Photonic Entanglement For Fundamental Tests and Quantum Communication
Photonic Entanglement For Fundamental Tests and Quantum Communication
0 (2001) 000000
c Rinton Press
Wolfgang Tittel
Group of Applied Physics, University of Geneva (GAP)
arXiv:quant-ph/0107156v1 31 Jul 2001
Gregor Weihs
Institut of Experimental Physics, University of Vienna (UNIVIE)
Boltzmanngasse 5, 1090 Wien, Austria
1
2 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
Contents
1 Introduction 3
4 Quantum communication 33
4.1 Quantum cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
4.1.1 Quantum cryptography based on faint laser pulses . . . . . . . . . . 33
4.1.2 Quantum cryptography based on photon-pairs . . . . . . . . . . . . 37
4.2 Quantum dense coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4.3 Quantum teleportation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.4 Entanglement swapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
4.5 Purification and distillation . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
5 Conclusion 50
Wolfgang Tittel and Gregor Weihs . . . 3
1 Introduction
Due to its importance for understanding the properties of the quantum world and its
role in applications in the new domain of quantum computation and communication,
entanglement got more and more attention within the physics community throughout the
last 70 years, and, lately, even in the general public.aThe interest in entanglement, a term
invented by Erwin Schrodinger in 19351 ,bwas triggered by a paper by Einstein, Podolsky
and Rosen (EPR) that was published also in 1935.2 In this famous paper, often referred
to as EPR paradox, the authors analyze the predictions for a two-particle state where
neither particle can be considered in a state independent from the other. In contrast, both
subsystems, even if at arbitrarily large distance, form a single entangled system. Based
on the assumption of locality, i.e. that the choice of the type of measurement performed
on one particle can not influence the properties of the other particle, they argued that the
description of reality as given by the wavefunction is not complete.
The question whether or not this is true, or, in other words, whether or not entangle-
ment (and hence non-locality) exists became a very important fundamental issue. It was
Bells discovery of the so-called Bell inequalities in 19643 and their extension to experi-
mental conditions by Clauser et al. in 1969 and 19744,5 that transferred the former purely
philosophical debate to the realms of laboratory experiments. Beginning with the first test
of Bell inequalities in 1972,6 an increasing number of more and more refined experiments
has been performed.7,8 Although the type of particles entangled is of no importance to
demonstrate the existence of non-locality, by far most experiments relied on entangled
photons. Nowadays, although not all experimental loopholes have been closed simultane-
ously in a single experiment (but all of them have already been closed), it is commonly
believed that quantum non-locality is indeed real. Nevertheless, there is still interest in
performing more Bell-type tests. A first motivation is to examine the boundary between
the quantum and the classical world,9,10 a second one are experiments extending the tra-
ditional set-up for Bell-type tests to relativistic configurations and investigating so-called
relativistic non-locality.11 While massive particles prone to decoherence are used for
experiments of the first kind,12 it was again photons that served for experiments of the
second kind.13
Apart from these fundamental motivations, the recent discovery that processing and
exchange of information based on quantum systems enable new forms of computation
and communication, more powerful than its classical analogs, engendered further interest
in entangled systems (see i.e. Refs. [14,15,16 ]). Best known applications in the domain
of quantum communication hence in the domain where photons are most likely best
suited for are quantum cryptography (for a recent review see Ref. [17 ]) and quantum
teleportation.18
In this article, we review experiments based on photonic entanglement, addressing
both fundamental as well as applied aspects. However, although there has been consid-
erable progress in experiments based on continuous quantum variables as well (see e.g.
asearching the internet for entanglement, we found 45.000 pages!
b Entanglement is translated from the original German word Verschrankung.
4 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
Refs. [19,20,21 ]), we will focus only on entanglement between discrete two-level quantum
systems (now called quantum bits or qubits). This enables us to pursue a rather formal
approach, summarizing all experiments under the aspect of experiments with entangled
qubits.
The article is structured along the following lines: In Section 2 we introduce the quan-
tum toolbox in form of sources and analyzers for qubits and entangled qubits, respectively,
and we explain various experimental approaches. The fact that all different realizations
of a qubit are formally equivalent (a qubit is a qubit) then renders the task of presenting
the variety of experiments quite simple: With different arrangements of these few basic
building blocks various issues can be addressed experimentally. This concerns tests of
non-locality (Section 3) as well as applications of entanglement in the domain of quantum
communication (section 4). As we will see, it is sometimes enough to change only minor
things like analyzer settings in order to continuously pass from one to the other side
like from tests of Bell inequalities to quantum tomography and quantum cryptography.
Finally, a short conclusion is given in Section 5.
Wolfgang Tittel and Gregor Weihs . . . 5
Qubits can be represented graphically on the qubit-spheredpictured in Fig. 1. The states |0i
and |1i are localized on the poles of the sphere, any superposition of |0i and |1i with equal
coefficients and are represented on the equator, and qubits with different coefficients
lie on a circle with polar angle tan() = /. Note that any two states represented on
opposite sides of the sphere form a orthonormal basis in the two-dimensional Hilbert space
describing the qubit.
In contrast to classical bits, the outcome of a measurement of a qubit is not always
deterministic. For the general qubit state given in Eq. 1, one finds the value 0 with
probability 2 and the value 1 with probability 2 . Note that this could still be achieved
with a classical bit in a mixture between 0 and 1. However, the unique feature of a
quantum bit is that the basic states |0i and |1i are superposed coherently. Let us consider
the state
1
| i = |0i + |1i .
(2)
2
Measuring this state in a rotated basis with eigenvectors |0 i = |0i+|1i and |1 i = |0i|1i,
we always find the result 0 . This contrasts with an incoherent mixture between |0i and
|1i that stays a mixture in any basis and leads to either result with equal probabilities.
c The bit error rate in standard telecommunication is 109 1012 .
dDepending on the physical property represented also known as Bloch- or Poincare-sphere.
6 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
Fig. 1. The general qubit sphere. Coherent superpositions of |0i and |1i lie on the shell of the
sphere, incoherent ones closer to the origin. All states represented on opposite sides on the shell
of the sphere form a orthonormal basis in the two-dimensional qubit space.
Although, from a theoretical point of view, a qubit is just a qubit independent of its
implementation, one must identify the abstract qubit space with a physical property when
planning an experiment. There are various ways in which qubits can be realized using
single photons.e Every degree of freedom that is available can in principle be exploited.
The available properties are the photons polarization, spatial mode, emission time, or
their frequency.
In addition, depending on the specific goal, there are initial considerations concerning
the wavelength of the photons used: If the goal is to demonstrate the existence of a certain
quantum effect, it is a good idea to work at a wavelength where high efficiency and low noise
single photon detectors (based on silicon avalanche photo diodes (APD)) are commercially
available, hence at around 700800 nm. If the wavelength has to be compatible with optical
fibers as often requested for quantum cryptography or other long distance applications of
e Notethat the generation of a single photon is far from being obvious. In quantum cryptography, single
photons are often mimicked by faint laser pulses with a mean photon number of 0.1.
