-
Generation of Spatially Coherent Light at Extreme Ultraviolet Wavelengths
Authors:
Randy A. Bartels,
Ariel Paul,
Hans Green,
Henry C. Kapteyn,
Margaret M. Murnane,
Sterling Backus,
Ivan P. Christov,
Yanwei Liu,
David Attwood,
Chris Jacobsen
Abstract:
We present spatial coherence measurements of extreme-ultraviolet light generated using the process of high-harmonic upconversion of a femtosecond laser. Using a phase-matched hollow-fiber geometry, the generated beam is found to exhibit essentially full spatial coherence. The coherence of this laser-like EUV source is demonstrated by recording Gabor holograms of small objects. This work demonstrat…
▽ More
We present spatial coherence measurements of extreme-ultraviolet light generated using the process of high-harmonic upconversion of a femtosecond laser. Using a phase-matched hollow-fiber geometry, the generated beam is found to exhibit essentially full spatial coherence. The coherence of this laser-like EUV source is demonstrated by recording Gabor holograms of small objects. This work demonstrates the capability to do EUV holography using a tabletop experimental setup. Such an EUV source, with low divergence and high spatial coherence, can be used for experiments such as high-precision metrology, inspection of optical components for EUV lithography (1), and for microscopy and holography (2) with nanometer resolution. Furthermore, the short time duration of the EUV radiation (a few femtoseconds) will enable EUV microscopy and holography to be performed with ultrahigh time resolution.
△ Less
Submitted 28 March, 2024;
originally announced March 2024.
-
Environment-assisted bosonic quantum communications
Authors:
Stefano Pirandola,
Carlo Ottaviani,
Christian S. Jacobsen,
Gaetana Spedalieri,
Samuel L. Braunstein,
Tobias Gehring,
Ulrik L. Andersen
Abstract:
We consider a quantum relay which is used by two parties to perform several continuous-variable protocols of quantum communication, from entanglement distribution (swap** and distillation), to quantum teleportation, and quantum key distribution. The theory of these protocols is suitably extended to a non-Markovian model of decoherence characterized by correlated Gaussian noise in the bosonic env…
▽ More
We consider a quantum relay which is used by two parties to perform several continuous-variable protocols of quantum communication, from entanglement distribution (swap** and distillation), to quantum teleportation, and quantum key distribution. The theory of these protocols is suitably extended to a non-Markovian model of decoherence characterized by correlated Gaussian noise in the bosonic environment. In the worst case scenario where bipartite entanglement is completely lost at the relay, we show that the various protocols can be reactivated by the assistance of classical (separable) correlations in the environment. In fact, above a critical amount, these correlations are able to guarantee the distribution of a weaker form of entanglement (quadripartite), which can be localized by the relay into a stronger form (bipartite) that is exploitable by the parties. Our findings are confirmed by a proof-of-principle experiment where we show, for the first time, that memory effects in the environment can drastically enhance the performance of a quantum relay, well beyond the single-repeater bound for quantum and private communications.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
A Compact, Mobile, Low-Threshold Squeezed Light Source
Authors:
Jens Arnbak,
Christian Scheffmann Jacobsen,
Rayssa Bruzaca de Andrade,
Xueshi Guo,
Jonas Schou Neergaard-Nielsen,
Ulrik Lund Andersen,
Tobias Gehring
Abstract:
Strongly squeezed light finds many important applications within the fields of quantum metrology, quantum communication and quantum computation. However, due to the bulkiness and complexity of most squeezed light sources of today, they are still not a standard tool in quantum optics labs. We have taken the first steps in realizing a compact, high-performance 1550 nm squeezing source based on comme…
▽ More
Strongly squeezed light finds many important applications within the fields of quantum metrology, quantum communication and quantum computation. However, due to the bulkiness and complexity of most squeezed light sources of today, they are still not a standard tool in quantum optics labs. We have taken the first steps in realizing a compact, high-performance 1550 nm squeezing source based on commercially available fiber components combined with a free-space double-resonant parametric down-conversion source. The whole setup, including single-pass second-harmonic generation in a waveguide, fits on a small breadboard and produces 9.3 dB of squeezing at a 5 MHz sideband-frequency. The setup is currently limited by phase noise, but further optimization and development should allow for a 19" sized turn-key squeezing source capable of delivering more than 10 dB of squeezing.
△ Less
Submitted 3 September, 2019;
originally announced September 2019.
