Practicality of Quantum Information Processing by Hoi-Kwan Lau A

Total Page:16

File Type:pdf, Size:1020Kb

Practicality of Quantum Information Processing by Hoi-Kwan Lau A Practicality of Quantum Information Processing by Hoi-Kwan Lau A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Physics University of Toronto c Copyright 2014 by Hoi-Kwan Lau Abstract Practicality of Quantum Information Processing Hoi-Kwan Lau Doctor of Philosophy Graduate Department of Physics University of Toronto 2014 Quantum Information Processing (QIP) is expected to bring revolutionary enhancement to various technological areas. However, today’s QIP applications are far from being practical. The problem involves both hardware issues, i.e., quantum devices are imper- fect, and software issues, i.e., the functionality of some QIP applications is not fully understood. Aiming to improve the practicality of QIP, in my PhD research I have studied various topics in quantum cryptography and ion trap quantum computation. In quantum cryp- tography, I first studied the security of position-based quantum cryptography (PBQC). I discovered a wrong assumption in the previous literature that the cheaters are not al- lowed to share entangled resources. I proposed entanglement attacks that could cheat all known PBQC protocols. I also studied the practicality of continuous-variable (CV) quantum secret sharing (QSS). While the security of CV QSS was considered by the literature only in the limit of infinite squeezing, I found that finitely squeezed CV resources could also provide finite secret sharing rate. Our work relaxes the stringent resources requirement of implementing QSS. In ion trap quantum computation, I studied the phase error of quantum information induced by dc Stark effect during ion transportation. I found an optimized ion trajectory for which the phase error is the minimum. I also defined a threshold speed, above which ion transportation would induce significant error. ii In addition, I proposed a new application for ion trap systems as universal bosonic simulators (UBS). I introduced two architectures, and discussed their respective strength and weakness. I illustrated the implementations of bosonic state initialization, transfor- mation, and measurement by applying radiation fields or by varying the trap potential. When comparing with conducting optical experiments, the ion trap UBS is advantageous in higher state initialization efficiency and higher measurement accuracy. Finally, I proposed a new method to re-cool ion qubits during quantum computation. The idea is to transfer the motional excitation of a qubit to another ion that is prepared in the motional ground state. I showed that my method could be ten times faster than current laser cooling techniques, and thus could improve the speed of ion trap quantum computation. iii Acknowledgements First of all, may I express my sincere gratitude to my supervisors: Prof. Daniel James and Prof. Hoi-Kwong Lo. I really appreciate that they agreed to co-supervise my PhD thesis; this was an adventurous decision as they work in different directions. I am very fortunate to have had numerous inspiring discussions with my supervisors, through which I have learnt a lot in both physics knowledge and the ways to tackle problems. I am obliged for their patience and tolerance, particularly they relentlessly gave me friendly advices even when I held a strong opposing opinion. Besides, I would like to thank for their effort and consideration in helping me in job-hunting and in training me to be a better physicist and person. In summary, my PhD period would not be so fruitful and enjoyable without the kindness of my supervisors. I would like to thank my supervisory committee members, Joseph Thywissen and John Sipe, and my examiners, Jonathan Dowling and John Wei, for their valuable comments and beneficial advices. I also want to thank my colleagues, including Eric Chitambar, Serge Fehr, John Gaebler, Barry Sanders, Marcos Villagra, Christian Weedbrook, and Andrew White, for their illuminating discussions and useful helps. In addition, I want to thank Mr. David Tang and Ms. Kristy Kwok for their hospitality during my stay in Toronto. It is my honour to acknowledge the support from the Kwok Sau Po Scholarship, the E. F. Burton Fellowship, the Lachlan Gilchrist Fellowship Fund, and the Queen Elizabeth II Graduate Scholarship in Science and Technology. Finally, I would like to thank my beloved wife, Dan Sun, for agreeing to accompanying me in the rest of my life. iv Contents Glossaries and Acronyms xi 1 Introduction 1 2 Position-Based Quantum Cryptography 6 2.1 Introduction ................................. 