-
Individually Addressed Entangling Gates in a Two-Dimensional Ion Crystal
Authors:
Y. -H. Hou,
Y. -J. Yi,
Y. -K. Wu,
Y. -Y. Chen,
L. Zhang,
Y. Wang,
Y. -L. Xu,
C. Zhang,
Q. -X. Mei,
H. -X. Yang,
J. -Y. Ma,
S. -A. Guo,
J. Ye,
B. -X. Qi,
Z. -C. Zhou,
P. -Y. Hou,
L. -M. Duan
Abstract:
Two-dimensional (2D) ion crystals have become a promising way to scale up qubit numbers for ion trap quantum information processing. However, to realize universal quantum computing in this system, individually addressed high-fidelity two-qubit entangling gates still remain challenging due to the inevitable micromotion of ions in a 2D crystal as well as the technical difficulty in 2D addressing. He…
▽ More
Two-dimensional (2D) ion crystals have become a promising way to scale up qubit numbers for ion trap quantum information processing. However, to realize universal quantum computing in this system, individually addressed high-fidelity two-qubit entangling gates still remain challenging due to the inevitable micromotion of ions in a 2D crystal as well as the technical difficulty in 2D addressing. Here we demonstrate two-qubit entangling gates between any ion pairs in a 2D crystal of four ions. We use symmetrically placed crossed acousto-optic deflectors (AODs) to drive Raman transitions and achieve an addressing crosstalk error below 0.1%. We design and demonstrate a gate sequence by alternatingly addressing two target ions, making it compatible with any single-ion addressing techniques without crosstalk from multiple addressing beams. We further examine the gate performance versus the micromotion amplitude of the ions and show that its effect can be compensated by a recalibration of the laser intensity without degrading the gate fidelity. Our work paves the way for ion trap quantum computing with hundreds to thousands of qubits on a 2D ion crystal.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
Realization of a crosstalk-free multi-ion node for long-distance quantum networking
Authors:
P. -C. Lai,
Y. Wang,
J. -X. Shi,
Z. -B. Cui,
Z. -Q. Wang,
S. Zhang,
P. -Y. Liu,
Z. -C. Tian,
Y. -D. Sun,
X. -Y. Chang,
B. -X. Qi,
Y. -Y. Huang,
Z. -C. Zhou,
Y. -K. Wu,
Y. Xu,
Y. -F. Pu,
L. -M. Duan
Abstract:
Trapped atomic ions constitute one of the leading physical platforms for building the quantum repeater nodes to realize large-scale quantum networks. In a long-distance trapped-ion quantum network, it is essential to have crosstalk-free dual-type qubits: one type, called the communication qubit, to establish entangling interface with telecom photons; and the other type, called the memory qubit, to…
▽ More
Trapped atomic ions constitute one of the leading physical platforms for building the quantum repeater nodes to realize large-scale quantum networks. In a long-distance trapped-ion quantum network, it is essential to have crosstalk-free dual-type qubits: one type, called the communication qubit, to establish entangling interface with telecom photons; and the other type, called the memory qubit, to store quantum information immune from photon scattering under entangling attempts. Here, we report the first experimental implementation of a telecom-compatible and crosstalk-free quantum network node based on two trapped $^{40}$Ca$^{+}$ ions. The memory qubit is encoded on a long-lived metastable level to avoid crosstalk with the communication qubit encoded in another subspace of the same ion species, and a quantum wavelength conversion module is employed to generate ion-photon entanglement over a $12\,$km fiber in a heralded style. Our work therefore constitutes an important step towards the realization of quantum repeaters and long-distance quantum networks.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Simulating the spin-boson model with a controllable reservoir in an ion trap
Authors:
G. -X. Wang,
Y. -K. Wu,
R. Yao,
W. -Q. Lian,
Z. -J. Cheng,
Y. -L. Xu,
C. Zhang,
Y. Jiang,
Y. -Z. Xu,
B. -X. Qi,
P. -Y. Hou,
Z. -C. Zhou,
L. He,
L. -M. Duan
Abstract:
The spin-boson model is a prototypical model for open quantum dynamics. Here we simulate the spin-boson model using a chain of trapped ions where a spin is coupled to a structured reservoir of bosonic modes. We engineer the spectral density of the reservoir by adjusting the ion number, the target ion location, the laser detuning to the phonon sidebands, and the number of frequency components in th…
▽ More
The spin-boson model is a prototypical model for open quantum dynamics. Here we simulate the spin-boson model using a chain of trapped ions where a spin is coupled to a structured reservoir of bosonic modes. We engineer the spectral density of the reservoir by adjusting the ion number, the target ion location, the laser detuning to the phonon sidebands, and the number of frequency components in the laser, and we observe their effects on the collapse and revival of the initially encoded information. Our work demonstrates the ion trap as a powerful platform for simulating open quantum dynamics with complicated reservoir structures.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
Variational Quantum AdaBoost with Supervised Learning Guarantee
Authors:
Yabo Wang,
Xin Wang,
Bo Qi,
Daoyi Dong
Abstract:
Although variational quantum algorithms based on parameterized quantum circuits promise to achieve quantum advantages, in the noisy intermediate-scale quantum (NISQ) era, their capabilities are greatly constrained due to limited number of qubits and depth of quantum circuits. Therefore, we may view these variational quantum algorithms as weak learners in supervised learning. Ensemble methods are a…
▽ More
Although variational quantum algorithms based on parameterized quantum circuits promise to achieve quantum advantages, in the noisy intermediate-scale quantum (NISQ) era, their capabilities are greatly constrained due to limited number of qubits and depth of quantum circuits. Therefore, we may view these variational quantum algorithms as weak learners in supervised learning. Ensemble methods are a general technique in machine learning for combining weak learners to construct a more accurate one. In this paper, we theoretically prove and numerically verify a learning guarantee for variational quantum adaptive boosting (AdaBoost). To be specific, we theoretically depict how the prediction error of variational quantum AdaBoost on binary classification decreases with the increase of the number of boosting rounds and sample size. By employing quantum convolutional neural networks, we further demonstrate that variational quantum AdaBoost can not only achieve much higher accuracy in prediction, but also help mitigate the impact of noise. Our work indicates that in the current NISQ era, introducing appropriate ensemble methods is particularly valuable in improving the performance of quantum machine learning algorithms.
△ Less
Submitted 4 February, 2024;
originally announced February 2024.
-
Power Characterization of Noisy Quantum Kernels
Authors:
Yabo Wang,
Bo Qi,
Xin Wang,
Tongliang Liu,
Daoyi Dong
Abstract:
Quantum kernel methods have been widely recognized as one of promising quantum machine learning algorithms that have potential to achieve quantum advantages. In this paper, we theoretically characterize the power of noisy quantum kernels and demonstrate that under global depolarization noise, for different input data the predictions of the optimal hypothesis inferred by the noisy quantum kernel ap…
▽ More
Quantum kernel methods have been widely recognized as one of promising quantum machine learning algorithms that have potential to achieve quantum advantages. In this paper, we theoretically characterize the power of noisy quantum kernels and demonstrate that under global depolarization noise, for different input data the predictions of the optimal hypothesis inferred by the noisy quantum kernel approximately concentrate towards some fixed value. In particular, we depict the convergence rate in terms of the strength of quantum noise, the size of training samples, the number of qubits, the number of layers affected by quantum noises, as well as the number of measurement shots. Our results show that noises may make quantum kernel methods to only have poor prediction capability, even when the generalization error is small. Thus, we provide a crucial warning to employ noisy quantum kernel methods for quantum computation and the theoretical results can also serve as guidelines when develo** practical quantum kernel algorithms for achieving quantum advantages.
△ Less
Submitted 30 January, 2024;
originally announced January 2024.
-
A Site-Resolved 2D Quantum Simulator with Hundreds of Trapped Ions
Authors:
S. -A. Guo,
Y. -K. Wu,
J. Ye,
L. Zhang,
W. -Q. Lian,
R. Yao,
Y. Wang,
R. -Y. Yan,
Y. -J. Yi,
Y. -L. Xu,
B. -W. Li,
Y. -H. Hou,
Y. -Z. Xu,
W. -X. Guo,
C. Zhang,
B. -X. Qi,
Z. -C. Zhou,
L. He,
L. -M. Duan
Abstract:
A large qubit capacity and an individual readout capability are two crucial requirements for large-scale quantum computing and simulation. As one of the leading physical platforms for quantum information processing, the ion trap has achieved quantum simulation of tens of ions with site-resolved readout in 1D Paul trap, and that of hundreds of ions with global observables in 2D Penning trap. Howeve…
▽ More
A large qubit capacity and an individual readout capability are two crucial requirements for large-scale quantum computing and simulation. As one of the leading physical platforms for quantum information processing, the ion trap has achieved quantum simulation of tens of ions with site-resolved readout in 1D Paul trap, and that of hundreds of ions with global observables in 2D Penning trap. However, integrating these two features into a single system is still very challenging. Here we report the stable trap** of 512 ions in a 2D Wigner crystal and the sideband cooling of their transverse motion. We demonstrate the quantum simulation of long-range quantum Ising models with tunable coupling strengths and patterns, with or without frustration, using 300 ions. Enabled by the site resolution in the single-shot measurement, we observe rich spatial correlation patterns in the quasi-adiabatically prepared ground states, which allows us to verify quantum simulation results by comparing with the calculated collective phonon modes and with classical simulated annealing. We further probe the quench dynamics of the Ising model in a transverse field to demonstrate quantum sampling tasks. Our work paves the way for simulating classically intractable quantum dynamics and for running NISQ algorithms using 2D ion trap quantum simulators.
