362 research outputs found
Adaptive weak-value amplification with adjustable postselection
Weak-value amplification (WVA) has recently become an important technique for
parameter estimation, owing to its ability to enhance the signal-to-noise ratio
by amplifying extremely small signals with proper postselection strategies. In
this paper, we propose an adaptive WVA scheme to achieve the highest Fisher
information when using an unbalanced pointer. Different from previous schemes,
the adaptive WVA scheme is associated with a real-time update on the
postselection states with the help of feedback information from the outcomes,
and the "extremely small" condition set on the parameter of interest is
relaxed. By applying this scheme to a time-delay measurement scenario, we show
by numerical simulation that the precision achieved in our scheme is several
times higher than the standard WVA scheme. Our result might open a path for
improving the WVA technique in a more flexible and robust way.Comment: 9 pages, 6 figure
A Robust Interferometry Against Imperfections Base on Weak Value Amplification
The optical interferometry has been widely used in various high precision
applications. Usually, the minimum precision of an interferometry is limited by
various technique noises in practice. To suppress such kind of noises, we
propose a novel scheme, which combines the weak measurement with the standard
interferometry. The proposed scheme dramatically outperforms the standard
interferometry in the signal noise ratio and the robustness against noises
caused by the optical elements' reflections and the offset fluctuation between
two paths. A proof-of-principle experiment is demonstrated to validate the
amplification theory.Comment: 7 pages, 11 figures. submitted to PR
Long-distance continuous-variable quantum key distribution using non-Gaussian state-discrimination detection
We propose a long-distance continuous-variable quantum key distribution
(CVQKD) with four-state protocol using non-Gaussian state-discrimination
detection. A photon subtraction operation, which is deployed at the
transmitter, is used for splitting the signal required for generating the
non-Gaussian operation to lengthen the maximum transmission distance of CVQKD.
Whereby an improved state-discrimination detector, which can be deemed as an
optimized quantum measurement that allows the discrimination of nonorthogonal
coherent states beating the standard quantum limit, is applied at the receiver
to codetermine the measurement result with conventional coherent detector. By
tactfully exploiting multiplexing technique, the resulting signals can be
simultaneously transmitted through an untrusted quantum channel, and
subsequently sent to the state-discrimination detector and coherent detector
respectively. Security analysis shows that the proposed scheme can lengthen the
maximum transmission distance up to hundreds of kilometers. Furthermore, by
taking finite-size effect and composable security into account we obtain the
tightest bound of the secure distance, which is more practical than that
obtained in the asymptotic limit.Comment: 13 pages, 9 figure
Practical security of continuous-variable quantum key distribution with reduced optical attenuation
In a practical CVQKD system, the optical attenuator can adjust the
Gaussian-modulated coherent states and the local oscillator signal to an
optimal value for guaranteeing the security of the system and optimizing the
performance of the system. However, the performance of the optical attenuator
may deteriorate due to the intentional and unintentional damage of the device.
In this paper, we investigate the practical security of a CVQKD system with
reduced optical attenuation. We find that the secret key rate of the system may
be overestimated based on the investigation of parameter estimation under the
effects of reduced optical attenuation. This opens a security loophole for Eve
to successfully perform an intercept-resend attack in a practical CVQKD system.