6 2.2 Classical Position-Based Cryptrography . 8 2.2.1 Individually Cheating . 10 2.2.2 Collaborative Cheating . 10 2.3 PBQCProtocols ............................... 10 2.3.1 ProtocolA............................... 11 2.3.2 ProtocolB............................... 12 2.4 Cheating in N =2Case ........................... 12 2.4.1 CheatingagainstProtocolA . 12 2.4.2 CheatingagainstProtocolB . 15 2.5 Cheating in N > 2Case ........................... 17 2.5.1 CheatingagainstProtocolA. 17 2.5.2 CheatingagainstProtocolB . 20 2.6 Principle of the cheating schemes . 22 2.6.1 ProtocolA............................... 22 2.6.2 ProtocolB............................... 23 2.7 ModifiedPBQCProtocol .......................... 24 2.8 Summary ................................... 26 3 Quantum Secret Sharing with Continuous-Variable Cluster States 28 3.1 Introduction.................................. 28 3.2 Background .................................. 30 3.2.1 QuantumSecretSharing ...................... 30 v 3.2.2 Continuous-Variable Cluster States . 32 3.2.2.1 Nullifier representation . 32 3.2.2.2 Wigner function representation . 33 3.2.2.3 Correlations of measurement . 34 3.2.2.4 Cluster-class state . 35 3.3 CCQuantumsecretsharing . .. .. 35 3.4 CQQuantumsecretsharing . .. .. 38 3.4.1 Equivalence of CQ Quantum Secret Sharing and QKD . 40 3.4.2 SecretSharingRate ......................... 41 3.4.3 Simplification . 45 3.4.3.1 MixedStateApproach . 45 3.4.3.2 Classical Memory . 46 3.4.3.3 LocalMeasurement. 48 3.4.3.4 Simplified CQ Protocol . 50 3.5 QQQuantumsecretsharing . .. .. 51 3.6 Conclusion .................................. 53 4 Motional States of Trapped Ions 56 4.1 TrapandIonMotion ............................. 57 4.2 InternalStructureandLaserOperation . .. 59 4.2.1 Transition............................... 59 4.2.2 Measurement ............................. 61 4.3 IonMotioninTrapPotential ........................ 61 4.3.1 Generalized Harmonic Oscillator . 63 4.3.2 InteractionPicture .......................... 67 5 Decoherence Induced by dc Electric field During Ion Transport 69 5.1 Speedofiontrapquantumcomputer . 69 5.2 Motionofion ................................. 71 5.3 PhaseshiftduetodcStarkeffect . 72 5.4 Minimum possible phase shift . 73 5.5 Threshold speed of transporting ion qubits . 76 5.6 Non-encodingStateExcitation . 77 5.7 SummaryandDiscussion........................... 80 6 Ion Trap Bosonic Simulator 1: Multiple Ions in Single Trap 82 6.1 Introduction ................................. 82 vi 6.2 Layoutofthesystem ............................. 84 6.3 Universal Bosonic Simulation . 85 6.4 Laser Implementation of Basic Operations . 87 6.4.1 DisplacementOperator. .. .. 89 6.4.2 Phase-ShiftOperator . .. .. 90 6.4.3 SqueezingOperator.......................... 90 6.4.4 NonlinearOperator.......................... 90 6.4.5 BeamSplitter............................. 91 6.5 Readout .................................... 95 6.5.1 Adiabaticpassage........................... 95 6.5.2 ResonantPulses............................ 99 6.5.2.1 Post-selection Method . 100 6.5.2.2 Multiple Electronic State Method . 103 6.6 Initialization . 104 7 Ion Trap Bosonic Simulator 2: Ions in Separate Trap 107 7.1 Introduction.................................. 107 7.2 Model ..................................... 108 7.3 SingleModeOperations ........................... 109 7.3.1 DisplacementOperator . 110 7.3.2 SqueezingOperator ......................... 111 7.3.3 Phase-ShiftOperator . 112 7.3.4 NonlinearOperator ......................... 113 7.4 Two-modeOperation ............................ 114 7.4.1 IonTransportandPick-up . 119 7.4.2 Accuracyofbeamsplitter . 120 7.5 Initialization and readout . 122 7.6 Conclusion .................................. 123 8 Rapid ion re-cooling by swapping beam splitter 126 8.1 Introduction ................................. 126 8.2 Model ..................................... 127 8.3 Cooling .................................... 130 8.4 SwappingBeamSplitter ........................... 131 8.4.1 Ansatz................................. 133 8.5 Groundstatequbitpair ........................... 