△ Less
Submitted 11 April, 2024; v1 submitted 28 November, 2023;
originally announced November 2023.
-
Robust zero modes in non-Hermitian systems without global symmetries
Authors:
Jose D. H. Rivero,
Courtney Fleming,
Bingkun Qi,
Liang Feng,
Li Ge
Abstract:
We present an approach to achieve zero modes in lattice models that do not rely on any symmetry or topology of the bulk, which are robust against disorder in the bulk of any type and strength. Such symmetry-free zero modes (SFZMs) are formed by attaching a single site or small cluster with zero mode(s) to the bulk, which serves as the "nucleus" that expands to the entire lattice. We identify the r…
▽ More
We present an approach to achieve zero modes in lattice models that do not rely on any symmetry or topology of the bulk, which are robust against disorder in the bulk of any type and strength. Such symmetry-free zero modes (SFZMs) are formed by attaching a single site or small cluster with zero mode(s) to the bulk, which serves as the "nucleus" that expands to the entire lattice. We identify the requirements on the couplings between this boundary and the bulk, which reveals that this approach is intrinsically non-Hermitian. We then provide several examples with either an arbitrary or structured bulk, forming spectrally embedded zero modes in the bulk continuum, midgap zero modes, and even restoring the "zeroness" of coupling or disorder-shifted topological corner states. Focusing on viable realizations using photonic lattices, we show that the resulting SFZM can be observed as the single lasing mode when optical gain is applied to the boundary.
△ Less
Submitted 2 November, 2023;
originally announced November 2023.
-
EHA: Entanglement-variational Hardware-efficient Ansatz for Eigensolvers
Authors:
Xin Wang,
Bo Qi,
Yabo Wang,
Daoyi Dong
Abstract:
Variational quantum eigensolvers (VQEs) are one of the most important and effective applications of quantum computing, especially in the current noisy intermediate-scale quantum (NISQ) era. There are mainly two ways for VQEs: problem-agnostic and problem-specific. For problem-agnostic methods, they often suffer from trainability issues. For problem-specific methods, their performance usually relie…
▽ More
Variational quantum eigensolvers (VQEs) are one of the most important and effective applications of quantum computing, especially in the current noisy intermediate-scale quantum (NISQ) era. There are mainly two ways for VQEs: problem-agnostic and problem-specific. For problem-agnostic methods, they often suffer from trainability issues. For problem-specific methods, their performance usually relies upon choices of initial reference states which are often hard to determine. In this paper, we propose an Entanglement-variational Hardware-efficient Ansatz (EHA), and numerically compare it with some widely used ansatzes by solving benchmark problems in quantum many-body systems and quantum chemistry. Our EHA is problem-agnostic and hardware-efficient, especially suitable for NISQ devices and having potential for wide applications. EHA can achieve a higher level of accuracy in finding ground states and their energies in most cases even compared with problem-specific methods. The performance of EHA is robust to choices of initial states and parameters initialization and it has the ability to quickly adjust the entanglement to the required amount, which is also the fundamental reason for its superiority.
△ Less
Submitted 15 March, 2024; v1 submitted 2 November, 2023;
originally announced November 2023.
-
Entanglement-based quantum digital signatures over deployed campus network
Authors:
Joseph C. Chapman,
Muneer Alshowkan,
Bing Qi,
Nicholas A. Peters
Abstract:
The quantum digital signature protocol offers a replacement for most aspects of public-key digital signatures ubiquitous in today's digital world. A major advantage of a quantum-digital-signatures protocol is that it can have information-theoretic security, whereas public-key cryptography cannot. Here we demonstrate and characterize hardware to implement entanglement-based quantum digital signatur…
▽ More
The quantum digital signature protocol offers a replacement for most aspects of public-key digital signatures ubiquitous in today's digital world. A major advantage of a quantum-digital-signatures protocol is that it can have information-theoretic security, whereas public-key cryptography cannot. Here we demonstrate and characterize hardware to implement entanglement-based quantum digital signatures over our campus network. Over 25 hours, we collect measurements on our campus network, where we measure sufficiently low quantum bit error rates (<5% in most cases) which in principle enable quantum digital signatures at over 50 km as shown through rigorous simulation accompanied by a noise model developed specifically for our implementation. These results show quantum digital signatures can be successfully employed over deployed fiber. Moreover, our reported method provides great flexibility in the number of users, but with reduced entanglement rate per user. Finally, while the current implementation of our entanglement-based approach has a low signature rate, feasible upgrades would significantly increase the signature rate.
△ Less
Submitted 22 January, 2024; v1 submitted 30 October, 2023;
originally announced October 2023.
-
Continuous-variable quantum key distribution field-test with true local oscillator
Authors:
Brian P. Williams,
Bing Qi,
Muneer Alshowkan,
Philip G. Evans,
Nicholas A. Peters
Abstract:
Continuous-variable quantum key distribution (CV-QKD) using a true local (located at the receiver) oscillator (LO) has been proposed to remove any possibility of side-channel attacks associated with transmission of the LO as well as reduce the cross-pulse contamination. Here we report an implementation of true LO CV-QKD using "off-the-shelf" components and conduct QKD experiments using the fiber o…
▽ More
Continuous-variable quantum key distribution (CV-QKD) using a true local (located at the receiver) oscillator (LO) has been proposed to remove any possibility of side-channel attacks associated with transmission of the LO as well as reduce the cross-pulse contamination. Here we report an implementation of true LO CV-QKD using "off-the-shelf" components and conduct QKD experiments using the fiber optical network at Oak Ridge National Laboratory. A phase reference and quantum signal are time multiplexed and then wavelength division multiplexed with the classical communications which "coexist" with each other on a single optical network fiber. This is the first demonstration of CV-QKD with a receiver-based true LO over a deployed fiber network, a crucial step for its application in real-world situations.
△ Less
Submitted 14 December, 2023; v1 submitted 7 September, 2023;
originally announced September 2023.
-
Realization of a crosstalk-avoided quantum network node with dual-type qubits by the same ion species
Authors:
L. Feng,
Y. -Y Huang,
Y. -K. Wu,
W. -X. Guo,
J. -Y. Ma,
H. -X. Yang,
L. Zhang,
Y. Wang,
C. -X. Huang,
C. Zhang,
L. Yao,
B. -X. Qi,
Y. -F. Pu,
Z. -C. Zhou,
L. -M. Duan
Abstract:
Generating ion-photon entanglement is a crucial step for scalable trapped-ion quantum networks. To avoid the crosstalk on memory qubits carrying quantum information, it is common to use a different ion species for ion-photon entanglement generation such that the scattered photons are far off-resonant for the memory qubits. However, such a dual-species scheme requires elaborate control of the porti…
▽ More
Generating ion-photon entanglement is a crucial step for scalable trapped-ion quantum networks. To avoid the crosstalk on memory qubits carrying quantum information, it is common to use a different ion species for ion-photon entanglement generation such that the scattered photons are far off-resonant for the memory qubits. However, such a dual-species scheme requires elaborate control of the portion and the location of different ion species, and can be subject to inefficient sympathetic cooling. Here we demonstrate a trapped-ion quantum network node in the dual-type qubit scheme where two types of qubits are encoded in the $S$ and $F$ hyperfine structure levels of ${}^{171}\mathrm{Yb}^+$ ions. We generate ion photon entanglement for the $S$-qubit in a typical timescale of hundreds of milliseconds, and verify its small crosstalk on a nearby $F$-qubit with coherence time above seconds. Our work demonstrates an enabling function of the dual-type qubit scheme for scalable quantum networks.
△ Less
Submitted 2 January, 2024; v1 submitted 25 June, 2023;
originally announced June 2023.
