-
Satellite-to-Ground Continuous Variable Quantum Key Distribution: The Gaussian and Discrete Modulated Protocols in Low Earth Orbit
Authors:
Mikhael Sayat,
Biveen Shajilal,
Sebastian P. Kish,
Syed M. Assad,
Thomas Symul,
** Koy Lam,
Nicholas Rattenbury,
John Cater
Abstract:
The Gaussian modulated continuous variable quantum key distribution (GM-CVQKD) protocol is known to maximise the mutual information between two parties during quantum key distribution (QKD). An alternative modulation scheme is the discrete modulated CVQKD (DM-CVQKD) protocol. In this paper, we study the Phase Shift Keying (M-PSK) and Quadrature Amplitude Modulation (M QAM) DM-CVQKD protocols along…
▽ More
The Gaussian modulated continuous variable quantum key distribution (GM-CVQKD) protocol is known to maximise the mutual information between two parties during quantum key distribution (QKD). An alternative modulation scheme is the discrete modulated CVQKD (DM-CVQKD) protocol. In this paper, we study the Phase Shift Keying (M-PSK) and Quadrature Amplitude Modulation (M QAM) DM-CVQKD protocols along with the GM-CVQKD protocol over a satellite-to-ground link in the low SNR regime. We use a satellite-to-ground link model which takes into account geometric losses, scintillation, and scattering losses from the link distance, atmospheric turbulence, and atmospheric aerosols, respectively. In addition, recent multidimensional (MD) and multilevel coding and multistage decoding (MLC-MSD) reconciliation method models in combination with multiedge-type low-density parity-check (MET-LDPC) code models have been used to determine the reconciliation efficiency. The results show that GM-CVQKD outperforms DM-CVQKD. In addition, GM-CVQKD with MD reconciliation outperforms GM-CVQKD with MLC-MSD reconciliation in the finite size limit by producing positive secret key rates at larger link distances and lower elevation angles.
△ Less
Submitted 13 May, 2023; v1 submitted 30 November, 2022;
originally announced November 2022.
-
Reconstruction of photon number conditioned states using phase randomized homodyne measurements
Authors:
H. M. Chrzanowski,
S. M. Assad,
Julien Bernu,
Boris Hage,
A. P. Lund,
T. C. Ralph,
P. K. Lam,
T. Symul
Abstract:
We experimentally demonstrate the reconstruction of a photon number conditioned state without using a photon number discriminating detector. By using only phase randomized homodyne measurements, we reconstruct up to the three photon subtracted squeezed vacuum state. The reconstructed Wigner functions of these states show regions of pronounced negativity, signifying the non-classical nature of the…
▽ More
We experimentally demonstrate the reconstruction of a photon number conditioned state without using a photon number discriminating detector. By using only phase randomized homodyne measurements, we reconstruct up to the three photon subtracted squeezed vacuum state. The reconstructed Wigner functions of these states show regions of pronounced negativity, signifying the non-classical nature of the reconstructed states. The techniques presented allow for complete characterization of the role of a conditional measurement on an ensemble of states, and might prove useful in systems where photon counting still proves technically challenging.
△ Less
Submitted 27 July, 2021; v1 submitted 26 July, 2021;
originally announced July 2021.
-
Finite-size effects in continuous-variable QKD with Gaussian post-selection
Authors:
Nedasadat Hosseinidehaj,
Andrew M. Lance,
Thomas Symul,
Nathan Walk,
Timothy C. Ralph
Abstract:
In a continuous-variable quantum key distribution (CV-QKD) protocol, which is based on heterodyne detection at the receiver, the application of a noiseless linear amplifier (NLA) on the received signal before the detection can be emulated by the post-selection of the detection outcome. Such a post-selection, which is also called a measurement-based NLA, requires a cut-off to produce a normalisable…
▽ More
In a continuous-variable quantum key distribution (CV-QKD) protocol, which is based on heterodyne detection at the receiver, the application of a noiseless linear amplifier (NLA) on the received signal before the detection can be emulated by the post-selection of the detection outcome. Such a post-selection, which is also called a measurement-based NLA, requires a cut-off to produce a normalisable filter function. Increasing the cut-off with respect to the received signals results in a more faithful emulation of the NLA and nearly Gaussian output statistics at the cost of discarding more data. While recent works have shown the benefits of post-selection via an asymptotic security analysis, we undertake the first investigation of such a post-selection utilising a composable security proof in the realistic finite-size regime, where this trade-off is extremely relevant. We show that this form of post-selection can improve the secure range of a CV-QKD over lossy thermal channels if the finite block size is sufficiently large and that the optimal value for the filter cut-off is typically in the non-Gaussian regime. The relatively modest improvement in the finite-size regime as compared to the asymptotic case highlights the need for new tools to prove the security of non-Gaussian cryptographic protocols. These results also represent a quantitative assessment of a measurement-based NLA with an entangled-state input in both the Gaussian and non-Gaussian regime.
△ Less
Submitted 19 December, 2019;
originally announced December 2019.
-
Quantum enhancement of signal-to-noise ratio with a heralded linear amplifier
Authors:
Jie Zhao,
Josephine Dias,
**g Yan Haw,
Mark Bradshaw,
Remi Blandino,
Thomas Symul,
Timothy C. Ralph,
Syed M. Assad,
** Koy Lam
Abstract:
Due to the pervasive nature of decoherence, protection of quantum information during transmission is of critical importance for any quantum network. A linear amplifier that can enhance quantum signals stronger than their associated noise while preserving quantum coherence is therefore of great use. This seemingly unphysical amplifier property is achievable for a class of probabilistic amplifiers t…
▽ More
Due to the pervasive nature of decoherence, protection of quantum information during transmission is of critical importance for any quantum network. A linear amplifier that can enhance quantum signals stronger than their associated noise while preserving quantum coherence is therefore of great use. This seemingly unphysical amplifier property is achievable for a class of probabilistic amplifiers that does not work deterministically. Here we present a linear amplification scheme that realises this property for coherent states by combining a heralded measurement-based noiseless linear amplifier and a deterministic linear amplifier. The concatenation of two amplifiers introduces the flexibility that allows one to tune between the regimes of high-gain or high noise-reduction, and control the trade-off of these performances against a finite heralding probability. We demonstrate an amplification signal transfer coefficient of $\mathcal{T}_s > 1$ with no statistical distortion of the output state. By partially relaxing the demand of output Gaussianity, we can obtain further improvement to achieve a $\mathcal{T}_s = 2.55 \pm 0.08$. Our amplification scheme only relies on linear optics and post-selection algorithm. We discuss the potential of using this amplifier as a building block in extending the distance of quantum communication.
