scholarly journals Stronger correlations than dense coding with the same quantum resources

Author(s):  
Mohamed Bourennane ◽  
Amelie Piveteau ◽  
Emil Håkarsson ◽  
Jef Pauwels ◽  
Sadiq Muhammad ◽  
...  

Abstract Dense coding is the seminal example of how entanglement can boost quantum communication. By sharing an Einstein-Podolsky-Rosen (EPR) pair, dense coding allows one to transmit two bits of classical information while sending only a single qubit [1]. This doubling of the channel capacity is the largest allowed in quantum theory [2]. In this letter we show in both theory and experiment that same elementary resources, namely a shared EPR pair and qubit communication, are strictly more powerful than two classical bits in more general communication tasks. In contrast to dense coding experiments [3–8], we show that these advantages can be revealed using merely standard optical Bell state analysers [9, 10]. Our results reveal that the power of entanglement in enhancing quantum communications qualitatively goes beyond boosting channel capacities.

2010 ◽  
Vol 08 (08) ◽  
pp. 1355-1371 ◽  
Author(s):  
CHIN-YUNG LU ◽  
SHIOU-AN WANG ◽  
YUH-JIUH CHENG ◽  
SY-YEN KUO

In this paper, we propose a quantum secure direct communication (QSDC) protocol based on Einstein–Podolsky–Rosen (EPR) pairs. Previous QSDC protocols usually consume one EPR pair to transmit a single qubit. If Alice wants to transmit an n-bit message, she needs at least n/2 EPR pairs when a dense coding scheme is used. In our protocol, if both Alice and Bob preshare 2c + 1 EPR pairs with the trusted server, where c is a constant, Alice can transmit an arbitrary number of qubits to Bob. The 2c EPR pairs are used by Alice and Bob to authenticate each other and the remaining EPR pair is used to encode and decode the message qubit. Thus the total number of EPR pairs used for one communication is a constant no matter how many bits will be transmitted. It is not necessary to transmit EPR pairs before transmitting the secret message except for the preshared constant number of EPR pairs. This reduces both the utilization of the quantum channel and the risk. In addition, after the authentication, the server is not involved in the message transmission. Thus we can prevent the server from knowing the message.


Author(s):  
Phillip Kaye ◽  
Raymond Laflamme ◽  
Michele Mosca

We are now ready to look at our first protocols for quantum information. In this section, we examine two communication protocols which can be implemented using the tools we have developed in the preceding sections. These protocols are known as superdense coding and quantum teleportation. Both are inherently quantum: there are no classical protocols which behave in the same way. Both involve two parties who wish to perform some communication task between them. In descriptions of such communication protocols (especially in cryptography), it is very common to name the two parties ‘Alice’ and ‘Bob’, for convenience. We will follow this tradition. We will repeatedly refer to communication channels. A quantum communication channel refers to a communication line (e.g. a fiberoptic cable), which can carry qubits between two remote locations. A classical communication channel is one which can carry classical bits (but not qubits).1 The protocols (like many in quantum communication) require that Alice and Bob initially share an entangled pair of qubits in the Bell state The above Bell state is sometimes referred to as an EPR pair. Such a state would have to be created ahead of time, when the qubits are in a lab together and can be made to interact in a way which will give rise to the entanglement between them. After the state is created, Alice and Bob each take one of the two qubits away with them. Alternatively, a third party could create the EPR pair and give one particle to Alice and the other to Bob. If they are careful not to let them interact with the environment, or any other quantum system, Alice and Bob’s joint state will remain entangled. This entanglement becomes a resource which Alice and Bob can use to achieve protocols such as the following. Suppose Alice wishes to send Bob two classical bits of information. Superdense coding is a way of achieving this task over a quantum channel, requiring only that Alice send one qubit to Bob. Alice and Bob must initially share the Bell state Suppose Alice is in possession of the first qubit and Bob the second qubit.


