scispace - formally typeset
Search or ask a question
Author

Masato Koashi

Bio: Masato Koashi is an academic researcher from University of Tokyo. The author has contributed to research in topics: Quantum entanglement & Photon. The author has an hindex of 44, co-authored 207 publications receiving 6542 citations. Previous affiliations of Masato Koashi include Osaka University & Nippon Telegraph and Telephone.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, a two-particle quantum entanglement protocol for secret sharing and splitting was proposed. But the secrecy sharing protocol must be carefully designed in order to detect eavesdropping or a dishonest participant.
Abstract: We show how a quantum secret sharing protocol, similar to that of Hillery, Buzek, and Berthiaume (Los Alamos e-print archive quant-ph/9806063), can be implemented using two-particle quantum entanglement, as available experimentally today. We also discuss in some detail how both two- and three-particle protocols must be carefully designed in order to detect eavesdropping or a dishonest participant. We also discuss the extension of a multiparticle entanglement secret sharing and splitting scheme toward a protocol so that m of n persons with $ml~n$ can retrieve the secret.

861 citations

Journal ArticleDOI
22 May 2014-Nature
TL;DR: It is found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers and has a better tolerance of bit errors and of finite-sized-key effects.
Abstract: Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

299 citations

Journal ArticleDOI
Masato Koashi1
TL;DR: An approach to the unconditional security of quantum key distribution protocols based on a complementarity argument is presented and a secure key rate is derived for the Bennett–Brassard-1984 protocol with an arbitrary source characterized only by a single parameter representing the basis dependence.
Abstract: We present an approach to the unconditional security of quantum key distribution protocols based on a complementarity argument The approach is applicable to, but not limited to, every case that has been treated via the argument by Shor and Preskill based on entanglement distillation, with a benefit of decoupling of the error correction from the privacy amplification It can also treat cases with uncharacterized apparatuses We derive a secure key rate for the Bennett–Brassard-1984 protocol with an arbitrary source characterized only by a single parameter representing the basis dependence

246 citations

Journal ArticleDOI
TL;DR: In this paper, an experimental scheme for concentrating entanglement in partially entangled photon pairs is proposed, where two separated parties obtain one maximally entangled photon pair from two previously shared photon pairs by local operations and classical communication.
Abstract: An experimental scheme for concentrating entanglement in partially entangled photon pairs is proposed. In this scheme, two separated parties obtain one maximally entangled photon pair from two previously shared partially entangled photon pairs by local operations and classical communication. A practical realization of the proposed scheme is discussed, which uses imperfect photon detectors and spontaneous parametric down-conversion as a photon source. This scheme also works for purifying a class of mixed states.

224 citations

Journal ArticleDOI
TL;DR: In this paper, a joint weak measurement of the trajectories of two photons in a photonic version of Hardy's experiment was performed via an entangled meter state in polarization degrees of freedom of the two photons.
Abstract: We implemented a joint weak measurement of the trajectories of two photons in a photonic version of Hardy's experiment. The joint weak measurement has been performed via an entangled meter state in polarization degrees of freedom of the two photons. Unlike Hardy's original argument in which the contradiction is inferred by retrodiction, our experiment reveals its paradoxical nature as preposterous values actually read out from the meter. Such a direct observation of a paradox gives us new insights into the spooky action of quantum mechanics.

202 citations


Cited by
More filters
Journal ArticleDOI
01 Apr 1988-Nature
TL;DR: In this paper, a sedimentological core and petrographic characterisation of samples from eleven boreholes from the Lower Carboniferous of Bowland Basin (Northwest England) is presented.
Abstract: Deposits of clastic carbonate-dominated (calciclastic) sedimentary slope systems in the rock record have been identified mostly as linearly-consistent carbonate apron deposits, even though most ancient clastic carbonate slope deposits fit the submarine fan systems better. Calciclastic submarine fans are consequently rarely described and are poorly understood. Subsequently, very little is known especially in mud-dominated calciclastic submarine fan systems. Presented in this study are a sedimentological core and petrographic characterisation of samples from eleven boreholes from the Lower Carboniferous of Bowland Basin (Northwest England) that reveals a >250 m thick calciturbidite complex deposited in a calciclastic submarine fan setting. Seven facies are recognised from core and thin section characterisation and are grouped into three carbonate turbidite sequences. They include: 1) Calciturbidites, comprising mostly of highto low-density, wavy-laminated bioclast-rich facies; 2) low-density densite mudstones which are characterised by planar laminated and unlaminated muddominated facies; and 3) Calcidebrites which are muddy or hyper-concentrated debrisflow deposits occurring as poorly-sorted, chaotic, mud-supported floatstones. These

9,929 citations

Journal ArticleDOI
TL;DR: In this article, the basic aspects of entanglement including its characterization, detection, distillation, and quantification are discussed, and a basic role of entonglement in quantum communication within distant labs paradigm is discussed.
Abstract: All our former experience with application of quantum theory seems to say: {\it what is predicted by quantum formalism must occur in laboratory} But the essence of quantum formalism - entanglement, recognized by Einstein, Podolsky, Rosen and Schr\"odinger - waited over 70 years to enter to laboratories as a new resource as real as energy This holistic property of compound quantum systems, which involves nonclassical correlations between subsystems, is a potential for many quantum processes, including ``canonical'' ones: quantum cryptography, quantum teleportation and dense coding However, it appeared that this new resource is very complex and difficult to detect Being usually fragile to environment, it is robust against conceptual and mathematical tools, the task of which is to decipher its rich structure This article reviews basic aspects of entanglement including its characterization, detection, distillation and quantifying In particular, the authors discuss various manifestations of entanglement via Bell inequalities, entropic inequalities, entanglement witnesses, quantum cryptography and point out some interrelations They also discuss a basic role of entanglement in quantum communication within distant labs paradigm and stress some peculiarities such as irreversibility of entanglement manipulations including its extremal form - bound entanglement phenomenon A basic role of entanglement witnesses in detection of entanglement is emphasized

6,980 citations

01 Jun 2005

3,154 citations

01 Dec 1982
TL;DR: In this article, it was shown that any black hole will create and emit particles such as neutrinos or photons at just the rate that one would expect if the black hole was a body with a temperature of (κ/2π) (ħ/2k) ≈ 10−6 (M/M)K where κ is the surface gravity of the body.
Abstract: QUANTUM gravitational effects are usually ignored in calculations of the formation and evolution of black holes. The justification for this is that the radius of curvature of space-time outside the event horizon is very large compared to the Planck length (Għ/c3)1/2 ≈ 10−33 cm, the length scale on which quantum fluctuations of the metric are expected to be of order unity. This means that the energy density of particles created by the gravitational field is small compared to the space-time curvature. Even though quantum effects may be small locally, they may still, however, add up to produce a significant effect over the lifetime of the Universe ≈ 1017 s which is very long compared to the Planck time ≈ 10−43 s. The purpose of this letter is to show that this indeed may be the case: it seems that any black hole will create and emit particles such as neutrinos or photons at just the rate that one would expect if the black hole was a body with a temperature of (κ/2π) (ħ/2k) ≈ 10−6 (M/M)K where κ is the surface gravity of the black hole1. As a black hole emits this thermal radiation one would expect it to lose mass. This in turn would increase the surface gravity and so increase the rate of emission. The black hole would therefore have a finite life of the order of 1071 (M/M)−3 s. For a black hole of solar mass this is much longer than the age of the Universe. There might, however, be much smaller black holes which were formed by fluctuations in the early Universe2. Any such black hole of mass less than 1015 g would have evaporated by now. Near the end of its life the rate of emission would be very high and about 1030 erg would be released in the last 0.1 s. This is a fairly small explosion by astronomical standards but it is equivalent to about 1 million 1 Mton hydrogen bombs. It is often said that nothing can escape from a black hole. But in 1974, Stephen Hawking realized that, owing to quantum effects, black holes should emit particles with a thermal distribution of energies — as if the black hole had a temperature inversely proportional to its mass. In addition to putting black-hole thermodynamics on a firmer footing, this discovery led Hawking to postulate 'black hole explosions', as primordial black holes end their lives in an accelerating release of energy.

2,947 citations