1. Field of the Invention
The present invention relates to quantum communications and, more specifically, to quantum key distribution over large distances.
2. Background of the Related Art
The Background of the Related Art and the Detailed Description of Preferred Embodiments below cite numerous technical references, which are listed in the Appendix below. The numbers shown in brackets (“[ ]”) refer to specific references listed in the Appendix. For example, “[1]” refers to reference “1” in the Appendix below. All of the references listed in the Appendix below are incorporated by reference herein in their entirety.
Quantum key distribution (QKD) is the most developed application of quantum information, and is the process of using quantum communication to establish a shared key between two parties (usually called “Alice” and “Bob”) without a third party (usually called “Eve”) learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob. This is achieved by Alice encoding the bits of the key as quantum data and sending them to Bob.
Current applications are limited by the fact that the useful bit rate decreases exponentially as a function of increasing range due to the effects of photon loss. For example, a method based on nonlocal interference between entangled macroscopic coherent states has been shown to be limited to roughly 8 km when homodyne measurement is used to distinguish between overlapping coherent states [1]. There is a need for a system and method that will increase this range.
An object of the invention is to solve at least the above problems and/or disadvantages and to provide at least the advantages described hereinafter.
Therefore, an object of the present invention is to provide a system and method for secure communications.
Another object of the present invention is to provide a system and method for secure communications at distances over 8 km.
Another object of the present invention is to provide a system and method for secure communications at distances up to 10,000 km.
Another object of the present invention is to provide a system and method for secure communications utilizing quantum key distribution and state discrimination techniques.
Another object of the present invention is to provide a system and method for secure communications utilizing quantum key distribution, nonlocal interferometry and unitary transformations.
Another object of the present invention is to provide a system and method for secure communications utilizing quantum key distribution, nonlocal interferometry, linear amplifiers and unitary transformations.
Another object of the present invention is to provide a system and method for secure communications utilizing quantum key distribution and nonlinear phase shifts.
Another object of the present invention is to provide a system and method for secure communications utilizing quantum key distribution and nonlinear phase-entangled coherent states.
Another object of the present invention is to provide a system and method for secure communications utilizing quantum key distribution and homodyne measurements.
Another object of the present invention is to provide a system and method for secure communications utilizing quantum key distribution and an Hermitian matrix with digital values.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objects and advantages of the invention may be realized and attained as particularly pointed out in the appended claims.
The invention will be described in detail with reference to the following drawings in which like reference numerals refer to like elements wherein:
The systems and methods of the present invention extend the distance over which QKD can be performed. In a first embodiment of the present invention, the distance over which QKD can be performed with a macroscopic nonlocal interferometer is extended through the use of state discrimination techniques. However, in practice the range obtained through the use of state discrimination techniques will be bound by gigabit data rates, limiting the useful range to approximately 400 km. In a second embodiment of the present invention, a reformulation of a nonlocal interferometer QKD scheme is utilized that uses linear amplifiers. Entanglement will still be a necessary resource in this new scheme, but security will no longer rely on a violation of Bell's inequality. Instead the security will be based on the difficulty an eavesdropper will experience determining a random unitary transformation known only to the sender and receiver [2].
Coherent states are the closest approximation to a classical beam of light. It is well known that a coherent state that undergoes loss in a linear medium, such as an optical fiber, will remain a coherent state but with a reduced amplitude. As a result, there is no decoherence due to photon loss and the phase of the coherent state is preserved.
It has been shown that this property of coherent states could be used to create entangled states known as “photon holes” that are relatively insensitive to loss and amplification [3-5]. The basic idea is illustrated in
We previously showed that entangled photon holes are relatively insensitive to absorption and amplification, unlike other forms of macroscopic entangled states. Generally speaking, if the final state of an atom that absorbs a photon is independent of the location of the hole, then the medium does not retain any “which-path” information that would create decoherence and reduce quantum interference effects. A more detailed discussion of these effects can be found in Ref [3].
Entangled photon holes are sensitive, however, to beam splitter losses, which would limit their suitability for QKD systems under realistic conditions. This difficulty can be mitigated by using entangled states in which the phase of the two coherent states is modulated instead of their amplitude, as illustrated in
One advantage of the entangled phase states of
The source of entangled coherent states 100 pictured in
Beam splitter 110a splits a single photon 102 from photon source 103 into the two paths of the single photon interferometer 205. The photon source 103 is suitably a post selected weak coherent source, such as an attenuated diode laser. Kerr media 155a and 115b are positioned in each path of the single photon interferometer 205. The Kerr media 115a and 115b in each path of the single photon interferometer 205 are suitably Kerr cells, which are preferably implemented with metastable xenon in a high finesse cavity.
