32,606 research outputs found
Quantum Optical Systems for the Implementation of Quantum Information Processing
We review the field of Quantum Optical Information from elementary
considerations through to quantum computation schemes. We illustrate our
discussion with descriptions of experimental demonstrations of key
communication and processing tasks from the last decade and also look forward
to the key results likely in the next decade. We examine both discrete (single
photon) type processing as well as those which employ continuous variable
manipulations. The mathematical formalism is kept to the minimum needed to
understand the key theoretical and experimental results
Quantum information with continuous variables
Quantum information is a rapidly advancing area of interdisciplinary
research. It may lead to real-world applications for communication and
computation unavailable without the exploitation of quantum properties such as
nonorthogonality or entanglement. We review the progress in quantum information
based on continuous quantum variables, with emphasis on quantum optical
implementations in terms of the quadrature amplitudes of the electromagnetic
field.Comment: accepted for publication in Reviews of Modern Physic
Quantum walks with encrypted data
In the setting of networked computation, data security can be a significant
concern. Here we consider the problem of allowing a server to remotely
manipulate client supplied data, in such a way that both the information
obtained by the client about the server's operation and the information
obtained by the server about the client's data are significantly limited. We
present a protocol for achieving such functionality in two closely related
models of restricted quantum computation -- the Boson sampling and quantum walk
models. Due to the limited technological requirements of the Boson scattering
model, small scale implementations of this technique are feasible with
present-day technology.Comment: 4 pages, 2 figure
Finite-key security analysis for multilevel quantum key distribution
We present a detailed security analysis of a d-dimensional quantum key
distribution protocol based on two and three mutually unbiased bases (MUBs)
both in an asymptotic and finite key length scenario. The finite secret key
rates are calculated as a function of the length of the sifted key by (i)
generalizing the uncertainly relation-based insight from BB84 to any d-level
2-MUB QKD protocol and (ii) by adopting recent advances in the second-order
asymptotics for finite block length quantum coding (for both d-level 2- and
3-MUB QKD protocols). Since the finite and asymptotic secret key rates increase
with d and the number of MUBs (together with the tolerable threshold) such QKD
schemes could in principle offer an important advantage over BB84. We discuss
the possibility of an experimental realization of the 3-MUB QKD protocol with
the orbital angular momentum degrees of freedom of photons.Comment: v4: close to the published versio
- …