-
Exponential sensitivity revival of noisy non-Hermitian quantum sensing with two-photon drives
Authors:
Liying Bao,
Bo Qi,
Franco Nori,
Daoyi Dong
Abstract:
Unique properties of multimode non-Hermitian lattice dynamics can be utilized to construct exponentially sensitive sensors. However, the impact of noise remains unclear, which may severely degrade their sensitivity. We analytically characterize and highlight the impact of loss and gain on the sensitivity revival and stability of non-Hermitian sensors. Defying the general belief that the superiorit…
▽ More
Unique properties of multimode non-Hermitian lattice dynamics can be utilized to construct exponentially sensitive sensors. However, the impact of noise remains unclear, which may severely degrade their sensitivity. We analytically characterize and highlight the impact of loss and gain on the sensitivity revival and stability of non-Hermitian sensors. Defying the general belief that the superiority of quantum sensing will vanish in the presence of loss, we find that by proactively tuning the loss, the exponential sensitivity can be surprisingly regained when the sensing dynamics is stable. Furthermore, we prove that gain is crucial to fully revive the ideally exponential sensitivity and to ensure the stability of non-Hermitian sensing by making a balanced loss and gain. Our paper opens a way to significantly enhance the sensitivity by proactively tuning the loss and gain, which may promote future quantum sensing and quantum engineering.
△ Less
Submitted 28 May, 2024; v1 submitted 29 March, 2023;
originally announced March 2023.
-
Probing Complex-energy Topology via Non-Hermitian Absorption Spectroscopy in a Trapped Ion Simulator
Authors:
Mingming Cao,
Kai Li,
Wending Zhao,
Weixuan Guo,
Bingxiag Qi,
Xiuying Chang,
Zichao Zhou,
Yong Xu,
Luming Duan
Abstract:
Non-Hermitian systems generically have complex energies, which may host topological structures, such as links or knots. While there has been great progress in experimentally engineering non-Hermitian models in quantum simulators, it remains a significant challenge to experimentally probe complex energies in these systems, thereby making it difficult to directly diagnose complex-energy topology. He…
▽ More
Non-Hermitian systems generically have complex energies, which may host topological structures, such as links or knots. While there has been great progress in experimentally engineering non-Hermitian models in quantum simulators, it remains a significant challenge to experimentally probe complex energies in these systems, thereby making it difficult to directly diagnose complex-energy topology. Here, we experimentally realize a two-band non-Hermitian model with a single trapped ion whose complex eigenenergies exhibit the unlink, unknot or Hopf link topological structures. Based on non-Hermitian absorption spectroscopy, we couple one system level to an auxiliary level through a laser beam and then experimentally measure the population of the ion on the auxiliary level after a long period of time. Complex eigenenergies are then extracted, illustrating the unlink, unknot or Hopf link topological structure. Our work demonstrates that complex energies can be experimentally measured in quantum simulators via non-Hermitian absorption spectroscopy, thereby opening the door for exploring various complex-energy properties in non-Hermitian quantum systems, such as trapped ions, cold atoms, superconducting circuits or solid-state spin systems.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
Quantum key distribution in a packet-switched network
Authors:
Reem Mandil,
Stephen DiAdamo,
Bing Qi,
Alireza Shabani
Abstract:
Packet switching revolutionized the Internet by allowing the efficient use of network resources for data transmission. In a previous work, we introduced packet switching in quantum networks as a path to the Quantum Internet and presented a proof-of-concept for its application to quantum key distribution (QKD). In this paper, we outline a three-step approach for key rate optimization in a packet-sw…
▽ More
Packet switching revolutionized the Internet by allowing the efficient use of network resources for data transmission. In a previous work, we introduced packet switching in quantum networks as a path to the Quantum Internet and presented a proof-of-concept for its application to quantum key distribution (QKD). In this paper, we outline a three-step approach for key rate optimization in a packet-switched network. Our simulated results show that practical key rates may be achieved in a sixteen-user network with no optical storage capacity. Under certain network conditions, we may improve the key rate by using an ultra-low-loss fiber delay line to store packets during network delays. We also find that implementing cut-off storage times in a strategy analogous to real-time selection in free-space QKD can significantly enhance performance. Our work demonstrates that packet switching is imminently suitable as a platform for QKD, an important step towards develo** large-scale and integrated quantum networks.
△ Less
Submitted 27 February, 2023;
originally announced February 2023.
-
Trainability Enhancement of Parameterized Quantum Circuits via Reduced-Domain Parameter Initialization
Authors:
Yabo Wang,
Bo Qi,
Chris Ferrie,
Daoyi Dong
Abstract:
Parameterized quantum circuits (PQCs) have been widely used as a machine learning model to explore the potential of achieving quantum advantages for various tasks. However, the training of PQCs is notoriously challenging owing to the phenomenon of plateaus and/or the existence of (exponentially) many spurious local minima. In this work, we propose an efficient parameter initialization strategy wit…
▽ More
Parameterized quantum circuits (PQCs) have been widely used as a machine learning model to explore the potential of achieving quantum advantages for various tasks. However, the training of PQCs is notoriously challenging owing to the phenomenon of plateaus and/or the existence of (exponentially) many spurious local minima. In this work, we propose an efficient parameter initialization strategy with theoretical guarantees. We prove that if the initial domain of each parameter is reduced inversely proportional to the square root of circuit depth, then the magnitude of the cost gradient decays at most polynomially as a function of the depth. Our theoretical results are verified by numerical simulations of variational quantum eigensolver tasks. Moreover, we demonstrate that the reduced-domain initialization strategy can protect specific quantum neural networks from exponentially many spurious local minima. Our results highlight the significance of an appropriate parameter initialization strategy and can be used to enhance the trainability of PQCs in variational quantum algorithms.
△ Less
Submitted 1 March, 2023; v1 submitted 14 February, 2023;
originally announced February 2023.
-
Experimental realization of a 218-ion multi-qubit quantum memory
Authors:
R. Yao,
W. -Q. Lian,
Y. -K. Wu,
G. -X. Wang,
B. -W. Li,
Q. -X. Mei,
B. -X. Qi,
L. Yao,
Z. -C. Zhou,
L. He,
L. -M. Duan
Abstract:
Storage lifetime and capacity are two important factors to characterize the performance of a quantum memory. Here we report the stable trap** of above 200 ions in a cryogenic setup, and demonstrate the combination of the multi-qubit capacity and long storage lifetime by measuring the coherence time of randomly chosen ions to be on the order of hundreds of milliseconds. We apply composite microwa…
▽ More
Storage lifetime and capacity are two important factors to characterize the performance of a quantum memory. Here we report the stable trap** of above 200 ions in a cryogenic setup, and demonstrate the combination of the multi-qubit capacity and long storage lifetime by measuring the coherence time of randomly chosen ions to be on the order of hundreds of milliseconds. We apply composite microwave pulses to manipulate qubit states globally for efficient characterization of different storage units simultaneously, and we compare the performance of the quantum memory with and without the sympathetic cooling laser, thus unambiguously show the necessity of sympathetic cooling for the long-time storage of multiple ionic qubits.
△ Less
Submitted 30 September, 2022;
originally announced September 2022.
-
Probing critical behavior of long-range transverse-field Ising model through quantum Kibble-Zurek mechanism
Authors:
B. -W. Li,
Y. -K. Wu,
Q. -X. Mei,
R. Yao,
W. -Q. Lian,
M. -L. Cai,
Y. Wang,
B. -X. Qi,
L. Yao,
L. He,
Z. -C. Zhou,
L. -M. Duan
Abstract:
The trapped ion quantum simulator has demonstrated qualitative properties of different physical models for up to tens of ions. In particular, a linear ion chain naturally hosts long-range Ising interactions under the laser driving, which has been used for various phenomena such as quantum phase transition, localization, thermalization and information propagation. For near-term practical usage, a c…
▽ More
The trapped ion quantum simulator has demonstrated qualitative properties of different physical models for up to tens of ions. In particular, a linear ion chain naturally hosts long-range Ising interactions under the laser driving, which has been used for various phenomena such as quantum phase transition, localization, thermalization and information propagation. For near-term practical usage, a central task is to find more quantitative applications of the noisy quantum simulators that are robust to small errors in the parameters. Here we report the quantum simulation of a long-range transverse-field Ising model using up to 61 ions and probe the critical behavior of its quantum phase transition through the Kibble-Zurek mechanism. By calibrating and verifying the coupling coefficients, we realize the same model for increasing ion numbers, so as to extract a critical exponent free of the finite size effect. For ferromagnetic interaction, our experimental result agrees well with the previous numerical predictions. As for the anti-ferromagnetic case, signals are too weak to fit a critical exponent due to the frustration in the interaction, but still consistent with the theory.
△ Less
Submitted 30 December, 2022; v1 submitted 5 August, 2022;
originally announced August 2022.
