-
Multi-party quantum fingerprinting with weak coherent pulses: circuit design and protocol analysis
Authors:
Hipólito Gómez-Sousa
Abstract:
Quantum communication has been leading the way of many remarkable theoretical results and experimental tests in physics. In this context, quantum communication complexity (QCC) has recently drawn earnest research attention as a tool to optimize the amounts of transmitted qubits and energy that are required to implement distributed computational tasks. On this matter, we introduce a novel multi-use…
▽ More
Quantum communication has been leading the way of many remarkable theoretical results and experimental tests in physics. In this context, quantum communication complexity (QCC) has recently drawn earnest research attention as a tool to optimize the amounts of transmitted qubits and energy that are required to implement distributed computational tasks. On this matter, we introduce a novel multi-user quantum fingerprinting protocol that is ready to be implemented with existing technology. Particularly, we extend to the multi-user framework a well-known two-user coherent-state fingerprinting scheme. This generalization is highly non-trivial for a twofold reason, as it requires not only to extend the set of protocol rules but also to specify a procedure for designing the optical devices intended for the generalized protocol. Much of the importance of our work arises from the fact that the obtained QCC figures of merit allow direct comparison with the best-known classical multi-user fingerprinting protocol, of significance in the field of computer technologies and networking. Furthermore, as one of the main contributions of the manuscript, we deduce innovative analytical upper bounds on the amount of transmitted quantum information that are even valid in the two-user protocol as a particular case. Ultimately, comparative results are provided to contrast different protocol implementation strategies and, importantly, to show that, under realistic circumstances, the multi-user protocol can achieve tasks that are impossible by using classical communication alone. Our work provides relevant contributions towards understanding the nature and the limitations of quantum fingerprinting and, on a broader scope, also the limitations and possibilities of quantum-communication networks embracing a node that is accessed by multiple users at the same time.
△ Less
Submitted 9 November, 2020; v1 submitted 1 June, 2020;
originally announced June 2020.
-
Single-Frequency Imaging and Material Characterization using Reconfigurable Reflectarrays
Authors:
Weite Zhang,
Hipolito Gomez-Sousa,
Juan Heredia-Juesas,
Jose A. Martinez-Lorenzo
Abstract:
In this work, a physical and geometrical optics based single-frequency imaging scheme is proposed for personal screening systems using multiple reconfigurable reflectarrays. This scheme is able to not only reconstruct profiles of potential threat objects on human body, but also identify their materials in terms of their complex relative permittivities. Both simulation and experiment are carried ou…
▽ More
In this work, a physical and geometrical optics based single-frequency imaging scheme is proposed for personal screening systems using multiple reconfigurable reflectarrays. This scheme is able to not only reconstruct profiles of potential threat objects on human body, but also identify their materials in terms of their complex relative permittivities. Both simulation and experiment are carried out to detect dielectric objects at a microwave frequency of 24.16 GHz. The object profiles and complex relative permittivities are obtained with both high accuracy and computational efficiency, which show great potentials for security imaging where inspection of human body for threat materials, such as narcotics, explosives, and other types of contraband, is very common.
△ Less
Submitted 23 August, 2019;
originally announced August 2019.
-
Experimental Results of a 3D Millimeter-Wave Compressive-Reflector-Antenna Imaging System
Authors:
Weite Zhang,
Ali Molaei,
Juan Heredia-Juesas,
Luis Tirado,
Katherine Graham,
A. Bisulco,
Hipolito Gomez-Sousa,
Jose A. Martinez-Lorenzo
Abstract:
This letter presents the first experimental results of our three-dimensional (3D) millimeter-wave (mm-wave) Compressive-Reflector-Antenna (CRA) imaging system. In this prototype, the CRA is 3D-printed and coated with a metallic spray to easily introduce pseudo-random scatterers on the surface of a traditional reflector antenna (TRA). The CRA performs a pseudo random coding of the incident wavefron…
▽ More
This letter presents the first experimental results of our three-dimensional (3D) millimeter-wave (mm-wave) Compressive-Reflector-Antenna (CRA) imaging system. In this prototype, the CRA is 3D-printed and coated with a metallic spray to easily introduce pseudo-random scatterers on the surface of a traditional reflector antenna (TRA). The CRA performs a pseudo random coding of the incident wavefront, thus adding spatial diversity in the imaging region and enabling the effective use of compressive sensing (CS) and imaging techniques. The CRA is fed with a multiple-input-multiple-output (MIMO) radar, which consists of four transmitting and four receiving ports. Consequently, the mechanical scanning parts and phase shifters, which are necessary in conventional physical or synthetic aperture arrays, are not needed in this system. Experimental results show the effectiveness of the prototype to perform a successful 3D reconstruction of a T-shaped metallic target.