2003 ◽  
Vol 3 (3) ◽  
pp. 224-228
Author(s):  
H. Terashima ◽  
M. Ueda

Within the framework of relativistic quantum theory, we consider the Einstein-Podolsky-Rosen (EPR) gedanken-experiment in which measurements of the spin are performed by moving observers. We find that the perfect anti-correlation in the same direction between the EPR pair no longer holds in the observers' frame. This does not imply a breakdown of the non-local correlation. We explicitly show that the observers must measure the spin in appropriately chosen different directions in order to observe the perfect anti-correlation. This fact should be taken into account in utilizing the entangled state in quantum communication by moving observers.


2003 ◽  
Vol 14 (06) ◽  
pp. 757-763 ◽  
Author(s):  
XIAOYU LI

In this paper we provide a quantum key distribution (QKD) scheme based on the correlations of Einstein–Podolsky–Rosen (EPR) pairs. The scheme uses an auxiliary qubit to interact with the EPR pair and does the Bell state measurement to get the key. It is proved to be secure. All EPR pairs are used in distributing the key except some error-checking bits. So it is efficient. On the other hand there are less classical communications needed in the scheme.


2004 ◽  
Vol 15 (04) ◽  
pp. 609-617 ◽  
Author(s):  
XIAOYU LI ◽  
HOWARD BARNUM

A quantum authentication scheme is presented in this paper. Two parties share Einstein-Podolsky-Rosen(EPR) pairs previously as the identification token. They create auxiliary EPR pairs to interact with the identification token. Then the authentication is accomplished by a complete Bell state measurement. This scheme is proved to be secure. If no errors and eavesdroppers exist in the transmission, the identification token is unchanged after the authentication. So it can be reused.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Mustafa Gündoğan ◽  
Jasminder S. Sidhu ◽  
Victoria Henderson ◽  
Luca Mazzarella ◽  
Janik Wolters ◽  
...  

AbstractGlobal-scale quantum communication links will form the backbone of the quantum internet. However, exponential loss in optical fibres precludes any realistic application beyond few hundred kilometres. Quantum repeaters and space-based systems offer solutions to overcome this limitation. Here, we analyse the use of quantum memory (QM)-equipped satellites for quantum communication focussing on global range repeaters and memory-assisted (MA-) QKD, where QMs help increase the key rate by synchronising otherwise probabilistic detection events. We demonstrate that satellites equipped with QMs provide three orders of magnitude faster entanglement distribution rates than existing protocols based on fibre-based repeaters or space systems without QMs. We analyse how entanglement distribution performance depends on memory characteristics, determine benchmarks to assess the performance of different tasks and propose various architectures for light-matter interfaces. Our work provides a roadmap to realise unconditionally secure quantum communications over global distances with near-term technologies.


Atoms ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. 76 ◽  
Author(s):  
Alberto Casado ◽  
Santiago Guerra ◽  
José Plácido

TheWigner formalism in the Heisenberg picture constitutes a bridge that connects QuantumOptics to Stochastic Optics. The vacuum field appears explicitly in the formalism, and the wavelikeaspects of light are emphasised. In addition, the zeropoint intensity as a threshold for detection is acommon denominator in both theories. In this paper, after summarising the basic rules of the Wignerapproach and its application to parametric down-conversion, some new results are presented thatdelve into the physical meaning of the zeropoint field in optical quantum communication. Specifically,the relationship between Bell-state distinguishability and the number of sets of zeropoint modesthat take part in the experiment is analysed in terms of the coupling between the phases of thedifferent fields involved and the subtraction of the zeropoint intensity at the detectors. Additionally,the connection between the compatibility theorem in quantum cryptography and zeropoint fieldis stressed.


CLEO: 2015 ◽  
2015 ◽  
Author(s):  
Pavel Lougovski ◽  
Dmitry B. Uskov

Sign in / Sign up

Export Citation Format

Share Document