-
Fully-Passive Quantum Key Distribution
Authors:
Wenyuan Wang,
Rong Wang,
Victor Zapatero,
Li Qian,
Bing Qi,
Marcos Curty,
Hoi-Kwong Lo
Abstract:
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed. Nonetheless, passive decoy-state generation and passive encoding have never been simultaneously implemented with linear optical elements before, whic…
▽ More
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed. Nonetheless, passive decoy-state generation and passive encoding have never been simultaneously implemented with linear optical elements before, which greatly limits the practicality of such passive QKD schemes. In this work, we overcome this limitation and propose a fully-passive QKD source with linear optics that eliminates active modulators for both decoy-state choice and encoding. This allows for highly practical QKD systems that avoid side-channels from the source modulators. The passive source we propose (combined with the decoy-state analysis) can create any arbitrary state on a qubit system and is protocol-independent. That is, it can be used for various protocols such as BB84, reference-frame-independent QKD, or the six-state protocol. It can also in principle be combined with e.g. measurement-device-independent QKD, to build a system without side-channels in either detectors or modulators.
△ Less
Submitted 12 July, 2022;
originally announced July 2022.
-
Packet Switching in Quantum Networks: A Path to Quantum Internet
Authors:
Stephen DiAdamo,
Bing Qi,
Glen Miller,
Ramana Kompella,
Alireza Shabani
Abstract:
Large-scale quantum networks with thousands of nodes require scalable network protocols and physical hardware to realize. In this work, we introduce packet switching as a new paradigm for quantum data transmission in both future and near-term quantum networks. We propose a classical-quantum data frame structure and explore methods of frame generation and processing. Further, we present conceptual…
▽ More
Large-scale quantum networks with thousands of nodes require scalable network protocols and physical hardware to realize. In this work, we introduce packet switching as a new paradigm for quantum data transmission in both future and near-term quantum networks. We propose a classical-quantum data frame structure and explore methods of frame generation and processing. Further, we present conceptual designs for a quantum reconfigurable optical add-drop multiplexer to realize the proposed transmission scheme. Packet switching allows for a universal design for a next generation Internet where classical and quantum data share the same network protocols and infrastructure. In this new quantum networking paradigm, entanglement distribution, as with quantum key distribution, is an application built on top of the quantum network rather than as a network designed especially for those purposes. For analysis of the network model, we simulate the feasibility of quantum packet switching for some preliminary models of quantum key and entanglement distribution. Finally, we discuss how our model can be integrated with other network models toward a realization of a quantum Internet.
△ Less
Submitted 16 May, 2022;
originally announced May 2022.
-
Dynamic attenuation scheme in measurement-device-independent quantum key distribution over turbulent channels
Authors:
Brian J. Rollick,
George Siopsis,
Bing Qi
Abstract:
Measurement-device-independent quantum key distribution (MDI QKD) offers great security in practice because it removes all detector side channels. However, conducting MDI QKD over free-space channels is challenging. One of the largest culprits is the mismatched transmittance of the two independent turbulent channels causing a reduced Hong-Ou-Mandel visibility and thus a lower secret key rate. Here…
▽ More
Measurement-device-independent quantum key distribution (MDI QKD) offers great security in practice because it removes all detector side channels. However, conducting MDI QKD over free-space channels is challenging. One of the largest culprits is the mismatched transmittance of the two independent turbulent channels causing a reduced Hong-Ou-Mandel visibility and thus a lower secret key rate. Here we introduce a dynamic attenuation scheme, where the transmittance of each of the two channels is monitored in real time by transmitting bright light pulses from each users to the measurement device. Based on the measured channel transmittance, a suitable amount of attenuation is introduced to the low-loss channel at the measurement device. Our simulation results show a significant improvement of QKD performance, especially when using short raw keys.
△ Less
Submitted 17 April, 2022;
originally announced April 2022.
-
Bayesian homodyne and heterodyne tomography
Authors:
Joseph C. Chapman,
Joseph M. Lukens,
Bing Qi,
Raphael C. Pooser,
Nicholas A. Peters
Abstract:
Continuous-variable (CV) photonic states are of increasing interest in quantum information science, bolstered by features such as deterministic resource state generation and error correction via bosonic codes. Data-efficient characterization methods will prove critical in the fine-tuning and maturation of such CV quantum technology. Although Bayesian inference offers appealing properties -- includ…
▽ More
Continuous-variable (CV) photonic states are of increasing interest in quantum information science, bolstered by features such as deterministic resource state generation and error correction via bosonic codes. Data-efficient characterization methods will prove critical in the fine-tuning and maturation of such CV quantum technology. Although Bayesian inference offers appealing properties -- including uncertainty quantification and optimality in mean-squared error -- Bayesian methods have yet to be demonstrated for the tomography of arbitrary CV states. Here we introduce a complete Bayesian quantum state tomography workflow capable of inferring generic CV states measured by homodyne or heterodyne detection, with no assumption of Gaussianity. As examples, we demonstrate our approach on experimental coherent, thermal, and cat state data, obtaining excellent agreement between our Bayesian estimates and theoretical predictions. Our approach lays the groundwork for Bayesian estimation of highly complex CV quantum states in emerging quantum photonic platforms, such as quantum communications networks and sensors.
△ Less
Submitted 18 November, 2022; v1 submitted 7 February, 2022;
originally announced February 2022.
-
Stabilizing Preparation of Quantum Gaussian States via Continuous Measurement
Authors:
Liying Bao,
Bo Qi,
Daoyi Dong
Abstract:
This paper provides a stabilizing preparation method for quantum Gaussian states by utilizing continuous measurement. The stochastic evolution of the open quantum system is described in terms of the quantum stochastic master equation. We present necessary and sufficient conditions for the system to have a unique stabilizing steady Gaussian state. The conditions are much weaker than those existing…
▽ More
This paper provides a stabilizing preparation method for quantum Gaussian states by utilizing continuous measurement. The stochastic evolution of the open quantum system is described in terms of the quantum stochastic master equation. We present necessary and sufficient conditions for the system to have a unique stabilizing steady Gaussian state. The conditions are much weaker than those existing results presented in the approach of preparing Gaussian states through environment engineering. Parametric conditions of how to prepare an arbitrary pure Gaussian state are provided. This approach provides more degrees of freedom to choose the system Hamiltonian and the system-environment coupling operators, as compared with the case where dissipation-induced approach is employed. The stabilizing conditions for the case of imperfect measurement efficiency are also presented. These results may benefit practical experimental implementation in preparing quantum Gaussian states.
△ Less
Submitted 26 September, 2021;
originally announced September 2021.
-
Exponentially-enhanced Quantum Non-Hermitian Sensing via Optimized Coherent Drive
Authors:
Liying Bao,
Bo Qi,
Daoyi Dong
Abstract:
Distinct non-Hermitian dynamics has demonstrated its advantages in improving measurement precision over traditional sensing protocols. Multi-mode non-Hermitian lattice dynamics can provide exponentially-enhanced quantum sensing where the quantum Fisher information (QFI) per photon increases exponentially with the lattice size. However, somewhat surprisingly, it was also shown that the quintessenti…
▽ More
Distinct non-Hermitian dynamics has demonstrated its advantages in improving measurement precision over traditional sensing protocols. Multi-mode non-Hermitian lattice dynamics can provide exponentially-enhanced quantum sensing where the quantum Fisher information (QFI) per photon increases exponentially with the lattice size. However, somewhat surprisingly, it was also shown that the quintessential non-Hermitian skin effect does not provide any true advantage. In this paper, we demonstrate the importance of optimizing the phase of the coherent drive, and the position of the injection and detection in multi-mode non-Hermitian quantum sensing. The QFI per photon can be exponentially-enhanced or exponentially-reduced depending on parameters of the drive and detection. Specifically, it is demonstrated that for large amplification by choosing appropriate coherent drive parameters, the non-Hermitian skin effect can provide exponentially-enhanced quantum sensing. Moreover, in the regime beyond linear response, skin-effect can also provide a dramatic advantage as compared to the local perturbation, and the proposed protocol is robust in tuning the amplification factor.
△ Less
Submitted 29 December, 2021; v1 submitted 9 September, 2021;
originally announced September 2021.
-
Fundamental limits for reciprocal and non-reciprocal non-Hermitian quantum sensing
Authors:
Liying Bao,
Bo Qi,
Daoyi Dong,
Franco Nori
Abstract:
Non-Hermitian dynamics has been widely studied to enhance the precision of quantum sensing; and non-reciprocity can be a powerful resource for non-Hermitian quantum sensing, as non-reciprocity allows to arbitrarily exceed the fundamental bound on the measurement rate of any reciprocal sensors. Here we establish fundamental limits on signal-to-noise ratio for reciprocal and non-reciprocal non-Hermi…
▽ More
Non-Hermitian dynamics has been widely studied to enhance the precision of quantum sensing; and non-reciprocity can be a powerful resource for non-Hermitian quantum sensing, as non-reciprocity allows to arbitrarily exceed the fundamental bound on the measurement rate of any reciprocal sensors. Here we establish fundamental limits on signal-to-noise ratio for reciprocal and non-reciprocal non-Hermitian quantum sensing. In particular, for two-mode linear systems with two coherent drives, an approximately attainable uniform bound on the best possible measurement rate per photon is derived for both reciprocal and non-reciprocal sensors. This bound is only related to the coupling coefficients and, in principle, can be made arbitrarily large. Our results thus demonstrate that a conventional reciprocal sensor with two drives can simulate any non-reciprocal sensor. This work also demonstrates a clear signature on how the excitation signals affect the signal-to-noise ratio in non-Hermitian quantum sensing.