-
Twin beam quantum-enhanced correlated interferometry for testing fundamental physics
Authors:
S. T. Pradyumna,
E. Losero,
I. Ruo-Berchera,
P. Traina,
M. Zucco,
C. S. Jacobsen,
U. L. Andersen,
I. P. Degiovanni,
M. Genovese,
T. Gehring
Abstract:
Quantum metrology deals with improving the resolution of instruments that are otherwise limited by shot noise and it is therefore a promising avenue for enabling scientific breakthroughs. The advantage can be even more striking when quantum enhancement is combined with correlation techniques among several devices. Here, we present and realize a correlation interferometry scheme exploiting bipartit…
▽ More
Quantum metrology deals with improving the resolution of instruments that are otherwise limited by shot noise and it is therefore a promising avenue for enabling scientific breakthroughs. The advantage can be even more striking when quantum enhancement is combined with correlation techniques among several devices. Here, we present and realize a correlation interferometry scheme exploiting bipartite quantum correlated states injected in two independent interferometers. The scheme outperforms classical analogues in detecting a faint signal that may be correlated/uncorrelated between the two devices. We also compare its sensitivity with that obtained for a pair of two independent squeezed modes, each addressed to one interferometer, for detecting a correlated stochastic signal in the MHz frequency band. Being the simpler solution, it may eventually find application to fundamental physics tests, e.g., searching for the effects predicted by some Planck scale theories.
△ Less
Submitted 23 June, 2020; v1 submitted 31 October, 2018;
originally announced October 2018.
-
Practical quantum computing on encrypted data
Authors:
Kevin Marshall,
Christian S. Jacobsen,
Clemens Schafermeier,
Tobias Gehring,
Christian Weedbrook,
Ulrik L. Andersen
Abstract:
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate,…
▽ More
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the unconditional security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits, which can ultimately allow for the potential widespread adoption of this quantum technology in future cloud-based computing networks.
△ Less
Submitted 25 July, 2016;
originally announced July 2016.
-
Quantum cryptography with an ideal local relay
Authors:
Gaetana Spedalieri,
Carlo Ottaviani,
Samuel L. Braunstein,
Tobias Gehring,
Christian S. Jacobsen,
Ulrik L. Andersen,
Stefano Pirandola
Abstract:
We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection. We study the ideal case where Alice's channel is lossless, i.e., the relay is locally situated in her lab and the Bell detection is performed with unit efficiency. This configura…
▽ More
We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection. We study the ideal case where Alice's channel is lossless, i.e., the relay is locally situated in her lab and the Bell detection is performed with unit efficiency. This configuration allows us to explore the optimal performances achievable by CV measurement-device-independent (MDI) quantum key distribution (QKD). This corresponds to the limit of a trusted local relay, where the detection loss can be re-scaled. Our theoretical analysis is confirmed by an experimental simulation where 10^-4 secret bits per use can potentially be distributed at 170km assuming ideal reconciliation.
△ Less
Submitted 3 September, 2015;
originally announced September 2015.
-
Continuous Variable Quantum Key Distribution with a Noisy Laser
Authors:
Christian S. Jacobsen,
Tobias Gehring,
Ulrik L. Andersen
Abstract:
Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrat…
▽ More
Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances large amounts of preparation noise can be tolerated in contrast to reverse reconciliation where the key rate quickly drops to zero. Our experiment thereby demonstrates that quantum key distribution with non-shot-noise limited laser diodes might be feasible.
△ Less
Submitted 21 September, 2016; v1 submitted 6 July, 2015;
originally announced July 2015.
-
Single-Quadrature Continuous-Variable Quantum Key Distribution
Authors:
Tobias Gehring,
Christian S. Jacobsen,
Ulrik L. Andersen
Abstract:
Most continuous-variable quantum key distribution schemes are based on the Gaussian modulation of coherent states followed by continuous quadrature detection using homodyne detectors. In all previous schemes, the Gaussian modulation has been carried out in conjugate quadratures thus requiring two independent modulators for their implementations. Here, we propose and experimentally test a largely s…
▽ More
Most continuous-variable quantum key distribution schemes are based on the Gaussian modulation of coherent states followed by continuous quadrature detection using homodyne detectors. In all previous schemes, the Gaussian modulation has been carried out in conjugate quadratures thus requiring two independent modulators for their implementations. Here, we propose and experimentally test a largely simplified scheme in which the Gaussian modulation is performed in a single quadrature. The scheme is shown to be asymptotically secure against collective attacks, and considers asymmetric preparation and excess noise. A single-quadrature modulation approach renders the need for a costly amplitude modulator unnecessary, and thus facilitates commercialization of continuous-variable quantum key distribution.
△ Less
Submitted 19 October, 2015; v1 submitted 3 July, 2015;
originally announced July 2015.
