-
Long-fiber Sagnac interferometers for twin field quantum key distribution networks
Authors:
Reem Mandil,
Li Qian,
Hoi-Kwong Lo
Abstract:
A Sagnac loop structure can help overcome the major difficulty in the practical implementation of a twin field quantum key distribution (TFQKD) network, namely, the need to stabilize the phase of a quantum state over many kilometers of fiber. Unfortunately, Rayleigh backscattering noise limits the signal-to-noise ratio for Sagnac systems containing long fibers and lossy photonic devices. Here, we…
▽ More
A Sagnac loop structure can help overcome the major difficulty in the practical implementation of a twin field quantum key distribution (TFQKD) network, namely, the need to stabilize the phase of a quantum state over many kilometers of fiber. Unfortunately, Rayleigh backscattering noise limits the signal-to-noise ratio for Sagnac systems containing long fibers and lossy photonic devices. Here, we solve this problem by sending optical pulses in long on-off bursts and using time post-selection on measurements taken with free-run single-photon avalanche detectors. We also investigate the impact of the residual phase noise uncompensated by the Sagnac structure and find that the variance of the phase noise scales as loop length to the third power, verifying an existing calculation in the literature. We measure the interference visibility in Sagnac loops of varying length without active phase or polarization stabilization and achieve > 97% visibility in 200 km ultra-low-loss fiber, which is, to our knowledge, the longest fiber Sagnac interferometer demonstrated. Our results indicate the suitability of a Sagnac system for long-distance TFQKD networks, an important step towards the practical implementation of metropolitan quantum networks.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Large Language Model Informed Patent Image Retrieval
Authors:
Hao-Cheng Lo,
Jung-Mei Chu,
Jieh Hsiang,
Chun-Chieh Cho
Abstract:
In patent prosecution, image-based retrieval systems for identifying similarities between current patent images and prior art are pivotal to ensure the novelty and non-obviousness of patent applications. Despite their growing popularity in recent years, existing attempts, while effective at recognizing images within the same patent, fail to deliver practical value due to their limited generalizabi…
▽ More
In patent prosecution, image-based retrieval systems for identifying similarities between current patent images and prior art are pivotal to ensure the novelty and non-obviousness of patent applications. Despite their growing popularity in recent years, existing attempts, while effective at recognizing images within the same patent, fail to deliver practical value due to their limited generalizability in retrieving relevant prior art. Moreover, this task inherently involves the challenges posed by the abstract visual features of patent images, the skewed distribution of image classifications, and the semantic information of image descriptions. Therefore, we propose a language-informed, distribution-aware multimodal approach to patent image feature learning, which enriches the semantic understanding of patent image by integrating Large Language Models and improves the performance of underrepresented classes with our proposed distribution-aware contrastive losses. Extensive experiments on DeepPatent2 dataset show that our proposed method achieves state-of-the-art or comparable performance in image-based patent retrieval with mAP +53.3%, Recall@10 +41.8%, and MRR@10 +51.9%. Furthermore, through an in-depth user analysis, we explore our model in aiding patent professionals in their image retrieval efforts, highlighting the model's real-world applicability and effectiveness.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Security flaws from time-varying active encoding in high-speed measurement-device-independent quantum key distribution
Authors:
Amita Gnanapandithan,
Li Qian,
Hoi-Kwong Lo
Abstract:
Quantum key distribution (QKD) can transmit secret keys with, in principle, information-theoretic security. However, bandwidth limitations in practical equipment threaten the security of high-speed (GHz) QKD systems. We propose and characterize a new side channel which arises when using active encoding. As an illustrative example, we focus on electro-optic phase modulation for polarization encodin…
▽ More
Quantum key distribution (QKD) can transmit secret keys with, in principle, information-theoretic security. However, bandwidth limitations in practical equipment threaten the security of high-speed (GHz) QKD systems. We propose and characterize a new side channel which arises when using active encoding. As an illustrative example, we focus on electro-optic phase modulation for polarization encoding at 1 GHz. We show that this side channel may reduce the maximum secure transmission distance by over 50% in a decoy state measurement-device-independent QKD protocol.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
An active learning model to classify animal species in Hong Kong
Authors:
Gareth Lamb,
Ching Hei Lo,
** Wu,
Calvin K. F. Lee
Abstract:
Camera traps are used by ecologists globally as an efficient and non-invasive method to monitor animals. While it is time-consuming to manually label the collected images, recent advances in deep learning and computer vision has made it possible to automating this process [1]. A major obstacle to this is the generalisability of these models when applying these images to independently collected dat…
▽ More
Camera traps are used by ecologists globally as an efficient and non-invasive method to monitor animals. While it is time-consuming to manually label the collected images, recent advances in deep learning and computer vision has made it possible to automating this process [1]. A major obstacle to this is the generalisability of these models when applying these images to independently collected data from other parts of the world [2]. Here, we use a deep active learning workflow [3], and train a model that is applicable to camera trap images collected in Hong Kong.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
High-throughput measurement of elastic moduli of microfibers by rope coiling
Authors:
Yuan Liu,
Jack Hau Yung Lo,
Janine K. Nunes,
Howard A. Stone,
Ho Cheung Shum
Abstract:
There are many fields where it is of interest to measure the elastic moduli of tiny fragile fibers, such as filamentous bacteria, actin filaments, DNA, carbon nanotubes, and functional microfibers. The elastic modulus is typically deduced from a sophisticated tensile test under a microscope, but the throughput is low and limited by the time-consuming and skill-intensive sample loading/unloading. H…
▽ More
There are many fields where it is of interest to measure the elastic moduli of tiny fragile fibers, such as filamentous bacteria, actin filaments, DNA, carbon nanotubes, and functional microfibers. The elastic modulus is typically deduced from a sophisticated tensile test under a microscope, but the throughput is low and limited by the time-consuming and skill-intensive sample loading/unloading. Here, we demonstrate a simple microfluidic method enabling the high-throughput measurement of the elastic moduli of microfibers by rope coiling using a localized compression, where sample loading/unloading are not needed between consecutive measurements. The rope coiling phenomenon occurs spontaneously when a microfiber flows from a small channel into a wide channel. The elastic modulus is determined by measuring either the buckling length or the coiling radius. The throughput of this method, currently 3,300 fibers per hour, is a thousand times higher than that of a tensile tester. We demonstrate the feasibility of the method by testing a nonuniform fiber with axially varying elastic modulus. We also demonstrate its capability for in situ inline measurement in a microfluidic production line. We envisage that high-throughput measurements may facilitate potential applications such as screening or sorting by mechanical properties and real-time control during production of microfibers.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
GraphiQ: Quantum circuit design for photonic graph states
Authors:
Jie Lin,
Benjamin MacLellan,
Sobhan Ghanbari,
Julie Belleville,
Khuong Tran,
Luc Robichaud,
Roger G. Melko,
Hoi-Kwong Lo,
Piotr Roztocki
Abstract:
GraphiQ is a versatile open-source framework for designing photonic graph state generation schemes, with a particular emphasis on photon-emitter hybrid circuits. Built in Python, GraphiQ consists of a suite of design tools, including multiple simulation backends and optimization methods. The library supports scheme optimization in the presence of circuit imperfections, as well as user-defined opti…
▽ More
GraphiQ is a versatile open-source framework for designing photonic graph state generation schemes, with a particular emphasis on photon-emitter hybrid circuits. Built in Python, GraphiQ consists of a suite of design tools, including multiple simulation backends and optimization methods. The library supports scheme optimization in the presence of circuit imperfections, as well as user-defined optimization goals. Our framework thus represents a valuable tool for the development of practical schemes adhering to experimentally-relevant constraints. As graph states are a key resource for measurement-based quantum computing, all-photonic quantum repeaters, and robust quantum metrology, among others, we envision GraphiQ's broad impact for advancing quantum technologies.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
From PARIS to LE-PARIS: Toward Patent Response Automation with Recommender Systems and Collaborative Large Language Models
Authors:
Jung-Mei Chu,
Hao-Cheng Lo,
Jieh Hsiang,
Chun-Chieh Cho
Abstract:
In patent prosecution, timely and effective responses to Office Actions (OAs) are crucial for securing patents. However, past automation and artificial intelligence research have largely overlooked this aspect. To bridge this gap, our study introduces the Patent Office Action Response Intelligence System (PARIS) and its advanced version, the Large Language Model (LLM) Enhanced PARIS (LE-PARIS). Th…
▽ More
In patent prosecution, timely and effective responses to Office Actions (OAs) are crucial for securing patents. However, past automation and artificial intelligence research have largely overlooked this aspect. To bridge this gap, our study introduces the Patent Office Action Response Intelligence System (PARIS) and its advanced version, the Large Language Model (LLM) Enhanced PARIS (LE-PARIS). These systems are designed to enhance the efficiency of patent attorneys in handling OA responses through collaboration with AI. The systems' key features include the construction of an OA Topics Database, development of Response Templates, and implementation of Recommender Systems and LLM-based Response Generation. To validate the effectiveness of the systems, we have employed a multi-paradigm analysis using the USPTO Office Action database and longitudinal data based on attorney interactions with our systems over six years. Through five studies, we have examined the constructiveness of OA topics (studies 1 and 2) using topic modeling and our proposed Delphi process, the efficacy of our proposed hybrid LLM-based recommender system tailored for OA responses (study 3), the quality of generated responses (study 4), and the systems' practical value in real-world scenarios through user studies (study 5). The results indicate that both PARIS and LE-PARIS significantly achieve key metrics and have a positive impact on attorney performance.
