1
|
Lum DJ, Mazurek MD, Mikhaylov A, Parzuchowski KM, Wilson RN, Jimenez R, Gerrits T, Stevens MJ, Cicerone MT, Camp CH. Witnessing the survival of time-energy entanglement through biological tissue and scattering media. BIOMEDICAL OPTICS EXPRESS 2021; 12:3658-3670. [PMID: 34221686 PMCID: PMC8221931 DOI: 10.1364/boe.423743] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/26/2021] [Revised: 05/19/2021] [Accepted: 05/20/2021] [Indexed: 06/13/2023]
Abstract
We demonstrate the preservation of the time-energy entanglement of near-IR photons through thick biological media (≤1.55 mm) and tissue (≤ 235 μm) at room temperature. Using a Franson-type interferometer, we demonstrate interferometric contrast of over 0.9 in skim milk, 2% milk, and chicken tissue. This work supports the many proposed opportunities for nonclassical light in biological imaging and analyses from sub-shot noise measurements to entanglement-enhanced fluorescence imaging, clearly indicating that the entanglement characteristics of photons can be maintained even after propagation through thick, turbid biological samples.
Collapse
Affiliation(s)
- Daniel J. Lum
- National Institute of Standards and Technology, Gaithersburg, MD 20899, USA
| | - Michael D. Mazurek
- Department of Physics, University of Colorado, Boulder CO 80309, USA
- National Institute of Standards and Technology, Boulder, CO 80305, USA
| | | | - Kristen M. Parzuchowski
- Department of Physics, University of Colorado, Boulder CO 80309, USA
- JILA, 440 UCB, University of Colorado, Boulder, CO 80309, USA
| | - Ryan N. Wilson
- Department of Physics, University of Colorado, Boulder CO 80309, USA
- JILA, 440 UCB, University of Colorado, Boulder, CO 80309, USA
| | - Ralph Jimenez
- JILA, 440 UCB, University of Colorado, Boulder, CO 80309, USA
- Department of Chemistry, 215 UCB, University of Colorado, Boulder, CO 80309, USA
| | - Thomas Gerrits
- National Institute of Standards and Technology, Gaithersburg, MD 20899, USA
| | - Martin J. Stevens
- National Institute of Standards and Technology, Boulder, CO 80305, USA
| | - Marcus T. Cicerone
- National Institute of Standards and Technology, Gaithersburg, MD 20899, USA
- School of Chemistry & Biochemistry, Georgia Institute of Technology, Atlanta, GA 30332, USA
| | - Charles H. Camp
- National Institute of Standards and Technology, Gaithersburg, MD 20899, USA
| |
Collapse
|
2
|
Abstract
A novel method of macroscopically entangled light-pair generation is presented for a quantum laser using randomness-based deterministic phase control of coherent light in a coupled Mach-Zehnder interferometer (MZI). Unlike the particle nature-based quantum correlation in conventional quantum mechanics, the wave nature of photons is applied for collective phase control of coherent fields, resulting in a deterministically controllable nonclassical phenomenon. For the proof of principle, the entanglement between output light fields from a coupled MZI is examined using the Hong-Ou-Mandel-type anticorrelation technique, where the anticorrelation is a direct evidence of the nonclassical features in an interferometric scheme. For the generation of random phase bases between two bipartite input coherent fields, a deterministic control of opposite frequency shifts results in phase sensitive anticorrelation, which is a macroscopic quantum feature.
Collapse
Affiliation(s)
- Byoung S Ham
- Center for Photon Information Processing, School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, 123 Chumdangwagi-ro, Buk-gu, Gwangju, 61005, South Korea.
| |
Collapse
|
3
|
Bright-light detector control emulates the local bounds of Bell-type inequalities. Sci Rep 2020; 10:13205. [PMID: 32764651 PMCID: PMC7413270 DOI: 10.1038/s41598-020-70045-7] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/24/2020] [Accepted: 07/15/2020] [Indexed: 11/08/2022] Open
Abstract
It is well-known that no local model-in theory-can simulate the outcome statistics of a Bell-type experiment as long as the detection efficiency is higher than a threshold value. For the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality this theoretical threshold value is [Formula: see text]. On the other hand, Phys. Rev. Lett. 107, 170404 (2011) outlined an explicit practical model that can fake the CHSH inequality for a detection efficiency of up to 0.5. In this work, we close this gap. More specifically, we propose a method to emulate a Bell inequality at the threshold detection efficiency using existing optical detector control techniques. For a Clauser-Horne-Shimony-Holt inequality, it emulates the CHSH violation predicted by quantum mechanics up to [Formula: see text]. For the Garg-Mermin inequality-re-calibrated by incorporating non-detection events-our method emulates its exact local bound at any efficiency above the threshold. This confirms that attacks on secure quantum communication protocols based on Bell violation is a real threat if the detection efficiency loophole is not closed.
