07.06.2006 Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.

Slides:



Advertisements
Similar presentations
Introduction to Quantum Teleportation
Advertisements

Vlatko Vedral Oxford and Singapore Extreme nonlocality with a single photon.
Quantum Computing MAS 725 Hartmut Klauck NTU
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
1 quantum teleportation David Riethmiller 28 May 2007.
Ilja Gerhardt QUANTUM OPTICS CQT GROUP Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Entanglement-based Free.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
GHZ correlations are just a bit nonlocal Carlton M. Caves University of New Mexico caves Seminar date Please join the APS Topical.
Bell’s inequalities and their uses Mark Williamson The Quantum Theory of Information and Computation
Quantum Computing MAS 725 Hartmut Klauck NTU
1 Multiphoton Entanglement Eli Megidish Quantum Optics Seminar,2010.
The quantum signature of chaos through the dynamics of entanglement in classically regular and chaotic systems Lock Yue Chew and Ning Ning Chung Division.
Universal Optical Operations in Quantum Information Processing Wei-Min Zhang ( Physics Dept, NCKU )
Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement Chui-Ping Yang, Shih-I Chu, Siyuan Han Physical Review.
Future Challenges in Long-Distance Quantum Communication Jian-Wei Pan Hefei National Laboratory for Physical Sciences at Microscale, USTC and Physikalisches.
Interactive Proofs For Quantum Computations Dorit Aharonov, Michael Ben-Or, Elad Eban School of Computer Science and Engineering The Hebrew University.
Deterministic teleportation of electrons in a quantum dot nanostructure Deics III, 28 February 2006 Richard de Visser David DiVincenzo (IBM, Yorktown Heights)
CSEP 590tv: Quantum Computing
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Experimental Quantum Teleportation Quantum systems for Information Technology Kambiz Behfar Phani Kumar.
Study and characterisation of polarisation entanglement JABIR M V Photonic sciences laboratory, PRL.
Quantum Error Correction Jian-Wei Pan Lecture Note 9.
QUANTUM ENTANGLEMENT AND IMPLICATIONS IN INFORMATION PROCESSING: Quantum TELEPORTATION K. Mangala Sunder Department of Chemistry IIT Madras.
Alice and Bob’s Excellent Adventure
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Institute of Technical Physics Entanglement – Beamen – Quantum cryptography The weird quantum world Bernd Hüttner CPhys FInstP DLR Stuttgart.
In 1887,when Photoelectric Effect was first introduced by Heinrich Hertz, the experiment was not able to be explained using classical principles.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
University of Gdańsk, Poland
QUANTUM TELEPORTATION
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Jian-Wei Pan Decoherence-free sub-space and quantum error-rejection Jian-Wei Pan Lecture Note 7.
Steering witnesses and criteria for the (non-)existence of local hidden state (LHS) models Eric Cavalcanti, Steve Jones, Howard Wiseman Centre for Quantum.
What is being plotted?. Answer: Number of papers with “quantum entanglement” in title or abstract N. D. Mermin, Phys. Rev. Lett. (1990) Entanglement is.
Experimental generation and characterisation of private states Paweł Horodecki Wydział Fizyki Technicznej i Matematyki Stosowanej, Politechnika Gdańska.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Information Processing by Single Particle Hybrid Entangled States Archan S. Majumdar S. N. Bose National Centre for Basic Sciences Kolkata, India Collaborators:
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava.
Borsós, K.; Benedict, M. G. University of Szeged, Szeged, Hungary Animation of experiments in modern quantum physics Animation of experiments in modern.
Quantum Dense coding and Quantum Teleportation
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Bell tests with Photons Henry Clausen. Outline:  Bell‘s theorem  Photon Bell Test by Aspect  Loopholes  Photon Bell Test by Weihs  Outlook Photon.
Efficiency of Multi-Qubit W states in Information Processing Atul Kumar IPQI-2014 IIT Jodhpur
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
The EPR Paradox, Bell’s inequalities, and its significance By: Miles H. Taylor.
Quantum Cryptography Antonio Acín
What has CP violation to do with nonlocality? by Beatrix C. Hiesmayr Faculty of Physics University of Vienna Austria Spooky action at distance also for.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Secret keys and random numbers from quantum non locality Serge Massar.
Lecture from Quantum Mechanics. Marek Zrałek Field Theory and Particle Physics Department. Silesian University Lecture 11.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Invitation to Quantum Information III
Quantum Key Distribution
Quantum Teleportation
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Experimental Quantum Teleportation*
Presentation transcript:

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note 5

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Polarization Entangled Photons [P. G. Kwiat et al., Phys. Rev. Lett. 75, 4337 (1995).]

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Post Selection

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan 3-Photon Initial State: Four-fold coincidence Final State:

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Bell’s Inequality and Violation of Local Realism [J. S. Bell, Physics 1, 195 (1964)] Bell’s inequality states that certain statistical correlations predicted by QM for measurements on two-particle ensembles cannotbe understood within a realistic picture based on local properties of each individual particle. LR prediction:QM prediction: An unstatisfactory feature! In the derivation of BI such a local realistic and thus classical picture can explain perfect correlations and is only in conflict with statistical prediction of quantum mechanics.

