193 results on '"Weedbrook, Christian"'
Search Results
2. Continuous-variable source-device-independent quantum key distribution against general attacks
- Author
-
Zhang, Yi-Chen, Chen, Ziyang, Weedbrook, Christian, Yu, Song, and Guo, Hong
- Subjects
Quantum Physics - Abstract
The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions about the source device. However, previous works considered the collective-attack analysis, which inevitably assumes that the states of the source has an identical and independently distributed (i.i.d) structure, and limits the application of the protocol. To solve this problem, we modify the original protocol by exploiting an energy test to monitor the potential high energy attacks an adversary may use. Our analysis removes the assumptions of the light source and the modified protocol can therefore be called source-device-independent protocol. Moreover, we analyze the security of the continuous-variable source-device-independent quantum key distribution protocol with a homodyne-homodyne structure against general coherent attacks by adapting a state-independent entropic uncertainty relation. The simulation results indicate that, in the universal composable security framework, the protocol can still achieve high key rates against coherent attacks under the condition of achievable block lengths., Comment: 11 pages and 4 figures. Comments are welcome
- Published
- 2018
- Full Text
- View/download PDF
3. Advances in Photonic Quantum Sensing
- Author
-
Pirandola, Stefano, Bardhan, Bhaskar Roy, Gehring, Tobias, Weedbrook, Christian, and Lloyd, Seth
- Subjects
Quantum Physics ,Condensed Matter - Other Condensed Matter ,Physics - Applied Physics ,Physics - Optics - Abstract
Quantum sensing has become a mature and broad field. It is generally related with the idea of using quantum resources to boost the performance of a number of practical tasks, including the radar-like detection of faint objects, the readout of information from optical memories or fragile physical systems, and the optical resolution of extremely close point-like sources. Here we first focus on the basic tools behind quantum sensing, discussing the most recent and general formulations for the problems of quantum parameter estimation and hypothesis testing. With this basic background in our hands, we then review emerging applications of quantum sensing in the photonic regime both from a theoretical and experimental point of view. Besides the state-of-the-art, we also discuss open problems and potential next steps., Comment: Review in press on Nature Photonics. This is a preliminary version to be updated after publication. Both manuscript and reference list will be expanded
- Published
- 2018
- Full Text
- View/download PDF
4. Production of photonic universal quantum gates enhanced by machine learning
- Author
-
Sabapathy, Krishna Kumar, Qi, Haoyu, Izaac, Josh, and Weedbrook, Christian
- Subjects
Quantum Physics ,Physics - Optics - Abstract
We introduce photonic architectures for universal quantum computation. The first step is to produce a resource state which is a superposition of the first four Fock states with a probability $\geq 10^{-2}$, an increase by a factor of $10^4$ over standard sequential photon-subtraction techniques. The resource state is produced with near-perfect fidelity from a quantum gadget that uses displaced squeezed vacuum states, interferometers and photon-number resolving detectors. The parameters of this gadget are trained using machine learning algorithms for variational circuits. We discuss in detail various aspects of the non-Gaussian state preparation resulting from the numerical experiments. We then propose a notion of resource farms where these gadgets are stacked in parallel, to increase the success probability further. We find a trade-off between the success probability of the farm, the error tolerance, and the number of gadgets. Using the resource states in conventional gate teleportation techniques we can then implement weak tuneable cubic phase gates. The numerical tools that have been developed could potentially be useful for other applications in photonics as well., Comment: 11 pages, 10 figs. Source code: https://github.com/XanaduAI/constrained-quantum-learning
- Published
- 2018
- Full Text
- View/download PDF
5. Quantum algorithm for non-homogeneous linear partial differential equations
- Author
-
Arrazola, Juan Miguel, Kalajdzievski, Timjan, Weedbrook, Christian, and Lloyd, Seth
- Subjects
Quantum Physics - Abstract
We describe a quantum algorithm for preparing states that encode solutions of non-homogeneous linear partial differential equations. The algorithm is a continuous-variable version of matrix inversion: it efficiently inverts differential operators that are polynomials in the variables and their partial derivatives. The output is a quantum state whose wavefunction is proportional to a specific solution of the non-homogeneous differential equation, which can be measured to reveal features of the solution. The algorithm consists of three stages: preparing fixed resource states in ancillary systems, performing Hamiltonian simulation, and measuring the ancilla systems. The algorithm can be carried out using standard methods for gate decompositions, but we improve this in two ways. First, we show that for a wide class of differential operators, it is possible to derive exact decompositions for the gates employed in Hamiltonian simulation. This avoids the need for costly commutator approximations, reducing gate counts by orders of magnitude. Additionally, we employ methods from machine learning to find explicit circuits that prepare the required resource states. We conclude by studying an example application of the algorithm: solving Poisson's equation in electrostatics., Comment: 9 pages, 6 figures
- Published
- 2018
- Full Text
- View/download PDF
6. Quantum precision of beam pointing
- Author
-
Qi, Haoyu, Brádler, Kamil, Weedbrook, Christian, and Guha, Saikat
- Subjects
Quantum Physics - Abstract
We consider estimating a small transverse displacement of an optical beam over a line-of-sight propagation path: a problem that has numerous important applications ranging from establishing a lasercom link, single-molecule tracking, guided munition, to atomic force microscopy. We establish the ultimate quantum limit of the accuracy of sensing a beam displacement, and quantify the classical-quantum gap. Further, using normal-mode decomposition of the Fresnel propagation kernel, and insights from recent work on entanglement-assisted sensing, we find a near-term realizable multi-spatio-temporal-mode continuous-variable entangled-state probe and a receiver design, which attains the quantum precision limit. We find a Heisenberg-limited sensitivity enhancement in terms of the number of entangled temporal modes, and a curious super-Heisenberg quantum enhanced scaling in terms of the number of entangled spatial modes permitted by the diffraction-limited beam propagation geometry., Comment: 13 pages, 4 figures
- Published
- 2018
7. Terahertz Quantum Cryptography
- Author
-
Ottaviani, Carlo, Woolley, Matthew J., Erementchouk, Misha, Federici, John F., Mazumder, Pinaki, Pirandola, Stefano, and Weedbrook, Christian
