186 research outputs found

    Photon number resolution using a time-multiplexed single-photon detector

    Full text link
    Photon number resolving detectors are needed for a variety of applications including linear-optics quantum computing. Here we describe the use of time-multiplexing techniques that allows ordinary single photon detectors, such as silicon avalanche photodiodes, to be used as photon number-resolving detectors. The ability of such a detector to correctly measure the number of photons for an incident number state is analyzed. The predicted results for an incident coherent state are found to be in good agreement with the results of a proof-of-principle experimental demonstration.Comment: REVTeX4, 6 pages, 8 eps figures, v2: minor changes, v3: changes in response to referee report, appendix added, 1 reference adde

    Interference in dielectrics and pseudo-measurements

    Get PDF
    Inserting a lossy dielectric into one arm of an interference experiment acts in many ways like a measurement. If two entangled photons are passed through the interferometer, a certain amount of information is gained about which path they took, and the interference pattern in a coincidence count measurement is suppressed. However, by inserting a second dielectric into the other arm of the interferometer, one can restore the interference pattern. Two of these pseudo-measurements can thus cancel each other out. This is somewhat analogous to the proposed quantum eraser experiments.Comment: 7 pages RevTeX 3.0 + 2 figures (postscript). Submitted to Phys. Rev.

    Characterizing the self‐potential response to concentration gradients in heterogeneous subsurface environments

    Get PDF
    Self‐potential (SP) measurements can be used to characterize and monitor, in real‐time, fluid movement and behavior in the subsurface. The electrochemical exclusion‐diffusion (EED) potential, one component of SP, arises when concentration gradients exist in porous media. Such concentration gradients are of concern in coastal and contaminated aquifers and oil and gas reservoirs. It is essential that estimates of EED potential are made prior to conducting SP investigations in complex environments with heterogeneous geology and salinity contrasts, such as the UK Chalk coastal aquifer. Here we report repeatable laboratory estimates of the EED potential of chalk and marls using natural groundwater (GW), seawater (SW), deionized (DI) water, and 5 M NaCl. In all cases, the EED potential of chalk was positive (using a GW/SW concentration gradient the EED potential was ca. 14 to 22 mV), with an increased deviation from the diffusion limit at the higher salinity contrast. Despite the relatively small pore size of chalk (ca. 1 ÎŒm), it is dominated by the diffusion potential and has a low exclusion efficiency, even at large salinity contrasts. Marl samples have a higher exclusion efficiency which is of sufficient magnitude to reverse the polarity of the EED potential (using a GW/SW concentration gradient the EED potential was ca. −7 to −12 mV) with respect to the chalk samples. Despite the complexity of the natural samples used, the method produced repeatable results. We also show that first order estimates of the exclusion efficiency can be made using SP logs, supporting the parameterization of the model reported in Graham et al. (2018, https://doi.org/10.1029/2018WR022972), and that derived values for marls are consistent with the laboratory experiments, while values derived for hardgrounds based on field data indicate a similarly high exclusion efficiency. While this method shows promise in the absence of laboratory measurements, more rigorous estimates should be made where possible and can be conducted following the experimental methodology reported here

    Violation of Bell's Inequality with Photons from Independent Sources

    Get PDF
    We report a violation of Bell's inequality using one photon from a parametric down-conversion source and a second photon from an attenuated laser beam. The two photons were entangled at a beam splitter using the post-selection technique of Shih and Alley [Phys. Rev. Lett. 61, 2921 (1988)]. A quantum interference pattern with a visibility of 91% was obtained using the photons from these independent sources, as compared with a visibility of 99.4% using two photons from a central parametric down-conversion source.Comment: 4 pages, 5 figures; minor change

    Quantum Cryptography using entangled photons in energy-time Bell states

    Full text link
    We present a setup for quantum cryptography based on photon pairs in energy-time Bell states and show its feasability in a laboratory experiment. Our scheme combines the advantages of using photon pairs instead of faint laser pulses and the possibility to preserve energy-time entanglement over long distances. Moreover, using 4-dimensional energy-time states, no fast random change of bases is required in our setup : Nature itself decides whether to measure in the energy or in the time base.Comment: 4 pages including 2 figure

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    Quantum-inspired interferometry with chirped laser pulses

    Full text link
    We introduce and implement an interferometric technique based on chirped femtosecond laser pulses and nonlinear optics. The interference manifests as a high-visibility (> 85%) phase-insensitive dip in the intensity of an optical beam when the two interferometer arms are equal to within the coherence length of the light. This signature is unique in classical interferometry, but is a direct analogue to Hong-Ou-Mandel quantum interference. Our technique exhibits all the metrological advantages of the quantum interferometer, but with signals at least 10^7 times greater. In particular we demonstrate enhanced resolution, robustness against loss, and automatic dispersion cancellation. Our interferometer offers significant advantages over previous technologies, both quantum and classical, in precision time delay measurements and biomedical imaging.Comment: 6 pages, 4 figure

    Pulsed energy-time entangled twin-photon source for quantum communication

    Full text link
    A pulsed source of energy-time entangled photon pairs pumped by a standard laser diode is proposed and demonstrated. The basic states can be distinguished by their time of arrival. This greatly simplifies the realization of 2-photon quantum cryptography, Bell state analyzers, quantum teleportation, dense coding, entanglement swapping, GHZ-states sources, etc. Moreover the entanglement is well protected during photon propagation in telecom optical fibers, opening the door to few-photon applications of quantum communication over long distances.Comment: 8 pages, 4 figure

    Quantum cryptography with squeezed states

    Get PDF
    A quantum key distribution scheme based on the use of displaced squeezed vacuum states is presented. The states are squeezed in one of two field quadrature components, and the value of the squeezed component is used to encode a character from an alphabet. The uncertainty relation between quadrature components prevents an eavesdropper from determining both with enough precision to determine the character being sent. Losses degrade the performance of this scheme, but it is possible to use phase-sensitive amplifiers to boost the signal and partially compensate for their effect.Comment: 15 pages, no figure
    • 

    corecore