-
Simultaneous Generation of Quantum Frequency Combs across Distinct Modal Families in a Single $Si_3 N_4$ Whispering Gallery Mode Resonator
Authors:
Bo Ji,
Nianqin Li,
Guangqiang He
Abstract:
Quantum frequency combs (QFCs) are versatile resources for multi-mode entanglement, such as cluster states, crucial for quantum communication and computation. On-chip whispering gallery mode resonators (WGMRs) can generate these states at ultra-low threshold power. In this paper, we demonstrate the simultaneous generation of three QFCs using a single on-chip $Si_3N_4$ WGMR across distinct modal fa…
▽ More
Quantum frequency combs (QFCs) are versatile resources for multi-mode entanglement, such as cluster states, crucial for quantum communication and computation. On-chip whispering gallery mode resonators (WGMRs) can generate these states at ultra-low threshold power. In this paper, we demonstrate the simultaneous generation of three QFCs using a single on-chip $Si_3N_4$ WGMR across distinct modal families. We designed a micro-ring resonator with a radius of 240 $μm$, capable of supporting four modal families within the 130 to 260 $THz$ frequency range for consistency regulation. Our results indicate that, by carefully designing the structure of $Si_3 N_4$ WGMRs, it is possible to generate quantum entangled frequency combs across distinct modal families simultaneously using monochromatic pump light. This is achieved by modulating the pump mode profiles with a spatial light modulator (SLM). Our approach offers a simple and low-cost method to achieve higher-density entanglement integration on-chip.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Exploring Entanglement Spectrum and Phase Diagram in multi-electron Quantum Dot Chains
Authors:
Guanjie He,
Xin Wang
Abstract:
We investigate the entanglement properties in semiconductor quantum dot systems modeled by extended Hubbard model, focusing on the impact of potential energy variations and electron interactions within a four-site quantum dot spin chain. Our study explores local and pairwise entanglement across configurations with electron counts N=4 and N=6, under different potential energy settings. By adjusting…
▽ More
We investigate the entanglement properties in semiconductor quantum dot systems modeled by extended Hubbard model, focusing on the impact of potential energy variations and electron interactions within a four-site quantum dot spin chain. Our study explores local and pairwise entanglement across configurations with electron counts N=4 and N=6, under different potential energy settings. By adjusting the potential energy in specific dots and examining the entanglement across various interaction regimes, we identify significant variations in the ground states of quantum dots. Our results reveal that local potential modifications lead to notable redistributions of electron configurations, significantly affecting the entanglement properties. These changes are depicted in phase diagrams that show entanglement dependencies on interaction strengths and potential energy adjustments, highlighting complex entanglement dynamics and phase transitions triggered by inter-dot interactions.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
Temperature dependent spin-phonon coupling of boron-vacancy centers in hexagonal boron nitride
Authors:
Zhongyuan Liu,
Ruotian Gong,
Benchen Huang,
Yu **,
Xinyi Du,
Guanghui He,
Eli Janzen,
Li Yang,
Erik Henriksen,
James Edgar,
Giulia Galli,
Chong Zu
Abstract:
The negatively charged boron-vacancy center ($\mathrm{V}_{\mathrm{B}}^-$) in hexagonal boron nitride (hBN) has recently emerged as a highly promising quantum sensor. Compared to the nitrogen-vacancy (NV) center in diamond, the change with temperature of the spin transition energy of $\mathrm{V}_{\mathrm{B}}^-$ is more than an order of magnitude larger, making it a potential nanoscale thermometer w…
▽ More
The negatively charged boron-vacancy center ($\mathrm{V}_{\mathrm{B}}^-$) in hexagonal boron nitride (hBN) has recently emerged as a highly promising quantum sensor. Compared to the nitrogen-vacancy (NV) center in diamond, the change with temperature of the spin transition energy of $\mathrm{V}_{\mathrm{B}}^-$ is more than an order of magnitude larger, making it a potential nanoscale thermometer with superior sensitivity. However, the underlying mechanism of the observed large temperature dependence remains an open question. In this work, using isotopically purified $\mathrm{h}{}^{10}\mathrm{B}{}^{15}\mathrm{N}$, we systematically characterize the zero-field splitting, hyperfine interaction, and spin relaxation time of $\mathrm{V}_{\mathrm{B}}^-$ from 10 to 350$~$K. We carry out first-principle calculations of the $\mathrm{V}_{\mathrm{B}}^-$ spin-phonon interaction and show that a second-order effect from finite-temperature phonon excitations is responsible for the observed changes in experiments. By fitting our experimental results to a physically motivated model, we extract the dominant phonon mode which agrees well with our simulations. Finally, we investigate the dynamic nuclear spin polarization process at cryogenic temperatures. Our results provide key insights in $\mathrm{V}_{\mathrm{B}}^-$ centers and their utilization as nanoscale thermometers and phonon sensors.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Experimental Realization of Discrete Time Quasi-Crystals
Authors:
Guanghui He,
Bingtian Ye,
Ruotian Gong,
Changyu Yao,
Zhongyuan Liu,
Kater W. Murch,
Norman Y. Yao,
Chong Zu
Abstract:
Floquet (periodically driven) systems can give rise to unique non-equilibrium phases of matter without equilibrium analogs. The most prominent example is the realization of discrete time crystals. An intriguing question emerges: what other novel phases can manifest when the constraint of time periodicity is relaxed? In this study, we explore quantum systems subjected to a quasi-periodic drive. Lev…
▽ More
Floquet (periodically driven) systems can give rise to unique non-equilibrium phases of matter without equilibrium analogs. The most prominent example is the realization of discrete time crystals. An intriguing question emerges: what other novel phases can manifest when the constraint of time periodicity is relaxed? In this study, we explore quantum systems subjected to a quasi-periodic drive. Leveraging a strongly interacting spin ensemble in diamond, we identify the emergence of long-lived discrete time quasi-crystals. Unlike conventional time crystals, time quasi-crystals exhibit robust sub-harmonic responses at multiple incommensurate frequencies. Furthermore, we show that the multi-frequency nature of the quasi-periodic drive allows for the formation of diverse patterns associated with different discrete time quasi-crystalline phases. Our findings demonstrate the existence of non-equilibrium phases in quasi-Floquet settings, significantly broadening the catalog of novel phenomena in driven many-body quantum systems.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Manipulating multiple optical parametric processes in photonic topological insulators
Authors:
Zhen Jiang,
Bo Ji,
Yanghe Chen,
Chun Jiang,
Guangqiang He
Abstract:
Topological quantum optics, an emerging area of study, holds the potential to bring about substantial enhancements for integrated quantum devices. Here we propose integrated topological quantum devices performing various functions including optical parametric amplification, frequency division, and frequency entangled biphoton generation. We show two distinct edge modes corresponding to different f…
▽ More
Topological quantum optics, an emerging area of study, holds the potential to bring about substantial enhancements for integrated quantum devices. Here we propose integrated topological quantum devices performing various functions including optical parametric amplification, frequency division, and frequency entangled biphoton generation. We show two distinct edge modes corresponding to different frequency ranges in both sandwich kagome and honeycomb topological designs that emulate the quantum valley Hall effect. These two topological edge modes enable two types of optical parametric processes through four-wave mixing, specifically inter-band and intra-band cases. The devices emulating photonic valley-Hall insulators allow the frequency division of two transverse modes, and furthermore, enable the separation of two quantum functionalities - optical parametric amplification and frequency entangled biphoton state generation. More importantly, the parametric processes are inborn topological protected, showing robustness against sharp bends and disorders. Our proposal significantly widens the possibilities for robust, multifunctional topological quantum devices on-chip, which may find applications in quantum information processing.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
On-chip topological transport of optical frequency combs in silicon-based valley photonic crystals
Authors:
Zhen Jiang,
Hongwei Wang,
Yuechen Yang,
Yang Shen,
Bo Ji,
Yanghe Chen,
Yong Zhang,
Lu Sun,
Zheng Wang,
Chun Jiang,
Yikai Su,
Guangqiang He
Abstract:
The generation and control of optical frequency combs in integrated photonic systems enables complex, high-controllable, and large-scale devices. In parallel, harnessing topological physics in multipartite systems has allowed them with compelling features such as robustness against fabrication imperfections. Here we experimentally demonstrate on-chip topological transport for optical frequency com…
▽ More
The generation and control of optical frequency combs in integrated photonic systems enables complex, high-controllable, and large-scale devices. In parallel, harnessing topological physics in multipartite systems has allowed them with compelling features such as robustness against fabrication imperfections. Here we experimentally demonstrate on-chip topological transport for optical frequency combs at telecommunication wavelengths, both in classical and nonclassical domains. We access both the quantum frequency combs and dissipative Kerr soliton combs with a micro-resonator. The quantum frequency comb, that is, a coherent superposition of multiple frequency modes, is proven to be a frequency-entangled qudit state. We also show that dissipative Kerr soliton combs are highly coherent and mode-locked due to the collective coherence or self-organization of solitons. Moreover, the valley kink states allow both quantum frequency combs and dissipative Kerr soliton combs with robustness against sharp bends. Our topologically protected optical frequency combs could enable the inherent robustness in integrated complex photonic systems.