- Subjects
Quantum Physics ,Condensed Matter - Other Condensed Matter ,Physics - Optics - Abstract
A well-known empirical rule for the demand of wireless communication systems is that of Edholm's law of bandwidth. It states that the demand for bandwidth in wireless short-range communications doubles every 18 months. With the growing demand for bandwidth and the decreasing cell size of wireless systems, terahertz (THz) communication systems are expected to become increasingly important in modern day applications. With this expectation comes the need for protecting users' privacy and security in the best way possible. With that in mind, we show that quantum key distribution can operate in the THz regime and we derive the relevant secret key rates against realistic collective attacks. In the extended THz range (from 0.1 to 50 THz), we find that below 1 THz, the main detrimental factor is thermal noise, while at higher frequencies it is atmospheric absorption. Our results show that high-rate THz quantum cryptography is possible over distances varying from a few meters using direct reconciliation, to about 220m via reverse reconciliation. We also give a specific example of the physical hardware and architecture that could be used to realize our THz quantum key distribution scheme., Comment: REVTeX. 14 pages. 5 figures. Accepted version
- Published
- 2018
- Full Text
- View/download PDF
8. Implementing quantum algorithms on temporal photonic cluster states
- Author
-
Su, Daiqin, Sabapathy, Krishna Kumar, Myers, Casey R., Qi, Haoyu, Weedbrook, Christian, and Brádler, Kamil
- Subjects
Quantum Physics - Abstract
Implementing quantum algorithms is essential for quantum computation. We study the implementation of three quantum algorithms by performing homodyne measurements on a two-dimensional temporal continuous-variable cluster state. We first review the generation of temporal cluster states and the implementation of gates using the measurement-based model. Alongside this we discuss methods to introduce non-Gaussianity into the cluster states. The first algorithm we consider is Gaussian Boson Sampling in which only Gaussian unitaries need to be implemented. Taking into account the fact that input states are also Gaussian, the errors due to the effect of finite squeezing can be corrected, provided a moderate amount of online squeezing is available. This helps to construct a large Gaussian Boson Sampling machine. The second algorithm is the continuous-variable Instantaneous Quantum Polynomial circuit in which one needs to implement non-Gaussian gates, such as the cubic phase gate. We discuss several methods of implementing the cubic phase gate and fit them into the temporal cluster state architecture. The third algorithm is the continuous-variable version of Grover's search algorithm, the main challenge of which is the implementation of the inversion operator. We propose a method to implement the inversion operator by injecting a resource state into a teleportation circuit. The resource state is simulated using the Strawberry Fields quantum software package., Comment: 22 pages, 29 figures, comments are welcome
- Published
- 2018
- Full Text
- View/download PDF
9. Quantum generative adversarial learning
- Author
-
Lloyd, Seth and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
Generative adversarial networks (GANs) represent a powerful tool for classical machine learning: a generator tries to create statistics for data that mimics those of a true data set, while a discriminator tries to discriminate between the true and fake data. The learning process for generator and discriminator can be thought of as an adversarial game, and under reasonable assumptions, the game converges to the point where the generator generates the same statistics as the true data and the discriminator is unable to discriminate between the true and the generated data. This paper introduces the notion of quantum generative adversarial networks (QuGANs), where the data consists either of quantum states, or of classical data, and the generator and discriminator are equipped with quantum information processors. We show that the unique fixed point of the quantum adversarial game also occurs when the generator produces the same statistics as the data. Since quantum systems are intrinsically probabilistic the proof of the quantum case is different from - and simpler than - the classical case. We show that when the data consists of samples of measurements made on high-dimensional spaces, quantum adversarial networks may exhibit an exponential advantage over classical adversarial networks., Comment: 5 pages, 1 figure
- Published
- 2018
- Full Text
- View/download PDF
10. Strawberry Fields: A Software Platform for Photonic Quantum Computing
- Author
-
Killoran, Nathan, Izaac, Josh, Quesada, Nicolás, Bergholm, Ville, Amy, Matthew, and Weedbrook, Christian
- Subjects
Quantum Physics ,Physics - Computational Physics - Abstract
We introduce Strawberry Fields, an open-source quantum programming architecture for light-based quantum computers, and detail its key features. Built in Python, Strawberry Fields is a full-stack library for design, simulation, optimization, and quantum machine learning of continuous-variable circuits. The platform consists of three main components: (i) an API for quantum programming based on an easy-to-use language named Blackbird; (ii) a suite of three virtual quantum computer backends, built in NumPy and TensorFlow, each targeting specialized uses; and (iii) an engine which can compile Blackbird programs on various backends, including the three built-in simulators, and -- in the near future -- photonic quantum information processors. The library also contains examples of several paradigmatic algorithms, including teleportation, (Gaussian) boson sampling, instantaneous quantum polynomial, Hamiltonian simulation, and variational quantum circuit optimization., Comment: Try the Strawberry Fields Interactive website, located at http://strawberryfields.ai . Source code available at https://github.com/XanaduAI/strawberryfields. Accepted in Quantum
- Published
- 2018
- Full Text
- View/download PDF
11. Quantum key distribution with phase-encoded coherent states: Asymptotic security analysis in thermal-loss channels
- Author
-
Papanastasiou, Panagiotis, Lupo, Cosmo, Weedbrook, Christian, and Pirandola, Stefano
- Subjects
Quantum Physics ,Physics - Optics - Abstract
We consider discrete-alphabet encoding schemes for coherent-state quantum key distribution. The sender encodes the letters of a finite-size alphabet into coherent states whose amplitudes are symmetrically distributed on a circle centered in the origin of the phase space. We study the asymptotic performance of this phase-encoded coherent-state protocol in direct and reverse reconciliation assuming both loss and thermal noise in the communication channel. In particular, we show that using just four phase-shifted coherent states is sufficient for generating secret key rates of the order of $4 \times 10^{-3}$ bits per channel use at about 15 dB loss in the presence of realistic excess noise., Comment: REVTeX. 8 pages. 7 figures
