Recent Development in Quantum Communication

Total Page:16

File Type:pdf, Size:1020Kb

Recent Development in Quantum Communication View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Crossref Review Quantum Information December 2012 Vol. 57 No. 36: 4694–4700 doi: 10.1007/s11434-012-5600-6 Recent development in quantum communication SONG SiYu1,2 & WANG Chuan3* 1State Key Laboratory of Low-Dimensional Quantum Physics and Department of Physics, Tsinghua University, Beijing 100084, China; 2Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China; 3School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China Received September 26, 2012; accepted November 1, 2012 In this review article, we will review the recent process of quantum communications. In the past decades, there are many developments in quantum communication, for instance, quantum key distribution, quantum teleportation, quantum secure direct communication, de- terministic secure quantum communication, quantum secret sharing and so on. And we focus our attention on the recent developments in quantum communication protocols. quantum information, quantum key distribution, quantum teleportation, quantum secure direct communication (QSDC), quantum secret sharing Citation: Song S Y, Wang C. Recent development in quantum communication. Chin Sci Bull, 2012, 57: 4694–4700, doi: 10.1007/s11434-012-5600-6 The principles in quantum mechanics provide novel ways for users which solves the problem for secure distributing of keys quantum information transmission and processing, such as in the classical one-time-pad protocol [7]. However, quan- quantum computation and quantum communication. In the tum communication offers more power than QKD. Quantum past decades, quantum information processing has emerged secret sharing (QSS) distributes secret keys to two or more as a promising technology with strategic importance. Be- shared users [8], which can be viewed as the quantum key cause of the peculiar properties of quantum systems, quantum distribution between multi-users. Quantum teleportation is a computers possess enormous power that is superior to classi- basic ingredient in quantum information architectures [9,10]. cal computer. Using quantum computer, factorization of an The principle of quantum teleportation is to transfer an un- integer can be accomplished in polynomial time with the Shor known state to the legal user at a distant distance. Quantum algorithm [1]. And we can find a marked item with high prob- secure direct communication (QSDC) offers direct communi- ability from an unsorted database with a square-root speedup cation of secret messages between distant users, which saves with the Grover algorithm [2]. In the past decades, the field completely the need for another classical communication as of quantum information processing and quantum computa- in the QKD case. In recent years, there have been consider- tion have attracted much attention [3–6]. With these quantum able developments from researchers in the design of quantum algorithms and a quantum computer, many classical cryptog- communication protocols. In this article, we will focus on raphy protocols can be attacked. Thus it is vital to find new these developments in quantum communications. cryptographic systems for defending against these attacks. In the following years, there are many branches of quan- tum communications that are generated which provides us 1 A brief history and key techniques of quan- secure ways of communications, such as quantum key distri- tum communication bution (QKD), quantum teleportation, quantum secure direct communication, quantum secret sharing and so on. QKD pro- QKD provides an unconditional secure way of information vides a secure way to distribute secret keys between distant exchange between two distant users. The first QKD proto- col is proposed by Bennett and Brassard [7], called the BB84 *Corresponding author (email: [email protected]) protocol. In 1992, Bennett proposed a simplified version of c The Author(s) 2012. This article is published with open access at Springerlink.com csb.scichina.com www.springer.com/scp Song S Y, et al. Chin Sci Bull December (2012) Vol. 57 No. 36 4695 the BB84, called the B92 protocol [11]. Since then there have are discarded. Therefore, ILBED is eliminated by dropping been many important theoretical improvements and experi- the transmitted data in QKD. In QSS, similar to QKD, the mental demonstrations of BB84 and other QKD protocols. transmitted data is also dropped if the eavesdropper has been Quantum teleportation is pertinent to quantum communi- discovered. Avoiding ILBED is also important in QSDC. cation only, and there is no classical counterpart [12]. Quan- This is achieved in QSDC by the essential technique of block tum teleportation transmits an unknown state to a remote transmission. Quantum information carriers are transported place without actually transporting the actual particle. It has in batches. The information carriers consist of a sequence become a basic