362 research outputs found

    Adaptive weak-value amplification with adjustable postselection

    Full text link
    Weak-value amplification (WVA) has recently become an important technique for parameter estimation, owing to its ability to enhance the signal-to-noise ratio by amplifying extremely small signals with proper postselection strategies. In this paper, we propose an adaptive WVA scheme to achieve the highest Fisher information when using an unbalanced pointer. Different from previous schemes, the adaptive WVA scheme is associated with a real-time update on the postselection states with the help of feedback information from the outcomes, and the "extremely small" condition set on the parameter of interest is relaxed. By applying this scheme to a time-delay measurement scenario, we show by numerical simulation that the precision achieved in our scheme is several times higher than the standard WVA scheme. Our result might open a path for improving the WVA technique in a more flexible and robust way.Comment: 9 pages, 6 figure

    A Robust Interferometry Against Imperfections Base on Weak Value Amplification

    Full text link
    The optical interferometry has been widely used in various high precision applications. Usually, the minimum precision of an interferometry is limited by various technique noises in practice. To suppress such kind of noises, we propose a novel scheme, which combines the weak measurement with the standard interferometry. The proposed scheme dramatically outperforms the standard interferometry in the signal noise ratio and the robustness against noises caused by the optical elements' reflections and the offset fluctuation between two paths. A proof-of-principle experiment is demonstrated to validate the amplification theory.Comment: 7 pages, 11 figures. submitted to PR

    Long-distance continuous-variable quantum key distribution using non-Gaussian state-discrimination detection

    Full text link
    We propose a long-distance continuous-variable quantum key distribution (CVQKD) with four-state protocol using non-Gaussian state-discrimination detection. A photon subtraction operation, which is deployed at the transmitter, is used for splitting the signal required for generating the non-Gaussian operation to lengthen the maximum transmission distance of CVQKD. Whereby an improved state-discrimination detector, which can be deemed as an optimized quantum measurement that allows the discrimination of nonorthogonal coherent states beating the standard quantum limit, is applied at the receiver to codetermine the measurement result with conventional coherent detector. By tactfully exploiting multiplexing technique, the resulting signals can be simultaneously transmitted through an untrusted quantum channel, and subsequently sent to the state-discrimination detector and coherent detector respectively. Security analysis shows that the proposed scheme can lengthen the maximum transmission distance up to hundreds of kilometers. Furthermore, by taking finite-size effect and composable security into account we obtain the tightest bound of the secure distance, which is more practical than that obtained in the asymptotic limit.Comment: 13 pages, 9 figure

    Practical security of continuous-variable quantum key distribution with reduced optical attenuation

    Full text link
    In a practical CVQKD system, the optical attenuator can adjust the Gaussian-modulated coherent states and the local oscillator signal to an optimal value for guaranteeing the security of the system and optimizing the performance of the system. However, the performance of the optical attenuator may deteriorate due to the intentional and unintentional damage of the device. In this paper, we investigate the practical security of a CVQKD system with reduced optical attenuation. We find that the secret key rate of the system may be overestimated based on the investigation of parameter estimation under the effects of reduced optical attenuation. This opens a security loophole for Eve to successfully perform an intercept-resend attack in a practical CVQKD system. To close this loophole, we add an optical fuse at Alice's output port and design a scheme to monitor the level of optical attenuation in real time, which can make the secret key rate of the system evaluated precisely. The analysis shows that these countermeasures can effectively resist this potential attack.Comment: 9 pages, 8 figure

    Security of Continuous-Variable Quantum Key Distribution with Discrete Modulation against General Attacks

    Full text link
    We provide a security analysis of continuous-variable quantum key distribution (CVQKD) with discrete modulation against general attacks in a realistic finite-size regime. To realize this goal, we first prove security of the continuous-variable quantum key distribution protocol with discrete modulation against collective attacks by using the reliable tomography of the covariance matrix, leading to the reliable and tight error bounds in the derived confidence regions. Combining the proof with de Finetti reduction, the discrete-modulation-based continuous-variable quantum key distribution (DM-CVQKD) is proved to be secure even exposing to general attacks. Specially, we use an energy test to truncate the Hilbert space globally to provide security.Comment: arXiv admin note: substantial text overlap with arXiv:1408.5689 by other author

    Composable security of unidimensional continuous-variable quantum key distribution