Wolfgang Tittel and Gregor Weihs . . . 7
quantum communication, the absorption of the fibers require to work in the second or
third telecommunication window (at 1310 and 1550 nm, respectively). Here, only home
made detectors based on Germanium or InGaAs APDs are available. Obviously, the same
reflections hold for the creation of entangled qubits (Section 2.2.1) as well. For a more
detailed discussion of technological issues, see Gisin et al.17
Polarization qubits The most well known realization of a qubit is probably the one
using orthogonal states of polarization. In this case, the qubit-sphere is identical with the
well-known Poincare sphere. We identify left |li and right |ri circular polarized photons
as our basis states |0i and |1i; they are represented on the poles of the sphere. Linear
polarization of any orientation as an equally weighted coherent superposition of |li and
|ri can be found on the equator, and elliptically polarized light elsewhere. Completely
depolarized light as an incoherent superposition of right and left circular polarized photons
is represented by a point located at the origin. Polarization qubits can be created and
measured using polarizers and waveplates oriented at various angles.
is projected onto the basis spanned by the states |0 i = |0i and |1 i = |1i. Spatial-mode
qubits would not be very practical for transmitting quantum information since the phase
between |0i and |1i is easily randomized by different environments acting on the different
modes.
Time-bin qubits A much more robust realization of |0i and |1i in so-called time-bin
qubits is shown in Fig. 3. The switch at Alices is used to transfer the amplitudes of
8 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
both spatial modes arriving with time-difference t large compared to the photons
coherence time (localization) without losses into one mode. The net effect is to create
a superposition of amplitudes describing a photon in two different time-bins. To undo this
transformation, Bob uses a second switch, delaying now the amplitude of the first time-
bin with respect to the amplitude of the second one so that both arrive simultaneously
at the variable coupler identically to the measurement of the mode qubit. This set-up
corresponds to systems developed for faint laser-pulse based quantum cryptography (see
Section 4.1) by British Telecom22 , Los Alamos National Laboratory23 and, in a modified
and even more robust plug&play form, by one of our groups (GAP).24,25 The good
performance of these systems underlines the robustness of time-bin qubits with respect to
decoherence effects as encountered while transiting down an optical fiber.
Superposition in higher dimensions: qu-nits All we said so far was based on super-
position of two orthogonal states. Although this is general for polarization, two dimensions
are only one possibility for superpositions of different modes, emission times, frequencies,
or orbital angular momenta28 which are not restricted to two dimensional Hilbert space.
Fig. 4 shows the straight-forward generalization of a time-bin qubit to a 4-dimensional
qu-quart.29
Fig. 4. Generation and detection of qu-quarts. Depending on the coupling ratios and the phases
1 to 3 , Alice can create any four dimensional time-bin state. The analyzing device at Bobs is
identical to Alices preparation device. A click in one of his detectors corresponds to the projection
on one of the four eigenstates.
the two main types of photon pair sources sources that always create photons in pairs,
however, not necessarily in an entangled state.
Atomic cascades The first sources for entangled photons were constructed using two-
photon transitions in various elements with either very short-lived or even virtual inter-
mediate states.6,30,31 The most notable elements used were Ca and Hg. All these sources
suffered from the common drawback that the atomic decay with two emitted photons is a
three-body process. Therefore, the relative direction of one emitted photon with respect
to the other is completely uncertain. This reduces the achievable collection efficiency to
an extremely low value leading to numerous experimental problems.
Fig. 5. Schematic of a non-collinear type-I SPDC source creating polarization entanglement after
coincidence post-selection behind a beam-splitter (BS).
Momentum or mode entanglement Rarity and Tapster have first realized momen-
tum entanglement in 1990.42 A schematic is shown in Figure 8, left-hand picture.
From the emission of a non-linear crystal, two pairs of spatial (momentum, direction)
modes are extracted by pinholes. Due to the phase matching conditions, photon pairs are
created such that whenever a photon at frequency 21 pump + is emitted into one of
Wolfgang Tittel and Gregor Weihs . . . 13
Fig. 7. Polarization entanglement using two stacked type-I down-conversion crystals with optic
axis oriented at 90 with respect to each other. Depending on the polarization of the pump,
maximally as well as non-maximally entangled states can be created.
14 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
Fig. 8. Schematics of two different mode-entangled source. The phase shifter can act either locally
on one of the modes as shown in the left-hand picture (Rarity et al.42 ), or on both modes |1iA
and |1iB as shown in the right-hand picture (Ribeiro et al.43 ).
the inner two modes its partner at frequency 21 pump will be found in the opposite
outer mode. The momentum entanglement very much resembles the original EPR idea of
a state of two particles whose momenta are correlated in continuous space.2
Another realization has recently been published by Ribeiro et al.43 (see right-hand side
of Fig. 8). Two subsequent crystals are pumped by a laser having a coherence length
larger than the distance between the crystals. The superposition of the two amplitudes
describing a photon pair created either in crystal 1 or in crystal 2 leads to a mode- or
momentum-entangled state.
Time-bin entanglement Using a set-up similar to the one shown in Fig. 3, Brendel
et al.44 proposed and realized the first source for time-bin entangled qubits in 2000 (see
Fig. 9).f A classical light-pulse is split into two subsequent pulses by means of an interfer-
ometer with a large path-length difference. Pumping a nonlinear crystal, a photon pair is
created either by pulse 1 (in time-bin 1) or by pulse 2 (in time-bin 2). Depending on the
coupling ratios of the couplers in the interferometer and the phase , any maximally as
well as non-maximally entangled (pure) state can be realized similar to the polarization
entangled source mentioned above. Furthermore, this set-up can easily be extended to
create time-bin entangled qu-nits (see also Section 5).
Fig. 9. Schematics of a source creating time-bin entangled qubits. Here we show a fiber-optical
realization of the interferometer.
state 2 (see Fig. 10). Therefore, the sum energy of both photons is very well defined
although the energy of each of the two emitted photons is very uncertain. Or, in the time
domain, although the precise emission time of a pair can be predicted only to within the
long lifetime of the initial atomic state, both photons are emitted almost simultaneously
only depending on the short lifetime of the intermediate state.
The first to realize and employ energy-time entanglement in terms of Franson-type
tests of Bell inequalities were Brendel et al.48 in 1992 and, almost simultaneously, Kwiat
et al.49 In contrast to the initial proposal which is based on cascaded atomic transitions,
both took advantage of SPDC in a non-linear crystal pumped by a coherent laser. The
long coherence time of the pump-laser now bounds the emission time of a photon pair
equivalent to the lifetime of the atomic state 1 and the coherence time of the down-
converted photons, which can be as small as 100 fs, determines the degree of simultaneity
of the emission of the photons.
Fig. 10. Schematics for the creation of energy-time entangled photon pairs based on electronic
transitions in a three-level atom. The lifetimes 1 and 3 of the initial and the final state are
supposed to be large compared to the lifetime 2 of the intermediate state.
Fig. 11. Set-up using linear optics for projecting two polarization (right-hand picture) and two
time-bin (left-hand picture) qubits on a basis spanned by the four Bell states. The two photons
enter a beam-splitter (BS) via modes a and b and are then subjected to a polarization-, or arrival-
time measurement, respectively. For polarization qubits, a coincidence between detectors DV and
(or D state, a coincidence between D and
DH H and DV ) corresponds to a projection on the V
+
DH (or DH and DV ) on . For time-bin qubits, detection of both photons in different time bins
yields a projection on a state: if they are found in different spatial modes on , if they leave
the beam-splitter in same spatial mode on the + state similar to the polarization case. Note
that in both schemes only two of the four Bell states can be distinguished.