ingredient in quantum information architec- of single photons, or particles formed by taking one parti- tures [9, 10]. Teleportation includes two legal users and two cle from each Einstein-Podolsky-Rosen (EPR) pairs. The se- communication channels, which are the sender and the re- curity of these information carriers is checked by sampling ceiver, and the quantum channel and the classical channel. measurement. In QKD, secret message is then transmitted by The first quantum teleportation protocol is proposed by Ben- classical transmission of the ciphertext encoded with the keys nett, Brassard, Cr´epeau, Jozsa, Peres, and Wootters [12]. Up generated by QKD. If eavesdropper is found in the quantum to now, there have been many researches on quantum tele- channel, then we withhold the key and ILBED is avoided. portation, some of the recent developments can be found in [13–16]. Also quantum teleportation has been experimen- 1.2 Methods of quantum communication tally implemented with photonic qubits [17–23]. A quantum secret sharing (QSS) protocol is to distribute In this section, we will briefly review several key methods for secret keys among two or more legal users. The shared se- constructing quantum communication protocols. cret can only be recovered by the legal users when they co- (i) Multi-step transmission. If we have an entangled operate together. In 1999, Hillery et al. proposed the first quantum system, we can transmit the system from one user QSS protocol [8] for sharing a secret with three-particle and to another in multiple steps. Because it is entangled, mea- four-particle entangled Greenberger-Horne-Zeilinger (GHZ) surement on part of an entangled quantum system does not states. Up to now, QSS has been extensively studied in both provide the whole information of the quantum system, this theory and experiments, for instance, in [24–27] for theory, provides us with a novel way for constructing quantum com- and in [28–30] for experiments. In parallel, the sharing of a munication protocols. Multi-step transmission was first pro- quantum state, which is called quantum state sharing (QSTS), posed in [37]. It has been extensively used in various protocol has also been developed [29]. QSTS protocols of an arbitrary designs of quantum communications. single-particle state [31, 32], two-particle state [33, 34] and (ii) Block transmission. Block transmission is essential multi-particle state [35, 36] have been studied. for QSDC. In block transmission, the information carriers are Quantum secure direct communication (QSDC) as a new transmitted in a block. For instance in [37], the two ordered way to implement information transmission has attracted particle sequences are transmitted in a block of N particles. much attention. In 2000, the first QSDC scheme was pro- Security is guaranteed by checking on the block of N par- posed [37]. In QSDC, secret information is transmitted ticles which are chosen randomly and measured to give an directly from the sender to the receiver which is different estimated error rate. from the QKD schemes with an advanced encryption process. (iii) Order Rearrangement. Similar to conjugate-basis QSDC has a good application prospect because it is complete method where an eavesdropper does not know which of the quantum but the communication process should be more se- conjugate-basis the legal users are used, one can reorder the cure than the security for QKD. QSDC protocols have been orders of the particles within a block. The order number of proposed with different implementation ways [38–48]. a particle is completely unknown to the eavesdropper. The Here we will discuss some key problems of quantum com- eavesdropper can only guess the order number of the particle. munication. The order rearrangement method was first proposed in [50], called the CORE protocol. The method has been used exten- 1.1 Information leakage before eavesdropper detection sively. The security of classical cryptography relies on mathematical 1.3 Information carriers and measurement complexities. However, the security quantum cryptography relies on the principles of quantum mechanics. Information In the early stage, quantum communication protocols with leakage before eavesdropper detection (ILBED) is essential discrete variables are based on single photons [7, 11] and en- for the security of quantum communication, which has been tangled photon states [51] as the information carriers. Now extensively used in practice, but is recently pointed explicitly multi-photons entangled states are proposed
Recommended publications
  • Unconditional Quantum Teleportation
