesting read on B&B (also discovered q. teleportation)

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”)

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”)

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”)

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Reality Complications Missing photons.. Reduce # of useful bits Birefringence (change polarization during transmission) Detector dark counts (false click even with missing photons) address by (classical) Error correction Reduced key length General Read: “Quantum cryptography: Seeking absolute security”

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Hardware requirements/complications (reliable) Single photon source [multiphoton emission compromises security by giving Eve more chances to evade detection (both Eve’s detectors click  knows basis wrong)] –Attenuated single-freq laser: photon Poisson distr, subject to multi-photons –“on-demand” single photon source [current research] (will revisit this when discussing QO) (reliable) single photon detectors, polarization rotators, medium

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Transmission Media for quantum communication/cryptography Subject to environmental noise (air turb. stray light etc.) Subject to loss and birefringence (at long distance) Phase (vs polarization) encoding

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”)

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) See also : (  potential essay topic, explain how these work, or market analysis)

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Quantum communication in space (use entanglement) (  another example potential essay topic, explain how this work)

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) QKD based on entanglement (Eckert protocol)

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Entanglement based QKD Entanglement’s Benefit Survives an Entanglement-Breaking Channel Zheshen Zhang, Maria Tengner, Tian Zhong, Franco N. C. Wong, and Jeffrey H. Shapiro Phys. Rev. Lett. 111, (2013) Viewpoint: Don’t Cry over Broken Entanglement A secure communication channel that relies on quantum entanglement survives despite the noisy break up of the entanglement itself. Related to idea of “quantum illumination” (entanglement enhanced quantum sensing/detection) S. Lloyd, “Enhanced Sensitivity of Photodetection via Quantum Illumination,” Science 321, 1463 (2008).Science 321, 1463 (2008) A modern example

Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics & Quantum Photonics PHYS522 ECE695 (“Coherent Optics & Quantum Electronics”) Next Lecture (5): Light Matter Interaction --- Radiative Transition in Atoms FQ Chap 4