Approaching Single-Photon Pulses with Weak Coherent States and Nonlinear Phase Modulation

Author(s):  
Jonathan Rodrigues Da Silva ◽  
Joao Batista Rosa Silva ◽  
Rubens Viana Ramos
2010 ◽  
Vol 82 (6) ◽  
Author(s):  
Marco Barbieri ◽  
Nicolò Spagnolo ◽  
Marco G. Genoni ◽  
Franck Ferreyrol ◽  
Rémi Blandino ◽  
...  

2018 ◽  
Vol 25 (02) ◽  
pp. 1850007 ◽  
Author(s):  
Anita Da̧browska

Using Gardiner and Collet’s input-output model and the concept of cascade system, we determine the filtering equation for a quantum system driven by light in some specific nonclassical states. The quantum system and electromagnetic field are described by making use of quantum stochastic unitary evolution. We consider two examples of the nonclassical states of field: a combination of vacuum and single photon states and a mixture of two coherent states. The stochastic evolution conditioned on the results of the photon counting and quadrature measurements is described.


2014 ◽  
Vol 14 (3&4) ◽  
pp. 236-254
Author(s):  
Xiao-Ming Xiu ◽  
Li Dong ◽  
Hong-Zhi Shen ◽  
Ya-Jun Gao ◽  
X. X. Yi

We propose a protocol of quantum privacy comparison with polarization-entangled Einstein-Podolsky-Rosen (Bell) states and the coherent states. One of two legitimate participants, Alice, prepares polarization-entangled Bell states and keeps one photon of each photon pair and sends the other photons to the third party, Charlie. Receiving the photons, Charlie performs single-photon transformation operations on them and then sends them to the other legitimate participant, Bob. Three participants adopt parity analysis method to check the distribution security of Bell states. Exploiting polarization beam splitters and nonlinear interactions mediated by the probe coherent states in Kerr media, Alice and Bob check the parities of their photons using the bases of $\{\ket H, \ket V\}$ or $\{\ket +, \ket -\}$. On the basis of the parity analysis outcomes and Charlie's publicized information, they can analyze the security of the distributed quantum channel. Confirming secure distribution of the shared Bell states, two participants perform respective parity measurements on the privacy photons and own photons of Bell states, and then send the results to Charlie. According to information provided by two legitimate participants and his single-qubit transformation operations, Charlie compares the privacy information of Alice and Bob and publicizes the conclusion.


2011 ◽  
Vol 11 (1&2) ◽  
pp. 124-141
Author(s):  
Nguyen B. An ◽  
Kisik Kim ◽  
Jaewan Kim

We propose a scheme to generate a recently introduced type of entangled coherent states using realistic weak cross-Kerr nonlinearities and intense laser beams. An intense laser can be filtered to make a faint one to be used for production of a single photon which is necessary in our scheme. The optical devices used are conventional ones such as interferometer, mirrors, beam-splitters, phase-shifters and photo-detectors. We also provide a detailed analysis on the effects of possible imperfections and decoherence showing that our scheme is robust against such effects.


2019 ◽  
Vol 39 (12) ◽  
pp. 1206006
Author(s):  
王瑜浩 Wang Yuhao ◽  
武保剑 Wu Baojian ◽  
万峰 Wan Feng ◽  
文峰 Wen Feng

2017 ◽  
Vol 46 (2) ◽  
pp. 223001
Author(s):  
郭园园 GUO Yuan-yuan ◽  
高冬阳 GAO Dong-yang ◽  
胡友勃 HU You-bo ◽  
李健军 LI Jian-jun ◽  
郑小兵 ZHENG Xiao-bing ◽  
...  

2010 ◽  
Vol 283 (5) ◽  
pp. 741-746 ◽  
Author(s):  
W.J. Munro ◽  
K. Nemoto ◽  
G.J. Milburn

Sign in / Sign up

Export Citation Format

Share Document