133 8.6 Transportbetweentraps ........................... 136 vii 8.7 Implementationofpotential . 137 8.8 Anharmonicity ................................ 138 8.9 Fluctuation .................................. 139 8.10Conclusion................................... 140 9 Summary 142 9.1 Prospects ................................... 145 A Appendix 148 A.1 SecurityofModifiedProtocol . 148 A.1.1 Security Against Attacks with One Entangled Qubit . 148 A.1.2 Security Against Attacks with One Entangled Qutrit . 151 A.2 ExampleofCCQSS ............................. 154 A.2.1 Example1:(2,3)-CCprotocol . 154 A.2.1.1 Parties 1,2 collaboration. 155 { } A.2.1.2 Parties 2,3 collaboration. 156 { } A.2.2 Example2:(3,5)-CCprotocol . 157 A.2.2.1 Parties 1,2,3 collaboration. 158 { } A.2.2.2 Parties 1,3,4 collaboration. 159 { } A.3 ExamplesofCQQSS ............................ 161 A.3.1
Recommended publications
  • Arxiv:1707.06910V2 [Physics.Hist-Ph] 22 Feb 2018 Xlntoscnenn H Eei Ftebte-Nw Pa Better-Known the of Genesis D the Park’S Concerning Analyze Explanations I States
    Twelve years before the quantum no-cloning theorem Juan Ortigoso∗ Instituto de Estructura de la Materia, CSIC, Serrano 121, 28006 Madrid, Spain (Dated: January 22, 2018) Abstract The celebrated quantum no-cloning theorem establishes the impossibility of making a perfect copy of an unknown quantum state. The discovery of this important theorem for the field of quantum information is currently dated 1982. I show here that an article published in 1970 [J. L. Park, Foundations of Physics, 1, 23-33 (1970)] contained an explicit mathematical proof of the impossibility of cloning quantum states. I analyze Park’s demonstration in the light of published explanations concerning the genesis of the better-known papers on no-cloning. arXiv:1707.06910v2 [physics.hist-ph] 22 Feb 2018 1 I. INTRODUCTION The no-cloning theorem of quantum mechanics establishes that an arbitrary unknown quantum state cannot be copied.1 A modern proof,2 based on the linearity of quantum mechanics, takes two lines. Suppose that a device can implement a transformation T for copying two orthogonal states ψ and φ of a qubit: T ψ 0 = ψ ψ and T φ 0 = φ φ , | i | i | i| i | i| i | i| i | i| i where 0 is the ready state of the target system. It follows, from linearity, that | i T (a ψ + b φ ) 0 = aT ψ 0 + bT φ 0 = a ψ ψ + b φ φ . (1) | i | i | i | i| i | i| i | i| i | i| i But if the transformation T can clone arbitrary states, it should give, for any a, b values T (a ψ +b φ ) 0 =(a ψ +b φ )(a ψ +b φ )= a2 ψ ψ +b2 φ φ +ab ψ φ +ab φ ψ , (2) | i | i | i | i | i | i | i | i| i | i| i | i| i | i| i which is different from Eq.
    [Show full text]
  • Photonic Quantum Simulator for Unbiased Phase Covariant Cloning
    Applied Physics B manuscript No. (will be inserted by the editor) Photonic quantum simulator for unbiased phase covariant cloning Laura T. Knoll12, Ignacio H. L´opez Grande12, Miguel A. Larotonda123 1 DEILAP, CITEDEF-CONICET, J.B. de La Salle 4397, 1603 Villa Martelli, Buenos Aires, Argentina 2 Departamento de F´ısica, FCEyN, UBA. Ciudad Universitaria, 1428 Buenos Aires, Argentina 3 CONICET, Argentina e-mail: [email protected] The date of receipt and acceptance will be inserted by the editor Abstract We present the results of a linear optics pho- applying a trace-preserving, completely-positive map to tonic implementation of a quantum circuit that simu- the composite system [6,7,8,9,10]. lates a phase covariant cloner, by using two different de- Among the family of Quantum Cloning Machines grees of freedom of a single photon. We experimentally (QCM), one can make a distinction between universal simulate the action of two mirrored 1 ! 2 cloners, each cloning machines (UQCM), which copy all the states of them biasing the cloned states into opposite regions with the same fidelity F , regardless of the state j i of the Bloch sphere. We show that by applying a ran- to be cloned, and state-dependent QCM. For qubits, dom sequence of these two cloners, an eavesdropper can the optimum UQCM can achieve a cloning fidelity F of mitigate the amount of noise added to the original in- 5=6 = 0:833 [6,7,8,11]. UQCMs have been experimen- put state and therefore prepare clones with no bias but tally realized in photon stimulated emission setups [12, with the same individual fidelity, masking its presence in 13,14], linear optics [15] and NMR systems [16].
