-
A consolidated and accessible security proof for finite-size decoy-state quantum key distribution
Authors:
Jerome Wiesemann,
Jan Krause,
Davide Rusca,
Nino Walenta
Abstract:
In recent years, quantum key distribution (QKD) has evolved from a scientific research field to a commercially viable security solution, supported by mathematically formulated security proofs. However, since the knowledge required for a full understanding of a security proof is scattered across numerous publications, it has proven difficult to gain a comprehensive understanding of each step involv…
▽ More
In recent years, quantum key distribution (QKD) has evolved from a scientific research field to a commercially viable security solution, supported by mathematically formulated security proofs. However, since the knowledge required for a full understanding of a security proof is scattered across numerous publications, it has proven difficult to gain a comprehensive understanding of each step involved in the process and their limitations without considerable effort and attention to detail. Our paper aims to address this issue by presenting an accessible and comprehensive security proof for the finite-size 1-decoy (and 2-decoy) BB84 protocol in Renner's entropic uncertainty relation framework. We extensively consolidate and unify concepts from many works, thoroughly discussing the underlying assumptions and resolving technical inconsistencies. This work can serve as a foundation for the discussion of QKD security and for the identification of potential vulnerabilities and device imperfections. Our step-by-step approach and consistent notation assumes no prior exposure to security proofs, making it a robust and comprehensible reference, while maintaining theoretical rigor. Therefore, our contribution represents a significant advancement towards a broader understanding of QKD security proofs.
△ Less
Submitted 26 May, 2024;
originally announced May 2024.
-
Quantum key distribution with unbounded pulse correlations
Authors:
Margarida Pereira,
Guillermo Currás-Lorenzo,
Akihiro Mizutani,
Davide Rusca,
Marcos Curty,
Kiyoshi Tamaki
Abstract:
A prevalent issue in practical applications of quantum key distribution (QKD) is the emergence of correlations among the emitted signals. Although recent works have proved the security of QKD in the presence of this imperfection, they rest on the premise that pulse correlations are of finite length. However, this assumption is not necessarily met in practice, since the length of these correlations…
▽ More
A prevalent issue in practical applications of quantum key distribution (QKD) is the emergence of correlations among the emitted signals. Although recent works have proved the security of QKD in the presence of this imperfection, they rest on the premise that pulse correlations are of finite length. However, this assumption is not necessarily met in practice, since the length of these correlations could be potentially unbounded. Indeed, the first emitted pulse could be correlated with the last one, even if very faintly. Still, intuitively, there should exist a pulse separation threshold after which these correlations become so small as to be essentially negligible, rendering them inconsequential from a security standpoint. Building on this insight, we introduce a general formalism designed to extend existing security proofs to the practically relevant scenario in which pulse correlations have an unbounded length. This approach significantly enhances the applicability of these proofs and the robustness of QKD's implementation security.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Optical payload design for downlink quantum key distribution and keyless communication using CubeSats
Authors:
Pedro Mendes,
Gonçalo Teixeira,
David Pinho,
Rui Rocha,
Paulo André,
Manfred Niehus,
Ricardo Faleiro,
Davide Rusca,
Emmanuel Zambrini Cruzeiro
Abstract:
Quantum key distribution is costly and, at the moment, offers low performance in space applications. Other more recent protocols could offer a potential practical solution to this problem. In this work, a preliminary optical payload design using commercial off-the-shelf elements for a quantum communication downlink in a 3U CubeSat is proposed. It is shown that this quantum state emitter allows the…
▽ More
Quantum key distribution is costly and, at the moment, offers low performance in space applications. Other more recent protocols could offer a potential practical solution to this problem. In this work, a preliminary optical payload design using commercial off-the-shelf elements for a quantum communication downlink in a 3U CubeSat is proposed. It is shown that this quantum state emitter allows the establishment of two types of quantum communication between the satellite and the ground station: quantum key distribution and quantum keyless private communication. Numerical simulations are provided that show the feasibility of the scheme for both protocols as well as their performance. For the simplified BB84, a maximum secret key rate of about 80 kHz and minimum QBER of slightly more than $0.07\ \%$ is found, at the zenith, while for quantum private keyless communication, a 700 MHz private rate is achieved. This design serves as a platform for the implementation of novel quantum communication protocols that can improve the performance of quantum communications in space.
