中科大陈凯CQC第十五全国量子光学会议

上传人:pu****.1 文档编号:592012110 上传时间:2024-09-19 格式:PPT 页数:34 大小:1.50MB
返回 下载 相关 举报
中科大陈凯CQC第十五全国量子光学会议_第1页
第1页 / 共34页
中科大陈凯CQC第十五全国量子光学会议_第2页
第2页 / 共34页
中科大陈凯CQC第十五全国量子光学会议_第3页
第3页 / 共34页
中科大陈凯CQC第十五全国量子光学会议_第4页
第4页 / 共34页
中科大陈凯CQC第十五全国量子光学会议_第5页
第5页 / 共34页
点击查看更多>>
资源描述

《中科大陈凯CQC第十五全国量子光学会议》由会员分享,可在线阅读,更多相关《中科大陈凯CQC第十五全国量子光学会议(34页珍藏版)》请在金锄头文库上搜索。

1、ExperimentalDemonstrationofCounterfactualQuantumCommunicationUniversityofScienceandTechnologyofChina第十五届全国量子光学会议,2012.07.15KaiChenIn collaboration with Yang Liu, Lei Ju, Xiao-Lei Liang, Shi-Biao Tang, Guo-Liang Shen Tu, Lei Zhou, Cheng-Zhi Peng, Teng-Yun Chen, Zeng-Bing Chen, and Jian-Wei Pan1Motiva

2、tions and BackgroundCQC SchemeExperimental CQCCounterfactualQuantumCommunicationOutlook2SecureCommunicationAliceBobEve3ClassicalCryptographyModernCryptographyRSA,Rabin,Diffie-Hellman,ElGamaletc.AES,MD5etc.QuantumKeyDistribution(QuantumCryptography)BB84E91ContinuousVariableDPSbased(DifferentialPhaseS

3、hiftQuantumKeyDistribution)ClassicalandQuantumCryptography4ApplicationsofCounterfactualQuantumPhenomenaThepresenceofanon-transmittingobjectisascertainedseeminglywithoutinteractingwithit,i.e.,withnophoton absorbed or scatteredbytheobject.Theory:A.C.Elitzur,L.Vaidman,Found.Phys.23,987(1993).Experiment

4、:P.G.Kwiatet al.,Phys.Rev.Lett.83,4725(1999).“Interaction-free”QuantumInterrogationMeasurements5ApplicationsofCounterfactualQuantumPhenomenaCounterfactualquantumcomputationthroughquantuminterrogationTheory:G.Mitchison,R.Jozsa,Proc.R.Soc.Lond.A457,1175(2001).Experiment:O.Hosten,M.T.Rakher,J.T.Barreir

5、o,N.A.Peters,P.G.Kwiat,Nature439,949(2006).Counterfactualcomputationisaccomplishedbyputtingthecomputerinasuperpositionofrunningandnotrunningstates,andtheninterferingthetwohistories.Conditionalontheas-yet-unknownoutcomeofthecomputation,itissometimespossibletocounterfactuallyinferinformationabouttheso

6、lution.6CQC SchemeExperimental CQCCounterfactualQuantumCommunicationOutlookMotivations and Background7Anovelnewscheme!BasedonorthogonalquantumstateInnormalscheme,thesecurityisbasedonnon-orthogonalquantumstates,e.g.,BB84protocolEnabletogeneratekeyswhen“nophoton”travelsInnormalparadigmforcommunication

7、,keyscanonlybegeneratedwhenphotonstravelacrosstwostationsCounterfactualQuantumCommunicationT.G.Noh,Phys.Rev.Lett.103,230501(2009)8T.G.Noh,Phys.Rev.Lett.103,230501(2009)CQCScheme9T.G.Noh,Phys.Rev.Lett.103,230501(2009)CQCSchemeProtocol:1. A triggering single-photon source S, which emits a short optica

8、l pulsecontainingasinglephoton.ThepolarizationischosenatrandomtohaveeitherhorizontalpolarizationHrepresentingthebitvalue0,orverticalpolarizationVrepresenting1.2.Bobalsorandomlychoosesoneofthetwopolarizationsrepresentinghisbitvalue.Bobblocksthe opticalpath b ofthe single-photonpulseifthepolarization

9、of the pulse is identical to his polarization. The blocking ofoptical path b in such a polarization-selective way can be suitablyaccomplished,forinstance,usingthesetupdepictedinBobssite.3.Ontheotherhand,ifthesingle-photonpulsehasapolarizationorthogonaltoBobs,itsopticalpathbisnotaffectedbytheSW.Hence

