-
Quantum communication networks with defects in silicon carbide
Authors:
Sebastian Ecker,
Matthias Fink,
Thomas Scheidl,
Philipp Sohr,
Rupert Ursin,
Muhammad Junaid Arshad,
Cristian Bonato,
Pasquale Cilibrizzi,
Adam Gali,
Péter Udvarhelyi,
Alberto Politi,
Oliver J. Trojak,
Misagh Ghezellou,
Jawad Ul Hassan,
Ivan G. Ivanov,
Nguyen Tien Son,
Guido Burkard,
Benedikt Tissot,
Joop Hendriks,
Carmem M. Gilardoni,
Caspar H. van der Wal,
Christian David,
Thomas Astner,
Philipp Koller,
Michael Trupke
Abstract:
Quantum communication promises unprecedented communication capabilities enabled by the transmission of quantum states of light. However, current implementations face severe limitations in communication distance due to photon loss. Silicon carbide (SiC) defects have emerged as a promising quantum device platform, offering strong optical transitions, long spin coherence lifetimes and the opportunity…
▽ More
Quantum communication promises unprecedented communication capabilities enabled by the transmission of quantum states of light. However, current implementations face severe limitations in communication distance due to photon loss. Silicon carbide (SiC) defects have emerged as a promising quantum device platform, offering strong optical transitions, long spin coherence lifetimes and the opportunity for integration with semiconductor devices. Some defects with optical transitions in the telecom range have been identified, allowing to interface with fiber networks without the need for wavelength conversion. These unique properties make SiC an attractive platform for the implementation of quantum nodes for quantum communication networks. We provide an overview of the most prominent defects in SiC and their implementation in spin-photon interfaces. Furthermore, we model a memory-enhanced quantum communication protocol in order to extract the parameters required to surpass a direct point-to-point link performance. Based on these insights, we summarize the key steps required towards the deployment of SiC devices in large-scale quantum communication networks.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
Ultra-narrow inhomogeneous spectral distribution of telecom-wavelength vanadium centres in isotopically-enriched silicon carbide
Authors:
Pasquale Cilibrizzi,
Muhammad Junaid Arshad,
Benedikt Tissot,
Nguyen Tien Son,
Ivan G. Ivanov,
Thomas Astner,
Philipp Koller,
Misagh Ghezellou,
Jawad Ul-Hassan,
Daniel White,
Christiaan Bekker,
Guido Burkard,
Michael Trupke,
Cristian Bonato
Abstract:
Spin-active quantum emitters have emerged as a leading platform for quantum technologies. However, one of their major limitations is the large spread in optical emission frequencies, which typically extends over tens of GHz. Here, we investigate single V4+ vanadium centres in 4H-SiC, which feature telecom-wavelength emission and a coherent S=1/2 spin state. We perform spectroscopy on single emitte…
▽ More
Spin-active quantum emitters have emerged as a leading platform for quantum technologies. However, one of their major limitations is the large spread in optical emission frequencies, which typically extends over tens of GHz. Here, we investigate single V4+ vanadium centres in 4H-SiC, which feature telecom-wavelength emission and a coherent S=1/2 spin state. We perform spectroscopy on single emitters and report the observation of spin-dependent optical transitions, a key requirement for spin-photon interfaces. By engineering the isotopic composition of the SiC matrix, we reduce the inhomogeneous spectral distribution of different emitters down to 100 MHz, significantly smaller than any other single quantum emitter. Additionally, we tailor the dopant concentration to stabilise the telecom-wavelength V4+ charge state, thereby extending its lifetime by at least two orders of magnitude. These results bolster the prospects for single V emitters in SiC as material nodes in scalable telecom quantum networks.
△ Less
Submitted 24 November, 2023; v1 submitted 2 May, 2023;
originally announced May 2023.
