Skip to main content

Showing 1–29 of 29 results for author: Walk, N

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2312.13376  [pdf, other

    quant-ph

    Advantage of multi-partite entanglement for quantum cryptography over long and short ranged networks

    Authors: Janka Memmen, Jens Eisert, Nathan Walk

    Abstract: The increasing sophistication of available quantum networks has seen a corresponding growth in the pursuit of multi-partite cryptographic protocols. Whilst the use of multi-partite entanglement is known to offer an advantage in certain abstractly motivated contexts, the quest to find practical advantage scenarios is ongoing and substantial difficulties in generalising some bi-partite security proo… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: 19 pages, 10 figures

  2. Simplified intensity- and phase-modulated transmitter for modulator-free decoy-state quantum key distribution

    Authors: Y. S. Lo, R. I. Woodward, N. Walk, M. Lucamarini, I. De Marco, T. K. Paraïso, M. Pittaluga, T. Roger, M. Sanzaro, Z. L. Yuan, A. J. Shields

    Abstract: Quantum key distribution (QKD) allows secret key exchange between two users with unconditional security. For QKD to be widely deployed, low cost and compactness are crucial requirements alongside high performance. Currently, the majority of QKD systems demonstrated rely on bulk intensity and phase modulators to generate optical pulses with precisely defined amplitude and relative phase difference… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Journal ref: APL Photonics 8, 036111 (2023)

  3. ReQuSim: Faithfully simulating near-term quantum repeaters

    Authors: Julius Wallnöfer, Frederik Hahn, Fabian Wiesner, Nathan Walk, Jens Eisert

    Abstract: Quantum repeaters have long been established to be essential for distributing entanglement over long distances. Consequently, their experimental realization constitutes a core challenge of quantum communication. However, there are numerous open questions about implementation details for realistic, near-term experimental setups. In order to assess the performance of realistic repeater protocols, we… ▽ More

    Submitted 3 April, 2024; v1 submitted 7 December, 2022; originally announced December 2022.

    Comments: 13+4 pages, 10+4 figures, 0+2 tables; v2: updated presentation; v3: accepted version plus tiny changes, adds one more scenario and runtime information

    Journal ref: PRX Quantum 5, 010351 (2024)

  4. Anonymous conference key agreement in linear quantum networks

    Authors: Jarn de Jong, Frederik Hahn, Jens Eisert, Nathan Walk, Anna Pappa

    Abstract: Sharing multi-partite quantum entanglement between parties allows for diverse secure communication tasks to be performed. Among them, conference key agreement (CKA), an extension of key distribution to multiple parties, has received much attention recently. Interestingly, CKA can also be performed in a way that protects the identities of the participating parties, therefore providing anonymity. In… ▽ More

    Submitted 5 September, 2023; v1 submitted 18 May, 2022; originally announced May 2022.

    Comments: 10 pages of main text, 3 figures in main text, 3 tables in main text, 10 pages of appendices, 1 figure in appendices, 3 tables in appendices

    Journal ref: Quantum 7, 1117 (2023)

  5. arXiv:2201.00049  [pdf, other

    quant-ph cond-mat.stat-mech physics.optics

    Quantum simulation of thermodynamics in an integrated quantum photonic processor

    Authors: F. H. B. Somhorst, R. van der Meer, M. Correa Anguita, R. Schadow, H. J. Snijders, M. de Goede, B. Kassenberg, P. Venderbosch, C. Taballione, J. P. Ep**, H. H. van den Vlekkert, J. Timmerhuis, J. F. F. Bulmer, J. Lugani, I. A. Walmsley, P. W. H. Pinkse, J. Eisert, N. Walk, J. J. Renema

    Abstract: One of the core questions of quantum physics is how to reconcile the unitary evolution of quantum states, which is information-preserving and time-reversible, with evolution following the second law of thermodynamics, which, in general, is neither. The resolution to this paradox is to recognize that global unitary evolution of a multi-partite quantum state causes the state of local subsystems to e… ▽ More

    Submitted 31 August, 2023; v1 submitted 31 December, 2021; originally announced January 2022.

