10,244 research outputs found

    Tomography of Quantum Operations

    Get PDF
    Quantum operations describe any state change allowed in quantum mechanics, including the evolution of an open system or the state change due to a measurement. In this letter we present a general method based on quantum tomography for measuring experimentally the matrix elements of an arbitrary quantum operation. As input the method needs only a single entangled state. The feasibility of the technique for the electromagnetic field is shown, and the experimental setup is illustrated based on homodyne tomography of a twin-beam.Comment: Submitted to Phys. Rev. Lett. 2 eps + 1 latex figure

    Nonorthogonal decoy-state Quantum Key Distribution

    Full text link
    In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and heavy loss in transmission line. Decoy states method and nonorthogonal encoding protocol are two important weapons to combat these effects. Here, we combine these two methods and propose a efficient method that can substantially improve the performance of QKD. We find a 79 km increase in transmission distance over the prior record using decoy states method.Comment: 4 pages, 1 figure; Revtex4, submitted to PR

    Strong vertical light output from thin silicon rich oxide/SiO₂ multilayers via in-plane modulation of photonic crystal patterns

    No full text
    Three-dimensional-confined structures with triangular-lattice air-hole photonic crystal patterns were fabricated to enhance the light output from silicon rich oxide/SiO₂multilayer stack. The intensity and profile of spontaneous emission were found to be efficiently modulated by controlling the optical modes of the periodic arrays via varying their structural parameters. With lattice constant/radius of 700nm∕280nm, the photoluminescence intensity was found to be enhanced by nearly nine times in the vertical direction. The mechanisms for different enhancement features have been theoretically analyzed based on coherent scattering and quantum electrodynamic effects, well supporting the experimental observation

    A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution

    Full text link
    We discuss excess noise contributions of a practical balanced homodyne detector in Gaussian-modulated coherent-state (GMCS) quantum key distribution (QKD). We point out the key generated from the original realistic model of GMCS QKD may not be secure. In our refined realistic model, we take into account excess noise due to the finite bandwidth of the homodyne detector and the fluctuation of the local oscillator. A high speed balanced homodyne detector suitable for GMCS QKD in the telecommunication wavelength region is built and experimentally tested. The 3dB bandwidth of the balanced homodyne detector is found to be 104MHz and its electronic noise level is 13dB below the shot noise at a local oscillator level of 8.5*10^8 photon per pulse. The secure key rate of a GMCS QKD experiment with this homodyne detector is expected to reach Mbits/s over a few kilometers.Comment: 22 pages, 11 figure

    Security Analysis of an Untrusted Source for Quantum Key Distribution: Passive Approach

    Get PDF
    We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input pulse. We show that we can characterize the source using a cross-estimate technique without active routing of each pulse. We have derived analytical expressions for the passive estimation scheme. Moreover, using simulations, we have considered four real-life imperfections: Additional loss introduced by the "plug & play" structure, inefficiency of the intensity monitor, noise of the intensity monitor, and statistical fluctuation introduced by finite data size. Our simulation results show that the passive estimate of an untrusted source remains useful in practice, despite these four imperfections. Also, we have performed preliminary experiments, confirming the utility of our proposal in real-life applications. Our proposal makes it possible to implement the "plug & play" QKD with the security guaranteed, while keeping the implementation practical.Comment: 35 pages, 19 figures. Published Versio

    Nonlinear ac response of anisotropic composites

    Full text link
    When a suspension consisting of dielectric particles having nonlinear characteristics is subjected to a sinusoidal (ac) field, the electrical response will in general consist of ac fields at frequencies of the higher-order harmonics. These ac responses will also be anisotropic. In this work, a self-consistent formalism has been employed to compute the induced dipole moment for suspensions in which the suspended particles have nonlinear characteristics, in an attempt to investigate the anisotropy in the ac response. The results showed that the harmonics of the induced dipole moment and the local electric field are both increased as the anisotropy increases for the longitudinal field case, while the harmonics are decreased as the anisotropy increases for the transverse field case. These results are qualitatively understood with the spectral representation. Thus, by measuring the ac responses both parallel and perpendicular to the uniaxial anisotropic axis of the field-induced structures, it is possible to perform a real-time monitoring of the field-induced aggregation process.Comment: 14 pages and 4 eps figure

    Cross-sections for heavy atmospheres: H₂O continuum

    Get PDF
    Most of the exoplanets detected up to now transit in front of their host stars, allowing for the generation of transmission spectra; the study of exoplanet atmospheres relies heavily upon accurate analysis of these spectra. Recent discoveries mean that the study of atmospheric signals from low-mass, temperate worlds are becoming increasingly common. The observed transit depth in these planets is small and more difficult to analyze. Analysis of simulated transmission spectra for two small, temperate planets (GJ 1214 b and K2-18 b) is presented, giving evidence for significant differences in simulated transit depth when the water vapor continuum is accounted for when compared to models omitting it. These models use cross-sections from the CAVIAR lab experiment for the water self-continuum up to 10,000 cm−1; these cross-sections exhibit an inverse relationship with temperature, hence lower-temperature atmospheres are the most significantly impacted. Including the water continuum strongly affects transit depths, increasing values by up to 60 ppm, with the differences for both planets being detectable with the future space missions Ariel and JWST. It is imperative that models of exoplanet spectra move toward adaptive cross-sections, increasingly optimized for H2O-rich atmospheres. This necessitates including absorption contribution from the water vapor continuum into atmospheric simulations

    Quantum secret sharing between m-party and n-party with six states

    Full text link
    We propose a quantum secret sharing scheme between mm-party and nn-party using three conjugate bases, i.e. six states. A sequence of single photons, each of which is prepared in one of the six states, is used directly to encode classical information in the quantum secret sharing process. In this scheme, each of all mm members in group 1 choose randomly their own secret key individually and independently, and then directly encode their respective secret information on the states of single photons via unitary operations, then the last one (the mmth member of group 1) sends 1/n1/n of the resulting qubits to each of group 2. By measuring their respective qubits, all members in group 2 share the secret information shared by all members in group 1. The secret message shared by group 1 and group 2 in such a way that neither subset of each group nor the union of a subset of group 1 and a subset of group 2 can extract the secret message, but each whole group (all the members of each group) can. The scheme is asymptotically 100% in efficiency. It makes the Trojan horse attack with a multi-photon signal, the fake-signal attack with EPR pairs, the attack with single photons, and the attack with invisible photons to be nullification. We show that it is secure and has an advantage over the one based on two conjugate bases. We also give the upper bounds of the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states. This protocol is feasible with present-day technique.Comment: 7 page

    Wearable Sensing for Solid Biomechanics: A Review

    Get PDF
    Understanding the solid biomechanics of the human body is important to the study of structure and function of the body, which can have a range of applications in health care, sport, well-being, and workflow analysis. Conventional laboratory-based biomechanical analysis systems and observation-based tests are designed only to capture brief snapshots of the mechanics of movement. With recent developments in wearable sensing technologies, biomechanical analysis can be conducted in less-constrained environments, thus allowing continuous monitoring and analysis beyond laboratory settings. In this paper, we review the current research in wearable sensing technologies for biomechanical analysis, focusing on sensing and analytics that enable continuous, long-term monitoring of kinematics and kinetics in a free-living environment. The main technical challenges, including measurement drift, external interferences, nonlinear sensor properties, sensor placement, and muscle variations, that can affect the accuracy and robustness of existing methods and different methods for reducing the impact of these sources of errors are described in this paper. Recent developments in motion estimation in kinematics, mobile force sensing in kinematics, sensor reduction for electromyography, and the future direction of sensing for biomechanics are also discussed
    corecore