1998, complete Bell-state analysis is possible even with linear optics if the two particles
are entangled in another degree of freedom as well.54 However, this condition can not be
fulfilled by photons that come from independent sources as required e.g. for entanglement
swapping (Section 4.4).
Recently, Kim et al.55 performed an experiment within the frame of quantum tele-
portation (see Section 4.3) which could lead the way to a complete Bell measurement.
The authors were taking advantage of non-linear interactions, however, even though they
used a classical input, the efficiency was extremely small. Whereas in principle it would
be possible to extend this method to a single photon input, which could carry any qubit
realization, it does not seem feasible with current technology.
A major problem for every Bell state measurement is to erase the identity of the
originally incoherent wave-functions. It must not be possible to infer by any degree of
freedom whether a detected photon originates from a specific mode. One condition that
emerges from this criterion is that the coincidence window should be significantly smaller
than the coherence time of the photons (ultracoincident). It turns out that this situ-
ation is rather tricky to achieve in an experiment, especially if both photons come from
different sources. As can be seen in Ref. [56 ], it involves an elaborate application of a quan-
tum erasure technique using mode-locked pulsed lasers to make the coincidence window
independent of any electronic limitations while still maintaining reasonable count rates.
Fig. 12. Schematics for reconstruction of the density matrix of a two-qubit state. Each of the two
particles is analyzed using a qubit-analyzer. The vectors ~a and ~b specify the bases to be projected
on. Note that the eigenvalues of the different bases lie on a two-dimensional subspace within the
shell of the respective qubit-spheres.
g One might speculate about a generalization of parametric down-conversion to processes, where more than
two photons are generated. However, the corresponding non-linear coefficients are generally many orders
of magnitude lower than in the parametric down-conversion case. As we restricted ourselves to photonic
entanglement, it would be beyond the scope of this article to discuss many-particle entanglements that
have been produced with Rydberg atoms and ions in a trap.63,64
hAs always, postselection means that a state is not actually prepared at any stage in the experiment. Still,
it is possible to observe the correlations that quantum theory predicts for the specific state.
Wolfgang Tittel and Gregor Weihs . . . 19
Shortly after Bells discovery it became clear that no existing experimental data could
be used to find out whether or not non-local behaviour can indeed be observed. Further-
more it turned out that there were still some problems in applying the inequality to real
experiments because of shortcomings of sources, analyzers, and detectors. These short-
comings are usually called loopholes (see Section 3.1.1) because they leave an escape route
open for local realistic theories. To arrive at a logically correct argument against LHV
one has to supplement the strong original Bell inequalities with additional assumptions
which allow to calculate the necessary correlation coefficients from the measured coinci-
dence count rates (see paragraph 3.1.1). Such modified weak inequalities as derived e.g.
1969 by Clauser, Horne, Shimony and Holt (CHSH)4 (Eq. 10), or 1974 by Clauser and
Horne,5 were then used in most experiments to interpret the data.
By today all these shortcomings have been eliminated, though not all of them simul-
taneously in one experiment. The overwhelming evidence suggests that indeed quantum
physics accurately describes nature and that LHV theories have been ruled out.
Fig. 13. General set-up for Bell experiments. A source emits correlated particles, each of which
can be described in a two-dimensional Hilbert space. The qubits then fly back to back towards
two qubit analyzers making projection measurements in bases defined by parameters a and b, re-
spectively. The outcomes of the measurements are correlated, enabling to test via Bell inequalities
whether the two-particle system can be described by a local or by a non-local theory. Note that it
is sufficient to project on two different bases with eigenvalues located on a one-dimensional sub-
space within the shell of the respective qubit-spheres, in contrast to quantum tomography (Section
2.2.3).
In the following we will present a brief history of Bell experiments, give an account of
the current state-of-the-art and discuss the experiments that were instrumental in closing
the loopholes.
starting from the assumption of non-contextuality, it is indeed possible to prove a theorem against hidden
variables. For many years it was an open question how to experimentally test the Bell-Kochen-Specker
theorem. Last year, Simon et al.73 proposed an experiment based on measurements on a single particle
that is in an entangled state of two different degrees of freedom.
Wolfgang Tittel and Gregor Weihs . . . 21
History The following table is a necessarily incomplete account of events in the history of
tests of Bell inequalities. More experiments can be found in Refs. [74,30,31,75,39,76,40,77,78,79,80 ].
1972 Freedman and Clauser perform the first experimental test based on po-
larization entangled photons generated via cascaded atomic transitions,
demonstrating that indeed a Bell inequality is violated for an entangled
system and thus ruling out a local realistic description.6
1982 Aspect et al. measure polarization correlations with two-channel
analyzers.81 Later they carry out an experiment in which they vary the
analyzers during the flight of the particles under test.82
1988 Ou and Mandel and independently Shih and Alley do the first non-
locality experiments using parametric down-conversion sources to create
polarization entanglement.34,83
1990 Rarity and Tapster observe momentum entanglement in their
experiment.84
1992 Brendel et al.48 and a bit later Kwiat et al.49 realize Fransons idea of
a test based on energy-time entanglement.47 Although the source itself
does not produce entangled qubits directly (see Section 2.2.2), the use
of qubit-analyzers post-projects on such states.
1997 Tittel et al. show that the quantum correlations between energy-time
entangled photons are preserved even over distances of more than 10
km.85,86
1998 Weihs et al. close the spacelike separation (Einstein locality) loophole
using randomly switched analyzers. This experiment was based on po-
larization entanglement.87
2001 Rowe et al. perform the first test violating a strong Bell inequality. In
contrast to all other tests that where based on photons, this experiment
took advantage of entangled ions.88
Current status As can be seen from this table, various types of entanglement have
been used for tests of Bell inequalities. In addition, Tittel et al. recently employed time-
bin entangled photons for quantum cryptography (see Section 4.1), an experiment that
can be interpreted as a test of Bell inequalities as well.89 This supports the notion of a
completely abstract formulation of Bells gedankenexperiment in terms of two apparata
each with a variable parameter that produce output correlated results. The generalization
of the original formulation based on Bohms example of two spin 1/2 particles and Stern
Gerlach apparata can for instance be found in a paper by Mermin.90
Presently parametric down-conversion sources (s. Section 2.2.1) in various configura-
tions deliver the highest quality entangled states. The entanglement contrast can be as
high as 99.5% while maintaining reasonable count rates. In terms of standard deviations
and coincidence count rates, some of the most impressive violations of Bell inequalities
were published in Refs. [40,91 ].
As already stated above, there are certain loopholes in most of the realized experiments.
Here we discuss their current status from the experimentalists perspective
Detector efficiency Pearle92 first noticed already in 1970 that in real tests of Bells
inequality, which fall short of detecting all particles that are emitted by the source, one
can still construct a hidden variable model that accurately predicts the observed data
(see also recent work by Santos93 and by Gisin94 ). Afterwards this argument has been
named efficiency loophole because of the fact that various inefficiencies reduce the ratio
of counted to emitted particles sometimes to less than a few percent. These inefficiencies
include incomplete collection of particles from the source, imperfect transmission of optical
elements and analyzer devices, and most important, the far-from ideal detectors.