    Comments: 9+12 pages, 12 figures, replaced with final version

    Journal ref: Nature Comm. 14, 3895 (2023)

  6. arXiv:2112.00067  [pdf, other

    quant-ph

    Experimental demonstration of an efficient, semi-device-independent photonic indistinguishability witness

    Authors: Reinier van der Meer, Peter Hooijschuur, Franciscus H. B. Somhorst, Pim Venderbosch, Michiel de Goede, Ben Kassenberg, Henk Snijders, Caterina Taballione, Jorn Ep**, Hans van den Vlekkert, Nathan Walk, Pepijn W. H. Pinkse, Jelmer J. Renema

    Abstract: Efficient and reliable measurements of photonic indistinguishability are crucial to solidify claims of a quantum advantage in photonics. Existing indistinguishability witnesses may be vulnerable to implementation loopholes, showing the need for a measurement which depends on as few assumptions as possible. Here, we introduce a semi-device-independent witness of photonic indistinguishability and me… ▽ More

    Submitted 30 November, 2021; originally announced December 2021.

  7. Simulating quantum repeater strategies for multiple satellites

    Authors: Julius Wallnöfer, Frederik Hahn, Mustafa Gündoğan, Jasminder S. Sidhu, Fabian Wiesner, Nathan Walk, Jens Eisert, Janik Wolters

    Abstract: A global quantum repeater network involving satellite-based links is likely to have advantages over fiber-based networks in terms of long-distance communication, since the photon losses in free space scale only polynomially with the distance -- compared to the exponential losses in optical fibers. To simulate the performance of such networks, we have introduced a scheme of large-scale event-based… ▽ More

    Submitted 8 August, 2022; v1 submitted 29 October, 2021; originally announced October 2021.

    Comments: 10+7 pages, 6+6 figures, 2+1 tables; v2: replaced with accepted version plus tiny changes. extended model and additional analysis along satellite orbit

    Journal ref: Commun. Phys. 5, 169 (2022)

  8. Rate limits in quantum networks with lossy repeaters

    Authors: Riccardo Laurenza, Nathan Walk, Jens Eisert, Stefano Pirandola

    Abstract: The derivation of ultimate limits to communication over certain quantum repeater networks have provided extremely valuable benchmarks for assessing near-term quantum communication protocols. However, these bounds are usually derived in the limit of ideal devices and leave questions about the performance of practical implementations unanswered. To address this challenge, we quantify how the presenc… ▽ More

    Submitted 6 March, 2022; v1 submitted 19 October, 2021; originally announced October 2021.

    Comments: 13 pages, 5 figures, replaced with final version

    Journal ref: Phys. Rev. Research 4, 023158 (2022)

  9. Sharing classical secrets with continuous-variable entanglement: Composable security and network coding advantage

    Authors: Nathan Walk, Jens Eisert

    Abstract: Secret sharing is a multi-party cryptographic primitive that can be applied to a network of partially distrustful parties for encrypting data that is both sensitive (it must remain secure) and important (it must not be lost or destroyed). When sharing classical secrets (as opposed to quantum states), one can distinguish between protocols that leverage bi-partite quantum key distribution (QKD) and… ▽ More

    Submitted 25 February, 2022; v1 submitted 21 April, 2021; originally announced April 2021.

    Comments: 26 pages, 10 figures, 2 tables. Replaced by final version

    Journal ref: PRX Quantum 2, 040339 (2021)

  10. Composable finite-size effects in free-space CV-QKD systems

    Authors: Nedasadat Hosseinidehaj, Nathan Walk, Timothy C. Ralph

    Abstract: Free-space channels provide the possibility of establishing continuous-variable quantum key distribution (CV-QKD) in global communication networks. However, the fluctuating nature of transmissivity in these channels introduces an extra noise which reduces the achievable secret key rate. We consider two classical post-processing strategies, post-selection of high-transmissivity data and data cluste… ▽ More

    Submitted 9 February, 2020; originally announced February 2020.

    Comments: 15 pages, 3 figures

    Journal ref: Phys. Rev. A 103, 012605 (2021)

  11. Finite-size effects in continuous-variable QKD with Gaussian post-selection

    Authors: Nedasadat Hosseinidehaj, Andrew M. Lance, Thomas Symul, Nathan Walk, Timothy C. Ralph

    Abstract: In a continuous-variable quantum key distribution (CV-QKD) protocol, which is based on heterodyne detection at the receiver, the application of a noiseless linear amplifier (NLA) on the received signal before the detection can be emulated by the post-selection of the detection outcome. Such a post-selection, which is also called a measurement-based NLA, requires a cut-off to produce a normalisable… ▽ More

    Submitted 19 December, 2019; originally announced December 2019.