10、,asplitpulsetravellingthroughpathbmaybereflectedbytheFMinBobssiteandisreturnedbacktotheBS.4.Theinterferometercanbestabilizedusingfeedbackcontrol.10CQCSchemeAnalysis:1.IfAlicesandBobsbitvaluesdiffer,thephotonleavestheinterferometergoingtowarddetectorD2withcertaintyowingtotheinterferenceeffect.2.If,ho

11、wever,AlicesandBobsbitvaluesareequal,thesplitpulseinpathbisblockedbydetectorD3andtheinterferenceisdestroyed.Inthiscase,therearethreepossibilitiesforasinglephoton:(i)thephotontravelsthroughpathaandisdetectedatdetectorD1withprobabilityRT;(ii)thephotontravelsthroughpathaandisdetectedatdetectorD2withpro

12、babilityR2;(iii)thephotongoestoBobthroughpathbandisdetectedatdetectorD3withprobabilityT.3.After the detection of a photon is completed, Alice and Bob tell each otherwhetherornoteachofthedetectorsclicked.IfD1clicksalone,Alicecomparesthe detected polarization state to her initial polarization state: i

13、f they areconsistent,shedoesnotrevealanyinformationaboutthepolarizationstates;otherwise,shealsoannounceshermeasurementresults.AliceandBobcanthenestablishanidenticalbitstring(asiftedkey)byselectingonlytheeventsforwhich D1 alone detects a photon with a correct final polarization state. Theydisregardal

14、lotherevents.4.Monitoring:IfD2orD3clicks,theyalsoannounceboththedetectedpolarizationstate and the initial polarization states that were chosen. This is intended todetect Eves intervention by monitoring the correct operation of theinterferometer.11No-cloning principle of orthogonal states in acomposi

15、te system which consists of twosubsystems.Ifreduceddensitymatricesofanavailablesystemarenonorthogonalandiftheothersubsystem is not allowed access, it isimpossible to distinguish two orthogonalquantumstateswithoutdisturbingthem.CQC-whyisitsecure?T.G.Noh,Phys.Rev.Lett.103,230501(2009)12Accordingtothec

16、hosenbitvalue,theinitialquantumstateaftertheBSisgivenbyoneofthetwoorthogonalstatesinourCQCschemeQuantumstatesutilized13AsiftedkeyiscreatedbyselectingonlytheeventsduringwhichasinglephotonisdetectedatD1.Inidealcases,thephotonsusedtocreateasiftedkeyhavenottravelledthroughpathbbutonlythroughpatha(ifthep

17、hotonshavetraveledthroughthepathb,theymusthavebeendetectedatD3).The task of a secret key distribution, therefore, can beaccomplishedwithoutanyphotoncarryingsecretinformationbeingsentthroughthequantumchannel(pathb). A photon that carries secret information has beenconfinedfromitsbirthtodeathwithinAli

18、cessecurestation,andEvecanneveraccessthephoton.Bob in fact extracts a secret key from the non-detectionevents.CQC-whycounterfactual?14Experimental CQCCQC SchemeCounterfactualQuantumCommunicationOutlookMotivations and Background15Fullimplementationwithtableand1kmfiberspoolExperimentalSetup16Singlemod

19、efiberupto1kmlengthUsingon-shelfcomponentsSimilarconditionwithrealworldenvironmentPolarizationadjustmentiscapableOriginalexperimentsetupandimplementationMonitoralldetecteventsImplementationofexperiment17RandomdatagenerationModulationsequentiallogicMassiveDataandLogicalControlSpecialdesignedFPGA18Fas

20、tanalogsignal(fromFPGA)Highspeedswitch(100ns)PropertiesequencesFastPulseSwitchBobneedstochoosefastly“whichpulsetodetect”KeytoenhancesystemworkingfrequencyBasisforsuccessfulrealization19Fiberlengthestimation&adjusting(10cm)Opticaldelayline(0.1mm)Fiberstretcher(0.01m)AccurateOpticalDelayAdjustmentAccu

21、rateopticaldelayadjustment(98%)Opticalmisalignmentofabout1%Contributingabout3.8%errorrateDetectoreventsforkeysaremuchsmallerthanthatofothersExtinctionratioofopticalswitch(17dB)Contributingabout2%errorrateDetectordarkcountrate(1e-5)Contributingtoabout0.5%errorrate5.8%total3.8%+2%+0.5%Erroranalysis26O

