-
Quantum Imaginary Time Evolution Algorithm for Quantum Field Theories with Continuous Variables
Authors:
Kübra Yeter-Aydeniz,
Eleftherios Moschandreou,
George Siopsis
Abstract:
We calculate the energy levels and corresponding eigenstates of an interacting scalar quantum field theory on a lattice using a continuous-variable version of the quantum imaginary time evolution algorithm. Only a single qumode is needed for the simulation of the field at each point on the lattice. Our quantum algorithm avoids the use of non-Gaussian quantum gates and relies, instead, on detectors…
▽ More
We calculate the energy levels and corresponding eigenstates of an interacting scalar quantum field theory on a lattice using a continuous-variable version of the quantum imaginary time evolution algorithm. Only a single qumode is needed for the simulation of the field at each point on the lattice. Our quantum algorithm avoids the use of non-Gaussian quantum gates and relies, instead, on detectors projecting onto eigenstates of the photon-number operator. Using Xanadu's Strawberry Fields simulator, we obtain results on energy levels that are in very good agreement with results from exact calculations. We propose an experimental setup that can be realized with existing technology.
△ Less
Submitted 1 July, 2021;
originally announced July 2021.
-
Experimental decoy state BB84 quantum key distribution through a turbulent channel
Authors:
Eleftherios Moschandreou,
Brian J. Rollick,
Bing Qi,
George Siopsis
Abstract:
In free-space Quantum Key Distribution in turbulent conditions, scattering and beam wandering cause intensity fluctuations which increase the detected signal-to-noise ratio. This effect can be mitigated by rejecting received bits when the channel's transmittance is below a threshold. Thus, the overall error rate is reduced and the secure key rate increases despite the deletion of bits. In Decoy St…
▽ More
In free-space Quantum Key Distribution in turbulent conditions, scattering and beam wandering cause intensity fluctuations which increase the detected signal-to-noise ratio. This effect can be mitigated by rejecting received bits when the channel's transmittance is below a threshold. Thus, the overall error rate is reduced and the secure key rate increases despite the deletion of bits. In Decoy State BB84 QKD, several methods to find the ideal threshold have already been proposed. One promising method is the Prefixed-Threshold Real-time Selection (P-RTS) where a cutoff can be chosen prior to data collection and independently of the intensity distribution. In this work we perform finite-size Decoy State BB84 QKD in a laboratory setting where we simulate the atmospheric turbulence using an acousto-optical modulator. We show that P-RTS can yield considerably higher secure key rates, especially at higher losses. In addition, we verify that P-RTS gives a robust cutoff even when the predicted transmittance does not match the actual transmittance.
△ Less
Submitted 19 March, 2021; v1 submitted 8 December, 2020;
originally announced December 2020.
-
Periodic Navier Stokes Equations: PNS system within & external to embedded spheres of the 3-Torus: The map** function at a 90 degree corner
Authors:
Terry E. Moschandreou
Abstract:
In this paper a solution for the third component of velocity for the Periodic Navier Stokes equations at the corners outside the sphere embedded in each cell of the lattice of $\mathbb{T}^3$ is presented.
In this paper a solution for the third component of velocity for the Periodic Navier Stokes equations at the corners outside the sphere embedded in each cell of the lattice of $\mathbb{T}^3$ is presented.
△ Less
Submitted 24 February, 2024; v1 submitted 14 November, 2020;
originally announced November 2020.
-
Experimental study of Hong-Ou-Mandel interference using independent phase randomized weak coherent states
Authors:
Eleftherios Moschandreou,
Jeffrey I. Garcia,
Brian J. Rollick,
Bing Qi,
Raphael Pooser,
George Siopsis
Abstract:
Hong-Ou-Mandel interferometers are valuable tools in many Quantum Information and Quantum Optics applications that require photon indistinguishability. The theoretical limit for the Hong-Ou-Mandel visibility is 0.5 for indistinguishable weak coherent photon states, but several device imperfections may hinder achieving this value experimentally. In this work, we examine the dependence of the interf…
▽ More
Hong-Ou-Mandel interferometers are valuable tools in many Quantum Information and Quantum Optics applications that require photon indistinguishability. The theoretical limit for the Hong-Ou-Mandel visibility is 0.5 for indistinguishable weak coherent photon states, but several device imperfections may hinder achieving this value experimentally. In this work, we examine the dependence of the interference visibility on various factors, including (i) detector side imperfections due to after-pulses, (ii) mismatches in the intensities and states of polarization of the input signals, and (iii) the overall intensity of the input signals. We model all imperfections and show that theoretical modeling is in good agreement with experimental results.
△ Less
Submitted 21 November, 2018; v1 submitted 6 April, 2018;
originally announced April 2018.