-
Quantum communication without the necessity of quantum memories
Authors:
W. J. Munro,
A. M. Stephens,
S. J. Devitt,
K. A. Harrison,
Kae Nemoto
Abstract:
Quantum physics is known to allow for completely new ways to create, manipulate and store information. Quantum communication - the ability to transmit quantum information - is a primitive necessary for any quantum internet. At its core, quantum communication generally requires the formation of entangled links between remote locations. The performance of these links is limited by the classical sign…
▽ More
Quantum physics is known to allow for completely new ways to create, manipulate and store information. Quantum communication - the ability to transmit quantum information - is a primitive necessary for any quantum internet. At its core, quantum communication generally requires the formation of entangled links between remote locations. The performance of these links is limited by the classical signaling time between such locations - necessitating the need for long lived quantum memories. Here we present the design of a communications network which neither requires the establishment of entanglement between remote locations nor the use of long-lived quantum memories. The rate at which quantum data can be transmitted along the network is only limited by the time required to perform efficient local gate operations. Our scheme thus potentially provides higher communications rates than previously thought possible.
△ Less
Submitted 18 June, 2013;
originally announced June 2013.
-
From quantum fusiliers to high-performance networks
Authors:
W. J. Munro,
K. A. Harrison,
A. M. Stephens,
S. J. Devitt,
Kae Nemoto
Abstract:
Our objective was to design a quantum repeater capable of achieving one million entangled pairs per second over a distance of 1000km. We failed, but not by much. In this letter we will describe the series of developments that permitted us to approach our goal. We will describe a mechanism that permits the creation of entanglement between two qubits, connected by fibre, with probability arbitrari…
▽ More
Our objective was to design a quantum repeater capable of achieving one million entangled pairs per second over a distance of 1000km. We failed, but not by much. In this letter we will describe the series of developments that permitted us to approach our goal. We will describe a mechanism that permits the creation of entanglement between two qubits, connected by fibre, with probability arbitrarily close to one and in constant time. This mechanism may be extended to ensure that the entanglement has high fidelity without compromising these properties. Finally, we describe how this may be used to construct a quantum repeater that is capable of creating a linear quantum network connecting two distant qubits with high fidelity. The creation rate is shown to be a function of the maximum distance between two adjacent quantum repeaters.
△ Less
Submitted 21 October, 2009;
originally announced October 2009.
-
Low Cost and Compact Quantum Cryptography
Authors:
J. L. Duligall,
M. S. Godfrey,
K. A. Harrison,
W. J. Munro,
J. G. Rarity
Abstract:
We present the design of a novel free-space quantum cryptography system, complete with purpose-built software, that can operate in daylight conditions. The transmitter and receiver modules are built using inexpensive off-the-shelf components. Both modules are compact allowing the generation of renewed shared secrets on demand over a short range of a few metres. An analysis of the software is sho…
▽ More
We present the design of a novel free-space quantum cryptography system, complete with purpose-built software, that can operate in daylight conditions. The transmitter and receiver modules are built using inexpensive off-the-shelf components. Both modules are compact allowing the generation of renewed shared secrets on demand over a short range of a few metres. An analysis of the software is shown as well as results of error rates and therefore shared secret yields at varying background light levels. As the system is designed to eventually work in short-range consumer applications, we also present a use scenario where the consumer can regularly 'top up' a store of secrets for use in a variety of one-time-pad and authentication protocols.
△ Less
Submitted 3 October, 2006; v1 submitted 28 August, 2006;
originally announced August 2006.