    [Show full text]
  • Multi-Level Control in Large-Anharmonicity High-Coherence Capacitively Shunted Flux Quantum Circuits
    Multi-level Control in Large-anharmonicity High-coherence Capacitively Shunted Flux Quantum Circuits by Muhammet Ali Yurtalan A thesis presented to the University of Waterloo in fulfillment of the thesis requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering (Quantum Information) Waterloo, Ontario, Canada, 2019 c Muhammet Ali Yurtalan 2019 Examining Committee Membership The following served on the Examining Committee for this thesis. The decision of the Examining Committee is by majority vote. External Examiner Max Hofheinz Associate Professor Supervisor Adrian Lupascu Associate Professor Supervisor Zbigniew Wasilewski Professor Internal Member Bo Cui Associate Professor Internal Member Guoxing Miao Associate Professor Internal-External Member Jonathan Baugh Associate Professor ii This thesis consists of material all of which I authored or co-authored: see Statement of Contributions included in the thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. iii Statement of Contributions Most of the material in Chapter 5 consists of co-authored content. Muhammet Ali Yur- talan and Adrian Lupascu worked on the design and modeling of the device. Muhammet Ali Yurtalan conducted the experiments and performed device simulations. Muhammet Ali Yurtalan and Jiahao Shi fabricated the sample and performed data analysis. Muhammet Ali Yurtalan and Graydon Flatt performed numerical simulations of randomized bench- marking protocol. Adrian Lupascu supervised the experimental work. Most of the material in Chapter 6 consists of co-authored content. Muhammet Ali Yurtalan conducted the experiments and performed numerical simulations.
    [Show full text]
  • Quantum Cloning and Deletion in Quantum Information Theory
    Quantum Cloning and Deletion in Quantum Information Theory THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY (SCIENCE) OF BENGAL ENGINEERING AND SCIENCE UNIVERSITY BY SATYABRATA ADHIKARI arXiv:0902.1622v1 [quant-ph] 10 Feb 2009 DEPARTMENT OF MATHEMATICS BENGAL ENGINEERING AND SCIENCE UNIVERSITY UNIVERSITY HOWRAH- 711103, West Bengal INDIA 2006 i DECLARATION I declare that the thesis entitled “Quantum Cloning and Deletion in Quantum Information Theory” is composed by me and that no part of this thesis has formed the basis for the award of any Degree, Diploma, Associateship, Fellowship or any other similar title to me. (Satyabrata Adhikari) Date: Department of Mathematics, Bengal Engineering and Science University, Shibpur Howrah- 711103, West Bengal India ii CERTIFICATE This is to certify that the thesis entitled “Quantum Cloning and Deletion in Quantum Information Theory” submitted by Satyabrata Adhikari who got his name registered on 21.12.2002 for the award of Ph.D.(Science) degree of Bengal Engi- neering and Science University, is absolutely based upon his own work under my super- vision in the Department of Mathematics, Bengal Engineering and Science University, Shibpur, Howrah-711103, and that neither this thesis nor any part of it has been sub- mitted for any degree / diploma or any other academic award anywhere before. (Binayak Samaddar Choudhury) Date: Professor Department of Mathematics, Bengal Engineering and Science University, Shibpur Howrah- 711103, West Bengal India iii Acknowledgements A journey is easier when you travel together. Interdependence is certainly more valuable than independence. This thesis is the result of five years of work whereby I have been accompanied and supported by many people.