△ Less
Submitted 27 June, 2018;
originally announced June 2018.
-
Violation of Bells inequality using continuous variable measurements
Authors:
Oliver Thearle,
Jiri Janousek,
Seiji Armstrong,
Sara Hosseini,
Melanie Schünemann,
Syed Assad,
Thomas Symul,
Matthew R. James,
Elanor Huntington,
Timothy C. Ralph,
** Koy Lam
Abstract:
A Bell inequality is a fundamental test to rule out local hidden variable model descriptions of correlations between two physically separated systems. There have been a number of experiments in which a Bell inequality has been violated using discrete-variable systems. We demonstrate a violation of Bells inequality using continuous variable quadrature measurements. By creating a four-mode entangled…
▽ More
A Bell inequality is a fundamental test to rule out local hidden variable model descriptions of correlations between two physically separated systems. There have been a number of experiments in which a Bell inequality has been violated using discrete-variable systems. We demonstrate a violation of Bells inequality using continuous variable quadrature measurements. By creating a four-mode entangled state with homodyne detection, we recorded a clear violation with a Bell value of $B = 2.31 \pm 0.02$. This opens new possibilities for using continuous variable states for device independent quantum protocols.
△ Less
Submitted 9 January, 2018;
originally announced January 2018.
-
Surpassing the no-cloning limit with a heralded hybrid linear amplifier for coherent states
Authors:
**g Yan Haw,
Jie Zhao,
Josephine Dias,
Syed M. Assad,
Mark Bradshaw,
Rémi Blandino,
Thomas Symul,
Timothy C. Ralph,
** Koy Lam
Abstract:
The no-cloning theorem states that an unknown quantum state cannot be cloned exactly and deterministically due to the linearity of quantum mechanics. Associated with this theorem is the quantitative no-cloning limit that sets an upper bound to the quality of the generated clones. However, this limit can be circumvented by abandoning determinism and using probabilistic methods. Here, we report an e…
▽ More
The no-cloning theorem states that an unknown quantum state cannot be cloned exactly and deterministically due to the linearity of quantum mechanics. Associated with this theorem is the quantitative no-cloning limit that sets an upper bound to the quality of the generated clones. However, this limit can be circumvented by abandoning determinism and using probabilistic methods. Here, we report an experimental demonstration of probabilistic cloning of arbitrary coherent states that clearly surpasses the no-cloning limit. Our scheme is based on a hybrid linear amplifier that combines an ideal deterministic linear amplifier with a heralded measurement-based noiseless amplifier. We demonstrate the production of up to five clones with the fidelity of each clone clearly exceeding the corresponding no-cloning limit. Moreover, since successful cloning events are heralded, our scheme has the potential to be adopted in quantum repeater, teleportation and computing applications.
△ Less
Submitted 26 October, 2016;
originally announced October 2016.
-
On the problem of non-zero word error rates for fixed-rate error correction codes in continuous variable quantum key distribution
Authors:
Sarah J. Johnson,
Andrew M. Lance,
Lawrence Ong,
Mahyar Shirvanimoghaddam,
T. C. Ralph,
Thomas Symul
Abstract:
The maximum operational range of continuous variable quantum key distribution protocols has shown to be improved by employing high-efficiency forward error correction codes. Typically, the secret key rate model for such protocols is modified to account for the non-zero word error rate of such codes. In this paper, we demonstrate that this model is incorrect: Firstly, we show by example that fixed-…
▽ More
The maximum operational range of continuous variable quantum key distribution protocols has shown to be improved by employing high-efficiency forward error correction codes. Typically, the secret key rate model for such protocols is modified to account for the non-zero word error rate of such codes. In this paper, we demonstrate that this model is incorrect: Firstly, we show by example that fixed-rate error correction codes, as currently defined, can exhibit efficiencies greater than unity. Secondly, we show that using this secret key model combined with greater than unity efficiency codes, implies that it is possible to achieve a positive secret key over an entanglement breaking channel - an impossible scenario. We then consider the secret key model from a post-selection perspective, and examine the implications for key rate if we constrain the forward error correction codes to operate at low word error rates.
△ Less
Submitted 16 March, 2017; v1 submitted 16 May, 2016;
originally announced May 2016.
-
Squeezed light from a diamond-turned monolithic cavity
Authors:
A. Brieussel,
Y. Shen,
G. Campbell,
G. Guccione,
J. Janousek,
B. Hage,
B. C. Buchler,
N. Treps,
C. Fabre,
F. Z. Fang,
X. Y. Li,
T. Symul,
P. K. Lam
Abstract:
For some crystalline materials, a regime can be found where continuous ductile cutting is feasible. Using precision diamond turning, such materials can be cut into complex optical components with high surface quality and form accuracy. In this work we use diamond-turning to machine a monolithic, square-shaped, doubly-resonant $LiNbO_3$ cavity with two flat and two convex facets. When additional mi…
▽ More
For some crystalline materials, a regime can be found where continuous ductile cutting is feasible. Using precision diamond turning, such materials can be cut into complex optical components with high surface quality and form accuracy. In this work we use diamond-turning to machine a monolithic, square-shaped, doubly-resonant $LiNbO_3$ cavity with two flat and two convex facets. When additional mild polishing is implemented, the Q-factor of the resonator is found to be limited only by the material absorption loss. We show how our monolithic square resonator may be operated as an optical parametric oscillator that is evanescently coupled to free-space beams via birefringent prisms. The prism arrangement allows for independent and large tuning of the fundamental and second harmonic coupling rates. We measure $2.6\pm0.5$ dB of vacuum squeezing at 1064 nm using our system. Potential improvements to obtain higher degrees of squeezing are discussed.