Collapse
|
4
|
Di Falco A, Mazzone V, Cruz A, Fratalocchi A. Perfect secrecy cryptography via mixing of chaotic waves in irreversible time-varying silicon chips. Nat Commun 2019; 10:5827. [PMID: 31862881 PMCID: PMC6925125 DOI: 10.1038/s41467-019-13740-y] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/28/2019] [Accepted: 11/13/2019] [Indexed: 11/17/2022] Open
Abstract
Protecting confidential data is a major worldwide challenge. Classical cryptography is fast and scalable, but is broken by quantum algorithms. Quantum cryptography is unclonable, but requires quantum installations that are more expensive, slower, and less scalable than classical optical networks. Here we show a perfect secrecy cryptography in classical optical channels. The system exploits correlated chaotic wavepackets, which are mixed in inexpensive and CMOS compatible silicon chips. The chips can generate 0.1 Tbit of different keys for every mm of length of the input channel, and require the transmission of an amount of data that can be as small as 1/1000 of the message's length. We discuss the security of this protocol for an attacker with unlimited technological power, and who can access the system copying any of its part, including the chips. The second law of thermodynamics and the exponential sensitivity of chaos unconditionally protect this scheme against any possible attack.
Collapse
Affiliation(s)
- A Di Falco
- School of Physics and Astronomy, University of St. Andrews, North Haugh, St. Andrews, KY16 9SS, UK
| | - V Mazzone
- PRIMALIGHT, Faculty of Electrical Engineering, Applied Mathematics and Computational Science, King Abdullah University of Science and Technology, Thuwal, 23955-6900, Saudi Arabia
| | - A Cruz
- Center for Unconventional Processes of Sciences (CUP Science), 6475 E Pacific Coast Highway, Los Angeles, CA, 90803, USA
| | - A Fratalocchi
- PRIMALIGHT, Faculty of Electrical Engineering, Applied Mathematics and Computational Science, King Abdullah University of Science and Technology, Thuwal, 23955-6900, Saudi Arabia.
| |
Collapse
|
5
|
Chistiakov V, Huang A, Egorov V, Makarov V. Controlling single-photon detector ID210 with bright light. OPTICS EXPRESS 2019; 27:32253-32262. [PMID: 31684442 DOI: 10.1364/oe.27.032253] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/27/2019] [Accepted: 10/11/2019] [Indexed: 06/10/2023]
Abstract
We experimentally demonstrate that a single-photon detector ID210 commercially available from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination. In quantum key distribution, this vulnerability can be exploited by an eavesdropper to perform a faked-state attack giving her full knowledge of the key without being noticed. We consider the attack on standard BB84 protocol and a subcarrier-wave scheme and outline a possible countermeasure.
Collapse
|
6
|
Vedovato F, Agnesi C, Tomasin M, Avesani M, Larsson JÅ, Vallone G, Villoresi P. Postselection-Loophole-Free Bell Violation with Genuine Time-Bin Entanglement. PHYSICAL REVIEW LETTERS 2018; 121:190401. [PMID: 30468593 DOI: 10.1103/physrevlett.121.190401] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/29/2018] [Revised: 09/11/2018] [Indexed: 06/09/2023]
Abstract
Entanglement is an invaluable resource for fundamental tests of physics and the implementation of quantum information protocols such as device-independent secure communications. In particular, time-bin entanglement is widely exploited to reach these purposes both in free space and optical fiber propagation, due to the robustness and simplicity of its implementation. However, all existing realizations of time-bin entanglement suffer from an intrinsic postselection loophole, which undermines their usefulness. Here, we report the first experimental violation of Bell's inequality with "genuine" time-bin entanglement, free of the postselection loophole. We introduced a novel function of the interferometers at the two measurement stations, that operate as fast synchronized optical switches. This scheme allowed us to obtain a postselection-loophole-free Bell violation of more than 9 standard deviations. Since our scheme is fully implementable using standard fiber-based components and is compatible with modern integrated photonics, our results pave the way for the distribution of genuine time-bin entanglement over long distances.