△ Less
Submitted 21 April, 2021;
originally announced April 2021.
-
Experimental decoy state BB84 quantum key distribution through a turbulent channel
Authors:
Eleftherios Moschandreou,
Brian J. Rollick,
Bing Qi,
George Siopsis
Abstract:
In free-space Quantum Key Distribution in turbulent conditions, scattering and beam wandering cause intensity fluctuations which increase the detected signal-to-noise ratio. This effect can be mitigated by rejecting received bits when the channel's transmittance is below a threshold. Thus, the overall error rate is reduced and the secure key rate increases despite the deletion of bits. In Decoy St…
▽ More
In free-space Quantum Key Distribution in turbulent conditions, scattering and beam wandering cause intensity fluctuations which increase the detected signal-to-noise ratio. This effect can be mitigated by rejecting received bits when the channel's transmittance is below a threshold. Thus, the overall error rate is reduced and the secure key rate increases despite the deletion of bits. In Decoy State BB84 QKD, several methods to find the ideal threshold have already been proposed. One promising method is the Prefixed-Threshold Real-time Selection (P-RTS) where a cutoff can be chosen prior to data collection and independently of the intensity distribution. In this work we perform finite-size Decoy State BB84 QKD in a laboratory setting where we simulate the atmospheric turbulence using an acousto-optical modulator. We show that P-RTS can yield considerably higher secure key rates, especially at higher losses. In addition, we verify that P-RTS gives a robust cutoff even when the predicted transmittance does not match the actual transmittance.
△ Less
Submitted 19 March, 2021; v1 submitted 8 December, 2020;
originally announced December 2020.
-
The BB84 quantum key distribution using conjugate homodyne detection
Authors:
Bing Qi
Abstract:
Optical homodyne detection has been widely used in continuous-variable (CV) quantum information processing for measuring field quadrature values. In this paper we explore the possibility of operating a conjugate homodyne detection system in "photon counting" mode to implement discrete-variable (DV) quantum key distribution (QKD) protocols. A conjugate homodyne detection system, which consists of a…
▽ More
Optical homodyne detection has been widely used in continuous-variable (CV) quantum information processing for measuring field quadrature values. In this paper we explore the possibility of operating a conjugate homodyne detection system in "photon counting" mode to implement discrete-variable (DV) quantum key distribution (QKD) protocols. A conjugate homodyne detection system, which consists of a beam splitter followed by two optical homodyne detectors, can simultaneously measure a pair of conjugate quadratures X and P of the incoming quantum state. In classical electrodynamics, X^2 + P^2 is proportional to the energy (the photon number) of the input light. In quantum optics, X and P do not commute and thus the above photon-number measurement is intrinsically noisy. This suggests that a blind application of the standard security proof could result pessimistic QKD performance. We overcome this obstacle by taking advantage of two special features of the proposed detection scheme. First, the fundamental detection noise associated with vacuum fluctuation cannot be manipulated by an external adversary. Second, the ability to reconstruct the photon number statistics at the receiver's end can place additional constraints on possible attacks from the adversary. As an example, we study the security of the BB84 QKD using conjugate homodyne detection and evaluate its performance through numerical simulations. This study may open the door to a new family of QKD protocols, in complementary to the well-established DV-QKD based on single photon detection and CV-QKD based on coherent detection.
△ Less
Submitted 10 January, 2021; v1 submitted 10 August, 2020;
originally announced August 2020.
-
Experimental passive state preparation for continuous variable quantum communications
Authors:
Bing Qi,
Hyrum Gunther,
Philip G. Evans,
Brian P. Williams,
Ryan M. Camacho,
Nicholas A. Peters
Abstract:
In the Gaussian-modulated coherent state quantum key distribution (QKD) protocol, the sender first generates Gaussian distributed random numbers and then encodes them on weak laser pulses actively by performing amplitude and phase modulations. Recently, an equivalent passive QKD scheme was proposed by exploring the intrinsic field fluctuations of a thermal source [B. Qi, P. G. Evans, and W. P. Gri…
▽ More
In the Gaussian-modulated coherent state quantum key distribution (QKD) protocol, the sender first generates Gaussian distributed random numbers and then encodes them on weak laser pulses actively by performing amplitude and phase modulations. Recently, an equivalent passive QKD scheme was proposed by exploring the intrinsic field fluctuations of a thermal source [B. Qi, P. G. Evans, and W. P. Grice, Phys. Rev. A 97, 012317 (2018)]. This passive QKD scheme is especially appealing for chip-scale implementation since no active modulations are required. In this paper, we conduct an experimental study of the passively encoded QKD scheme using an off-the-shelf amplified spontaneous emission source operated in continuous-wave mode. Our results show that the excess noise introduced by the passive state preparation scheme can be effectively suppressed by applying optical attenuation and secure key could be generated over metro-area distances.
△ Less
Submitted 15 April, 2020; v1 submitted 17 January, 2020;
originally announced January 2020.
-
Quantum secret sharing using weak coherent states
Authors:
Warren P. Grice,
Bing Qi
Abstract:
Secret sharing allows a trusted party (the dealer) to distribute a secret to a group of players, who can only access the secret cooperatively. Quantum secret sharing (QSS) protocols could provide unconditional security based on fundamental laws in physics. While the general security proof has been established recently in an entanglement-based QSS protocol, the tolerable channel loss is unfortunate…
▽ More
Secret sharing allows a trusted party (the dealer) to distribute a secret to a group of players, who can only access the secret cooperatively. Quantum secret sharing (QSS) protocols could provide unconditional security based on fundamental laws in physics. While the general security proof has been established recently in an entanglement-based QSS protocol, the tolerable channel loss is unfortunately rather small. Here we propose a continuous variable QSS protocol using conventional laser sources and homodyne detectors. In this protocol, a Gaussian-modulated coherent state (GMCS) prepared by one player passes through the secure stations of the other players sequentially, and each of the other players injects a locally prepared, independent GMCS into the circulating optical mode. Finally, the dealer measures both the amplitude and phase quadratures of the receiving optical mode using double homodyne detectors. Collectively, the players can use their encoded random numbers to estimate the measurement results of the dealer and further generate a shared key. Unlike the existing single photon based sequential QSS protocol, our scheme is intrinsically immune to Trojan horse attacks. Furthermore, the additional loss introduced by each player's system can be extremely small, which makes the protocol scalable to a large number of players. We prove the unconditional security of the proposed protocol against both eavesdroppers and dishonest players in the presence of high channel loss, and discuss various practical issues.
△ Less
Submitted 28 August, 2019; v1 submitted 25 June, 2019;
originally announced June 2019.
-
Quantum secret sharing with polarization-entangled photon pairs
Authors:
Brian P. Williams,
Joseph M. Lukens,
Nicholas A. Peters,
Bing Qi,
Warren P. Grice
Abstract:
We describe and experimentally demonstrate a three-party quantum secret sharing protocol using polarization-entangled photon pairs. The source itself serves as an active participant and can switch between the required photon states by modulating the pump beam only, thereby making the protocol less susceptible to loss and amenable to fast switching. Compared to three-photon protocols, the practical…
▽ More
We describe and experimentally demonstrate a three-party quantum secret sharing protocol using polarization-entangled photon pairs. The source itself serves as an active participant and can switch between the required photon states by modulating the pump beam only, thereby making the protocol less susceptible to loss and amenable to fast switching. Compared to three-photon protocols, the practical efficiency is dramatically improved as there is no need to generate, transmit, or detect a third photon.
△ Less
Submitted 24 May, 2019;
originally announced May 2019.
-
Scalable high-rate, high-dimensional quantum key distribution
Authors:
Nurul T. Islam,
Charles Ci Wen Lim,
Clinton Cahall,
Bing Qi,
Jungsang Kim,
Daniel J. Gauthier
Abstract:
We propose and experimentally demonstrate a new scheme for measuring high-dimensional phase states using a two-photon interference technique, which we refer to as quantum-controlled measurement. Using this scheme, we implement a $d$-dimensional time-phase quantum key distribution (QKD) system and achieve secret key rates of 5.26 and 8.65 Mbps using $d = 2$ and $d = 8$ quantum states, respectively,…
▽ More
We propose and experimentally demonstrate a new scheme for measuring high-dimensional phase states using a two-photon interference technique, which we refer to as quantum-controlled measurement. Using this scheme, we implement a $d$-dimensional time-phase quantum key distribution (QKD) system and achieve secret key rates of 5.26 and 8.65 Mbps using $d = 2$ and $d = 8$ quantum states, respectively, for a 4~dB channel loss, illustrating that high-dimensional time-phase QKD protocols are advantageous for low-loss quantum channels. This work paves the way for practical high-dimensional QKD protocols for metropolitan-scale systems. Furthermore, our results apply equally well for other high-dimensional protocols, such as those using the spatial degree-of-freedom with orbital angular momentum states being one example.