△ Less
Submitted 24 October, 2023;
originally announced October 2023.
-
Comment on "Masking quantum information is impossible"
Authors:
Guang ** He
Abstract:
The no-masking theorem (Phys. Rev. Lett. 120, 230501 (2018)) claims that arbitrary quantum states cannot be masked. Based on this result, the authors further suggested that qubit commitment is not possible. Here we show that this connection does not hold in general.
The no-masking theorem (Phys. Rev. Lett. 120, 230501 (2018)) claims that arbitrary quantum states cannot be masked. Based on this result, the authors further suggested that qubit commitment is not possible. Here we show that this connection does not hold in general.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
Approaching the standard quantum limit of a Rydberg-atom microwave electrometer
Authors:
Hai-Tao Tu,
Kai-Yu Liao,
Guo-Dong He,
Yi-Fei Zhu,
Si-Yuan Qiu,
Hao Jiang,
Wei Huang,
Wu Bian,
Hui Yan,
Shi-Liang Zhu
Abstract:
The development of a microwave electrometer with inherent uncertainty approaching its ultimate limit carries both fundamental and technological significance. Recently, the Rydberg electrometer has garnered considerable attention due to its exceptional sensitivity, small-size, and broad tunability. This specific quantum sensor utilizes low-entropy laser beams to detect disturbances in atomic intern…
▽ More
The development of a microwave electrometer with inherent uncertainty approaching its ultimate limit carries both fundamental and technological significance. Recently, the Rydberg electrometer has garnered considerable attention due to its exceptional sensitivity, small-size, and broad tunability. This specific quantum sensor utilizes low-entropy laser beams to detect disturbances in atomic internal states, thereby circumventing the intrinsic thermal noise encountered by its classical counterparts. However, due to the thermal motion of atoms, the advanced Rydberg-atom microwave electrometer falls considerably short of the standard quantum limit by over three orders of magnitude. In this study, we utilize an optically thin medium with approximately 5.2e5 laser-cooled atoms to implement heterodyne detection. By mitigating a variety of noises and strategically optimizing the parameters of the Rydberg electrometer, our study achieves an electric-field sensitivity of 10.0 nV/cm/Hz^1/2 at a 100 Hz repetition rate, reaching a factor of 2.6 above the standard quantum limit and a minimum detectable field of 540 pV/cm. We also provide an in-depth analysis of noise mechanisms and determine optimal parameters to bolster the performance of Rydberg-atom sensors. Our work provides insights into the inherent capacities and limitations of Rydberg electrometers, while offering superior sensitivity for detecting weak microwave signals in numerous applications.
△ Less
Submitted 13 November, 2023; v1 submitted 28 July, 2023;
originally announced July 2023.
-
Computing the gradients with respect to all parameters of a quantum neural network using a single circuit
Authors:
Guang ** He
Abstract:
When computing the gradients of a quantum neural network using the parameter-shift rule, the cost function needs to be calculated twice for the gradient with respect to a single adjustable parameter of the network. When the total number of parameters is high, the quantum circuit for the computation has to be adjusted and run for many times. Here we propose an approach to compute all the gradients…
▽ More
When computing the gradients of a quantum neural network using the parameter-shift rule, the cost function needs to be calculated twice for the gradient with respect to a single adjustable parameter of the network. When the total number of parameters is high, the quantum circuit for the computation has to be adjusted and run for many times. Here we propose an approach to compute all the gradients using a single circuit only, with a much reduced circuit depth and less classical registers. We also demonstrate experimentally, on both real quantum hardware and simulator, that our approach has the advantages that the circuit takes a significantly shorter time to compile than the conventional approach, resulting in a speedup on the total runtime.
△ Less
Submitted 20 July, 2023; v1 submitted 16 July, 2023;
originally announced July 2023.
-
Isotope engineering for spin defects in van der Waals materials
Authors:
Ruotian Gong,
Xinyi Du,
Eli Janzen,
Vincent Liu,
Zhongyuan Liu,
Guanghui He,
Bingtian Ye,
Tongcang Li,
Norman Y. Yao,
James H. Edgar,
Erik A. Henriksen,
Chong Zu
Abstract:
Spin defects in van der Waals materials offer a promising platform for advancing quantum technologies. Here, we propose and demonstrate a powerful technique based on isotope engineering of host materials to significantly enhance the coherence properties of embedded spin defects. Focusing on the recently-discovered negatively charged boron vacancy center ($\mathrm{V}_{\mathrm{B}}^-$) in hexagonal b…
▽ More
Spin defects in van der Waals materials offer a promising platform for advancing quantum technologies. Here, we propose and demonstrate a powerful technique based on isotope engineering of host materials to significantly enhance the coherence properties of embedded spin defects. Focusing on the recently-discovered negatively charged boron vacancy center ($\mathrm{V}_{\mathrm{B}}^-$) in hexagonal boron nitride (hBN), we grow isotopically purified $\mathrm{h}{}^{10}\mathrm{B}{}^{15}\mathrm{N}$ crystals. Compared to $\mathrm{V}_{\mathrm{B}}^-$ in hBN with the natural distribution of isotopes, we observe substantially narrower and less crowded $\mathrm{V}_{\mathrm{B}}^-$ spin transitions as well as extended coherence time $T_2$ and relaxation time $T_1$. For quantum sensing, $\mathrm{V}_{\mathrm{B}}^-$ centers in our $\mathrm{h}{}^{10}\mathrm{B}{}^{15}\mathrm{N}$ samples exhibit a factor of $4$ ($2$) enhancement in DC (AC) magnetic field sensitivity. For additional quantum resources, the individual addressability of the $\mathrm{V}_{\mathrm{B}}^-$ hyperfine levels enables the dynamical polarization and coherent control of the three nearest-neighbor ${}^{15}\mathrm{N}$ nuclear spins. Our results demonstrate the power of isotope engineering for enhancing the properties of quantum spin defects in hBN, and can be readily extended to improving spin qubits in a broad family of van der Waals materials.
△ Less
Submitted 3 January, 2024; v1 submitted 12 July, 2023;
originally announced July 2023.