To close this loophole, we add an optical fuse at Alice's output port and
design a scheme to monitor the level of optical attenuation in real time, which
can make the secret key rate of the system evaluated precisely. The analysis
shows that these countermeasures can effectively resist this potential attack.Comment: 9 pages, 8 figure
Security of Continuous-Variable Quantum Key Distribution with Discrete Modulation against General Attacks
We provide a security analysis of continuous-variable quantum key
distribution (CVQKD) with discrete modulation against general attacks in a
realistic finite-size regime. To realize this goal, we first prove security of
the continuous-variable quantum key distribution protocol with discrete
modulation against collective attacks by using the reliable tomography of the
covariance matrix, leading to the reliable and tight error bounds in the
derived confidence regions. Combining the proof with de Finetti reduction, the
discrete-modulation-based continuous-variable quantum key distribution
(DM-CVQKD) is proved to be secure even exposing to general attacks. Specially,
we use an energy test to truncate the Hilbert space globally to provide
security.Comment: arXiv admin note: substantial text overlap with arXiv:1408.5689 by
other author
Composable security of unidimensional continuous-variable quantum key distribution
We investigate the composable security of unidimensional contin- uous
variable quantum key distribution (UCVQKD), which is based on the Gaussian
modulation of a single quadrature of the coherent-state of light, aiming to
provide a simple implementation of key distribution compared to the
symmetrically modulated Gaussian coherent-state protocols. This protocol
neglects the necessity in one of the quadrature modulation in coherent-states
and hence reduces the system complexity. To clarify the influence of
finite-size effect and the cost of performance degeneration, we establish the
relation- ship of the balanced parameters of the unmodulated quadrature and
estimate the precise secure region. Subsequently, we illustrate the composable
security of the UCVQKD protocol against collective attacks and achieve the
tightest bound of the UCVQKD protocol. Numerical simulations show the
asymptotic secret key rate of the UCVQKD protocol, together with the
symmetrically modulated Gaussian coherent-state protocols
Conceptualization Topic Modeling
Recently, topic modeling has been widely used to discover the abstract topics
in text corpora. Most of the existing topic models are based on the assumption
of three-layer hierarchical Bayesian structure, i.e. each document is modeled
as a probability distribution over topics, and each topic is a probability
distribution over words. However, the assumption is not optimal. Intuitively,
it's more reasonable to assume that each topic is a probability distribution
over concepts, and then each concept is a probability distribution over words,
i.e. adding a latent concept layer between topic layer and word layer in
traditional three-layer assumption. In this paper, we verify the proposed
assumption by incorporating the new assumption in two representative topic
models, and obtain two novel topic models. Extensive experiments were conducted
among the proposed models and corresponding baselines, and the results show
that the proposed models significantly outperform the baselines in terms of
case study and perplexity, which means the new assumption is more reasonable
than traditional one.Comment: 7 page
Ultra-small phase estimation via weak measurement technique with postselection
Weak measurement is a novel technique for parameter estimation with higher
precision. In this paper we develop a general theory for the parameter
estimation based on weak measurement technique with arbitrary postselection.
The previous weak value amplification model and the joint weak measurement
model are two special cases in our theory. Applying the developed theory, the
time-delay estimation is investigated in both theory and experiment.
Experimental results shows that when the time-delay is ultra small, the joint
weak measurement scheme outperforms the weak value amplification scheme, and is
robust against not only the misalignment errors but also the
wavelength-dependence of the optical components. These results are consistent
with the theoretical predictions that has not been verified by any experiment
before.Comment: 8 pages with 8 figure
Unidimensional continuous-variable measurement-device-independent quantum key distribution
Continuous-variable (CV) measurement-device-independent (MDI) quantum key
distribution (QKD) is immune to imperfect detection devices, which can
eliminate all kinds of attacks on practical detectors. Here we first propose a
CV-MDI QKD scheme using unidimensional modulation (UD) in general
phase-sensitive channels. The UD CV-MDI QKD protocol is implemented with the
Gaussian modulation of a single quadrature of the coherent states prepared by
two legitimate senders, aiming to simplify the implementation compared with the
standard, symmetrically Gaussian-modulated CVMDI QKD protocol. Our scheme
reduces the complexity of the system since it ignores the requirement in one of
the quadrature modulations as well as the corresponding parameter estimations.
The security of our proposed scheme is analyzed against collective attacks, and
the finite-size analysis under realistic conditions is taken into account. UD
CV-MDI QKD shows a comparable performance to that of its symmetrical
counterpart, which will facilitate the simplification and practical
implementation of the CV-MDI QKD protocols.Comment: 19 pages, 9 figure
Difference Weak Measurement
We propose the difference weak measurement scheme, and illustrate its
advantages for measuring small longitude phase-shift in high precision.
Compared to the standard interferometry and standard weak measurement schemes,
the proposed scheme has much higher resolution in present of various practical
imperfections, such as alignment error and light intensity variation error.
Moreover, we highlight the advantage of utilizing complex weak value, where its
imaginary part can reduce the harmful effect induced by channel decoherence.
Finally, we propose closed-loop scenario to solve the narrow dynamic range
problem obsessing the current weak measurement schemes. Difference weak
measurement scheme simultaneously fulfills the requirements of high precision,
wide dynamic range and strong robustness, which makes it a powerfully practical
tool for phase-shift measurement and other metrological tasks.Comment: 7 pages, 8 figures, submitted to PR
- …