- Published
- 2018
- Full Text
- View/download PDF
12. ON states as resource units for universal quantum computation with photonic architectures
- Author
-
Sabapathy, Krishna Kumar and Weedbrook, Christian
- Subjects
Quantum Physics ,Physics - Optics - Abstract
Universal quantum computation using photonic systems requires gates whose Hamiltonians are of order greater than quadratic in the quadrature operators. We first review previous proposals to implement such gates, where specific non-Gaussian states are used as resources in conjunction with entangling gates such as the continuous-variable versions of C-PHASE and C-NOT gates. We then propose ON states which are superpositions of the vacuum and the $N^{th}$ Fock state, for use as non-Gaussian resource states. We show that ON states can be used to implement the cubic and higher-order quadrature phase gates to first order in gate strength. There are several advantages to this method such as reduced number of superpositions in the resource state preparation and greater control over the final gate. We also introduce useful figures of merit to characterize gate performance. Utilising a supply of on-demand resource states one can potentially scale up implementation to greater accuracy, by repeated application of the basic circuit., Comment: 13 pages, 6 figs, 2 tables. v2: improved presentation, published
- Published
- 2018
- Full Text
- View/download PDF
13. Multiplexed Quantum Random Number Generation
- Author
-
Haylock, Ben, Peace, Daniel, Lenzini, Francesco, Weedbrook, Christian, and Lobino, Mirko
- Subjects
Quantum Physics - Abstract
Fast secure random number generation is essential for high-speed encrypted communication, and is the backbone of information security. Generation of truly random numbers depends on the intrinsic randomness of the process used and is usually limited by electronic bandwidth and signal processing data rates. Here we use a multiplexing scheme to create a fast quantum random number generator structurally tailored to encryption for distributed computing, and high bit-rate data transfer. We use vacuum fluctuations measured by seven homodyne detectors as quantum randomness sources, multiplexed using a single integrated optical device. We obtain a random number generation rate of 3.08 Gbit/s, from only 27.5 MHz of sampled detector bandwidth. Furthermore, we take advantage of the multiplexed nature of our system to demonstrate an unseeded strong extractor with a generation rate of 26 Mbit/s., Comment: 10 pages, 3 figures and 1 table
- Published
- 2018
- Full Text
- View/download PDF
14. Continuous-variable gate decomposition for the Bose-Hubbard model
- Author
-
Kalajdzievski, Timjan, Weedbrook, Christian, and Rebentrost, Patrick
- Subjects
Quantum Physics - Abstract
In this work, we decompose the time-evolution of the Bose-Hubbard model into a sequence of logic gates that can be implemented on a continuous-variable photonic quantum computer. We examine the structure of the circuit that represents this time-evolution for one-dimensional and two-dimensional lattices. The elementary gates needed for the implementation are counted as a function of lattice size. We also include the contribution of the leading dipole interaction term which may be added to the Hamiltonian, and its corresponding circuit., Comment: 11 pages, 1 Figures
- Published
- 2018
- Full Text
- View/download PDF
15. Correcting finite squeezing errors in continuous-variable cluster states
- Author
-
Su, Daiqin, Weedbrook, Christian, and Brádler, Kamil
- Subjects
Quantum Physics - Abstract
We introduce an efficient scheme to correct errors due to the finite squeezing effects in continuous-variable cluster states. Specifically, we consider the typical situation where the class of algorithms consists of input states that are known. By using the knowledge of the input states, we can diagnose exactly what errors have occurred and correct them in the context of temporal continuous-variable cluster states. We illustrate the error correction scheme for single-mode and two-mode unitaries implemented by spatial continuous-variable cluster states. We show that there is no resource advantage to error correcting multimode unitaries implemented by spatial cluster states. However, the generalization to multimode unitaries implemented by temporal continuous-variable cluster states shows significant practical advantages since it costs only a finite number of optical elements (squeezer, beam splitter, etc)., Comment: 17 pages, 4 figures
- Published
- 2018
- Full Text
- View/download PDF
16. Quantum supremacy and high-dimensional integration
- Author
-
Arrazola, Juan Miguel, Rebentrost, Patrick, and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
We establish a connection between continuous-variable quantum computing and high-dimensional integration by showing that the outcome probabilities of continuous-variable instantaneous quantum polynomial (CV-IQP) circuits are given by integrals of oscillating functions in large dimensions. We prove two results related to the classical hardness of evaluating these integrals: (i) we show that there exist circuits such that these integrals are approximations of a weighted sum of #P-hard problems and (ii) we prove that calculating these integrals is as hard as calculating integrals of arbitrary bounded functions. We then leverage these results to show that, given a plausible conjecture about the hardness of computing the integrals, approximate sampling from CV-IQP circuits cannot be done in polynomial time on a classical computer unless the polynomial hierarchy collapses to the third level. Our results hold even in the presence of finite squeezing and limited measurement precision, without an explicit need for fault-tolerance., Comment: 11 pages, 3 Figures
- Published
- 2017
17. Gaussian Boson Sampling for perfect matchings of arbitrary graphs
- Author
-
Brádler, Kamil, Dallaire-Demers, Pierre-Luc, Rebentrost, Patrick, Su, Daiqin, and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
A famously hard graph problem with a broad range of applications is computing the number of perfect matchings, that is the number of unique and complete pairings of the vertices of a graph. We propose a method to estimate the number of perfect matchings of undirected graphs based on the relation between Gaussian Boson Sampling and graph theory. The probability of measuring zero or one photons in each output mode is directly related to the hafnian of the adjacency matrix, and thus to the number of perfect matchings of a graph. We present encodings of the adjacency matrix of a graph into a Gaussian state and show strategies to boost the sampling success probability. With our method, a Gaussian Boson Sampling device can be used to estimate the number of perfect matchings significantly faster and with lower energy consumption compared to a classical computer., Comment: 17 pages, 10 figures
- Published
- 2017
- Full Text
- View/download PDF
18. Continuous-variable quantum key distribution in fast fading channels
- Author
-
Papanastasiou, Panagiotis, Weedbrook, Christian, and Pirandola, Stefano
