-
How to harness high-dimensional temporal entanglement, using limited interferometry setups
Authors:
Alexandra Bergmayr,
Florian Kanitschar,
Matej Pivoluska,
Marcus Huber
Abstract:
High-dimensional entanglement has shown to have significant advantages in quantum communication. It is available in many degrees of freedom and in particular in the time-domain routinely produced in down-conversion (SPDC). While advantageous in the sense that only a single detector channel is needed locally, it is notoriously hard to analyze, especially in an assumption-free manner that is require…
▽ More
High-dimensional entanglement has shown to have significant advantages in quantum communication. It is available in many degrees of freedom and in particular in the time-domain routinely produced in down-conversion (SPDC). While advantageous in the sense that only a single detector channel is needed locally, it is notoriously hard to analyze, especially in an assumption-free manner that is required for quantum key distribution applications. We develop the first complete analysis of high-dimensional entanglement in the polarization-time-domain and show how to efficiently certify relevant density matrix elements and security parameters for Quantum Key Distribution (QKD). In addition to putting past experiments on rigorous footing, we also develop physical noise models and propose a novel setup that can further enhance the noise resistance of free-space quantum communication.
△ Less
Submitted 8 August, 2023;
originally announced August 2023.
-
Resource-efficient utilization of quantum computers
Authors:
Ijaz Ahamed Mohammad,
Matej Pivoluska,
Martin Plesch
Abstract:
The current state of quantum computing is commonly described as the Noisy Intermediate-Scale Quantum era. Available computers contain a few dozens of qubits and can perform a few dozens of operations before the inevitable noise erases all information encoded in the calculation. Even if the technology advances fast within the next years, any use of quantum computers will be limited to short and sim…
▽ More
The current state of quantum computing is commonly described as the Noisy Intermediate-Scale Quantum era. Available computers contain a few dozens of qubits and can perform a few dozens of operations before the inevitable noise erases all information encoded in the calculation. Even if the technology advances fast within the next years, any use of quantum computers will be limited to short and simple tasks, serving as subroutines of more complex classical procedures. Even for these applications the resource efficiency, measured in the number of quantum computer runs, will be a key parameter. Here we suggest a general optimization procedure for hybrid quantum-classical algorithms that allows finding the optimal approach with limited quantum resources. We demonstrate this procedure on a specific example of variational quantum algorithm used to find the ground state energy of a hydrogen molecule.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Distribution of genuine high-dimensional entanglement over 10.2 km of noisy metropolitan atmosphere
Authors:
Lukas Bulla,
Kristian Hjorth,
Oskar Kohout,
Jan Lang,
Sebastian Ecker,
Sebastian P. Neumann,
Julius Bittermann,
Robert Kindler,
Marcus Huber,
Martin Bohmann,
Rupert Ursin,
Matej Pivoluska
Abstract:
In a recent quantum key distribution experiment, high-dimensional protocols were used to show an improved noise resistance over a 10.2 km free-space channel. One of the unresolved questions in this context is whether the communicating parties actually shared genuine high-dimensional entanglement. In this letter we introduce an improved discretisation and entanglement certification scheme for high-…
▽ More
In a recent quantum key distribution experiment, high-dimensional protocols were used to show an improved noise resistance over a 10.2 km free-space channel. One of the unresolved questions in this context is whether the communicating parties actually shared genuine high-dimensional entanglement. In this letter we introduce an improved discretisation and entanglement certification scheme for high-dimensional time-bin setups and apply it to the data obtained during the experiment. Our analysis answers the aforementioned question affirmatively and thus the experiment constitutes the first transmission of genuine high-dimensional entanglement in a single degree of freedom over a long-range free-space channel.
△ Less
Submitted 13 January, 2023;
originally announced January 2023.
-
Quantum key distribution rates from semidefinite programming
Authors:
Mateus Araújo,
Marcus Huber,
Miguel Navascués,
Matej Pivoluska,
Armin Tavakoli
Abstract:
Computing the key rate in quantum key distribution (QKD) protocols is a long standing challenge. Analytical methods are limited to a handful of protocols with highly symmetric measurement bases. Numerical methods can handle arbitrary measurement bases, but either use the min-entropy, which gives a loose lower bound to the von Neumann entropy, or rely on cumbersome dedicated algorithms. Based on a…
▽ More
Computing the key rate in quantum key distribution (QKD) protocols is a long standing challenge. Analytical methods are limited to a handful of protocols with highly symmetric measurement bases. Numerical methods can handle arbitrary measurement bases, but either use the min-entropy, which gives a loose lower bound to the von Neumann entropy, or rely on cumbersome dedicated algorithms. Based on a recently discovered semidefinite programming (SDP) hierarchy converging to the conditional von Neumann entropy, used for computing the asymptotic key rates in the device independent case, we introduce an SDP hierarchy that converges to the asymptotic secret key rate in the case of characterised devices. The resulting algorithm is efficient, easy to implement and easy to use. We illustrate its performance by recovering known bounds on the key rate and extending high-dimensional QKD protocols to previously intractable cases. We also use it to reanalyse experimental data to demonstrate how higher key rates can be achieved when the full statistics are taken into account.
△ Less
Submitted 22 May, 2023; v1 submitted 10 November, 2022;
originally announced November 2022.