-
A no-go result on observing quantum superpositions
Authors:
Guang ** He
Abstract:
We give a general proof showing that once irreversible processes are involved, a class of projective measurements is impossible. Applying this no-go result to the Schroedinger's cat paradox implies that if something is claimed to be a real Schroedinger's cat, there will be no measurable difference between it and a trivial classical mixture of ordinary cats in any physically implementable process,…
▽ More
We give a general proof showing that once irreversible processes are involved, a class of projective measurements is impossible. Applying this no-go result to the Schroedinger's cat paradox implies that if something is claimed to be a real Schroedinger's cat, there will be no measurable difference between it and a trivial classical mixture of ordinary cats in any physically implementable process, otherwise raising the dead will become reality. Other similar macroscopic quantum superpositions cannot be observed either due to the lack of non-commuting measurement bases. Our proof does not involve any quantum interpretation theory and hypothesis.
△ Less
Submitted 10 May, 2023; v1 submitted 6 April, 2023;
originally announced April 2023.
-
Quasi-Floquet prethermalization in a disordered dipolar spin ensemble in diamond
Authors:
Guanghui He,
Bingtian Ye,
Ruotian Gong,
Zhongyuan Liu,
Kater W. Murch,
Norman Y. Yao,
Chong Zu
Abstract:
Floquet (periodic) driving has recently emerged as a powerful technique for engineering quantum systems and realizing non-equilibrium phases of matter. A central challenge to stabilizing quantum phenomena in such systems is the need to prevent energy absorption from the driving field. Fortunately, when the frequency of the drive is significantly larger than the local energy scales of the many-body…
▽ More
Floquet (periodic) driving has recently emerged as a powerful technique for engineering quantum systems and realizing non-equilibrium phases of matter. A central challenge to stabilizing quantum phenomena in such systems is the need to prevent energy absorption from the driving field. Fortunately, when the frequency of the drive is significantly larger than the local energy scales of the many-body system, energy absorption is suppressed. The existence of this so-called prethermal regime depends sensitively on the range of interactions and the presence of multiple driving frequencies. Here, we report the observation of Floquet prethermalization in a strongly interacting dipolar spin ensemble in diamond, where the angular dependence of the dipolar coupling helps to mitigate the long-ranged nature of the interaction. Moreover, we extend our experimental observation to quasi-Floquet drives with multiple incommensurate frequencies. In contrast to a single-frequency drive, we find that the existence of prethermalization is extremely sensitive to the smoothness of the applied field. Our results open the door to stabilizing and characterizing non-equilibrium phenomena in quasi-periodically driven systems.
△ Less
Submitted 28 September, 2023; v1 submitted 21 December, 2022;
originally announced December 2022.
-
Coherent dynamics of strongly interacting electronic spin defects in hexagonal boron nitride
Authors:
Ruotian Gong,
Guanghui He,
Xingyu Gao,
Peng Ju,
Zhongyuan Liu,
Bingtian Ye,
Erik A. Henriksen,
Tongcang Li,
Chong Zu
Abstract:
Optically active spin defects in van der Waals materials are promising platforms for modern quantum technologies. Here we investigate the coherent dynamics of strongly interacting ensembles of negatively charged boron-vacancy ($\mathrm{V}_{\mathrm{B}}^-$) centers in hexagonal boron nitride (hBN) with varying defect density. By employing advanced dynamical decoupling sequences to selectively isolat…
▽ More
Optically active spin defects in van der Waals materials are promising platforms for modern quantum technologies. Here we investigate the coherent dynamics of strongly interacting ensembles of negatively charged boron-vacancy ($\mathrm{V}_{\mathrm{B}}^-$) centers in hexagonal boron nitride (hBN) with varying defect density. By employing advanced dynamical decoupling sequences to selectively isolate different dephasing sources, we observe more than 5-fold improvement in the measured coherence times across all hBN samples. Crucially, we identify that the many-body interaction within the $\mathrm{V}_{\mathrm{B}}^-$ ensemble plays a substantial role in the coherent dynamics, which is then used to directly estimate the concentration of $\mathrm{V}_{\mathrm{B}}^-$. We find that at high ion implantation dosage, only a small portion of the created boron vacancy defects are in the desired negatively charged state. Finally, we investigate the spin response of $\mathrm{V}_{\mathrm{B}}^-$ to the local charged defects induced electric field signals, and estimate its ground state transverse electric field susceptibility. Our results provide new insights on the spin and charge properties of $\mathrm{V}_{\mathrm{B}}^-$, which are important for future use of defects in hBN as quantum sensors and simulators.
△ Less
Submitted 12 July, 2023; v1 submitted 20 October, 2022;
originally announced October 2022.
-
Theory on electron-phonon spin dehphasing in GaAs multi-electron double quantum dots
Authors:
Guanjie He,
Guo Xuan Chan,
Xin Wang
Abstract:
Recent studies reveal that a double-quantum-dot system hosting more than two electrons may be superior in certain aspects as compared to the traditional case in which only two electrons are confined (a singlet-triplet qubit). We study the electron-phonon dephasing occurring in a GaAs multi-electron double-quantum-dot system, in a biased case in which the singlet state is hybridized, as well as in…
▽ More
Recent studies reveal that a double-quantum-dot system hosting more than two electrons may be superior in certain aspects as compared to the traditional case in which only two electrons are confined (a singlet-triplet qubit). We study the electron-phonon dephasing occurring in a GaAs multi-electron double-quantum-dot system, in a biased case in which the singlet state is hybridized, as well as in an unbiased case in which the hybridization is absent. We have found that while the electron-phonon dephasing rate increases with the number of electrons confined in the unbiased case, this does not hold in the biased case. We define a merit figure as a ratio between the exchange energy and the dephasing rate, and have shown that in experimentally relevant range of the exchange energy, the merit figure actually increases with the number of electrons in the biased case. Our results show that the multi-electron quantum-dot system has another advantage in mitigating the effect of electron-phonon dephasing, which is previously under-appreciated in the literature.
△ Less
Submitted 30 March, 2022;
originally announced March 2022.
-
Robust violation of a multipartite Bell inequality from the perspective of a single-system game
Authors:
Gang-Gang He,
Xing-Yan Fan,
Fu-Lin Zhang
Abstract:
Recently, Fan \textit{et al.} [Mod. Phys. Lett. A 36, 2150223 (2021)], presented a generalized Clauser-Horne-Shimony-Holt (CHSH) inequality, to identify $N$-qubit Greenberger-Horne-Zeilinger (GHZ) states. They showed an interesting phenomenon that the maximal violation of the generalized CHSH inequality is robust under some specific noises. In this work, we map the inequality to the CHSH game, and…
▽ More
Recently, Fan \textit{et al.} [Mod. Phys. Lett. A 36, 2150223 (2021)], presented a generalized Clauser-Horne-Shimony-Holt (CHSH) inequality, to identify $N$-qubit Greenberger-Horne-Zeilinger (GHZ) states. They showed an interesting phenomenon that the maximal violation of the generalized CHSH inequality is robust under some specific noises. In this work, we map the inequality to the CHSH game, and consequently to the CHSH* game in a single-qubit system. This map** provides an explanation for the robust violations in $N$-qubit systems. Namely, the robust violations, resulting from the degeneracy of the generalized CHSH operators correspond to the symmetry of the maximally entangled two-qubit states and the identity transformation in the single-qubit game. This explanation enables us to exactly demonstrate that the degeneracy is $2^{N-2}$.
△ Less
Submitted 8 June, 2022; v1 submitted 11 February, 2022;
originally announced February 2022.