    Comments: 13 pages, 6 figures

    Journal ref: Phys. Rev. A 101, 052335 (2020)

  12. arXiv:1912.01635  [pdf, other

    quant-ph cond-mat.mes-hall

    Stationary optomechanical entanglement between a mechanical oscillator and its measurement apparatus

    Authors: C. Gut, K. Winkler, J. Hoelscher-Obermaier, S. G. Hofer, R. Moghadas Nia, N. Walk, A. Steffens, J. Eisert, W. Wieczorek, J. A. Slater, M. Aspelmeyer, K. Hammerer

    Abstract: We provide an argument to infer stationary entanglement between light and a mechanical oscillator based on continuous measurement of light only. We propose an experimentally realizable scheme involving an optomechanical cavity driven by a resonant, continuous-wave field operating in the non-sideband-resolved regime. This corresponds to the conventional configuration of an optomechanical position o… ▽ More

    Submitted 13 August, 2020; v1 submitted 3 December, 2019; originally announced December 2019.

    Comments: 18 pages, 7 figures

    Journal ref: Phys. Rev. Research 2, 033244 (2020)

  13. arXiv:1910.06343  [pdf, other

    quant-ph cond-mat.other

    Quantum certification and benchmarking

    Authors: J. Eisert, D. Hangleiter, N. Walk, I. Roth, D. Markham, R. Parekh, U. Chabaud, E. Kashefi

    Abstract: Concomitant with the rapid development of quantum technologies, challenging demands arise concerning the certification and characterization of devices. The promises of the field can only be achieved if stringent levels of precision of components can be reached and their functioning guaranteed. This review provides a brief overview of the known characterization methods of certification, benchmarkin… ▽ More

    Submitted 29 February, 2020; v1 submitted 14 October, 2019; originally announced October 2019.

    Comments: 10 pages, 1 figure, 5 text boxes, 1 table, invited review for Nature Reviews, v2 extended and updated

    Journal ref: Nature Reviews Physics 2, 382-390 (2020)

  14. arXiv:1908.10869  [pdf, other

    quant-ph cond-mat.dis-nn cond-mat.str-el

    Harnessing symmetry-protected topological order for quantum memories

    Authors: Marcel Goihl, Nathan Walk, Jens Eisert, Nicolas Tarantino

    Abstract: Spin chains with symmetry-protected edge modes are promising candidates to realize intrinsically robust physical qubits that can be used for the storage and processing of quantum information. In any experimental realization of such physical systems, weak perturbations in the form of induced interactions and disorder are unavoidable and can be detrimental to the stored information. At the same time… ▽ More

    Submitted 30 August, 2019; v1 submitted 28 August, 2019; originally announced August 2019.

    Comments: 10 pages, 9 figures, v2: Reordered figures

    Journal ref: Phys. Rev. Research 2, 013120 (2020)

  15. Teleportation-based collective attacks in Gaussian quantum key distribution

    Authors: Spyros Tserkis, Nedasadat Hosseinidehaj, Nathan Walk, Timothy C. Ralph

    Abstract: In Gaussian quantum key distribution eavesdrop** attacks are conventionally modeled through the universal entangling cloner scheme, which is based on the premise that the whole environment is under control of the adversary, i.e., the eavesdropper purifies the system. This assumption implies that the eavesdropper has either access to an identity (noiseless) channel or infinite amount of entanglem… ▽ More

    Submitted 22 January, 2020; v1 submitted 20 August, 2019; originally announced August 2019.

    Journal ref: Phys. Rev. Research 2, 013208 (2020)

  16. Certified Quantum Random Numbers from Untrusted Light

    Authors: David Drahi, Nathan Walk, Matty J. Hoban, Aleksey K. Fedorov, Roman Shakhovoy, Akky Feimov, Yury Kurochkin, W. Steven Kolthammer, Joshua Nunn, Jonathan Barrett, Ian A. Walmsley

    Abstract: A remarkable aspect of quantum theory is that certain measurement outcomes are entirely unpredictable to all possible observers. Such quantum events can be harnessed to generate numbers whose randomness is asserted based upon the underlying physical processes. We formally introduce, design and experimentally demonstrate an ultrafast optical quantum random number generator that uses a totally untru… ▽ More

    Submitted 17 August, 2020; v1 submitted 23 May, 2019; originally announced May 2019.