△ Less
Submitted 22 February, 2016;
originally announced February 2016.
-
Estimation of Output Channel Noise for Continuous Variable Quantum Key Distribution
Authors:
Oliver Thearle,
Syed M. Assad,
Thomas Symul
Abstract:
Estimation of channel parameters is important for extending the range and increasing the key rate of continuous variable quantum key distribution protocols. We propose a new estimator for the channel noise parameter based on the method of moments. The method of moments finds an estimator from the moments of the output distribution of the protocol. This estimator has the advantage of being able to…
▽ More
Estimation of channel parameters is important for extending the range and increasing the key rate of continuous variable quantum key distribution protocols. We propose a new estimator for the channel noise parameter based on the method of moments. The method of moments finds an estimator from the moments of the output distribution of the protocol. This estimator has the advantage of being able to use all of the states shared between Alice and Bob. Other estimators are limited to a smaller publicly revealed subset of the states. The proposed estimator has a lower variance for high loss channel than what has previously been proposed. We show that the method of moments estimator increases the key rate by up to an order of magnitude at the maximum transmission of the protocol.
△ Less
Submitted 27 October, 2015; v1 submitted 19 August, 2015;
originally announced August 2015.
-
Maximization of Extractable Randomness in a Quantum Random-Number Generator
Authors:
J. Y. Haw,
S. M. Assad,
A. M. Lance,
N. H. Y. Ng,
V. Sharma,
P. K. Lam,
T. Symul
Abstract:
The generation of random numbers via quantum processes is an efficient and reliable method to obtain true indeterministic random numbers that are of vital importance to cryptographic communication and large-scale computer modeling. However, in realistic scenarios, the raw output of a quantum random-number generator is inevitably tainted by classical technical noise. The integrity of the device can…
▽ More
The generation of random numbers via quantum processes is an efficient and reliable method to obtain true indeterministic random numbers that are of vital importance to cryptographic communication and large-scale computer modeling. However, in realistic scenarios, the raw output of a quantum random-number generator is inevitably tainted by classical technical noise. The integrity of the device can be compromised if this noise is tampered with, or even controlled by some malicious party. To safeguard against this, we propose and experimentally demonstrate an approach that produces side-information independent randomness that is quantified by min-entropy conditioned on this classical noise. We present a method for maximizing the conditional min-entropy of the number sequence generated from a given quantum-to-classical-noise ratio. The detected photocurrent in our experiment is shown to have a real-time random-number generation rate of 14 (Mbit/s)/MHz. The spectral response of the detection system shows the potential to deliver more than 70 Gbit/s of random numbers in our experimental setup.
△ Less
Submitted 19 May, 2015; v1 submitted 17 November, 2014;
originally announced November 2014.
-
Theoretical Analysis of an Ideal Noiseless Linear Amplifier for Einstein-Podolsky-Rosen Entanglement Distillation
Authors:
J. Bernu,
S. Armstrong,
T. Symul,
T. C. Ralph,
P. K. Lam
Abstract:
We study the operational regime of a noiseless linear amplifier based on quantum scissors that can nondeterministically amplify the one photon component of a quantum state with weak excitation. It has been shown that an arbitrarily large quantum state can be amplified by first splitting it into weak excitation states using a network of beamsplitters. The output states of the network can then be co…
▽ More
We study the operational regime of a noiseless linear amplifier based on quantum scissors that can nondeterministically amplify the one photon component of a quantum state with weak excitation. It has been shown that an arbitrarily large quantum state can be amplified by first splitting it into weak excitation states using a network of beamsplitters. The output states of the network can then be coherently recombined. In this paper, we analyse the performance of such a device for distilling entanglement after transmission through a lossy quantum channel, and look at two measures to determine the efficacy of the noiseless linear amplifier. The measures used are the amount of entanglement achievable and the final purity of the output amplified entangled state. We study the performances of both a single and a two-element noiseless linear amplifier for amplifying weakly excited states. Practically, we show that it may be advantageous to work with a limited number of stages.
△ Less
Submitted 2 November, 2014;
originally announced November 2014.
-
Measurement-Based Noiseless Linear Amplification for Quantum Communication
Authors:
Helen M. Chrzanowski,
Nathan Walk,
Syed M. Assad,
Jiri Janousek,
Sara Hosseini,
Timothy C. Ralph,
Thomas Symul,
** Koy Lam
Abstract:
Entanglement distillation is an indispensable ingredient in extended quantum communication networks. Distillation protocols are necessarily non-deterministic and require advanced experimental techniques such as noiseless amplification. Recently it was shown that the benefits of noiseless amplification could be extracted by performing a post-selective filtering of the measurement record to improve…
▽ More
Entanglement distillation is an indispensable ingredient in extended quantum communication networks. Distillation protocols are necessarily non-deterministic and require advanced experimental techniques such as noiseless amplification. Recently it was shown that the benefits of noiseless amplification could be extracted by performing a post-selective filtering of the measurement record to improve the performance of quantum key distribution. We apply this protocol to entanglement degraded by transmission loss of up to the equivalent of 100km of optical fibre. We measure an effective entangled resource stronger than that achievable by even a maximally entangled resource passively transmitted through the same channel. We also provide a proof-of-principle demonstration of secret key extraction from an otherwise insecure regime. The measurement-based noiseless linear amplifier offers two advantages over its physical counterpart: ease of implementation and near optimal probability of success. It should provide an effective and versatile tool for a broad class of entanglement-based quantum communication protocols.
△ Less
Submitted 12 September, 2014; v1 submitted 9 September, 2014;
originally announced September 2014.