△ Less
Submitted 23 April, 2020; v1 submitted 2 February, 2019;
originally announced February 2019.
-
Robust Learning Control Design for Quantum Unitary Transformations
Authors:
Chengzhi Wu,
Bo Qi,
Chunlin Chen,
Daoyi Dong
Abstract:
Robust control design for quantum unitary transformations has been recognized as a fundamental and challenging task in the development of quantum information processing due to unavoidable decoherence or operational errors in the experimental implementation of quantum operations. In this paper, we extend the systematic methodology of sampling-based learning control (SLC) approach with a gradient fl…
▽ More
Robust control design for quantum unitary transformations has been recognized as a fundamental and challenging task in the development of quantum information processing due to unavoidable decoherence or operational errors in the experimental implementation of quantum operations. In this paper, we extend the systematic methodology of sampling-based learning control (SLC) approach with a gradient flow algorithm for the design of robust quantum unitary transformations. The SLC approach first uses a "training" process to find an optimal control strategy robust against certain ranges of uncertainties. Then a number of randomly selected samples are tested and the performance is evaluated according to their average fidelity. The approach is applied to three typical examples of robust quantum transformation problems including robust quantum transformations in a three-level quantum system, in a superconducting quantum circuit, and in a spin chain system. Numerical results demonstrate the effectiveness of the SLC approach and show its potential applications in various implementation of quantum unitary transformations.
△ Less
Submitted 6 June, 2018;
originally announced June 2018.
-
Experimental study of Hong-Ou-Mandel interference using independent phase randomized weak coherent states
Authors:
Eleftherios Moschandreou,
Jeffrey I. Garcia,
Brian J. Rollick,
Bing Qi,
Raphael Pooser,
George Siopsis
Abstract:
Hong-Ou-Mandel interferometers are valuable tools in many Quantum Information and Quantum Optics applications that require photon indistinguishability. The theoretical limit for the Hong-Ou-Mandel visibility is 0.5 for indistinguishable weak coherent photon states, but several device imperfections may hinder achieving this value experimentally. In this work, we examine the dependence of the interf…
▽ More
Hong-Ou-Mandel interferometers are valuable tools in many Quantum Information and Quantum Optics applications that require photon indistinguishability. The theoretical limit for the Hong-Ou-Mandel visibility is 0.5 for indistinguishable weak coherent photon states, but several device imperfections may hinder achieving this value experimentally. In this work, we examine the dependence of the interference visibility on various factors, including (i) detector side imperfections due to after-pulses, (ii) mismatches in the intensities and states of polarization of the input signals, and (iii) the overall intensity of the input signals. We model all imperfections and show that theoretical modeling is in good agreement with experimental results.
△ Less
Submitted 21 November, 2018; v1 submitted 6 April, 2018;
originally announced April 2018.
-
Linear localization of zero modes in weakly coupled non-Hermitian reservoirs
Authors:
Bingkun Qi,
Li Ge
Abstract:
Topological and symmetry-protected non-Hermitian zero modes have attracted considerable interest in the past few years. Here we reveal that they can exhibit an unusual behavior when transitioning between the extended and localized regimes: When weakly coupled to a non-Hermitian reservoir, such a zero mode displays a linearly decreasing amplitude as a function of space, which is not caused by an EP…
▽ More
Topological and symmetry-protected non-Hermitian zero modes have attracted considerable interest in the past few years. Here we reveal that they can exhibit an unusual behavior when transitioning between the extended and localized regimes: When weakly coupled to a non-Hermitian reservoir, such a zero mode displays a linearly decreasing amplitude as a function of space, which is not caused by an EP of a Hamiltonian, either of the entire system or the reservoir itself. Instead, we attribute it to the non-Bloch solution of a linear homogeneous recurrence relation, together with the underlying non-Hermitian particle-hole symmetry and the zeroness of its energy.
△ Less
Submitted 15 November, 2023; v1 submitted 2 April, 2018;
originally announced April 2018.
-
Passive state preparation in the Gaussian-modulated coherent states quantum key distribution
Authors:
Bing Qi,
Philip G. Evans,
Warren Grice
Abstract:
In the Gaussian-modulated coherent states (GMCS) quantum key distribution (QKD) protocol, Alice prepares quantum states \emph{actively}: for each transmission, Alice generates a pair of Gaussian-distributed random numbers, encodes them on a weak coherent pulse using optical amplitude and phase modulators, and then transmits the Gaussian-modulated weak coherent pulse to Bob. Here we propose a \emph…
▽ More
In the Gaussian-modulated coherent states (GMCS) quantum key distribution (QKD) protocol, Alice prepares quantum states \emph{actively}: for each transmission, Alice generates a pair of Gaussian-distributed random numbers, encodes them on a weak coherent pulse using optical amplitude and phase modulators, and then transmits the Gaussian-modulated weak coherent pulse to Bob. Here we propose a \emph{passive} state preparation scheme using a thermal source. In our scheme, Alice splits the output of a thermal source into two spatial modes using a beam splitter. She measures one mode locally using conjugate optical homodyne detectors, and transmits the other mode to Bob after applying appropriate optical attenuation. Under normal conditions, Alice's measurement results are correlated to Bob's, and they can work out a secure key, as in the active state preparation scheme. Given the initial thermal state generated by the source is strong enough, this scheme can tolerate high detector noise at Alice's side. Furthermore, the output of the source does not need to be single mode, since an optical homodyne detector can selectively measure a single mode determined by the local oscillator. Preliminary experimental results suggest that the proposed scheme could be implemented using an off-the-shelf amplified spontaneous emission source.
△ Less
Submitted 21 December, 2017; v1 submitted 22 November, 2017;
originally announced November 2017.
-
Noise analysis of simultaneous quantum key distribution and classical communication scheme using a true local oscillator
Authors:
Bing Qi,
Charles Ci Wen Lim
Abstract:
Recently, we proposed a simultaneous quantum and classical communication (SQCC) protocol, where random numbers for quantum key distribution (QKD) and bits for classical communication are encoded on the \emph{same} weak coherent pulse, and decoded by the \emph{same} coherent receiver. Such a scheme could be appealing in practice since a single coherent communication system can be used for multiple…
▽ More
Recently, we proposed a simultaneous quantum and classical communication (SQCC) protocol, where random numbers for quantum key distribution (QKD) and bits for classical communication are encoded on the \emph{same} weak coherent pulse, and decoded by the \emph{same} coherent receiver. Such a scheme could be appealing in practice since a single coherent communication system can be used for multiple purposes. However, previous studies show that the SQCC protocol can only tolerate very small phase noise. This makes it incompatible with the coherent communication scheme using a true local oscillator (LO), which presents a relatively high phase noise due to the fact that the signal and the LO are generated from two independent lasers. In this paper, we improve the phase noise tolerance of the SQCC scheme using a true LO by adopting a refined noise model where phase noises originated from different sources are treated differently: on one hand, phase noise associated with the coherent receiver may be regarded as \emph{trusted} noise, since the detector can be calibrated locally and the photon statistics of the detected signals can be determined from the measurement results; on the other hand, phase noise due to the instability of fiber interferometers may be regarded as \emph{untrusted} noise, since its randomness (from the adversary's point to view) is hard to justify. Simulation results show the tolerable phase noise in this refined noise model is significantly higher than that in the previous study where all the phase noises are assumed to be untrusted. We conduct an experiment to show the required phase stability can be achieved in a coherent communication system using a true LO.
△ Less
Submitted 19 December, 2017; v1 submitted 29 August, 2017;
originally announced August 2017.
-
Quantum gate identification: error analysis, numerical results and optical experiment
Authors:
Yuanlong Wang,
Qi Yin,
Daoyi Dong,
Bo Qi,
Ian R. Petersen,
Zhibo Hou,
Hidehiro Yonezawa,
Guo-Yong Xiang
Abstract:
The identification of an unknown quantum gate is a significant issue in quantum technology. In this paper, we propose a quantum gate identification method within the framework of quantum process tomography. In this method, a series of pure states are inputted to the gate and then a fast state tomography on the output states is performed and the data are used to reconstruct the quantum gate. Our al…
▽ More
The identification of an unknown quantum gate is a significant issue in quantum technology. In this paper, we propose a quantum gate identification method within the framework of quantum process tomography. In this method, a series of pure states are inputted to the gate and then a fast state tomography on the output states is performed and the data are used to reconstruct the quantum gate. Our algorithm has computational complexity $O(d^3)$ with the system dimension $d$. The algorithm is compared with maximum likelihood estimation method for the running time, which shows the efficiency advantage of our method. An error upper bound is established for the identification algorithm and the robustness of the algorithm against the purity of input states is also tested. We perform quantum optical experiment on single-qubit Hadamard gate to verify the effectiveness of the identification algorithm.
