134 research outputs found

    Indefinite Causal Order in a Quantum Switch

    Full text link
    In quantum mechanics events can happen in no definite causal order: in practice this can be verified by measuring a causal witness, in the same way that an entanglement witness verifies entanglement. Indefinite causal order can be observed in a quantum switch, where two operations act in a quantum superposition of the two possible orders. Here we realise a photonic quantum switch, where polarisation coherently controls the order of two operations, A^\hat{A} and B^\hat{B}, on the transverse spatial mode of the photons. Our setup avoids the limitations of earlier implementations: the operations cannot be distinguished by spatial or temporal position. We show that our quantum switch has no definite causal order, by constructing a causal witness and measuring its value to be 18 standard deviations beyond the definite-order bound

    Witnessing causal nonseparability

    Full text link
    Our common understanding of the physical world deeply relies on the notion that events are ordered with respect to some time parameter, with past events serving as causes for future ones. Nonetheless, it was recently found that it is possible to formulate quantum mechanics without any reference to a global time or causal structure. The resulting framework includes new kinds of quantum resources that allow performing tasks - in particular, the violation of causal inequalities - which are impossible for events ordered according to a global causal order. However, no physical implementation of such resources is known. Here we show that a recently demonstrated resource for quantum computation - the quantum switch - is a genuine example of "indefinite causal order". We do this by introducing a new tool - the causal witness - which can detect the causal nonseparability of any quantum resource that is incompatible with a definite causal order. We show however that the quantum switch does not violate any causal nequality.Comment: 15 + 12 pages, 5 figures. Published versio

    One-sided Device-Independent Quantum Key Distribution: Security, feasibility, and the connection with steering

    Get PDF
    We analyze the security and feasibility of a protocol for Quantum Key Distribution (QKD), in a context where only one of the two parties trusts his measurement apparatus. This scenario lies naturally between standard QKD, where both parties trust their measurement apparatuses, and Device-Independent QKD (DI-QKD), where neither does, and can be a natural assumption in some practical situations. We show that the requirements for obtaining secure keys are much easier to meet than for DI-QKD, which opens promising experimental opportunities. We clarify the link between the security of this one-sided DI-QKD scenario and the demonstration of quantum steering, in analogy to the link between DI-QKD and the violation of Bell inequalities.Comment: v2 replaces the 3-page abstract posted as v1: our results are now given with all necessary details. v3: published versio

    Security of distributed-phase-reference quantum key distribution

    Full text link
    Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. Since many years, a full security proof of these schemes in a realistic setting has been elusive. For the first time, we solve this long standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result we provide lower bounds on the key generation rate of a variant of the coherent-one-way quantum key distribution protocol. In contrast to standard predictions, it appears to scale quadratically with the system transmittance.Comment: 4 pages + appendix, 4 figure

    Quantifying the nonlocality of GHZ quantum correlations by a bounded communication simulation protocol

    Get PDF
    The simulation of quantum correlations with alternative nonlocal resources, such as classical communication, gives a natural way to quantify their nonlocality. While multipartite nonlocal correlations appear to be useful resources, very little is known on how to simulate multipartite quantum correlations. We present the first known protocol that reproduces 3-partite GHZ correlations with bounded communication: 3 bits in total turn out to be sufficient to simulate all equatorial Von Neumann measurements on the 3-partite GHZ state.Comment: 7 pages, 1 figur

    High rate, long-distance quantum key distribution over 250km of ultra low loss fibres

    Full text link
    We present a fully automated quantum key distribution prototype running at 625 MHz clock rate. Taking advantage of ultra low loss fibres and low-noise superconducting detectors, we can distribute 6,000 secret bits per second over 100 km and 15 bits per second over 250km

    Using quantum key distribution for cryptographic purposes: a survey

    Full text link
    The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8

    Measurement-device-independent entanglement witnesses for all entangled quantum states

    Get PDF
    The problem of demonstrating entanglement is central to quantum information processing applications. Resorting to standard entanglement witnesses requires one to perfectly trust the implementation of the measurements to be performed on the entangled state, which may be an unjustified assumption. Inspired by the recent work of F. Buscemi [Phys. Rev. Lett. 108, 200401 (2012)], we introduce the concept of measurement-device-independent entanglement witnesses (MDI-EWs), which allow one to demonstrate entanglement of all entangled quantum states with untrusted measurement apparatuses. We show how to systematically obtain such MDI-EWs from standard entanglement witnesses. Our construction leads to MDI-EWs that are loss tolerant and can be implemented with current technology

    Practical private database queries based on a quantum key distribution protocol

    Get PDF
    Private queries allow a user Alice to learn an element of a database held by a provider Bob without revealing which element she was interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum key distribution protocol, with changes only in the classical post-processing of the key. This approach makes our scheme both easy to implement and loss-tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved, relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both user and database. We think that there is scope for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.Comment: 7 pages, 2 figures, new and improved version, clarified claims, expanded security discussio

    Arbitrarily loss-tolerant Einstein-Podolsky-Rosen steering allowing a demonstration over 1 km of optical fiber with no detection loophole

    Full text link
    Demonstrating nonclassical effects over longer and longer distances is essential for both quantum technology and fundamental science. The main challenge is loss of photons during propagation, because considering only those cases where photons are detected opens a "detection loophole" in security whenever parties or devices are untrusted. Einstein-Podolsky-Rosen (EPR) steering is equivalent to an entanglement-verification task in which one party (device) is untrusted. We derive arbitrarily loss-tolerant tests, enabling us to perform a detection-loophole-free demonstration of EPR-steering with parties separated by a coiled 1 km optical fiber, with a total loss of 8.9 dB (87%).Comment: Accepted for publication in Physical Review X. This is the accepted versio
    corecore