    R ESEARCH A RTICLES our experiment achieves Fexp 5 0.58 6 0.02 for the field emerging from Bob’s station, thus Unconditional Quantum demonstrating the nonclassical character of this experimental implementation. Teleportation To describe the infinite-dimensional states of optical fields, it is convenient to introduce a A. Furusawa, J. L. Sørensen, S. L. Braunstein, C. A. Fuchs, pair (x, p) of continuous variables of the electric H. J. Kimble,* E. S. Polzik field, called the quadrature-phase amplitudes (QAs), that are analogous to the canonically Quantum teleportation of optical coherent states was demonstrated experi- conjugate variables of position and momentum mentally using squeezed-state entanglement. The quantum nature of the of a massive particle (15). In terms of this achieved teleportation was verified by the experimentally determined fidelity analogy, the entangled beams shared by Alice Fexp 5 0.58 6 0.02, which describes the match between input and output states. and Bob have nonlocal correlations similar to A fidelity greater than 0.5 is not possible for coherent states without the use those first described by Einstein et al.(16). The of entanglement. This is the first realization of unconditional quantum tele- requisite EPR state is efficiently generated via portation where every state entering the device is actually teleported. the nonlinear optical process of parametric down-conversion previously demonstrated in Quantum teleportation is the disembodied subsystems of infinite-dimensional systems (17). The resulting state corresponds to a transport of an unknown quantum state from where the above advantages can be put to use. squeezed two-mode optical field.
    [Show full text]
  • Quantum Error Modelling and Correction in Long Distance Teleportation Using Singlet States by Joe Aung
    Quantum Error Modelling and Correction in Long Distance Teleportation using Singlet States by Joe Aung Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY May 2002 @ Massachusetts Institute of Technology 2002. All rights reserved. Author ................... " Department of Electrical Engineering and Computer Science May 21, 2002 72-1 14 Certified by.................. .V. ..... ..'P . .. ........ Jeffrey H. Shapiro Ju us . tn Professor of Electrical Engineering Director, Research Laboratory for Electronics Thesis Supervisor Accepted by................I................... ................... Arthur C. Smith Chairman, Department Committee on Graduate Students BARKER MASSACHUSE1TS INSTITUTE OF TECHNOLOGY JUL 3 1 2002 LIBRARIES 2 Quantum Error Modelling and Correction in Long Distance Teleportation using Singlet States by Joe Aung Submitted to the Department of Electrical Engineering and Computer Science on May 21, 2002, in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering and Computer Science Abstract Under a multidisciplinary university research initiative (MURI) program, researchers at the Massachusetts Institute of Technology (MIT) and Northwestern University (NU) are devel- oping a long-distance, high-fidelity quantum teleportation system. This system uses a novel ultrabright source of entangled photon pairs and trapped-atom quantum memories. This thesis will investigate the potential teleportation errors involved in the MIT/NU system. A single-photon, Bell-diagonal error model is developed that allows us to restrict possible errors to just four distinct events. The effects of these errors on teleportation, as well as their probabilities of occurrence, are determined.
    [Show full text]
  • Bidirectional Quantum Controlled Teleportation by Using Five-Qubit Entangled State As a Quantum Channel
    Bidirectional Quantum Controlled Teleportation by Using Five-qubit Entangled State as a Quantum Channel Moein Sarvaghad-Moghaddam1,*, Ahmed Farouk2, Hussein Abulkasim3 to each other simultaneously. Unfortunately, the proposed Abstract— In this paper, a novel protocol is proposed for protocol required additional quantum and classical resources so implementing BQCT by using five-qubit entangled states as a that the users required two-qubit measurements and applying quantum channel which in the same time, the communicated users global unitary operations. There are many approaches and can teleport each one-qubit state to each other under permission prototypes for the exploitation of quantum principles to secure of controller. The proposed protocol depends on the Controlled- the communication between two parties and multi-parties [18, NOT operation, proper single-qubit unitary operations and single- 19, 20, 21, 22]. While these approaches used different qubit measurement in the Z-basis and X-basis. The results showed that the protocol is more efficient from the perspective such as techniques for achieving a private communication among lower shared qubits and, single qubit measurements compared to authorized users, but most of them depend on the generation of the previous work. Furthermore, the probability of obtaining secret random keys [23, 2]. In this paper, a novel protocol is Charlie’s qubit by eavesdropper is reduced, and supervisor can proposed for implementing BQCT by using five-qubit control one of the users or every two users. Also, we present a new entanglement state as a quantum channel. In this protocol, users method for transmitting n and m-qubits entangled states between may transmit an unknown one-qubit quantum state to each other Alice and Bob using proposed protocol.