-
MDI-QKD: Continuous- versus discrete-variables at metropolitan distances
Authors:
Stefano Pirandola,
Carlo Ottaviani,
Gaetana Spedalieri,
Christian Weedbrook,
Samuel L. Braunstein,
Seth Lloyd,
Tobias Gehring,
Christian S. Jacobsen,
Ulrik L. Andersen
Abstract:
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s analysis supports exactly the opposite by showing that the experimental rate of our CV protocol (achieved with practical room-temperature devices…
▽ More
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s analysis supports exactly the opposite by showing that the experimental rate of our CV protocol (achieved with practical room-temperature devices) remains one order of magnitude higher than their purely-numerical and over-optimistic extrapolation for qubits, based on nearly-ideal parameters and cryogenic detectors (unsuitable solutions for a realistic metropolitan network, which is expected to run on cheap room-temperature devices, potentially even mobile). The experimental rate of our protocol (expressed as bits per relay use) is confirmed to be two-three orders of magnitude higher than the rate of any realistic simulation of practical DV-MDI-QKD over short-medium distances. Of course this does not mean that DV-MDI-QKD networks should not be investigated or built, but increasing their rate is a non-trivial practical problem clearly beyond the analysis of Xu et al. Finally, in order to clarify the facts, we also refute a series of incorrect arguments against CV-MDI-QKD and, more generally, CV-QKD, which were made by Xu et al. with the goal of supporting their thesis.
△ Less
Submitted 1 August, 2015; v1 submitted 22 June, 2015;
originally announced June 2015.
-
Non-Markovian Reactivation of Quantum Relays
Authors:
Stefano Pirandola,
Carlo Ottaviani,
Christian S. Jacobsen,
Gaetana Spedalieri,
Samuel L. Braunstein,
Tobias Gehring,
Ulrik L. Andersen
Abstract:
We consider a quantum relay which is used by two parties to perform several continuous-variable protocols: Entanglement swap**, distillation, quantum teleportation, and quantum key distribution. The theory of these protocols is extended to a non-Markovian model of decoherence characterized by correlated Gaussian noise. Even if bipartite entanglement is completely lost at the relay, we show that…
▽ More
We consider a quantum relay which is used by two parties to perform several continuous-variable protocols: Entanglement swap**, distillation, quantum teleportation, and quantum key distribution. The theory of these protocols is extended to a non-Markovian model of decoherence characterized by correlated Gaussian noise. Even if bipartite entanglement is completely lost at the relay, we show that the various protocols can progressively be reactivated by the separable noise-correlations of the environment. In fact, above a critical amount, these correlations are able to restore the distribution of quadripartite entanglement, which can be localized into an exploitable bipartite form by the action of the relay. Our findings are confirmed by a proof-of-principle experiment and show the potential advantages of non-Markovian effects in a quantum network architecture.
△ Less
Submitted 27 May, 2015;
originally announced May 2015.
-
Complete elimination of information leakage in continuous-variable quantum communication channels
Authors:
Christian S. Jacobsen,
Lars S. Madsen,
Vladyslav C. Usenko,
Radim Filip,
Ulrik L. Andersen
Abstract:
In all lossy communication channels realized to date, information is inevitably leaked to a potential eavesdropper. Here we present a communication protocol that does not allow for any information leakage to a potential eavesdropper in a purely lossy channel. By encoding information into a restricted Gaussian alphabet of squeezed states we show, both theoretically and experimentally, that the Hole…
▽ More
In all lossy communication channels realized to date, information is inevitably leaked to a potential eavesdropper. Here we present a communication protocol that does not allow for any information leakage to a potential eavesdropper in a purely lossy channel. By encoding information into a restricted Gaussian alphabet of squeezed states we show, both theoretically and experimentally, that the Holevo information between the eavesdropper and the intended recipient can be exactly zero in a purely lossy channel while minimized in a noisy channel. This result is of fundamental interest, but might also have practical implications in extending the distance of secure quantum key distribution.
△ Less
Submitted 27 September, 2018; v1 submitted 20 August, 2014;
originally announced August 2014.
-
High-rate quantum cryptography in untrusted networks
Authors:
Stefano Pirandola,
Carlo Ottaviani,
Gaetana Spedalieri,
Christian Weedbrook,
Samuel L. Braunstein,
Seth Lloyd,
Tobias Gehring,
Christian S. Jacobsen,
Ulrik L. Andersen
Abstract:
We extend the field of continuous-variable quantum cryptography to a network formulation where two honest parties connect to an untrusted relay by insecure quantum links. To generate secret correlations, they transmit coherent states to the relay where a continuous-variable Bell detection is performed and the outcome broadcast. Even though the detection could be fully corrupted and the links subje…
▽ More
We extend the field of continuous-variable quantum cryptography to a network formulation where two honest parties connect to an untrusted relay by insecure quantum links. To generate secret correlations, they transmit coherent states to the relay where a continuous-variable Bell detection is performed and the outcome broadcast. Even though the detection could be fully corrupted and the links subject to optimal coherent attacks, the honest parties can still extract a secret key, achieving high rates when the relay is proximal to one party, as typical in public networks with access points or proxy servers. Our theory is confirmed by an experiment generating key-rates which are orders of magnitude higher than those achievable with discrete-variable protocols. Thus, using the cheapest possible quantum resources, we experimentally show the possibility of high-rate quantum key distribution in network topologies where direct links are missing between end-users and intermediate relays cannot be trusted.
△ Less
Submitted 1 August, 2014; v1 submitted 14 December, 2013;
originally announced December 2013.