-
Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution
Authors:
Nathan Walk,
Sara Hosseni,
Jiao Geng,
Oliver Thearle,
**g Yan Haw,
Seiji Armstrong,
Syed M Assad,
Jiri Janousek,
Timothy C Ralph,
Thomas Symul,
Howard M Wiseman,
** Koy Lam
Abstract:
Nonlocal correlations, a longstanding foundational topic in quantum information, have recently found application as a resource for cryptographic tasks where not all devices are trusted, for example in settings with a highly secure central hub, such as a bank or government department, and less secure satellite stations which are inherently more vulnerable to hardware "hacking" attacks. The asymmetr…
▽ More
Nonlocal correlations, a longstanding foundational topic in quantum information, have recently found application as a resource for cryptographic tasks where not all devices are trusted, for example in settings with a highly secure central hub, such as a bank or government department, and less secure satellite stations which are inherently more vulnerable to hardware "hacking" attacks. The asymmetric phenomena of Einstein-Podolsky-Rosen steering plays a key role in one-sided device-independent quantum key distribution (1sDI-QKD) protocols. In the context of continuous-variable (CV) QKD schemes utilizing Gaussian states and measurements, we identify all protocols that can be 1sDI and their maximum loss tolerance. Surprisingly, this includes a protocol that uses only coherent states. We also establish a direct link between the relevant EPR steering inequality and the secret key rate, further strengthening the relationship between these asymmetric notions of nonlocality and device independence. We experimentally implement both entanglement-based and coherent-state protocols, and measure the correlations necessary for 1sDI key distribution up to an applied loss equivalent to 7.5 km and 3.5 km of optical fiber transmission respectively. We also engage in detailed modelling to understand the limits of our current experiment and the potential for further improvements. The new protocols we uncover apply the cheap and efficient hardware of CVQKD systems in a significantly more secure setting.
△ Less
Submitted 16 June, 2016; v1 submitted 26 May, 2014;
originally announced May 2014.
-
Experimental Verification of Quantum Discord in Continuous-Variable States
Authors:
S. Hosseini,
S. Rahimi-Keshari,
J. Y. Haw,
S. M. Assad,
H. M. Chrzanowski,
J. Janousek,
T. Symul,
T. C. Ralph,
P. K. Lam
Abstract:
We introduce a simple and efficient technique to verify quantum discord in unknown Gaussian states and a certain class of non-Gaussian states. We show that any separation in the peaks of the marginal distributions of one subsystem conditioned on two different outcomes of homodyne measurements performed on the other subsystem indicates correlation between the corresponding quadratures, and hence no…
▽ More
We introduce a simple and efficient technique to verify quantum discord in unknown Gaussian states and a certain class of non-Gaussian states. We show that any separation in the peaks of the marginal distributions of one subsystem conditioned on two different outcomes of homodyne measurements performed on the other subsystem indicates correlation between the corresponding quadratures, and hence nonzero discord. We also apply this method to non-Gaussian states that are prepared by overlap** a statistical mixture of coherent and vacuum states on a beam splitter. We experimentally demonstrate this technique by verifying nonzero quantum discord in a bipartite Gaussian and certain class of non-Gaussian states.
△ Less
Submitted 13 January, 2014; v1 submitted 24 October, 2013;
originally announced October 2013.
-
Gaussian Post-selection for Continuous Variable Quantum Cryptography
Authors:
Nathan Walk,
Thomas Symul,
** Koy Lam,
Timothy C. Ralph
Abstract:
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdrop** attacks by employing the concept of an equivalent protocol where the post-selection is implemented as a series of quantum operations including a virtual distillation. We introduce a particular `Gaussian' post selection and demonstrate that the security…
▽ More
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdrop** attacks by employing the concept of an equivalent protocol where the post-selection is implemented as a series of quantum operations including a virtual distillation. We introduce a particular `Gaussian' post selection and demonstrate that the security can be calculated using only experimentally accessible quantities. Finally we explicitly evaluate the performance for the case of a noisy Gaussian channel in the limit of unbounded key length and find improvements over all pre-existing continuous variable protocols in realistic regimes.
△ Less
Submitted 5 June, 2012; v1 submitted 5 June, 2012;
originally announced June 2012.
-
Operational Significance of Discord Consumption: Theory and Experiment
Authors:
Mile Gu,
Helen M. Chrzanowski,
Syed M. Assad,
Thomas Symul,
Kavan Modi,
Timothy C. Ralph,
Vlatko Vedral,
** Koy Lam
Abstract:
Coherent interactions that generate negligible entanglement can still exhibit unique quantum behaviour. This observation has motivated a search beyond entanglement for a complete description of all quantum correlations. Quantum discord is a promising candidate. Here, we demonstrate that under certain measurement constraints, discord between bipartite systems can be consumed to encode information t…
▽ More
Coherent interactions that generate negligible entanglement can still exhibit unique quantum behaviour. This observation has motivated a search beyond entanglement for a complete description of all quantum correlations. Quantum discord is a promising candidate. Here, we demonstrate that under certain measurement constraints, discord between bipartite systems can be consumed to encode information that can only be accessed by coherent quantum interactions. The inability to access this information by any other means allows us to use discord to directly quantify this `quantum advantage'. We experimentally encode information within the discordant correlations of two separable Gaussian states. The amount of extra information recovered by coherent interaction is quantified and directly linked with the discord consumed during encoding. No entanglement exists at any point of this experiment. Thus we introduce and demonstrate an operational method to use discord as a physical resource.
△ Less
Submitted 4 August, 2012; v1 submitted 29 February, 2012;
originally announced March 2012.