-
Scalable fabrication of hemispherical solid immersion lenses in silicon carbide through grayscale hard-mask lithography
Authors:
Christiaan Bekker,
Muhammad Junaid Arshad,
Pasquale Cilibrizzi,
Charalampos Nikolatos,
Peter Lomax,
Graham S. Wood,
Rebecca Cheung,
Wolfgang Knolle,
Neil Ross,
Brian Gerardot,
Cristian Bonato
Abstract:
Grayscale lithography allows the creation of micrometer-scale features with spatially-controlled height in a process that is fully compatible with standard lithography. Here, solid immersion lenses are demonstrated in silicon carbide using a novel fabrication protocol combining grayscale lithography and hard-mask techniques to allow nearly hemispherical lenses of 5 $μ$m radius to be etched into th…
▽ More
Grayscale lithography allows the creation of micrometer-scale features with spatially-controlled height in a process that is fully compatible with standard lithography. Here, solid immersion lenses are demonstrated in silicon carbide using a novel fabrication protocol combining grayscale lithography and hard-mask techniques to allow nearly hemispherical lenses of 5 $μ$m radius to be etched into the substrate. The technique is highly scalable and compatible with CMOS technology, and device aspect ratios can be tuned after resist patterning by controlling the chemistry of the subsequent dry etch. These results provide a low-cost, high-throughput and industrially-relevant alternative to focused ion beam milling for the creation of high-aspect-ratio, rounded microstructures.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
Real-time adaptive estimation of decoherence timescales for a single qubit
Authors:
Muhammad Junaid Arshad,
Christiaan Bekker,
Ben Haylock,
Krzysztof Skrzypczak,
Daniel White,
Benjamin Griffiths,
Joe Gore,
Gavin W. Morley,
Patrick Salter,
Jason Smith,
Inbar Zohar,
Amit Finkler,
Yoann Altmann,
Erik M. Gauger,
Cristian Bonato
Abstract:
Characterising the time over which quantum coherence survives is critical for any implementation of quantum bits, memories and sensors. The usual method for determining a quantum system's decoherence rate involves a suite of experiments probing the entire expected range of this parameter, and extracting the resulting estimation in post-processing. Here we present an adaptive multi-parameter Bayesi…
▽ More
Characterising the time over which quantum coherence survives is critical for any implementation of quantum bits, memories and sensors. The usual method for determining a quantum system's decoherence rate involves a suite of experiments probing the entire expected range of this parameter, and extracting the resulting estimation in post-processing. Here we present an adaptive multi-parameter Bayesian approach, based on a simple analytical update rule, to estimate the key decoherence timescales ($T_1$, $T_2^*$ and $T_2$) and the corresponding decay exponent of a quantum system in real time, using information gained in preceding experiments. This approach reduces the time required to reach a given uncertainty by a factor up to an order of magnitude, depending on the specific experiment, compared to the standard protocol of curve fitting. A further speed-up of a factor $\sim 2$ can be realised by performing our optimisation with respect to sensitivity as opposed to variance.
△ Less
Submitted 24 January, 2024; v1 submitted 12 October, 2022;
originally announced October 2022.
-
Real-time frequency estimation of a qubit without single-shot-readout
Authors:
Inbar Zohar,
Ben Haylock,
Yoav Romach,
Muhammad Junaid Arshad,
Nir Halay,
Niv Drucker,
Rainer Stöhr,
Andrej Denisenko,
Yonatan Cohen,
Cristian Bonato,
Amit Finkler
Abstract:
Quantum sensors can potentially achieve the Heisenberg limit of sensitivity over a large dynamic range using quantum algorithms. The adaptive phase estimation algorithm (PEA) is one example that was proven to achieve such high sensitivities with single-shot readout (SSR) sensors. However, using the adaptive PEA on a non-SSR sensor is not trivial due to the low contrast nature of the measurement. T…
▽ More
Quantum sensors can potentially achieve the Heisenberg limit of sensitivity over a large dynamic range using quantum algorithms. The adaptive phase estimation algorithm (PEA) is one example that was proven to achieve such high sensitivities with single-shot readout (SSR) sensors. However, using the adaptive PEA on a non-SSR sensor is not trivial due to the low contrast nature of the measurement. The standard approach to account for the averaged nature of the measurement in this PEA algorithm is to use a method based on `majority voting'. Although it is easy to implement, this method is more prone to mistakes due to noise in the measurement. To reduce these mistakes, a binomial distribution technique from a batch selection was recently shown theoretically to be superior, as all ranges of outcomes from an averaged measurement are considered. Here we apply, for the first time, real-time non-adaptive PEA on a non-SSR sensor with the binomial distribution approach. We compare the mean square error of the binomial distribution method to the majority-voting approach using the nitrogen-vacancy center in diamond at ambient conditions as a non-SSR sensor. Our results suggest that the binomial distribution approach achieves better accuracy with the same sensing times. To further shorten the sensing time, we propose an adaptive algorithm that controls the readout phase and, therefore, the measurement basis set. We show by numerical simulation that adding the adaptive protocol can further improve the accuracy in a future real-time experiment.
△ Less
Submitted 11 May, 2023; v1 submitted 11 October, 2022;
originally announced October 2022.
