82 research outputs found

    Quantum optical coherence can survive photon losses: a continuous-variable quantum erasure correcting code

    Get PDF
    A fundamental requirement for enabling fault-tolerant quantum information processing is an efficient quantum error-correcting code (QECC) that robustly protects the involved fragile quantum states from their environment. Just as classical error-correcting codes are indispensible in today's information technologies, it is believed that QECC will play a similarly crucial role in tomorrow's quantum information systems. Here, we report on the first experimental demonstration of a quantum erasure-correcting code that overcomes the devastating effect of photon losses. Whereas {\it errors} translate, in an information theoretic language, the noise affecting a transmission line, {\it erasures} correspond to the in-line probabilistic loss of photons. Our quantum code protects a four-mode entangled mesoscopic state of light against erasures, and its associated encoding and decoding operations only require linear optics and Gaussian resources. Since in-line attenuation is generally the strongest limitation to quantum communication, much more than noise, such an erasure-correcting code provides a new tool for establishing quantum optical coherence over longer distances. We investigate two approaches for circumventing in-line losses using this code, and demonstrate that both approaches exhibit transmission fidelities beyond what is possible by classical means.Comment: 5 pages, 4 figure

    Many-body localization in a quantum simulator with programmable random disorder

    Get PDF
    When a system thermalizes it loses all local memory of its initial conditions. This is a general feature of open systems and is well described by equilibrium statistical mechanics. Even within a closed (or reversible) quantum system, where unitary time evolution retains all information about its initial state, subsystems can still thermalize using the rest of the system as an effective heat bath. Exceptions to quantum thermalization have been predicted and observed, but typically require inherent symmetries or noninteracting particles in the presence of static disorder. The prediction of many-body localization (MBL), in which disordered quantum systems can fail to thermalize in spite of strong interactions and high excitation energy, was therefore surprising and has attracted considerable theoretical attention. Here we experimentally generate MBL states by applying an Ising Hamiltonian with long-range interactions and programmably random disorder to ten spins initialized far from equilibrium. We observe the essential signatures of MBL: memory retention of the initial state, a Poissonian distribution of energy level spacings, and entanglement growth in the system at long times. Our platform can be scaled to higher numbers of spins, where detailed modeling of MBL becomes impossible due to the complexity of representing such entangled quantum states. Moreover, the high degree of control in our experiment may guide the use of MBL states as potential quantum memories in naturally disordered quantum systems.Comment: 9 pages, 9 figure

    Operational Significance of Discord Consumption: Theory and Experiment

    Full text link
    Coherent interactions that generate negligible entanglement can still exhibit unique quantum behaviour. This observation has motivated a search beyond entanglement for a complete description of all quantum correlations. Quantum discord is a promising candidate. Here, we demonstrate that under certain measurement constraints, discord between bipartite systems can be consumed to encode information that can only be accessed by coherent quantum interactions. The inability to access this information by any other means allows us to use discord to directly quantify this `quantum advantage'. We experimentally encode information within the discordant correlations of two separable Gaussian states. The amount of extra information recovered by coherent interaction is quantified and directly linked with the discord consumed during encoding. No entanglement exists at any point of this experiment. Thus we introduce and demonstrate an operational method to use discord as a physical resource.Comment: 10 pages, 3 figures, updated with Nature Physics Reference, simplified proof in Appendi

    Quantum Communication

    Get PDF
    Quantum communication, and indeed quantum information in general, has changed the way we think about quantum physics. In 1984 and 1991, the first protocol for quantum cryptography and the first application of quantum non-locality, respectively, attracted a diverse field of researchers in theoretical and experimental physics, mathematics and computer science. Since then we have seen a fundamental shift in how we understand information when it is encoded in quantum systems. We review the current state of research and future directions in this new field of science with special emphasis on quantum key distribution and quantum networks.Comment: Submitted version, 8 pg (2 cols) 5 fig

    Quantum Computing

    Full text link
    Quantum mechanics---the theory describing the fundamental workings of nature---is famously counterintuitive: it predicts that a particle can be in two places at the same time, and that two remote particles can be inextricably and instantaneously linked. These predictions have been the topic of intense metaphysical debate ever since the theory's inception early last century. However, supreme predictive power combined with direct experimental observation of some of these unusual phenomena leave little doubt as to its fundamental correctness. In fact, without quantum mechanics we could not explain the workings of a laser, nor indeed how a fridge magnet operates. Over the last several decades quantum information science has emerged to seek answers to the question: can we gain some advantage by storing, transmitting and processing information encoded in systems that exhibit these unique quantum properties? Today it is understood that the answer is yes. Many research groups around the world are working towards one of the most ambitious goals humankind has ever embarked upon: a quantum computer that promises to exponentially improve computational power for particular tasks. A number of physical systems, spanning much of modern physics, are being developed for this task---ranging from single particles of light to superconducting circuits---and it is not yet clear which, if any, will ultimately prove successful. Here we describe the latest developments for each of the leading approaches and explain what the major challenges are for the future.Comment: 26 pages, 7 figures, 291 references. Early draft of Nature 464, 45-53 (4 March 2010). Published version is more up-to-date and has several corrections, but is half the length with far fewer reference

    General immunity and superadditivity of two-way Gaussian quantum cryptography

    Get PDF
    We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks

    Activation of Host Translational Control Pathways by a Viral Developmental Switch

    Get PDF
    In response to numerous signals, latent herpesvirus genomes abruptly switch their developmental program, aborting stable host–cell colonization in favor of productive viral replication that ultimately destroys the cell. To achieve a rapid gene expression transition, newly minted capped, polyadenylated viral mRNAs must engage and reprogram the cellular translational apparatus. While transcriptional responses of viral genomes undergoing lytic reactivation have been amply documented, roles for cellular translational control pathways in enabling the latent-lytic switch have not been described. Using PEL-derived B-cells naturally infected with KSHV as a model, we define efficient reactivation conditions and demonstrate that reactivation substantially changes the protein synthesis profile. New polypeptide synthesis correlates with 4E-BP1 translational repressor inactivation, nuclear PABP accumulation, eIF4F assembly, and phosphorylation of the cap-binding protein eIF4E by Mnk1. Significantly, inhibiting Mnk1 reduces accumulation of the critical viral transactivator RTA through a post-transcriptional mechanism, limiting downstream lytic protein production, and impairs reactivation efficiency. Thus, herpesvirus reactivation from latency activates the host cap-dependent translation machinery, illustrating the importance of translational regulation in implementing new developmental instructions that drastically alter cell fate

    Link-Prediction to Tackle the Boundary Specification Problem in Social Network Surveys

    Get PDF
    Diffusion processes in social networks often cause the emergence of global phenomena from individual behavior within a society. The study of those global phenomena and the simulation of those diffusion processes frequently require a good model of the global network. However, survey data and data from online sources are often restricted to single social groups or features, such as age groups, single schools, companies, or interest groups. Hence, a modeling approach is required that extrapolates the locally restricted data to a global network model. We tackle this Missing Data Problem using Link-Prediction techniques from social network research, network generation techniques from the area of Social Simulation, as well as a combination of both. We found that techniques employing less information may be more adequate to solve this problem, especially when data granularity is an issue. We validated the network models created with our techniques on a number of real-world networks, investigating degree distributions as well as the likelihood of links given the geographical distance between two nodes
    corecore