-
Real time demonstration of high bitrate quantum random number generation with coherent laser light
Authors:
T. Symul,
S. M. Assad,
P. K. Lam
Abstract:
We present a random number generation scheme that uses broadband measurements of the vacuum field contained in the radio-frequency sidebands of a single-mode laser. Even though the measurements may contain technical noise, we show that suitable algorithms can transform the digitized photocurrents into a string of random numbers that can be made arbitrarily correlated with a subset of the quantum f…
▽ More
We present a random number generation scheme that uses broadband measurements of the vacuum field contained in the radio-frequency sidebands of a single-mode laser. Even though the measurements may contain technical noise, we show that suitable algorithms can transform the digitized photocurrents into a string of random numbers that can be made arbitrarily correlated with a subset of the quantum fluctuations (high quantum correlation regime) or arbitrarily immune to environmental fluctuations (high environmental immunity). We demonstrate up to 2 Gbps of real time random number generation that were verified using standard randomness tests.
△ Less
Submitted 22 July, 2011;
originally announced July 2011.
-
Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks
Authors:
Nathan Walk,
Thomas Symul,
Timothy C. Ralph,
** Koy Lam
Abstract:
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdrop** attacks by employing the concept of an equiv- alent protocol where the post-selection is implemented as a projective quantum measurement. We demonstrate that the security can be calculated using only experimentally accessible quantities and finally exp…
▽ More
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdrop** attacks by employing the concept of an equiv- alent protocol where the post-selection is implemented as a projective quantum measurement. We demonstrate that the security can be calculated using only experimentally accessible quantities and finally explicitly evaluate the performance for the case of a noisy Gaussian channel in the limit of unbounded key length.
△ Less
Submitted 4 June, 2011;
originally announced June 2011.
-
A Scalable, Self-Analyzing Digital Locking System for use on Quantum Optics Experiments
Authors:
B. M. Sparkes,
H. M. Chrzanowski,
D. P. Parrain,
B. C. Buchler,
P. K. Lam,
T. Symul
Abstract:
Digital control of optics experiments has many advantages over analog control systems, specifically in terms of scalability, cost, flexibility, and the integration of system information into one location. We present a digital control system, freely available for download online, specifically designed for quantum optics experiments that allows for automatic and sequential re-locking of optical comp…
▽ More
Digital control of optics experiments has many advantages over analog control systems, specifically in terms of scalability, cost, flexibility, and the integration of system information into one location. We present a digital control system, freely available for download online, specifically designed for quantum optics experiments that allows for automatic and sequential re-locking of optical components. We show how the inbuilt locking analysis tools, including a white-noise network analyzer, can be used to help optimize individual locks, and verify the long term stability of the digital system. Finally, we present an example of the benefits of digital locking for quantum optics by applying the code to a specific experiment used to characterize optical Schrodinger cat states.
△ Less
Submitted 27 May, 2011; v1 submitted 19 May, 2011;
originally announced May 2011.
-
Demonstrating various quantum effects with two entangled laser beams
Authors:
B. Hage,
J. Janoušek,
S. Armstrong,
T. Symul,
J. Bernu,
H. M. Chrzanowski,
P. K. Lam,
H. A. Bachor
Abstract:
We report on the preparation of entangled two mode squeezed states of yet unseen quality. Based on a measurement of the covariance matrix we found a violation of the Reid and Drummond EPR-criterion at a value of only 0.36\pm0.03 compared to the threshold of 1. Furthermore, quantum state tomography was used to extract a single photon Fock state solely based on homodyne detection, demonstrating the…
▽ More
We report on the preparation of entangled two mode squeezed states of yet unseen quality. Based on a measurement of the covariance matrix we found a violation of the Reid and Drummond EPR-criterion at a value of only 0.36\pm0.03 compared to the threshold of 1. Furthermore, quantum state tomography was used to extract a single photon Fock state solely based on homodyne detection, demonstrating the strong quantum features of this pair of laser-beams. The probability for a single photon in this ensemble measurement exceeded 2/3.
△ Less
Submitted 2 May, 2011; v1 submitted 22 March, 2011;
originally announced March 2011.
-
Photon number discrimination without a photon counter and its application to reconstructing non-Gaussian states
Authors:
H. M. Chrzanowski,
J. Bernu,
B. M. Sparkes,
B. Hage,
A. P. Lund,
T. C. Ralph,
P. K. Lam,
T. Symul
Abstract:
The non-linearity of a conditional photon-counting measurement can be used to `de-Gaussify' a Gaussian state of light. Here we present and experimentally demonstrate a technique for photon number resolution using only homodyne detection. We then apply this technique to inform a conditional measurement; unambiguously reconstructing the statistics of the non-Gaussian one and two photon subtracted sq…
▽ More
The non-linearity of a conditional photon-counting measurement can be used to `de-Gaussify' a Gaussian state of light. Here we present and experimentally demonstrate a technique for photon number resolution using only homodyne detection. We then apply this technique to inform a conditional measurement; unambiguously reconstructing the statistics of the non-Gaussian one and two photon subtracted squeezed vacuum states. Although our photon number measurement relies on ensemble averages and cannot be used to prepare non-Gaussian states of light, its high efficiency, photon number resolving capabilities, and compatibility with the telecommunications band make it suitable for quantum information tasks relying on the outcomes of mean values.
△ Less
Submitted 7 December, 2011; v1 submitted 27 February, 2011;
originally announced February 2011.
-
Distinguishability of Gaussian States in Quantum Cryptography using Post-Selection
Authors:
Christian Weedbrook,
Daniel J. Alton,
Thomas Symul,
** Koy Lam,
Timothy C. Ralph
Abstract:
We consider the distinguishability of Gaussian states from the view point of continuous-variable quantum cryptography using post-selection. Specifically, we use the probability of error to distinguish between two pure coherent (squeezed) states and two particular mixed symmetric coherent (squeezed) states where each mixed state is an incoherent mixture of two pure coherent (squeezed) states with…
▽ More
We consider the distinguishability of Gaussian states from the view point of continuous-variable quantum cryptography using post-selection. Specifically, we use the probability of error to distinguish between two pure coherent (squeezed) states and two particular mixed symmetric coherent (squeezed) states where each mixed state is an incoherent mixture of two pure coherent (squeezed) states with equal and opposite displacements in the conjugate quadrature. We show that the two mixed symmetric Gaussian states (where the various components have the same real part) never give an eavesdropper more information than the two pure Gaussian states. Furthermore, when considering the distinguishability of squeezed states, we show that varying the amount of squeezing leads to a "squeezing" and "anti-squeezing" of the net information rates.