A first laser 104a generates coherent optical beam 130 and a second laser 104b generates coherent optical beam 140. Coherent optical beam 130 is directed through Kerr medium 115a, and coherent optical beam 140 is directed through Kerr medium 115b. Lasers 104a and 104b are suitably frequency stabilized diode lasers. Coherent optical beams 130 and 140 preferably have a wavelength of approximately 853 nm for implementations utilizing xenon in a high finesse cavity as a Kerr nonlinearity, however the 1550 nm telecom bandwidth is preferable. Coherent optical beams 130 and 140 preferably have a power of at least approximately 30 mW.
One path 205a of the single photon interferometer 205 is capable of producing a phase shift on coherent optical beam 130 and the other path 205b of the single photon interferometer 2015 is capable of producing a phase shift in coherent optical beam 140. A constant phase shift is added to both beams 130 and 140 so that the beams 130 and 140 can be viewed as having been phase shifted by a positive or negative amount depending on the path taken by the single photon 102. The constant phase shift is preferably imparted onto coherent optical beams 130 and 140 with a wave plate (not shown).
A detector 120 is used to select only those events in which the photon 102 emerges in the path of the detector 120. This creates an entangled phase state similar to that illustrated in
It has been shown that techniques of this kind can be used to construct a nonlocal interferometer, such as the one illustrated in
The source of the phase-entangled coherent states 100 is illustrated in the left-hand side of
|ψs=(|α+)|β−+|α−|β+)/√{square root over (2)} (1)
Here |α+ represents a coherent state in coherent optical beam 130 with a positive phase shift while |β− represents a coherent state in coherent optical beam 140 with a negative phase shift. The states |α− and |β+ are defined in a similar way.
This entangled state can then be probed using two distant single photon interferometers 210 and 220, which are preferably Mach-Zehnder interferometers, as illustrated in the right-hand side of
Homodyne measurements are then made with homodyne detectors 230a and 230b, which are used to determine the final phases of the coherent states after they have passed through both sets of single photon interferometers 210 and 220. Homodyne detectors 230a and 230b are suitably implemented with standard commercially available homodyne detectors. A processor 170 is provided that is in communication with and receives signals from detectors 120, 122, 124 and homodyne detectors 230a and 230b via connections 172. Connections 172 can be implemented with any techniques known in the art, such as wired connections or wireless connections (e.g., WiFi or Bluetooth connections). The processor 170 performs post-selection processing, in which only those events in which detectors 120, 122 and 124 were triggered, and in which both coherent states were measured by homodyne detectors 230a and 230b to have a net phase shift of zero, are accepted.
The processor 170 can be implemented with any type of processing device, such as a general purpose computer, a special purpose computer, a distributed computing platform located in a “cloud”, a server, a tablet computer, a smartphone, a programmed microprocessor or microcontroller and peripheral integrated circuit elements, ASICs or other integrated circuits, hardwired electronic or logic circuits such as discrete element circuits, programmable logic devices such as FPGA, PLD, PLA or PAL or the like. In general, any device on which a finite state machine capable of running the programs and/or applications used to implement the systems and methods described herein can be used as the processor 170.
It can be seen that an outcome of that kind can only occur if both single photons B and C took the left path or if both of them took the right path. This gives rise to quantum interference between the corresponding probability amplitudes, with a relative phase that depends on the values of phase shifts σ1 and σ2. This interference between the left-left and right-right probability amplitudes is analogous to the more familiar long-long and short-short interference that is responsible for the two-photon nonlocal interferometer proposed previously [13].
The state of the system after the photons have passed through the interferometers but before any measurements have been made can be written as
Here the subscripts on the coherent state amplitudes represent the positive and negative phase shifts produced by the Kerr media and a π/2 phase shift has been added upon reflection by a beam splitter. The state of the fields in the output ports of the single-photon interferometers are designated by |1 if a photon is present in that path and |0 if no photons are present (the vacuum state), where i labels the output ports shown in
If the homodyne measurements are capable of completely distinguishing between these phase-shifted states, then the measurement process can be modeled as a projection onto the states of interest [1]. The corresponding projection for the case in which a photon was detected at detectors 120, 122 and 124 while zero net phase shifts were observed for both coherent states can be written as
|p1/23[eiσ
The probability of such an outcome is given by
In the absence of any photon loss or measurement noise, this corresponds to an interference pattern with a visibility of 100%, which can be used to violate the CHSH form of the Bell inequality [14, 15].