-
Improved noise resistance analysis for path-entangled subspace quantum key distribution
Authors:
Oskár Adam Válent,
Matej Pivoluska
Abstract:
We revisit the practical implementation of high-dimensional quantum key distribution protocol using path entanglement reported in [Phys.Rev.Lett.~127,~110505,~2021]. Here we refine the noise robustness analysis performed there by simulating the effect of different types of channel noise on the noiseless experimental data. Further, we extend the analysis to two kinds of asymmetric scenarios. In the…
▽ More
We revisit the practical implementation of high-dimensional quantum key distribution protocol using path entanglement reported in [Phys.Rev.Lett.~127,~110505,~2021]. Here we refine the noise robustness analysis performed there by simulating the effect of different types of channel noise on the noiseless experimental data. Further, we extend the analysis to two kinds of asymmetric scenarios. In the first scenario the entanglement source is placed in Alice's lab and thus Only one noisy channel has to be considered. In the second scenario, Bob's detectors are placed at different physical locations and therefore such scenario implements a simple communication network. Our analysis can also be extended to other experimental platforms and therefore provides a novel framework for fair noise robustness comparison of high-dimensional quantum key distribution protocols.
△ Less
Submitted 20 September, 2022;
originally announced September 2022.
-
Non-local temporal interferometry for highly resilient free-space quantum communication
Authors:
Lukas Bulla,
Matej Pivoluska,
Kristian Hjorth,
Oskar Kohout,
Jan Lang,
Sebastian Ecker,
Sebastian Philipp Neumann,
Julius Bittermann,
Robert Kindler,
Marcus Huber,
Martin Bohmann,
Rupert Ursin
Abstract:
Entanglement distribution via photons over long distances enables many applications, including quantum key distribution (QKD), which provides unprecedented privacy. The inevitable degradation of entanglement through noise accumulated over long distances remains one of the key challenges in this area. Exploiting the potential of higher-dimensional entangled photons promises to address this challeng…
▽ More
Entanglement distribution via photons over long distances enables many applications, including quantum key distribution (QKD), which provides unprecedented privacy. The inevitable degradation of entanglement through noise accumulated over long distances remains one of the key challenges in this area. Exploiting the potential of higher-dimensional entangled photons promises to address this challenge, but poses extreme demands on the experimental implementation. Here, we present an interstate free-space quantum link, distributing hyper-entanglement over $10.2\,$km with flexible dimensionality of encoding by deploying a phase-stable non-local Franson interferometer. With this distribution of multidimensional energy-time entangled photons, we analyse the achievable key rate in a dimensionally-adaptive QKD protocol that can be optimized with respect to any environmental noise conditions. Our approach enables and emphasises the power of high-dimensional entanglement for quantum communication, yielding a positive asymptotic key rate well into the dawn of the day.
△ Less
Submitted 15 April, 2022;
originally announced April 2022.
-
Implementation of quantum compression on IBM quantum computers
Authors:
Matej Pivoluska,
Martin Plesch
Abstract:
Advances in development of quantum computing processors brought ample opportunities to test the performance of various quantum algorithms with practical implementations. In this paper we report on implementations of quantum compression algorithm that can efficiently compress unknown quantum information. We restricted ourselves to compression of three pure qubits into two qubits, as the complexity…
▽ More
Advances in development of quantum computing processors brought ample opportunities to test the performance of various quantum algorithms with practical implementations. In this paper we report on implementations of quantum compression algorithm that can efficiently compress unknown quantum information. We restricted ourselves to compression of three pure qubits into two qubits, as the complexity of even such a simple implementation is barely within the reach of today's quantum processors. We implemented the algorithm on IBM quantum processors with two different topological layouts - a fully connected triangle processor and a partially connected line processor. It turns out that the incomplete connectivity of the line processor affects the performance only minimally. On the other hand, it turns out that the transpilation, i.e. compilation of the circuit into gates physically available to the quantum processor, crucially influences the result. We also have seen that the compression followed by immediate decompression is, even for such a simple case, on the edge or even beyond the capabilities of currently available quantum processors.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Self-testing quantum states via nonmaximal violation in Hardy's test of nonlocality
Authors:
Ashutosh Rai,
Matej Pivoluska,
Souradeep Sasmal,
Manik Banik,
Sibasish Ghosh,
Martin Plesch
Abstract:
Self-testing protocols enable certification of quantum devices without demanding full knowledge about their inner workings. A typical approach in designing such protocols is based on observing nonlocal correlations which exhibit maximum violation in a Bell test. We show that in Bell experiment known as Hardy's test of nonlocality not only the maximally nonlocal correlation self-tests a quantum sta…
▽ More
Self-testing protocols enable certification of quantum devices without demanding full knowledge about their inner workings. A typical approach in designing such protocols is based on observing nonlocal correlations which exhibit maximum violation in a Bell test. We show that in Bell experiment known as Hardy's test of nonlocality not only the maximally nonlocal correlation self-tests a quantum state, rather a non-maximal nonlocal behavior can serve the same purpose. We, in fact, completely characterize all such behaviors leading to self-test of every pure two qubit entangled state except the maximally entangled ones. Apart from originating a novel self-testing protocol, our method provides a powerful tool towards characterizing the complex boundary of the set of quantum correlations.
△ Less
Submitted 30 May, 2022; v1 submitted 13 December, 2021;
originally announced December 2021.