△ Less
Submitted 24 October, 2023;
originally announced October 2023.
-
High-speed integrated QKD system
Authors:
Rebecka Sax,
Alberto Boaron,
Gianluca Boso,
Simone Atzeni,
Andrea Crespi,
Fadri GrÜnenfelder,
Davide Rusca,
Aws Al-Saadi,
Danilo Bronzi,
Sebastian Kupijai,
Hanjo Rhee,
Roberto Osellame,
Hugo Zbinden
Abstract:
Quantum key distribution (QKD) is nowadays a well established method for generating secret keys at a distance in an information-theoretic secure way, as the secrecy of QKD relies on the laws of quantum physics and not computational complexity. In order to industrialize QKD, low-cost, mass-manufactured and practical QKD setups are required. Hence, photonic and electronic integration of the sender's…
▽ More
Quantum key distribution (QKD) is nowadays a well established method for generating secret keys at a distance in an information-theoretic secure way, as the secrecy of QKD relies on the laws of quantum physics and not computational complexity. In order to industrialize QKD, low-cost, mass-manufactured and practical QKD setups are required. Hence, photonic and electronic integration of the sender's and receiver's respective components is currently in the spotlight. Here we present a high-speed (2.5 GHz) integrated QKD setup featuring a transmitter chip in silicon photonics allowing for high-speed modulation and accurate state preparation, as well as a polarization-independent low-loss receiver chip in aluminum borosilicate glass fabricated by the femtosecond laser micromachining technique. Our system achieves raw bit error rates, quantum bit error rates and secret key rates equivalent to a much more complex state-of-the-art setup based on discrete components.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
Fast Single Photon Detectors and real-time Key Distillation: Enabling High Secret Key Rate QKD Systems
Authors:
Fadri Grünenfelder,
Alberto Boaron,
Matthieu Perrenoud,
Giovanni V. Resta,
Davide Rusca,
Claudio Barreiro,
Raphaël Houlmann,
Rebecka Sax,
Lorenzo Stasi,
Sylvain El-Khoury,
Esther Hänggi,
Nico Bosshard,
Félix Bussières,
Hugo Zbinden
Abstract:
Quantum Key Distribution has made continuous progress over the last 20 years and is now commercially available. However, the secret key rates (SKR) are still limited to a few Mbps. Here, we present a custom multipixel superconducting nanowire single-photon detectors and fast acquisition and real-time key distillation electronics, removing two roadblocks and allowing an increase of the SKR of more…
▽ More
Quantum Key Distribution has made continuous progress over the last 20 years and is now commercially available. However, the secret key rates (SKR) are still limited to a few Mbps. Here, we present a custom multipixel superconducting nanowire single-photon detectors and fast acquisition and real-time key distillation electronics, removing two roadblocks and allowing an increase of the SKR of more than an order of magnitude. In combination with a simple 2.5 GHz clocked time-bin quantum key distribution system, we can generate secret keys at a rate of 64 Mbps over a distance of 10.0 km and at a rate of 3.0 Mbps over a distance of 102.4 km with real-time key distillation.
△ Less
Submitted 28 October, 2022;
originally announced October 2022.
-
Receiver-Device-Independent Quantum Key Distribution
Authors:
Marie Ioannou,
Maria Ana Pereira,
Davide Rusca,
Fadri Grünenfelder,
Alberto Boaron,
Matthieu Perrenoud,
Alastair A. Abbott,
Pavel Sekatski,
Jean-Daniel Bancal,
Nicolas Maring,
Hugo Zbinden,
Nicolas Brunner
Abstract:
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box. The security of the protocols is based on the assumption that Alice's prepared states have limited overlaps, but no explicit bound on the Hilbert space dimensio…
▽ More
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box. The security of the protocols is based on the assumption that Alice's prepared states have limited overlaps, but no explicit bound on the Hilbert space dimension is required. The protocols are immune to attacks on the receiver's device, such as blinding attacks. The users can establish a secret key while continuously monitoring the correct functioning of their devices through observed statistics. We report a proof-of-principle demonstration, involving mostly off-the-shelf equipment, as well as a high-efficiency superconducting nanowire detector. A positive key rate is demonstrated over a 4.8 km low-loss optical fiber with finite-key analysis. The prospects of implementing these protocols over longer distances is discussed.