    [Show full text]
  • Experimental Investigation of High-Dimensional Quantum Key Distribution Protocols with Twisted Photons
    Experimental investigation of high-dimensional quantum key distribution protocols with twisted photons Frédéric Bouchard1, Khabat Heshami2, Duncan England2, Robert Fickler1, Robert W. Boyd1 3 4, Berthold-Georg Englert5 6 7, Luis L. Sánchez-Soto3 8, and Ebrahim Karimi1 3 9 1Department of physics, University of Ottawa, Advanced Research Complex, 25 Templeton, Ottawa ON Canada, K1N 6N5 2National Research Council of Canada, 100 Sussex Drive, Ottawa ON Canada, K1A 0R6 3Max-Planck-Institut für die Physik des Lichts, Staudtstraße 2, 91058 Erlangen, Germany 4Institute of Optics, University of Rochester, Rochester, NY 14627, USA 5Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543, Singapore 6Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore. 7MajuLab, CNRS-UNS-NUS-NTU International Joint Unit, UMI 3654, Singapore. 8Departamento de Óptica, Facultad de Física, Universidad Complutense, 28040 Madrid, Spain 9Department of Physics, Institute for Advanced Studies in Basic Sciences, 45137-66731 Zanjan, Iran. November 30, 2018 Quantum key distribution is on the verge 1 Introduction of real world applications, where perfectly secure information can be distributed Quantum cryptography allows for the broadcast- among multiple parties. Several quantum ing of information between multiple parties in cryptographic protocols have been theo- a perfectly secure manner under the sole as- retically proposed and independently real- sumption that the laws of quantum physics are ized in different experimental conditions. valid [1]. Quantum Key Distribution (QKD) [2, Here, we develop an experimental plat- 3] is arguably the most well-known and studied form based on high-dimensional orbital an- quantum cryptographic protocol to date.
    [Show full text]
  • Quantum Key Distribution Without the Wavefunction
    Quantum key distribution without the wavefunction Gerd Niestegge Zillertalstrasse 39, 81373 M¨unchen, Germany [email protected] Abstract A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and ab- stract access than commonly thought. The results include some gener- alizations for the Hilbert space version of quantum key distribution, but base upon a general non-classical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution and may have more profound implications for the foundations and interpretation of quantum mechanics, quantum information theory, and the philosophical question what actually constitutes physical reality. Key Words: Quantum key distribution, No-cloning theorem, Founda- tions of quantum theory, Quantum logic PACS: 03.67.Dd, 03.65.Ta 1. Introduction In the past thirty years, quantum cryptography has been a large field of exten- sive theoretical and experimental research. Several quantum key distribution protocols have been elaborated, their technical feasibility has been discussed, experimental set-ups and some practical implementations have been realized. Quantum key distribution may be the first commercial application of quantum information theory. A vast amount of papers on these topics are available by now (Each of the two pioneering works [7] and [18] has more than ten thousand and almost eight thousand quotations, respectively; for a review, see [20] or [37]). The present paper, however, focuses on the theoretical foundations and concentrates on the two best-known quantum key distribution protocols.
    [Show full text]
  • Quantum Communication Jubilee of Teleportation
    Quantum Communication Quantum • Rotem Liss and Tal Mor Liss • Rotem and Tal Quantum Communication Celebrating the Silver Jubilee of Teleportation Edited by Rotem Liss and Tal Mor Printed Edition of the Special Issue Published in Entropy www.mdpi.com/journal/entropy Quantum Communication—Celebrating the Silver Jubilee of Teleportation Quantum Communication—Celebrating the Silver Jubilee of Teleportation Editors Rotem Liss Tal Mor MDPI • Basel • Beijing • Wuhan • Barcelona • Belgrade • Manchester • Tokyo • Cluj • Tianjin Editors Rotem Liss Tal Mor Technion–Israel Institute of Technology Technion–Israel Institute of Technology Israel Israel Editorial Office MDPI St. Alban-Anlage 66 4052 Basel, Switzerland This is a reprint of articles from the Special Issue published online in the open access journal Entropy (ISSN 1099-4300) (available at: https://www.mdpi.com/journal/entropy/special issues/Quantum Communication). For citation purposes, cite each article independently as indicated on the article page online and as indicated below: LastName, A.A.; LastName, B.B.; LastName, C.C. Article Title. Journal Name Year, Article Number, Page Range. ISBN 978-3-03943-026-0 (Hbk) ISBN 978-3-03943-027-7 (PDF) c 2020 by the authors. Articles in this book are Open Access and distributed under the Creative Commons Attribution (CC BY) license, which allows users to download, copy and build upon published articles, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications. The book as a whole is distributed by MDPI under the terms and conditions of the Creative Commons license CC BY-NC-ND. Contents About the Editors .............................................