-
Best-practice aspects of quantum-computer calculations: A case study of hydrogen molecule
Authors:
Ivana Miháliková,
Martin Friák,
Matej Pivoluska,
Martin Plesch,
Martin Saip,
Mojmír Šob
Abstract:
Quantum computers are reaching one crucial milestone after another. Motivated by their progress in quantum chemistry, we have performed an extensive series of simulations of quantum-computer runs that were aimed at inspecting best-practice aspects of these calculations. In order to compare the performance of different set-ups, the ground-state energy of hydrogen molecule has been chosen as a bench…
▽ More
Quantum computers are reaching one crucial milestone after another. Motivated by their progress in quantum chemistry, we have performed an extensive series of simulations of quantum-computer runs that were aimed at inspecting best-practice aspects of these calculations. In order to compare the performance of different set-ups, the ground-state energy of hydrogen molecule has been chosen as a benchmark for which the exact solution exists in literature. Applying variational quantum eigensolver (VQE) to a qubit Hamiltonian obtained by the Bravyi-Kitaev transformation we have analyzed the impact of various computational technicalities. These include (i) the choice of optimization methods, (ii) the architecture of quantum circuits, as well as (iii) different types of noise when simulating real quantum processors. On these we eventually performed a series of experimental runs as a complement to our simulations. The SPSA and COBYLA optimization methods have clearly outperformed the Nelder-Mead and Powell methods. The results obtained when using the $R_{\mathrm{y}}$ variational form were better than those obtained when the $R_{\mathrm{y}}R_{\mathrm{z}}$ form was used. The choice of an optimum {entangling layer} was sensitively interlinked with the choice of the optimization method. The circular {entangling layer} has been found to worsen the performance of the COBYLA method while the full {entangling layer} improved it. All four optimization methods sometimes lead to an energy that corresponds to an excited state rather than the ground state. We also show that a similarity analysis of measured probabilities can provide a useful insight.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
The Cost of Improving the Precision of the Variational Quantum Eigensolver for Quantum Chemistry
Authors:
Ivana Miháliková,
Matej Pivoluska,
Martin Plesch,
Martin Friák,
Daniel Nagaj,
Mojmír Šob
Abstract:
Quantum computing brings a promise of new approaches into computational quantum chemistry. While universal, fault-tolerant quantum computers are still not available, we want to utilize today's noisy quantum processors. One of their flagship applications is the variational quantum eigensolver (VQE) -- an algorithm to calculate the minimum energy of a physical Hamiltonian. In this study, we investig…
▽ More
Quantum computing brings a promise of new approaches into computational quantum chemistry. While universal, fault-tolerant quantum computers are still not available, we want to utilize today's noisy quantum processors. One of their flagship applications is the variational quantum eigensolver (VQE) -- an algorithm to calculate the minimum energy of a physical Hamiltonian. In this study, we investigate how various types of errors affect the VQE, and how to efficiently use the available resources to produce precise computational results. We utilize a simulator of a noisy quantum device, an exact statevector simulator, as well as physical quantum hardware to study the VQE algorithm for molecular hydrogen. We find that the optimal way of running the hybrid classical-quantum optimization is to (i) allow some noise in intermediate energy evaluations, using fewer shots per step and fewer optimization iterations, but require high final readout precision, (ii) emphasize efficient problem encoding and ansatz parametrization, and (iii) run all experiments within a short time-frame, avoiding parameter drift with time. Nevertheless, current publicly available quantum resources are still very noisy and scarce/expensive, and even when using them efficiently it is quite difficult to obtain trustworthy calculations of molecular energies.
△ Less
Submitted 9 November, 2021;
originally announced November 2021.
-
Fully passive entanglement based quantum key distribution scheme
Authors:
Bo Liu,
Matej Pivoluska,
Johannes Handsteiner,
Dominik Rauch,
Marcus Huber,
Fabian Steinlechner,
Rupert Ursin,
Thomas Scheidl
Abstract:
In general, generation of entangled photon pairs and also the random choice of measurement basis can be implemented with passive optical devices in entanglement based quantum key distribution (QKD) system. However, auxiliary random numbers are still mandatory for conducting the privacy amplification procedure. In this paper, we propose a fully passive entanglement based QKD scheme in which certifi…
▽ More
In general, generation of entangled photon pairs and also the random choice of measurement basis can be implemented with passive optical devices in entanglement based quantum key distribution (QKD) system. However, auxiliary random numbers are still mandatory for conducting the privacy amplification procedure. In this paper, we propose a fully passive entanglement based QKD scheme in which certified random bits for privacy amplification are extracted from detection events of measurement-basis-mismatched entangled photon pairs. The privacy of these random bits can be certified by estimating the phase error rate in the sifted key. The idea of extracting certified random numbers from measurement-basis-mismatched photons, can be extended to all practical QKD schemes.
△ Less
Submitted 4 November, 2021;
originally announced November 2021.