△ Less
Submitted 4 March, 2024; v1 submitted 1 February, 2024;
originally announced February 2024.
-
Visualizing Magnetic Order in Self-Assembly of Superparamagnetic Nanoparticles
Authors:
Xingyuan Lu,
Ji Zou,
Minh Pham,
Arjun Rana,
Chen-Ting Liao,
Emma Cating Subramanian,
Xuefei Wu,
Yuan Hung Lo,
Charles S. Bevis,
Robert M. Karl Jr,
Serban Lepadatu,
Young-Sang Yu,
Yaroslav Tserkovnyak,
Thomas P. Russell,
David A. Shapiro,
Henry C. Kapteyn,
Margaret M. Murnane,
Robert Streubel,
Jianwei Miao
Abstract:
We use soft x-ray vector-ptychographic tomography to determine the three-dimensional magnetization field in superparamagnetic nanoparticles self-assembled at the liquid-liquid interface and reveal the magnetic order induced by layered structure. The spins in individual nanoparticles become more aligned with increasing number of layers, resulting in a larger net magnetization. Our experimental resu…
▽ More
We use soft x-ray vector-ptychographic tomography to determine the three-dimensional magnetization field in superparamagnetic nanoparticles self-assembled at the liquid-liquid interface and reveal the magnetic order induced by layered structure. The spins in individual nanoparticles become more aligned with increasing number of layers, resulting in a larger net magnetization. Our experimental results show a magnetic short-range order in the monolayer due to the proliferation of thermally induced magnetic vortices and a magnetic long-range order in the bilayer and trilayer, stemming from the strengthened dipolar interactions that effectively suppress thermal fluctuations. We also observe a screening effect of magnetic vortices and the attractive interaction between the magnetic vortices with opposite topological charges. Our work demonstrates the crucial role of layered structure in sha** the magnetization of nanoparticle assemblies, providing new opportunities to modulate these properties through strategic layer engineering.
△ Less
Submitted 2 January, 2024;
originally announced January 2024.
-
Optimization of deterministic photonic graph state generation via local operations
Authors:
Sobhan Ghanbari,
Jie Lin,
Benjamin MacLellan,
Luc Robichaud,
Piotr Roztocki,
Hoi-Kwong Lo
Abstract:
Realizing photonic graph states, crucial in various quantum protocols, is challenging due to the absence of deterministic entangling gates in linear optics. To address this, emitter qubits are leveraged to establish and transfer the entanglement to photons. We introduce an optimization method for such protocols based on the local Clifford equivalency of states and the graph-shape correlated genera…
▽ More
Realizing photonic graph states, crucial in various quantum protocols, is challenging due to the absence of deterministic entangling gates in linear optics. To address this, emitter qubits are leveraged to establish and transfer the entanglement to photons. We introduce an optimization method for such protocols based on the local Clifford equivalency of states and the graph-shape correlated generation cost parameters. Employing this method, we achieve a 50% reduction in use of the 2-qubit gates for generation of the repeater graph states and a 65% reduction in the total gate count for 15-node random dense graphs.
△ Less
Submitted 31 December, 2023;
originally announced January 2024.
-
Characterizing Aqueous Foams by In-situ Viscosity Measurement in a Foam Column
Authors:
Wei Yu,
Jack Hau Yung Lo,
Mazen Yousef Kanj
Abstract:
Foam characterization is essential in many applications of foams, such as cleaning, food processing, cosmetics, and oil production, due to these applications diversified requirements. The standard characterization method, the foam column test, cannot provide sufficient information for in-depth studies. Hence, there have been many studies that incorporated different characterization methods into th…
▽ More
Foam characterization is essential in many applications of foams, such as cleaning, food processing, cosmetics, and oil production, due to these applications diversified requirements. The standard characterization method, the foam column test, cannot provide sufficient information for in-depth studies. Hence, there have been many studies that incorporated different characterization methods into the standard test. It should be enlightening and feasible to measure the foam viscosity, which is both of practical and fundamental interest, during the foam column test, but it has never been done before. Here, we demonstrate a method to characterize aqueous foams and their aging behaviors with simultaneous measurement of foam viscosity and foam height. Using a vibration viscometer, we integrate foam column experiments with in-situ foam viscosity measurements. We studied the correlation among the foam structure, foam height, and foam viscosity during the foam decay process. We found a drastic decrease in foam viscosity in the early foam decay while the foam height remained unchanged, which is explained by coarsening. This method is much more sensitive and time-efficient than conventional foam-height-based methods by comparing the half-life. This method successfully characterizes the stability of foams made of various combinations of surfactants and gases.
△ Less
Submitted 8 October, 2023;
originally announced October 2023.
-
3SAT on an All-to-All-Connected CMOS Ising Solver Chip
Authors:
Hüsrev Cılasun,
Ziqing Zeng,
Ramprasath S,
Abhimanyu Kumar,
Hao Lo,
William Cho,
Chris H. Kim,
Ulya R. Karpuzcu,
Sachin S. Sapatnekar
Abstract:
This work solves 3SAT, a classical NP-complete problem, on a CMOS-based Ising hardware chip with all-to-all connectivity. The paper addresses practical issues in going from algorithms to hardware. It considers several degrees of freedom in map** the 3SAT problem to the chip - using multiple Ising formulations for 3SAT; exploring multiple strategies for decomposing large problems into subproblems…
▽ More
This work solves 3SAT, a classical NP-complete problem, on a CMOS-based Ising hardware chip with all-to-all connectivity. The paper addresses practical issues in going from algorithms to hardware. It considers several degrees of freedom in map** the 3SAT problem to the chip - using multiple Ising formulations for 3SAT; exploring multiple strategies for decomposing large problems into subproblems that can be accommodated on the Ising chip; and executing a sequence of these subproblems on CMOS hardware to obtain the solution to the larger problem. These are evaluated within a software framework, and the results are used to identify the most promising formulations and decomposition techniques. These best approaches are then mapped to the all-to-all hardware, and the performance of 3SAT is evaluated on the chip. Experimental data shows that the deployed decomposition and map** strategies impact SAT solution quality: without our methods, the CMOS hardware cannot achieve 3SAT solutions on SATLIB benchmarks.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
Distributional Inclusion Hypothesis and Quantifications: Probing for Hypernymy in Functional Distributional Semantics
Authors:
Chun Hei Lo,
Wai Lam,
Hong Cheng,
Guy Emerson
Abstract:
Functional Distributional Semantics (FDS) models the meaning of words by truth-conditional functions. This provides a natural representation for hypernymy but no guarantee that it can be learnt when FDS models are trained on a corpus. In this paper, we probe into FDS models and study the representations learnt, drawing connections between quantifications, the Distributional Inclusion Hypothesis (D…
▽ More
Functional Distributional Semantics (FDS) models the meaning of words by truth-conditional functions. This provides a natural representation for hypernymy but no guarantee that it can be learnt when FDS models are trained on a corpus. In this paper, we probe into FDS models and study the representations learnt, drawing connections between quantifications, the Distributional Inclusion Hypothesis (DIH), and the variational-autoencoding objective of FDS model training. Using synthetic data sets, we reveal that FDS models learn hypernymy on a restricted class of corpus that strictly follows the DIH. We further introduce a training objective that both enables hypernymy learning under the reverse of the DIH and improves hypernymy detection from real corpora.
△ Less
Submitted 10 February, 2024; v1 submitted 15 September, 2023;
originally announced September 2023.
-
Fully Passive Measurement-Device-Independent Quantum Key Distribution
Authors:
**jie Li,
Wenyuan Wang,
Hoi-Kwong Lo
Abstract:
A recently proposed fully passive QKD removes all source modulator side channels. In this work, we combine the fully passive sources with MDI-QKD to remove simultaneously side channels from source modulators and detectors. We show a numerical simulation of the passive MDI-QKD, and we obtain an acceptable key rate while getting much better implementation security, as well as ease of implementation,…
▽ More
A recently proposed fully passive QKD removes all source modulator side channels. In this work, we combine the fully passive sources with MDI-QKD to remove simultaneously side channels from source modulators and detectors. We show a numerical simulation of the passive MDI-QKD, and we obtain an acceptable key rate while getting much better implementation security, as well as ease of implementation, compared with a recently proposed fully passive TF-QKD, paving the way towards more secure and practical QKD systems. We have proved that a fully passive protocol is compatible with MDI-QKD and we also proposed a novel idea that could potentially improve the sifting efficiency.