    Full text link
    We investigate the composable security of unidimensional contin- uous variable quantum key distribution (UCVQKD), which is based on the Gaussian modulation of a single quadrature of the coherent-state of light, aiming to provide a simple implementation of key distribution compared to the symmetrically modulated Gaussian coherent-state protocols. This protocol neglects the necessity in one of the quadrature modulation in coherent-states and hence reduces the system complexity. To clarify the influence of finite-size effect and the cost of performance degeneration, we establish the relation- ship of the balanced parameters of the unmodulated quadrature and estimate the precise secure region. Subsequently, we illustrate the composable security of the UCVQKD protocol against collective attacks and achieve the tightest bound of the UCVQKD protocol. Numerical simulations show the asymptotic secret key rate of the UCVQKD protocol, together with the symmetrically modulated Gaussian coherent-state protocols

    Conceptualization Topic Modeling

    Full text link
    Recently, topic modeling has been widely used to discover the abstract topics in text corpora. Most of the existing topic models are based on the assumption of three-layer hierarchical Bayesian structure, i.e. each document is modeled as a probability distribution over topics, and each topic is a probability distribution over words. However, the assumption is not optimal. Intuitively, it's more reasonable to assume that each topic is a probability distribution over concepts, and then each concept is a probability distribution over words, i.e. adding a latent concept layer between topic layer and word layer in traditional three-layer assumption. In this paper, we verify the proposed assumption by incorporating the new assumption in two representative topic models, and obtain two novel topic models. Extensive experiments were conducted among the proposed models and corresponding baselines, and the results show that the proposed models significantly outperform the baselines in terms of case study and perplexity, which means the new assumption is more reasonable than traditional one.Comment: 7 page

    Ultra-small phase estimation via weak measurement technique with postselection

    Full text link
    Weak measurement is a novel technique for parameter estimation with higher precision. In this paper we develop a general theory for the parameter estimation based on weak measurement technique with arbitrary postselection. The previous weak value amplification model and the joint weak measurement model are two special cases in our theory. Applying the developed theory, the time-delay estimation is investigated in both theory and experiment. Experimental results shows that when the time-delay is ultra small, the joint weak measurement scheme outperforms the weak value amplification scheme, and is robust against not only the misalignment errors but also the wavelength-dependence of the optical components. These results are consistent with the theoretical predictions that has not been verified by any experiment before.Comment: 8 pages with 8 figure

    Unidimensional continuous-variable measurement-device-independent quantum key distribution

    Full text link
    Continuous-variable (CV) measurement-device-independent (MDI) quantum key distribution (QKD) is immune to imperfect detection devices, which can eliminate all kinds of attacks on practical detectors. Here we first propose a CV-MDI QKD scheme using unidimensional modulation (UD) in general phase-sensitive channels. The UD CV-MDI QKD protocol is implemented with the Gaussian modulation of a single quadrature of the coherent states prepared by two legitimate senders, aiming to simplify the implementation compared with the standard, symmetrically Gaussian-modulated CVMDI QKD protocol. Our scheme reduces the complexity of the system since it ignores the requirement in one of the quadrature modulations as well as the corresponding parameter estimations. The security of our proposed scheme is analyzed against collective attacks, and the finite-size analysis under realistic conditions is taken into account. UD CV-MDI QKD shows a comparable performance to that of its symmetrical counterpart, which will facilitate the simplification and practical implementation of the CV-MDI QKD protocols.Comment: 19 pages, 9 figure

    Difference Weak Measurement

    Full text link
    We propose the difference weak measurement scheme, and illustrate its advantages for measuring small longitude phase-shift in high precision. Compared to the standard interferometry and standard weak measurement schemes, the proposed scheme has much higher resolution in present of various practical imperfections, such as alignment error and light intensity variation error. Moreover, we highlight the advantage of utilizing complex weak value, where its imaginary part can reduce the harmful effect induced by channel decoherence. Finally, we propose closed-loop scenario to solve the narrow dynamic range problem obsessing the current weak measurement schemes. Difference weak measurement scheme simultaneously fulfills the requirements of high precision, wide dynamic range and strong robustness, which makes it a powerfully practical tool for phase-shift measurement and other metrological tasks.Comment: 7 pages, 8 figures, submitted to PR
    corecore