-
Measurement-device-independent quantum key distribution with classical Bob and no joint measurement
Authors:
Guang ** He
Abstract:
Measurement-device-independent quantum key distribution (MDI-QKD) provides a method for secret communication whose security does not rely on trusted measurement devices. In all existing MDI-QKD protocols, the participant Charlie has to perform the Bell state measurement or other joint measurements. Here we propose an MDI-QKD protocol which requires individual measurements only. Meanwhile, all oper…
▽ More
Measurement-device-independent quantum key distribution (MDI-QKD) provides a method for secret communication whose security does not rely on trusted measurement devices. In all existing MDI-QKD protocols, the participant Charlie has to perform the Bell state measurement or other joint measurements. Here we propose an MDI-QKD protocol which requires individual measurements only. Meanwhile, all operations of the receiver Bob are classical, without the need for preparing and measuring quantum systems. Thus the implementation of the protocol has a lower technical requirement on Bob and Charlie.
△ Less
Submitted 11 August, 2021;
originally announced August 2021.
-
Preparation of quantum correlations assisted by a steering Maxwell demon
Authors:
Gang-Gang He,
Fu-Lin Zhang
Abstract:
A Maxwell demon can reduce the entropy of a quantum system by performing measurements on its environment. The nonsignaling theorem prevents the demon from affecting the average state of the system. We study the preparations of quantum correlations from a system qubit and an auxiliary qubit, assisted by a demon who obtains information of the system qubit from measurements on its environment. The de…
▽ More
A Maxwell demon can reduce the entropy of a quantum system by performing measurements on its environment. The nonsignaling theorem prevents the demon from affecting the average state of the system. We study the preparations of quantum correlations from a system qubit and an auxiliary qubit, assisted by a demon who obtains information of the system qubit from measurements on its environment. The demon can affect the postmeasured states of system by choosing different measurements, which establishes the relationships between quantum steering and other correlations in the thermodynamic framework. We present the optimal protocols for creating mutual information, entanglement, and Bell-nonlocality. These maximal correlations are found to relate exactly to the steerable boundary of the system-environment state with maximally mixed marginals. We also present upper bounds of the prepared correlations by utilizing classical environment-system correlation, which can be regarded as steering-type inequalities bounding the correlations created with the aid of classical demons.
△ Less
Submitted 18 July, 2022; v1 submitted 4 March, 2021;
originally announced March 2021.
-
Locality of three-qubit Greenberger-Horne-Zeilinger-symmetric states
Authors:
Dian Zhu,
Gang-Gang He,
Fu-Lin Zhang
Abstract:
The hierarchy of nonlocality and entanglement in multipartite systems is one of the fundamental problems in quantum physics. We study this topic in three-qubit systems considering the entanglement classification of stochastic local operations and classical communication (SLOCC). The equivalence under SLOCC divides threequbit states into separable, biseparable, W, and Greenberger-Horne-Zeilinger (G…
▽ More
The hierarchy of nonlocality and entanglement in multipartite systems is one of the fundamental problems in quantum physics. We study this topic in three-qubit systems considering the entanglement classification of stochastic local operations and classical communication (SLOCC). The equivalence under SLOCC divides threequbit states into separable, biseparable, W, and Greenberger-Horne-Zeilinger (GHZ) classes. The W and GHZ are two subclasses of genuine tripartite entanglement.We adopt the family of GHZ-symmetric states as a research subject, which share the symmetries of the GHZ state and have a complete characterization of SLOCC classes. In the biseparable region (with bipartite entanglement), there exist GHZ-symmetric states that are found to be fully local. In addition, there are bilocal states in both theW and GHZ classes. That is, neither of the subclasses of genuine tripartite entanglement can ensure genuinely tripartite nonlocality.
△ Less
Submitted 6 June, 2022; v1 submitted 12 February, 2021;
originally announced February 2021.
-
Realizing the "fictitious" beam splitter -- A stationary implementation of semi-counterfactual interaction-free imaging
Authors:
Guang ** He
Abstract:
Based on quantum counterfactual interaction-free measurement, we propose an implementation scheme for a beam splitter with anomalous reflection and transmission properties that looks impossible at first glance. Our scheme is stationary without requiring switchable mirrors and polarization rotators. Using the scheme for imaging will ensure that the optical radiation received by the object being ima…
▽ More
Based on quantum counterfactual interaction-free measurement, we propose an implementation scheme for a beam splitter with anomalous reflection and transmission properties that looks impossible at first glance. Our scheme is stationary without requiring switchable mirrors and polarization rotators. Using the scheme for imaging will ensure that the optical radiation received by the object being imaged can be arbitrarily low. Thus it enables applications such as stealthy night vision devices that can work without detectable ambient light, or being used as a hackware against some counterfactual quantum cryptographic protocols.
△ Less
Submitted 11 November, 2022; v1 submitted 6 July, 2020;
originally announced July 2020.
-
Tunable Optomechanically Induced Sideband Comb
Authors:
Jun-Hao Liu,
Guangqiang He,
Qin Wu,
Ya-Fei Yu,
**-Dong Wang,
Zhi-Ming Zhang
Abstract:
Cavity optomechanical system can exhibit higher-order sideband comb effect when it is driven by a control field $ω_{c}$ and a probe field $ω_{p}$, and works in the non-perturbative regime, as was shown in a previous work [Xiong et al., Opt. Lett. 38, 353 (2013)]. The repetition frequency of such a comb is equal to the mechanical frequency $ω_{b}$ and is untunable, which limits the precision of the…
▽ More
Cavity optomechanical system can exhibit higher-order sideband comb effect when it is driven by a control field $ω_{c}$ and a probe field $ω_{p}$, and works in the non-perturbative regime, as was shown in a previous work [Xiong et al., Opt. Lett. 38, 353 (2013)]. The repetition frequency of such a comb is equal to the mechanical frequency $ω_{b}$ and is untunable, which limits the precision of the comb. Here we address this problem by driving the system with an additional strong probe field $ω_{f}$, and the detuning between $ω_{f}$ and $ω_{c}$ is equal to $ω_{b}/n$ (here $n$ is an integer), i.e., this detuning is a fraction of the mechanical frequency. In this case, we obtain some interesting results. We find that not only the integer-order (higher-order) sidebands, but also the fraction-order sidebands, and the sum and difference sidebands between the integer- and fraction-order sidebands, will appear in the output spectrum. The generated nonlinear sidebands constitute an optomechanically induced sideband comb (OMISC). The frequency range and the repetition frequency of the OMISC are proportional to the sideband cutoff-order number and the sideband interval, respectively. We show that we can extend the frequency range of the OMISC by increasing the intensity of the probe field $ω_{p}$. More importantly, we can decrease the repetition frequency, and consequently, improve the precision of the OMISC by increasing $n$ and the intensity of the probe field $ω_{f}$.
△ Less
Submitted 9 May, 2020; v1 submitted 20 April, 2020;
originally announced April 2020.
-
Heterogeneously integrated, superconducting silicon-photonic platform for measurement-device-independent quantum key distribution
Authors:
Xiaodong Zheng,
Peiyu Zhang,
Renyou Ge,
Liangliang Lu,
Guanglong He,
Qi Chen,
Fangchao Qu,
Labao Zhang,
Xinlun Cai,
Yanqing Lu,
Shining Zhu,
Peiheng Wu,
Xiao-Song Ma
Abstract:
Integrated photonics provides a route both to miniaturize quantum key distribution (QKD) devices and to enhance their performance. A key element for achieving discrete-variable QKD is a single-photon detector. It is highly desirable to integrate detectors onto a photonic chip to enable the realization of practical and scalable quantum networks. We realize an integrated heterogeneous superconductin…
▽ More
Integrated photonics provides a route both to miniaturize quantum key distribution (QKD) devices and to enhance their performance. A key element for achieving discrete-variable QKD is a single-photon detector. It is highly desirable to integrate detectors onto a photonic chip to enable the realization of practical and scalable quantum networks. We realize an integrated heterogeneous superconducting-silicon-photonic chip. Harnessing the unique high-speed feature of our optical waveguide-integrated superconducting detector, we perform the first optimal Bell-state measurement (BSM) of time-bin encoded qubits generated from two independent lasers. The optimal BSM enables an increased key rate of measurement-device-independent QKD, which is immune to all attacks against the detection system, and hence provides the basis for a QKD network with untrusted relays. Together with the time-multiplexed technique, we have enhanced the sifted key rate by almost one order of magnitude. With a 125 MHz clock rate, we obtain a secure key rate of 6.166 kbps over 24.0 dB loss, which is comparable to the state-of-the-art MDI-QKD experimental results with GHz clock rate. Combined with integrated QKD transmitters, a scalable, chip-based and cost-effective QKD network should become realizable in the near future.