△ Less
Submitted 19 March, 2009; v1 submitted 9 March, 2009;
originally announced March 2009.
-
Observation of entanglement between two light beams spanning an octave in optical frequency
Authors:
Nicolai B. Grosse,
Syed Assad,
Moritz Mehmet,
Roman Schnabel,
Thomas Symul,
** Koy Lam
Abstract:
We have experimentally demonstrated how two beams of light separated by an octave in frequency can become entangled after their interaction in a second-order nonlinear medium. The entangler consisted of a nonlinear crystal placed within an optical resonator that was strongly driven by coherent light at the fundamental and second-harmonic wavelengths. An inter-conversion between the fields create…
▽ More
We have experimentally demonstrated how two beams of light separated by an octave in frequency can become entangled after their interaction in a second-order nonlinear medium. The entangler consisted of a nonlinear crystal placed within an optical resonator that was strongly driven by coherent light at the fundamental and second-harmonic wavelengths. An inter-conversion between the fields created quantum correlations in the amplitude and phase quadratures, which were measured by two independent homodyne detectors. Analysis of the resulting correlation matrix revealed a wavefunction inseparability of 0.74(1) < 1 thereby satisfying the criterion of entanglement.
△ Less
Submitted 26 March, 2008;
originally announced March 2008.
-
Quantum Cloning of Continuous Variable Entangled States
Authors:
Christian Weedbrook,
Nicolai B. Grosse,
Thomas Symul,
** Koy Lam,
Timothy C. Ralph
Abstract:
We consider the quantum cloning of continuous variable entangled states. This is achieved by introducing two symmetric entanglement cloning machines (or e-cloners): a local e-cloner and a global e-cloner; where we look at the preservation of entanglement in the clones under the condition that the fidelity of the clones is maximized. These cloning machines are implemented using simple linear opti…
▽ More
We consider the quantum cloning of continuous variable entangled states. This is achieved by introducing two symmetric entanglement cloning machines (or e-cloners): a local e-cloner and a global e-cloner; where we look at the preservation of entanglement in the clones under the condition that the fidelity of the clones is maximized. These cloning machines are implemented using simple linear optical elements such as beam splitters and homodyne detection along with squeeze gates. We show that the global e-cloner out-performs the local e-cloner both in terms of the fidelity of the cloned states as well as the strength of the entanglement of the clones. There is a minimum strength of entanglement (3dB for the inseparability criterion and 5.7dB for the EPR paradox criterion) of the input state of the global e-cloner that is required to preserve the entanglement in the clones.
△ Less
Submitted 31 October, 2007;
originally announced November 2007.
-
Experimental Demonstration of Post-Selection based Continuous Variable Quantum Key Distribution in the Presence of Gaussian Noise
Authors:
Thomas Symul,
Daniel J. Alton,
Syed M. Assad,
Andrew M. Lance,
Christian Weedbrook,
Timothy C. Ralph,
** Koy Lam
Abstract:
In realistic continuous variable quantum key distribution protocols, an eavesdropper may exploit the additional Gaussian noise generated during transmission to mask her presence. We present a theoretical framework for a post-selection based protocol which explicitly takes into account excess Gaussian noise. We derive a quantitative expression of the secret key rates based on the Levitin and Hole…
▽ More
In realistic continuous variable quantum key distribution protocols, an eavesdropper may exploit the additional Gaussian noise generated during transmission to mask her presence. We present a theoretical framework for a post-selection based protocol which explicitly takes into account excess Gaussian noise. We derive a quantitative expression of the secret key rates based on the Levitin and Holevo bounds. We experimentally demonstrate that the post-selection based scheme is still secure against both individual and collective Gaussian attacks in the presence of this excess noise.
△ Less
Submitted 17 May, 2007;
originally announced May 2007.
-
Coherent State Distinguishability in Continuous Variable Quantum Cryptography
Authors:
Christian Weedbrook,
Mile Gu,
Andrew M. Lance,
Thomas Symul,
** Koy Lam,
Timothy C. Ralph
Abstract:
We use the probability of error as a measure of distinguishability between two pure and two mixed symmetric coherent states in the context of continuous variable quantum cryptography. We show that the two mixed symmetric coherent states (in which the various components have the same real part) never give an eavesdropper more information than two pure coherent states.
We use the probability of error as a measure of distinguishability between two pure and two mixed symmetric coherent states in the context of continuous variable quantum cryptography. We show that the two mixed symmetric coherent states (in which the various components have the same real part) never give an eavesdropper more information than two pure coherent states.
△ Less
Submitted 15 March, 2007;
originally announced March 2007.
-
Measuring photon anti-bunching from continuous variable sideband squeezing
Authors:
Nicolai B. Grosse,
Thomas Symul,
Magdalena Stobińska,
Timothy C. Ralph,
** Koy Lam
Abstract:
We present a technique for measuring the second-order coherence function $g^{(2)}(τ)$ of light using a Hanbury-Brown Twiss intensity interferometer modified for homodyne detection. The experiment was performed entirely in the continuous variable regime at the sideband frequency of a bright carrier field. We used the setup to characterize $g^{(2)}(τ)$ for thermal and coherent states, and investig…
▽ More
We present a technique for measuring the second-order coherence function $g^{(2)}(τ)$ of light using a Hanbury-Brown Twiss intensity interferometer modified for homodyne detection. The experiment was performed entirely in the continuous variable regime at the sideband frequency of a bright carrier field. We used the setup to characterize $g^{(2)}(τ)$ for thermal and coherent states, and investigated its immunity to optical loss. We measured $g^{(2)}(τ)$ of a displaced squeezed state, and found a best anti-bunching statistic of $g^{(2)}(0) = 0.11 \pm 0.18$.