△ Less
Submitted 28 July, 2018;
originally announced August 2018.
-
A computational method for modeling arbitrary junctions employing different surface integral equation formulations for three-dimensional scattering and radiation problems
Authors:
Hipolito Gomez-Sousa,
Oscar Rubiños-Lopez,
Jose Angel Martinez-Lorenzo,
Marcos Arias-Acuña
Abstract:
This paper presents a new method, based on the well-known method of moments (MoM), for the numerical electromagnetic analysis of scattering and radiation from metallic or dielectric structures, or both structure types in the same simulation, that are in contact with other metallic or dielectric structures. The proposed method for solving the MoM junction problem consists of two separate algorithms…
▽ More
This paper presents a new method, based on the well-known method of moments (MoM), for the numerical electromagnetic analysis of scattering and radiation from metallic or dielectric structures, or both structure types in the same simulation, that are in contact with other metallic or dielectric structures. The proposed method for solving the MoM junction problem consists of two separate algorithms, one of which comprises a generalization for bodies in contact of the surface integral equation (SIE) formulations. Unlike some other published SIE generalizations in the field of computational electromagnetics, this generalization does not require duplicating unknowns on the dielectric separation surfaces. Additionally, this generalization is applicable to any ordinary single-scatterer SIE formulations employed as baseline. The other algorithm deals with enforcing boundary conditions and Kirchhoff's Law, relating the surface current flow across a junction edge. Two important features inherent to this latter algorithm consist of a mathematically compact description in matrix form, and, importantly from a software engineering point of view, an easy implementation in existing MoM codes which makes the debugging process more comprehensible. A practical example involving a real grounded monopole antenna for airplane-satellite communication is analyzed for validation purposes by comparing with precise measurements covering different electrical sizes.
△ Less
Submitted 19 October, 2015;
originally announced October 2015.
-
Comparison of iterative solvers for electromagnetic analysis of plasmonic nanostructures using multiple surface integral equation formulations
Authors:
Hipolito Gomez-Sousa,
Oscar Rubiños-Lopez,
Jose Angel Martinez-Lorenzo
Abstract:
The electromagnetic behavior of plasmonic structures can be predicted after discretizing and solving a linear system of equations, derived from a continuous surface integral equation (SIE) and the appropriate boundary conditions, using a method of moments (MoM) methodology. In realistic large-scale optical problems, a direct inversion of the SIE-MoM matrix cannot be performed due to its large size…
▽ More
The electromagnetic behavior of plasmonic structures can be predicted after discretizing and solving a linear system of equations, derived from a continuous surface integral equation (SIE) and the appropriate boundary conditions, using a method of moments (MoM) methodology. In realistic large-scale optical problems, a direct inversion of the SIE-MoM matrix cannot be performed due to its large size, and an iterative solver must be used instead. This paper investigates the performance of four iterative solvers (GMRES, TFQMR, CGS, and BICGSTAB) for five different SIE-MoM formulations (PMCHWT, JMCFIE, CTF, CNF, and MNMF). Moreover, under this plasmonic context, a set of suggested guidelines are provided to choose a suitable SIE formulation and iterative solver depending on the desired simulation error and available runtime resources.
△ Less
Submitted 18 October, 2015;
originally announced October 2015.
-
Upper bounds on the performance of differential-phase-shift quantum key distribution
Authors:
Hipolito Gomez-Sousa,
Marcos Curty
Abstract:
In this paper, we investigate limitations imposed by sequential attacks on the performance of a differential-phase-shift (DPS) quantum key distribution (QKD) protocol with weak coherent pulses. Specifically, we analyze a sequential attack based on optimal unambiguous discrimination of the relative phases between consecutive signal states emitted by the source. We show that this attack can provid…
▽ More
In this paper, we investigate limitations imposed by sequential attacks on the performance of a differential-phase-shift (DPS) quantum key distribution (QKD) protocol with weak coherent pulses. Specifically, we analyze a sequential attack based on optimal unambiguous discrimination of the relative phases between consecutive signal states emitted by the source. We show that this attack can provide tighter upper bounds for the security of a DPS QKD scheme than those derived from sequential attacks where the eavesdropper aims to identify the state of each signal emitted by the source unambiguously.
△ Less
Submitted 4 June, 2008;
originally announced June 2008.