    [Show full text]
  • Arxiv:2009.07590V2 [Quant-Ph] 9 Dec 2020
    Emulating quantum teleportation of a Majorana zero mode qubit He-Liang Huang,1, 2, 3 Marek Naro˙zniak,4, 5 Futian Liang,1, 2, 3 Youwei Zhao,1, 2, 3 Anthony D. Castellano,1, 2, 3 Ming Gong,1, 2, 3 Yulin Wu,1, 2, 3 Shiyu Wang,1, 2, 3 Jin Lin,1, 2, 3 Yu Xu,1, 2, 3 Hui Deng,1, 2, 3 Hao Rong,1, 2, 3 6, 7, 8 1, 2, 3 4, 8, 9, 5 1, 2, 3, 1, 2, 3 Jonathan P. Dowling ∗, Cheng-Zhi Peng, Tim Byrnes, Xiaobo Zhu, † and Jian-Wei Pan 1Hefei National Laboratory for Physical Sciences at the Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei 230026, China 2Shanghai Branch, CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, China 3Shanghai Research Center for Quantum Sciences, Shanghai 201315, China 4New York University Shanghai, 1555 Century Ave, Pudong, Shanghai 200122, China 5Department of Physics, New York University, New York, NY 10003, USA 6Hearne Institute for Theoretical Physics, Department of Physics and Astronomy, Louisiana State University, Baton Rouge, Louisiana 70803, USA 7Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026, China 8NYU-ECNU Institute of Physics at NYU Shanghai, 3663 Zhongshan Road North, Shanghai 200062, China 9State Key Laboratory of Precision Spectroscopy, School of Physical and Material Sciences, East China Normal University, Shanghai 200062, China (Dated: December 10, 2020) Topological quantum computation based on anyons is a promising approach to achieve fault- tolerant quantum computing.
    [Show full text]
  • Quantum Technology: Advances and Trends
    American Journal of Engineering and Applied Sciences Review Quantum Technology: Advances and Trends 1Lidong Wang and 2Cheryl Ann Alexander 1Institute for Systems Engineering Research, Mississippi State University, Vicksburg, Mississippi, USA 2Institute for IT innovation and Smart Health, Vicksburg, Mississippi, USA Article history Abstract: Quantum science and quantum technology have become Received: 30-03-2020 significant areas that have the potential to bring up revolutions in various Revised: 23-04-2020 branches or applications including aeronautics and astronautics, military Accepted: 13-05-2020 and defense, meteorology, brain science, healthcare, advanced manufacturing, cybersecurity, artificial intelligence, etc. In this study, we Corresponding Author: Cheryl Ann Alexander present the advances and trends of quantum technology. Specifically, the Institute for IT innovation and advances and trends cover quantum computers and Quantum Processing Smart Health, Vicksburg, Units (QPUs), quantum computation and quantum machine learning, Mississippi, USA quantum network, Quantum Key Distribution (QKD), quantum Email: [email protected] teleportation and quantum satellites, quantum measurement and quantum sensing, and post-quantum blockchain and quantum blockchain. Some challenges are also introduced. Keywords: Quantum Computer, Quantum Machine Learning, Quantum Network, Quantum Key Distribution, Quantum Teleportation, Quantum Satellite, Quantum Blockchain Introduction information and the computation that is executed throughout a transaction (Humble, 2018). The Tokyo QKD metropolitan area network was There have been advances in developing quantum established in Japan in 2015 through intercontinental equipment, which has been indicated by the number of cooperation. A 650 km QKD network was established successful QKD demonstrations. However, many problems between Washington and Ohio in the USA in 2016; a still need to be fixed though achievements of QKD have plan of a 10000 km QKD backbone network was been showcased.