△ Less
Submitted 5 December, 2023; v1 submitted 14 September, 2023;
originally announced September 2023.
-
Composable Security of Distributed Symmetric Key Exchange Protocol
Authors:
Jie Lin,
Manfred von Willich,
Hoi-Kwong Lo
Abstract:
The Distributed Symmetric Key Exchange (DSKE) protocol provides secure secret exchange (e.g., for key exchange) between two honest parties that need not have had prior contact, and use intermediaries with whom they each securely share confidential data. We show the composable security of the DSKE protocol in the constructive cryptography framework of Maurer. Specifically, we prove the security (co…
▽ More
The Distributed Symmetric Key Exchange (DSKE) protocol provides secure secret exchange (e.g., for key exchange) between two honest parties that need not have had prior contact, and use intermediaries with whom they each securely share confidential data. We show the composable security of the DSKE protocol in the constructive cryptography framework of Maurer. Specifically, we prove the security (correctness and confidentiality) and robustness of this protocol against any computationally unbounded adversary, who additionally may have fully compromised a bounded number of the intermediaries and can eavesdrop on all communication. As DSKE is highly scalable in a network setting with no distance limit, it is expected to be a cost-effective quantum-safe cryptographic solution to safeguarding the network security against the threat of quantum computers.
△ Less
Submitted 26 April, 2023;
originally announced April 2023.
-
Fully-Passive Twin-Field Quantum Key Distribution
Authors:
Wenyuan Wang,
Rong Wang,
Hoi-Kwong Lo
Abstract:
We propose a fully-passive twin-field quantum key distribution (QKD) setup where basis choice, decoy-state preparation and encoding are all implemented entirely by post-processing without any active modulation. Our protocol can remove the potential side-channels from both source modulators and detectors, and additionally retain the high key rate advantage offered by twin-field QKD, thus offering g…
▽ More
We propose a fully-passive twin-field quantum key distribution (QKD) setup where basis choice, decoy-state preparation and encoding are all implemented entirely by post-processing without any active modulation. Our protocol can remove the potential side-channels from both source modulators and detectors, and additionally retain the high key rate advantage offered by twin-field QKD, thus offering great implementation security and good performance. Importantly, we also propose a post-processing strategy that uses mismatched phase slices and minimizes the effect of sifting. We show with numerical simulation that the new protocol can still beat the repeaterless bound and provide satisfactory key rate.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Proof-of-Principle Demonstration of Fully-Passive Quantum Key Distribution
Authors:
Chengqiu Hu,
Wenyuan Wang,
Kai-Sum Chan,
Zhenghan Yuan,
Hoi-Kwong Lo
Abstract:
Quantum key distribution (QKD) offers information-theoretic security based on the fundamental laws of physics. However, device imperfections, such as those in active modulators, may introduce side-channel leakage, thus compromising practical security. Attempts to remove active modulation, including passive decoy intensities preparation and polarization encoding, have faced theoretical constraints…
▽ More
Quantum key distribution (QKD) offers information-theoretic security based on the fundamental laws of physics. However, device imperfections, such as those in active modulators, may introduce side-channel leakage, thus compromising practical security. Attempts to remove active modulation, including passive decoy intensities preparation and polarization encoding, have faced theoretical constraints and inadequate security verification, thus hindering the achievement of a fully passive QKD scheme. Recent research has systematically analyzed the security of a fully passive modulation protocol. Based on this, we utilize the gain-switching technique in combination with the post-selection scheme and perform a proof-of-principle demonstration of a fully passive quantum key distribution with polarization encoding at channel losses of 7.2 dB, 11.6 dB, and 16.7 dB. Our work demonstrates the feasibility of active-modulation-free QKD in polarization-encoded systems.
△ Less
Submitted 9 May, 2023; v1 submitted 20 April, 2023;
originally announced April 2023.
-
Generation of a time-bin Greenberger--Horne--Zeilinger state with an optical switch
Authors:
Hsin-Pin Lo,
Takuya Ikuta,
Koji Azuma,
Toshimori Honjo,
William J. Munro,
Hiroki Takesue
Abstract:
Multipartite entanglement is a critical resource in quantum information processing that exhibits much richer phenomenon and stronger correlations than in bipartite systems. This advantage is also reflected in its multi-user applications. Although many demonstrations have used photonic polarization qubits, polarization-mode dispersion confines the transmission of photonic polarization qubits throug…
▽ More
Multipartite entanglement is a critical resource in quantum information processing that exhibits much richer phenomenon and stronger correlations than in bipartite systems. This advantage is also reflected in its multi-user applications. Although many demonstrations have used photonic polarization qubits, polarization-mode dispersion confines the transmission of photonic polarization qubits through an optical fiber. Consequently, time-bin qubits have a particularly important role to play in quantum communication systems. Here, we generate a three-photon time-bin Greenberger-Horne-Zeilinger (GHZ) state using a 2 x 2 optical switch as a time-dependent beam splitter to entangle time-bin Bell states from a spontaneous parametric down-conversion source and a weak coherent pulse. To characterize the three-photon time-bin GHZ state, we performed measurement estimation, showed a violation of the Mermin inequality, and used quantum state tomography to fully reconstruct a density matrix, which shows a state fidelity exceeding 70%. We expect that our three-photon time-bin GHZ state can be used for long-distance multi-user quantum communication.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
Quantum Discord Witness with Uncharacterized Devices
Authors:
Rong Wang,
Yao Yao,
Zhen-Qiang Yin,
Hoi-Kwong Lo
Abstract:
Quantum discord represents a correlation beyond classicality that could be useful for many quantum information tasks, and therefore is viewed as a valuable quantum resource. Theoretically, whether a bipartite quantum state has a non-zero amount of quantum discord or not can be determined once its density matrix is given. Experimentally, however, it is not easy to perform a reliable tomography on t…
▽ More
Quantum discord represents a correlation beyond classicality that could be useful for many quantum information tasks, and therefore is viewed as a valuable quantum resource. Theoretically, whether a bipartite quantum state has a non-zero amount of quantum discord or not can be determined once its density matrix is given. Experimentally, however, it is not easy to perform a reliable tomography on the state, especially when considering the imperfection of devices. Here, inspired by the so-called dimension witness, we propose a new approach using uncharacterized measurements to witness quantum discord of an unknown bipartite state within arbitrary dimension system. For any two-qubit state, we show that the maximum of witness happens when one performs mutually orthogonal basis measurement on each qubit. The feature of high robustness against device imperfections, such as loss-tolerance and error-tolerance, shows our method is experimentally feasible. Furthermore, we show that this witness can help us guarantee security in quantum key distribution.
△ Less
Submitted 15 April, 2023; v1 submitted 20 March, 2023;
originally announced March 2023.
-
Observation of binary phase states of time-multiplexed degenerate optical parametric oscillator pulses generated using a nonlinear fiber Sagnac loop
Authors:
Hsin-Pin Lo,
Takahiro Inagaki,
Toshimori Honjo,
Hiroki Takesue
Abstract:
We generated time-multiplexed degenerate optical parametric oscillator (DOPO) pulses using a nonlinear fiber Sagnac loop as a phase-sensitive amplifier (PSA) where the pump and amplified light in pump-signal-idler degenerate four-wave mixing can be spatially separated. By placing the PSA in a fiber cavity, we successfully generated more than 5,000 time-multiplexed DOPO pulses. We confirmed the bif…
▽ More
We generated time-multiplexed degenerate optical parametric oscillator (DOPO) pulses using a nonlinear fiber Sagnac loop as a phase-sensitive amplifier (PSA) where the pump and amplified light in pump-signal-idler degenerate four-wave mixing can be spatially separated. By placing the PSA in a fiber cavity, we successfully generated more than 5,000 time-multiplexed DOPO pulses. We confirmed the bifurcation of pulse phases to 0 or $π$ relative to the pump phase, which makes them useful for representing Ising spins in an Ising model solver based on coherent optical oscillator networks. We also confirmed inherent randomness of the DOPO phases using the NIST random number test.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Quantum repeaters: From quantum networks to the quantum internet
Authors:
Koji Azuma,
Sophia E. Economou,
David Elkouss,
Paul Hilaire,
Liang Jiang,
Hoi-Kwong Lo,
Ilan Tzitrin
Abstract:
A quantum internet is the holy grail of quantum information processing, enabling the deployment of a broad range of quantum technologies and protocols on a global scale. However, numerous challenges exist before the quantum internet can become a reality. Perhaps the most crucial of these is the realization of a quantum repeater, an essential component in the long-distance transmission of quantum i…
▽ More
A quantum internet is the holy grail of quantum information processing, enabling the deployment of a broad range of quantum technologies and protocols on a global scale. However, numerous challenges exist before the quantum internet can become a reality. Perhaps the most crucial of these is the realization of a quantum repeater, an essential component in the long-distance transmission of quantum information. As the analog of a classical repeater, extender, or booster, the quantum repeater works to overcome loss and noise in the quantum channels comprising a quantum network. Here, we review the conceptual frameworks and architectures for quantum repeaters, as well as the experimental progress towards their realization. We also discuss the various near-term proposals to overcome the limits to the communication rates set by point-to-point quantum communication. Finally, we overview how quantum repeaters fit within the broader challenge of designing and implementing a quantum internet.