Violation of a Bell inequality without any supplementary assumption requires an overall
efficiency of more than 82.8%. For photon based experiments this is very difficult to
achieve with present photon counting technology. The threshold can be reduced to 67%
by the help of non-maximally entangled states.95 In both cases the experimental visibility
must be perfect. Although in principle there exist detectors which have high enough
efficiency, it is practically very unlikely that a photonic Bell experiment could achieve
these efficiency levels. To date, all these experiments invoked so-called fair sampling4
and no-enhancement assumptions5 which allow to derive inequalities into which only
coincidence count rates enter. However, very recently a beautiful experiment based on
two entangled ions in a microscopic trap succeeded in violating a strong Bell inequality at
nearly 100% efficiency.88 Many physicists consider this a closure of the discussed loophole.8
Fig. 14. Experimental arrangement for a test of Bells inequality with measurements made more
than 10 km apart. Source (in Geneva) and observer stations (interferometers in Bellevue and
Bernex, respectively) were connected by a fiber optic telecommunications network.
Fig. 15. Data from the long distance Bell test. The two curves show the correlation coefficients
for two different analyzer settings at Alices while varying the setting at Bobs. A clear violation
of the CHSH inequality is observed.
24 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
possible that the analyzer direction or even the measurement outcome is communicated
to the other side.
Fig. 16. Experimental set-up for a test of Bells inequality with independent observers. Data
are collected locally at the observer stations only and can be compared after the measurement is
completed.
Bell himself considered this fact as being important, calling it the vital time factor.99
However, operationally and theoretically it is hard to define this time factor. There is no
criterion that is generally agreed upon. Bohm talked already in 1957 about variation of the
analyzers while the particles are in flight.70 Over the years the idea emerged that it would
be necessary to vary the analyzers in a random way, where the randomness would have to
be drawn from local sources or from distant stars in opposite directions of the universe.
Including the generation of randomness and other delays the measurements should then be
completed within a time that is short compared to the time it takes to signal to the other
observer station. This prescription amounts to performing the measurement in spacelike
separated regions of spacetime.
Obviously these are extremely vague concepts and therefore it is not astonishing that
only two experiments have tried to pin down and answer these questions. The first one was
performed by Aspect et al.82 in 1982 and included a periodic variation of the analyzers.
Because periodic functions are in principle predictable it has been said that this experiment
was not definitive in closing the spacelike separation loophole.
In 1998, 16 years later, one of our groups (UNIVIE) was able to include the randomness
factor and, at the same time, to extend the spatial separation to 360 m yielding a large
safety margin for the spacelike separation issue.87 The experimental set-up is shown in
Fig. 16. It yielded a violation of Bells inequality by 30 standard deviations.
Another approach to attack the locality loophole has been demonstrated by Tittel et
Wolfgang Tittel and Gregor Weihs . . . 25
al. in 1999.97 In this experiment, two analyzers with different parameter settings were
attached to each side of the source, and the random choice was done by a passive optical
coupler, sending the photons to one or the other analyzer. Hence, in contrast to the
experiment mentioned before, the randomness does not come from an external random
number generator but is engendered using the photons themselves and might therefore
seem less good.j
800 A +0/B 0
A +1/B 0
600
C oincidences in 5s
400
200
600
400
200 A +0/B +0
A +1/B +0
0
-100 -50 0 50 100
Bias Voltage (Alice) [V]
Fig. 17. Correlation curves taken for spacelike separated measurements on a polarization entangled
photon pair at a distance of 360 m. The measurements yield a violation of Bells inequality by 30
standard deviations.
To find the quantum mechanical predictions for the results of Bell-type measurements,
one can think of the first measurement (traditionally at Alices) as a non-local state
preparation for the photon traveling to the second analyzer (at Bobs) like in entan-
glement based quantum cryptography (Section 4.1.2): In a first step one calculates the
probabilities for the different outcomes of Alices measurement that depend only on the
setting of her analyzer and the local quantum state.kKnowing the global two-particle state
enables in a second step to calculate Bobs local state. In a third step, equivalent to the
j However, note that the borderline between good and bad randomness is very vague.100
kThe local state is obtained by tracing over the distant system. In case of a maximally entangled global
state, it is completely mixed and the outcome of Alices measurement is completely random.
26 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
first one, one calculates the probabilities of the different outcomes of the measurement at
Bobs (which are now joint probabilities), determined by his local state hence by the
setting of the first analyzer and the specific two-particle (global) state used and by the
setting of the second analyzer.
Many people believe that the state vector is not endowed with reality but that it is
only a mathematical tool that helps to calculate the statistical outcomes of experiments.
Consequently, the reduction of the state of Bobs subsystem by Alices measurement must
be understood as an instantaneous modification of the knowledge of an observer of the first
measurement concerning the quantum state of the second particle. Indeed, possessing only
the second system, it is impossible to see any change as a result of the first measurement:
The density matrix describing the local state remains unchanged and thus there is no
possibility for superluminal signaling and hence no contradiction with special relativity.10
However, it has never been proven experimentally whether the state vector does indeed
not represent reality and that the collapse only changes the knowledge of the observer,
or whether the state vector is real and its collapse has to be considered a real physical
phenomenon as assumed e.g. by Ghirardi, Rimini and Weber.101
hypothesis. A good candidate for such a preferred frame is the frame from which the
cosmic microwave background radiation (CMB) is seen to be isotropic. Analyzing the
same data and taking into account the relative motion between the Geneva and the CMB
frame, Scarani found a lower bound of the speed of quantum information of 2 104 c as
seen from the CMB frame.104 Repeating this experiment with different alignments, each
corresponding to simultaneous measurements in a different frame, it would be possible
to test whether there is one (the preferred) frame from which the speed of quantum
information is seen to be limited.105
Fig. 18. Schematics for a test of 3-particle GHZ-type non-locality using momentum entangled
states. The three qubits are each send to an analyzer. Coincidence measurements in identical or
orthogonal bases enable to test whether the three-particle state is described by a local, or by a
non-local model. Note that, in contrast to Bell-type tests of non-locality, only settings leading to
deterministic outcomes either perfect coincidences or perfect anti-coincidences are required.
Fig. 19. Schematic of the set-up used by Bouwmeester et al. to produce three-photon GHZ
correlations. Two independent pairs are generated simultaneously and one photon from each pair
is send right, one left. By action of the left polarizing beam-splitter (PBS), only horizontally
polarized particles can reach the trigger detector T. To register three-fold coincidences between
detectors 1, 2, and 3, the other photon must be reflected from that PBS, i.e. it must be vertically
polarized. This photon is subsequently rotated by 45 and can end up as V in detector 1 or as H
in detector 2. The only two possible ways that a triple coincidence event arises in detectors 1, 2,
and 3 are therefore when the right two photons split at the right beam-splitter and when the two
photons meeting at the upper PBS have are found to have identical polarization either both
horizontal or both vertical.