    [Show full text]
  • Deterministic Quantum Teleportation Received 18 February; Accepted 26 April 2004; Doi:10.1038/Nature02600
    letters to nature Mars concretion systems. Although the analogue is not a perfect 24. Hoffman, N. White Mars: A new model for Mars’ surface and atmosphere based on CO2. Icarus 146, match in every geologic parameter, the mere presence of these 326–342 (2000). 25. Ferna´ndez-Remolar, D. et al. The Tinto River, an extreme acidic environment under control of iron, as spherical haematite concretions implies significant pore volumes of an analog of the Terra Meridiani hematite site of Mars. Planet. Space Sci. 53, 239–248 (2004). moving subsurface fluids through porous rock. Haematite is one of the few minerals found on Mars that can be Acknowledgements We thank the donors of the American Chemical Society Petroleum Research linked directly to water-related processes. Utah haematite concre- Fund, and the Bureau of Land Management-Grand Staircase Escalante National Monument for partial support of this research (to M.A.C. and W.T.P.). The work by J.O. was supported by the tions are similar to the Mars concretions with spherical mor- Spanish Ministry for Science and Technology and the Ramon y Cajal Program. The work by G.K. phology, haematite composition, and loose, weathered was supported by funding from the Italian Space Agency. accumulations. The abundance of quartz in the Utah example could pose challenges for finding spectral matches to the concre- Competing interests statement The authors declare that they have no competing financial tions. However, the similarities and differences of the Utah and interests. Mars haematite concretions should stimulate further investigations. Correspondence and requests for materials should be addressed to M.A.C.
    [Show full text]
  • Arxiv:2009.06242V1 [Quant-Ph] 14 Sep 2020 Special Type of Highly Entangled State
    Quantum teleportation of physical qubits into logical code-spaces Yi-Han Luo,1, 2, ∗ Ming-Cheng Chen,1, 2, ∗ Manuel Erhard,3, 4 Han-Sen Zhong,1, 2 Dian Wu,1, 2 Hao-Yang Tang,1, 2 Qi Zhao,1, 2 Xi-Lin Wang,1, 2 Keisuke Fujii,5 Li Li,1, 2 Nai-Le Liu,1, 2 Kae Nemoto,6, 7 William J. Munro,6, 7 Chao-Yang Lu,1, 2 Anton Zeilinger,3, 4 and Jian-Wei Pan1, 2 1Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, 230026, China 2CAS Centre for Excellence in Quantum Information and Quantum Physics, Hefei, 230026, China 3Austrian Academy of Sciences, Institute for Quantum Optics and Quantum Information (IQOQI), Boltzmanngasse 3, A-1090 Vienna, Austria 4Vienna Center for Quantum Science and Technology (VCQ), Faculty of Physics, University of Vienna, A-1090 Vienna, Austria 5Graduate School of Engineering Science Division of Advanced Electronics and Optical Science Quantum Computing Group, 1-3 Machikaneyama, Toyonaka, Osaka, 560-8531 6NTT Basic Research Laboratories & NTT Research Center for Theoretical Quantum Physics, NTT Corporation, 3-1 Morinosato-Wakamiya, Atsugi-shi, Kanagawa, 243-0198, Japan 7National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan Quantum error correction is an essential tool for reliably performing tasks for processing quantum informa- tion on a large scale. However, integration into quantum circuits to achieve these tasks is problematic when one realizes that non-transverse operations, which are essential for universal quantum computation, lead to the spread of errors.