△ Less
Submitted 18 July, 2023; v1 submitted 21 December, 2022;
originally announced December 2022.
-
Passive continuous variable quantum key distribution
Authors:
Chenyang Li,
Chengqiu Hu,
Wenyuan Wang,
Rong Wang,
Hoi-Kwong Lo
Abstract:
Passive quantum key distribution (QKD) has been proposed for discrete variable protocols to eliminate side channels in the source. Unfortunately, the key rate of passive DV-QKD protocols suffers from sifting loss and additional quantum errors. In this work, we propose the general framework of passive continuous variable quantum key distribution. Rather surprisingly, we find that the passive source…
▽ More
Passive quantum key distribution (QKD) has been proposed for discrete variable protocols to eliminate side channels in the source. Unfortunately, the key rate of passive DV-QKD protocols suffers from sifting loss and additional quantum errors. In this work, we propose the general framework of passive continuous variable quantum key distribution. Rather surprisingly, we find that the passive source is a perfect candidate for the discrete-modulated continuous variable quantum key distribution (DMCV QKD) protocol. With the phase space remap** scheme, we show that passive DMCV QKD offers the same key rate as its active counterpart. Considering the important advantage of removing side channels that have plagued the active ones, passive DMCV QKD is a promising alternative. In addition, our protocol makes the system much simpler by allowing modulator-free quantum key distribution. Finally, we experimentally characterize the passive DMCV QKD source, thus showing its practicality.
△ Less
Submitted 4 December, 2022;
originally announced December 2022.
-
Diffusion-Dominated Pinch-Off of Ultralow Surface Tension Fluids
Authors:
Jack Hau Yung Lo,
Yuan Liu,
Sze Yi Mak,
Zhuo Xu,
Youchuang Chao,
Kaye Jiale Li,
Ho Cheung Shum,
Lei Xu
Abstract:
We study the breakup of a liquid thread inside another liquid at different surface tensions. In general, the pinch-off of a liquid thread is governed by the dynamics of fluid flow. However, when the interfacial tension is ultralow (2 to 3 orders lower than normal liquids), we find that the pinch-off dynamics can be governed by bulk diffusion. By studying the velocity and the profile of the pinch-o…
▽ More
We study the breakup of a liquid thread inside another liquid at different surface tensions. In general, the pinch-off of a liquid thread is governed by the dynamics of fluid flow. However, when the interfacial tension is ultralow (2 to 3 orders lower than normal liquids), we find that the pinch-off dynamics can be governed by bulk diffusion. By studying the velocity and the profile of the pinch-off, we explain why the diffusion-dominated pinch-off takes over the conventional breakup at ultralow surface tensions.
△ Less
Submitted 28 November, 2022;
originally announced November 2022.
-
The role of drop shape in impact and splash
Authors:
Qingzhe Liu,
Jack Hau Yung Lo,
Ye Li,
Yuan Liu,
**yu Zhao,
Lei Xu
Abstract:
The impact and splash of liquid drops on solid substrates are ubiquitous in many important fields. However, previous studies have mainly focused on spherical drops while the non-spherical situations, such as raindrops, charged drops, oscillating drops, and drops affected by electromagnetic field, remain largely unexplored. Using ferrofluid, we realize various drop shapes and illustrate the fundame…
▽ More
The impact and splash of liquid drops on solid substrates are ubiquitous in many important fields. However, previous studies have mainly focused on spherical drops while the non-spherical situations, such as raindrops, charged drops, oscillating drops, and drops affected by electromagnetic field, remain largely unexplored. Using ferrofluid, we realize various drop shapes and illustrate the fundamental role of shape in impact and splash. Experiments show that different drop shapes produce large variations in spreading dynamics, splash onset, and splash amount. However, underlying all these variations we discover universal mechanisms across various drop shapes: the impact dynamics is governed by the superellipse model, the splash onset is triggered by the Kelvin-Helmholtz instability, and the amount of splash is determined by the energy dissipation before liquid taking off. Our study generalizes the drop impact research beyond the spherical geometry, and reveals the potential of using drop shape to control impact and splash.
△ Less
Submitted 28 November, 2022;
originally announced November 2022.
-
Resource-Efficient Real-Time Polarization Compensation for MDI-QKD with Rejected Data
Authors:
Olinka Bedroya,
Chenyang Li,
Wenyuan Wang,
Jianyong Hu,
Hoi-Kwong Lo,
Li Qian
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD) closes all the security loopholes in the detection system and is a promising solution for secret key sharing. Polarization encoding is the most common QKD encoding scheme, as it is straightforward to prepare and measure. However, implementing polarization encoding in MDI QKD imposes extra challenges, as polarization alignment must b…
▽ More
Measurement-device-independent quantum key distribution (MDI-QKD) closes all the security loopholes in the detection system and is a promising solution for secret key sharing. Polarization encoding is the most common QKD encoding scheme, as it is straightforward to prepare and measure. However, implementing polarization encoding in MDI QKD imposes extra challenges, as polarization alignment must be maintained over both mutually unbiased bases and be maintained for both paths (Alice-Charlie and Bob-Charlie). Polarization alignment is usually done by interrupting the QKD process (reducing overall key generation rates) or using additional classical laser sources multiplexed with quantum channels for polarization alignment. Since low key rates and cost are the two most pressing challenges preventing wide adoption of QKD systems, using additional resources or reducing key rates runs contrary to making QKD commercially viable. Therefore, we propose and implement a novel polarization compensation scheme in the MDI-QKD system that avoids the aforementioned drawbacks by recycling part of discarded detection events. Our scheme evaluates the polarization drift in real-time based on single measurements corresponding to decoy intensities. Our fully automated experimental demonstration maintains the average polarization drift below 0.13 rad over 40 km of spooled fibre (without an insulating jacket) for at least four hours. The average quantum bit error rate is 3.8$\%$, and we achieved an average key rate of $7.45\times 10^{-6}$ bits per pulse.
△ Less
Submitted 23 April, 2024; v1 submitted 6 September, 2022;
originally announced September 2022.
-
Strong transience for one-dimensional Markov chains with asymptotically zero drifts
Authors:
Chak Hei Lo,
Mikhail V. Menshikov,
Andrew R. Wade
Abstract:
For near-critical, transient Markov chains on the non-negative integers in the Lamperti regime, where the mean drift at $x$ decays as $1/x$ as $x \to \infty$, we quantify degree of transience via existence of moments for conditional return times and for last exit times, assuming increments are uniformly bounded. Our proof uses a Doob $h$-transform, for the transient process conditioned to return,…
▽ More
For near-critical, transient Markov chains on the non-negative integers in the Lamperti regime, where the mean drift at $x$ decays as $1/x$ as $x \to \infty$, we quantify degree of transience via existence of moments for conditional return times and for last exit times, assuming increments are uniformly bounded. Our proof uses a Doob $h$-transform, for the transient process conditioned to return, and we show that the conditioned process is also of Lamperti type with appropriately transformed parameters. To do so, we obtain an asymptotic expansion for the ratio of two return probabilities, evaluated at two nearby starting points; a consequence of this is that the return probability for the transient Lamperti process is a regularly-varying function of the starting point.
△ Less
Submitted 10 November, 2023; v1 submitted 27 August, 2022;
originally announced August 2022.
-
Fully-Passive Quantum Key Distribution
Authors:
Wenyuan Wang,
Rong Wang,
Victor Zapatero,
Li Qian,
Bing Qi,
Marcos Curty,
Hoi-Kwong Lo
Abstract:
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed. Nonetheless, passive decoy-state generation and passive encoding have never been simultaneously implemented with linear optical elements before, whic…
▽ More
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed. Nonetheless, passive decoy-state generation and passive encoding have never been simultaneously implemented with linear optical elements before, which greatly limits the practicality of such passive QKD schemes. In this work, we overcome this limitation and propose a fully-passive QKD source with linear optics that eliminates active modulators for both decoy-state choice and encoding. This allows for highly practical QKD systems that avoid side-channels from the source modulators. The passive source we propose (combined with the decoy-state analysis) can create any arbitrary state on a qubit system and is protocol-independent. That is, it can be used for various protocols such as BB84, reference-frame-independent QKD, or the six-state protocol. It can also in principle be combined with e.g. measurement-device-independent QKD, to build a system without side-channels in either detectors or modulators.
△ Less
Submitted 12 July, 2022;
originally announced July 2022.
