1,308 research outputs found

    Direct observation of non-classical photon statistics in parametric downconversion

    Full text link
    We employ a high quantum efficiency photon number counter to determine the photon number distribution of the output field from a parametric downconverter. The raw photocount data directly demonstrates that the source is nonclassical by forty standard deviations, and correcting for the quantum efficiency yields a direct observation of oscillations in the photon number distribution

    Demonstration of Einstein-Podolsky-Rosen Steering Using Hybrid Continuous- and Discrete-Variable Entanglement of Light

    Full text link
    Einstein-Podolsky-Rosen steering is known to be a key resource for one-sided device-independent quantum information protocols. Here we demonstrate steering using hybrid entanglement between continuous- and discrete-variable optical qubits. To this end, we report on suitable steering inequalities and detail the implementation and requirements for this demonstration. Steering is experimentally certified by observing a violation by more than 5 standard deviations. Our results illustrate the potential of optical hybrid entanglement for applications in heterogeneous quantum networks that would interconnect disparate physical platforms and encodings

    Performance of various quantum key distribution systems using 1.55 um up-conversion single-photon detectors

    Full text link
    We compare the performance of various quantum key distribution (QKD) systems using a novel single-photon detector, which combines frequency up-conversion in a periodically poled lithium niobate (PPLN) waveguide and a silicon avalanche photodiode (APD). The comparison is based on the secure communication rate as a function of distance for three QKD protocols: the Bennett-Brassard 1984 (BB84), the Bennett, Brassard, and Mermin 1992 (BBM92), and the coherent differential phase shift keying (DPSK). We show that the up-conversion detector allows for higher communication rates and longer communication distances than the commonly used InGaAs/InP APD for all the three QKD protocols.Comment: 9 pages, 9 figure

    Multipartite entanglement verification resistant against dishonest parties

    Full text link
    Future quantum information networks will likely consist of quantum and classical agents, who have the ability to communicate in a variety of ways with trusted and untrusted parties and securely delegate computational tasks to untrusted large-scale quantum computing servers. Multipartite quantum entanglement is a fundamental resource for such a network and hence it is imperative to study the possibility of verifying a multipartite entanglement source in a way that is efficient and provides strong guarantees even in the presence of multiple dishonest parties. In this work, we show how an agent of a quantum network can perform a distributed verification of a multipartite entangled source with minimal resources, which is, nevertheless, resistant against any number of dishonest parties. Moreover, we provide a tight tradeoff between the level of security and the distance between the state produced by the source and the ideal maximally entangled state. Last, by adding the resource of a trusted common random source, we can further provide security guarantees for all honest parties in the quantum network simultaneously.Comment: The statement of Theorem 2 has been revised and a new proof is given. Other results unchange

    Photon counting schemes and performance of non-deterministic nonlinear gates in linear optics

    Get PDF
    The performance of nondeterministic nonlinear gates in linear optics relies on the photon counting scheme being employed and the efficiencies of the detectors in such schemes. We assess the performance of the nonlinear sign gate, which is a critical component of linear optical quantum computing, for two standard photon counting methods: the double detector array and the visible light photon counter. Our analysis shows that the double detector array is insufficient to provide the photon counting capability for effective nondeterministic nonlinear transformations, and we determine the gate fidelity for both photon counting methods as a function of detector efficiencies

    Analysis of Elliptically Polarized Maximally Entangled States for Bell Inequality Tests

    Get PDF
    When elliptically polarized maximally entangled states are considered, i.e., states having a non random phase factor between the two bipartite polarization components, the standard settings used for optimal violation of Bell inequalities are no longer adapted. One way to retrieve the maximal amount of violation is to compensate for this phase while keeping the standard Bell inequality analysis settings. We propose in this paper a general theoretical approach that allows determining and adjusting the phase of elliptically polarized maximally entangled states in order to optimize the violation of Bell inequalities. The formalism is also applied to several suggested experimental phase compensation schemes. In order to emphasize the simplicity and relevance of our approach, we also describe an experimental implementation using a standard Soleil-Babinet phase compensator. This device is employed to correct the phase that appears in the maximally entangled state generated from a type-II nonlinear photon-pair source after the photons are created and distributed over fiber channels.Comment: 8 page

    Quantum Communication

    Get PDF
    Quantum communication, and indeed quantum information in general, has changed the way we think about quantum physics. In 1984 and 1991, the first protocol for quantum cryptography and the first application of quantum non-locality, respectively, attracted a diverse field of researchers in theoretical and experimental physics, mathematics and computer science. Since then we have seen a fundamental shift in how we understand information when it is encoded in quantum systems. We review the current state of research and future directions in this new field of science with special emphasis on quantum key distribution and quantum networks.Comment: Submitted version, 8 pg (2 cols) 5 fig

    Experimental verification of multipartite entanglement in quantum networks

    Get PDF
    Multipartite entangled states are a fundamental resource for a wide range of quantum information processing tasks. In particular, in quantum networks it is essential for the parties involved to be able to verify if entanglement is present before they carry out a given distributed task. Here we design and experimentally demonstrate a protocol that allows any party in a network to check if a source is distributing a genuinely multipartite entangled state, even in the presence of untrusted parties. The protocol remains secure against dishonest behaviour of the source and other parties, including the use of system imperfections to their advantage. We demonstrate the verification protocol in a three- and four-party setting using polarization-entangled photons, highlighting its potential for realistic photonic quantum communication and networking applications.Comment: 8 pages, 4 figure

    MREdictor: a two-step dynamic interaction model that accounts for mRNA accessibility and Pumilio binding accurately predicts microRNA targets.

    Get PDF
    The prediction of pairing between microRNAs (miRNAs) and the miRNA recognition elements (MREs) on mRNAs is expected to be an important tool for understanding gene regulation. Here, we show that mRNAs that contain Pumilio recognition elements (PRE) in the proximity of predicted miRNA-binding sites are more likely to form stable secondary structures within their 3′-UTR, and we demonstrated using a PUM1 and PUM2 double knockdown that Pumilio proteins are general regulators of miRNA accessibility. On the basis of these findings, we developed a computational method for predicting miRNA targets that accounts for the presence of PRE in the proximity of seed-match sequences within poorly accessible structures. Moreover, we implement the miRNA-MRE duplex pairing as a two-step model, which better fits the available structural data. This algorithm, called MREdictor, allows for the identification of miRNA targets in poorly accessible regions and is not restricted to a perfect seed-match; these features are not present in other computational prediction methods
    corecore