30 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
Fig. 20. The graphs show the relative frequencies of three-fold coincidence events between outputs
D1 , D2 , and D3 as predicted and as measured (bottom). All analyzers project onto a L=linear
45 basis. P and M refer to plus and minus 45 linear polarization, respectively. MPM for
example marks the probability to measure a three-fold coincident event if polarizer settings are M
for particle 1, P for particle 2, and M for particle 3. The data violate the local realistic prediction
by 10 standard deviations.
Wolfgang Tittel and Gregor Weihs . . . 31
Fig. 21. Experimental set-up to create and confirm the existence of a four-photon GHZ states.
1
|i1234 = (|Hi1 |Vi2 |Vi3 |Hi4 + |Vi1 |Hi2 |Hi3 |Vi4 ) . (12)
2
A comparison of the measured 4-photon coincidence probabilities for various combi-
nations of H and V projections confirms that indeed only the desired |Hi1 |Vi2 |Vi3 |Hi4
and |Vi1 |Hi2 |Hi3 |Vi4 components have been created. The contrast in this measurement
was of more than 100:1. In addition, measurements in the conjugate 45 basis (s. Fig. 22)
demonstrate the coherent superposition of the two components, hence show the existence
of a four photon GHZ state and confirm the existence of non-locality.
Fig. 22. Experimental data showing four-photon polarization correlation in the 45 linear basis.
At zero delay between the two photons that are superposed on the polarizing beam-splitter, in-
distinguishability is granted and interference occurs, demonstrating the coherent superposition of
|Hi1 |Vi2 |Vi3 |Hi4 and |Vi1 |Hi2 |Hi3 |Vi4 .
Wolfgang Tittel and Gregor Weihs . . . 33
4 Quantum communication
Fig. 23. For each photon she sends to Bob, Alice chooses randomly a bit value (row 1) and a basis
(h/v, or 45o ), and prepares the photon in the corresponding state. Every time Bob expects a
photon to arrive, he activates his detectors and chooses randomly to analyze in the h/v basis, or
in the 45o basis. He records which basis he used (row 2) and, in case of a successful detection,
which result (in terms of bits) he got (row 3). After exchange of a sufficient large number of
photons, he publicly announces the cases where he detected a photon and the basis used for the
measurements. However, he does not reveal which results he got. Alice compares event by event
whether or not Bobs analyzer was compatible to her choice of bases. If they are incompatible
or if Bob failed to detect the photon, the bit is discarded. For the remaining bits (row 4), Alice
and Bob know for sure that they have the same value. These bits form the so-called sifted key.
The security of the key distribution is, roughly speaking, based on the fact that a measurement of
an unknown quantum system will, in most cases, disturb the system: If Alices and Bobs sifted
keys are perfectly correlated, no eavesdropper tried to eavesdrop the transmission and the key can
be used for encoding a confidential message using the one-time pad. If the sifted keys are not
100% correlated, then, depending on the QBER, Alice and Bob can either distill a secret key via
error correction and privacy amplification, or the key is discarded and a new distribution has to
be started.
Wolfgang Tittel and Gregor Weihs . . . 35
Let us briefly elaborate on the maximum distance. In theory, i.e. using perfect experi-
mental equipment, the sifted key rate decreases exponentially with increasing transmission
losses but never drops to zero. It is given by the product of Alices pulse rate frep, the
number of photons per pulse , the probability tlink that a photon arrives at Bobs, and
the quantum efficiency that it is detected.
1
Rsifted = frep tlink (13)
2
The factor 1/2 is due to key sifting the fact that Alice and Bob use compatible bases in
only 50 % of the cases. In practice, there are always experimental imperfections, and there
will always be some errors in the sifted key even in the absence of an eavesdropper. For
the sake of the presentation, we assume here that the errors are only due to detector dark
counts (a signal generated by a detector without the presence of a photon), arising with
probability pdark :
1 1
Rwrong Rdark = frep pdark n (14)
2 2
The first factor 1/2 is again due to key sifting, the second one to the fact that a detector
dark count leads only in half of the cases to a wrong result, and n is the number of
detectors. Finally, the QBER is given by
Rwrong n pdark
QBER = (15)
Rsifted 2 tlink
Since Alice and Bob can never know for sure whether the observed QBER is due to
the imperfections of their equipment, or whether it is engendered by the presence of an
eavesdropper, they always have to assume to worst case, i.e. that there is an eavesdropper
that has the maximum information compatible with the observed QBER. Therefore, they
have to apply classical error correction and privacy amplification protocols to the sifted
key in order to distill a secret key.
Fig. 24 shows the secret bit rate after error correction and privacy amplification as a
function of distance. Here we assume that the photons are transmitted using optical fibers
with losses of 0.2 dB/km. The bit rate decreases exponentially for small distances. Then,
with larger distance (i.e. with decreasing transmission probability tlink , hence increasing
QBER), the bit reduction due to error correction and privacy amplification gets more and
more important, and at a QBER (hence distance) where the Alice-Bob mutual Shannon
information is equal to Eves Shannon Information, there are no bits left and the curve
representing the bit rate drops vertically to zero. Note that the maximum distance does
not depend on Alices pulse rate.
To achieve a better performance of a cryptographic system concerning bit rate or
maximum transmission distance, there are basically two things to improve: the detectors,
and the sources.
Fig. 24. Secret bit rate after error correction and privacy amplification. The maximum transmis-
sion span is given by the distance where the QBER equals 15% (assuming symmetric individual
eavesdropping attacks110 ). Here we assume a initial pulse rate fpulse of 1 and 10 MHz, respec-
tively, losses of 0.2 dB/km of optical fibers at 1550 nm wavelength (close to the fundamental limit),
a quantum efficiency of 10%, dark count probability of 105 and a mean photon number per pulse
of 0.1 and 1, respectively. The use of a higher mean photon number leads to a higher secret
bit rate for a given distance and pulse rate, as well as to a larger maximum transmission span,
i.e. 130 instead of 90 km. A higher pulse rate engenders a higher secret key rate, however, does
not change the maximum span. In practice, if we take into account non-ideal error correction and
privacy amplification algorithm, multi-photon pulses and other optical losses not considered here,
the maximum distance is likely to be reduced by a factor of around two.
Wolfgang Tittel and Gregor Weihs . . . 37
of only around 10%, paired with a high dark count probability of 105 per 1 ns
time window. These figures determine the secret key rate for a given distance and
pulse rate, and the maximum transmission span as shown in Fig. 24. In addition,
the detectors performance limits the pulse rate via the effect of so-called afterpulses:
These are avalanches that are not caused by the detection of a photon but by the
release of charges from trapping levels populated while a current transits through the
diode. Since the probability for observing an afterpulse after a detection of a photon
decreases exponentially with time, they can be suppressed using suitable dead times
with the drawback of limiting the maximum pulse rate. It is thus obvious that the
use of better detectors would have an important impact on experimental quantum
cryptography.
Mimicking single photons by faint pulses has a very important advantage: it is
extremely simple. Unfortunately this advantage is paired with two drawbacks. First,
a mean photon number smaller than 1 (the upper limit for quantum cryptography)
leads to a reduction of the bit rate (see Eq. 13 and Fig. 24). Second, since the
photon-number statistics for faint pulses is given by a Poissonian distribution, there
is always a possibility to find more than one photon in a weak pulse. This opens
the possibility of an eavesdropper attack based on multi-photon splitting.117,118 The
smaller the mean number of photons per pulse, the smaller this threat, however, the
smaller the bit rate as well.