-
Homoepitaxy of rhombohedral-stacked MoS2 with room temperature switchable ferroelectricity
Authors:
Tilo H. Yang,
Hsiang-Chi Hu,
Fu-Xiang Rikudo Chen,
Po-Yen Lin,
Yu-Fan Chiang,
Wen-Hao Chang,
Yi-Hao Kuo,
Yu-Seng Ku,
Bor-Wei Liang,
Alice Chinghsuan Chang,
Han-Chieh Lo,
Yu-Chen Chang,
Yi-Cheng Chen,
Ting-Hua Lu,
Chun-Liang Lin,
Yann-Wen Lan
Abstract:
The discovery of interfacial ferroelectricity in two-dimensional rhombohedral (3R)-stacked semiconductors opens up a new pathway for achieving ultrathin computing-in-memory devices. However, exploring ferroelectricity switching in natural 3R crystals is difficult due to lack of co-existing 3R stacking domains. Here, we present that MoS2 homoepitaxial patterns with 3R polytypic domains can manifest…
▽ More
The discovery of interfacial ferroelectricity in two-dimensional rhombohedral (3R)-stacked semiconductors opens up a new pathway for achieving ultrathin computing-in-memory devices. However, exploring ferroelectricity switching in natural 3R crystals is difficult due to lack of co-existing 3R stacking domains. Here, we present that MoS2 homoepitaxial patterns with 3R polytypic domains can manifest switchable ferroelectricity at room-temperature. Based on the diffusion limited aggregation theory, such MoS2 patterns are formed under the low Mo chemical potential and low temperature with respect to common chemical vapor deposition synthesis. The alternation of 3R polytypes in the MoS2 homoepitaxial patterns, observed by scanning transmission electron microscopy, accounts for ferroelectricity switching. The MoS2 field-effect transistors with 3R polytypic domains exhibit a repeatable counterclockwise hysteresis with gate voltage swee**, an indication of ferroelectricity switching, and the memory window exceeds those measured for compact-shaped 3R bilayer devices. This work provides a direct growth concept for layered 3R-based ferroelectric memory.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
Characterisation of state-preparation uncertainty in quantum key distribution
Authors:
Anqi Huang,
Akihiro Mizutani,
Hoi-Kwong Lo,
Vadim Makarov,
Kiyoshi Tamaki
Abstract:
To achieve secure quantum key distribution, all imperfections in the source unit must be incorporated in a security proof and measured in the lab. Here we perform a proof-of-principle demonstration of the experimental techniques for characterising the source phase and intensity fluctuation in commercial quantum key distribution systems. When we apply the measured phase fluctuation intervals to the…
▽ More
To achieve secure quantum key distribution, all imperfections in the source unit must be incorporated in a security proof and measured in the lab. Here we perform a proof-of-principle demonstration of the experimental techniques for characterising the source phase and intensity fluctuation in commercial quantum key distribution systems. When we apply the measured phase fluctuation intervals to the security proof that takes into account fluctuations in the state preparation, it predicts a key distribution distance of over 100 km of fiber. The measured intensity fluctuation intervals are however so large that the proof predicts zero key, indicating a source improvement may be needed. Our characterisation methods pave the way for a future certification standard.
△ Less
Submitted 9 January, 2023; v1 submitted 24 May, 2022;
originally announced May 2022.
-
Distributed Symmetric Key Exchange: A scalable, quantum-proof key distribution system
Authors:
Hoi-Kwong Lo,
Mattia Montagna,
Manfred von Willich
Abstract:
We propose and implement a protocol for a scalable, cost-effective, information-theoretically secure key distribution and management system. The system, called Distributed Symmetric Key Exchange (DSKE), relies on pre-shared random numbers between DSKE clients and a group of Security Hubs. Any group of DSKE clients can use the DSKE protocol to distill from the pre-shared numbers a secret key. The c…
▽ More
We propose and implement a protocol for a scalable, cost-effective, information-theoretically secure key distribution and management system. The system, called Distributed Symmetric Key Exchange (DSKE), relies on pre-shared random numbers between DSKE clients and a group of Security Hubs. Any group of DSKE clients can use the DSKE protocol to distill from the pre-shared numbers a secret key. The clients are protected from Security Hub compromise via a secret sharing scheme that allows the creation of the final key without the need to trust individual Security Hubs. Precisely, if the number of compromised Security Hubs does not exceed a certain threshold, confidentiality is guaranteed to DSKE clients and, at the same time, robustness against denial-of-service (DoS) attacks. The DSKE system can be used for quantum-secure communication, can be easily integrated into existing network infrastructures, and can support arbitrary groups of communication parties that have access to a key. We discuss the high-level protocol, analyze its security, including its robustness against disruption. A proof-ofprinciple demonstration of secure communication between two distant clients with a DSKE-based VPN using Security Hubs on Amazon Web Server (AWS) nodes thousands of kilometres away from them was performed, demonstrating the feasibility of DSKEenabled secret sharing one-time-pad encryption with a data rate above 50 Mbit/s and a latency below 70 ms.
△ Less
Submitted 24 November, 2022; v1 submitted 1 May, 2022;
originally announced May 2022.
-
Quantum Complementarity Approach to Device-Independent Security
Authors:
Xingjian Zhang,
Pei Zeng,
Tian Ye,
Hoi-Kwong Lo,
Xiongfeng Ma
Abstract:
Complementarity is an essential feature of quantum mechanics. The preparation of an eigenstate of one observable implies complete randomness in its complementary observable. In quantum cryptography, complementarity allows us to formulate security analyses in terms of phase-error correction. However, in the device-independent regime that offers security without device characterization, the concept…
▽ More
Complementarity is an essential feature of quantum mechanics. The preparation of an eigenstate of one observable implies complete randomness in its complementary observable. In quantum cryptography, complementarity allows us to formulate security analyses in terms of phase-error correction. However, in the device-independent regime that offers security without device characterization, the concept becomes much subtler. Security proofs of device-independent quantum cryptography tasks are often complex and quite different from those of their more standard device-dependent cousins. The existing proofs pose huge challenges to experiments, among which large data-size requirement is a crux. Here, we show the complementarity security origin of the device-independent tasks. By linking complementarity with quantum nonlocality, we recast the device-independent scheme into a quantum error correction protocol. Going beyond the identical-and-independent-distribution case, we consider the most general attack. We generalize the sample entropy in classical Shannon theory for the finite-size analysis. Our method exhibits good finite-size performance and brings the device-independent scheme to a more practical regime. Applying it to the data in a recent ion-trap-based device-independent quantum key distribution experiment, one could reduce the requirement on data size to less than a third. Furthermore, the complementarity approach can be naturally extended to advantage key distillation to ease experiments by tolerating higher loss and lower transmittance.
△ Less
Submitted 11 October, 2022; v1 submitted 27 November, 2021;
originally announced November 2021.
-
Fuzzy Lifetime Analysis of a Fault-Tolerant Two-Phase Interleaved Converter
Authors:
Tohid Rahimi,
Masoud Farhadi,
Ka Hong Loo,
Josep Pou
Abstract:
Interleaved converters are used in photovoltaic (PV) applications to handle high power conditions with high reliability. To improve the reliability of these converters, redundant switch configuration can be employed which reduce the failure rates of the power switches significantly. However, evaluation reliability of the interleaved converters equipped with redundant switch configurations may be c…
▽ More
Interleaved converters are used in photovoltaic (PV) applications to handle high power conditions with high reliability. To improve the reliability of these converters, redundant switch configuration can be employed which reduce the failure rates of the power switches significantly. However, evaluation reliability of the interleaved converters equipped with redundant switch configurations may be complex. This paper aims to simplify the reliability Analysis of interleaved converters considering mission profile and redundant switch configuration. Different possible configurations of the studied converter are shown as Markov chain states in the proposed method, which simplify the reliability and failure rates Analysis. The effect of different parameters such as the converter power level, switch configuration type, and operation modes are derived and a better insight into the effectiveness of the switch configuration on improving the reliability is provided.
△ Less
Submitted 19 November, 2021;
originally announced November 2021.
-
Applications and Techniques for Fast Machine Learning in Science
Authors:
Allison McCarn Deiana,
Nhan Tran,
Joshua Agar,
Michaela Blott,
Giuseppe Di Guglielmo,
Javier Duarte,
Philip Harris,
Scott Hauck,
Mia Liu,
Mark S. Neubauer,
Jennifer Ngadiuba,
Seda Ogrenci-Memik,
Maurizio Pierini,
Thea Aarrestad,
Steffen Bahr,
Jurgen Becker,
Anne-Sophie Berthold,
Richard J. Bonventre,
Tomas E. Muller Bravo,
Markus Diefenthaler,
Zhen Dong,
Nick Fritzsche,
Amir Gholami,
Ekaterina Govorkova,
Kyle J Hazelwood
, et al. (62 additional authors not shown)
Abstract:
In this community review report, we discuss applications and techniques for fast machine learning (ML) in science -- the concept of integrating power ML methods into the real-time experimental data processing loop to accelerate scientific discovery. The material for the report builds on two workshops held by the Fast ML for Science community and covers three main areas: applications for fast ML ac…
▽ More
In this community review report, we discuss applications and techniques for fast machine learning (ML) in science -- the concept of integrating power ML methods into the real-time experimental data processing loop to accelerate scientific discovery. The material for the report builds on two workshops held by the Fast ML for Science community and covers three main areas: applications for fast ML across a number of scientific domains; techniques for training and implementing performant and resource-efficient ML algorithms; and computing architectures, platforms, and technologies for deploying these algorithms. We also present overlap** challenges across the multiple scientific domains where common solutions can be found. This community report is intended to give plenty of examples and inspiration for scientific discovery through integrated and accelerated ML solutions. This is followed by a high-level overview and organization of technical advances, including an abundance of pointers to source material, which can enable these breakthroughs.
