Borsós, K.; Benedict, M. G. University of Szeged, Szeged, Hungary Animation of experiments in modern quantum physics Animation of experiments in modern.

Slides:



Advertisements
Similar presentations
Introduction to Quantum Teleportation
Advertisements

Quantum Computation and Quantum Information – Lecture 2
Quantum Computing MAS 725 Hartmut Klauck NTU
Christian Schaffner CWI Amsterdam, Netherlands Position-Based Quantum Cryptography: Impossibility and Constructions Seminar Eindhoven, Netherlands Wednesday,
1 quantum teleportation David Riethmiller 28 May 2007.
A first meeting with Bell’s Experiments Valerio Scarani Centre for Quantum Technologies & Department of Physics, NUS.
Quantum Computing MAS 725 Hartmut Klauck NTU
6/9/2015Bell's Theorem1 Spooky Action at a Distance Bell’s Theorem and the Demise of Local Reality Natalia Parshina Peter Johnson Josh Robertson Denise.
Universal Optical Operations in Quantum Information Processing Wei-Min Zhang ( Physics Dept, NCKU )
Quantum Entanglement and Bell’s Inequalities Kristin M. Beck and Jacob E. Mainzer Demonstrating quantum entanglement of photons via the violation of Bell’s.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Princeton University COS 433 Cryptography Fall 2007 Boaz Barak COS 433: Cryptography Princeton University Fall 2007 Boaz Barak Lecture 12: Idiot’s Guide.
EPR – pair usage in the quantum teleportation The Question was: Is the Quantum Mechanical Description of Reality Actually Complete?
Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement Chui-Ping Yang, Shih-I Chu, Siyuan Han Physical Review.
Princeton University COS 433 Cryptography Fall 2007 Boaz Barak COS 433: Cryptography Princeton University Fall 2007 Boaz Barak Lecture 12: Idiot’s Guide.
CSEP 590tv: Quantum Computing
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Teleportation. 2 bits Teleportation BELL MEASUREMENT.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum information and the monogamy of entanglement Aram Harrow (MIT) Brown SUMS March 9, 2013.
Experimental Quantum Teleportation Quantum systems for Information Technology Kambiz Behfar Phani Kumar.
Study and characterisation of polarisation entanglement JABIR M V Photonic sciences laboratory, PRL.
Quantum Superposition, Quantum Entanglement and Quantum Technologies
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Alice and Bob’s Excellent Adventure
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Institute of Technical Physics Entanglement – Beamen – Quantum cryptography The weird quantum world Bernd Hüttner CPhys FInstP DLR Stuttgart.
In 1887,when Photoelectric Effect was first introduced by Heinrich Hertz, the experiment was not able to be explained using classical principles.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
QUANTUM TELEPORTATION
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Steering witnesses and criteria for the (non-)existence of local hidden state (LHS) models Eric Cavalcanti, Steve Jones, Howard Wiseman Centre for Quantum.
CHAPTER 15: Quantum cryptography
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Quantum Dense coding and Quantum Teleportation
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
1 quantum mysteries again! quantum mysteries again! classical vs. quantum correlations ‘ quantum mechanics is weird” N. Bohr Bell’s inequality? QM VIOLATES.
What is Qu antum In formation and T echnology? Prof. Ivan H. Deutsch Dept. of Physics and Astronomy University of New Mexico Second Biannual Student Summer.
Quantum mechanical phenomena. The study between quanta and elementary particles. Quanta – an indivisible entity of a quantity that has the same value.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Bell tests with Photons Henry Clausen. Outline:  Bell‘s theorem  Photon Bell Test by Aspect  Loopholes  Photon Bell Test by Weihs  Outlook Photon.
1 entanglement-quantum teleportation entanglement-quantum teleportation entanglement (what is it?) quantum teleportation (intuitive & mathematical) ‘ quantum.
Efficiency of Multi-Qubit W states in Information Processing Atul Kumar IPQI-2014 IIT Jodhpur
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
The EPR Paradox, Bell’s inequalities, and its significance By: Miles H. Taylor.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
A1 “BASIC QUANTUM MECHANICS, AND SOME SURPRISING CONSEQUENCES” Anthony J. Leggett Department of Physics University of Illinois at Urbana-Champaign.
Spontaneous Parametric Down Conversion and The Biphoton
Secret keys and random numbers from quantum non locality Serge Massar.
Lecture from Quantum Mechanics. Marek Zrałek Field Theory and Particle Physics Department. Silesian University Lecture 11.
Non-locality and quantum games Dmitry Kravchenko University of Latvia Theory days at Jõulumäe, 2008.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
COMPSCI 290.2: Computer Security
Bell's inequality for a single measurement within EPR paradox.
George E.A. Matsas Instituto de Física Teórica/Unesp
Quantum Teleportation
Quantum Teleportation
On one set of runs (1“A,” 2 “C”) can measure correlation of A and C
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Experimental Quantum Teleportation*
Presentation transcript:

Borsós, K.; Benedict, M. G. University of Szeged, Szeged, Hungary Animation of experiments in modern quantum physics Animation of experiments in modern quantum physics Animations of three famous quantum experiments are presented. 1)The violation of Bell inequalities with entangled photons, 2) Quantum-teleportation of a photon polarization state, 3) Secret key (BB84) generation for quantum-cryptography. The animations are to be used as demonstrations complementing lectures in modern Quantum Mechanics and/or Quantum Informatics. The following 9 slides sketch the background. Clicking on the title, or on the text of the last slide starts the animation

Polarization of photons Calcite α A- A+ (A-, α )=cos α P(A-)=cos 2 α A+ A- Eigendirections of apparatus A A (A+, α )=cos(90- α )=sin α P(A+)=sin 2 α

Calcite B+ B- Different eigendirections belong to B B

EPR experiment with photon pairs Source of photon pairs Calcite Strict correlation between the two outputs. We need not even measure on the left if we know the result on the right. But we can measure incompatible quantities (observaables) on the two sides: Source of photon pairs Calcite B- A+ A- AA A B B+ either or

Presentation of a Bell inequality N(A+,C-) < N(B+,C-) + N(A+,B-)

We cannot measure two different properties on the same particle, because measurment changes the state. Therefore we measure on pairs flying in different directions. The orientation of the crystal A, B or C is chosen randomly. N(A+,C-) < N(B+,C-) + N(A+,B-) Bell N (A+,C+) < N (B+,C+) + N (A+,B+) Bold N is the number of measured pairs. E.g N (A+,C+) the number of pairs with outcome A+ on the left, and C+ on the right. This can be measured! :

Bell: N(A+,C+) < N(B+,C+) + N(A+,B+) Quant.Mech : P(A+,C+) = Bell P(A+,C+) < P(B+,C+) + P(A+,B+) P(B+,C+ )= P(A+,B+) = Q.M. violates Bell inequalities!

BB84 cryptography

Teleportation experiment Innsbruck experiment The unknown state to be teleported is carried by photon (1): |   1 = (  | ↔  1 +  | ↕  1 ), with certain coefficients  and  : |  | 2 + |  | 2 = 1 EPR-pair of photons: numbered 2 and 3 are created from a BBO crystal

|  tot  = |   1  |  -  23 = (  | ↔  1 +  | ↕  1 )  (1/√2)( | ↔  2 | ↕  3 - | ↕  2 | ↔  3 )= |  tot  = (1/√2)[ (  | ↔  3 -  | ↕  3 ) |  +  12 - (  | ↔  3 +  | ↕  3 ) |  -  12 – + (  | ↕  3 +  | ↔  3 ) |  +  12 + (  | ↕  3 -  | ↔  3 ) |  -  12 Photon (1) goes through a polarizer which establishes a polarization direction, then goes to Alice. Photon (3) arrives to Alice. Its entangled pair (3) goes to Bob The joint state of (1) and (2) is measured by D1 and D2 at Alice The two detectors have 4 different output results 0,1,2,3. The result is communicated to Bob through a classical channel. Bob performs an appropriate (unitary) transformation on photon (3) depending on the message he received. The resulting state of (3) will be identical to the state of (1it was. Teleportation formalism

Animation Bell inequalities Quantum Cryptography Teleportation