△ Less
Submitted 30 October, 2021; v1 submitted 19 December, 2019;
originally announced December 2019.
-
An optical implementation of quantum bit commitment using infinite-dimensional systems
Authors:
Guang ** He
Abstract:
Unconditionally secure quantum bit commitment (QBC) was widely believed to be impossible for more than two decades. But recently, based on an anomalous behavior found in quantum steering, we proposed a QBC protocol which can be unconditionally secure in principle. The protocol requires the use of infinite-dimensional systems, therefore it may seem less feasible in practice. Here we propose a quant…
▽ More
Unconditionally secure quantum bit commitment (QBC) was widely believed to be impossible for more than two decades. But recently, based on an anomalous behavior found in quantum steering, we proposed a QBC protocol which can be unconditionally secure in principle. The protocol requires the use of infinite-dimensional systems, therefore it may seem less feasible in practice. Here we propose a quantum optical method based on Mach-Zehnder interferometer, which gives a very good approximation to such infinite-dimensional systems. Thus, it enables a proof-of-principle experimental implementation of our protocol, which can also serve as a practically secure QBC scheme. Other multi-party cryptographic protocols such as quantum coin tossing can be built upon it too. Our approach also reveals a relationship between infinity and non-locality, which may have an impact on the research of fundamental theories.
△ Less
Submitted 22 July, 2023; v1 submitted 21 September, 2019;
originally announced September 2019.
-
Cryptanalysis and improvement of Wu-Cai-Wu-Zhang's quantum private comparison protocol
Authors:
Guang ** He
Abstract:
In a recent paper (Int. J. Quantum Inf. 17 (2019) 1950026), the authors discussed the shortcomings in the security of a quantum private comparison protocol that we previously proposed (Int. J. Quantum Inf. 15 (2017) 1750014). They also proposed a new protocol aimed to avoid these problems. Here we analysis the information leaked in their protocol, and find that it is even less secure than our prot…
▽ More
In a recent paper (Int. J. Quantum Inf. 17 (2019) 1950026), the authors discussed the shortcomings in the security of a quantum private comparison protocol that we previously proposed (Int. J. Quantum Inf. 15 (2017) 1750014). They also proposed a new protocol aimed to avoid these problems. Here we analysis the information leaked in their protocol, and find that it is even less secure than our protocol in certain cases. We further propose an improved version which has the following advantages: (1) no entanglement needed, (2) quantum memory is no longer required, and (3) less information leaked. Therefore, better security and great feasibility are both achieved.
△ Less
Submitted 22 July, 2023; v1 submitted 24 August, 2019;
originally announced August 2019.
-
Copenhagen interpretation can survive the upgraded Schroedinger's cat Gedankenexperiment
Authors:
Guang ** He
Abstract:
Recently, Frauchiger and Renner proposed a Gedankenexperiment, which was claimed to be able to prove that quantum theory cannot consistently describe the use of itself. Here we show that the conclusions of Frauchiger and Renner actually came from their incorrect description of some quantum states. With the correct description there will be no inconsistent results, no matter which quantum interpret…
▽ More
Recently, Frauchiger and Renner proposed a Gedankenexperiment, which was claimed to be able to prove that quantum theory cannot consistently describe the use of itself. Here we show that the conclusions of Frauchiger and Renner actually came from their incorrect description of some quantum states. With the correct description there will be no inconsistent results, no matter which quantum interpretation theory is used. Especially, the Copenhagen interpretation can satisfy all the three assumptions (C), (Q), and (S) of Frauchiger and Renner simultaneously, thus it has no problem consistently describing the use of itself.
△ Less
Submitted 15 June, 2020; v1 submitted 16 October, 2018;
originally announced October 2018.
-
Practical quantum oblivious transfer with a single photon
Authors:
Guang ** He
Abstract:
Quantum oblivious transfer (QOT) is an essential cryptographic primitive. But unconditionally secure QOT is known to be impossible. Here we propose a practical QOT protocol, which is perfectly secure against dishonest sender without relying on any technological assumption. Meanwhile, it is also secure against dishonest receiver in the absence of long-term quantum memory and complicated collective…
▽ More
Quantum oblivious transfer (QOT) is an essential cryptographic primitive. But unconditionally secure QOT is known to be impossible. Here we propose a practical QOT protocol, which is perfectly secure against dishonest sender without relying on any technological assumption. Meanwhile, it is also secure against dishonest receiver in the absence of long-term quantum memory and complicated collective measurements. The protocol is extremely feasible, as it can be implemented using currently available Mach-Zehnder interferometer, and no quantum memory, collective measurements nor entanglement are needed for honest participants. More importantly, comparing with other practical QOT schemes, our protocol has an unbeatable efficiency since it requires the transmission of a single photon only.
△ Less
Submitted 24 July, 2018; v1 submitted 1 May, 2018;
originally announced May 2018.
-
Device-independent quantum private comparison protocol without a third party
Authors:
Guang ** He
Abstract:
Since unconditionally secure quantum two-party computations are known to be impossible, most existing quantum private comparison (QPC) protocols adopted a third party. Recently, we proposed a QPC protocol which involves two parties only, and showed that although it is not unconditionally secure, it only leaks an extremely small amount of information to the other party. Here we further propose the…
▽ More
Since unconditionally secure quantum two-party computations are known to be impossible, most existing quantum private comparison (QPC) protocols adopted a third party. Recently, we proposed a QPC protocol which involves two parties only, and showed that although it is not unconditionally secure, it only leaks an extremely small amount of information to the other party. Here we further propose the device-independent version of the protocol, so that it can be more convenient and dependable in practical applications.
△ Less
Submitted 24 July, 2018; v1 submitted 13 October, 2017;
originally announced October 2017.
-
Unconditionally secure quantum bit commitment based on the uncertainty principle
Authors:
Guang ** He
Abstract:
Unconditionally secure quantum bit commitment (QBC) was considered impossible. But the no-go proofs are based on the Hughston-Jozsa-Wootters (HJW) theorem (a.k.a. the Uhlmann theorem). Recently it was found that in high-dimensional systems, there exist some states which can display a chaos effect in quantum steering, so that the attack strategy based on the HJW theorem has to require the capabilit…
▽ More
Unconditionally secure quantum bit commitment (QBC) was considered impossible. But the no-go proofs are based on the Hughston-Jozsa-Wootters (HJW) theorem (a.k.a. the Uhlmann theorem). Recently it was found that in high-dimensional systems, there exist some states which can display a chaos effect in quantum steering, so that the attack strategy based on the HJW theorem has to require the capability of discriminating quantum states with very subtle difference, to the extent that is not allowed by the uncertainty principle. With the help of this finding, here we propose a simple QBC protocol which manages to evade the no-go proofs.
△ Less
Submitted 25 July, 2018; v1 submitted 1 September, 2017;
originally announced September 2017.