- Subjects
Quantum Physics - Abstract
We investigate the performance of several continuous-variable quantum key distribution protocols in the presence of fading channels. These are lossy channels whose transmissivity changes according to a probability distribution. This is typical in communication scenarios where remote parties are connected by free-space links subject to atmospheric turbulence. In this work, we assume the worst-case scenario where an eavesdropper has full control of a fast fading process, so that she chooses the instantaneous transmissivity of a channel, while the remote parties can only detect the mean statistical process. In our study, we consider coherent-state protocols run in various configurations, including the one-way switching protocol in reverse reconciliation, the measurement-device-independent protocol in the symmetric configuration and a three-party measurement-device-independent network. We show that, regardless of the advantage given to the eavesdropper (full control of fading), these protocols can still achieve high rates., Comment: REVTeX. 7 pages. 9 figures
- Published
- 2017
- Full Text
- View/download PDF
19. Quantum Hopfield neural network
- Author
-
Rebentrost, Patrick, Bromley, Thomas R., Weedbrook, Christian, and Lloyd, Seth
- Subjects
Quantum Physics - Abstract
Quantum computing allows for the potential of significant advancements in both the speed and the capacity of widely used machine learning techniques. Here we employ quantum algorithms for the Hopfield network, which can be used for pattern recognition, reconstruction, and optimization as a realization of a content-addressable memory system. We show that an exponentially large network can be stored in a polynomial number of quantum bits by encoding the network into the amplitudes of quantum states. By introducing a classical technique for operating the Hopfield network, we can leverage quantum algorithms to obtain a quantum computational complexity that is logarithmic in the dimension of the data. We also present an application of our method as a genetic sequence recognizer., Comment: 13 pages, 3 figures, final version
- Published
- 2017
- Full Text
- View/download PDF
20. Continuous-variable QKD over 50km commercial fiber
- Author
-
Zhang, Yi-Chen, Li, Zhengyu, Chen, Ziyang, Weedbrook, Christian, Zhao, Yijia, Wang, Xiangyu, Huang, Yundi, Xu, Chunchao, Zhang, Xiaoxiong, Wang, Zhenya, Li, Mei, Zhang, Xueying, Zheng, Ziyong, Chu, Binjie, Gao, Xinyu, Meng, Nan, Cai, Weiwen, Wang, Zheng, Wang, Gan, Yu, Song, and Guo, Hong
- Subjects
Quantum Physics - Abstract
The continuous-variable version of quantum key distribution (QKD) offers the advantages (over discrete-variable systems) of higher secret key rates in metropolitan areas as well as the use of standard telecom components that can operate at room temperature. An important step in the real-world adoption of continuous-variable QKD is the deployment of field tests over commercial fibers. Here we report two different field tests of a continuous-variable QKD system through commercial fiber networks in Xi'an and Guangzhou over distances of 30.02 km (12.48 dB) and 49.85 km (11.62 dB), respectively. We achieve secure key rates two orders-of-magnitude higher than previous field test demonstrations. This is achieved by developing a fully automatic control system to create stable excess noise and by applying a rate-adaptive reconciliation protocol to achieve a high reconciliation efficiency with high success probability. Our results pave the way to achieving continuous-variable QKD in a metropolitan setting., Comment: 19 pages, 6 figures
- Published
- 2017
- Full Text
- View/download PDF
21. A security proof of continuous-variable QKD using three coherent states
- Author
-
Bradler, Kamil and Weedbrook, Christian
- Subjects
Quantum Physics ,Mathematical Physics - Abstract
We introduce a ternary quantum key distribution (QKD) protocol and asymptotic security proof based on three coherent states and homodyne detection. Previous work had considered the binary case of two coherent states and here we nontrivially extend this to three. Our motivation is to leverage the practical benefits of both discrete and continuous (Gaussian) encoding schemes creating a best-of-both-worlds approach; namely, the postprocessing of discrete encodings and the hardware benefits of continuous ones. We present a thorough and detailed security proof in the limit of infinite signal states which allows us to lower bound the secret key rate. We calculate this is in the context of collective eavesdropping attacks and reverse reconciliation postprocessing. Finally, we compare the ternary coherent state protocol to other well-known QKD schemes (and fundamental repeaterless limits) in terms of secret key rates and loss., Comment: Close to the published version
- Published
- 2017
- Full Text
- View/download PDF
22. Continuous-variable quantum Gaussian process regression and quantum singular value decomposition of non-sparse low rank matrices
- Author
-
Das, Siddhartha, Siopsis, George, and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
With the significant advancement in quantum computation in the past couple of decades, the exploration of machine-learning subroutines using quantum strategies has become increasingly popular. Gaussian process regression is a widely used technique in supervised classical machine learning. Here we introduce an algorithm for Gaussian process regression using continuous-variable quantum systems that can be realized with technology based on photonic quantum computers under certain assumptions regarding distribution of data and availability of efficient quantum access. Our algorithm shows that by using a continuous-variable quantum computer a dramatic speed-up in computing Gaussian process regression can be achieved, i.e., the possibility of exponentially reducing the time to compute. Furthermore, our results also include a continuous-variable quantum-assisted singular value decomposition method of non-sparse low rank matrices and forms an important subroutine in our Gaussian process regression algorithm., Comment: Expanded discussions surrounding SVD method and error analysis (Section IV A); to appear in PR A
- Published
- 2017
- Full Text
- View/download PDF
23. Continuous-time limit of topological quantum walks
- Author
-
Balu, Radhakrishnan, Castillo, Daniel, Siopsis, George, and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
We derive the continuous-time limit of discrete quantum walks with topological phases. We show the existence of a continuous-time limit that preserves their topological phases. We consider both simple-step and split-step walks, and derive analytically equations of motion governing their behavior. We obtain simple analytical solutions showing the existence of bound states at the boundary of two phases, and solve the equations of motion numerically in the bulk., Comment: 10 pages, 14 figures
- Published
- 2016
24. Practical quantum computing on encrypted data
- Author
-
Marshall, Kevin, Jacobsen, Christian S., Schafermeier, Clemens, Gehring, Tobias, Weedbrook, Christian, and Andersen, Ulrik L.