-
A model for optimizing quantum key distribution with continuous-wave pumped entangled-photon sources
Authors:
Sebastian Philipp Neumann,
Thomas Scheidl,
Mirela Selimovic,
Matej Pivoluska,
Bo Liu,
Martin Bohmann,
Rupert Ursin
Abstract:
Quantum Key Distribution (QKD) allows unconditionally secure communication based on the laws of quantum mechanics rather then assumptions about computational hardness. Optimizing the operation parameters of a given QKD implementation is indispensable in order to achieve high secure key rates. So far, there exists no model that accurately describes entanglement-based QKD with continuous-wave pump l…
▽ More
Quantum Key Distribution (QKD) allows unconditionally secure communication based on the laws of quantum mechanics rather then assumptions about computational hardness. Optimizing the operation parameters of a given QKD implementation is indispensable in order to achieve high secure key rates. So far, there exists no model that accurately describes entanglement-based QKD with continuous-wave pump lasers. For the first time, we analyze the underlying mechanisms for QKD with temporally uniform pair-creation probabilities and develop a simple but accurate model to calculate optimal trade-offs for maximal secure key rates. In particular, we find an optimization strategy of the source brightness for given losses and detection-time resolution. All experimental parameters utilized by the model can be inferred directly in standard QKD implementations, and no additional assessment of device performance is required. Comparison with experimental data shows the validity of our model. Our results yield a tool to determine optimal operation parameters for already existing QKD systems, to plan a full QKD implementation from scratch, and to determine fundamental key rate and distance limits of given connections.
△ Less
Submitted 22 July, 2021; v1 submitted 26 March, 2021;
originally announced March 2021.
-
Device-independent bounds from Cabello's nonlocality argument
Authors:
Ashutosh Rai,
Matej Pivoluska,
Martin Plesch,
Souradeep Sasmal,
Manik Banik,
Sibasish Ghosh
Abstract:
Hardy-type arguments manifest Bell nonlocality in one of the simplest possible ways. Except for demonstrating nonclassical signature of entangled states in question, they can also serve for device-independent self-testing of states, as shown, e.g., in Phys. Rev. Lett. 109, 180401 (2012). Here we develop and broaden these results to an extended version of Hardy's argument, often referred to as Cabe…
▽ More
Hardy-type arguments manifest Bell nonlocality in one of the simplest possible ways. Except for demonstrating nonclassical signature of entangled states in question, they can also serve for device-independent self-testing of states, as shown, e.g., in Phys. Rev. Lett. 109, 180401 (2012). Here we develop and broaden these results to an extended version of Hardy's argument, often referred to as Cabello's nonlocality argument. We show that, as in the simpler case of Hardy's nonlocality argument, the maximum quantum value for Cabello's nonlocality is achieved by a pure two-qubit state and projective measurements that are unique up to local isometries. We also examine the properties of a more realistic case when small errors in the ideal constraints are accepted within the probabilities obtained and prove that also in this case the two-qubit state and measurements are sufficient for obtaining the maximum quantum violation of the classical bound.
△ Less
Submitted 26 June, 2021; v1 submitted 17 March, 2021;
originally announced March 2021.
-
Finite-Function-Encoding Quantum States
Authors:
Paul Appel,
Alexander J. Heilman,
Ezekiel W. Wertz,
David W. Lyons,
Marcus Huber,
Matej Pivoluska,
Giuseppe Vitagliano
Abstract:
We introduce finite-function-encoding (FFE) states which encode arbitrary $d$-valued logic functions, i.e., multivariate functions over the ring of integers modulo $d$, and investigate some of their structural properties. We also point out some differences between polynomial and non-polynomial function encoding states: The former can be associated to graphical objects, that we dub tensor-edge hype…
▽ More
We introduce finite-function-encoding (FFE) states which encode arbitrary $d$-valued logic functions, i.e., multivariate functions over the ring of integers modulo $d$, and investigate some of their structural properties. We also point out some differences between polynomial and non-polynomial function encoding states: The former can be associated to graphical objects, that we dub tensor-edge hypergraphs (TEH), which are a generalization of hypergraphs with a tensor attached to each hyperedge encoding the coefficients of the different monomials. To complete the framework, we also introduce a notion of finite-function-encoding Pauli (FP) operators, which correspond to elements of what is known as the generalized symmetric group in mathematics. First, using this machinery, we study the stabilizer group associated to FFE states and observe how qudit hypergraph states introduced in arXiv:1612.06418v2 admit stabilizers of a particularly simpler form. Afterwards, we investigate the classification of FFE states under local unitaries (LU), and, after showing the complexity of this problem, we focus on the case of bipartite states and especially on the classification under local FP operations (LFP). We find all LU and LFP classes for two qutrits and two ququarts and study several other special classes, pointing out the relation between maximally entangled FFE states and complex Butson-type Hadamard matrices. Our investigation showcases also the relation between the properties of FFE states, especially their LU classification, and the theory of finite rings over the integers.
△ Less
Submitted 5 May, 2022; v1 submitted 1 December, 2020;
originally announced December 2020.