    Comments: 37 pages, 7 figures. New substantial material has been added and the title was modified accordingly

    Journal ref: Phys. Rev. X 10, 041048 (2020)

  17. Optimal realistic attacks in continuous-variable quantum key distribution

    Authors: Nedasadat Hosseinidehaj, Nathan Walk, Timothy C. Ralph

    Abstract: Quantum cryptographic protocols are typically analysed by assuming that potential opponents can carry out all physical operations, an assumption which grants capabilities far in excess of present technology. Adjusting this assumption to reflect more realistic capabilities is an attractive prospect, but one that can only be justified with a rigorous, quantitative framework that relates adversarial… ▽ More

    Submitted 13 November, 2018; originally announced November 2018.

    Comments: 11 pages, 4 figures

    Journal ref: Phys. Rev. A 99, 052336 (2019)

  18. arXiv:1609.09436  [pdf, other

    quant-ph

    Composably secure time-frequency quantum key distribution

    Authors: Nathan Walk, Jonathan Barrett, Joshua Nunn

    Abstract: We present a composable security proof, valid against arbitrary attacks and including finite-size effects, for a high dimensional time-frequency quantum key distribution (TFQKD) protocol based upon spectrally entangled photons. Previous works have focused on TFQKD schemes as it combines the impressive loss tolerance of single-photon QKD with the large alphabets of continuous variable (CV) schemes,… ▽ More

    Submitted 29 September, 2016; originally announced September 2016.

    Comments: 12 pages, 3 figures

  19. Models of reduced-noise, probabilistic linear amplifiers

    Authors: Joshua Combes, Nathan Walk, A. P. Lund, T. C. Ralph, Carlton M. Caves

    Abstract: We construct an amplifier that interpolates between a nondeterministic, immaculate linear amplifier and a deterministic, ideal linear amplifier and beyond to nonideal linear amplifiers. The construction involves cascading an immaculate linear amplifier that has amplitude gain $g_1$ with a (possibly) nonideal linear amplifier that has gain $g_2$. With respect to normally ordered moments, the device… ▽ More

    Submitted 10 March, 2016; originally announced March 2016.

    Comments: 14 pages, 10 figures

    Journal ref: Phys. Rev. A 93, 052310 (2016)

  20. Observation of genuine one-way Einstein-Podolsky-Rosen steering

    Authors: Sabine Wollmann, Nathan Walk, Adam J. Bennet, Howard M. Wiseman, G. J. Pryde

    Abstract: Within the hierarchy of inseparable quantum correlations, Einstein-Podolsky-Rosen steering is distinguished from both entanglement and Bell nonlocality by its asymmetry -- there exist conditions where the steering phenomenon changes from being observable to not observable, simply by exchanging the role of the two measuring parties. Whilst this one-way steering feature has been previously demonstra… ▽ More

    Submitted 4 November, 2015; originally announced November 2015.

    Comments: 7 pages, 5 figures

    Journal ref: Phys. Rev. Lett. 116, 160403 (2016)

  21. Measurement-Based Noiseless Linear Amplification for Quantum Communication

    Authors: Helen M. Chrzanowski, Nathan Walk, Syed M. Assad, Jiri Janousek, Sara Hosseini, Timothy C. Ralph, Thomas Symul, ** Koy Lam

    Abstract: Entanglement distillation is an indispensable ingredient in extended quantum communication networks. Distillation protocols are necessarily non-deterministic and require advanced experimental techniques such as noiseless amplification. Recently it was shown that the benefits of noiseless amplification could be extracted by performing a post-selective filtering of the measurement record to improve… ▽ More

    Submitted 12 September, 2014; v1 submitted 9 September, 2014; originally announced September 2014.

    Comments: 7+3 pages, 5+1 figures, close to published version

    Journal ref: Nature Photonics, 8, 333 (2014)

  22. arXiv:1409.2061  [pdf, ps, other

    quant-ph

    Quantum Key Distribution without sending a Quantum Signal

    Authors: T. C. Ralph, N. Walk

    Abstract: Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are… ▽ More

    Submitted 6 September, 2014; originally announced September 2014.

  23. Channel purification via continuous-variable quantum teleportation with Gaussian post-selection

    Authors: Rémi Blandino, Nathan Walk, Austin P. Lund, Timothy C. Ralph

    Abstract: We present a protocol based on continuous-variable quantum teleportation and Gaussian post- selection that can be used to correct errors introduced by a lossy channel. We first show that the global transformation enacted by the protocol is equivalent to an effective system composed of a noiseless amplification (or attenuation), and an effective quantum channel, which can in theory have no loss and… ▽ More

    Submitted 26 August, 2014; originally announced August 2014.