Photon loss reduces the visibility of the interference pattern for two reasons. The first problem is decoherence produced by which-path information left in the environment when a photon is absorbed or scattered out of an optical fiber. The second problem is the increasing overlap of the coherent states as their amplitudes are reduced by loss and they approach the vacuum as illustrated in
The effects of photon loss can be included by assuming that beam splitters have been inserted into the long paths between the interferometers. First consider the effects of inserting a single beam splitter with a small reflectivity into the paths of interferometers 205 and 210. If we let |γ± and |δ± denote the coherent states in the output ports of the beam splitters in the paths of interferometers 205 and 210 respectively, then the projection |pL onto the state of interest is given by
|pL=1/23[eiσ
instead of by Eq. (3). Here the primes in the coherent states |α′+−, |α′−+, |β′−+, and |β′+− represent the fact that their amplitudes have been reduced by the beam splitters.
The interference cross terms in pL|pL will be reduced to the extent that there is limited overlap between the states |β− and |γ+, for example. As a result, it can be shown that the visibility ν of the interference pattern will be reduced to
ν=|γ+|γ−|2=exp[−|β+−γ−|2]. (6)
For simplicity, it is assumed that both beams experience the same loss and the square in Eq. (6) reflects the contributions from both beam splitters. We can write |γ± in the form
|γ±=|rαe±iφ, (7)
where r is the reflectivity of the beam splitter inserted into the path to interferometer 205 and α is the initial coherent state amplitude. Then e±iφ terms can be expanded in a Taylor series for small values of φ which reduces Eq. (6) to
ν=exp[−4(rαφ)2]=exp[−4NLφ2]. (8)
NL=(rα)2 is defined as the average number of photons lost in each path.
This reduction in the visibility can be interpreted as being due to information left in the output ports of the beam splitters. The same results are obtained if a large number of beam splitters produce a total loss of NL photons in each path.
The nonlocal interferometer 200 of
The security of the QKD system 150 can be ensured by passing the remaining fraction of the pulses through the single photon interferometers 210 and 220 located at Alice and Bob, respectively. A violation of Bell's inequality ensures that no eavesdropper has intercepted the information.
If homodyne measurements are used to measure the final phase shift of the coherent states, such as is done in the nonlocal interferometer 200 of
The limited range over which Bell's inequality can be violated by the nonlocal interferometer 200 of
Replacing the homodyne measurements of Alice and Bob in
Once one of the coherent states has been displaced to the vacuum in this way, the detection of one or more photons at the displaced output 280 indicates that the other coherent state must have been present. Ignoring the effects of detector noise for the moment, this process allows the two coherent states to be distinguished with certainty some fraction of the time.
A straightforward state discrimination technique that can be used to post-select those events in which the coherent state from laser 104b has undergone a net phase shift of zero is illustrated in
The coherent state at the output of interferometer 210 is first passed through a 50/50 beam splitter 310. A displacement operation is then performed on the coherent state in one of the output ports of the beam splitter 310 with displacement system 250 in such a way as to displace a state with phase shift 2φ to the vacuum. The detection of one or more photons by single photon detector 320a after that displacement operation indicates that a state with phase shift 2φ was not present. The coherent state in the other output port of the beam splitter 300 is then displaced with displacement system 250 in such a way that a state with phase shift −2φ will be displaced to the vacuum, and the detection of one or more photons there with single photon detector 320b indicates that a state with that phase was not present. Post-selection is done by processor 170 (
A similar state discrimination technique is also applied to the coherent state from laser 104a using state discrimination system 300 of
Let operator {circumflex over (B)}(λ) denote the effect of a beam splitter with reflectivity λ acting on two incident coherent states |μ and |ν in input ports 1 and 2, respectively [16]:
{circumflex over (B)}(λ)|μ|ν2=|√{square root over (1−λ)}μ+√{square root over (λ)}ν{circle around (x)}|−√{square root over (λ)}μ+√{square root over (1−λ)}ν. (9)
For the case of a vacuum state in port 1 and a 50/50 beam splitter (λ=½), this simplifies to
A displacement operator {circumflex over (D)}(τ) acting on a coherent state |ν is defined by [17]
{circumflex over (D)}(τ)|ν=|ν+τ, (11)
where both ν and τ are in general complex numbers.