Single-photon based realizations In order to get around the problem of faint pulses
where the probability of having zero photons in a pulse is rather high, a good idea is to
replace the faint pulse source by a photon-pair source (see Section 2.2.1 and Fig. 25b)
where one photon serves as a trigger to indicate the presence of the other one.119 In this
case, Alice can remove the vacuum component of her source, and Bobs detectors are only
triggered whenever she sends at least one photon.p This leads to a higher sifted key rate
(assuming the same trigger rate than in the faint-pulse case) and a lower QBER for a
given distance (for given losses) and therefore to a larger maximum span (see Fig. 24). It
is important to note that photon-pairs can not be created in Fock states, similar to single
photons mimicked by faint pulses. Therefore, depending on the probability to create more
than one photon pair, the danger of multi-photon splitting eavesdropping attacks exists
as well.
pointed out by A. Ekert in 1991120 without knowing about the discovery of quantum
cryptography by Bennett and Brassard 7 years earlier. The set-up is similar to the one
used to test Bell inequalities with the exception that Alice and Bob each have to chose
from three different bases. Depending on the bases chosen for each specific photon pair,
the measured data is either used to establish the sifted key, to test a Bell inequality, or it
is discarded.
The security of the Ekert protocol is very intuitive to understand: If an eavesdropper
gets some knowledge about the state of the photon traveling to Bob, she adds some hidden
variables (hidden in the sense that only the eavesdropper knows about their value). If she
gets full knowledge about all states, i.e. the whole set of photons analyzed by Bob can
be described by hidden variables, a Bell inequality can not be violated any more. If Eve
has only partial knowledge, the violation is less than maximal, and if no information has
leaked out at all, Alice and Bob observe a maximal violation.
However, the Ekert protocol is not very efficient concerning the ratio of transmitted
bits to the sifted key length. As pointed out in 1992 by Bennett et al.121 as well as by
Ekert et al.,122 protocols originally devised for single photon schemes can also be used
for entanglement based realizations. This is not surprising if one considers Alices action
as a non-local state preparation for the photon traveling to Bob (see also Section 3.1.2).
Interestingly, it turns out that, if the perturbation of the quantum channel (the QBER)
is such that the Alice-Bob mutual Shannon information equals Eves maximum Shannon
information, then the CHSH Bell inequality (Eq. 10) can not be violated any more.123,110
Although this seems very natural in this case and a similar connection has recently been
found for n-party quantum cryptography and some n-particle Bell inequalities124 , it is not
clear yet to what extend the connection between security of quantum cryptography and
the violation of a Bell inequality can be generalized.
Compared to the faint pulse schemes, entanglement based QC features two advantages.
First, similarly to photon-pair based realizations, Alice removes the vacuum component
of her source. Actually, the entanglement based case is even more efficient since even the
optical losses in Alices preparation device are now eliminated as can be seen from Fig. 25c.
Second, even if two pairs are created within the same detection window hence two
photons travel towards Bob within the same pulse they do not carry the same bit,
although they are prepared in states belonging to the same basis. Beyond this passive
state preparation, it is even possible to achieve a passive preparation of bases using a
set-up similar to the one depicted in Fig. 25d. There is no external switch that forces
all photons in a pulse to be measured in the same basis but each photon independently
chooses its basis and bit value. Therefore, eavesdropping attacks based on multi-photon
pulses do not apply in entanglement based QC. However multi-photon pulses lead to errors
at Bobs who detects from time to time a photon that is not correlated to Alices.
Although all Bell experiments intrinsically contain the possibility for entanglement
based QC, we list here only experiments that have been devised in order to allow a fast
change of measurement bases.
Wolfgang Tittel and Gregor Weihs . . . 39
Fig. 25. Single photon based quantum cryptography using a) a faint-pulse source, b) a two-photon
source, c) entanglement based quantum cryptography with active, and d) with passive choice of
bases. 2h denotes the photon-pair source, and the parameters and characterize the settings
of the qubit-analyzers.
40 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
1982 Interestingly enough, the first experiment that fulfills the above defini-
tion is the test of Bell inequalities using time-varying analyzers, per-
formed by Aspect et al.82 with polarization entangled qubits in order
to close the locality loophole (see also Section 3.1.1) at a time where
quantum cryptography was not yet known, not even the single photon
based version.
1998 Weihs et al. demonstrate a violation of Bell inequalities with polar-
ization entangled qubits at 700 nm wavelength and randomly switched
analyzers, separated by 360 km of optical fiber.87 This experiment has
been devised to close the locality loophole.
1999 Tittel et al. perform a Bell experiment, again to be seen in the context
of the locality loophole, incorporating a passive choice of bases.97 Two
fiber-optical interferometers are attached to each side of a source cre-
ating energy-time entangled photons at 1.3 m wavelength. However,
similar to both before-mentioned experiments, the bases chosen for the
measurements are chosen in order to allow a test of Bell inequalities and
not to establish a secret key.
2000 Three publications on entanglement based cryptography appear in the
same issue of Phys. Rev. Lett.:
1.) Using a set-up similar to the one mentioned already in the second
entry of this table, Jennewein et al. realize a quantum cryptography sys-
tem including error correction over a distance of 360 m.125 Two different
protocols are implemented, one based on Wigners inequality (a special
form of Bell inequality), the other one following BB84. Sifted key rates
of around 400 and 800 bits/s, respectively, are obtained, and QBERs of
around 3% observed. Using the same assumptions that lead to Fig. 24,
this amounts to a secret key rate of 300 and 600 bits/s, respectively.
2.) Naik et al. demonstrate the Ekert protocol in a free space experiment
over a short (laboratory) distance.126 The experiment takes advantage of
polarization entangled qubits at a wavelength of around 800 nm. Sifted
key rates of around 10 bits/s paired with a QBER of 3% are reported,
leading to a secret key rate of 6 bits/s after implementation of error cor-
rection and privacy amplification. In addition to the key exchange, the
authors simulate different eavesdropping strategies and find an increase
of the QBER with increasing information of the eavesdropper, according
to theory. The experiment has recently been extended127 to realize the
so-called six state protocol.128,129
3.) Tittel et al.89 report on a fiber-optical realization of quantum cryp-
tography in a laboratory experiment using the BB84 protocol. This
experiment is based on time-bin entangled qubits at telecommunication
wavelength of 1.3 m and takes advantage of phase-time coding and a
passive choice of bases. Sifted key rates of 33 Hz and a QBER of 4% are
obtained, leading to a calculated secret key rate of 21 bits/s.
2001 Ribordy et al.130 realize a QC system based on energy-time entangle-
ment. In contrast to the schemes mentioned before, this realization takes
advantage of an asymmetric set-up, optimized for QC, instead of a set-
up designed for tests of Bell inequalities where the source is generally
located roughly in the middle between Alice and Bob. Here, one photon
(at 810 nm wavelength) is send to a bulk-optical interferometer, located
directly next to the source, the other one (at 1550 nm wavelength) is
transmitted through 8.5 km of fiber on a spool to a fiber optical interfer-
ometer. Implementing the BB84 protocol and a passive choice of bases,
a sifted key rate of 134 bits/s and a mean QBER of 8.6% (over 1 hour)
is observed. From these values, one can calculate a secret key rate of 45
bits/s.