-
Chaos in quantum steering in high-dimensional systems
Authors:
Guang ** He
Abstract:
Quantum steering means that in some bipartite quantum systems, the local measurements on one side can determine the state of the other side. Here we show that in high-dimensional systems, there exists a specific entangled state which can display a kind of chaos effect when being adopted for steering. That is, a subtle difference in the measurement results on one side can steer the other side into…
▽ More
Quantum steering means that in some bipartite quantum systems, the local measurements on one side can determine the state of the other side. Here we show that in high-dimensional systems, there exists a specific entangled state which can display a kind of chaos effect when being adopted for steering. That is, a subtle difference in the measurement results on one side can steer the other side into completely orthogonal states. Moreover, by expanding the result to infinite-dimensional systems, we find two sets of states for which, contrary to common belief, even though their density matrices approach being identical, the steering between them is impossible. This property makes them very useful for quantum cryptography.
△ Less
Submitted 26 April, 2018; v1 submitted 30 August, 2017;
originally announced August 2017.
-
Quantum private comparison protocol without a third party
Authors:
Guang ** He
Abstract:
To evade the well-known impossibility of unconditionally secure quantum two-party computations, previous quantum private comparison protocols have to adopt a third party. Here we study how far we can go with two parties only. We propose a very feasible and efficient protocol. Intriguingly, although the average amount of information leaked cannot be made arbitrarily small, we find that it never exc…
▽ More
To evade the well-known impossibility of unconditionally secure quantum two-party computations, previous quantum private comparison protocols have to adopt a third party. Here we study how far we can go with two parties only. We propose a very feasible and efficient protocol. Intriguingly, although the average amount of information leaked cannot be made arbitrarily small, we find that it never exceeds 14 bits for any length of the bit-string being compared.
△ Less
Submitted 22 April, 2016;
originally announced April 2016.
-
Unconditionally secure quantum coin flip**
Authors:
Guang ** He
Abstract:
Quantum coin flip** (QCF) is an essential primitive for quantum cryptography. Unconditionally secure strong QCF with an arbitrarily small bias was widely believed to be impossible. But basing on a problem which cannot be solved without quantum algorithm, here we propose such a QCF protocol, and show how it manages to evade all existing no-go proofs on QCF.
Quantum coin flip** (QCF) is an essential primitive for quantum cryptography. Unconditionally secure strong QCF with an arbitrarily small bias was widely believed to be impossible. But basing on a problem which cannot be solved without quantum algorithm, here we propose such a QCF protocol, and show how it manages to evade all existing no-go proofs on QCF.
△ Less
Submitted 22 July, 2023; v1 submitted 3 February, 2016;
originally announced February 2016.
-
Continuous-variable measurement-device-independent multipartite quantum communication
Authors:
Yadong Wu,
Jian Zhou,
Xinbao Gong,
Ying Guo,
Zhi-Ming Zhang,
Guangqiang He
Abstract:
A continuous variable measurement device independent multi-party quantum communication protocol is investigated in this paper. Utilizing distributed continuous variable Greenberger-Horne-Zeilinger state, this protocol can implement both quantum cryptographic conference and quantum secret sharing. We analyze the security of the protocol against both entangling cloner attack and coherent attack. Ent…
▽ More
A continuous variable measurement device independent multi-party quantum communication protocol is investigated in this paper. Utilizing distributed continuous variable Greenberger-Horne-Zeilinger state, this protocol can implement both quantum cryptographic conference and quantum secret sharing. We analyze the security of the protocol against both entangling cloner attack and coherent attack. Entangling cloner attack is a practical individual attack, and coherent attack is the optimal attack Eve can implement. Simulation results show that coherent attack can greatly reduce the secret key rate. Different kinds of entangled attacks are compared and we finally discuss the optimal coherent attacks.
△ Less
Submitted 25 January, 2016; v1 submitted 12 December, 2015;
originally announced December 2015.
-
Five-Partite Entanglement Generation in A High-Q Microresonator
Authors:
Yutian Wen,
Xufei Wu,
Rongyu Li,
Qiang Lin,
Guangqiang He
Abstract:
We propose to produce five-partite entanglement via cascaded four-wave mixing in a high-Q microresonator that may become a key to future one-way quantum computation on chip. A theoretical model is presented for the underlying continuous-variable entanglement among the generated comb modes that is expansible to more complicated scenarios. We analyze the entanglement condition when the van Loock and…
▽ More
We propose to produce five-partite entanglement via cascaded four-wave mixing in a high-Q microresonator that may become a key to future one-way quantum computation on chip. A theoretical model is presented for the underlying continuous-variable entanglement among the generated comb modes that is expansible to more complicated scenarios. We analyze the entanglement condition when the van Loock and Furusawa criteria are violated, and discuss the device parameters for potential experimental realization that may be utilized to build an integrated compact five-partite entanglement generator. The proposed approach exhibits great potential for future large-scale integrated full optical quantum computation on chip.
△ Less
Submitted 3 January, 2015;
originally announced January 2015.
-
Insecurity of a relativistic quantum commitment scheme
Authors:
Guang ** He
Abstract:
We propose a cheating strategy to a relativistic quantum commitment scheme [Sci Rep 2014;4:6774] which was claimed to be unconditionally secure. It is shown that the sender Alice can cheat successfully with probability 100%, thus disproving the security claim.
We propose a cheating strategy to a relativistic quantum commitment scheme [Sci Rep 2014;4:6774] which was claimed to be unconditionally secure. It is shown that the sender Alice can cheat successfully with probability 100%, thus disproving the security claim.
△ Less
Submitted 22 July, 2023; v1 submitted 31 October, 2014;
originally announced November 2014.
-
Security bound of cheat sensitive quantum bit commitment
Authors:
Guang ** He
Abstract:
Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the send…
▽ More
Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the sender's committed bit before it is unveiled, while his cheating can pass the security check with a probability not less than 50%. The sender's cheating is also studied. The optimal CSQBC protocols that can minimize the sum of the cheating probabilities of both parties are found to be trivial, as they are practically useless. We also discuss the possibility of building a fair protocol in which both parties can cheat with equal probabilities.
△ Less
Submitted 7 June, 2015; v1 submitted 28 July, 2014;
originally announced July 2014.
-
Secure quantum weak oblivious transfer against individual measurements
Authors:
Guang ** He
Abstract:
In quantum weak oblivious transfer, Alice sends Bob two bits and Bob can learn one of the bits at his choice. It was found that the security of such a protocol is bounded by $2P_{Alice}^{\ast }+P_{Bob}^{\ast }\geq 2$, where $P_{Alice}^{\ast }$ is the probability with which Alice can guess Bob's choice, and $P_{Bob}^{\ast }$ is the probability with which Bob can guess both of Alice's bits\ given th…
▽ More
In quantum weak oblivious transfer, Alice sends Bob two bits and Bob can learn one of the bits at his choice. It was found that the security of such a protocol is bounded by $2P_{Alice}^{\ast }+P_{Bob}^{\ast }\geq 2$, where $P_{Alice}^{\ast }$ is the probability with which Alice can guess Bob's choice, and $P_{Bob}^{\ast }$ is the probability with which Bob can guess both of Alice's bits\ given that he learns one of the bits with certainty. Here we propose a protocol and show that as long as Alice is restricted to individual measurements, then both $P_{Alice}^{\ast }$ and $P_{Bob}^{\ast }$ can be made arbitrarily close to 1/2, so that maximal violation of the security bound can be reached. Even with some limited collective attacks, the security bound can still be violated. Therefore, although our protocol still cannot break the bound in principle when Alice has unlimited cheating power, it is sufficient for achieving secure quantum weak oblivious transfer in practice.
△ Less
Submitted 12 June, 2015; v1 submitted 30 December, 2013;
originally announced January 2014.