    [Show full text]
  • Quantum Cryptography with Several Cloning Attacks
    Journal of Computer Science 6 (7): 682-686, 2010 ISSN 1549-3636 © 2010 Science Publications Quantum Cryptography with Several Cloning Attacks Mustapha Dehmani, Hamid Ez-Zahraouy and Abdelilah Benyoussef Laboratory of Magnetism and High Energy Physics, Faculty of Science, University Mohammed V-Agdal, Rabat, Morocco Abstract: Problem statement: In a previous research, we investigated the quantum key distribution of the well known BB84 protocol with several intercept and resend attacks. In the present research, we studied the effect of many eavesdroppers cloning attacks of the Bennett-Brassard cryptographic protocol on the quantum error and mutual information between honest parties and information with sender for each eavesdropper. Approach: The quantum error and the mutual information were calculated analytically and computed for arbitrary number of cloning attacks. Our objective in this study was to know if the number of the eavesdroppers and their angle of cloning act on the safety of information. Results: It was found that the quantum error and the secured/no secured transition depend strongly on the number of eavesdropper and their angle of attacks. The particular cases where all eavesdroppers collaborate were also investigated. Conclusion: Furthermore, the cloning attack’s quantum error is lower than the intercept and resends attacks one, which means that the cloning attacks is the optimal one for arbitrary number of eavesdropper. Key words: Quantum, cryptography, cloning, eavesdroppers INTRODUCTION bases of measurement. In impossibility of doing it, the eavesdropper can decide to copy the qubits in an The quantum mechanics is used by Wiesner (1983) optimal approximate way. It is thus essential for the to serve safety of information and he introduces the transmitter and the receiver to know what eavesdropper concept of quantum conjugate coding.
    [Show full text]
  • Quantum Teleportation Nicolas Gisin H
    Quantum teleportation Nicolas Gisin H. Deriedmatten, I. Marcikic, R. Thew, W. Tittel, H. Zbinden Groupe de Physique Appliquée-unité d’Optique Université de Genène • The science and the science-fiction of quantum teleportation • Intuitive and mathematical introduction • What is teleported ? • Q fax? The no-cloning theorem • The “teleportation channel”: Entanglement • The Geneva experiment Geneva University • Telecom wavelengths • Time-bin qubits • partial Bell measurement and tests of Bell inequality • Applications: Quantum Key Distribution GAP Optique • Simplifications, limitations • Q relays and Q repeaters 1 The Geneva Teleportation experiment over 3x2 km Photon = particle (atom) of light Polarized photon Unpolarized photon ≈ ( structured photon) (≈ unstructured ≈ dust) Geneva University GAP Optique 2 55 metres 2 km of 2 km of optical fibre optical fibre Geneva University Two entangled photons GAP Optique 3 55 metres 2 km of Geneva University optical fibre GAP Optique 4 55 metres Bell measurement (partial) the 2 photons Geneva University interact 4 possible results: 0, 90, 180, 270 degrees GAP Optique 5 55 metres Bell measurement (partial) the 2 photons ion Geneva University at interact rel Cor ect erf 4 possible results: P The correlation is independent of the quantum 0, 90, 180, 270 degrees GAP Optique state which may be unknown or even entangled with a fourth photon 6 Quantum teleportation ψ 2 bits U Bell ψ ⊗ EPR = + ⊗ + (c 0 0 c1 1 ) ( 0,0 1,1 ) / 2 11 = ((00,0,0 ++ 11,1,1 )) ⊗ ( c 0 + c 1 ) 2 0 1 Ψ 2 2 123 1 Geneva University + ((00,0,0 −− 11,1,1 )) ⊗ ( c 0 − c 1 ) 2 0 1 σ Ψ 2 2 123 z 1 + ((00,1,1 ++ 11,0,0 )) ⊗ ( c 0 + c 1 ) 2 22 1 0 σ Ψ x GAP Optique 123 1 + ((00,1,1 −− 11,0,0 )) ⊗ ( c 0 − c 1 ) 2 22 1 0 σ Ψ 123 y 7 What is teleported ? According to Aristotle, objects are constituted by matter and form, ie by elementary particles and quantum states.