- Subjects
Quantum Physics - Abstract
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the unconditional security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits, which can ultimately allow for the potential widespread adoption of this quantum technology in future cloud-based computing networks., Comment: Main text (6 pages) plus Appendices (14 pages), 13 figures
- Published
- 2016
- Full Text
- View/download PDF
25. Absolutely covert quantum communication
- Author
-
Bradler, Kamil, Kalajdzievski, Timjan, Siopsis, George, and Weedbrook, Christian
- Subjects
Quantum Physics ,High Energy Physics - Theory ,Mathematical Physics - Abstract
We present truly ultimate limits on covert quantum communication by exploiting quantum-mechanical properties of the Minkowski vacuum in the quantum field theory framework. Our main results are the following: We show how two parties equipped with Unruh-DeWitt detectors can covertly communicate at large distances without the need of hiding in a thermal background or relying on various technological tricks. We reinstate the information-theoretic security standards for reliability of asymptotic quantum communication and show that the rate of covert communication is strictly positive. Therefore, contrary to the previous conclusions, covert and reliable quantum communication is possible., Comment: v2: statistics of the detector operators corrected (commuting); no change in results
- Published
- 2016
26. Quantum machine learning over infinite dimensions
- Author
-
Lau, Hoi-Kwan, Pooser, Raphael, Siopsis, George, and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
Machine learning is a fascinating and exciting field within computer science. Recently, this excitement has been transferred to the quantum information realm. Currently, all proposals for the quantum version of machine learning utilize the finite-dimensional substrate of discrete variables. Here we generalize quantum machine learning to the more complex, but still remarkably practical, infinite-dimensional systems. We present the critical subroutines of quantum machine learning algorithms for an all-photonic continuous-variable quantum computer that achieve an exponential speedup compared to their equivalent classical counterparts. Finally, we also map out an experimental implementation which can be used as a blueprint for future photonic demonstrations., Comment: 9 pages, 1 figure
- Published
- 2016
- Full Text
- View/download PDF
27. The power of one qumode for quantum computation
- Author
-
Liu, Nana, Thompson, Jayne, Weedbrook, Christian, Lloyd, Seth, Vedral, Vlatko, Gu, Mile, and Modi, Kavan
- Subjects
Quantum Physics - Abstract
Although quantum computers are capable of solving problems like factoring exponentially faster than the best-known classical algorithms, determining the resources responsible for their computational power remains unclear. An important class of problems where quantum computers possess an advantage is phase estimation, which includes applications like factoring. We introduce a new computational model based on a single squeezed state resource that can perform phase estimation, which we call the power of one qumode. This model is inspired by an interesting computational model known as deterministic quantum computing with one quantum bit (DQC1). Using the power of one qumode, we identify that the amount of squeezing is sufficient to quantify the resource requirements of different computational problems based on phase estimation. In particular, it establishes a quantitative relationship between the resources required for factoring and DQC1. For example, we find the squeezing required to factor has an exponential scaling whereas no squeezing (i.e., a coherent state) is already sufficient to solve the hardest problem in DQC1., Comment: 8 pages, 2 figures
- Published
- 2015
- Full Text
- View/download PDF
28. Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution
- Author
-
Zhang, Yi-Chen, Li, Zhengyu, Weedbrook, Christian, Marshall, Kevin, Pirandola, Stefano, Yu, Song, and Guo, Hong
- Subjects
Quantum Physics - Abstract
We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an untrusted source and an entanglement swapping protocol with an untrusted relay. Simulation results show that the noiseless linear amplifiers can improve the performance of these two protocols, in terms of maximal transmission distances, when we consider small amounts of entanglement, as typical in realistic setups., Comment: Special issue on Quantum Cryptography
- Published
- 2015
- Full Text
- View/download PDF
29. MDI-QKD: Continuous- versus discrete-variables at metropolitan distances
- Author
-
Pirandola, Stefano, Ottaviani, Carlo, Spedalieri, Gaetana, Weedbrook, Christian, Braunstein, Samuel L., Lloyd, Seth, Gehring, Tobias, Jacobsen, Christian S., and Andersen, Ulrik L.
- Subjects
Quantum Physics ,Physics - Optics - Abstract
In a comment, Xu, Curty, Qi, Qian, and Lo claimed that discrete-variable (DV) measurement device independent (MDI) quantum key distribution (QKD) would compete with its continuous-variable (CV) counterpart at metropolitan distances. Actually, Xu et al.'s analysis supports exactly the opposite by showing that the experimental rate of our CV protocol (achieved with practical room-temperature devices) remains one order of magnitude higher than their purely-numerical and over-optimistic extrapolation for qubits, based on nearly-ideal parameters and cryogenic detectors (unsuitable solutions for a realistic metropolitan network, which is expected to run on cheap room-temperature devices, potentially even mobile). The experimental rate of our protocol (expressed as bits per relay use) is confirmed to be two-three orders of magnitude higher than the rate of any realistic simulation of practical DV-MDI-QKD over short-medium distances. Of course this does not mean that DV-MDI-QKD networks should not be investigated or built, but increasing their rate is a non-trivial practical problem clearly beyond the analysis of Xu et al. Finally, in order to clarify the facts, we also refute a series of incorrect arguments against CV-MDI-QKD and, more generally, CV-QKD, which were made by Xu et al. with the goal of supporting their thesis., Comment: Updated reply to Xu, Curty, Qi, Qian and Lo (arXiv:1506.04819), including a point-to-point rebuttal of their new "Appendix E: Addendum"
- Published
- 2015
- Full Text
- View/download PDF
30. Advances in Quantum Teleportation
- Author
-
Pirandola, Stefano, Eisert, Jens, Weedbrook, Christian, Furusawa, Akira, and Braunstein, Samuel L.
- Subjects
Quantum Physics ,Condensed Matter - Mesoscale and Nanoscale Physics ,Condensed Matter - Superconductivity ,Physics - Atomic Physics ,Physics - Optics - Abstract
Quantum teleportation is one of the most important protocols in quantum information. By exploiting the physical resource of entanglement, quantum teleportation serves as a key primitive in a variety of quantum information tasks and represents an important building block for quantum technologies, with a pivotal role in the continuing progress of quantum communication, quantum computing and quantum networks. Here we review the basic theoretical ideas behind quantum teleportation and its variant protocols. We focus on the main experiments, together with the technical advantages and disadvantages associated with the use of the various technologies, from photonic qubits and optical modes to atomic ensembles, trapped atoms, and solid-state systems. Analysing the current state-of-the-art, we finish by discussing open issues, challenges and potential future implementations., Comment: Nature Photonics Review. Comments are welcome. This is a slightly-expanded arXiv version (14 pages, 5 figure, 1 table)
- Published
- 2015
- Full Text
- View/download PDF
31. Quantum simulation of quantum field theory using continuous variables
- Author
-
Marshall, Kevin, Pooser, Raphael, Siopsis, George, and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
Much progress has been made in the field of quantum computing using continuous variables over the last couple of years. This includes the generation of extremely large entangled cluster states (10,000 modes, in fact) as well as a fault tolerant architecture. This has led to the point that continuous-variable quantum computing can indeed be thought of as a viable alternative for universal quantum computing. With that in mind, we present a new algorithm for continuous-variable quantum computers which gives an exponential speedup over the best known classical methods. Specifically, this relates to efficiently calculating the scattering amplitudes in scalar bosonic quantum field theory, a problem that is believed to be hard using a classical computer. Building on this, we give an experimental implementation based on cluster states that is feasible with today's technology., Comment: 7 pages, 1 figure
- Published
- 2015
- Full Text
- View/download PDF
32. Device-independent quantum key distribution with generalized two-mode Schr\'odinger cat states
- Author
-
Broadbent, Curtis J., Marshall, Kevin, Weedbrook, Christian, and Howell, John C.
