46 research outputs found
Quantum computing on encrypted data
The ability to perform computations on encrypted data is a powerful tool for
protecting privacy. Recently, protocols to achieve this on classical computing
systems have been found. Here we present an efficient solution to the quantum
analogue of this problem that enables arbitrary quantum computations to be
carried out on encrypted quantum data. We prove that an untrusted server can
implement a universal set of quantum gates on encrypted quantum bits (qubits)
without learning any information about the inputs, while the client, knowing
the decryption key, can easily decrypt the results of the computation. We
experimentally demonstrate, using single photons and linear optics, the
encryption and decryption scheme on a set of gates sufficient for arbitrary
quantum computations. Because our protocol requires few extra resources
compared to other schemes it can be easily incorporated into the design of
future quantum servers. These results will play a key role in enabling the
development of secure distributed quantum systems
Preparation of pure and mixed polarization qubits and the direct measurement of figures of merit
Non-classical joint measurements can hugely improve the efficiency with which
certain figures of merit of quantum systems are measured. We use such a
measurement to determine a particular figure of merit, the purity, for a
polarization qubit. In the process we highlight some of subtleties involved in
common methods for generating decoherence in quantum optics.Comment: 5 pages, 3 figures, 1 tabl
Detection-Loophole-Free Test of Quantum Nonlocality, and Applications
We present a source of entangled photons that violates a Bell inequality free
of the "fair-sampling" assumption, by over 7 standard deviations. This
violation is the first experiment with photons to close the detection loophole,
and we demonstrate enough "efficiency" overhead to eventually perform a fully
loophole-free test of local realism. The entanglement quality is verified by
maximally violating additional Bell tests, testing the upper limit of quantum
correlations. Finally, we use the source to generate secure private quantum
random numbers at rates over 4 orders of magnitude beyond previous experiments.Comment: Main text: 5 pages, 2 figures, 1 table. Supplementary Information: 7
pages, 2 figure
Boundary Effective Field Theory and Trans-Planckian Perturbations: Astrophysical Implications
We contrast two approaches to calculating trans-Planckian corrections to the
inflationary perturbation spectrum: the New Physics Hypersurface [NPH] model,
in which modes are normalized when their physical wavelength first exceeds a
critical value, and the Boundary Effective Field Theory [BEFT] approach, where
the initial conditions for all modes are set at the same time, and modified by
higher dimensional operators enumerated via an effective field theory
calculation. We show that these two approaches -- as currently implemented --
lead to radically different expectations for the trans-Planckian corrections to
the CMB and emphasize that in the BEFT formalism we expect the perturbation
spectrum to be dominated by quantum gravity corrections for all scales shorter
than some critical value. Conversely, in the NPH case the quantum effects only
dominate the longest modes that are typically much larger than the present
horizon size. Furthermore, the onset of the breakdown in the standard
inflationary perturbation calculation predicted by the BEFT formalism is likely
to be associated with a feature in the perturbation spectrum, and we discuss
the observational signatures of this feature in both CMB and large scale
structure observations. Finally, we discuss possible modifications to both
calculational frameworks that would resolve the contradictions identified here.Comment: Reworded commentary, reference added (v2) References added (v3