3,270 research outputs found

    Generation of Kerr non-Gaussian motional states of trapped ions

    Full text link
    Non-Gaussian states represent a powerful resource for quantum information protocols in the continuous variables regime. Cat states, in particular, have been produced in the motional degree of freedom of trapped ions by controlled displacements dependent on the ionic internal state. An alternative method harnesses the Kerr nonlinearity naturally existent in this kind of system. We present detailed calculations confirming its feasibility for typical experimental conditions. Additionally, this method permits the generation of complex non-Gaussian states with negative Wigner functions. Especially, superpositions of many coherent states are achieved at a fraction of the time necessary to produce the cat state.Comment: 6 pages, 5 figure

    CREATE Cornerstone: Introduction to Scientific Thinking, a New Course for STEM-Interested Freshmen, Demystifies Scientific Thinking through Analysis of Scientific Literature

    Full text link
    The Consider, Read, Elucidate hypotheses, Analyze and interpret data, Think of the next Experiment (CREATE) strategy for teaching and learning uses intensive analysis of primary literature to improve students’ critical-thinking and content integration abilities, as well as their self-rated science attitudes, understanding, and confidence. CREATE also supports maturation of undergraduates’ epistemological beliefs about science. This approach, originally tested with upper-level students, has been adapted in Introduction to Scientific Thinking, a new course for freshmen. Results fromthis course’s initial semesters indicate that freshmen in a one-semester introductory course that uses a narrowly focused set of readings to promote development of analytical skills made significant gains in critical-thinking and experimental design abilities. Students also reported significant gains in their ability to think scientifically and understand primary literature. Their perceptions and understanding of science improved, and multiple aspects of their epistemological beliefs about science gained sophistication. The course has no laboratory component, is relatively inexpensive to run, and could be adapted to any area of scientific study

    Postponement of dark-count effects in practical quantum key-distribution by two-way post-processing

    Full text link
    The influence of imperfections on achievable secret-key generation rates of quantum key distribution protocols is investigated. As examples of relevant imperfections, we consider tagging of Alice's qubits and dark counts at Bob's detectors, while we focus on a powerful eavesdropping strategy which takes full advantage of tagged signals. It is demonstrated that error correction and privacy amplification based on a combination of a two-way classical communication protocol and asymmetric Calderbank-Shor-Steane codes may significantly postpone the disastrous influence of dark counts. As a result, the distances are increased considerably over which a secret key can be distributed in optical fibres reliably. Results are presented for the four-state, the six-state, and the decoy-state protocols.Comment: Fully revised version (12 pages and 8 figures). Improved figures and discussion added. To appear in Eur. Phys. J.

    Quantum Communication and Computing With Atomic Ensembles Using Light-Shift Imbalance Induced Blockade

    Full text link
    Recently, we have shown that for conditions under which the so-called light-shift imbalance induced blockade (LSIIB) occurs, the collective excitation of an ensemble of a multi-level atom can be treated as a closed two level system. In this paper, we describe how such a system can be used as a quantum bit (qubit) for quantum communication and quantum computing. Specifically, we show how to realize a C-NOT gate using the collective qubit and an easily accessible ring cavity, via an extension of the so-called Pellizzari scheme. We also describe how multiple, small-scale quantum computers realized using these qubits can be linked effectively for implementing a quantum internet. We describe the details of the energy levels and transitions in 87Rb atom that could be used for implementing these schemes.Comment: 16 pages, 9 figures. Accepted in Phys. Rev.

    Generation and manipulation of squeezed states of light in optical networks for quantum communication and computation

    Get PDF
    We analyze a fiber-optic component which could find multiple uses in novel information-processing systems utilizing squeezed states of light. Our approach is based on the phenomenon of photon-number squeezing of soliton noise after the soliton has propagated through a nonlinear optical fiber. Applications of this component in optical networks for quantum computation and quantum cryptography are discussed.Comment: 12 pages, 2 figures; submitted to Journal of Optics

    Poincare recurrences of Schwarzschild black holes

    Full text link
    We discuss massive scalar perturbations of a Schwarzschild black hole. We argue that quantum effects alter the effective potential near the horizon resulting in Poincare recurrences in Green functions. Results at the semi-classical level are independent of the details of the modification of the potential provided its minimum near the horizon is inversely proportional to the square of the Poincare time. This modification may be viewed as a change in the near-horizon geometry. We consider explicitly the examples of a brick wall, a smooth cutoff and a wormhole-like modification showing that they all lead to the same results at leading order.Comment: 15 page

    Quantum secret sharing between multi-party and multi-party without entanglement

    Full text link
    We propose a quantum secret sharing protocol between multi-party (mm members in group 1) and multi-party (nn members in group 2) using a sequence of single photons. These single photons are used directly to encode classical information in a quantum secret sharing process. In this protocol, all members in group 1 directly encode their respective keys on the states of single photons via unitary operations, then the last one (the mthm^{th} member of group 1) sends 1/n1/n of the resulting qubits to each of group 2. Thus the secret message shared by all members of group 1 is shared by all members of group 2 in such a way that no subset of each group is efficient to read the secret message, but the entire set (not only group 1 but also group 2) is. We also show that it is unconditionally secure. This protocol is feasible with present-day techniques.Comment: 6 pages, no figur

    Topological Protection and Quantum Noiseless Subsystems

    Full text link
    Encoding and manipulation of quantum information by means of topological degrees of freedom provides a promising way to achieve natural fault-tolerance that is built-in at the physical level. We show that this topological approach to quantum information processing is a particular instance of the notion of computation in a noiseless quantum subsystem. The latter then provide the most general conceptual framework for stabilizing quantum information and for preserving quantum coherence in topological and geometric systems.Comment: 4 Pages LaTeX. Published versio

    Methodology for quantum logic gate constructions

    Full text link
    We present a general method to construct fault-tolerant quantum logic gates with a simple primitive, which is an analog of quantum teleportation. The technique extends previous results based on traditional quantum teleportation (Gottesman and Chuang, Nature {\bf 402}, 390, 1999) and leads to straightforward and systematic construction of many fault-tolerant encoded operations, including the π/8\pi/8 and Toffoli gates. The technique can also be applied to the construction of remote quantum operations that cannot be directly performed.Comment: 17 pages, mypsfig2, revtex. Revised with a different title, a new appendix for clarifying fault-tolerant preparation of quantum states, and various minor change

    Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals

    Full text link
    Most experimental realizations of quantum key distribution are based on the Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical implementation of this scheme, the sender uses an active source to produce the required BB84 signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive schemes might also be more robust against side-channel attacks than active sources. Typical passive devices involve parametric down-conversion. In this paper, we show that both coherent light and practical single photon sources are also suitable for passive generation of BB84 signal states. Our method does not require any external-driven element, but only linear optical components and photodetectors. In the case of coherent light, the resulting key rate is similar to the one delivered by an active source. When the sender uses practical single photon sources, however, the distance covered by a passive transmitter might be longer than the one of an active configuration.Comment: 14 pages, 11 figure
    • …
    corecore