The state of the system before the measurements shown in
Here the single photon and orthogonal terms have been dropped for convenience.
The amplitudes {tilde over (α)}±± of the coherent states in the output ports of the beam splitter shown in
Here we have defined α′≡α′+−=α′−+. Similar results apply to the coherent state from laser 2.
The two displacement operations shown in
{circumflex over (D)}(L)|{tilde over (α)}++=L′+ {circumflex over (D)}(R)|{tilde over (α)}++=|0
{circumflex over (D)}(L)|{tilde over (α)}±∓=|L′0 {circumflex over (D)}(R)|{tilde over (α)}±∓=|R′0
{circumflex over (D)}(L)|{tilde over (α)}−−=|0 {circumflex over (D)}(R)|{tilde over (α)}−−=|R′−. (14)
Here |L+ is used to denote the state of the positively phase-shifted state after the displacement operation, with a similar notation for the other states.
Combining Eqs. (11), (13), and (14) gives the required values of the displacement amplitudes L and R:
The L′0 and R′0 amplitudes will play an essential role in what follows. Applying Eq. (15) to the amplitudes of Eq. (13) gives their values as
The state of the system just before the single photon detectors can be found by applying the relevant beam splitter and displacement operators given above to the state of the system in Eq. (12). The beam splitter operators for beams 104b and 104a will be denoted {circumflex over (B)}a(½) and {circumflex over (B)}b (½) respectively, where the subscripts a and b refer to the output of interferometers 205 and 210. The combined result of all of the beam splitter and displacement operations is then given by
where it was assumed that α=β for convenience.
The case in which the coherent states have been attenuated to the point that there is a negligible probability of detecting more than one photon in any of the single-photon detectors shown in
Here the state |1,1,1,1 corresponds to having a single photon in each of the detectors while the state |1 denotes the presence of a photon in the individual detectors.
Factoring out the common terms reduces Eq. (18) to
which is similar in form to Eqs. (3) and (5). The probability Ps of a successful detection event is given by
where it was assumed once again that the same loss is experienced by both beams (|γ|=|δ|). This corresponds to a visibility of ν=|γ+|γ−|2=exp[−4NLφ2] which is the same as that in Eq. (8). The factors of 1|L0 and 1|R0 only affect the counting rate and not the visibility. This represents a major advantage over the use of homodyne measurements, where the overlap of the coherent states in the presence of loss produces a further decrease in the visibility.
The 1|L0 and 1|R0 factors in Eq. (20) can be evaluated using Eq. (16), which gives
Inserting this into Eq. (20) gives
As an example, consider the case in which α=100, φ=0.0028, there is a loss of 0.15 dB/km in the optical fibers, and a total distance of 140 km between interferometers 210 and 220 (70 km from the source to each interferometer). Then |α′| can be found from the relation |α′|2=|α|210−0.15/70/10=891.251. After the coherent states in each arm have traveled 70 km the number of photons lost in each of the beams is given by |α|2−|α′|2=9108.75=NL. Inserting these values into Eq. (22) with σ1 and σ2 chosen to give the maximum Rmax or minimum Rmin rates gives
R
max=1.97×10−9(α1−α2=π)
R
min=0.28×10−9(σ1−σ2=0). (23)
Assuming a source that operates at a rate of 1 GHz, one can expect approximately 2 coincidence counts per second at the maximum of the interference pattern and 0.3 counts per second when at the minimum. This corresponds to a visibility of 75%, which is in agreement with Eq. (8) and above the 70.7% value needed to violate the CHSH form of Bell's inequality [14, 15].
The state discrimination approach described above has the advantage that the visibility of the interference pattern is not affected by the increased overlap between the phase-shifted coherent states due to photon loss, but the success rate is relatively low due to its dependence on the detection of a total of four photons from the displaced coherent states. An enhanced approach is now described that only requires the detection of two photons in the displaced coherent states, which substantially increases the useful range of the system.