△ Less
Submitted 18 May, 2022; v1 submitted 29 April, 2021;
originally announced April 2021.
-
A High Speed Integrated Quantum Random Number Generator with on-Chip Real-Time Randomness Extraction
Authors:
Francesco Regazzoni,
Emna Amri,
Samuel Burri,
Davide Rusca,
Hugo Zbinden,
Edoardo Charbon
Abstract:
The security of electronic devices has become a key requisite for the rapidly-expanding pervasive and hyper-connected world. Robust security protocols ensuring secure communication, device's resilience to attacks, authentication control and users privacy need to be implemented. Random Number Generators (RNGs) are the fundamental primitive in most secure protocols but, often, also the weakest one.…
▽ More
The security of electronic devices has become a key requisite for the rapidly-expanding pervasive and hyper-connected world. Robust security protocols ensuring secure communication, device's resilience to attacks, authentication control and users privacy need to be implemented. Random Number Generators (RNGs) are the fundamental primitive in most secure protocols but, often, also the weakest one. Establishing security in billions of devices requires high quality random data generated at a sufficiently high throughput. On the other hand, the RNG should exhibit a high integration level with on-chip extraction to remove, in real time, potential imperfections. We present the first integrated Quantum RNG (QRNG) in a standard CMOS technology node. The QRNG is based on a parallel array of independent Single-Photon Avalanche Diodes (SPADs), homogeneously illuminated by a DC-biased LED, and co-integrated logic circuits for postprocessing. We describe the randomness generation process and we prove the quantum origin of entropy. We show that co-integration of combinational logic, even of high complexity, does not affect the quality of randomness. Our CMOS QRNG can reach up to 400 Mbit/s throughput with low power consumption. Thanks to the use of standard CMOS technology and a modular architecture, our QRNG is suitable for a highly scalable solution.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
Quantum Keyless Privacy vs. Quantum Key Distribution for Space Links
Authors:
A. Vazquez-Castro,
D. Rusca,
H. Zbinden
Abstract:
We study information theoretical security for space links between a satellite and a ground-station. Quantum key distribution (QKD) is a well established method for information theoretical secure communication, giving the eavesdropper unlimited access to the channel and technological resources only limited by the laws of quantum physics. But QKD for space links is extremely challenging, the achieve…
▽ More
We study information theoretical security for space links between a satellite and a ground-station. Quantum key distribution (QKD) is a well established method for information theoretical secure communication, giving the eavesdropper unlimited access to the channel and technological resources only limited by the laws of quantum physics. But QKD for space links is extremely challenging, the achieved key rates are extremely low, and day-time operating impossible. However, eavesdrop** on a channel in free-space without being noticed seems complicated, given the constraints imposed by orbital mechanics. If we also exclude eavesdropper's presence in a given area around the emitter and receiver, we can guarantee that he has only access to a fraction of the optical signal. In this setting, quantum keyless private (direct) communication based on the wiretap channel model is a valid alternative to provide information theoretical security. Like for QKD, we assume the legitimate users to be limited by state-of-the-art technology, while the potential eavesdropper is only limited by physical laws: physical measurement (Helstrom detector) and quantum electrodynamics (Holevo bound). Nevertheless, we demonstrate information theoretical secure communication rates (positive keyless private capacity) over a classical-quantum wiretap channel using on-off-keying of coherent states. We present numerical results for a setting equivalent to the recent experiments with the Micius satellite and compare them to the fundamental limit for the secret key rate of QKD. We obtain much higher rates compared with QKD with exclusion area of less than 13 meters for Low Earth Orbit (LEO) satellites. Moreover, we show that the wiretap channel quantum keyless privacy is much less sensitive to noise and signal dynamics and daytime operation is possible.
△ Less
Submitted 6 December, 2020;
originally announced December 2020.