-
Pathways for entanglement based quantum communication in the face of high noise
Authors:
Xiao-Min Hu,
Chao Zhang,
Yu Guo,
Fang-Xiang Wang,
Wen-Bo Xing,
Cen-Xiao Huang,
Bi-Heng Liu,
Yun-Feng Huang,
Chuan-Feng Li,
Guang-Can Guo,
Xiaoqin Gao,
Matej Pivoluska,
Marcus Huber
Abstract:
Entanglement based quantum communication offers an increased level of security in practical secret shared key distribution. One of the fundamental principles enabling this security -- the fact that interfering with one photon will destroy entanglement and thus be detectable -- is also the greatest obstacle. Random encounters of traveling photons, losses and technical imperfections make noise an in…
▽ More
Entanglement based quantum communication offers an increased level of security in practical secret shared key distribution. One of the fundamental principles enabling this security -- the fact that interfering with one photon will destroy entanglement and thus be detectable -- is also the greatest obstacle. Random encounters of traveling photons, losses and technical imperfections make noise an inevitable part of any quantum communication scheme, severely limiting distance, key rate and environmental conditions in which QKD can be employed. Using photons entangled in their spatial degree of freedom, we show that the increased noise resistance of high-dimensional entanglement, can indeed be harnessed for practical key distribution schemes. We perform quantum key distribution in eight entangled paths at various levels of environmental noise and show key rates that, even after error correction and privacy amplification, still exceed $1$ bit per photon pair and furthermore certify a secure key at noise levels that would prohibit comparable qubit based schemes from working.
△ Less
Submitted 11 September, 2021; v1 submitted 5 November, 2020;
originally announced November 2020.
-
Choice of mutually unbiased bases and outcome labelling affects measurement outcome secrecy
Authors:
Mirdit Doda,
Matej Pivoluska,
Martin Plesch
Abstract:
Mutually unbiased bases (MUBs) are a crucial ingredient for many protocols in quantum information processing. Measurements performed in these bases are unbiased to the maximally possible extent, which is used to prove randomness or secrecy of measurement results. In this work we show that certain properties of sets of MUBs crucially depend on their specific choice, including, somewhat surprisingly…
▽ More
Mutually unbiased bases (MUBs) are a crucial ingredient for many protocols in quantum information processing. Measurements performed in these bases are unbiased to the maximally possible extent, which is used to prove randomness or secrecy of measurement results. In this work we show that certain properties of sets of MUBs crucially depend on their specific choice, including, somewhat surprisingly, measurement outcome labelling. If measurements are chosen in a coherent way, the secrecy of the result can be completely lost for specific sets of MUB measurements, while partially retained for others. This can potentially impact a broad spectrum of applications, where MUBs are utilized.
△ Less
Submitted 10 March, 2021; v1 submitted 15 June, 2020;
originally announced June 2020.
-
Quantum key distribution overcoming extreme noise: simultaneous subspace coding using high-dimensional entanglement
Authors:
Mirdit Doda,
Marcus Huber,
Gláucia Murta,
Matej Pivoluska,
Martin Plesch,
Chrysoula Vlachou
Abstract:
High-dimensional entanglement promises to increase the information capacity of photons and is now routinely generated exploiting spatio-temporal degrees of freedom of single photons. A curious feature of these systems is the possibility to certify entanglement despite strong noise in the data. We show that it is also possible to exploit this noisy high-dimensional entanglement for quantum key dist…
▽ More
High-dimensional entanglement promises to increase the information capacity of photons and is now routinely generated exploiting spatio-temporal degrees of freedom of single photons. A curious feature of these systems is the possibility to certify entanglement despite strong noise in the data. We show that it is also possible to exploit this noisy high-dimensional entanglement for quantum key distribution by introducing a protocol that uses mutliple subspaces of the high-dimensional system simultaneously. Our protocol can be used to establish a secret key even in extremely noisy experimental conditions, where qubit protocols fail. To show that, we analyze the performance of our protocol for noise models that apply to the two most commonly used sources of high-dimensional entanglement: time bins and spatial modes.
△ Less
Submitted 10 March, 2021; v1 submitted 27 April, 2020;
originally announced April 2020.
-
High-Dimensional Pixel Entanglement: Efficient Generation and Certification
Authors:
Natalia Herrera Valencia,
Vatshal Srivastav,
Matej Pivoluska,
Marcus Huber,
Nicolai Friis,
Will McCutcheon,
Mehul Malik
Abstract:
Photons offer the potential to carry large amounts of information in their spectral, spatial, and polarisation degrees of freedom. While state-of-the-art classical communication systems routinely aim to maximize this information-carrying capacity via wavelength and spatial-mode division multiplexing, quantum systems based on multi-mode entanglement usually suffer from low state quality, long measu…
▽ More
Photons offer the potential to carry large amounts of information in their spectral, spatial, and polarisation degrees of freedom. While state-of-the-art classical communication systems routinely aim to maximize this information-carrying capacity via wavelength and spatial-mode division multiplexing, quantum systems based on multi-mode entanglement usually suffer from low state quality, long measurement times, and limited encoding capacity. At the same time, entanglement certification methods often rely on assumptions that compromise security. Here we show the certification of photonic high-dimensional entanglement in the transverse position-momentum degree-of-freedom with a record quality, measurement speed, and entanglement dimensionality, without making any assumptions about the state or channels. Using a tailored macro-pixel basis, precise spatial-mode measurements, and a modified entanglement witness, we demonstrate state fidelities of up to 94.4% in a 19-dimensional state-space, entanglement in up to 55 local dimensions, and an entanglement-of-formation of up to 4 ebits. Furthermore, our measurement times show an improvement of more than two orders of magnitude over previous state-of-the-art demonstrations. Our results pave the way for noise-robust quantum networks that saturate the information-carrying capacity of single photons.
△ Less
Submitted 23 December, 2020; v1 submitted 10 April, 2020;
originally announced April 2020.