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan conflict with local realism Linear polarizatoin basiscircular polarization basis

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan conflict with local realism

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan EPR reality criterion: the individual value of any local operator is predetermined. There exists an element of local reality S ix corresponding to operator conflict with local realism All six of the elements of reality S ix and S iy have to be there, each with the values +1 and –1!

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan What outcomes are possible? Consider measurement of 45° linear polarization basis local realism Possible outcomes:

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan What outcomes are possible? quantum physics Whenever local realism predicts a specific result definitely to occur for a measurement for one of the photons based on the results for the other two, quantum physics definitely predicts the opposite result! Possible outcomes:

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Experimental Results J.-W. Pan et al., Nature (London) 403, 515 (2000)

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan An improved 3- & 4-photon source [J.-W. Pan et al., Rev. Lett. 86, 4435 (2001) ]

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Quantum secret sharing A procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. [M. Hillery et al., Phys. Rev. A 59, 1829 (1999).] Third-Man Quantum Cryptography A procedure that the third man, a controller, can control whether the users, say Alice and Bob, can communicate in a secure way while he has no access whatsoever on the content of the communication between Alice and Bob. [M. Żukowski et al., Acta Phys. Pol. 93, 187 (1998).] Advanced Quantum Cryptography

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Schemes for QSS and TQC A xxx measurement

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Quantum Secret Sharing xxx, xyy, yxy, yyx xyx, yxx, xxy, xyx

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Setup [Z. Zhao et al., Phy. Rev. Lett (2003). A ultra-stable high intensity source: 2 four-fold coincidence per second! 100 times brighter! stable for a few months!

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Result for QSS From bits of raw key with a QBER of 12.9%, after security check and error reduction, Alice and Bob jointly generate bits cured key with Charlie with a QBER of 0.3%.

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Third-Man’s Control If all of them randomly select the base to measure the polarization. Any two of them can create a coding by being told the other one’s measurement result. If Charlie rejects to tell them his selection or just does not make any selection then Alice and Bob can get nothing useful for the cryptography.

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Result for TQC With the permission of Charlie, after security check and error reduction Alice can generate a bits cured key with Bob, with the same QBER. Otherwise, Without knowing Charlie's results, the only thing Alice and Bob can do is to randomly guess Charlie's results and continue the same encoding and error reduction procedure. In our experiment, after performing twice error reductions, the QBER remains %. [Y.-A. Chen et al., Phy. Rev. Lett. 95, (2005) ]

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan conflict with local realism in 4-photon case

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Violation of Local Realism [Z. Zhao et al., Phy. Rev. Lett (2003).

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan A new protocol for 3-Photon [J. G. Rarity and P. R. Tapster, Phys. Rev. A 59, R35 (1999).]

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan 5-Photon Five-fold Coincidence:

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Encoding operation for simple quantum error correction This implies that a joint Bell measurement on photons 1 and 2 would project the state of photons 3, 4 and 5 into one of the four corresponding states, which can be used for either one bit-flip error or phase-shift error correction in quantum communication.

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Quantum State Sharing & Open-destination Teleportation If we perform a +45- degree measurement on photons 4 and 5, then photon 3 is left in the state of photon 1. In a similar manner the initial state of photon 1 can also be teleported either onto photon 4 or photon 5. [A. Karlsson, et al., Phys. Rev. A 58, 4394 (1998) ]

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Further Demonstration In contrast to the original teleportation scheme, after the encoding operation the destination of teleportation is left open until we perform a polarization measurement on two of the remaining three photons. Even though photons 3, 4 and 5 are far away from each other, one can still choose which particle should act as the output where the initial state of photon 1 is transferred to. This is why we have called the encoding-decoding procedure as open-destination teleportation. It is therefore a generalization of standard teleportation, when no prior agreement on the final destination of the teleportation is necessary. It is also a generalization of Quantum State Sharing. No subset of parts is sufficient to decode the state, but the entire set is. It broadens the scope of quantum information networks allowing quantum communication between multiple nodes, while providing security against malicious parties in the network as well as node and channel failures.

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Setup for Five-photon GHZ Entanglement [Z. Zhao et al., Nature 430, 54 (2004). ]

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan CNOT operation for two- independent photons +/-? H/V?

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan ControlTargetControl’Target’ HHHV HVHH VHVH VVVV CNOT Gate [T. B. Pittman, PRA 64,062311(2001)] [S. Gasparoni et al., Phys. Rev. Lett. 93, (2004); Z. Zhao et al., Phys. Rev. Lett. 94, (2005).] A full Bell state Measurement for 100% Teleportation

Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Most recently... 6-Photon [Q. Zhang et al., In preparation for Science ]