- Subjects
Quantum Physics - Abstract
We show how weak non-linearities can be used in a device-independent quantum key distribution (QKD) protocol using generalized two-mode Schr\"odinger cat states. The QKD protocol is therefore shown to be secure against collective attacks and for some coherent attacks. We derive analytical formulas for the optimal values of the Bell parameter, the quantum bit error rate, and the device-independent secret key rate in the noiseless lossy bosonic channel. Additionally, we give the filters and measurements which achieve these optimal values. We find that over any distance in this channel the quantum bit error rate is identically zero, in principle, and the states in the protocol are always able to violate a Bell inequality. The protocol is found to be superior in some regimes to a device-independent QKD protocol based on polarization entangled states in a depolarizing channel. Finally, we propose an implementation for the optimal filters and measurements., Comment: Comments welcome
- Published
- 2015
33. Microwave Quantum Illumination
- Author
-
Barzanjeh, Shabir, Guha, Saikat, Weedbrook, Christian, Vitali, David, Shapiro, Jeffrey H., and Pirandola, Stefano
- Subjects
Quantum Physics ,Condensed Matter - Other Condensed Matter ,Physics - Instrumentation and Detectors ,Physics - Optics - Abstract
Quantum illumination is a quantum-optical sensing technique in which an entangled source is exploited to improve the detection of a low-reflectivity object that is immersed in a bright thermal background. Here we describe and analyze a system for applying this technique at microwave frequencies, a more appropriate spectral region for target detection than the optical, due to the naturally-occurring bright thermal background in the microwave regime. We use an electro-optomechanical converter to entangle microwave signal and optical idler fields, with the former being sent to probe the target region and the latter being retained at the source. The microwave radiation collected from the target region is then phase conjugated and upconverted into an optical field that is combined with the retained idler in a joint-detection quantum measurement. The error probability of this microwave quantum-illumination system, or quantum radar, is shown to be superior to that of any classical microwave radar of equal transmitted energy., Comment: Main Letter. See arXiv:1410.4008 for an extended version including supplemental material
- Published
- 2015
- Full Text
- View/download PDF
34. Replicating the benefits of closed timelike curves without breaking causality
- Author
-
Yuan, Xiao, Assad, Syed M., Thompson, Jayne, Haw, Jing Yan, Vedral, Vlatko, Ralph, Timothy C., Lam, Ping Koy, Weedbrook, Christian, and Gu, Mile
- Subjects
Quantum Physics ,General Relativity and Quantum Cosmology - Abstract
In general relativity, closed timelike curves can break causality with remarkable and unsettling consequences. At the classical level, they induce causal paradoxes disturbing enough to motivate conjectures that explicitly prevent their existence. At the quantum level, resolving such paradoxes induce radical benefits - from cloning unknown quantum states to solving problems intractable to quantum computers. Instinctively, one expects these benefits to vanish if causality is respected. Here we show that in harnessing entanglement, we can efficiently solve NP-complete problems and clone arbitrary quantum states - even when all time-travelling systems are completely isolated from the past. Thus, the many defining benefits of closed timelike curves can still be harnessed, even when causality is preserved. Our results unveil the subtle interplay between entanglement and general relativity, and significantly improve the potential of probing the radical effects that may exist at the interface between relativity and quantum theory., Comment: 6 pages, 5 figures. Comments most welcome
- Published
- 2014
- Full Text
- View/download PDF
35. Repeat-until-success cubic phase gate for universal continuous-variable quantum computation
- Author
-
Marshall, Kevin, Pooser, Raphael, Siopsis, George, and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
In order to achieve universal quantum computation using continuous variables, one needs to jump out of the set of Gaussian operations and have a non-Gaussian element, such as the cubic phase gate. However, such a gate is currently very difficult to implement in practice. Here we introduce an experimentally viable 'repeat-until-success' approach to generating the cubic phase gate, which is achieved using sequential photon subtractions and Gaussian operations. We find that our scheme offers benefits in terms of the expected time until success, although we require a primitive quantum memory., Comment: 7 pages, 4 figures
- Published
- 2014
- Full Text
- View/download PDF
36. Quantum Illumination at the Microwave Wavelengths
- Author
-
Barzanjeh, Shabir, Guha, Saikat, Weedbrook, Christian, Vitali, David, Shapiro, Jeffrey H., and Pirandola, Stefano
- Subjects
Quantum Physics ,Condensed Matter - Other Condensed Matter ,Physics - Optics - Abstract
Quantum illumination is a quantum-optical sensing technique in which an entangled source is exploited to improve the detection of a low-reflectivity object that is immersed in a bright thermal background. Here we describe and analyze a system for applying this technique at microwave frequencies, a more appropriate spectral region for target detection than the optical, due to the naturally-occurring bright thermal background in the microwave regime. We use an electro-optomechanical converter to entangle microwave signal and optical idler fields, with the former being sent to probe the target region and the latter being retained at the source. The microwave radiation collected from the target region is then phase conjugated and upconverted into an optical field that is combined with the retained idler in a joint-detection quantum measurement. The error probability of this microwave quantum-illumination system, or quantum radar, is shown to be superior to that of any classical microwave radar of equal transmitted energy., Comment: In press on Physical Review Letters. Long version of the manuscript, including both the Letter and the Supplemental Material (15 pages total)
- Published
- 2014
- Full Text
- View/download PDF
37. Device-Independent Quantum Cryptography for Continuous Variables
- Author
-
Marshall, Kevin and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
We present the first device-independent quantum cryptography protocol for continuous variables. Our scheme is based on the Gottesman-Kitaev-Preskill encoding scheme whereby a qubit is embedded in the infinite-dimensional space of a quantum harmonic oscillator. The novel application of discrete-variable device-independent quantum key distribution to this encoding enables a continuous-variable analogue. Since the security of this protocol is based on discrete-variables we inherit by default security against collective attacks and, under certain memoryless assumptions, coherent attacks. We find that our protocol is valid over the same distances as its discrete-variable counterpart, except that we are able to take advantage of high efficiency commercially available detectors where, for the most part, only homodyne detection is required. This offers the potential of removing the difficulty in closing the loopholes associated with Bell inequalities., Comment: 6 pages, 1 figure
- Published
- 2014
- Full Text
- View/download PDF
38. Quantum Hacking on Quantum Key Distribution using Homodyne Detection
- Author
-
Huang, Jing-Zheng, Kunz-Jacques, Sébastien, Jouguet, Paul, Weedbrook, Christian, Yin, Zhen-Qiang, Wang, Shuang, Chen, Wei, Guo, Guang-Can, and Han, Zheng-Fu
- Subjects
Quantum Physics - Abstract
Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures., Comment: 8 pages, 3 figures. PRA accepted
- Published
- 2014
- Full Text
- View/download PDF
39. High-rate quantum cryptography in untrusted networks
- Author
-
Pirandola, Stefano, Ottaviani, Carlo, Spedalieri, Gaetana, Weedbrook, Christian, Braunstein, Samuel L., Lloyd, Seth, Gehring, Tobias, Jacobsen, Christian S., and Andersen, Ulrik L.