-
Countermeasure against quantum hacking using detection statistics
Authors:
Gaëtan Gras,
Davide Rusca,
Hugo Zbinden,
Félix Bussières
Abstract:
Detector blinding attacks have been proposed in the last few years, and they could potentially threaten the security of QKD systems. Even though no complete QKD system has been hacked yet, it is nevertheless important to consider countermeasures to avoid information leakage. In this paper, we present a new countermeasure against these kind of attacks based on the use of multi-pixel detectors. We s…
▽ More
Detector blinding attacks have been proposed in the last few years, and they could potentially threaten the security of QKD systems. Even though no complete QKD system has been hacked yet, it is nevertheless important to consider countermeasures to avoid information leakage. In this paper, we present a new countermeasure against these kind of attacks based on the use of multi-pixel detectors. We show that with this method, we are able to estimate an upper bound on the information an eavesdropper could have on the key exchanged. Finally, we test a multi-pixel detector based on SNSPDs to show it can fulfill all the requirement for our countermeasure to be effective.
△ Less
Submitted 16 October, 2020;
originally announced October 2020.
-
Performance and security of 5 GHz repetition rate polarization-based Quantum Key Distribution
Authors:
Fadri Grünenfelder,
Alberto Boaron,
Davide Rusca,
Anthony Martin,
Hugo Zbinden
Abstract:
We present and characterize a source for a 5 GHz clocked polarization-based simplified BB84 protocol. Secret keys are distributed over 151.5 km of standard telecom fiber at a rate of 54.5 kbps. Potentially, an increased clock frequency of the experiment introduces correlations between succeeding pulses. We discuss the impact of these correlations and propose measurements to estimate the relevant p…
▽ More
We present and characterize a source for a 5 GHz clocked polarization-based simplified BB84 protocol. Secret keys are distributed over 151.5 km of standard telecom fiber at a rate of 54.5 kbps. Potentially, an increased clock frequency of the experiment introduces correlations between succeeding pulses. We discuss the impact of these correlations and propose measurements to estimate the relevant parameters.
△ Less
Submitted 30 July, 2020;
originally announced July 2020.
-
Fast self-testing Quantum Random Number Generator based on homodyne detection
Authors:
Davide Rusca,
Hamid Tebyanian,
Anthony Martin,
Hugo Zbinden
Abstract:
Self-testing and Semi-Device Independent protocols are becoming the preferred choice for quantum technologies, being able to certify their quantum nature with few assumptions and simple experimental implementations. In particular for Quantum Random Number Generators the possibility of monitoring in real time the entropy of the source only by measuring the input/output statistics is a characteristi…
▽ More
Self-testing and Semi-Device Independent protocols are becoming the preferred choice for quantum technologies, being able to certify their quantum nature with few assumptions and simple experimental implementations. In particular for Quantum Random Number Generators the possibility of monitoring in real time the entropy of the source only by measuring the input/output statistics is a characteristic that no other classical system could provide. The cost of this new possibility is not necessarily increased complexity and reduced performance. Indeed, here we show that with a simple optical setup consisting of commercially available components, a high bit generation rate can be achieved. We manage to certify 145.5~MHz of quantum random bit generation rate.
△ Less
Submitted 17 April, 2020;
originally announced April 2020.
-
Efficient time-bin encoding for practical high-dimensional quantum key distribution
Authors:
I. Vagniluca,
B. Da Lio,
D. Rusca,
D. Cozzolino,
Y. Ding,
H. Zbinden,
A. Zavatta,
L. K. Oxenløwe,
D. Bacco
Abstract:
High-dimensional quantum key distribution (QKD) allows to achieve information-theoretic secure communications, providing high key generation rates which cannot in principle be obtained by QKD protocols with binary encoding. Nonetheless, the amount of experimental resources needed increases as the quantum states to be detected belong to a larger Hilbert space, thus raising the costs of practical hi…
▽ More
High-dimensional quantum key distribution (QKD) allows to achieve information-theoretic secure communications, providing high key generation rates which cannot in principle be obtained by QKD protocols with binary encoding. Nonetheless, the amount of experimental resources needed increases as the quantum states to be detected belong to a larger Hilbert space, thus raising the costs of practical high-dimensional systems. Here, we present a novel scheme for fiber-based 4-dimensional QKD, with time and phase encoding and one-decoy state technique. Quantum states transmission is tested over different channel lengths up to 145 km of standard single-mode fiber, evaluating the enhancement of the secret key rate in comparison to the three-state 2-dimensional BB84 protocol, which is tested with the same experimental setup. Our scheme allows to measure the 4-dimensional states with a simplified and compact receiver, where only two single-photon detectors are necessary, thus making it a cost-effective solution for practical and fiber-based QKD.
