186 research outputs found
Photon number resolution using a time-multiplexed single-photon detector
Photon number resolving detectors are needed for a variety of applications
including linear-optics quantum computing. Here we describe the use of
time-multiplexing techniques that allows ordinary single photon detectors, such
as silicon avalanche photodiodes, to be used as photon number-resolving
detectors. The ability of such a detector to correctly measure the number of
photons for an incident number state is analyzed. The predicted results for an
incident coherent state are found to be in good agreement with the results of a
proof-of-principle experimental demonstration.Comment: REVTeX4, 6 pages, 8 eps figures, v2: minor changes, v3: changes in
response to referee report, appendix added, 1 reference adde
Interference in dielectrics and pseudo-measurements
Inserting a lossy dielectric into one arm of an interference experiment acts
in many ways like a measurement. If two entangled photons are passed through
the interferometer, a certain amount of information is gained about which path
they took, and the interference pattern in a coincidence count measurement is
suppressed. However, by inserting a second dielectric into the other arm of the
interferometer, one can restore the interference pattern. Two of these
pseudo-measurements can thus cancel each other out. This is somewhat analogous
to the proposed quantum eraser experiments.Comment: 7 pages RevTeX 3.0 + 2 figures (postscript). Submitted to Phys. Rev.
Characterizing the selfâpotential response to concentration gradients in heterogeneous subsurface environments
Selfâpotential (SP) measurements can be used to characterize and monitor, in realâtime, fluid movement and behavior in the subsurface. The electrochemical exclusionâdiffusion (EED) potential, one component of SP, arises when concentration gradients exist in porous media. Such concentration gradients are of concern in coastal and contaminated aquifers and oil and gas reservoirs. It is essential that estimates of EED potential are made prior to conducting SP investigations in complex environments with heterogeneous geology and salinity contrasts, such as the UK Chalk coastal aquifer. Here we report repeatable laboratory estimates of the EED potential of chalk and marls using natural groundwater (GW), seawater (SW), deionized (DI) water, and 5 M NaCl. In all cases, the EED potential of chalk was positive (using a GW/SW concentration gradient the EED potential was ca. 14 to 22 mV), with an increased deviation from the diffusion limit at the higher salinity contrast. Despite the relatively small pore size of chalk (ca. 1 ÎŒm), it is dominated by the diffusion potential and has a low exclusion efficiency, even at large salinity contrasts. Marl samples have a higher exclusion efficiency which is of sufficient magnitude to reverse the polarity of the EED potential (using a GW/SW concentration gradient the EED potential was ca. â7 to â12 mV) with respect to the chalk samples. Despite the complexity of the natural samples used, the method produced repeatable results. We also show that first order estimates of the exclusion efficiency can be made using SP logs, supporting the parameterization of the model reported in Graham et al. (2018, https://doi.org/10.1029/2018WR022972), and that derived values for marls are consistent with the laboratory experiments, while values derived for hardgrounds based on field data indicate a similarly high exclusion efficiency. While this method shows promise in the absence of laboratory measurements, more rigorous estimates should be made where possible and can be conducted following the experimental methodology reported here
Violation of Bell's Inequality with Photons from Independent Sources
We report a violation of Bell's inequality using one photon from a parametric
down-conversion source and a second photon from an attenuated laser beam. The
two photons were entangled at a beam splitter using the post-selection
technique of Shih and Alley [Phys. Rev. Lett. 61, 2921 (1988)]. A quantum
interference pattern with a visibility of 91% was obtained using the photons
from these independent sources, as compared with a visibility of 99.4% using
two photons from a central parametric down-conversion source.Comment: 4 pages, 5 figures; minor change
Quantum Cryptography using entangled photons in energy-time Bell states
We present a setup for quantum cryptography based on photon pairs in
energy-time Bell states and show its feasability in a laboratory experiment.
Our scheme combines the advantages of using photon pairs instead of faint laser
pulses and the possibility to preserve energy-time entanglement over long
distances. Moreover, using 4-dimensional energy-time states, no fast random
change of bases is required in our setup : Nature itself decides whether to
measure in the energy or in the time base.Comment: 4 pages including 2 figure
Estimates for practical quantum cryptography
In this article I present a protocol for quantum cryptography which is secure
against attacks on individual signals. It is based on the Bennett-Brassard
protocol of 1984 (BB84). The security proof is complete as far as the use of
single photons as signal states is concerned. Emphasis is given to the
practicability of the resulting protocol. For each run of the quantum key
distribution the security statement gives the probability of a successful key
generation and the probability for an eavesdropper's knowledge, measured as
change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio
Quantum-inspired interferometry with chirped laser pulses
We introduce and implement an interferometric technique based on chirped
femtosecond laser pulses and nonlinear optics. The interference manifests as a
high-visibility (> 85%) phase-insensitive dip in the intensity of an optical
beam when the two interferometer arms are equal to within the coherence length
of the light. This signature is unique in classical interferometry, but is a
direct analogue to Hong-Ou-Mandel quantum interference. Our technique exhibits
all the metrological advantages of the quantum interferometer, but with signals
at least 10^7 times greater. In particular we demonstrate enhanced resolution,
robustness against loss, and automatic dispersion cancellation. Our
interferometer offers significant advantages over previous technologies, both
quantum and classical, in precision time delay measurements and biomedical
imaging.Comment: 6 pages, 4 figure
Pulsed energy-time entangled twin-photon source for quantum communication
A pulsed source of energy-time entangled photon pairs pumped by a standard
laser diode is proposed and demonstrated. The basic states can be distinguished
by their time of arrival. This greatly simplifies the realization of 2-photon
quantum cryptography, Bell state analyzers, quantum teleportation, dense
coding, entanglement swapping, GHZ-states sources, etc. Moreover the
entanglement is well protected during photon propagation in telecom optical
fibers, opening the door to few-photon applications of quantum communication
over long distances.Comment: 8 pages, 4 figure
Quantum cryptography with squeezed states
A quantum key distribution scheme based on the use of displaced squeezed
vacuum states is presented. The states are squeezed in one of two field
quadrature components, and the value of the squeezed component is used to
encode a character from an alphabet. The uncertainty relation between
quadrature components prevents an eavesdropper from determining both with
enough precision to determine the character being sent. Losses degrade the
performance of this scheme, but it is possible to use phase-sensitive
amplifiers to boost the signal and partially compensate for their effect.Comment: 15 pages, no figure
- âŠ