134 research outputs found
Indefinite Causal Order in a Quantum Switch
In quantum mechanics events can happen in no definite causal order: in
practice this can be verified by measuring a causal witness, in the same way
that an entanglement witness verifies entanglement. Indefinite causal order can
be observed in a quantum switch, where two operations act in a quantum
superposition of the two possible orders. Here we realise a photonic quantum
switch, where polarisation coherently controls the order of two operations,
and , on the transverse spatial mode of the photons. Our
setup avoids the limitations of earlier implementations: the operations cannot
be distinguished by spatial or temporal position. We show that our quantum
switch has no definite causal order, by constructing a causal witness and
measuring its value to be 18 standard deviations beyond the definite-order
bound
Witnessing causal nonseparability
Our common understanding of the physical world deeply relies on the notion
that events are ordered with respect to some time parameter, with past events
serving as causes for future ones. Nonetheless, it was recently found that it
is possible to formulate quantum mechanics without any reference to a global
time or causal structure. The resulting framework includes new kinds of quantum
resources that allow performing tasks - in particular, the violation of causal
inequalities - which are impossible for events ordered according to a global
causal order. However, no physical implementation of such resources is known.
Here we show that a recently demonstrated resource for quantum computation -
the quantum switch - is a genuine example of "indefinite causal order". We do
this by introducing a new tool - the causal witness - which can detect the
causal nonseparability of any quantum resource that is incompatible with a
definite causal order. We show however that the quantum switch does not violate
any causal nequality.Comment: 15 + 12 pages, 5 figures. Published versio
One-sided Device-Independent Quantum Key Distribution: Security, feasibility, and the connection with steering
We analyze the security and feasibility of a protocol for Quantum Key
Distribution (QKD), in a context where only one of the two parties trusts his
measurement apparatus. This scenario lies naturally between standard QKD, where
both parties trust their measurement apparatuses, and Device-Independent QKD
(DI-QKD), where neither does, and can be a natural assumption in some practical
situations. We show that the requirements for obtaining secure keys are much
easier to meet than for DI-QKD, which opens promising experimental
opportunities. We clarify the link between the security of this one-sided
DI-QKD scenario and the demonstration of quantum steering, in analogy to the
link between DI-QKD and the violation of Bell inequalities.Comment: v2 replaces the 3-page abstract posted as v1: our results are now
given with all necessary details. v3: published versio
Security of distributed-phase-reference quantum key distribution
Distributed-phase-reference quantum key distribution stands out for its easy
implementation with present day technology. Since many years, a full security
proof of these schemes in a realistic setting has been elusive. For the first
time, we solve this long standing problem and present a generic method to prove
the security of such protocols against general attacks. To illustrate our
result we provide lower bounds on the key generation rate of a variant of the
coherent-one-way quantum key distribution protocol. In contrast to standard
predictions, it appears to scale quadratically with the system transmittance.Comment: 4 pages + appendix, 4 figure
Quantifying the nonlocality of GHZ quantum correlations by a bounded communication simulation protocol
The simulation of quantum correlations with alternative nonlocal resources,
such as classical communication, gives a natural way to quantify their
nonlocality. While multipartite nonlocal correlations appear to be useful
resources, very little is known on how to simulate multipartite quantum
correlations. We present the first known protocol that reproduces 3-partite GHZ
correlations with bounded communication: 3 bits in total turn out to be
sufficient to simulate all equatorial Von Neumann measurements on the 3-partite
GHZ state.Comment: 7 pages, 1 figur
High rate, long-distance quantum key distribution over 250km of ultra low loss fibres
We present a fully automated quantum key distribution prototype running at
625 MHz clock rate. Taking advantage of ultra low loss fibres and low-noise
superconducting detectors, we can distribute 6,000 secret bits per second over
100 km and 15 bits per second over 250km
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic
viewpoint, is the ability to prove the information-theoretic security (ITS) of
the established keys. As a key establishment primitive, QKD however does not
provide a standalone security service in its own: the secret keys established
by QKD are in general then used by a subsequent cryptographic applications for
which the requirements, the context of use and the security properties can
vary. It is therefore important, in the perspective of integrating QKD in
security infrastructures, to analyze how QKD can be combined with other
cryptographic primitives. The purpose of this survey article, which is mostly
centered on European research results, is to contribute to such an analysis. We
first review and compare the properties of the existing key establishment
techniques, QKD being one of them. We then study more specifically two generic
scenarios related to the practical use of QKD in cryptographic infrastructures:
1) using QKD as a key renewal technique for a symmetric cipher over a
point-to-point link; 2) using QKD in a network containing many users with the
objective of offering any-to-any key establishment service. We discuss the
constraints as well as the potential interest of using QKD in these contexts.
We finally give an overview of challenges relative to the development of QKD
technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special
issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8
Measurement-device-independent entanglement witnesses for all entangled quantum states
The problem of demonstrating entanglement is central to quantum information processing applications. Resorting to standard entanglement witnesses requires one to perfectly trust the implementation of the measurements to be performed on the entangled state, which may be an unjustified assumption. Inspired by the recent work of F. Buscemi [Phys. Rev. Lett. 108, 200401 (2012)], we introduce the concept of measurement-device-independent entanglement witnesses (MDI-EWs), which allow one to demonstrate entanglement of all entangled quantum states with untrusted measurement apparatuses. We show how to systematically obtain such MDI-EWs from standard entanglement witnesses. Our construction leads to MDI-EWs that are loss tolerant and can be implemented with current technology
Practical private database queries based on a quantum key distribution protocol
Private queries allow a user Alice to learn an element of a database held by
a provider Bob without revealing which element she was interested in, while
limiting her information about the other elements. We propose to implement
private queries based on a quantum key distribution protocol, with changes only
in the classical post-processing of the key. This approach makes our scheme
both easy to implement and loss-tolerant. While unconditionally secure private
queries are known to be impossible, we argue that an interesting degree of
security can be achieved, relying on fundamental physical principles instead of
unverifiable security assumptions in order to protect both user and database.
We think that there is scope for such practical private queries to become
another remarkable application of quantum information in the footsteps of
quantum key distribution.Comment: 7 pages, 2 figures, new and improved version, clarified claims,
expanded security discussio
Arbitrarily loss-tolerant Einstein-Podolsky-Rosen steering allowing a demonstration over 1 km of optical fiber with no detection loophole
Demonstrating nonclassical effects over longer and longer distances is
essential for both quantum technology and fundamental science. The main
challenge is loss of photons during propagation, because considering only those
cases where photons are detected opens a "detection loophole" in security
whenever parties or devices are untrusted. Einstein-Podolsky-Rosen (EPR)
steering is equivalent to an entanglement-verification task in which one party
(device) is untrusted. We derive arbitrarily loss-tolerant tests, enabling us
to perform a detection-loophole-free demonstration of EPR-steering with parties
separated by a coiled 1 km optical fiber, with a total loss of 8.9 dB (87%).Comment: Accepted for publication in Physical Review X. This is the accepted
versio
- …