△ Less
Submitted 25 October, 2021;
originally announced October 2021.
-
Achieving adjustable elasticity with non-affine to affine transition
Authors:
Xiangying Shen,
Chenchao Fang,
Zhipeng **,
Hua Tong,
Shixiang Tang,
Hongchuan Shen,
Ning Xu,
Jack Hau Yung Lo,
Xinliang Xu,
Lei Xu
Abstract:
For various engineering and industrial applications it is desirable to realize mechanical systems with broadly adjustable elasticity to respond flexibly to the external environment. Here we discover a topology-correlated transition between affine and non-affine regimes in elasticity in both two- and three-dimensional packing-derived networks. Based on this transition, we numerically design and exp…
▽ More
For various engineering and industrial applications it is desirable to realize mechanical systems with broadly adjustable elasticity to respond flexibly to the external environment. Here we discover a topology-correlated transition between affine and non-affine regimes in elasticity in both two- and three-dimensional packing-derived networks. Based on this transition, we numerically design and experimentally realize multifunctional systems with adjustable elasticity. Within one system, we achieve solid-like affine response, liquid-like non-affine response and a continuous tunability in between. Moreover, the system also exhibits a broadly tunable Poisson's ratio from positive to negative values, which is of practical interest for energy absorption and for fracture-resistant materials. Our study reveals a fundamental connection between elasticity and network topology, and demonstrates its practical potential for designing mechanical systems and metamaterials.
△ Less
Submitted 16 September, 2021;
originally announced September 2021.
-
Measurement device-independent quantum key distribution with passive, time-dependent source side-channels
Authors:
J. Eli Bourassa,
Amita Gnanapandithan,
Li Qian,
Hoi-Kwong Lo
Abstract:
While measurement-device-independent (MDI) quantum key distribution (QKD) allows two trusted parties to establish a shared secret key from a distance without needing to trust a central detection node, their quantum sources must be well-characterized, with side-channels at the source posing the greatest loophole to the protocol's security. In this paper, we identify a time-dependent side-channel in…
▽ More
While measurement-device-independent (MDI) quantum key distribution (QKD) allows two trusted parties to establish a shared secret key from a distance without needing to trust a central detection node, their quantum sources must be well-characterized, with side-channels at the source posing the greatest loophole to the protocol's security. In this paper, we identify a time-dependent side-channel in a common polarization-based QKD source that employs a Faraday mirror for phase stabilization. We apply the recently developed numerical proof technique from [Phys. Rev. A 99, 062332 (2019)] to quantify the sensitivity of the secret key rate to the quantum optical model for the side-channel, and to develop strategies to mitigate the information leakage. In particular, we find that the MDI three-state and BB84 protocols, while yielding the same key rate under ideal conditions, have diverging results in the presence of a side-channel, with BB84 proving more advantageous. While we consider only a representative case example, we expect the strategies developed and key rate analysis method to be broadly applicable to other leaky sources.
△ Less
Submitted 19 August, 2021;
originally announced August 2021.
-
Experiment on scalable multi-user twin-field quantum key distribution network
Authors:
Xiaoqing Zhong,
Wenyuan Wang,
Reem Mandil,
Hoi-Kwong Lo,
Li Qian
Abstract:
Twin-field quantum key distribution (TFQKD) systems have shown great promise for implementing practical long-distance secure quantum communication due to its measurement-device-independent nature and its ability to offer fundamentally superior rate-loss scaling than point-to-point QKD systems. A surge of research and development effort in the last two years has produced many variants of protocols…
▽ More
Twin-field quantum key distribution (TFQKD) systems have shown great promise for implementing practical long-distance secure quantum communication due to its measurement-device-independent nature and its ability to offer fundamentally superior rate-loss scaling than point-to-point QKD systems. A surge of research and development effort in the last two years has produced many variants of protocols and experimental demonstrations. In terms of hardware topology, TFQKD systems interfering quantum signals from two remotely phase-locked laser sources are in essence giant Mach-Zehnder interferometers (MZIs) requiring active phase stabilization. Such configurations are inherently unsuitable for a TFQKD network, where more than one user-pair share the common quantum measurement station, because it is practically extremely difficult, if not impossible, to stabilize MZIs of largely disparate path lengths, a situation that is inevitable in a multi-user-pair TFQKD network. On the other hand, Sagnac interferometer based TFQKD systems exploiting the inherent phase stability of the Sagnac ring can implement asymmetric TFQKD, and are therefore eminently suitable for implementing a TFQKD network. In this work, we experimentally demonstrate a proof-of-principle multi-user-pair Sagnac TFQKD network where three user pairs sharing the same measurement station can perform pair-wise TFQKD through time multiplexing, with channel losses up to 58 dB, and channel loss asymmetry up to 15 dB. In some cases, the secure key rates still beat the rate-loss bounds for point-to-point repeaterless QKD systems, even in this network configuration. It is to our knowledge the first multi-user-pair TFQKD network demonstration, an important step in advancing quantum communication network technologies.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
Direct observation of 3D topological spin textures and their interactions using soft x-ray vector ptychography
Authors:
Arjun Rana,
Chen-Ting Liao,
Ezio Iacocca,
Ji Zou,
Minh Pham,
Emma-Elizabeth Cating Subramanian,
Yuan Hung Lo,
Sinéad A. Ryan,
Xingyuan Lu,
Charles S. Bevis,
Robert M. Karl Jr,
Andrew J. Glaid,
Young-Sang Yu,
Pratibha Mahale,
David A. Shapiro,
Sadegh Yazdi,
Thomas E. Mallouk,
Stanley J. Osher,
Henry C. Kapteyn,
Vincent H. Crespi,
John V. Badding,
Yaroslav Tserkovnyak,
Margaret M. Murnane,
Jianwei Miao
Abstract:
Magnetic topological defects are energetically stable spin configurations characterized by symmetry breaking. Vortices and skyrmions are two well-known examples of 2D spin textures that have been actively studied for both fundamental interest and practical applications. However, experimental evidence of the 3D spin textures has been largely indirect or qualitative to date, due to the difficulty of…
▽ More
Magnetic topological defects are energetically stable spin configurations characterized by symmetry breaking. Vortices and skyrmions are two well-known examples of 2D spin textures that have been actively studied for both fundamental interest and practical applications. However, experimental evidence of the 3D spin textures has been largely indirect or qualitative to date, due to the difficulty of quantitively characterizing them within nanoscale volumes. Here, we develop soft x-ray vector ptychography to quantitatively image the 3D magnetization vector field in a frustrated superlattice with 10 nm spatial resolution. By applying homotopy theory to the experimental data, we quantify the topological charge of hedgehogs and anti-hedgehogs as emergent magnetic monopoles and probe their interactions inside the frustrated superlattice. We also directly observe virtual hedgehogs and anti-hedgehogs created by magnetically inert voids. We expect that this new quantitative imaging method will open the door to study 3D topological spin textures in a broad class of magnetic materials. Our work also demonstrates that magnetically frustrated superlattices could be used as a new platform to investigate hedgehog interactions and dynamics and to exploit optimized geometries for information storage and transport applications.
△ Less
Submitted 26 April, 2021;
originally announced April 2021.
-
Designing zonal-based flexible bus services under stochastic demand
Authors:
Enoch Lee,
Xuekai Cen,
Hong K. Lo,
Ka Fai Ng
Abstract:
In this paper, we develop a zonal-based flexible bus services (ZBFBS) by considering both passenger demands spatial (origin-destination or OD) and volume stochastic variations. Service requests are grouped by zonal OD pairs and number of passengers per request, and aggregated into demand categories which follow certain probability distributions. A two-stage stochastic program is formulated to mini…
▽ More
In this paper, we develop a zonal-based flexible bus services (ZBFBS) by considering both passenger demands spatial (origin-destination or OD) and volume stochastic variations. Service requests are grouped by zonal OD pairs and number of passengers per request, and aggregated into demand categories which follow certain probability distributions. A two-stage stochastic program is formulated to minimize the expected operating cost of ZBFBS, in which the zonal visit sequences of vehicles are determined in Stage-1, whereas in Stage-2, service requests are assigned to either regular routes determined in Stage-1 or ad hoc services that incur additional costs. Demand volume reliability and detour time reliability are introduced to ensure quality of the services and separate the problem into two phases for efficient solutions. In phase-1, given the reliability requirements, we minimize the cost of operating the regular services. In phase-2, we optimize the passenger assignment to vehicles to minimize the expected ad hoc service cost. The reliabilities are then optimized by a gradient-based approach to minimize the sum of the regular service operating cost and expected ad hoc service cost. We conduct numerical studies on vehicle capacity, detour time limit and demand volume to demonstrate the potential of ZBFBS, and apply the model to Chengdu, China, based on real data to illustrate its applicability.