-
Semi-Device-Independent Random Number Generation with Flexible Assumptions
Authors:
Matej Pivoluska,
Martin Plesch,
Máté Farkas,
Natália Ružičková,
Clara Flegel,
Natalia Herrera Valencia,
Will McCutcheon,
Mehul Malik,
Edgar A. Aguilar
Abstract:
Our ability to trust that a random number is truly random is essential for fields as diverse as cryptography and fundamental tests of quantum mechanics. Existing solutions both come with drawbacks -- device-independent quantum random number generators (QRNGs) are highly impractical and standard semi-device-independent QRNGs are limited to a specific physical implementation and level of trust. Here…
▽ More
Our ability to trust that a random number is truly random is essential for fields as diverse as cryptography and fundamental tests of quantum mechanics. Existing solutions both come with drawbacks -- device-independent quantum random number generators (QRNGs) are highly impractical and standard semi-device-independent QRNGs are limited to a specific physical implementation and level of trust. Here we propose a new framework for semi-device-independent randomness certification, using a source of trusted vacuum in the form of a signal shutter. It employs a flexible set of assumptions and levels of trust, allowing it to be applied in a wide range of physical scenarios involving both quantum and classical entropy sources. We experimentally demonstrate our protocol with a photonic setup and generate secure random bits under three different assumptions with varying degrees of security and resulting data rates.
△ Less
Submitted 19 March, 2021; v1 submitted 27 February, 2020;
originally announced February 2020.
-
Experimental creation of Multi-Photon High-Dimensional Layered Quantum States
Authors:
Xiao-Min Hu,
Wen-Bo Xing,
Chao Zhang,
Bi-Heng Liu,
Matej Pivoluska,
Marcus Huber,
Yun-Feng Huang,
Chuan-Feng Li,
Guang-Can Guo
Abstract:
Quantum entanglement is one of the most important resources in quantum information. In recent years, the research of quantum entanglement mainly focused on the increase in the number of entangled qubits or the high-dimensional entanglement of two particles. Compared with qubit states, multipartite high-dimensional entangled states have beneficial properties and are powerful for constructing quantu…
▽ More
Quantum entanglement is one of the most important resources in quantum information. In recent years, the research of quantum entanglement mainly focused on the increase in the number of entangled qubits or the high-dimensional entanglement of two particles. Compared with qubit states, multipartite high-dimensional entangled states have beneficial properties and are powerful for constructing quantum networks. However, there are few studies on multipartite high-dimensional quantum entanglement due to the difficulty of creating such states. In this paper, we experimentally prepared a multipartite high-dimensional state $|Ψ_{442}\rangle=\frac{1}{2}(|000\rangle+|110\rangle+|221\rangle+|331\rangle)$ by using the path mode of photons. We obtain the fidelity $F=0.854\pm0.007$ of the quantum state, which proves a real multipartite high-dimensional entangled state. Finally, we use this quantum state to demonstrate a layered quantum network in principle. Our work highlights another route towards complex quantum networks.
△ Less
Submitted 17 January, 2020;
originally announced January 2020.
-
Measurements in two bases are sufficient for certifying high-dimensional entanglement
Authors:
Jessica Bavaresco,
Natalia Herrera Valencia,
Claude Klöckl,
Matej Pivoluska,
Paul Erker,
Nicolai Friis,
Mehul Malik,
Marcus Huber
Abstract:
High-dimensional encoding of quantum information provides a promising method of transcending current limitations in quantum communication. One of the central challenges in the pursuit of such an approach is the certification of high-dimensional entanglement. In particular, it is desirable to do so without resorting to inefficient full state tomography. Here, we show how carefully constructed measu…
▽ More
High-dimensional encoding of quantum information provides a promising method of transcending current limitations in quantum communication. One of the central challenges in the pursuit of such an approach is the certification of high-dimensional entanglement. In particular, it is desirable to do so without resorting to inefficient full state tomography. Here, we show how carefully constructed measurements in two bases (one of which is not orthonormal) can be used to faithfully and efficiently certify bipartite high-dimensional states and their entanglement for any physical platform. To showcase the practicality of this approach under realistic conditions, we put it to the test for photons entangled in their orbital angular momentum. In our experimental setup, we are able to verify 9-dimensional entanglement for a pair of photons on a 11-dimensional subspace each, at present the highest amount certified without any assumptions on the state.
△ Less
Submitted 14 February, 2019; v1 submitted 21 September, 2017;
originally announced September 2017.
