Spatial-mode demultiplexing (SPADE) has recently been adopted to measure the separation in the transverse plane between two incoherent point-like sources with sub-wavelength separation. It has been argued that this approach may yield extraordinary performances in the photon-counting regime. Here, we explore SPADE as a tool for precision measurements in the regime of bright, incoherent sources.
View Article and Find Full Text PDFSimulating the real-time dynamics of gauge theories represents a paradigmatic use case to test the hardware capabilities of a quantum computer, since it can involve non-trivial input states' preparation, discretized time evolution, long-distance entanglement, and measurement in a noisy environment. We implemented an algorithm to simulate the real-time dynamics of a few-qubit system that approximates the Schwinger model in the framework of lattice gauge theories, with specific attention to the occurrence of a dynamical quantum phase transition. Limitations in the simulation capabilities on IBM Quantum were imposed by noise affecting the application of single-qubit and two-qubit gates, which combine in the decomposition of Trotter evolution.
View Article and Find Full Text PDFEstimating the angular separation between two incoherent thermal sources is a challenging task for direct imaging, especially at lengths within the diffraction limit. Moreover, detecting the presence of multiple sources of different brightness is an even more severe challenge. We experimentally demonstrate two tasks for super-resolution imaging based on hypothesis testing and quantum metrology techniques.
View Article and Find Full Text PDFA quantum key distribution (QKD) system must fulfill the requirement of universal composability to ensure that any cryptographic application (using the QKD system) is also secure. Furthermore, the theoretical proof responsible for security analysis and key generation should cater to the number N of the distributed quantum states being finite in practice. Continuous-variable (CV) QKD based on coherent states, despite being a suitable candidate for integration in the telecom infrastructure, has so far been unable to demonstrate composability as existing proofs require a rather large N for successful key generation.
View Article and Find Full Text PDFDetecting the faint emission of a secondary source in the proximity of the much brighter one has been the most severe obstacle for using direct imaging in searching for exoplanets. Using quantum state discrimination and quantum imaging techniques, we show that one can significantly reduce the probability of error for detecting the presence of a weak secondary source, especially when the two sources have small angular separations. If the weak source has intensity ε≪1 relative to the bright source, we find that the error exponent can be improved by a factor of 1/ε.
View Article and Find Full Text PDFQuantum random number generators promise perfectly unpredictable random numbers. A popular approach to quantum random number generation is homodyne measurements of the vacuum state, the ground state of the electro-magnetic field. Here we experimentally implement such a quantum random number generator, and derive a security proof that considers quantum side-information instead of classical side-information only.
View Article and Find Full Text PDFPhys Rev Lett
February 2020
We solve the general problem of determining, through imaging, the three-dimensional positions of N weak incoherent pointlike emitters in an arbitrary spatial configuration. We show that a structured measurement strategy in which a passive linear interferometer feeds into an array of photodetectors is always optimal for this estimation problem, in the sense that it saturates the quantum Cramér-Rao bound. We provide a method for the explicit construction of the optimal interferometer.
View Article and Find Full Text PDFOne crucial step in any quantum key distribution (QKD) scheme is parameter estimation. In a typical QKD protocol the users have to sacrifice part of their raw data to estimate the parameters of the communication channel as, for example, the error rate. This introduces a trade-off between the secret key rate and the accuracy of parameter estimation in the finite-size regime.
View Article and Find Full Text PDFWe demonstrate a large-scale tunable-coupling ring resonator array, suitable for high-dimensional classical and quantum transforms, in a CMOS-compatible silicon photonics platform. The device consists of a waveguide coupled to 15 ring-based dispersive elements with programmable linewidths and resonance frequencies. The ability to control both quality factor and frequency of each ring provides an unprecedented 30 degrees of freedom in dispersion control on a single spatial channel.
View Article and Find Full Text PDFWe consider the estimation of noise parameters in a quantum channel, assuming the most general strategy allowed by quantum mechanics. This is based on the exploitation of unlimited entanglement and arbitrary quantum operations, so that the channel inputs may be interactively updated. In this general scenario, we draw a novel connection between quantum metrology and teleportation.
View Article and Find Full Text PDFWe determine the ultimate potential of quantum imaging for boosting the resolution of a far-field, diffraction-limited, linear imaging device within the paraxial approximation. First, we show that the problem of estimating the separation between two pointlike sources is equivalent to the estimation of the loss parameters of two lossy bosonic channels, i.e.
View Article and Find Full Text PDFPhys Rev A (Coll Park)
January 2016
Shannon proved in 1949 that information-theoretic-secure encryption is possible if the encryption key is used only once, is random, and is at least as long as the message itself. Notwithstanding, when information is encoded in a quantum system, the phenomenon of quantum data locking allows one to encrypt a message with a shorter key and still provide information-theoretic security. We present one of the first feasible experimental demonstrations of quantum data locking for direct communication and propose a scheme for a quantum enigma machine that encrypts 6 bits per photon (containing messages, new encryption keys, and forward error correction bits) with less than 6 bits per photon of encryption key while remaining information-theoretically secure.
View Article and Find Full Text PDFMost methods of optimal control cannot obtain accurate time-optimal protocols. The quantum brachistochrone equation is an exception, and has the potential to provide accurate time-optimal protocols for a wide range of quantum control problems. So far, this potential has not been realized, however, due to the inadequacy of conventional numerical methods to solve it.
View Article and Find Full Text PDFQuantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known.
View Article and Find Full Text PDFWe introduce a general model describing correlated noise effects in quantum optical communication via attenuating media. The memory effects account for the environment finite relaxation times, which are unavoidable in any realistic model. The use of a proper set of collective field variables allows us to unravel the memory, showing that the n-fold concatenation of the memory channel is unitarily equivalent to the direct product of n single-mode lossy bosonic channels.
View Article and Find Full Text PDF