22、utlookCQC SchemeCounterfactualQuantumCommunicationExperimental CQCMotivations and Background27UnconditionalsecuritywithsinglephotonsourceZ.Q.Yinet al.,PRA82,042335(2010)MethodtoenhanceefficiencyY.Sunet al.,PRA82,052318(2010)AnexperimenttomodifiedschemeM.Renet al.,LaserPhysics21,755(2011)Asimpledeskt

23、opexperimentG.Bridaet al.,LaserPhysicsLetters9,247(2012)DirectcounterfactualquantumcommunicationH.Salihet al.,(2012)CurrentStatusofCQC28nNovel scheme of secure key distribution: Counterfactual quantum communication realizationLiu et al., to appear in PRL (2012)RDemonstrations implemented with a desk

24、top setup, and with 1 km fiber cable, respectively.RDevelopments of high-precision active feed-back control technology for maintaining real-time stabilization of Michelson-type interferometer with high visibilities of greater than 98%, which ensures high-speed and steady generation of keysIfAlicesan

25、dBobschoicesforbitvaluesdoesnotdestroyinterference,onlydetectorD2willclickduetointerferenceeffect.IfdetectorD1clicks,AlicesandBobschoicesforpolarizationswilldestroyinterference.Particularly,thephotondoesnottravelalongpathb(counterfactual).SummaryandOutlook29Wehaveachievedthefirstfaithfullyproof-in-p

26、rincipledemonstrationsrealizationofcounterfactualquantumcommunication,inwhichprocessinformationcarriersareseeminglynottraveledinthequantumchannel.Fromadesktoptesttoasetupwith1kmfibercable,wehavegivenaconfirminganswerforfeasibilityofCQCOnecaninferthatthemerepossibilityforsignalparticlestobetransmitte

27、dissufficienttocreateasecretkey.Weremarkthat,toensuresuchpossibility,partialsignalparticlesstillneedtorandomlytravelalongquantumchannelfordetectionofpossibleeavesdropping.SummaryandOutlook30Suchaimplementationbyexploitingcounterfactualeffecthasrevealednewsurprisingphysicsbehindquantummechanics,inadd

28、itiontoexistingexperimentaldemonstrationsof“interaction-free”measurements,andcounterfactualquantumcomputation.Activefeed-backcontroltechnologyformaintainingreal-timestabilizationofMichelson-typeinterferometer.Tailoredoptical,controllingelectronicsdesigns,andspecialopticalswitcharemadeandchosenforatt

29、aininghighvisibilities.Long-distancerealizationareaheadwithbyutilizingstate-of-the-arttechnology.OtherCQCschemesdemonstrationsSummaryandOutlook31Thank you!陈凯中国科学技术大学Mobile:Tel.32AcompleteanalysisoftheQKDsecurity,includingvariousexperimentalimperfections,isverychallengingandopenforfuturestudyWeakcohe

30、rentpulsesrealizations:Evecannotdeterminethenumberofphotonsineachpulsebecausesheisnotallowedtoaccesspatha.ItisimpossibleforEvetomeasureeventhenumberofphotonstravellingthroughthequantumchannel(pathb),providedthatshedoesnotdisturbthestates.Eveobtainswhich-pathinformationthroughthephotonnumbermeasureme

31、ntinpathb,andshedestroystheinterference.Hence,Evemaycausedetectionerrors,andshemaybedetectedduetothephotonnumbermeasurementitself.CQCScheme-SecurityAdvantagesT.G.Noh,Phys.Rev.Lett.103,230501(2009)33AcompleteanalysisoftheQKDsecurity,includingvariousexperimentalimperfections,isverychallengingandopenfo

32、rfuturestudyWeakcoherentpulsesrealizations:Thus,thepresentprotocolisinherentlyrobustagainsttheso-calledphotonnumber-splittingattack.Evecannotsplitaphotonwhenallofthephotonsinthepulsetravelthroughpatha.Thatis,ifallofthephotonsaredetectedatD1aftertravelingthroughpatha,thebitinformationisnotrevealedtoEve,evenwhenamultiphotonpulseisused.Evecannotobtainacopyoftheinitialquantumstateevenwhenshesucceedsinsplittingaphoton.Thatis,Eveonlyobtainsacollapsedstatewheneversheknowsthatshehasaphoton,andsheremainslimitedbytheno-cloningtheorem.CQCScheme-SecurityAdvantagesT.G.Noh,Phys.Rev.Lett.103,230501(2009)34

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 医学/心理学 > 基础医学

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号