-
A First Look at Privacy Analysis of COVID-19 Contact Tracing Mobile Applications
Authors:
Muhammad Ajmal Azad,
Junaid Arshad,
Ali Akmal,
Farhan Riaz,
Sidrah Abdullah,
Muhammad Imran,
Farhan Ahmad
Abstract:
Today's smartphones are equipped with a large number of powerful value-added sensors and features such as a low power Bluetooth sensor, powerful embedded sensors such as the digital compass, accelerometer, GPS sensors, Wi-Fi capabilities, microphone, humidity sensors, health tracking sensors, and a camera, etc. These value-added sensors have revolutionized the lives of the human being in many ways…
▽ More
Today's smartphones are equipped with a large number of powerful value-added sensors and features such as a low power Bluetooth sensor, powerful embedded sensors such as the digital compass, accelerometer, GPS sensors, Wi-Fi capabilities, microphone, humidity sensors, health tracking sensors, and a camera, etc. These value-added sensors have revolutionized the lives of the human being in many ways such, as tracking the health of the patients and movement of doctors, tracking employees movement in large manufacturing units, and monitoring the environment, etc. These embedded sensors could also be used for large-scale personal, group, and community sensing applications especially tracing the spread of certain diseases. Governments and regulators are turning to use these features to trace the people thought to have symptoms of certain diseases or virus e.g. COVID-19. The outbreak of COVID-19 in December 2019, has seen a surge of the mobile applications for tracing, tracking and isolating the persons showing COVID-19 symptoms to limit the spread of disease to the larger community. The use of embedded sensors could disclose private information of the users thus potentially bring threat to the privacy and security of users. In this paper, we analyzed a large set of smartphone applications that have been designed to contain the spread of the COVID-19 virus and bring the people back to normal life. Specifically, we have analyzed what type of permission these smartphone apps require, whether these permissions are necessary for the track and trace, how data from the user devices is transported to the analytic center, and analyzing the security measures these apps have deployed to ensure the privacy and security of users.
△ Less
Submitted 16 August, 2020; v1 submitted 23 June, 2020;
originally announced June 2020.
-
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
Authors:
Junaid Arshad,
Muhammad Ajmal Azad,
Khaled Salah,
Wei Jie,
Razi Iqbal,
Mamoun Alazab
Abstract:
Internet of Things (IoT) is a disruptive technology with applications across diverse domains such as transportation and logistics systems, smart grids, smart homes, connected vehicles, and smart cities. Alongside the growth of these infrastructures, the volume and variety of attacks on these infrastructures has increased highlighting the significance of distinct protection mechanisms. Intrusion de…
▽ More
Internet of Things (IoT) is a disruptive technology with applications across diverse domains such as transportation and logistics systems, smart grids, smart homes, connected vehicles, and smart cities. Alongside the growth of these infrastructures, the volume and variety of attacks on these infrastructures has increased highlighting the significance of distinct protection mechanisms. Intrusion detection is one of the distinguished protection mechanisms with notable recent efforts made to establish effective intrusion detection for IoT and IoV. However, unique characteristics of such infrastructures including battery power, bandwidth and processors overheads, and the network dynamics can influence the operation of an intrusion detection system. This paper presents a comprehensive study of existing intrusion detection systems for IoT systems including emerging systems such as Internet of Vehicles (IoV). The paper analyzes existing systems in three aspects: computational overhead, energy consumption and privacy implications. Based on a rigorous analysis of the existing intrusion detection approaches, the paper also identifies open challenges for an effective and collaborative design of intrusion detection system for resource-constrained IoT system in general and its applications such as IoV. These efforts are envisaged to highlight state of the art with respect to intrusion detection for IoT and open challenges requiring specific efforts to achieve efficient intrusion detection within these systems.
△ Less
Submitted 21 December, 2018;
originally announced December 2018.
-
Moduli Stabilisation on the Worldsheet
Authors:
Jawad Arshad,
Neil Lambert,
Andreas Recknagel
Abstract:
We consider compactifications of type II string theory using exact internal CFT's with central charge $c=9+ε$, $|ε| \ll 1$, leading to an effective potential for the dilaton. For $ε>0$ the potential is positive and the dilaton is ultimately driven to weak coupling. For $ε<0$ the dilaton is driven to strong coupling, but we can stabilise the background by including D-branes. The resulting minimum a…
▽ More
We consider compactifications of type II string theory using exact internal CFT's with central charge $c=9+ε$, $|ε| \ll 1$, leading to an effective potential for the dilaton. For $ε>0$ the potential is positive and the dilaton is ultimately driven to weak coupling. For $ε<0$ the dilaton is driven to strong coupling, but we can stabilise the background by including D-branes. The resulting minimum admits an $AdS_4$ solution where the cosmological constant is of the order $ε^3$ and the string coupling constant is of order $ε$. Furthermore these CFT's typically do not possess any massless or tachyonic modes. Thus these vacua provide exact CFT descriptions of moduli stabilisation in weakly coupled string theory.
△ Less
Submitted 17 December, 2010;
originally announced December 2010.