The enhanced state discrimination approach is illustrated in
The left hand side of
These coherent states are then displaced in such a way that the states with zero net phase shift are displaced to the vacuum. Single photon detectors 410a and 410b can then be used to measure the output of each displaced state. The simultaneous detection of a photon by both Alice and Bob indicates that they both must have had a state with a non-zero phase shift. Careful examination of
Again, each of the coherent states is displaced in such a way that the states with zero net phase shift are displaced to the vacuum. No additional beam splitters of the kind shown in
The amplitudes of the three possible coherent states from laser 104b before the displacement operations are a factor of √{square root over (2)} larger than those given by Eq. (13) due to the absence of the beam splitter 300 (in
{circumflex over (D)}(−i|α′|)|α′=|0
{circumflex over (D)}(−i|α′|)|α′−−=∥α′| sin(2φ)+i|α′|(cos(2φ)−1)=|α′D−
{circumflex over (D)}(−i|α′|)|α′++=|−|α′| sin(2φ)+i|α′|(cos(2φ)−1)=|α′D+ (24)
with similar results for beam 104a.
Applying these displacement operators to both beams 104b and 104a in Eq. (12) results in
Here the displaced states |αD± and |βD± have been defined as indicated in Eq. (24). The probability of detecting a single photon in both beam 1 and beam 2 after the displacements shown in
where the notation is analogous to that in Eq. (18).
The detection probability PD is then given by
Assuming once again that both lasers have the same initial amplitude (α=β) and experience the same loss (γ=δ), this reduces to
The amplitudes α′D+ and αD−′ are displaced by equal amounts so that |1|α′D+)|2=|1|α′D−|2. The single-photon term in the usual expression for a coherent states gives
|1|α′D−|2=4|α′|2 sin2(φ)e−4|α′|
This can be inserted into Eq. (28) to give
It can be seen that the visibility of the interference pattern from this approach is the same as that from the previous approach as given in Eq. (8). But the success rate is proportional to |α′φ|4 rather than |α′φ|8, which is a considerable improvement given that |α′φ| is typically much less than 1. As an example, consider a situation in which α=100, φ=0.0028, a loss of 0.15 dB/km in optical fiber, and a total separation of 400 km between interferometers 210 and 220. Then |α′| can be found using |α′|2=|α|210−0.15200/10=10. After the coherent states in each path have propagated 200 km, the number of photons lost in each beam is |α|2−|α′|2=9990=NL. Inserting these values into Eq. (30) gives maximum and minimum coincidence rates of
R
max=5.3×10−9(σ1−σ2=π)
R
min=0.83×10−9(σ1−σ2=0). (31)
A source operating at a rate of 1 GHz would thus produce 5.3 coincidence counts per second when the phase shifts σ1 and σ2 are set to give a maximum and 0.8 counts per second when set to give a minimum. This corresponds to a visibility of ν=exp[−4NLφ2] 73%, which is above the 70.7% value needed to violate the CHSH form of Bell's inequality [14, 15].
This enhanced state discrimination technique essentially doubles the range over which the same coincidence counting rate can be obtained as compared to the state discrimination approach described above. In both cases, the range over which Bell's inequality can be violated in is limited only by the desired coincidence rate, which must be sufficiently large compared to the accidental rate in the detectors. The accidental coincidence counting rate due to dark counts is negligible for most single-photon detectors compared to the rates expected from the example considered above. Detector dark counts as low as 0.0008 counts/s have been observed in silicon avalanche photodiodes, for example, with an even lower rate of accidental coincidences [18].
As discussed above, photon loss ultimately limits the useful range over which entangled macroscopic coherent state interferometry can be used for QKD. This suggests that amplification could be used to extend the useful range by countering the effects of photon loss. The application of amplification to quantum systems is nontrivial since amplification is accompanied by noise. Therefore the use of amplification will require a reformulation of the interferometer 200 of
As in the original QKD scheme, a source of entangled coherent states, such as the source 100 illustrated in
|ψ±=(|α+|β−±|α−|β+)/√{square root over (2)}, (32)
where the |α and |β represent the coherent state amplitudes of lasers 104b and 104a respectively. The subscripts represent whether the coherent state was positively or negatively phase shifted by the Kerr medium. Instead of one beam going to each Alice and Bob as shown in
In this embodiment, the bit information is no longer encoded in the phase shift of two entangled coherent states. Instead the bit value is determined by the phase angle between the superposition of coherent states. Therefore the bit value of Eq. (32) is stored in the ± where the + and − can be assigned to “1” and “0” respectively. The use of this phase angle as a bit value means that the bit is totally entanglement dependent, and can be measured using a two-photon interferometer setup analogous to interferometers 210 and 220 in
Distributed amplification can now be introduced into this scheme to extend the range to approximately 10,000 km. The basic setup is shown in
It is well known that the noise associated with amplifiers in this configuration only increases linearly with distance. Therefore there is no exponential decrease in the signal to noise ratio. To compensate for the noise, Alice can repeatedly send the same bit value N=1/L2 times. Bob can average the results of all of these measurements and use error correction to obtain the bit value with negligible error. The necessity of averaging in this embodiment is one reason why Alice must send both beams to Bob. Bob must be able to perform the averaging locally, meaning he must have both beams; otherwise classical information transfer would be required.