△ Less
Submitted 31 October, 2021; v1 submitted 24 February, 2021;
originally announced February 2021.
-
Unstructured Knowledge Access in Task-oriented Dialog Modeling using Language Inference, Knowledge Retrieval and Knowledge-Integrative Response Generation
Authors:
Mudit Chaudhary,
Borislav Dzodzo,
Sida Huang,
Chun Hei Lo,
Mingzhi Lyu,
Lun Yiu Nie,
**bo Xing,
Tianhua Zhang,
Xiaoying Zhang,
**gyan Zhou,
Hong Cheng,
Wai Lam,
Helen Meng
Abstract:
Dialog systems enriched with external knowledge can handle user queries that are outside the scope of the supporting databases/APIs. In this paper, we follow the baseline provided in DSTC9 Track 1 and propose three subsystems, KDEAK, KnowleDgEFactor, and Ens-GPT, which form the pipeline for a task-oriented dialog system capable of accessing unstructured knowledge. Specifically, KDEAK performs know…
▽ More
Dialog systems enriched with external knowledge can handle user queries that are outside the scope of the supporting databases/APIs. In this paper, we follow the baseline provided in DSTC9 Track 1 and propose three subsystems, KDEAK, KnowleDgEFactor, and Ens-GPT, which form the pipeline for a task-oriented dialog system capable of accessing unstructured knowledge. Specifically, KDEAK performs knowledge-seeking turn detection by formulating the problem as natural language inference using knowledge from dialogs, databases and FAQs. KnowleDgEFactor accomplishes the knowledge selection task by formulating a factorized knowledge/document retrieval problem with three modules performing domain, entity and knowledge level analyses. Ens-GPT generates a response by first processing multiple knowledge snippets, followed by an ensemble algorithm that decides if the response should be solely derived from a GPT2-XL model, or regenerated in combination with the top-ranking knowledge snippet. Experimental results demonstrate that the proposed pipeline system outperforms the baseline and generates high-quality responses, achieving at least 58.77% improvement on BLEU-4 score.
△ Less
Submitted 15 January, 2021;
originally announced January 2021.
-
A flat FRW model with dynamical $Λ$ as function of matter and geometry
Authors:
Anirudh Pradhan,
De Avik,
Tee How Loo,
D. C. Maurya
Abstract:
We revisit the evolution of the scale factor in a flat FRW spacetime with a new generalized decay rule for the dynamic $Λ$-term under modified theories of gravity. It analyses certain cosmological parameters and examines their behaviours in this generalized setting which includes several decay laws in the literature. We have also obtained observational constraints on various model parameters and e…
▽ More
We revisit the evolution of the scale factor in a flat FRW spacetime with a new generalized decay rule for the dynamic $Λ$-term under modified theories of gravity. It analyses certain cosmological parameters and examines their behaviours in this generalized setting which includes several decay laws in the literature. We have also obtained observational constraints on various model parameters and estimated the present values of cosmological parameters $\{Ω_{m_0}$, $Ω_{Λ_0}$, $q_{0}, t_{0}$, $ω_{0}\}$ and have discussed with various observational results. Finite time past and future singularities in this model are also discussed. \end{abstract}
△ Less
Submitted 5 October, 2020;
originally announced October 2020.
-
Detecting Entanglement in Unfaithful States
Authors:
Yongtao Zhan,
Hoi-Kwong Lo
Abstract:
Entanglement witness is an effective method to detect entanglement in unknown states without doing full tomography. One of the most widespread schemes of witnessing entanglement is measuring its fidelity with respect to a pure entangled state. Recently, a large class of states whose entanglement can not be detected with the fidelity witness has been discovered in Phys.Rev.Lett \textbf{124},200502(…
▽ More
Entanglement witness is an effective method to detect entanglement in unknown states without doing full tomography. One of the most widespread schemes of witnessing entanglement is measuring its fidelity with respect to a pure entangled state. Recently, a large class of states whose entanglement can not be detected with the fidelity witness has been discovered in Phys.Rev.Lett \textbf{124},200502(2020). They are called unfaithful states. In this paper we propose a new way to detect entanglement by calculating the lower bound of entanglement using measurement results. Numerical simulation shows our method can detect entanglement in unfaithful states with a small number of measurements. Moreover, we generalize our scheme to multipartite states and show that it can tolerate higher noise than previous entanglement witness operators with same number of measurement settings.
△ Less
Submitted 18 March, 2021; v1 submitted 12 October, 2020;
originally announced October 2020.
-
Tagging idea in continuous variable quantum key distribution and its application
Authors:
Chenyang Li,
Thomas Van Himbeeck,
Li Qian,
Hoi-Kwong Lo
Abstract:
Despite tremendous theoretical and experimental progress in continuous variable (CV) quantum key distribution (QKD), its security has not been rigorously established for practical systems with multiple imperfections. The idea of tagging is widely used in security proofs of discrete variable quantum key distribution with imperfect devices. In this paper, we generalize the tagging idea from discrete…
▽ More
Despite tremendous theoretical and experimental progress in continuous variable (CV) quantum key distribution (QKD), its security has not been rigorously established for practical systems with multiple imperfections. The idea of tagging is widely used in security proofs of discrete variable quantum key distribution with imperfect devices. In this paper, we generalize the tagging idea from discrete variable to continuous variable.
Based on untagged signals, we prove the security of the imperfect quantum key distribution system in the most conservative case. By introducing a generic imperfection model, we can evaluate and further incorporate multiple imperfections in the different stages such as modulation, channel and detection. Finally, with this generic model and tagging idea, we can prove the security of continuous variable key distribution system with multiple imperfections. Our case study shows our proofs are able to provide secure keys in the presence of both modulation and detection flaws.
△ Less
Submitted 7 October, 2020;
originally announced October 2020.
-
Embedding and generation of indoor climbing routes with variational autoencoder
Authors:
K. H. Lo
Abstract:
Recent increase in popularity of indoor climbing allows possible applications of deep learning algorthms to classify and generate climbing routes. In this work, we employ a variational autoencoder to climbing routes in a standardized training apparatus MoonBoard, a well-known training tool within the climbing community. By sampling the encoded latent space, it is observed that the algorithm can ge…
▽ More
Recent increase in popularity of indoor climbing allows possible applications of deep learning algorthms to classify and generate climbing routes. In this work, we employ a variational autoencoder to climbing routes in a standardized training apparatus MoonBoard, a well-known training tool within the climbing community. By sampling the encoded latent space, it is observed that the algorithm can generate high quality climbing routes. 22 generated problems are uploaded to the Moonboard app for user review. This algorithm could serve as a first step to facilitate indoor climbing route setting.
△ Less
Submitted 16 September, 2020;
originally announced September 2020.
-
X-ray linear dichroic ptychography
Authors:
Yuan Hung Lo,
Jihan Zhou,
Arjun Rana,
Drew Morrill,
Christian Gentry,
Bjoern Enders,
Young-Sang Yu,
Chang-Yu Sun,
David Shapiro,
Roger Falcone,
Henry Kapteyn,
Margaret Murnane,
Pupa U. P. A. Gilbert,
Jianwei Miao
Abstract:
Biominerals such as seashells, corals skeletons, bone, and enamel are optically anisotropic crystalline materials with unique nano- and micro-scale organization that translates into exceptional macroscopic mechanical properties, providing inspiration for engineering new and superior biomimetic structures. Here we use particles of Seriatopora aculeata coral skeleton as a model and demonstrate, for…
▽ More
Biominerals such as seashells, corals skeletons, bone, and enamel are optically anisotropic crystalline materials with unique nano- and micro-scale organization that translates into exceptional macroscopic mechanical properties, providing inspiration for engineering new and superior biomimetic structures. Here we use particles of Seriatopora aculeata coral skeleton as a model and demonstrate, for the first time, x-ray linear dichroic ptychography. We map the aragonite (CaCO3) crystal c-axis orientations in coral skeleton with 35 nm spatial resolution. Linear dichroic phase imaging at the O K-edge energy shows strong polarization-dependent contrast and reveals the presence of both narrow (< 35°) and wide (> 35°) c-axis angular spread in sub-micrometer coral particles. These x-ray ptychography results were corroborated using 4D scanning transmission electron nano-diffraction on the same particles. Evidence of co-oriented but disconnected corallite sub-domains indicates jagged crystal boundaries consistent with formation by amorphous nanoparticle attachment. Looking forward, we anticipate that x-ray linear dichroic ptychography can be applied to study nano-crystallites, interfaces, nucleation and mineral growth of optically anisotropic materials with sub-ten nanometers spatial resolution in three dimensions.
△ Less
Submitted 2 September, 2020;
originally announced September 2020.
