3,270 research outputs found
Generation of Kerr non-Gaussian motional states of trapped ions
Non-Gaussian states represent a powerful resource for quantum information
protocols in the continuous variables regime. Cat states, in particular, have
been produced in the motional degree of freedom of trapped ions by controlled
displacements dependent on the ionic internal state. An alternative method
harnesses the Kerr nonlinearity naturally existent in this kind of system. We
present detailed calculations confirming its feasibility for typical
experimental conditions. Additionally, this method permits the generation of
complex non-Gaussian states with negative Wigner functions. Especially,
superpositions of many coherent states are achieved at a fraction of the time
necessary to produce the cat state.Comment: 6 pages, 5 figure
CREATE Cornerstone: Introduction to Scientific Thinking, a New Course for STEM-Interested Freshmen, Demystifies Scientific Thinking through Analysis of Scientific Literature
The Consider, Read, Elucidate hypotheses, Analyze and interpret data, Think of the next Experiment (CREATE) strategy for teaching and learning uses intensive analysis of primary literature to improve students’ critical-thinking and content integration abilities, as well as their self-rated science attitudes, understanding, and confidence. CREATE also supports maturation of undergraduates’ epistemological beliefs about science. This approach, originally tested with upper-level students, has been adapted in Introduction to Scientific Thinking, a new course for freshmen. Results fromthis course’s initial semesters indicate that freshmen in a one-semester introductory course that uses a narrowly focused set of readings to promote development of analytical skills made significant gains in critical-thinking and experimental design abilities. Students also reported significant gains in their ability to think scientifically and understand primary literature. Their perceptions and understanding of science improved, and multiple aspects of their epistemological beliefs about science gained sophistication. The course has no laboratory component, is relatively inexpensive to run, and could be adapted to any area of scientific study
Postponement of dark-count effects in practical quantum key-distribution by two-way post-processing
The influence of imperfections on achievable secret-key generation rates of
quantum key distribution protocols is investigated. As examples of relevant
imperfections, we consider tagging of Alice's qubits and dark counts at Bob's
detectors, while we focus on a powerful eavesdropping strategy which takes full
advantage of tagged signals. It is demonstrated that error correction and
privacy amplification based on a combination of a two-way classical
communication protocol and asymmetric Calderbank-Shor-Steane codes may
significantly postpone the disastrous influence of dark counts. As a result,
the distances are increased considerably over which a secret key can be
distributed in optical fibres reliably. Results are presented for the
four-state, the six-state, and the decoy-state protocols.Comment: Fully revised version (12 pages and 8 figures). Improved figures and
discussion added. To appear in Eur. Phys. J.
Quantum Communication and Computing With Atomic Ensembles Using Light-Shift Imbalance Induced Blockade
Recently, we have shown that for conditions under which the so-called
light-shift imbalance induced blockade (LSIIB) occurs, the collective
excitation of an ensemble of a multi-level atom can be treated as a closed two
level system. In this paper, we describe how such a system can be used as a
quantum bit (qubit) for quantum communication and quantum computing.
Specifically, we show how to realize a C-NOT gate using the collective qubit
and an easily accessible ring cavity, via an extension of the so-called
Pellizzari scheme. We also describe how multiple, small-scale quantum computers
realized using these qubits can be linked effectively for implementing a
quantum internet. We describe the details of the energy levels and transitions
in 87Rb atom that could be used for implementing these schemes.Comment: 16 pages, 9 figures. Accepted in Phys. Rev.
Generation and manipulation of squeezed states of light in optical networks for quantum communication and computation
We analyze a fiber-optic component which could find multiple uses in novel
information-processing systems utilizing squeezed states of light. Our approach
is based on the phenomenon of photon-number squeezing of soliton noise after
the soliton has propagated through a nonlinear optical fiber. Applications of
this component in optical networks for quantum computation and quantum
cryptography are discussed.Comment: 12 pages, 2 figures; submitted to Journal of Optics
Poincare recurrences of Schwarzschild black holes
We discuss massive scalar perturbations of a Schwarzschild black hole. We
argue that quantum effects alter the effective potential near the horizon
resulting in Poincare recurrences in Green functions. Results at the
semi-classical level are independent of the details of the modification of the
potential provided its minimum near the horizon is inversely proportional to
the square of the Poincare time. This modification may be viewed as a change in
the near-horizon geometry. We consider explicitly the examples of a brick wall,
a smooth cutoff and a wormhole-like modification showing that they all lead to
the same results at leading order.Comment: 15 page
Quantum secret sharing between multi-party and multi-party without entanglement
We propose a quantum secret sharing protocol between multi-party ( members
in group 1) and multi-party ( members in group 2) using a sequence of single
photons. These single photons are used directly to encode classical information
in a quantum secret sharing process. In this protocol, all members in group 1
directly encode their respective keys on the states of single photons via
unitary operations, then the last one (the member of group 1) sends
of the resulting qubits to each of group 2. Thus the secret message
shared by all members of group 1 is shared by all members of group 2 in such a
way that no subset of each group is efficient to read the secret message, but
the entire set (not only group 1 but also group 2) is. We also show that it is
unconditionally secure. This protocol is feasible with present-day techniques.Comment: 6 pages, no figur
Topological Protection and Quantum Noiseless Subsystems
Encoding and manipulation of quantum information by means of topological
degrees of freedom provides a promising way to achieve natural fault-tolerance
that is built-in at the physical level. We show that this topological approach
to quantum information processing is a particular instance of the notion of
computation in a noiseless quantum subsystem. The latter then provide the most
general conceptual framework for stabilizing quantum information and for
preserving quantum coherence in topological and geometric systems.Comment: 4 Pages LaTeX. Published versio
Methodology for quantum logic gate constructions
We present a general method to construct fault-tolerant quantum logic gates
with a simple primitive, which is an analog of quantum teleportation. The
technique extends previous results based on traditional quantum teleportation
(Gottesman and Chuang, Nature {\bf 402}, 390, 1999) and leads to
straightforward and systematic construction of many fault-tolerant encoded
operations, including the and Toffoli gates. The technique can also be
applied to the construction of remote quantum operations that cannot be
directly performed.Comment: 17 pages, mypsfig2, revtex. Revised with a different title, a new
appendix for clarifying fault-tolerant preparation of quantum states, and
various minor change
Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals
Most experimental realizations of quantum key distribution are based on the
Bennett-Brassard 1984 (so-called BB84) protocol. In a typical optical
implementation of this scheme, the sender uses an active source to produce the
required BB84 signal states. While active state preparation of BB84 signals is
a simple and elegant solution in principle, in practice passive state
preparation might be desirable in some scenarios, for instance, in those
experimental setups operating at high transmission rates. Passive schemes might
also be more robust against side-channel attacks than active sources. Typical
passive devices involve parametric down-conversion. In this paper, we show that
both coherent light and practical single photon sources are also suitable for
passive generation of BB84 signal states. Our method does not require any
external-driven element, but only linear optical components and photodetectors.
In the case of coherent light, the resulting key rate is similar to the one
delivered by an active source. When the sender uses practical single photon
sources, however, the distance covered by a passive transmitter might be longer
than the one of an active configuration.Comment: 14 pages, 11 figure
- …