△ Less
Submitted 5 September, 2006;
originally announced September 2006.
-
Conditional quantum-state engineering using ancillary squeezed-vacuum states
Authors:
Hyunseok Jeong,
Andrew M. Lance,
Nicolai B. Grosse,
Thomas Symul,
** Koy Lam,
Timothy C. Ralph
Abstract:
We investigate an optical scheme to conditionally engineer quantum states using a beam splitter, homodyne detection and a squeezed vacuum as an ancillar state. This scheme is efficient in producing non-Gaussian quantum states such as squeezed single photons and superpositions of coherent states (SCSs). We show that a SCS with well defined parity and high fidelity can be generated from a Fock sta…
▽ More
We investigate an optical scheme to conditionally engineer quantum states using a beam splitter, homodyne detection and a squeezed vacuum as an ancillar state. This scheme is efficient in producing non-Gaussian quantum states such as squeezed single photons and superpositions of coherent states (SCSs). We show that a SCS with well defined parity and high fidelity can be generated from a Fock state of $n\leq4$, and conjecture that this can be generalized for an arbitrary $n$ Fock state. We describe our experimental demonstration of this scheme using coherent input states and measuring experimental fidelities that are only achievable using quantum resources.
△ Less
Submitted 25 September, 2006; v1 submitted 19 June, 2006;
originally announced June 2006.
-
Quantum State Engineering with Continuous-Variable Post-Selection
Authors:
Andrew M. Lance,
Hyunseok Jeong,
Nicolai B. Grosse,
Thomas Symul,
Timothy C. Ralph,
** Koy Lam
Abstract:
We present a scheme to conditionally engineer an optical quantum system via continuous-variable measurements. This scheme yields high-fidelity squeezed single photon and superposition of coherent states, from input single and two photon Fock states respectively. The input Fock state is interacted with an ancilla squeezed vacuum state using a beam-splitter. We transform the quantum system by post…
▽ More
We present a scheme to conditionally engineer an optical quantum system via continuous-variable measurements. This scheme yields high-fidelity squeezed single photon and superposition of coherent states, from input single and two photon Fock states respectively. The input Fock state is interacted with an ancilla squeezed vacuum state using a beam-splitter. We transform the quantum system by post-selecting on the continuous-observable measurement outcome of the ancilla state. We experimentally demonstrate the principles of this scheme using displaced coherent states and measure experimentally fidelities that are only achievable using quantum resources.
△ Less
Submitted 6 April, 2006; v1 submitted 12 December, 2005;
originally announced December 2005.
-
Coherent State Quantum Key Distribution Without Random Basis Switching
Authors:
Christian Weedbrook,
Andrew M. Lance,
Warwick P. Bowen,
Thomas Symul,
Timothy C. Ralph,
** Koy Lam
Abstract:
The random switching of measurement bases is commonly assumed to be a necessary step of quantum key distribution protocols. In this paper we show that switching is not required for coherent state continuous variable quantum key distribution. We show this via the no-switching protocol which results in higher information rates and a simpler experimental setup. We propose an optimal eavesdrop** a…
▽ More
The random switching of measurement bases is commonly assumed to be a necessary step of quantum key distribution protocols. In this paper we show that switching is not required for coherent state continuous variable quantum key distribution. We show this via the no-switching protocol which results in higher information rates and a simpler experimental setup. We propose an optimal eavesdrop** attack against this protocol, for individual Gaussian attacks, and we investigate and compare the no-switching protocol applied to the original BB84 scheme.
△ Less
Submitted 23 August, 2005;
originally announced August 2005.
-
No-Switching Quantum Key Distribution using Broadband Modulated Coherent Light
Authors:
Andrew M. Lance,
Thomas Symul,
Vikram Sharma,
Christian Weedbrook,
Timothy C. Ralph,
** Koy Lam
Abstract:
We realize an end-to-end no-switching quantum key distribution protocol using continuous-wave coherent light. We encode weak broadband Gaussian modulations onto the amplitude and phase quadratures of light beams at the Shannon's information limit. Our no-switching protocol achieves high secret key rate via a post-selection protocol that utilizes both quadrature information simultaneously. We est…
▽ More
We realize an end-to-end no-switching quantum key distribution protocol using continuous-wave coherent light. We encode weak broadband Gaussian modulations onto the amplitude and phase quadratures of light beams at the Shannon's information limit. Our no-switching protocol achieves high secret key rate via a post-selection protocol that utilizes both quadrature information simultaneously. We establish a secret key rate of 25 Mbits/s for a lossless channel and 1 kbit/s, per 17 MHz of detected bandwidth, for 90% channel loss. Since our scheme is truly broadband, it can potentially deliver orders of magnitude higher key rates by extending the encoding bandwidth with higher-end telecommunication technology.
△ Less
Submitted 28 October, 2005; v1 submitted 1 April, 2005;
originally announced April 2005.
-
Continuous Variable Quantum State Sharing via Quantum Disentanglement
Authors:
Andrew M. Lance,
Thomas Symul,
Warwick P. Bowen,
Barry C. Sanders,
Tomas Tyc,
Timothy C. Ralph,
** Koy Lam
Abstract:
Quantum state sharing is a protocol where perfect reconstruction of quantum states is achieved with incomplete or partial information in a multi-partite quantum networks. Quantum state sharing allows for secure communication in a quantum network where partial information is lost or acquired by malicious parties. This protocol utilizes entanglement for the secret state distribution, and a class o…
▽ More
Quantum state sharing is a protocol where perfect reconstruction of quantum states is achieved with incomplete or partial information in a multi-partite quantum networks. Quantum state sharing allows for secure communication in a quantum network where partial information is lost or acquired by malicious parties. This protocol utilizes entanglement for the secret state distribution, and a class of "quantum disentangling" protocols for the state reconstruction. We demonstrate a quantum state sharing protocol in which a tripartite entangled state is used to encode and distribute a secret state to three players. Any two of these players can collaborate to reconstruct the secret state, whilst individual players obtain no information. We investigate a number of quantum disentangling processes and experimentally demonstrate quantum state reconstruction using two of these protocols. We experimentally measure a fidelity, averaged over all reconstruction permutations, of F = 0.73. A result achievable only by using quantum resources.