△ Less
Submitted 19 July, 2017;
originally announced July 2017.
-
Characterizing photon number statistics using conjugate optical homodyne detection
Authors:
Bing Qi,
Pavel Lougovski,
Brian P. Williams
Abstract:
We study the problem of determining the photon number statistics of an unknown quantum state by simultaneously measuring conjugate quadratures with double homodyne detectors. Classically, the sum of the squared outputs of the two homodyne detectors is proportional to the intensity (thus the photon number) of the input light. Quantum mechanically, due to vacuum noise, the above photon number measur…
▽ More
We study the problem of determining the photon number statistics of an unknown quantum state by simultaneously measuring conjugate quadratures with double homodyne detectors. Classically, the sum of the squared outputs of the two homodyne detectors is proportional to the intensity (thus the photon number) of the input light. Quantum mechanically, due to vacuum noise, the above photon number measurement is intrinsically noisy. We quantify the information gain in a single-shot measurement and discuss potential applications of this technology in quantum key distribution. We also show that the photon number statistics can be recovered in repeated measurements on an ensemble of identical input states without scanning the phase of the input state or randomizing the phase of the local oscillator used in homodyne detection.
△ Less
Submitted 30 October, 2019; v1 submitted 8 February, 2017;
originally announced February 2017.
-
True randomness from an incoherent source
Authors:
Bing Qi
Abstract:
Quantum random number generators (QRNGs) harness the intrinsic randomness in measurement processes: the measurement outputs are truly random given the input state is a superposition of the eigenstates of the measurement operators. In the case of \emph{trusted} devices, true randomness could be generated from a mixed state $ρ$ so long as the system entangled with $ρ$ is well protected. We propose a…
▽ More
Quantum random number generators (QRNGs) harness the intrinsic randomness in measurement processes: the measurement outputs are truly random given the input state is a superposition of the eigenstates of the measurement operators. In the case of \emph{trusted} devices, true randomness could be generated from a mixed state $ρ$ so long as the system entangled with $ρ$ is well protected. We propose a random number generation scheme based on measuring the quadrature fluctuations of a single mode thermal state using an optical homodyne detector. By mixing the output of a broadband amplified spontaneous emission (ASE) source with a single mode local oscillator (LO) at a beam splitter and performing differential photo-detection, we can selectively detect the quadrature fluctuation of a single mode output of the ASE source, thanks to the filtering function of the LO. Experimentally, a quadrature variance about three orders of magnitude larger than the vacuum noise has been observed, suggesting this scheme can tolerate much higher detector noise in comparison with QRNGs based on measuring the vacuum noise. The high quality of this entropy source is evidenced by the small correlation coefficients of the acquired data. A Toeplitz hashing extractor is applied to generate unbiased random bits from the Gaussian distributed raw data, achieving an efficiency of 5.12 bits per sample. The output of the Toeplitz extractor successfully passes all the NIST statistical tests for random numbers.
△ Less
Submitted 1 November, 2017; v1 submitted 1 November, 2016;
originally announced November 2016.
-
A Quantum Hamiltonian Identification Algorithm: Computational Complexity and Error Analysis
Authors:
Yuanlong Wang,
Daoyi Dong,
Bo Qi,
Jun Zhang,
Ian R. Petersen,
Hidehiro Yonezawa
Abstract:
Quantum Hamiltonian identification is important for characterizing the dynamics of quantum systems, calibrating quantum devices and achieving precise quantum control. In this paper, an effective two-step optimization (TSO) quantum Hamiltonian identification algorithm is developed within the framework of quantum process tomography. In the identification method, different probe states are inputted i…
▽ More
Quantum Hamiltonian identification is important for characterizing the dynamics of quantum systems, calibrating quantum devices and achieving precise quantum control. In this paper, an effective two-step optimization (TSO) quantum Hamiltonian identification algorithm is developed within the framework of quantum process tomography. In the identification method, different probe states are inputted into quantum systems and the output states are estimated using the quantum state tomography protocol via linear regression estimation. The time-independent system Hamiltonian is reconstructed based on the experimental data for the output states. The Hamiltonian identification method has computational complexity O(d^6) where d is the dimension of the system Hamiltonian. An error upper bound O(d^3/N^(1/2))$ is also established, where N is the resource number for the tomography of each output state, and several numerical examples demonstrate the effectiveness of the proposed TSO Hamiltonian identification method.
△ Less
Submitted 27 October, 2016;
originally announced October 2016.
-
Loss-tolerant quantum secure positioning with weak laser sources
Authors:
Charles Ci Wen Lim,
Feihu Xu,
George Siopsis,
Eric Chitambar,
Philip G. Evans,
Bing Qi
Abstract:
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swap** QPV protocol (based on measu…
▽ More
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swap** QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. In this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.
△ Less
Submitted 27 July, 2016;
originally announced July 2016.
-
Learning robust control for generating universal quantum gates
Authors:
Daoyi Dong,
Chengzhi Wu,
Chunlin Chen,
Bo Qi,
Ian R. Petersen,
Franco Nori
Abstract:
Constructing a set of universal quantum gates is a fundamental task for quantum computation. The existence of noises, disturbances and fluctuations is unavoidable during the process of implementing quantum gates for most practical quantum systems. This paper employs a sampling-based learning method to find robust control pulses for generating a set of universal quantum gates. Numerical results sho…
▽ More
Constructing a set of universal quantum gates is a fundamental task for quantum computation. The existence of noises, disturbances and fluctuations is unavoidable during the process of implementing quantum gates for most practical quantum systems. This paper employs a sampling-based learning method to find robust control pulses for generating a set of universal quantum gates. Numerical results show that the learned robust control fields are insensitive to disturbances, uncertainties and fluctuations during the process of realizing universal quantum gates.
△ Less
Submitted 20 June, 2016;
originally announced June 2016.
-
Practical challenges in quantum key distribution
Authors:
Eleni Diamanti,
Hoi-Kwong Lo,
Bing Qi,
Zhiliang Yuan
Abstract:
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to addres…
▽ More
Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
△ Less
Submitted 19 June, 2016;
originally announced June 2016.
-
Simultaneous classical communication and quantum key distribution using continuous variable
Authors:
Bing Qi
Abstract:
Presently, classical optical communication systems employing strong laser pulses and quantum key distribution (QKD) systems working at single-photon levels are very different communication modalities. Dedicated devices are commonly required to implement QKD. In this paper, we propose a scheme which allows classical communication and QKD to be implemented simultaneously using the same communication…
▽ More
Presently, classical optical communication systems employing strong laser pulses and quantum key distribution (QKD) systems working at single-photon levels are very different communication modalities. Dedicated devices are commonly required to implement QKD. In this paper, we propose a scheme which allows classical communication and QKD to be implemented simultaneously using the same communication infrastructure. More specially, we propose a coherent communication scheme where both the bits for classical communication and the Gaussian distributed random numbers for QKD are encoded on the same weak coherent pulse, and decoded by the same coherent receiver. Simulation results based on practical system parameters show that both deterministic classical communication with a bit error rate of 10^{-9} and secure key distribution could be achieved over tens of kilometers single mode fibers. It is conceivable that in the future coherent optical communication network, QKD is operated in the background of classical communication at a minimal cost.
△ Less
Submitted 18 August, 2016; v1 submitted 8 June, 2016;
originally announced June 2016.
-
Full reconstruction of a 14-qubit state within four hours
Authors:
Zhibo Hou,
Han-Sen Zhong,
Ye Tian,
Daoyi Dong,
Bo Qi,
Li Li,
Yuanlong Wang,
Franco Nori,
Guo-Yong Xiang,
Chuan-Feng Li,
Guang-Can Guo
Abstract:
Full quantum state tomography (FQST) plays a unique role in the estimation of the state of a quantum system without \emph{a priori} knowledge or assumptions. Unfortunately, since FQST requires informationally (over)complete measurements, both the number of measurement bases and the computational complexity of data processing suffer an exponential growth with the size of the quantum system. A 14-qu…
▽ More
Full quantum state tomography (FQST) plays a unique role in the estimation of the state of a quantum system without \emph{a priori} knowledge or assumptions. Unfortunately, since FQST requires informationally (over)complete measurements, both the number of measurement bases and the computational complexity of data processing suffer an exponential growth with the size of the quantum system. A 14-qubit entangled state has already been experimentally prepared in an ion trap, and the data processing capability for FQST of a 14-qubit state seems to be far away from practical applications. In this paper, the computational capability of FQST is pushed forward to reconstruct a 14-qubit state with a run time of only 3.35 hours using the linear regression estimation (LRE) algorithm, even when informationally overcomplete Pauli measurements are employed. The computational complexity of the LRE algorithm is first reduced from $O(10^{19})$ to $O(10^{15})$ for a 14-qubit state, by drop** all the zero elements, and its computational efficiency is further sped up by fully exploiting the parallelism of the LRE algorithm with parallel Graphic Processing Unit (GPU) programming. Our result can play an important role in quantum information technologies with large quantum systems.