Wolfgang Tittel and Gregor Weihs . . . 41
Fig. 26. Basic set-up for three-party quantum secret sharing using pseudo-GHZ states. Compare
with true GHZ states as shown in Fig. 18.
agree on a coding procedure, that is, they have to associate symbols with physical states.
In classical communication, one usually uses a two letter alphabet where the different
symbols (bit-values) are represented by (classical) optical pulses with different individual
properties. In quantum physics we can encode information in a novel way into joint
properties of elementary systems in entangled states, leading in principle to the possibility
to transmit two bits of information by sending only one qubit. This striking application
of quantum communication is known as quantum dense coding.
Fig. 27. Experimental set-up to demonstrate quantum dense coding based on Bell state analysis
of entangled polarization qubits.51 After locally preparing the joint state of the entangled particles
by means of wave-plates, Alice sends her particle to Bob. Performing a Bell measurement
on the
two-particle state, Bob can distinguish between two different Bell states ( ), with the two
other ones ( ) leading to the same, third, result. Therefore, Alice can encode 1.58 bit of
information sending only one qubit.
The maximally entangled Bell basis (Eqs. 5 and 6) has a very important and interesting
property which was exploited by Bennett and Wiesner115 in their proposal for quantum
dense coding: In order to switch from any one of the four Bell states to all others, it is
sufficient to manipulate only one of the two qubits locally. Thus, the sender, Alice, can
actually encode two bits of information into the whole entangled system by just acting on
one of the two qubits.
In order to read out this information, the receiver, Bob, needs to be able to identify
the four Bell states, that is, he needs to perform a Bell measurement as explained in
Section 2.2.3. However, using linear optics, only two out of the four Bell states can be
distinguished unambiguously52,53 whereas the other two states lead to identical signatures.
Still, as has been experimentally demonstrated in 1996 by Mattle et al.,51 this is enough
to encode three-valued information (corresponding to 1.58 bit of information) into each
transmission event (see Fig. 27).
Wolfgang Tittel and Gregor Weihs . . . 43
Fig. 28. Schematic of quantum teleportation of an unknown state. Particle 1 is given to Alice
who subjects it to a Bell-state measurement (BSM) together with particle 2, the latter one being
entangled to particle 3 (at Bobs). Depending on the result of this measurement, Bob applies
a unitary transformation to particle 3 which then ends up in precisely the same state in which
particle 1 was originally.
If, in some sense, the aim of quantum key distribution is the communication of classical
bits, quantum teleportation, discovered in 1993 by Bennett et al.,131 can be thought of
as being the exchange of quantum bits. One might define quantum teleportation as the
art of transferring the state of an unknown qubit located at Alices to a second quantum
system, located at Bobs, the motivation being that it might be impossible to send the
physical system itself. In this application of quantum communication, the qubit to be sent
is unknown to the parties involved in the transfer, but it might be known to a third party,
Charlie.
In a world of classical physics, teleportation is nothing remarkable. It suffices to mea-
sure the properties of the (classical) bit and then communicate the information about
its composition to Bob, who then reconstructs the bit. This strategy must fail in the
quantum case where the measurement of an unknown qubit without disturbing it is im-
possible and cloning is forbidden.132,133 Surprisingly, quantum communication provides a
way out of this problem (see Fig. 28). Before Charlie hands over the particle to Alice
who then teleports it to Bob, the latter have to share a pair of entangled particles. Alice
now makes a Bell measurement on Charlies particle and her part of the entangled pair
(see Section 2.2.3). She thus projects the two-particle state randomly onto one of the four
Bell states. Note that this measurement only reveals the joint state of both particles, but
not the individual states. The outcome of this measurement projects Bobs particle onto
one of four different states as well. Using two classical bits, Alice now tells Bob about the
outcome of her measurement and depending on her message, Bob performs one of four
44 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
unitary operations on his particle: the identity operation, a bit flip, a phase flip, or a bit
and a phase flip. This finally leaves it in the state of the particle Charlie had initially
handed over to Alice, albeit neither Alice nor Bob know about this state. It is important
to note that Charlies particle is left in an arbitrary state after the Bell measurement, and
that no cloning has taken place. Moreover, since Alices classical information is needed to
reconstruct the state of Charlies particle, faster than light communication is not possible.
The experimental realization of quantum teleportation has invoked a strong reaction
in the public. Whereas one can clearly say that quantum teleportation in its current form
has no relation to disembodied transport of objects or even humans, it is also true that
the idea to transmit a quantum state without sending a particle is an intriguing concept.
Three different experiments based on polarization qubits have been reported.
1997 Bouwmeester et al.134 are the first to demonstrate quantum teleportation
based on a Bell measurement using linear optics. Although this allows
in principle to teleport in 50% of all cases, only the projection onto the
state is used in the experiment. The result of the measurement is
shown in Fig. 29.
1998 Boschi et al.135 demonstrate a teleportation set-up in which all four Bell
states can be identified even using only linear optics. The entangled
state is realized using k-vector (mode) entanglement, and the polariza-
tion degree of freedom of one of the entangled photons is employed to
prepare the unknown state. However, this scheme can not be imple-
mented for photons that come from independent sources as required for
instance for entanglement swapping (see Section 4.4).
2001 Kim et al.55 demonstrated quantum teleportation based on a Bell mea-
surement implementing non-linear interaction. This enables a projection
onto all four Bell states, however, with very small efficiency of around
one out of 1010 . In order to compensate for the efficiency, the input
state (send by Charlie) is a classical pulse from a fs laser. Nevertheless,
this experiment shows that a complete Bell measurement is in principle
possible, even when using single-photons and without having to take
advantage of additional degrees of freedom of the entangled pair.
Teleportation of a
100 120
100
4-fold coincidences per 4000 seconds
80
80
60
60
40
40
20 -45 0
20
(a) (c)
0 0
120
100
100
80
80
60
60
40
40
20 20
(b) +45 +90
(d)
0 0
-150-100 -50 0 50 100 150 -150-100 -50 0 50 100 150
Fig. 29. Experimental data showing faithful teleportation of an independently created polarization
qubit. Two linear polarization states are tested: 45 and 90 . The fidelity is roughly the same for
both cases.
metrizes the teleportation scheme to a procedure that can be applied to two or more
entangled systems.137 The lowest order protocol joining two entangled two-qubit systems
is depicted in Fig. 30. If, say, both entangled systems are produced in the | i12 and
| i34 Bell-states, and we project onto a | i23 state we find particles 1 and 4 in the
state
23 [| i12 | i34 ] = (16)
1
= [h01| h10|]23 [|01i |10i]12 [|01i |10i]34
8
1
= [h01| h10|]23 [|0101i |1001i |0110i + |1010i]1234
8
1
= [|01i |10i]14 = 14 .
8
Therefore, particles 1 and 4 end up in an entangled state although they never interacted
locally.