    [Show full text]
  • Fundamentals of Quantum Information Theory Michael Keyl
    Physics Reports 369 (2002) 431–548 www.elsevier.com/locate/physrep Fundamentals of quantum information theory Michael Keyl TU-Braunschweig, Institute of Mathematical Physics, Mendelssohnstrae 3, D-38106 Braunschweig, Germany Received 3 June 2002 editor: J. Eichler Abstract In this paper we give a self-contained introduction to the conceptional and mathematical foundations of quantum information theory. In the ÿrst part we introduce the basic notions like entanglement, channels, teleportation, etc. and their mathematical description. The second part is focused on a presentation of the quantitative aspects of the theory. Topics discussed in this context include: entanglement measures, chan- nel capacities, relations between both, additivity and continuity properties and asymptotic rates of quantum operations. Finally, we give an overview on some recent developments and open questions. c 2002 Elsevier Science B.V. All rights reserved. PACS: 03.67.−a; 03.65.−w Contents 1. Introduction ........................................................................................ 433 1.1. What is quantum information? ................................................................... 434 1.2. Tasks of quantum information .................................................................... 436 1.3. Experimental realizations ........................................................................ 438 2. Basic concepts ...................................................................................... 439 2.1. Systems, states and e=ects ......................................................................
    [Show full text]
  • Twenty Years of Quantum State Teleportation at the Sapienza University in Rome
    entropy Review Twenty Years of Quantum State Teleportation at the Sapienza University in Rome Francesco De Martini and Fabio Sciarrino * Dipartimento di Fisica—Sapienza Università di Roma, P.le Aldo Moro 5, I-00185 Roma, Italy * Correspondence: [email protected] Received: 31 July 2018; Accepted: 14 July 2019; Published: 6 August 2019 Abstract: Quantum teleportation is one of the most striking consequence of quantum mechanics and is defined as the transmission and reconstruction of an unknown quantum state over arbitrary distances. This concept was introduced for the first time in 1993 by Charles Bennett and coworkers, it has then been experimentally demonstrated by several groups under different conditions of distance, amount of particles and even with feed forward. After 20 years from its first realization, this contribution reviews the experimental implementations realized at the Quantum Optics Group of the University of Rome La Sapienza. Keywords: quantum teleportation; entanglement; photonics; quantum information 1. Introduction Entanglement is today the core of many key discoveries ranging from quantum teleportation [1], to quantum dense coding [2], quantum computation [3–5] and quantum cryptography [6,7]. Quantum communication protocols such as device-independent quantum key distribution [8] are heavily based on entanglement to reach nonlocality-based communication security [9]. The prototype for quantum information transfer using entanglement as a communication channel is the quantum state teleportation (QST) protocol, introduced for the first time in 1993 by Charles Bennett et al. [1], where a sender and a receiver share a maximally entangled state which they can use to perfectly transfer an unknown quantum state. Undoubtedly, quantum teleportation is one of the most counterintituitive consequences of quantum mechanics and it is defined as the transmission and reconstruction over arbitrary distances of an unknown quantum state.
    [Show full text]
  • Entanglement and Quantum Cryptography
    Entanglement and Quantum Cryptography Joonwoo Bae Barcelona, January, 2007 Universitat de Barcelona Departament d’Estructura i Constituents de la Mat`eria Tesis presentada para optar al grado de doctor, January 2007. Programa de doctorado: F´ısicaAvanzada. Bienio: 2003-2005. Thesis advisor: Dr. Antonio Ac´ınDal Maschio( Assistant Professor in ICFO and ICREA Junior) Dear friend, I pray that you may enjoy good health And that all may go well with you, Even as your soul is getting along well. Acknowledgement I am grateful to all the people who helped me throughout my education. My advisor, Antonio Ac´ın,has patiently guided me with his creative insights. In particular, many thanks for his kind care and ceaseless encouragement. He allowed me to have the journey in quantum information when I was just a beginner, and I am grateful for his clear, ideaful, and well-motivated expla- nations. I thank Ignacio Cirac who allowed me to join Barcelona quantum information. Also, thanks for the opportunity to visit MPQ. I thank Jos´e Ignacio Latorre for his kind support as my university tutor. I would also like to thank collaborators, Maciej Lewenstein, Anna San- pera, Emili Bagan, Ramon Mu˜noz-Tapia, Maria Baig, Lluis Masanes, Ujjwal Sen, Aditi Sen De, and Sofyan Iblisdir. I have enjoyed attending discussions; these helped me improve immensely. Many thanks go to Nicolas Gisin, So- fyan Iblisdir, Renato Renner, Andreas Buchleitner, Anna Sanpera, Maciej Lewenstein, and Ramon Mu˜noz-Tapia, for being on the thesis committee. I am very grateful for the people who assisted me while I was traveling as well.
    [Show full text]