△ Less
Submitted 21 September, 2016; v1 submitted 27 February, 2016;
originally announced February 2016.
-
Recursively Adaptive Quantum State Tomography: Theory and Two-qubit Experiment
Authors:
Bo Qi,
Zhibo Hou,
Yuanlong Wang,
Daoyi Dong,
Han-Sen Zhong,
Li Li,
Guo-Yong Xiang,
Howard M. Wiseman,
Chuan-Feng Li,
Guang-Can Guo
Abstract:
Adaptive techniques have important potential for wide applications in enhancing precision of quantum parameter estimation. We present a recursively adaptive quantum state tomography (RAQST) protocol for finite dimensional quantum systems and experimentally implement the adaptive tomography protocol on two-qubit systems. In this RAQST protocol, an adaptive measurement strategy and a recursive linea…
▽ More
Adaptive techniques have important potential for wide applications in enhancing precision of quantum parameter estimation. We present a recursively adaptive quantum state tomography (RAQST) protocol for finite dimensional quantum systems and experimentally implement the adaptive tomography protocol on two-qubit systems. In this RAQST protocol, an adaptive measurement strategy and a recursive linear regression estimation algorithm are performed. Numerical results show that our RAQST protocol can outperform the tomography protocols using mutually unbiased bases (MUB) and the two-stage MUB adaptive strategy even with the simplest product measurements. When nonlocal measurements are available, our RAQST can beat the Gill-Massar bound for a wide range of quantum states with a modest number of copies. We use only the simplest product measurements to implement two-qubit tomography experiments. In the experiments, we use error-compensation techniques to tackle systematic error due to misalignments and imperfection of wave plates, and achieve about 100-fold reduction of the systematic error. The experimental results demonstrate that the improvement of RAQST over nonadaptive tomography is significant for states with a high level of purity. Our results also show that this recursively adaptive tomography method is particularly effective for the reconstruction of maximally entangled states, which are important resources in quantum information.
△ Less
Submitted 5 December, 2015;
originally announced December 2015.
-
Quantum random number generation
Authors:
Xiongfeng Ma,
Xiao Yuan,
Zhu Cao,
Bing Qi,
Zhen Zhang
Abstract:
Quantum physics can be exploited to generate true random numbers, which play important roles in many applications, especially in cryptography. Genuine randomness from the measurement of a quantum system reveals the inherent nature of quantumness --- coherence, an important feature that differentiates quantum mechanics from classical physics. The generation of genuine randomness is generally consid…
▽ More
Quantum physics can be exploited to generate true random numbers, which play important roles in many applications, especially in cryptography. Genuine randomness from the measurement of a quantum system reveals the inherent nature of quantumness --- coherence, an important feature that differentiates quantum mechanics from classical physics. The generation of genuine randomness is generally considered impossible with only classical means. Based on the degree of trustworthiness on devices, quantum random number generators (QRNGs) can be grouped into three categories. The first category, practical QRNG, is built on fully trusted and calibrated devices and typically can generate randomness at a high speed by properly modeling the devices. The second category is self-testing QRNG, where verifiable randomness can be generated without trusting the actual implementation. The third category, semi-self-testing QRNG, is an intermediate category which provides a tradeoff between the trustworthiness on the device and the random number generation speed.
△ Less
Submitted 10 May, 2016; v1 submitted 29 October, 2015;
originally announced October 2015.
-
Free-space reconfigurable quantum key distribution network
Authors:
Bing Qi,
Hoi-Kwong Lo,
Charles Ci Wen Lim,
George Siopsis,
Eric A. Chitambar,
Raphael Pooser,
Philip G. Evans,
Warren Grice
Abstract:
We propose a free-space reconfigurable quantum key distribution (QKD) network to secure communication among mobile users. Depends on the trustworthiness of the network relay, the users can implement either the highly secure measurement-device-independent QKD, or the highly efficient decoy state BB84 QKD. Based on the same quantum infrastructure, we also propose a loss tolerant quantum position ver…
▽ More
We propose a free-space reconfigurable quantum key distribution (QKD) network to secure communication among mobile users. Depends on the trustworthiness of the network relay, the users can implement either the highly secure measurement-device-independent QKD, or the highly efficient decoy state BB84 QKD. Based on the same quantum infrastructure, we also propose a loss tolerant quantum position verification scheme, which could allow the QKD users to initiate the QKD process without relying on pre-shared key.
△ Less
Submitted 16 October, 2015;
originally announced October 2015.
-
Sampling-based Learning Control for Quantum Systems with Uncertainties
Authors:
Daoyi Dong,
Mohamed A. Mabrok,
Ian R. Petersen,
Bo Qi,
Chunlin Chen,
Herschel Rabitz
Abstract:
Robust control design for quantum systems has been recognized as a key task in the development of practical quantum technology. In this paper, we present a systematic numerical methodology of sampling-based learning control (SLC) for control design of quantum systems with uncertainties. The SLC method includes two steps of "training" and "testing". In the training step, an augmented system is cons…
▽ More
Robust control design for quantum systems has been recognized as a key task in the development of practical quantum technology. In this paper, we present a systematic numerical methodology of sampling-based learning control (SLC) for control design of quantum systems with uncertainties. The SLC method includes two steps of "training" and "testing". In the training step, an augmented system is constructed using artificial samples generated by sampling uncertainty parameters according to a given distribution. A gradient flow based learning algorithm is developed to find the control for the augmented system. In the process of testing, a number of additional samples are tested to evaluate the control performance where these samples are obtained through sampling the uncertainty parameters according to a possible distribution. The SLC method is applied to three significant examples of quantum robust control including state preparation in a three-level quantum system, robust entanglement generation in a two-qubit superconducting circuit and quantum entanglement control in a two-atom system interacting with a quantized field in a cavity. Numerical results demonstrate the effectiveness of the SLC approach even when uncertainties are quite large, and show its potential for robust control design of quantum systems.
△ Less
Submitted 26 July, 2015;
originally announced July 2015.
-
Discrete-variable measurement-device-independent quantum key distribution suitable for metropolitan networks
Authors:
Feihu Xu,
Marcos Curty,
Bing Qi,
Li Qian,
Hoi-Kwong Lo
Abstract:
We demonstrate that, with a fair comparison, the secret key rate of discrete-variable measurement-device-independent quantum key distribution (DV-MDI-QKD) with high-efficiency single-photon detectors and good system alignment is typically rather high and thus highly suitable for not only long distance communication but also metropolitan networks. The previous reservation on the key rate and suitab…
▽ More
We demonstrate that, with a fair comparison, the secret key rate of discrete-variable measurement-device-independent quantum key distribution (DV-MDI-QKD) with high-efficiency single-photon detectors and good system alignment is typically rather high and thus highly suitable for not only long distance communication but also metropolitan networks. The previous reservation on the key rate and suitability of DV-MDI-QKD for metropolitan networks expressed by Pirandola et al. [Nature Photon. 9, 397 (2015)] was based on an unfair comparison with low-efficiency detectors and high quantum bit error rate, and is, in our opinion, unjustified.
△ Less
Submitted 29 June, 2015; v1 submitted 15 June, 2015;
originally announced June 2015.
-
Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection
Authors:
Bing Qi,
Pavel Lougovski,
Raphael Pooser,
Warren Grice,
Miljko Bobrek
Abstract:
Continuous-variable quantum key distribution (CV-QKD) protocols based on coherent detection have been studied extensively in both theory and experiment. In all the existing implementations of CV-QKD, both the quantum signal and the local oscillator (LO) are generated from the same laser and propagate through the insecure quantum channel. This arrangement may open security loopholes and also limit…
▽ More
Continuous-variable quantum key distribution (CV-QKD) protocols based on coherent detection have been studied extensively in both theory and experiment. In all the existing implementations of CV-QKD, both the quantum signal and the local oscillator (LO) are generated from the same laser and propagate through the insecure quantum channel. This arrangement may open security loopholes and also limit the potential applications of CV-QKD. In this paper, we propose and demonstrate a pilot-aided feedforward data recovery scheme which enables reliable coherent detection using a "locally" generated LO. Using two independent commercial laser sources and a spool of 25 km optical fiber, we construct a coherent communication system. The variance of the phase noise introduced by the proposed scheme is measured to be 0.04 (rad^2), which is small enough to enable secure key distribution. This technology also opens the door for other quantum communication protocols, such as the recently proposed measurement-device-independent (MDI) CV-QKD where independent light sources are employed by different users.
△ Less
Submitted 19 June, 2015; v1 submitted 2 March, 2015;
originally announced March 2015.