-
Loss of Information in Quantum Guessing Game
Authors:
Martin Plesch,
Matej Pivoluska
Abstract:
Incompatibility of certain measurements -- impossibility of obtaining deterministic outcomes simultaneously -- is a well known property of quantum mechanics. This feature can be utilized in many contexts, ranging from Bell inequalities to device dependent QKD protocols. Typically, in these applications the measurements are chosen from a predetermined set based on a classical random variable. One c…
▽ More
Incompatibility of certain measurements -- impossibility of obtaining deterministic outcomes simultaneously -- is a well known property of quantum mechanics. This feature can be utilized in many contexts, ranging from Bell inequalities to device dependent QKD protocols. Typically, in these applications the measurements are chosen from a predetermined set based on a classical random variable. One can naturally ask, whether the non-determinism of the outcomes is due to intrinsic hiding property of quantum mechanics, or rather by the fact that classical, incoherent information entered the system via the choice of the measurement. Authors of [NJP 19, 023038 (2017)] examined this question for a specific case of two mutually unbiased measurements on systems of different dimensions. They have somewhat surprisingly shown that in case of qubits, if the measurements are chosen coherently with the use of a controlled unitary, outcomes of both measurements can be guessed deterministically. Here we extend their analysis and show that specifically for qubits, measurement result for any set of measurements with any a-priori probability distribution can be faithfully guessed by a suitable state preparation and measurement. We also show that up to a small set of specific cases, this is not possible for higher dimensions. This result manifests a deep difference in properties of qubits and higher dimensional systems and suggests that these systems might offer higher security in specific cryptographic protocols. More fundamentally, the results show that the impossibility of predicting a result of a measurement is not caused solely by a loss of coherence between the choice of the measurement and the guessing procedure.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
Layered Quantum Key Distribution
Authors:
Matej Pivoluska,
Marcus Huber,
Mehul Malik
Abstract:
We introduce a family of QKD protocols for distributing shared random keys within a network of $n$ users. The advantage of these protocols is that any possible key structure needed within the network, including broadcast keys shared among subsets of users, can be implemented by using a particular multi-partite high-dimensional quantum state. This approach is more efficient in the number of quantum…
▽ More
We introduce a family of QKD protocols for distributing shared random keys within a network of $n$ users. The advantage of these protocols is that any possible key structure needed within the network, including broadcast keys shared among subsets of users, can be implemented by using a particular multi-partite high-dimensional quantum state. This approach is more efficient in the number of quantum channel uses than conventional quantum key distribution using bipartite links. Additionally, multi-partite high-dimensional quantum states are becoming readily available in quantum photonic labs, making the proposed protocols implementable using current technology.
△ Less
Submitted 23 November, 2017; v1 submitted 1 September, 2017;
originally announced September 2017.
-
1-out-of-2 Oblivious transfer using flawed Bit-string quantum protocol
Authors:
Martin Plesch,
Marcin Pawlowski,
Matej Pivoluska
Abstract:
Oblivious transfer (OT) is an important tool in cryptography. It serves as a subroutine to other complex procedures of both theoretical and practical significance. Common attribute of OT protocols is that one party (Alice) has to send a message to another party (Bob) and has to stay oblivious on whether Bob did receive the message. Specific (OT) protocols vary by exact definition of the task - in…
▽ More
Oblivious transfer (OT) is an important tool in cryptography. It serves as a subroutine to other complex procedures of both theoretical and practical significance. Common attribute of OT protocols is that one party (Alice) has to send a message to another party (Bob) and has to stay oblivious on whether Bob did receive the message. Specific (OT) protocols vary by exact definition of the task - in the all-or-nothing protocol Alice sends a single bit-string message, which Bob is able to read only with 50% probability, whereas in 1-out-of-2 OT protocol Bob reads one out of two messages sent by Alice. These two flavours of protocol are known to be equivalent. Recently a computationally secure all-or-nothing OT protocol based on quantum states was developed in [A. Souto et. al., PRA 91, 042306], which however cannot be reduced to 1-out-of-2 OT protocol by standard means. Here we present an elaborated reduction of this protocol which retains the security of the original.
△ Less
Submitted 30 November, 2016;
originally announced November 2016.
-
Tight bound on the classical value of generalized Clauser-Horne-Shimony-Holt games
Authors:
Matej Pivoluska,
Marcin Pawlowski,
Martin Plesch
Abstract:
Non-local games are an important part of quantum information processing. Recently there has been an increased interest in generalizing non-local games beyond the basic setup by considering games with multiple parties and/or with large alphabet inputs and outputs. In this paper we consider another interesting generalization -- games with non-uniform inputs. Here we derive a tight upper bound for th…
▽ More
Non-local games are an important part of quantum information processing. Recently there has been an increased interest in generalizing non-local games beyond the basic setup by considering games with multiple parties and/or with large alphabet inputs and outputs. In this paper we consider another interesting generalization -- games with non-uniform inputs. Here we derive a tight upper bound for the classical winning probability for a specific family of non-local games with non-uniform input distribution, known as $\mathrm{CHSH}_q(p)$ which was introduced recently in the context of relativistic bit-commitment protocols by [Chakraborty et. al., PRL 115, 250501, 2015].
△ Less
Submitted 8 September, 2016; v1 submitted 29 January, 2016;
originally announced January 2016.
-
An explicit classical strategy for winning a $\mathrm{CHSH}_{q}$ game
Authors:
Matej Pivoluska,
Martin Plesch
Abstract:
A $\mathrm{CHSH}_{q}$ game is a generalization of the standard two player $\mathrm{CHSH}$ game, having $q$ different input and output options. In contrast to the binary game, the best classical and quantum winning strategies are not known exactly. In this paper we provide a constructive classical strategy for winning a $\mathrm{CHSH}_{q}$ game, with $q$ being a prime. Our construction achieves a w…
▽ More
A $\mathrm{CHSH}_{q}$ game is a generalization of the standard two player $\mathrm{CHSH}$ game, having $q$ different input and output options. In contrast to the binary game, the best classical and quantum winning strategies are not known exactly. In this paper we provide a constructive classical strategy for winning a $\mathrm{CHSH}_{q}$ game, with $q$ being a prime. Our construction achieves a winning probability better than $\frac{1}{22}q^{-\frac{2}{3}}$, which is in contrast with the previously known constructive strategies achieving only the winning probability of $O(q^{-1})$.
