Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 12 de 12
Filtrar
Mais filtros

Base de dados
Tipo de documento
Intervalo de ano de publicação
1.
Opt Express ; 31(6): 9196-9210, 2023 Mar 13.
Artigo em Inglês | MEDLINE | ID: mdl-37157494

RESUMO

The reference-frame-independent quantum key distribution (RFI-QKD) has the advantage of tolerating reference frames that slowly vary. It can generate secure keys between two remote users with slowly drifted and unknown reference frames. However, the drift of reference frames may inevitably compromise the performance of QKD systems. In the paper, we employ the advantage distillation technology (ADT) to the RFI-QKD and the RFI measurement-device-independent QKD (RFI MDI-QKD), and we then analyze the effect of ADT on the performance of decoy-state RFI-QKD and RFI MDI-QKD in both asymptotic and nonasymptotic cases. The simulation results show that ADT can significantly improve the maximum transmission distance and the maximum tolerable background error rate. Furthermore, the performance of RFI-QKD and RFI MDI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are taken into account. Our work combines the merits of the ADT and RFI-QKD protocols, which further enhances the robustness and practicability of QKD systems.

2.
Opt Express ; 31(26): 44501-44514, 2023 Dec 18.
Artigo em Inglês | MEDLINE | ID: mdl-38178519

RESUMO

Conventional theoretical studies on the ground-state laser cooling of a trapped ion have mostly focused on the weak sideband coupling (WSC) regime, where the cooling rate is inverse proportional to the linewidth of the excited state. In a recent work [New J. Phys.23, 023018 (2021)10.1088/1367-2630/abe273], we proposed a theoretical framework to study the ground state cooling of a trapped ion in the strong sideband coupling (SSC) regime, under the assumption of a vanishing carrier transition. Here we extend this analysis to more general situations with nonvanishing carrier transitions, where we show that by properly tuning the coupling lasers a cooling rate proportional to the linewidth can be achieved. Our theoretical predictions closely agree with the corresponding exact solutions in the SSC regime, which provide an important theoretical guidance for sideband cooling experiments.

3.
Opt Express ; 31(16): 26301-26313, 2023 Jul 31.
Artigo em Inglês | MEDLINE | ID: mdl-37710493

RESUMO

We have developed a simple time-bin phase encoding quantum key distribution system, using the optical injection locking technique. This setup incorporates both the merits of simplicity and stability in encoding, and immunity to channel disturbance. We have demonstrated the field implementation of quantum key distribution over long-distance deployed aerial fiber automatically. During the 70-day field test, we achieved approximately a 1.0 kbps secure key rate with stable performance. Our work takes an important step toward widespread implementation of QKD systems in diverse and complex real-life scenarios.

4.
Opt Express ; 31(16): 26335-26343, 2023 Jul 31.
Artigo em Inglês | MEDLINE | ID: mdl-37710496

RESUMO

In this work, we present a new time-bin phase-encoding quantum key distribution (QKD), where the transmitter utilizes an inherently stable Sagnac-type interferometer, and has comparable electrical requirements to existing polarization or phase encoding schemes. This approach does not require intensity calibration and is insensitive to environmental disturbances, making it both flexible and high-performing. We conducted experiments with a compact QKD system to demonstrate the stability and secure key rate performance of the presented scheme. The results show a typical secure key rate of 6.2 kbps@20 dB and 0.4 kbps@30 dB with channel loss emulated by variable optical attenuators. A continuous test of 120-km fiber spool shows a stable quantum bit error rate of the time-bin basis within 0.4%∼0.6% over a consecutive 9-day period without any adjustment. This intrinsically stable and compatible scheme of time-bin phase encoding is extensively applicable in various QKD experiments, including BB84 and measurement-device-independent QKD.

5.
Entropy (Basel) ; 24(10)2022 Sep 23.
Artigo em Inglês | MEDLINE | ID: mdl-37420359

RESUMO

Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution. However, the weak randomness in a practical QKD system may lower the secret key rate and limit its achievable communication distance, thus compromising its performance. In this paper, we analyze the effects of the weak randomness on the SNS TF-QKD. The numerical simulation shows that SNS TF-QKD can still have an excellent performance under the weak random condition: the secret key rate can exceed the PLOB boundary and achieve long transmission distances. Furthermore, our simulation results also show that SNS TF-QKD is more robust to the weak randomness loopholes than the BB84 protocol and the measurement-device-independent QKD (MDI-QKD). Our results emphasize that keeping the randomness of the states is significant to the protection of state preparation devices.

6.
Entropy (Basel) ; 24(4)2022 Mar 26.
Artigo em Inglês | MEDLINE | ID: mdl-35455123

RESUMO

Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections in realistic devices that are not considered in the theoretical security proof may have an impact on the practical security of realistic HD-QKD systems. In this paper, we research the influence of a realistic intensity modulator on the practical security of HD-QKD systems with the decoy-state method and finite-key effects. We demonstrate that there is a certain impact in the secret key rate and the transmission distance when taking practical factors into security analysis.