    Comments: 5+7 pages, 4 figures

    Journal ref: Phys. Rev. A 93, 012326 (2016)

  24. Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution

    Authors: Nathan Walk, Sara Hosseni, Jiao Geng, Oliver Thearle, **g Yan Haw, Seiji Armstrong, Syed M Assad, Jiri Janousek, Timothy C Ralph, Thomas Symul, Howard M Wiseman, ** Koy Lam

    Abstract: Nonlocal correlations, a longstanding foundational topic in quantum information, have recently found application as a resource for cryptographic tasks where not all devices are trusted, for example in settings with a highly secure central hub, such as a bank or government department, and less secure satellite stations which are inherently more vulnerable to hardware "hacking" attacks. The asymmetr… ▽ More

    Submitted 16 June, 2016; v1 submitted 26 May, 2014; originally announced May 2014.

    Comments: Addition of experimental results and (several) new authors

    Journal ref: Optica Vol. 3, Issue 6, pp. 634-642, 2016

  25. Non-deterministic noiseless amplification via non-symplectic phase space transformations

    Authors: Nathan Walk, Austin P. Lund, Timothy C. Ralph

    Abstract: We analyse the action of an ideal noiseless linear amplifier operator, $g^\hat{n}$, using the Wigner function phase space representation. In this setting we are able to clarify the gain $g$ for which a physical output is produced when this operator is acted upon inputs other than coherent states. We derive compact closed form expressions for the action of $N$ local amplifiers, with potentially dif… ▽ More

    Submitted 20 November, 2012; v1 submitted 15 November, 2012; originally announced November 2012.

    Comments: 12 pages, 9 figures, missing reference added

    Journal ref: New J. Phys. 2013 vol. 15 (7) pp. 073014

  26. Gaussian Post-selection for Continuous Variable Quantum Cryptography

    Authors: Nathan Walk, Thomas Symul, ** Koy Lam, Timothy C. Ralph

    Abstract: We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdrop** attacks by employing the concept of an equivalent protocol where the post-selection is implemented as a series of quantum operations including a virtual distillation. We introduce a particular `Gaussian' post selection and demonstrate that the security… ▽ More

    Submitted 5 June, 2012; v1 submitted 5 June, 2012; originally announced June 2012.

    Comments: 4+4 pages. arXiv admin note: substantial text overlap with arXiv:1106.0825

    Journal ref: Phys. Rev. A. 87, 020303, 2013

  27. Quantum Communication with an Accelerated Partner

    Authors: T. G. Downes, T. C. Ralph, N. Walk

    Abstract: An unsolved problem in relativistic quantum information research is how to model efficient, directional quantum communication between localised parties in a fully quantum field theoretical framework. We propose a tractable approach to this problem based on solving the Heisenberg evolution of localized field observables. We illustrate our approach by analysing, and obtaining approximate analytical… ▽ More

    Submitted 28 October, 2012; v1 submitted 13 March, 2012; originally announced March 2012.

    Comments: Additional explanatory text and typo in Eq.17 corrected

    Journal ref: Phys Rev A 87, 012327 (2013)

  28. arXiv:1106.0825  [pdf, ps, other

    quant-ph

    Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks

    Authors: Nathan Walk, Thomas Symul, Timothy C. Ralph, ** Koy Lam

    Abstract: We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdrop** attacks by employing the concept of an equiv- alent protocol where the post-selection is implemented as a projective quantum measurement. We demonstrate that the security can be calculated using only experimentally accessible quantities and finally exp… ▽ More

    Submitted 4 June, 2011; originally announced June 2011.

    Comments: 4 pages, 2 figures

  29. Noiseless Linear Amplification and Distillation of Entanglement

    Authors: G. Y. Xiang, T. C. Ralph, A. P. Lund, N. Walk, G. J. Pryde

    Abstract: The idea of signal amplification is ubiquitous in the control of physical systems, and the ultimate performance limit of amplifiers is set by quantum physics. Increasing the amplitude of an unknown quantum optical field, or more generally any harmonic oscillator state, must introduce noise. This linear amplification noise prevents the perfect copying of the quantum state, enforces quantum limits… ▽ More

    Submitted 21 July, 2009; originally announced July 2009.

    Comments: Submitted 10 June 2009

    Journal ref: Nature Photonics 4, 316 (2010)