    [Show full text]
  • Quantum Teleportation of Single-Electron States
    PHYSICAL REVIEW B 101, 195403 (2020) Quantum teleportation of single-electron states Edvin Olofsson ,1 Peter Samuelsson,1 Nicolas Brunner,2 and Patrick P. Potts 1 1Physics Department and NanoLund, Lund University, Box 118, 22100 Lund, Sweden 2Département de Physique Appliquée, Université de Genève, 1211 Genève, Switzerland (Received 21 February 2020; accepted 30 March 2020; published 4 May 2020) We consider a scheme for on-demand teleportation of a dual-rail electron qubit state, based on single-electron sources and detectors. The scheme has a maximal efficiency of 25%, which is limited both by the shared entangled state as well as the Bell-state measurement. We consider two experimental implementations, realizable with current technology. The first relies on surface acoustic waves, where all the ingredients are readily available. The second is based on Lorentzian voltage pulses in quantum Hall edge channels. As single-electron detection is not yet experimentally established in these systems, we consider a tomographic detection of teleportation using current correlators up to (and including) third order. For both implementations, we take into account environmental effects. DOI: 10.1103/PhysRevB.101.195403 I. INTRODUCTION systems, a field referred to as electron quantum optics [22–27], we propose a scheme for performing quantum tele- Quantum teleportation was introduced by Bennett et al. portation of single-electron states. The scheme is based on in 1993 [1] and the first experimental implementations, us- electronic analogs of optical components such as beamsplit- ing photon polarizations, started to appear in the late ’90s ters and phase shifters to manipulate electrons in a dual-rail [2,3].
    [Show full text]
  • Quantum Cryptography and Quantum Entanglement for Engineering Applications
    Quantum Cryptography and Quantum Entanglement for Engineering Applications Quantum Robotics and Autonomy ETM 4990 Mechatronics Dr. Farbod Khoshnoud Electromechanical Engineering Technology Department, College of Engineering, California State Polytechnic University, Pomona 1 Quantum Engineering • Experimental Quantum Entanglement • Experimental Quantum Cryptography • Quantum technologies for robotics and autonomy applications 2 Mechanical Systems + Classical Computers Mechanical Systems + Classical Computers/Technologies = The State of the art 3 Mechanical Systems + Quantum Technologies Mechanical Systems + Quantum Computers/Technologies = Quantum Robotics and Autonomy (e.g., The Alice and Bob Robots) 4 Literature review (Mechanical Systems and/or Education + Quantum Technologies) • Drone-to-Drone Quantum Key distribution (Kwiat, P., et al., 2017). The aim is to enhance quantum capability (not mechanical systems). • Space and underwater Quantum Communications (various references). The aim is enhancing communication not mechanical systems. • Preparing for the quantum revolution -- what is the role of higher education? (https://arxiv.org/abs/2006.16444) • Achieving a quantum smart workforce (https://arxiv.org/abs/2010.13778). 5 Introduction • When quantum technologies/computers become available in a multi-agent robotic system: How the quantum computer is integrated to mechanical systems (e.g., robots, autonomous systems) • Hybrid quantum-classical technologies for autonomous systems – quantum is good for solving some problems and classical
    [Show full text]
  • Quantum Teleportation in Quantum Dots System Abstract
    Quantum Teleportation in Quantum Dots System Hefeng Wang and Sabre Kais∗ Department of Chemistry and Birck Nanotechnology Center, Purdue University, West Lafayette, IN 47907 Abstract We present a model of quantum teleportation protocol based on one-dimensional quantum dots system. Three quantum dots with three electrons are used to perform teleportation, the unknown qubit is encoded using one electron spin on quantum dot A, the other two dots B and C are coupled to form a mixed space-spin entangled state. By choosing the Hamiltonian for the mixed space- spin entangled system, we can filter the space (spin) entanglement to obtain pure spin (space) entanglement, and after a Bell measurement, the unknown qubit is transfered to quantum dot B. Selecting an appropriate Hamiltonian for the quantum gate allows the spin-based information to be transformed into a charge-based information. The possibility of generalizing this model to N-electrons is discussed. The Hamiltonian to construct the CNOT gate, and the pulse sequence to realize the Hamiltonian are discussed in detail. 1 Contents I. Introduction 2 II. Entanglement 4 III. Quantum Teleportation 6 IV. Entanglement in the one-dimensional Hubbard model 9 V. Quantum teleportation in quantum dots 10 VI. Summary 17 References 20 I. INTRODUCTION The special quantum features such as superpositions, interference and entanglement, have revolutionized the field of quantum information and quantum computation. Quantum tele- portation primarily relies on quantum entanglement, which essentially implies an intriguing property that two quantum correlated systems can not be considered independent even if they are far apart. The dream of teleportation is to be able to travel by simply reappearing at some distant location.
