We report the first hybrid matter-photon implementation of verifiable blind quantum computing. We use a trapped-ion quantum server and a client-side photonic detection system networked via a fiber-optic quantum link. The availability of memory qubits and deterministic entangling gates enables interactive protocols without postselection-key requirements for any scalable blind server, which previous realizations could not provide.
View Article and Find Full Text PDFAll laser-driven entangling operations for trapped-ion qubits have hitherto been performed without control of the optical phase of the light field, which precludes independent tuning of the carrier and motional coupling. By placing ^{88}Sr^{+} ions in a λ=674 nm standing wave, whose relative position is controlled to ≈λ/100, we suppress the carrier coupling by a factor of 18, while coherently enhancing the spin-motion coupling. We experimentally demonstrate that the off-resonant carrier coupling imposes a speed limit for conventional traveling-wave Mølmer-Sørensen gates; we use the standing wave to surpass this limit and achieve a gate duration of 15 μs, restricted by the available laser power.
View Article and Find Full Text PDFWe integrate a long-lived memory qubit into a mixed-species trapped-ion quantum network node. Ion-photon entanglement first generated with a network qubit in ^{88}Sr^{+} is transferred to ^{43}Ca^{+} with 0.977(7) fidelity, and mapped to a robust memory qubit.
View Article and Find Full Text PDFOptical atomic clocks are our most precise tools to measure time and frequency. Precision frequency comparisons between clocks in separate locations enable one to probe the space-time variation of fundamental constants and the properties of dark matter, to perform geodesy and to evaluate systematic clock shifts. Measurements on independent systems are limited by the standard quantum limit; measurements on entangled systems can surpass the standard quantum limit to reach the ultimate precision allowed by quantum theory-the Heisenberg limit.
View Article and Find Full Text PDFCryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett-Brassard scheme provide information-theoretic security against such attacks, a much stronger form of security unreachable by classical means. However, quantum protocols realized so far are subject to a new class of attacks exploiting a mismatch between the quantum states or measurements implemented and their theoretical modelling, as demonstrated in numerous experiments.
View Article and Find Full Text PDF