795 research outputs found
Energy efficient mining on a quantum-enabled blockchain using light
We outline a quantum-enabled blockchain architecture based on a consortium of
quantum servers. The network is hybridised, utilising digital systems for
sharing and processing classical information combined with a fibre--optic
infrastructure and quantum devices for transmitting and processing quantum
information. We deliver an energy efficient interactive mining protocol enacted
between clients and servers which uses quantum information encoded in light and
removes the need for trust in network infrastructure. Instead, clients on the
network need only trust the transparent network code, and that their devices
adhere to the rules of quantum physics. To demonstrate the energy efficiency of
the mining protocol, we elaborate upon the results of two previous experiments
(one performed over 1km of optical fibre) as applied to this work. Finally, we
address some key vulnerabilities, explore open questions, and observe
forward--compatibility with the quantum internet and quantum computing
technologies.Comment: 25 pages, 5 figure
Advances in Quantum Teleportation
Quantum teleportation is one of the most important protocols in quantum
information. By exploiting the physical resource of entanglement, quantum
teleportation serves as a key primitive in a variety of quantum information
tasks and represents an important building block for quantum technologies, with
a pivotal role in the continuing progress of quantum communication, quantum
computing and quantum networks. Here we review the basic theoretical ideas
behind quantum teleportation and its variant protocols. We focus on the main
experiments, together with the technical advantages and disadvantages
associated with the use of the various technologies, from photonic qubits and
optical modes to atomic ensembles, trapped atoms, and solid-state systems.
Analysing the current state-of-the-art, we finish by discussing open issues,
challenges and potential future implementations.Comment: Nature Photonics Review. Comments are welcome. This is a
slightly-expanded arXiv version (14 pages, 5 figure, 1 table
Quantum Communication and Decoherence
In this contribution we will give a brief overview on the methods used to
overcome decoherence in quantum communication protocols. We give an
introduction to quantum error correction, entanglement purification and quantum
cryptography. It is shown that entanglement purification can be used to create
``private entanglement'', which makes it a useful tool for cryptographic
protocols.Comment: 31 pages, 10 figures, LaTeX, book chapter to appear in ``Coherent
Evolution in Noisy Environments'', Lecture Notes in Physics, (Springer
Verlag, Berlin-Heidelberg-New York). Minor typos correcte
Quantum information with continuous variables
Quantum information is a rapidly advancing area of interdisciplinary
research. It may lead to real-world applications for communication and
computation unavailable without the exploitation of quantum properties such as
nonorthogonality or entanglement. We review the progress in quantum information
based on continuous quantum variables, with emphasis on quantum optical
implementations in terms of the quadrature amplitudes of the electromagnetic
field.Comment: accepted for publication in Reviews of Modern Physic
Trusted Noise in Continuous-Variable Quantum Key Distribution: a Threat and a Defense
We address the role of the phase-insensitive trusted preparation and
detection noise in the security of a continuous-variable quantum key
distribution, considering the Gaussian protocols on the basis of coherent and
squeezed states and studying them in the conditions of Gaussian lossy and noisy
channels. The influence of such a noise on the security of Gaussian quantum
cryptography can be crucial, even despite the fact that a noise is trusted, due
to a strongly nonlinear behavior of the quantum entropies involved in the
security analysis. We recapitulate the known effect of the preparation noise in
both direct and reverse-reconciliation protocols, as well as the detection
noise in the reverse-reconciliation scenario. As a new result, we show the
negative role of the trusted detection noise in the direct-reconciliation
scheme. We also describe the role of the trusted preparation or detection noise
added at the reference side of the protocols in improving the robustness of the
protocols to the channel noise, confirming the positive effect for the
coherent-state reverse-reconciliation protocol. Finally, we address the
combined effect of trusted noise added both in the source and the detector.Comment: 25 pages, 9 figure
Quantum Optical Systems for the Implementation of Quantum Information Processing
We review the field of Quantum Optical Information from elementary
considerations through to quantum computation schemes. We illustrate our
discussion with descriptions of experimental demonstrations of key
communication and processing tasks from the last decade and also look forward
to the key results likely in the next decade. We examine both discrete (single
photon) type processing as well as those which employ continuous variable
manipulations. The mathematical formalism is kept to the minimum needed to
understand the key theoretical and experimental results
On the performance of two protocols: SARG04 and BB84
We compare the performance of BB84 and SARG04, the later of which was
proposed by V. Scarani et al., in Phys. Rev. Lett. 92, 057901 (2004).
Specifically, in this paper, we investigate SARG04 with two-way classical
communications and SARG04 with decoy states. In the first part of the paper, we
show that SARG04 with two-way communications can tolerate a higher bit error
rate (19.4% for a one-photon source and 6.56% for a two-photon source) than
SARG04 with one-way communications (10.95% for a one-photon source and 2.71%
for a two-photon source). Also, the upper bounds on the bit error rate for
SARG04 with two-way communications are computed in a closed form by considering
an individual attack based on a general measurement. In the second part of the
paper, we propose employing the idea of decoy states in SARG04 to obtain
unconditional security even when realistic devices are used. We compare the
performance of SARG04 with decoy states and BB84 with decoy states. We find
that the optimal mean-photon number for SARG04 is higher than that of BB84 when
the bit error rate is small. Also, we observe that SARG04 does not achieve a
longer secure distance and a higher key generation rate than BB84, assuming a
typical experimental parameter set.Comment: 48 pages, 10 figures, 1 column, changed Figs. 7 and
- …