△ Less
Submitted 7 April, 2020;
originally announced April 2020.
-
Practical self-testing quantum random number generator based on an energy bound
Authors:
Davide Rusca,
Thomas van Himbeeck,
Anthony Martin,
Jonatan Bohr Brask,
Weixu Shi,
Stefano Pironio,
Nicolas Brunner,
Hugo Zbinden
Abstract:
We present a scheme for a self-testing quantum random number generator. Compared to the fully device-independent model, our scheme requires an extra natural assumption, namely that the mean energy per signal is bounded. The scheme is self-testing, as it allows the user to verify in real-time the correct functioning of the setup, hence guaranteeing the continuous generation of certified random bits…
▽ More
We present a scheme for a self-testing quantum random number generator. Compared to the fully device-independent model, our scheme requires an extra natural assumption, namely that the mean energy per signal is bounded. The scheme is self-testing, as it allows the user to verify in real-time the correct functioning of the setup, hence guaranteeing the continuous generation of certified random bits. Based on a prepare-and-measure setup, our scheme is practical, and we implement it using only off-the-shelf optical components. The randomness generation rate is 1.25 Mbits/s, comparable to commercial solutions. Overall, we believe that this scheme achieves a promising trade-off between the required assumptions, ease-of-implementation and performance.
△ Less
Submitted 11 April, 2019; v1 submitted 9 April, 2019;
originally announced April 2019.
-
Security proof for a simplified BB84-like QKD protocol
Authors:
Davide Rusca,
Alberto Boaron,
Marcos Curty,
Anthony Martin,
Hugo Zbinden
Abstract:
The security of quantum key distribution (QKD) has been proven for different protocols, in particular for the BB84 protocol. It has been shown that this scheme is robust against eventual imperfections in the state preparation, and sending only three different states delivers the same secret key rate achievable with four states. In this work, we prove, in a finite-key scenario, that the security of…
▽ More
The security of quantum key distribution (QKD) has been proven for different protocols, in particular for the BB84 protocol. It has been shown that this scheme is robust against eventual imperfections in the state preparation, and sending only three different states delivers the same secret key rate achievable with four states. In this work, we prove, in a finite-key scenario, that the security of this protocol can be maintained even with less measurement operators on the receiver. This allows us to implement a time-bin encoding scheme with a minimum amount of resources.
△ Less
Submitted 9 October, 2018; v1 submitted 24 August, 2018;
originally announced August 2018.
-
Secure quantum key distribution over 421 km of optical fiber
Authors:
Alberto Boaron,
Gianluca Boso,
Davide Rusca,
Cédric Vulliez,
Claire Autebert,
Misael Caloz,
Matthieu Perrenoud,
Gaëtan Gras,
Félix Bussières,
Ming-Jun Li,
Daniel Nolan,
Anthony Martin,
Hugo Zbinden
Abstract:
We present a quantum key distribution system with a 2.5 GHz repetition rate using a three-state time-bin protocol combined with a one-decoy approach. Taking advantage of superconducting single-photon detectors optimized for quantum key distribution and ultra low-loss fiber, we can distribute secret keys at a maximum distance of 421 km and obtain secret key rates of 6.5 bps over 405 km.
We present a quantum key distribution system with a 2.5 GHz repetition rate using a three-state time-bin protocol combined with a one-decoy approach. Taking advantage of superconducting single-photon detectors optimized for quantum key distribution and ultra low-loss fiber, we can distribute secret keys at a maximum distance of 421 km and obtain secret key rates of 6.5 bps over 405 km.
△ Less
Submitted 9 July, 2018;
originally announced July 2018.
-
Simple 2.5 GHz time-bin quantum key distribution
Authors:
Alberto Boaron,
Boris Korzh,
Raphael Houlmann,
Gianluca Boso,
Davide Rusca,
Stuart Gray,
Ming-Jun Li,
Daniel Nolan,
Anthony Martin,
Hugo Zbinden
Abstract:
We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fiber.
We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fiber.
△ Less
Submitted 15 April, 2018;
originally announced April 2018.