-
Security limitation on a class of device-independent quantum key distribution
Authors:
Guang ** He
Abstract:
Recently there were many proposals on device-independent (DI) quantum key distribution protocol whose security is based on the violation of the Clauser-Horne-Shimony-Holt inequality. However, as a statistical law, a certain extent of fluctuation has to be allowed. We show that the eavesdropper can make use of this property to obtain a remarkable part of the secret key by replacing some of the DI n…
▽ More
Recently there were many proposals on device-independent (DI) quantum key distribution protocol whose security is based on the violation of the Clauser-Horne-Shimony-Holt inequality. However, as a statistical law, a certain extent of fluctuation has to be allowed. We show that the eavesdropper can make use of this property to obtain a remarkable part of the secret key by replacing some of the DI nonlocal boxes with local ones. On the contrary, the same cheating strategy does not apply to the device-dependent (DD) version of the protocol. Thus such kind of DI protocol is less secure than its DD counterpart.
△ Less
Submitted 9 August, 2013;
originally announced August 2013.
-
Secure quantum bit commitment against empty promises. II. The density matrix
Authors:
Guang ** He
Abstract:
We further study the security of the quantum bit commitment (QBC) protocol we previously proposed [Phys. Rev. A 74, 022332 (2006).], by analyzing the reduced density matrix ρ_{b}^{B} which describes the quantum state at Bob's side corresponding to Alice's committed bit b. It is shown that Alice will find ρ_{0}^{B}\perp ρ_{1}^{B} while the protocol remains concealing to Bob. On the contrary, the ex…
▽ More
We further study the security of the quantum bit commitment (QBC) protocol we previously proposed [Phys. Rev. A 74, 022332 (2006).], by analyzing the reduced density matrix ρ_{b}^{B} which describes the quantum state at Bob's side corresponding to Alice's committed bit b. It is shown that Alice will find ρ_{0}^{B}\perp ρ_{1}^{B} while the protocol remains concealing to Bob. On the contrary, the existing no-go theorem of unconditionally secure QBC is based on the condition ρ_{0}^{B}\simeq ρ_{1}^{B}. Thus the specific cheating strategy proposed in the no-go theorem does not necessarily applies to our protocol.
△ Less
Submitted 27 July, 2013;
originally announced July 2013.
-
Comment on "A short impossibility proof of quantum bit commitment"
Authors:
Guang ** He
Abstract:
In a recent letter (Phys. Lett. A 377 (2013) 1076, arXiv:0905.3801), the authors presented an impossibility proof of quantum bit commitment, which attempted to cover all possible protocols that involve both quantum and classical information. Here we show that there are many errors in the proof, thus it fails to exhaust all conceivable protocols.
In a recent letter (Phys. Lett. A 377 (2013) 1076, arXiv:0905.3801), the authors presented an impossibility proof of quantum bit commitment, which attempted to cover all possible protocols that involve both quantum and classical information. Here we show that there are many errors in the proof, thus it fails to exhaust all conceivable protocols.
△ Less
Submitted 22 June, 2013;
originally announced June 2013.
-
Quantum Secret Sharing with Continuous Variable Graph State
Authors:
Yadong Wu,
Runze Cai,
Guangqiang He,
Jun Zhang
Abstract:
In this paper we study the protocol implementation and property analysis for several practical quantum secret sharing (QSS) schemes with continuous variable graph state (CVGS). For each QSS scheme, an implementation protocol is designed according to its secret and communication channel types. The estimation error is derived explicitly, which facilitates the unbiased estimation and error variance m…
▽ More
In this paper we study the protocol implementation and property analysis for several practical quantum secret sharing (QSS) schemes with continuous variable graph state (CVGS). For each QSS scheme, an implementation protocol is designed according to its secret and communication channel types. The estimation error is derived explicitly, which facilitates the unbiased estimation and error variance minimization. It turns out that only under infinite squeezing can the secret be perfectly reconstructed. Furthermore, we derive the condition for QSS threshold protocol on a weighted CVGS. Under certain conditions, the perfect reconstruction of the secret for two non-cooperative groups is exclusive, i.e. if one group gets the secret perfectly, the other group cannot get any information about the secret.
△ Less
Submitted 16 April, 2013;
originally announced April 2013.
-
Simplified quantum bit commitment using single photon nonlocality
Authors:
Guang ** He
Abstract:
We simplified our previously proposed quantum bit commitment (QBC) protocol based on the Mach-Zehnder interferometer, by replacing symmetric beam splitters with asymmetric ones. It eliminates the need for random sending time of the photons; thus, the feasibility and efficiency are both improved. The protocol is immune to the cheating strategy in the Mayers-Lo-Chau no-go theorem of unconditionally…
▽ More
We simplified our previously proposed quantum bit commitment (QBC) protocol based on the Mach-Zehnder interferometer, by replacing symmetric beam splitters with asymmetric ones. It eliminates the need for random sending time of the photons; thus, the feasibility and efficiency are both improved. The protocol is immune to the cheating strategy in the Mayers-Lo-Chau no-go theorem of unconditionally secure QBC, because the density matrices of the committed states do not satisfy a crucial condition on which the no-go theorem holds.
△ Less
Submitted 10 September, 2014; v1 submitted 20 December, 2012;
originally announced December 2012.
-
Comment on "Complete insecurity of quantum protocols for classical two-party computation"
Authors:
Guang ** He
Abstract:
In a recent paper (Phys. Rev. Lett. 109, 160501 (2012). arXiv:1201.0849), it is claimed that any quantum protocol for classical two-sided computation between Alice and Bob can be proven completely insecure for Alice if it is secure against Bob. Here we show that the proof is not sufficiently general, because the security definition it based on is only a sufficient condition but not a necessary con…
▽ More
In a recent paper (Phys. Rev. Lett. 109, 160501 (2012). arXiv:1201.0849), it is claimed that any quantum protocol for classical two-sided computation between Alice and Bob can be proven completely insecure for Alice if it is secure against Bob. Here we show that the proof is not sufficiently general, because the security definition it based on is only a sufficient condition but not a necessary condition.
△ Less
Submitted 3 November, 2012;
originally announced November 2012.
-
Can relativistic bit commitment lead to secure quantum oblivious transfer?
Authors:
Guang ** He
Abstract:
While unconditionally secure bit commitment (BC) is considered impossible within the quantum framework, it can be obtained under relativistic or experimental constraints. Here we study whether such BC can lead to secure quantum oblivious transfer (QOT). The answer is not completely negative. On one hand, we provide a detailed cheating strategy, showing that the "honest-but-curious adversaries" in…
▽ More
While unconditionally secure bit commitment (BC) is considered impossible within the quantum framework, it can be obtained under relativistic or experimental constraints. Here we study whether such BC can lead to secure quantum oblivious transfer (QOT). The answer is not completely negative. On one hand, we provide a detailed cheating strategy, showing that the "honest-but-curious adversaries" in some of the existing no-go proofs on QOT still apply even if secure BC is used, enabling the receiver to increase the average reliability of the decoded value of the transferred bit. On the other hand, it is also found that some other no-go proofs claiming that a dishonest receiver can always decode all transferred bits simultaneously with reliability 100% become invalid in this scenario, because their models of cryptographic protocols are too ideal to cover such a BC-based QOT.
△ Less
Submitted 3 April, 2015; v1 submitted 20 October, 2012;
originally announced October 2012.
-
Quantum protocols for the millionaire problem with a third party are trivial
Authors:
Guang ** He
Abstract:
Recently there were many quantum protocols devoted to solve the millionaire problem and private comparison problem by adding a semi-honest third party. They all require complicated quantum methods, while still leak a non-trivial amount of information to at least one of the parties. But it will be shown here that once the third party is introduced, there are very simple protocols which require quan…
▽ More
Recently there were many quantum protocols devoted to solve the millionaire problem and private comparison problem by adding a semi-honest third party. They all require complicated quantum methods, while still leak a non-trivial amount of information to at least one of the parties. But it will be shown here that once the third party is introduced, there are very simple protocols which require quantum key distribution as the only quantum resource, and the amount of information leaked can be made arbitrarily small. Furthermore, even a dishonest third party cannot spoil the protocols. Thus our solutions surpass all existing protocols on both feasibility and security.