-
Tomography-based Quantum Key Distribution
Authors:
Yongtao Zhan,
Hoi-Kwong Lo
Abstract:
It has previously been shown that quantum state tomography can be used to increase the key rate of quantum key distribution (QKD) for the special case of qubits (i.e.,d=2). Here, we consider the case of higher dimensions, i.e., qudits, and show that, for a prime number d>2, quantum state tomography can also improve the key rate of d-dimensional qudit-based QKD schemes, compared to the standard (d+…
▽ More
It has previously been shown that quantum state tomography can be used to increase the key rate of quantum key distribution (QKD) for the special case of qubits (i.e.,d=2). Here, we consider the case of higher dimensions, i.e., qudits, and show that, for a prime number d>2, quantum state tomography can also improve the key rate of d-dimensional qudit-based QKD schemes, compared to the standard (d+1)-basis protocol. We apply our results to previous QKD experiments based on OAM (orbital angular momentum) encoding and demonstrate the advantage of tomography-based QKD protocols. Moreover, we compare the key rate of tomography-based QKD protocol with reference-frame-independent QKD protocol. We show that, for a rotation channel, the two protocols give the same key rate. However, for any other channels, tomography-based QKD protocol always gives a higher key rate than reference-frame-independent QKD protocol.
△ Less
Submitted 26 August, 2020;
originally announced August 2020.
-
Loss-tolerant quantum key distribution with a twist
Authors:
J. Eli Bourassa,
Ignatius William Primaatmaja,
Charles Ci Wen Lim,
Hoi-Kwong Lo
Abstract:
The security of measurement device-independent quantum key distribution (MDI QKD) relies on a thorough characterization of one's optical source output, especially any noise in the state preparation process. Here, we provide an extension of the loss-tolerant protocol [Phys. Rev. A 90, 052314 (2014)], a leading proof technique for analyzing the security of QKD, to MDI QKD protocols that employ mixed…
▽ More
The security of measurement device-independent quantum key distribution (MDI QKD) relies on a thorough characterization of one's optical source output, especially any noise in the state preparation process. Here, we provide an extension of the loss-tolerant protocol [Phys. Rev. A 90, 052314 (2014)], a leading proof technique for analyzing the security of QKD, to MDI QKD protocols that employ mixed signal states. We first reframe the core of the proof technique, noting its generalization to treat $d$-dimensional signal encodings. Concentrating on the qubit signal state case, we find that the mixed states can be interpreted as providing Alice and Bob with a virtual shield system they can employ to reduce Eve's knowledge of the secret key. We then introduce a simple semidefinite programming method for optimizing the virtual operations they can perform on the shield system to yield a higher key rate, along with an example calculation of fundamentally achievable key rates in the case of random polarization modulation error.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Efficient experimental quantum fingerprinting with wavelength division multiplexing
Authors:
Xiaoqing Zhong,
Feihu Xu,
Hoi-Kwong Lo,
Li Qian
Abstract:
Quantum communication complexity studies the efficiency of information communication (that is, the minimum amount of communication required to achieve a certain task) using quantum states. One representative example is quantum fingerprinting, in which the simultaneous message passing model is considered and the minimum amount of communication could be exponentially smaller than the classical finge…
▽ More
Quantum communication complexity studies the efficiency of information communication (that is, the minimum amount of communication required to achieve a certain task) using quantum states. One representative example is quantum fingerprinting, in which the simultaneous message passing model is considered and the minimum amount of communication could be exponentially smaller than the classical fingerprinting protocol. Experimental demonstrations based on a practical quantum fingerprinting protocol where coherent states are used to construct the fingerprints, have successfully shown the superiority of quantum fingerprinting. However, as a consequence of using coherent states, the communication time in this coherent quantum fingerprinting (CQF) protocol is increased. Moreover, the minimum amount of information communicated in these experimental demonstrations is largely limited by the dark counts of the single photon detectors. Here, we propose to enhance the performance of the existing CQF protocol through applying wavelength division multiplexing (WDM) and simultaneous detection of multiple wavelength channels. We show that the new WDM-CQF protocol can potentially reduce the communication time significantly. More importantly, with the same experimental parameters, the amount of communication is much reduced in the new scheme compared with the original CQF protocol. The more wavelength channels are used, the less communication is required by WDM-CQF protocol. We also perform a proof-of-concept experimental demonstration of the new WDM-CQF protocol with 6 wavelength channels. The experimental results further validate that the new scheme with WDM not only beats the classical protocol, but also reduces the amount of communication required by the original CQF protocol by more than half.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
Precise tuning of single-photon frequency using optical single sideband modulator
Authors:
Hsin-Pin Lo,
Hiroki Takesue
Abstract:
Frequency translation of single photons while preserving their quantum characteristics is an important technology for flexible networking of photonic quantum communication systems. Here we demonstrate a flexible scheme to interface different-color photons using an optical single sideband (OSSB) modulator. By changing the radio-frequency signal that drives the modulators, we can easily shift and pr…
▽ More
Frequency translation of single photons while preserving their quantum characteristics is an important technology for flexible networking of photonic quantum communication systems. Here we demonstrate a flexible scheme to interface different-color photons using an optical single sideband (OSSB) modulator. By changing the radio-frequency signal that drives the modulators, we can easily shift and precisely tune the frequency of single photons. Using the OSSB modulator, we successfully erased the frequency distinguishability of non-degenerated photon pairs to obtain the Hong-Ou-Mandel interference with a visibility exceeding 90%. We also demonstrated that the level of distinguishability can be precisely controlled by the OSSB modulator. We expect that the OSSB modulator will provide a simple and flexible photonic interface for realizing advanced quantum information systems.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Entanglement generation using a controlled-phase gate for time-bin qubits
Authors:
Hsin-Pin Lo,
Takuya Ikuta,
Nobuyuki Matsuda,
Toshimori Honjo,
Hiroki Takesue
Abstract:
Quantum logic gates are important for quantum computations and quantum information processing in numerous physical systems. While time-bin qubits are suited for quantum communications over optical fiber, many essential quantum logic gates for them have not yet been realized. Here, we demonstrated a controlled-phase (C-Phase) gate for time-bin qubits that uses a 2x2 optical switch based on an elect…
▽ More
Quantum logic gates are important for quantum computations and quantum information processing in numerous physical systems. While time-bin qubits are suited for quantum communications over optical fiber, many essential quantum logic gates for them have not yet been realized. Here, we demonstrated a controlled-phase (C-Phase) gate for time-bin qubits that uses a 2x2 optical switch based on an electro-optic modulator. A Hong-Ou-Mandel interference measurement showed that the switch could work as a time-dependent beam splitter with a variable spitting ratio. We confirmed that two independent time-bin qubits were entangled as a result of the C-Phase gate operation with the switch.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Quantum process tomography of a controlled-phase gate for time-bin qubits
Authors:
Hsin-Pin Lo,
Takuya Ikuta,
Nobuyuki Matsuda,
Toshimori Honjo,
William J. Munro,
Hiroki Takesue
Abstract:
Time-bin qubits, where information is encoded in a single photon at different times, have been widely used in optical fiber and waveguide based quantum communications. With the recent developments in distributed quantum computation, it is logical to ask whether time-bin encoded qubits may be useful in that context. We have recently realized a time-bin qubit controlled-phase (C-Phase) gate using a…
▽ More
Time-bin qubits, where information is encoded in a single photon at different times, have been widely used in optical fiber and waveguide based quantum communications. With the recent developments in distributed quantum computation, it is logical to ask whether time-bin encoded qubits may be useful in that context. We have recently realized a time-bin qubit controlled-phase (C-Phase) gate using a 2 X 2 optical switch based on a lithium niobate waveguide, with which we demonstrated the generation of an entangled state. However, the experiment was performed with only a pair of input states, and thus the functionality of the C-Phase gate was not fully verified. In this research, we used quantum process tomography to establish a process fidelity of 97.1%. Furthermore, we demonstrated the controlled-NOT gate operation with a process fidelity greater than 94%. This study confirms that typical two-qubit logic gates used in quantum computational circuits can be implemented with time-bin qubits, and thus it is a significant step forward for realization of distributed quantum computation based on time-bin qubits.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Cutpoints of non-homogeneous random walks
Authors:
Chak Hei Lo,
Mikhail V. Menshikov,
Andrew R. Wade
Abstract:
We give conditions under which near-critical stochastic processes on the half-line have infinitely many or finitely many cutpoints, generalizing existing results on nearest-neighbour random walks to adapted processes with bounded increments satisfying appropriate conditional increment moments conditions. We apply one of these results to deduce that a class of transient zero-drift Markov chains in…
▽ More
We give conditions under which near-critical stochastic processes on the half-line have infinitely many or finitely many cutpoints, generalizing existing results on nearest-neighbour random walks to adapted processes with bounded increments satisfying appropriate conditional increment moments conditions. We apply one of these results to deduce that a class of transient zero-drift Markov chains in $\mathbb{R}^d$, $d \geq 2$, possess infinitely many separating annuli, generalizing previous results on spatially homogeneous random walks.
△ Less
Submitted 21 November, 2021; v1 submitted 3 March, 2020;
originally announced March 2020.