389 research outputs found

    Characterization of A Novel Avalanche Photodiode for Single Photon Detection in VIS-NIR Range

    Full text link
    In this work we investigate operation in the Geiger mode of the new single photon avalanche photo diode (SPAD) SAP500 manufactured by Laser Components. This SPAD is sensitive in the range 400-1000nm and has a conventional reach-through structure which ensures good quantum efficiency at the long end of the spectrum. By use of passive and active quenching schemes we investigate detection efficiency, timing jitter, dark counts, afterpulsing, gain and other important parameters and compare them to the "standard" low noise SPAD C30902SH from Perkin Elmer. We conclude that SAP500 offers better combination of detection efficiency, low noise and timing precision

    Conditioned Unitary Transformation on biphotons

    Full text link
    A conditioned unitary transformation (90o90^o polarization rotation) is performed at single-photon level. The transformation is realized by rotating polarization for one of the photons of a polarization-entangled biphoton state (signal photon) by means of a Pockel's cell triggered by the detection of the other (idler) photon after polarization selection. As a result, polarization degree for the signal beam changes from zero to the value given by the idler detector quantum efficiency. This result is relevant to practical realization of various quantum information schemes and can be used for developing a new method of absolute quantum efficiency calibration

    Four Photon Entanglement from Down Conversion

    Get PDF
    Double-pair emission from type-II parametric down conversion results in a highly entangled 4-photon state. Due to interference, which is similar to bunching from thermal emission, this state is not simply a product of two pairs. The observation of this state can be achieved by splitting the two emission modes at beam splitters and subsequent detection of a photon in each output. Here we describe the features of this state and give a Bell theorem for a 4-photon test of local realistic hidden variable theories.Comment: 5 pages, 1 figure, submitted to PR

    How to simulate a quantum computer using negative probabilities

    Full text link
    The concept of negative probabilities can be used to decompose the interaction of two qubits mediated by a quantum controlled-NOT into three operations that require only classical interactions (that is, local operations and classical communication) between the qubits. For a single gate, the probabilities of the three operations are 1, 1, and -1. This decomposition can be applied in a probabilistic simulation of quantum computation by randomly choosing one of the three operations for each gate and assigning a negative statistical weight to the outcomes of sequences with an odd number of negative probability operations. The exponential speed-up of a quantum computer can then be evaluated in terms of the increase in the number of sequences needed to simulate a single operation of the quantum circuit.Comment: 11 pages, including one figure and one table. Full paper version for publication in Journal of Physics A. Clarifications of basic concepts and discussions of possible implications have been adde

    The BioExtract Server: a web-based bioinformatic workflow platform

    Get PDF
    The BioExtract Server (bioextract.org) is an open, web-based system designed to aid researchers in the analysis of genomic data by providing a platform for the creation of bioinformatic workflows. Scientific workflows are created within the system by recording tasks performed by the user. These tasks may include querying multiple, distributed data sources, saving query results as searchable data extracts, and executing local and web-accessible analytic tools. The series of recorded tasks can then be saved as a reproducible, sharable workflow available for subsequent execution with the original or modified inputs and parameter settings. Integrated data resources include interfaces to the National Center for Biotechnology Information (NCBI) nucleotide and protein databases, the European Molecular Biology Laboratory (EMBL-Bank) non-redundant nucleotide database, the Universal Protein Resource (UniProt), and the UniProt Reference Clusters (UniRef) database. The system offers access to numerous preinstalled, curated analytic tools and also provides researchers with the option of selecting computational tools from a large list of web services including the European Molecular Biology Open Software Suite (EMBOSS), BioMoby, and the Kyoto Encyclopedia of Genes and Genomes (KEGG). The system further allows users to integrate local command line tools residing on their own computers through a client-side Java applet

    Quantum Distribution of Gaussian Keys with Squeezed States

    Full text link
    A continuous key distribution scheme is proposed that relies on a pair of canonically conjugate quantum variables. It allows two remote parties to share a secret Gaussian key by encoding it into one of the two quadrature components of a single-mode electromagnetic field. The resulting quantum cryptographic information vs disturbance tradeoff is investigated for an individual attack based on the optimal continuous cloning machine. It is shown that the information gained by the eavesdropper then simply equals the information lost by the receiver.Comment: 5 pages, RevTe

    Quantum interference with photon pairs created in spatially separated sources

    Full text link
    We report on a quantum interference experiment to probe the coherence between two photons coming from non degenerate photon pairs at telecom wavelength created in spatially separated sources. The two photons are mixed on a beam splitter and we observe a reduction of up to 84% in the coincidence count rate when the photons are made indistinguishable. This experiment constitutes an important step towards the realization of quantum teleportation and entanglement swapping with independent sources.Comment: 5 pages, 2 figures, changes according to referee's comments, discussions partly rewritte

    Quantum Cryptography using entangled photons in energy-time Bell states

    Full text link
    We present a setup for quantum cryptography based on photon pairs in energy-time Bell states and show its feasability in a laboratory experiment. Our scheme combines the advantages of using photon pairs instead of faint laser pulses and the possibility to preserve energy-time entanglement over long distances. Moreover, using 4-dimensional energy-time states, no fast random change of bases is required in our setup : Nature itself decides whether to measure in the energy or in the time base.Comment: 4 pages including 2 figure

    Generating and probing a two-photon Fock state with a single atom in a cavity

    Get PDF
    A two-photon Fock state is prepared in a cavity sustaining a "source mode " and a "target mode", with a single circular Rydberg atom. In a third-order Raman process, the atom emits a photon in the target while scattering one photon from the source into the target. The final two-photon state is probed by measuring by Ramsey interferometry the cavity light shifts induced by the target field on the same atom. Extensions to other multi-photon processes and to a new type of micromaser are briefly discussed

    Quantum Physics from A to Z

    Full text link
    This is a collection of statements gathered on the occasion of the Quantum Physics of Nature meeting in Vienna.Comment: 3 pages, Quantum Physics of Nature (QUPON) Conference, Vienna, Austria, May 22nd-26th, 2005; v4: more contribution
    corecore