The setup shown in
In order to counter this sort of attack from Eve, the amount of information that Eve has access to needs to be reduced. To do this Alice, prepares M pairs of phase-entangled coherent states and passes them through a linear unitary transformation Û before sending them to Bob, as illustrated in system shown in
At Bob's location, there are nonlocal single photon interferometers 210 and 220 that receive the amplified phase-entangled coherent states from phase-entangled coherent state source 100A. Similarly, there are nonlocal single photon interferometers 210′ and 220′ at Bob's location that receive the amplified phase-entangled coherent states from phase-entangled coherent state source 100B. Essentially, the system shown in
As discussed above, the phase-entangled coherent states are passed through a linear unitary transformation generator 600 for generating unitary linear transformation U before sending them to Bob. By assuming that Û is pre-shared between Alice and Bob, Bob can simply apply the inverse transformation Û−1 using another linear unitary transformation generator 610 to regain the original set of M pairs of phase-entangled coherent states created by Alice and perform averaging to determine the bit value.
To simplify the analysis of this embodiment, we can assume that the unitary transformation Û is given by Û=exp[−iĤ] where Ĥ is a 2M×2M Hermitian matrix with random values of ±1. For example Ĥ could be given by:
The security of the system then depends on how long it takes Eve on average to determine the parameters in Ĥ.
The mutual information between Alice and Eve is very small unless Eve has guessed most of the ± signs in Eq. (33) correctly. This suggests that Eve must try on the order of 24M
The security of the system depends on the assumed exponential difficulty in Eve estimating the parameter Ĥ. To illustrate this, suppose that we instead used a prepare and send protocol without entanglement and sent the bit information encoded as |α+ and |α− as opposed to the phase angle of Eq. (32). Eve would then know the basis for the measurements and could estimate the parameters using a linear estimation technique. This would require only roughly 4M2 attempts. Another advantage to storing the bit information in the entangled phase of the coherent states is that the entangled information cannot be copied and tested repeatedly as it could be classically, where an unlimited number of attempts at decrypting an intercepted message are possible. Ultimately this means that the security is not just a question of limited computational power, but instead a result of the underlying physics.
Although the systems shown in
The linear unitary transformation generators 600/610 are preferably implemented using beam splitters and variable linear phase modulators, such as those described in Ref. [19]. An example of such a linear unitary transformation generator is shown in
Namely, beam splitters 620 and variable phase generators 630 are arranged to provide a linear unitary transformation. The linear unitary transformation can be changed by adjusting the phase shift imparted by variable phase shifters 630, as described in Ref. [19]. The beam splitters 620 are suitably implemented with fused silica fibers, but any other type of beam splitter known in the art may be utilized. The variable phase shifters 630 are suitably implemented with a, electro-optic variable phase shifter, such as a lithium niobate waveguide phase modulator.
The linear unitary transformation generator 600 imparts a unitary linear transformation Û. The variable phase shifters 630 in the linear unitary transformation generator 610 are adjusted so as to impart the inverse transformation Û−1 in order to regain the original set of M pairs of phase-entangled coherent states created by Alice.
The number and placement of beam splitters 620 and variable phase shifters 630 in the linear unitary transformation generators 600 and 610 are appropriate for the M=2 system (two pairs of phase-entangled coherent states) shown in
The foregoing embodiments and advantages are merely exemplary, and are not to be construed as limiting the present invention. The present teaching can be readily applied to other types of apparatuses. The description of the present invention is intended to be illustrative, and not to limit the scope of the claims. Many alternatives, modifications, and variations will be apparent to those skilled in the art. Various changes may be made without departing from the spirit and scope of the invention, as defined in the following claims (after the Appendix below).
This application claims priority to U.S. Provisional Application Ser. No. 61/944,665 filed Feb. 26, 2014, whose entire disclosure is incorporated herein by reference.
This invention was made with government support under Contract No. W31P4Q-10-1-0018 awarded by the Defense Advanced Research Projects Agency (DARPA). The government has certain rights in this invention.
Number | Date | Country | |
---|---|---|---|
61944665 | Feb 2014 | US |