△ Less
Submitted 26 March, 2005; v1 submitted 26 November, 2004;
originally announced November 2004.
-
Quantum Cryptography without Switching
Authors:
Christian Weedbrook,
Andrew M. Lance,
Warwick P. Bowen,
Thomas Symul,
Timothy C. Ralph,
** Koy Lam
Abstract:
We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements. It also offers the further advantage of simplicity compared to all previous protocols which, to date, hav…
▽ More
We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements. It also offers the further advantage of simplicity compared to all previous protocols which, to date, have relied on switching.
△ Less
Submitted 22 October, 2004; v1 submitted 19 May, 2004;
originally announced May 2004.
-
Tripartite Quantum State Sharing
Authors:
Andrew M. Lance,
Thomas Symul,
Warwick P. Bowen,
Barry C. Sanders,
** Koy Lam
Abstract:
We demonstrate a multipartite protocol to securely distribute and reconstruct a quantum state. A secret quantum state is encoded into a tripartite entangled state and distributed to three players. Any two of the three players are able to reconstruct the state, whilst individual players obtain nothing. We characterize this (2,3) threshold quantum state sharing scheme in terms of fidelity, signal…
▽ More
We demonstrate a multipartite protocol to securely distribute and reconstruct a quantum state. A secret quantum state is encoded into a tripartite entangled state and distributed to three players. Any two of the three players are able to reconstruct the state, whilst individual players obtain nothing. We characterize this (2,3) threshold quantum state sharing scheme in terms of fidelity, signal transfer and reconstruction noise. We demonstrate a fidelity averaged over all reconstruction permutations of 0.73, which is achievable only using quantum resources.
△ Less
Submitted 19 May, 2004; v1 submitted 4 November, 2003;
originally announced November 2003.
-
Unity gain and non-unity gain quantum teleportation
Authors:
W. P. Bowen,
N. Treps,
B. C. Buchler,
R. Schnabel,
T. C. Ralph,
T. Symul,
P. K. Lam
Abstract:
We investigate continuous variable quantum teleportation. We discuss the methods presently used to characterize teleportation in this regime, and propose an extension of the measures proposed by Grangier and Grosshans \cite{Grangier00}, and Ralph and Lam \cite{Ralph98}. This new measure, the gain normalized conditional variance product $\mathcal{M}$, turns out to be highly significant for contin…
▽ More
We investigate continuous variable quantum teleportation. We discuss the methods presently used to characterize teleportation in this regime, and propose an extension of the measures proposed by Grangier and Grosshans \cite{Grangier00}, and Ralph and Lam \cite{Ralph98}. This new measure, the gain normalized conditional variance product $\mathcal{M}$, turns out to be highly significant for continuous variable entanglement swap** procedures, which we examine using a necessary and sufficient criterion for entanglement. We elaborate on our recent experimental continuous variable quantum teleportation results \cite{Bowen03}, demonstrating success over a wide range of teleportation gains. We analyze our results using fidelity; signal transfer, and the conditional variance product; and a measure derived in this paper, the gain normalized conditional variance product.
△ Less
Submitted 10 February, 2004; v1 submitted 31 March, 2003;
originally announced March 2003.
-
Continuous Variables (2,3) Threshold Quantum Secret Sharing Schemes
Authors:
A. M. Lance,
T. Symul,
W. P. Bowen,
T. Tyc,
B. C. Sanders,
P. K. Lam
Abstract:
We present two experimental schemes to perform continuous variable (2,3) threshold quantum secret sharing on the quadratures amplitudes of bright light beams. Both schemes require a pair of entangled light beams. The first scheme utilizes two phase sensitive optical amplifiers, whilst the second uses an electro-optic feedforward loop for the reconstruction of the secret. We examine the efficacy…
▽ More
We present two experimental schemes to perform continuous variable (2,3) threshold quantum secret sharing on the quadratures amplitudes of bright light beams. Both schemes require a pair of entangled light beams. The first scheme utilizes two phase sensitive optical amplifiers, whilst the second uses an electro-optic feedforward loop for the reconstruction of the secret. We examine the efficacy of quantum secret sharing in terms of fidelity, as well as the signal transfer coefficients and the conditional variances of the reconstructed output state. We show that both schemes in the ideal case yield perfect secret reconstruction.
△ Less
Submitted 27 October, 2002;
originally announced October 2002.
-
Experimental investigation of continuous variable quantum teleportation
Authors:
Warwick P. Bowen,
Nicolas Treps,
Ben C. Buchler,
Roman Schnabel,
Timothy C. Ralph,
Hans -A. Bachor,
Thomas Symul,
** Koy Lam
Abstract:
We report the experimental demonstration of quantum teleportation of the quadrature amplitudes of a light field. Our experiment was stably locked for long periods, and was analyzed in terms of fidelity, F; and with signal transfer, T_{q}=T^{+}+T^{-}, and noise correlation, V_{q}=V_{in|out}^{+} V_{in|out}^{-}. We observed an optimum fidelity of 0.64 +/- 0.02, T_{q}= 1.06 +/- 0.02 and V_{q} =0.96…
▽ More
We report the experimental demonstration of quantum teleportation of the quadrature amplitudes of a light field. Our experiment was stably locked for long periods, and was analyzed in terms of fidelity, F; and with signal transfer, T_{q}=T^{+}+T^{-}, and noise correlation, V_{q}=V_{in|out}^{+} V_{in|out}^{-}. We observed an optimum fidelity of 0.64 +/- 0.02, T_{q}= 1.06 +/- 0.02 and V_{q} =0.96 +/- 0.10. We discuss the significance of both T_{q}>1 and V_{q}<1 and their relation to the teleportation no-cloning limit.
△ Less
Submitted 31 July, 2002;
originally announced July 2002.