△ Less
Submitted 26 October, 2015;
originally announced October 2015.
-
Device Independent Random Number Generation
Authors:
Mataj Pivoluska,
Martin Plesch
Abstract:
Randomness is an invaluable resource in today's life with a broad use reaching from numerical simulations through randomized algorithms to cryptography. However, on the classical level no true randomness is available and even the use of simple quantum devices in a prepare-measure setting suffers from lack of stability and controllability. This gave rise to a group of quantum protocols that provide…
▽ More
Randomness is an invaluable resource in today's life with a broad use reaching from numerical simulations through randomized algorithms to cryptography. However, on the classical level no true randomness is available and even the use of simple quantum devices in a prepare-measure setting suffers from lack of stability and controllability. This gave rise to a group of quantum protocols that provide randomness certified by classical statistical tests -- Device Independent Quantum Random Number Generators. In this paper we review the most relevant results in this field, which allow the production of almost perfect randomness with help of quantum devices, supplemented with an arbitrary weak source of additional randomness. This is in fact the best one could hope for to achieve, as with no starting randomness (corresponding to no free will in a different concept) even a quantum world would have a fully deterministic description.
△ Less
Submitted 23 February, 2015;
originally announced February 2015.
-
Device-independent randomness extraction for arbitrarily weak min-entropy source
Authors:
Jan Bouda,
Marcin Pawlowski,
Matej Pivoluska,
Martin Plesch
Abstract:
Expansion and amplification of weak randomness plays a crucial role in many security protocols. Using quantum devices, such procedure is possible even without trusting the devices used, by utilizing correlations between outcomes of parts of the devices. We show here how to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy source in a device independent set…
▽ More
Expansion and amplification of weak randomness plays a crucial role in many security protocols. Using quantum devices, such procedure is possible even without trusting the devices used, by utilizing correlations between outcomes of parts of the devices. We show here how to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy source in a device independent setting. To do this we use Mermin devices that exhibit super-classical correlations. Number of devices used scales polynomially in the length of the random sequence $n$. Our protocol is robust, it can tolerate devices that malfunction with a probability drop** polynomially in $n$ at the cost of a minor increase of the number of devices used.
△ Less
Submitted 14 March, 2014; v1 submitted 5 February, 2014;
originally announced February 2014.
-
Device-independent randomness amplification with a single device
Authors:
Martin Plesch,
Matej Pivoluska
Abstract:
Expansion and amplification of weak randomness with untrusted quantum devices has recently become a very fruitful topic of research. Here we contribute with a procedure for amplifying a single weak random source using tri-partite GHZ-type entangled states. If the quality of the source reaches a fixed threshold $R=\frac{1}{4}\log_{2}(10)$, perfect random bits can be produced. This technique can be…
▽ More
Expansion and amplification of weak randomness with untrusted quantum devices has recently become a very fruitful topic of research. Here we contribute with a procedure for amplifying a single weak random source using tri-partite GHZ-type entangled states. If the quality of the source reaches a fixed threshold $R=\frac{1}{4}\log_{2}(10)$, perfect random bits can be produced. This technique can be used to extract randomness from sources that can't be extracted neither classically, nor by existing procedures developed for Santha-Vazirani sources. Our protocol works with a single fault-free device decomposable into three non-communicating parts, that is repeatedly reused throughout the amplification process.
△ Less
Submitted 6 August, 2014; v1 submitted 5 May, 2013;
originally announced May 2013.
-
Weak randomness completely trounces the security of QKD
Authors:
Jan Bouda,
Matej Pivoluska,
Martin Plesch,
Colin Wilmott
Abstract:
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel im…
▽ More
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this Letter we show that the security of QKD protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels.
△ Less
Submitted 9 June, 2012; v1 submitted 6 June, 2012;
originally announced June 2012.
-
Encryption with Weakly Random Keys Using Quantum Ciphertext
Authors:
J. Bouda,
M. Pivoluska,
M. Plesch
Abstract:
The lack of perfect randomness can cause significant problems in securing communication between two parties. McInnes and Pinkas proved that unconditionally secure encryption is impossible when the key is sampled from a weak random source. The adversary can always gain some information about the plaintext, regardless of the cryptosystem design. Most notably, the adversary can obtain full informatio…
▽ More
The lack of perfect randomness can cause significant problems in securing communication between two parties. McInnes and Pinkas proved that unconditionally secure encryption is impossible when the key is sampled from a weak random source. The adversary can always gain some information about the plaintext, regardless of the cryptosystem design. Most notably, the adversary can obtain full information about the plaintext if he has access to just two bits of information about the source (irrespective on length of the key). In this paper we show that for every weak random source there is a cryptosystem with a classical plaintext, a classical key, and a quantum ciphertext that bounds the adversary's probability p to guess correctly the plaintext strictly under the McInnes-Pinkas bound, except for a single case, where it coincides with the bound. In addition, regardless of the source of randomness, the adversary's probability p is strictly smaller than 1 as long as there is some uncertainty in the key (Shannon/min-entropy is non-zero). These results are another demonstration that quantum information processing can solve cryptographic tasks with strictly higher security than classical information processing.
△ Less
Submitted 17 February, 2012; v1 submitted 9 September, 2011;
originally announced September 2011.