- Subjects
Quantum Physics ,Mathematical Physics ,Physics - Data Analysis, Statistics and Probability ,Physics - Optics - Abstract
We extend the field of continuous-variable quantum cryptography to a network formulation where two honest parties connect to an untrusted relay by insecure quantum links. To generate secret correlations, they transmit coherent states to the relay where a continuous-variable Bell detection is performed and the outcome broadcast. Even though the detection could be fully corrupted and the links subject to optimal coherent attacks, the honest parties can still extract a secret key, achieving high rates when the relay is proximal to one party, as typical in public networks with access points or proxy servers. Our theory is confirmed by an experiment generating key-rates which are orders of magnitude higher than those achievable with discrete-variable protocols. Thus, using the cheapest possible quantum resources, we experimentally show the possibility of high-rate quantum key distribution in network topologies where direct links are missing between end-users and intermediate relays cannot be trusted., Comment: Theory and Experiment. Main article (6 pages) plus Supplementary Information (additional 13 pages)
- Published
- 2013
- Full Text
- View/download PDF
40. How Discord underlies the Noise Resilience of Quantum Illumination
- Author
-
Weedbrook, Christian, Pirandola, Stefano, Thompson, Jayne, Vedral, Vlatko, and Gu, Mile
- Subjects
Quantum Physics - Abstract
The benefits of entanglement can outlast entanglement itself. In quantum illumination, entanglement is employed to better detect reflecting objects in environments so noisy that all entanglement is destroyed. Here, we show that quantum discord - a more resilient form of quantum correlations - explains the resilience of quantum illumination. We introduce a quantitative relation between the performance gain in quantum illumination and the amount of discord used to encode information about the presence or absence of a reflecting object. This highlights discord's role preserving the benefits of entanglement in entanglement breaking noise., Comment: Addition of extra figure on discord flow - tracking discord's role in each step of the illumination protocol. Manuscript also revised to include further technical details. Journal reference now included
- Published
- 2013
- Full Text
- View/download PDF
41. Two-way quantum cryptography at different wavelengths
- Author
-
Weedbrook, Christian, Ottaviani, Carlo, and Pirandola, Stefano
- Subjects
Quantum Physics - Abstract
We study the security of two-way quantum cryptography at different wavelengths of the electromagnetic spectrum, from the optical range down to the microwave range. In particular, we consider a two-way quantum communication protocol where Gaussian-modulated thermal states are subject to random Gaussian displacements and finally homodyned. We show how its security threshold (in reverse reconciliation) is extremely robust with respect to the preparation noise and able to outperform the security thresholds of one-way protocols at any wavelength. As a result, improved security distances are now accessible for implementing quantum key distribution at the very challenging regime of infrared frequencies., Comment: 8 pages, 6 figures
- Published
- 2013
- Full Text
- View/download PDF
42. Continuous-variable dense coding by optomechanical cavities
- Author
-
Barzanjeh, Shabir, Pirandola, Stefano, and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
In this paper, we show how continuous-variable dense coding can be implemented using entangled light generated from a membrane-in-the-middle geometry. The mechanical resonator is assumed to be a high reflectivity membrane hung inside a high quality factor cavity. We show that the mechanical resonator is able to generate an amount of entanglement between the optical modes at the output of the cavity, which is strong enough to approach the capacity of quantum dense coding at small photon numbers. The suboptimal rate reachable by our optomechanical protocol is high enough to outperform the classical capacity of the noiseless quantum channel.