    [Show full text]
  • Quantum Entanglement and Teleportation Brent R. Yates Physics 555B Spring 2010
    Quantum Entanglement and Teleportation Brent R. Yates Physics 555B Spring 2010 Abstract Even Einstein has to be wrong sometimes. However, when Einstein was wrong he created a 70 year debate about the strange behavior of quantum mechanics. His debate helped prove topics such as the indeterminacy of particle states, quantum entanglement, and a rather clever use of quantum entanglement known as quantum teleportation. Introduction Quantum mechanics by nature is inherently a statistical field. A particle can never be predicted with absolute certainty, only with certain probabilities of being in a particular state. Even stranger is the idea that a particle is not in any given state but rather all states at once until it is observed. Once observed a particle is then permanently fix in the observed state. Einstein was convinced that quantum mechanics was simply a statistical approximation of a more concrete and precise description of the world. In his attempts to “complete” quantum theory Einstein introduced several ideas such as local hidden variables (parameters that could not be directly seen, but affected and ultimately determined the state of a particle). He tried to use these hidden variables to solve the “problem” of entanglement and to prove that quantum particles indeed always had fixed values. Einstein was ultimately proven wrong, but he was “brilliantly wrong” (1). The disproval of Einstein’s theories ultimately lead to concrete proof of phenomena such as entanglement, and entanglement was then exploited to allow the teleportation of quantum particles. Theoretical Entanglement The basic idea of quantum entanglement is two or more “entangled” particles have direct influence on each other, even at a distance.
    [Show full text]
  • Entanglement and Quantum Key Distribution
    Entanglement and Quantum Key Distribution By Justin Winkler Entanglement in quantum mechanics refers to particles whose individual states cannot be written without reference to the state of other particles. Such states are said to be non-separable, and measurements of the state of one entangled particle alter the state of all entangled particles. This unusual phenomena has applications in quantum teleportation, superdense coding, and various other applications relating to quantum computing. Of some interest is how entanglement can be applied to the field of quantum cryptography, particularly quantum key distribution. Quantum key distribution (QKD) is a technique that allows for secure distribution of keys to be used for encrypting and decrypting messages. The technique of QKD was proposed by Charles H. Bennett and Gilles Brassard in 1984, describing a protocol that would come to be known as BB84 [1]. BB84 was originally described using photon polarization states; no quantum entanglement was required. BB84 requires measurement in two different orthogonal bases. Making use of the case of photon polarization, one basis is typically rectilinear, with vertical polarization at 0° and horizontally polarization at 90°, while the other basis is diagonal, with vertical polarization at 45° and horizontal polarization at 135°. Bit values can then be assigned as, for example, 0 for a vertically polarized photon and 1 for a horizontally polarized photon. To distribute a key, the distributing party, Alice, creates a random bit in a random basis, sending a photon being 1 or 0 in either the rectilinear or diagonal basis. The photon created by Alice is received by Bob, who does not know the basis Alice used.
    [Show full text]