-
Simple and high-speed polarization-based QKD
Authors:
Fadri Grünenfelder,
Alberto Boaron,
Davide Rusca,
Anthony Martin,
Hugo Zbinden
Abstract:
We present a simplified BB84 protocol with only three quantum states and one decoy-state level. We implement this scheme using the polarization degree of freedom at telecom wavelength. Only one pulsed laser is used in order to reduce possible side-channel attacks. The repetition rate of 625 MHz and the achieved secret bit rate of 23 bps over 200 km of standard fiber are the actual state of the art…
▽ More
We present a simplified BB84 protocol with only three quantum states and one decoy-state level. We implement this scheme using the polarization degree of freedom at telecom wavelength. Only one pulsed laser is used in order to reduce possible side-channel attacks. The repetition rate of 625 MHz and the achieved secret bit rate of 23 bps over 200 km of standard fiber are the actual state of the art.
△ Less
Submitted 30 January, 2018;
originally announced January 2018.
-
Finite-key analysis on the 1-decoy state QKD protocol
Authors:
Davide Rusca,
Alberto Boaron,
Fadri Grünenfelder,
Anthony Martin,
Hugo Zbinden
Abstract:
It has been shown that in the asymptotic case of infinite-key length the 2-decoy state QKD protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to $10^8$ bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Sinc…
▽ More
It has been shown that in the asymptotic case of infinite-key length the 2-decoy state QKD protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to $10^8$ bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for practical QKD.
△ Less
Submitted 17 April, 2018; v1 submitted 10 January, 2018;
originally announced January 2018.
-
Detection of squeezing by on-chip glass-integrated homodyne analyzer
Authors:
Carmen Porto,
Davide Rusca,
Simone Cialdi,
Andrea Crespi,
Roberto Osellame,
Dario Tamascelli,
Stefano Olivares,
Matteo G. A. Paris
Abstract:
We design and demonstrate on-chip homodyne detection operating in the quantum regime, i.e. able to detect genuine nonclassical features. Our setup exploits a glass-integrated homodyne analyzer (IHA) entirely fabricated by femtosecond laser micromachining. The IHA incorporates on the same chip a balanced waveguide beam splitter and a thermo-optic phase shifter, allowing us to record homodyne traces…
▽ More
We design and demonstrate on-chip homodyne detection operating in the quantum regime, i.e. able to detect genuine nonclassical features. Our setup exploits a glass-integrated homodyne analyzer (IHA) entirely fabricated by femtosecond laser micromachining. The IHA incorporates on the same chip a balanced waveguide beam splitter and a thermo-optic phase shifter, allowing us to record homodyne traces at different phases and to perform reliable quantum state tomography. In particular, we show that the IHA allows for the detection of nonclassical features of continuous-variable quantum states, such as squeezed states.
△ Less
Submitted 12 October, 2017;
originally announced October 2017.
-
Single-photon quantum contextuality on a chip
Authors:
Andrea Crespi,
Marco Bentivegna,
Ioannis Pitsios,
Davide Rusca,
Davide Poderini,
Gonzalo Carvacho,
Vincenzo D'Ambrosio,
Adán Cabello,
Fabio Sciarrino,
Roberto Osellame
Abstract:
In classical physics, properties of the objects exist independently on the context, i.e. whether and how measurements are performed. Quantum physics showed this assumption to be wrong and that Nature is indeed "contextual". Contextuality has been observed in the simplest physical systems such as single particles, and plays fundamental roles in quantum computation advantage. Here, we demonstrate fo…
▽ More
In classical physics, properties of the objects exist independently on the context, i.e. whether and how measurements are performed. Quantum physics showed this assumption to be wrong and that Nature is indeed "contextual". Contextuality has been observed in the simplest physical systems such as single particles, and plays fundamental roles in quantum computation advantage. Here, we demonstrate for the first time quantum contextuality in an integrated photonic chip. The chip implements different combinations of measurements on a single photon delocalized on four distinct spatial modes. We show violations of a CHSH-like non-contextuality inequality by 14 standard deviations. This paves the way to compact and portable devices for contextuality-based quantum-powered protocols.
△ Less
Submitted 17 May, 2017;
originally announced May 2017.