- Published
- 2013
- Full Text
- View/download PDF
43. Improvement of two-way continuous-variable quantum key distribution using optical amplifiers
- Author
-
Zhang, Yi-Chen, Li, Zhengyu, Weedbrook, Christian, Yu, Song, Gu, Wanyi, Sun, Maozhu, Peng, Xiang, and Guo, Hong
- Subjects
Quantum Physics - Abstract
The imperfections of a receiver's detector affect the performance of two-way continuous-variable quantum key distribution protocols and are difficult to adjust in practical situations. We propose a method to improve the performance of two-way continuous-variable quantum key distribution by adding a parameter-adjustable optical amplifier at the receiver. A security analysis is derived against a two-mode collective entangling cloner attack. Our simulations show that the proposed method can improve the performance of protocols as long as the inherent noise of the amplifier is lower than a critical value, defined as the tolerable amplifier noise. Furthermore, the optimal performance can approach the scenario where a perfect detector is used., Comment: 14 pages, 7 figures
- Published
- 2013
- Full Text
- View/download PDF
44. Quantum secret sharing with continuous-variable cluster states
- Author
-
Lau, Hoi-Kwan and Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
We extend the formalism of cluster state quantum secret sharing, as presented in Markham and Sanders [Phys. Rev. A 78, 042309 (2008)] and Keet et al. [Phy. Rev. A 82, 062315 (2010)], to the continuous-variable regime. We show that both classical and quantum information can be shared by distributing continuous-variable cluster states through either public or private channels. We find that the adversary structure is completely denied from the secret if the cluster state is infinitely squeezed, but some secret information would be leaked if a realistic finitely squeezed state is employed. We suggest benchmarks to evaluate the security in the finitely squeezed cases. For the sharing of classical secrets, we borrow techniques from the continuous-variable quantum key distribution to compute the secret sharing rate. For the sharing of quantum states, we estimate the amount of entanglement distilled for teleportation from each cluster state., Comment: v3: Modified abstract and introduction
- Published
- 2013
- Full Text
- View/download PDF
45. Experimental Quantum Computing to Solve Systems of Linear Equations
- Author
-
Cai, X. -D., Weedbrook, Christian, Su, Z. -E., Chen, M. -C., Gu, Mile, Zhu, M. -J., Li, L., Liu, N. -L., Lu, Chao-Yang, and Pan, Jian-Wei
- Subjects
Quantum Physics - Abstract
Solving linear systems of equations is ubiquitous in all areas of science and engineering. With rapidly growing data sets, such a task can be intractable for classical computers, as the best known classical algorithms require a time proportional to the number of variables N. A recently proposed quantum algorithm shows that quantum computers could solve linear systems in a time scale of order log(N), giving an exponential speedup over classical computers. Here we realize the simplest instance of this algorithm, solving 2*2 linear equations for various input vectors on a quantum computer. We use four quantum bits and four controlled logic gates to implement every subroutine required, demonstrating the working principle of this algorithm., Comment: accepted version, to appear in Physical Review Letters
- Published
- 2013
- Full Text
- View/download PDF
46. Quantum Hacking on Continuous-Variable Quantum Key Distribution System using a Wavelength Attack
- Author
-
Huang, Jing-Zheng, Weedbrook, Christian, Yin, Zhen-Qiang, Wang, Shuang, Li, Hong-Wei, Chen, Wei, Guo, Guang-Can, and Han, Zheng-Fu
- Subjects
Quantum Physics - Abstract
The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be added before performing the monitoring detection., Comment: 9 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:1206.6550
- Published
- 2013
- Full Text
- View/download PDF
47. Continuous-Variable Quantum Key Distribution with Entanglement in the Middle
- Author
-
Weedbrook, Christian
- Subjects
Quantum Physics - Abstract
We analyze the performance of continuous-variable quantum key distribution protocols where the entangled source originates not from one of the trusted parties, Alice or Bob, but from the malicious eavesdropper in the middle. This is in contrast to the typical simulations where Alice creates the entangled source and sends it over an insecure quantum channel to Bob. By using previous techniques and identifying certain error correction protocol equivalences, we show that Alice and Bob do not need to trust their source, and can still generate a positive key rate. Such a situation can occur in a quantum network where the untrusted source originated in between the two users., Comment: 5 pages, 3 figures
- Published
- 2012
- Full Text
- View/download PDF
48. A limit formula for the quantum fidelity
- Author
-
Spedalieri, Gaetana, Weedbrook, Christian, and Pirandola, Stefano
- Subjects
Quantum Physics ,Condensed Matter - Other Condensed Matter ,Mathematical Physics ,Physics - Optics - Abstract
Quantum fidelity is a central tool in quantum information, quantifying how much two quantum states are similar. Here we propose a limit formula for the quantum fidelity between a mixed state and a pure state. As an example of an application, we apply this formula to the case of multimode Gaussian states, achieving a simple expression in terms of their first and second-order statistical moments., Comment: Error corrected in the proof of Theorem 1. Results remain valid
- Published
- 2012
- Full Text
- View/download PDF
49. Continuous-Variable Quantum Key Distribution using Thermal States
- Author
-
Weedbrook, Christian, Pirandola, Stefano, and Ralph, Timothy C.
- Subjects
Quantum Physics - Abstract
We consider the security of continuous-variable quantum key distribution using thermal (or noisy) Gaussian resource states. Specifically, we analyze this against collective Gaussian attacks using direct and reverse reconciliation where both protocols use either homodyne or heterodyne detection. We show that in the case of direct reconciliation with heterodyne detection, an improved robustness to channel noise is achieved when large amounts of preparation noise is added, as compared to the case when no preparation noise is added. We also consider the theoretical limit of infinite preparation noise and show a secure key can still be achieved in this limit provided the channel noise is less than the preparation noise. Finally, we consider the security of quantum key distribution at various electromagnetic wavelengths and derive an upper bound related to an entanglement-breaking eavesdropping attack and discuss the feasibility of microwave quantum key distribution., Comment: 12 pages, 11 figures. Updated from published version with some minor corrections
- Published
- 2011
- Full Text
- View/download PDF
50. Gaussian Quantum Information
- Author
-
Weedbrook, Christian, Pirandola, Stefano, Garcia-Patron, Raul, Cerf, Nicolas J., Ralph, Timothy C., Shapiro, Jeffrey H., and Lloyd, Seth
- Subjects
Quantum Physics - Abstract
The science of quantum information has arisen over the last two decades centered on the manipulation of individual quanta of information, known as quantum bits or qubits. Quantum computers, quantum cryptography and quantum teleportation are among the most celebrated ideas that have emerged from this new field. It was realized later on that using continuous-variable quantum information carriers, instead of qubits, constitutes an extremely powerful alternative approach to quantum information processing. This review focuses on continuous-variable quantum information processes that rely on any combination of Gaussian states, Gaussian operations, and Gaussian measurements. Interestingly, such a restriction to the Gaussian realm comes with various benefits, since on the theoretical side, simple analytical tools are available and, on the experimental side, optical components effecting Gaussian processes are readily available in the laboratory. Yet, Gaussian quantum information processing opens the way to a wide variety of tasks and applications, including quantum communication, quantum cryptography, quantum computation, quantum teleportation, and quantum state and channel discrimination. This review reports on the state of the art in this field, ranging from the basic theoretical tools and landmark experimental realizations to the most recent successful developments., Comment: 51 pages, 7 figures, submitted to Reviews of Modern Physics
- Published
- 2011
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.