△ Less
Submitted 17 March, 2013; v1 submitted 28 July, 2012;
originally announced July 2012.
-
Bright six-partite continuous variable entanglement using cascaded four-wave mixing processes in a four-level atomic system
Authors:
Guangqiang He,
Xufei Wu,
Yi Gu
Abstract:
We theoretically show that bright six-partite continuous-variable entanglement can be generated using cascaded four-wave mixing effects of third-order nonlinearity atomic systems above threshold. The six-partite continuous-variable entanglement among the six cavity fields with different frequencies is analyzed by applying optimized inseparability criteria proposed by Van Loock and Furusawa.
We theoretically show that bright six-partite continuous-variable entanglement can be generated using cascaded four-wave mixing effects of third-order nonlinearity atomic systems above threshold. The six-partite continuous-variable entanglement among the six cavity fields with different frequencies is analyzed by applying optimized inseparability criteria proposed by Van Loock and Furusawa.
△ Less
Submitted 10 September, 2011;
originally announced September 2011.
-
Quantum key distribution based on orthogonal states allows secure quantum bit commitment
Authors:
Guang ** He
Abstract:
For more than a decade, it was believed that unconditionally secure quantum bit commitment (QBC) is impossible. But basing on a previously proposed quantum key distribution scheme using orthogonal states, here we build a QBC protocol in which the density matrices of the quantum states encoding the commitment do not satisfy a crucial condition on which the no-go proofs of QBC are based. Thus the no…
▽ More
For more than a decade, it was believed that unconditionally secure quantum bit commitment (QBC) is impossible. But basing on a previously proposed quantum key distribution scheme using orthogonal states, here we build a QBC protocol in which the density matrices of the quantum states encoding the commitment do not satisfy a crucial condition on which the no-go proofs of QBC are based. Thus the no-go proofs could be evaded. Our protocol is fault-tolerant and very feasible with currently available technology. It reopens the venue for other "post-cold-war" multi-party cryptographic protocols, e.g., quantum bit string commitment and quantum strong coin tossing with an arbitrarily small bias. This result also has a strong influence on the Clifton-Bub-Halvorson theorem which suggests that quantum theory could be characterized in terms of information-theoretic constraints.
△ Less
Submitted 28 June, 2012; v1 submitted 24 January, 2011;
originally announced January 2011.
-
The Multiparty Coherent Channel and its Implementation with Linear Optics
Authors:
Guangqiang He,
Taizhi Liu,
Xin Tao
Abstract:
The continuous-variable coherent (conat) channel is a useful resource for coherent communication, producing coherent teleportation and coherent superdense coding. We extend the conat channel to multiparty conditions by proposing definitions about multiparty position-quadrature conat channel and multiparty momentum-quadrature conat channel. We additionally provide two methods to implement this chan…
▽ More
The continuous-variable coherent (conat) channel is a useful resource for coherent communication, producing coherent teleportation and coherent superdense coding. We extend the conat channel to multiparty conditions by proposing definitions about multiparty position-quadrature conat channel and multiparty momentum-quadrature conat channel. We additionally provide two methods to implement this channel using linear optics. One method is the multiparty version of coherent communication assisted by entanglement and classical communication (CCAECC). The other is multiparty coherent superdense coding.
△ Less
Submitted 13 May, 2013; v1 submitted 7 March, 2010;
originally announced March 2010.
-
An experimentally testable proof of the discreteness of time
Authors:
Guang ** He
Abstract:
By proposing a paradox between the impossibility of superluminal signal transfer and the normalization condition of wavefunctions, we predict that when a change happens to the conditions that determining the status of a quantum system, the system will show no response to this change at all, until after a certain time interval. Otherwise either special relativity or quantum mechanics will be viol…
▽ More
By proposing a paradox between the impossibility of superluminal signal transfer and the normalization condition of wavefunctions, we predict that when a change happens to the conditions that determining the status of a quantum system, the system will show no response to this change at all, until after a certain time interval. Otherwise either special relativity or quantum mechanics will be violated. As a consequence, no physical process can actually happen within Planck time. Therefore time is discrete, with Planck time being the smallest unit. More intriguingly, systems with a larger size and a slower speed will have a larger unit of time. Unlike many other interpretations of the discreteness of time, our proof can be tested, at less partly, by experiments. Our result also sets a limit on the speed of computers, and gives instruction to the search of quantum gravity theories.
△ Less
Submitted 17 November, 2009; v1 submitted 12 November, 2009;
originally announced November 2009.
-
Feasible scheme for measuring experimentally the speed of the response of quantum states to the change of the boundary condition
Authors:
Guang ** He
Abstract:
When the boundary condition of a quantum system changes, how fast will it affect the state of the system? Here we show that if the response takes place immediately, then it can allow superluminal signal transfer. Else if the response propagates in space with a finite speed, then it could give a simple explanation why our world shows classicality on the macroscopic scale. Furthermore, determining…
▽ More
When the boundary condition of a quantum system changes, how fast will it affect the state of the system? Here we show that if the response takes place immediately, then it can allow superluminal signal transfer. Else if the response propagates in space with a finite speed, then it could give a simple explanation why our world shows classicality on the macroscopic scale. Furthermore, determining the exact value of this speed can either clarify the doubts on static experiments for testing Bell's inequality, or support the pilot-wave interpretation of quantum mechanics. We propose an experimental scheme for measuring this speed, which can be implemented with state-of-art technology, e.g., single-electron biprism interference.
△ Less
Submitted 15 November, 2009; v1 submitted 11 July, 2009;
originally announced July 2009.
-
Relationship between quantum repeating devices and quantum seals
Authors:
Guang ** He
Abstract:
It is revealed that quantum repeating devices and quantum seals have a very close relationship, thus the theory in one field can be applied to the other. Consequently, it is shown that the fidelity bounds and optimality of quantum repeating devices can be violated when they are used for decoding classical information from quantum states, and security bounds for protocols sealing quantum data exi…
▽ More
It is revealed that quantum repeating devices and quantum seals have a very close relationship, thus the theory in one field can be applied to the other. Consequently, it is shown that the fidelity bounds and optimality of quantum repeating devices can be violated when they are used for decoding classical information from quantum states, and security bounds for protocols sealing quantum data exist.
△ Less
Submitted 29 July, 2009; v1 submitted 28 March, 2009;
originally announced March 2009.
-
Practically secure quantum bit commitment based on quantum seals
Authors:
Guang ** He,
Z. D. Wang
Abstract:
The relationship between the quantum bit commitment (QBC) and quantum seal (QS) is studied. It is elaborated that QBC and QS are not equivalent, but QS protocols satisfying a stronger unconditional security requirement can lead to an unconditionally secure QBC. In this sense, QS is strictly stronger than QBC in security requirements. Based on an earlier proposal on sealing a single bit, a feasib…
▽ More
The relationship between the quantum bit commitment (QBC) and quantum seal (QS) is studied. It is elaborated that QBC and QS are not equivalent, but QS protocols satisfying a stronger unconditional security requirement can lead to an unconditionally secure QBC. In this sense, QS is strictly stronger than QBC in security requirements. Based on an earlier proposal on sealing a single bit, a feasible QBC protocol is also put forward, which is secure in practice even if the cheater has a strong quantum computational power.
△ Less
Submitted 22 April, 2008;
originally announced April 2008.