Collapse
Affiliation(s)
- Francesco Vedovato
- Dipartimento di Ingegneria dell'Informazione, Università di Padova, via Gradenigo 6B, 35131 Padova, Italy
- Centro di Ateneo di Studi e Attività Spaziali "G. Colombo", Università di Padova, via Venezia 15, 35131 Padova, Italy
| | - Costantino Agnesi
- Dipartimento di Ingegneria dell'Informazione, Università di Padova, via Gradenigo 6B, 35131 Padova, Italy
| | - Marco Tomasin
- Dipartimento di Ingegneria dell'Informazione, Università di Padova, via Gradenigo 6B, 35131 Padova, Italy
| | - Marco Avesani
- Dipartimento di Ingegneria dell'Informazione, Università di Padova, via Gradenigo 6B, 35131 Padova, Italy
| | - Jan-Åke Larsson
- Institutionen för systemteknik, Linköping Universitet, 581 83 Linköping, Sweden
| | - Giuseppe Vallone
- Dipartimento di Ingegneria dell'Informazione, Università di Padova, via Gradenigo 6B, 35131 Padova, Italy
- Istituto di Fotonica e Nanotecnologie, CNR, via Trasea 7, 35131 Padova, Italy
| | - Paolo Villoresi
- Dipartimento di Ingegneria dell'Informazione, Università di Padova, via Gradenigo 6B, 35131 Padova, Italy
- Istituto di Fotonica e Nanotecnologie, CNR, via Trasea 7, 35131 Padova, Italy
| |
Collapse
|
7
|
Abstract
We adapt the Quantum Monte Carlo method to the cascaded formalism of quantum optics, allowing us to simulate the emission of photons of known energy. Statistical processing of the photon clicks thus collected agrees with the theory of frequency-resolved photon correlations, extending the range of applications based on correlations of photons of prescribed energy, in particular those of a photon-counting character. We apply the technique to autocorrelations of photon streams from a two-level system under coherent and incoherent pumping, including the Mollow triplet regime where we demonstrate the direct manifestation of leapfrog processes in producing an increased rate of two-photon emission events.
Collapse
|
8
|
Sajeed S, Huang A, Sun S, Xu F, Makarov V, Curty M. Insecurity of Detector-Device-Independent Quantum Key Distribution. PHYSICAL REVIEW LETTERS 2016; 117:250505. [PMID: 28036200 DOI: 10.1103/physrevlett.117.250505] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/20/2016] [Indexed: 06/06/2023]
Abstract
Detector-device-independent quantum key distribution (DDI-QKD) held the promise of being robust to detector side channels, a major security loophole in quantum key distribution (QKD) implementations. In contrast to what has been claimed, however, we demonstrate that the security of DDI-QKD is not based on postselected entanglement, and we introduce various eavesdropping strategies that show that DDI-QKD is in fact insecure against detector side-channel attacks as well as against other attacks that exploit devices' imperfections of the receiver. Our attacks are valid even when the QKD apparatuses are built by the legitimate users of the system themselves, and thus, free of malicious modifications, which is a key assumption in DDI-QKD.
Collapse
Affiliation(s)
- Shihan Sajeed
- Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario N2L 3G1 Canada
- Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1 Canada
| | - Anqi Huang
- Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario N2L 3G1 Canada
- Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1 Canada
| | - Shihai Sun
- College of Science, National University of Defense Technology, Changsha 410073, China
| | - Feihu Xu
- Research Laboratory of Electronics, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, Massachusetts 02139, USA
| | - Vadim Makarov
- Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario N2L 3G1 Canada
- Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1 Canada
- Department of Physics and Astronomy, University of Waterloo, Waterloo, Ontario N2L 3G1 Canada
| | - Marcos Curty
- Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo E-36310, Spain
| |
Collapse
|
9
|
Quantum security hacked by light. Nature 2015. [DOI: 10.1038/528439a] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
|