7.
Phys Rev Lett ; 127(18): 180501, 2021 Oct 29.
Artigo em Inglês | MEDLINE | ID: mdl-34767433

RESUMO

Scaling up to a large number of qubits with high-precision control is essential in the demonstrations of quantum computational advantage to exponentially outpace the classical hardware and algorithmic improvements. Here, we develop a two-dimensional programmable superconducting quantum processor, Zuchongzhi, which is composed of 66 functional qubits in a tunable coupling architecture. To characterize the performance of the whole system, we perform random quantum circuits sampling for benchmarking, up to a system size of 56 qubits and 20 cycles. The computational cost of the classical simulation of this task is estimated to be 2-3 orders of magnitude higher than the previous work on 53-qubit Sycamore processor [Nature 574, 505 (2019)NATUAS0028-083610.1038/s41586-019-1666-5. We estimate that the sampling task finished by Zuchongzhi in about 1.2 h will take the most powerful supercomputer at least 8 yr. Our work establishes an unambiguous quantum computational advantage that is infeasible for classical computation in a reasonable amount of time. The high-precision and programmable quantum computing platform opens a new door to explore novel many-body phenomena and implement complex quantum algorithms.

8.
Entropy (Basel) ; 23(9)2021 Aug 25.
Artigo em Inglês | MEDLINE | ID: mdl-34573728

RESUMO

Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD. However, the device imperfections may compromise its practical implementations. The goal of this paper is to make it robust against the state preparation flaws (SPFs) and side channels at the light source. We adopt the sending or not-sending (SNS) TF-QKD protocol to accommodate the SPFs and multiple optical modes in the emitted states. We analyze that the flaws of the phase modulation can be overcome by regarding the deviation of the phase as phase noise and eliminating it with the post-selection of phase. To overcome the side channels, we extend the generalized loss-tolerant (GLT) method to the four-intensity decoy-state SNS protocol. Remarkably, by decomposing of the two-mode single-photon states, the phase error rate can be estimated with only four parameters. The practical security of the SNS protocol with flawed and leaky source can be guaranteed. Our results might constitute a crucial step towards guaranteeing the practical implementation of the SNS protocol.

9.
Phys Rev Lett ; 123(19): 190501, 2019 Nov 08.
Artigo em Inglês | MEDLINE | ID: mdl-31765197

RESUMO

Recent advances on quantum computing hardware have pushed quantum computing to the verge of quantum supremacy. Here, we bring together many-body quantum physics and quantum computing by using a method for strongly interacting two-dimensional systems, the projected entangled-pair states, to realize an effective general-purpose simulator of quantum algorithms. The classical computing complexity of this simulator is directly related to the entanglement generation of the underlying quantum circuit rather than the number of qubits or gate operations. We apply our method to study random quantum circuits, which allows us to quantify precisely the memory usage and the time requirements of random quantum circuits. We demonstrate our method by computing one amplitude for a 7×7 lattice of qubits with depth (1+40+1) on the Tianhe-2 supercomputer.

10.
Opt Express ; 25(15): 16971-16980, 2017 Jul 24.
Artigo em Inglês | MEDLINE | ID: mdl-28789196

RESUMO

The device-independent (DI) quantum key distribution (QKD) protocol requires minimal assumptions about the devices and its security relies on the violation of Bell inequalities, making it hard to realize in real world. Semi-device-independent (SDI) QKD protocol confines quantum state within finite dimensional Hilbert space, thus easier for implementation with existing experimental technology. In this paper, we propose a practical SDI prepare-and-measure BB84 protocol. By introducing min entropy for security proof, we obtain a security bound under the practical condition with finite resources. Numerical simulations imply the finite-key effect can not be ignored in the forthcoming SDI QKD experiment.

11.
Opt Express ; 24(18): 20763-73, 2016 Sep 05.
Artigo em Inglês | MEDLINE | ID: mdl-27607679

RESUMO

Recently, a novel protocol named round-robin differential phase-shift (RRDPS) quantum key distribution [Nature 509, 475(2014)] has been proposed. It can estimate information leakage without monitoring bit error rate. In this paper, we study the performance of RRDPS using heralded single photon source (HSPS) without and with decoy-state method, then compare it with the performance of weak coherent pulses (WCPs). From numerical simulation, we can see that HSPS performs better especially for shorter packet and higher bit error rate. Moreover, we propose a general theory of decoy-state method for RRDPS protocol based on only three decoy states and one signal state. Taking WCPs as an example, the three-intensity decoy-state protocol can distribute secret keys over a distance of 128 km when the length of pulses packet is 32, which confirms great practical interest of our method.

12.
Sci Rep ; 7(1): 15265, 2017 11 10.
Artigo em Inglês | MEDLINE | ID: mdl-29127408

RESUMO

Boson sampling is strongly believed to be intractable for classical computers but solvable with photons in linear optics, which raises widespread concern as a rapid way to demonstrate the quantum supremacy. However, due to its solution is mathematically unverifiable, how to certify the experimental results becomes a major difficulty in the boson sampling experiment. Here, we develop a statistical analysis scheme to experimentally certify the collision-free boson sampling. Numerical simulations are performed to show the feasibility and practicability of our scheme, and the effects of realistic experimental conditions are also considered, demonstrating that our proposed scheme is experimentally friendly. Moreover, our broad approach is expected to be generally applied to investigate multi-particle coherent dynamics beyond the boson sampling.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA