scispace - formally typeset
Search or ask a question

Showing papers by "Stefano Pirandola published in 2015"


Journal ArticleDOI
TL;DR: In this paper, a review of state-of-the-art quantum teleportation technologies, from photonic qubits and optical modes to atomic ensembles, trapped atoms and solid-state systems, is presented.
Abstract: This review covers state-of-the-art quantum teleportation technologies, from photonic qubits and optical modes to atomic ensembles, trapped atoms and solid-state systems. Open issues and potential future implementations are also discussed. Quantum teleportation is one of the most important protocols in quantum information. By exploiting the physical resource of entanglement, quantum teleportation serves as a key primitive across a variety of quantum information tasks and represents an important building block for quantum technologies, with a pivotal role in the continuing progress of quantum communication, quantum computing and quantum networks. Here we summarize the basic theoretical ideas behind quantum teleportation and its variant protocols. We focus on the main experiments, together with the technical advantages and disadvantages associated with the use of the various technologies, from photonic qubits and optical modes to atomic ensembles, trapped atoms and solid-state systems. After analysing the current state-of-the-art, we finish by discussing open issues, challenges and potential future implementations.

637 citations


Journal ArticleDOI
TL;DR: A coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved, is designed and proposed.
Abstract: Quantum cryptography achieves a formidable task—the remote distribution of secret keys by exploiting the fundamental laws of physics. Quantum cryptography is now headed towards solving the practical problem of constructing scalable and secure quantum networks. A significant step in this direction has been the introduction of measurement-device independence, where the secret key between two parties is established by the measurement of an untrusted relay. Unfortunately, although qubit-implemented protocols can reach long distances, their key rates are typically very low, unsuitable for the demands of a metropolitan network. Here we show, theoretically and experimentally, that a solution can come from the use of continuous-variable systems. We design a coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved. Our protocol could be employed to build high-rate quantum networks where devices securely connect to nearby access points or proxy servers. An end-to-end continuous-variable quantum key distribution system with an untrusted node is proposed. A proof-of-principle experiment shows that 10−1 secret key bits per relay use are distributed at 4 dB loss, corresponding to 20 km in optical fibre.

420 citations


Journal ArticleDOI
TL;DR: The error probability of this microwave quantum-illumination system, or quantum radar, is shown to be superior to that of any classical microwave radar of equal transmitted energy.
Abstract: Quantum illumination is a quantum-optical sensing technique in which an entangled source is exploited to improve the detection of a low-reflectivity object that is immersed in a bright thermal background. Here, we describe and analyze a system for applying this technique at microwave frequencies, a more appropriate spectral region for target detection than the optical, due to the naturally occurring bright thermal background in the microwave regime. We use an electro-optomechanical converter to entangle microwave signal and optical idler fields, with the former being sent to probe the target region and the latter being retained at the source. The microwave radiation collected from the target region is then phase conjugated and upconverted into an optical field that is combined with the retained idler in a joint-detection quantum measurement. The error probability of this microwave quantum-illumination system, or quantum radar, is shown to be superior to that of any classical microwave radar of equal transmitted energy.

391 citations


Journal ArticleDOI
TL;DR: This work derives a computable analytical formula for the quantum fidelity between two arbitrary multimode Gaussian states which is simply expressed in terms of their first- and second-order statistical moments.
Abstract: We derive a computable analytical formula for the quantum fidelity between two arbitrary multimode Gaussian states which is simply expressed in terms of their first- and second-order statistical moments. We also show how such a formula can be written in terms of symplectic invariants and used to derive closed forms for a variety of basic quantities and tools, such as the Bures metric, the quantum Fisher information, and various fidelity-based bounds. Our result can be used to extend the study of continuous-variable protocols, such as quantum teleportation and cloning, beyond the current one-mode or two-mode analyses, and paves the way to solve general problems in quantum metrology and quantum hypothesis testing with arbitrary multimode Gaussian resources.

215 citations


Journal ArticleDOI
TL;DR: The necessity of entanglement is re-affirmed in the stronger scenario of device-independent quantum cryptography, where all sources of noise are ascribed to the eavesdropper.
Abstract: Quantum discord is the minimal bipartite resource which is needed for a secure quantum key distribution, being a cryptographic primitive equivalent to non-orthogonality. Its role becomes crucial in device-dependent quantum cryptography, where the presence of preparation and detection noise (inaccessible to all parties) may be so strong to prevent the distribution and distillation of entanglement. The necessity of entanglement is re-affirmed in the stronger scenario of device-independent quantum cryptography, where all sources of noise are ascribed to the eavesdropper.

168 citations


Journal ArticleDOI
TL;DR: This work analyzes symmetric eavesdropping strategies against the quantum links explicitly showing that, at fixed transmissivity and thermal noise, two-mode coherent attacks are optimal, manifestly outperforming one-mode collective attacks based on independent entangling cloners.
Abstract: We consider the continuous-variable protocol of Pirandola et al. [arXiv:1312.4104] where the secret key is established by the measurement of an untrusted relay. In this network protocol, two authorized parties are connected to an untrusted relay by insecure quantum links. Secret correlations are generated by a continuous-variable Bell detection performed on incoming coherent states. In the present work we provide a detailed study of the symmetric configuration, where the relay is midway between the parties. We analyze symmetric eavesdropping strategies against the quantum links explicitly showing that, at fixed transmissivity and thermal noise, two-mode coherent attacks are optimal, manifestly outperforming one-mode collective attacks based on independent entangling cloners. Such an advantage is shown both in terms of security threshold and secret-key rate.

70 citations


Journal ArticleDOI
TL;DR: Comparing discrete and continuous variables for measurement-device-independent quantum cryptography with real-time quantum cryptography shows promising results in terms of uncertainty and consistency.
Abstract: Reply to 'Discrete and continuous variables for measurement-device-independent quantum cryptography'

52 citations


Journal ArticleDOI
TL;DR: This work identifies the optimal eavesdropping against two-way quantum communication, which is given by a two-mode coherent attack with symmetric and separable correlations.
Abstract: We consider a two-way quantum cryptographic protocol with coherent states assuming direct reconciliation. A detailed security analysis is performed considering a two-mode coherent attack, which represents the residual eavesdropping once the parties have reduced the general attack by applying symmetric random permutations. In this context we provide a general analytical expression for the key rate, discussing the impact of the residual two-mode correlations on the security of the scheme. In particular, we identify the optimal eavesdropping against two-way quantum communication, which is given by a two-mode coherent attack with symmetric and separable correlations.

49 citations


Journal ArticleDOI
26 Jun 2015-Entropy
TL;DR: In this paper, the authors proposed a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers, which can improve the maximal transmission distances.
Abstract: We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an untrusted source and an entanglement swapping protocol with an untrusted relay. Simulation results show that the noiseless linear amplifiers can improve the performance of these two protocols, in terms of maximal transmission distances, when we consider small amounts of entanglement, as typical in realistic setups.

26 citations


Posted Content
29 Oct 2015
TL;DR: In this paper, an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed "teleportation stretching" was established for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing channels in arbitrary dimension.
Abstract: Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. By constructing an upperbound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed "teleportation stretching", we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we determine the fundamental rate-loss trade-off affecting any protocol of quantum key distribution. Our findings set the ultimate limits of point-to-point quantum communications and provide the most precise and general benchmarks for quantum repeaters.

9 citations


Posted Content
29 Oct 2015
TL;DR: In this article, an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed "teleportation stretching" was established for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing channels in arbitrary dimension.
Abstract: Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. By constructing an upperbound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed "teleportation stretching", we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we determine the fundamental rate-loss trade-off affecting any protocol of quantum key distribution. Our findings set the ultimate limits of point-to-point quantum communications and provide the most precise and general benchmarks for quantum repeaters.

Posted Content
TL;DR: In this article, it was shown that the rate of heat transfer between two quantum systems at different temperatures is directly proportional to the instantaneous rate of increase of diagonal/energetic discord between the systems.
Abstract: We show that without quantum correlations, energy cannot flow. The result follows from a simple theorem that shows that systems whose dynamics do not generate quantum discord are effectively non-interacting. We show that the rate of heat transfer between two quantum systems at different temperatures is directly proportional to the instantaneous rate of increase of diagonal/energetic discord between the systems. Consequently, nanoscale heat transfer experiments can be used to measure discord directly. We report the results of a measurement of the increase in discord due to nanoscale heat flow across an aluminum-sapphire interface and find it to be $4.28 \times 10^{24}$ ${\rm bits}\,{\rm m^{-2}}\,{\rm K^{-1}}\,{\rm s^{-1}}$.

Proceedings ArticleDOI
13 Oct 2015
TL;DR: The ideal case where Alice's channel is lossless, i.e., the relay is locally in her lab and the Bell detection is perfomed with unit efficiency is studied, which corresponds to the limit of a trusted local relay, where the detection loss can be re-scaled.
Abstract: We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection. We study the ideal case where Alice's channel is lossless, i.e., the relay is locally in her lab and the Bell detection is perfomed with unit efficiency. This configuration allows us to explore the optimal performances achievable by CV measurement-device-independent quantum key distribution. This corresponds to the limit of a trusted local relay, where the detection loss can be re-scaled. Our theoretical analysis is confirmed by an experimental simulation where 10 -4 secret bits per use can potentially be distributed at 170km assuming ideal reconciliation.

Proceedings ArticleDOI
TL;DR: In this article, the authors consider the case where Alice's channel is lossless, i.e., the relay is locally situated in her lab and the Bell detection is performed with unit efficiency.
Abstract: We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection. We study the ideal case where Alice's channel is lossless, i.e., the relay is locally situated in her lab and the Bell detection is performed with unit efficiency. This configuration allows us to explore the optimal performances achievable by CV measurement-device-independent (MDI) quantum key distribution (QKD). This corresponds to the limit of a trusted local relay, where the detection loss can be re-scaled. Our theoretical analysis is confirmed by an experimental simulation where 10^-4 secret bits per use can potentially be distributed at 170km assuming ideal reconciliation.

Journal ArticleDOI
TL;DR: Simulation results show that the noiseless linear amplifiers can improve the performance of two entanglement-based continuous-variable quantum key distribution protocols, in terms of maximal transmission distances, when the authors consider small amounts ofEntanglement, as typical in realistic setups.
Abstract: We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an untrusted source and an entanglement swapping protocol with an untrusted relay. Simulation results show that the noiseless linear amplifiers can improve the performance of these two protocols, in terms of maximal transmission distances, when we consider small amounts of entanglement, as typical in realistic setups.

Journal ArticleDOI
TL;DR: In this article, the authors search for the optimal strategies which can best see the thermality of the Unruh effect and find that the usual strategy of counting particles in the vacuum can be improved, thereby enhancing the discrimination.
Abstract: Quantum channel discrimination is used to test quantum field theory in non-inertial frames. We search for the optimal strategies which can best see the thermality of the Unruh effect. We find that the usual strategy of counting particles in the vacuum can be improved, thereby enhancing the discrimination. Coherent state probes, which are practical and feasible, give exponential improvement in the discrimination of the Unruh channel and come very close to optimal. In particular, we show that by using a short pulse laser, the accelerations required to test the Unruh effect can be reduced by at least three orders of magnitude with the same statistical confidence as could be achieved in the vacuum. These results are expected to be relevant to upcoming experimental tests of quantum field theory in curved spacetimes in analogue systems.

Journal ArticleDOI
TL;DR: This result further confirms that the security analysis of CV-MDI-QKD must involve a careful minimization over two-mode attacks as originally performed in Pirandola et al. (2015).
Abstract: The security proof of continuous variable (CV) measurement device independent (MDI) quantum key distribution (QKD) cannot be reduced to the analysis of one-mode Gaussian attacks (in particular, independent entangling-cloner attacks). To stress this point, the present note provides a very simple (almost trivial) argument, showing that there are an infinite number of two-mode Gaussian attacks which cannot be reduced to or simulated by one-mode Gaussian attacks. This result further confirms that the security analysis of CV-MDI-QKD must involve a careful minimization over two-mode attacks as originally performed in [S. Pirandola et al., Nature Photon. 9, 397-402 (2015)].

Posted Content
TL;DR: In this article, the authors consider a quantum relay which is used by two parties to perform several continuous-variable protocols: entanglement swapping, distillation, quantum teleportation, and quantum key distribution.
Abstract: We consider a quantum relay which is used by two parties to perform several continuous-variable protocols: Entanglement swapping, distillation, quantum teleportation, and quantum key distribution. The theory of these protocols is extended to a non-Markovian model of decoherence characterized by correlated Gaussian noise. Even if bipartite entanglement is completely lost at the relay, we show that the various protocols can progressively be reactivated by the separable noise-correlations of the environment. In fact, above a critical amount, these correlations are able to restore the distribution of quadripartite entanglement, which can be localized into an exploitable bipartite form by the action of the relay. Our findings are confirmed by a proof-of-principle experiment and show the potential advantages of non-Markovian effects in a quantum network architecture.

Proceedings ArticleDOI
TL;DR: In this paper, the authors consider two bosonic Gaussian channels whose thermal noise is strong enough to break bipartite entanglement and show how the presence of separable correlations between the two channels is able to restore the broken entanglements.
Abstract: We consider two bosonic Gaussian channels whose thermal noise is strong enough to break bipartite entanglement. In this scenario, we show how the presence of separable correlations between the two channels is able to restore the broken entanglement. This reactivation occurs not only in a scheme of direct distribution, where a third party (Charlie) broadcasts entangled states to remote parties (Alice and Bob), but also in a configuration of indirect distribution which is based on entanglement swapping. In both schemes, the amount of entanglement remotely activated can be large enough to be distilled by one-way distillation protocols.

Posted Content
TL;DR: In this article, the critical number of signal modes after which a non-classical source of light is able to beat any classical source irradiating the same number of signals is investigated.
Abstract: Nonclassical states of light play a central role in many quantum information protocols. Their quantum features have been exploited to improve the readout of information from digital memories, modelled as arrays of microscopic beam splitters [S. Pirandola, Phys. Rev. Lett. 106, 090504 (2011)]. In this model of "quantum reading", a nonclassical source of light with Einstein-Podolski-Rosen correlations has been proven to retrieve more information than any classical source. In particular, the quantum-classical comparison has been performed under a global energy constraint, i.e., by fixing the mean total number of photons irradiated over each memory cell. In this paper we provide an alternative analysis which is based on a local energy constraint, meaning that we fix the mean number of photons per signal mode irradiated over the memory cell. Under this assumption, we investigate the critical number of signal modes after which a nonclassical source of light is able to beat any classical source irradiating the same number of signals.

Proceedings ArticleDOI
TL;DR: In this paper, the authors consider two bosonic Gaussian channels whose thermal noise is strong enough to break bipartite entanglement and discuss how the presence of separable correlations between the two channels is able to restore the broken entanglements.
Abstract: We consider two bosonic Gaussian channels whose thermal noise is strong enough to break bipartite entanglement. In this scenario, we discuss how the presence of separable correlations between the two channels is able to restore the broken entanglement. This reactivation occurs not only in a scheme of direct distribution, where a third party (Charlie) broadcasts entangled states to remote parties (Alice and Bob), but also in a configuration of indirect distribution which is based on entanglement swapping. In both schemes, the amount of entanglement remotely activated can be large enough to be distilled by one-way distillation protocols.