Any experimental verification of this protocol is a clear demonstration of the quantum
physical projection postulate: the joint measurement of particles 2 and 3 results in a
preparation of the joint state of particles 1 and 4, regardless of whether one decides to
project on a product, or on an entangled state. In the specific case considered here, the
projection postulate predicts the change of the joint state of particle 1 and 4 from a product
state to an entangled state. This can easily be verified by subjecting particle 1 and 4 to a
test of a Bell inequality.
A first attempt to demonstrate that the entanglement is indeed swapped has been
reported by Pan et al.138 in 1998. The experiment was based on polarization entanglement.
However, although the observed degree of entanglement surpasses the limit of a classical
wave theory, it was not high enough to manifest itself in a violation of a Bell inequality. Yet,
after some refinements, Jennewein et al. could recently demonstrate a violation of Bells
inequality with swapped entanglement.139 The measurements yielded S exp = 2.42 0.09
which exceeds the limit of 2 for local realistic theories by 4 standard deviations.
Tomographic/Bell
inequality analyzers
Quartz Distillation
decoherers filters 1
Ar + UV HWP
laser PBS BBO
QWP HWP PBS
HWPUV
HWP
(sets )
2
Fig. 31. Experimental setup to demonstrate entanglement distillation and hidden non-locality.
Half-wave plates and two 1cm thick quartz elements (decoherers) allow to generate partially en-
tangled, partially mixed states. After filtering they are analyzed by means of two qubit analyzers
either in order to reconstitute the density matrix via quantum tomography, or to test the CHSH
Bell inequality.
48 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
axes at 90 as discussed in Section 2.2.2. It has been shown that the resulting states after
a suitable local filtering operation violate Bell-CHSH inequalities (Fig. 32).
Actually, much more than from decoherence, applications of quantum communication
like quantum cryptography suffer from transmission losses paired with detector noise.q As
argued in section 4.1, the fact that the QBER increases with losses (Eq. 15) limits the max-
imum transmission distance. A way out would be to use a quantum non-demolition (QND)
measurement141 at Bobs and to switch on the detectors only if a photon is known to arrive
(hence = 1 and remaining tlink =1) (see Fig. 33). Unfortunately, QND measurements for
detection of visible or telecommunication photons do not exist yet.r Another possibility
that is in reach with current technology is to use a concatenation of two-particle sources
and Bell state measurements and to establish entangled photons at Alices and Bobs via
entanglement swapping. In this scheme, Bobs detectors are only switched on if Alice
detected a photon and if the last Bell state measurement (at Bobs) was conclusive. It
therefore much resembles a QND measurement. Interestingly, this idea is closely related
to the original motivation for entanglement swapping:136 testing Bell inequalities with
Event-Ready-Detectors. However, although this scheme allows to extend the maximum
transmission span, it will at the same time significantly reduce the bit rate.
Fig. 32. Measured density matrices before (left) and after (right) distillation. A violation of CHSH
Bell inequality is observed for the state after distillation (Sfiltered =2.22) while the initial state
does not manifest non-local behavior (Sinitial =1.82)
q This contrasts with proposals for quantum computing using massive particles where the particles hardly
get lost and good detectors exist, but where decoherence is the major problem.
r QND measurements for microwave photons have recently been demonstrated by Nogues et al.142
Wolfgang Tittel and Gregor Weihs . . . 49
Fig. 33. Comparison of QND measurement based (a), and entanglement swapping based (b)
realization of event ready detectors at Bobs. 2h denote entangled two-photon sources, BSM
a Bell-state measurement, and and are the settings at Alices and Bobs qubit analyzers.
50 Photonic Entanglement for Fundamental Tests and Quantum Communication . . .
5 Conclusion
In this article, we tried to review the major developments in experiments based on
entanglement of photonic qubits, both in the traditional domain of fundamental tests
of quantum non-locality, as well as in the new approach of using entanglement as a re-
source for quantum communication. In traditional tests of spin 1/2 Bell-inequalities no
major surprises are expected any more at least concerning experiments with photons.
But we are only at the very beginning of tests of non-locality using higher dimensional
systems,143 systems employing more than two particles (Section 3.2), or experiments test-
ing other interpretations of the quantum world (Section 3.1.2). Furthermore, the fact that
entanglement can be used as a resource for applications in quantum communication came
like a great surprise and stimulated much interest in the physics as well as in the general
community. Quantum cryptography is a good candidate of becoming the first industrial
application, a development that would have a major impact on the whole field.
It is very interesting that tests of Bell-inequalities, traditionally considered part of
fundamental research, recently became an application with the Ekert scheme for quantum
cryptography, and are nowadays routinely employed in the laboratory to characterize
the quality of the entanglement of photon pairs before passing on to more complicated
experiments. However, not only the change from fundamental to applied aspects can be
observed, the opposite is possible as well: It is for instance still an open fundamental
question if the connection between security of quantum cryptography and violation of a
Bell inequality can be generalized to all sorts of protocols.
The enormous progress obtained in laser and optical fiber technology, single photon
detectors, and the availability of non-linear crystals enable nowadays experiments that
were only gedankenexperiments not even long ago. However, new ideas and technology
are needed for further steps. For instance, the secret bit rate and maximum transmission
distance in quantum cryptography experiments are limited by the performance of detectors
and single photon sources, and there is big need for efficient sources creating more than
two entangled particles. Maybe photon sources based on individual nitrogen-vacancy
color centers in diamond144,145 , quantum dots146,147,148 and parametric down-conversion
in PPLN waveguides36,37 will turn out to enable more refined experiments in the future.
Although quantum non-locality has recently been observed with atoms, photons still
play an outstanding role whenever it comes to experiments employing entanglement. They
are best suited as a carrier of quantum information since decoherence effects due to inter-
action with the environment are very small. But unfortunately, photons do not interact
with other photons, a major problem when it comes to Bell state measurements or pro-
cessing of quantum information in general. A solution might be to map photonic quantum
states onto massive particles like atoms or ions that are in principle well suited for all
applications where two-particle interaction is needed. A first experiment in this context
has been performed 149 very recently.
Wolfgang Tittel and Gregor Weihs . . . 51
Acknowledgements
The authors acknowledge financial support by the Swiss FNRS and the Austrian Science
Fund (FWF) project no. S1506, as well as by the IST-FET QuComm project of the
European Commission, partly financed by the Swiss OFES. W. T. would like to thank
his colleagues from GAP, especially N. Gisin and H. Zbinden for theoretical and practical
support during the mentioned experiments. G. W. would like to thank T. Jennewein and
A. Zeilinger for helpful discussions and continued support.
References
35. C. K. Hong, Z. Y. Ou, and L. Mandel, Phys. Rev. Lett. 59, 2044 (1987).
36. S. Tanzilli et al., Electronics Letters 37, 26 (2001), quant-ph/0012053.
37. K. Sanaka, K. Kawahara, and T. Kuga, Phys. Rev. Lett. 86, 5620 (2001), quant-ph/0012028.
38. Y.-H. Kim et al., Phys. Rev. A 63, 062301 (2001).
39. T. Kiess, Y. Shih, A. Sergienko, and C. Alley, Phys. Rev. Lett. 71, 3893 (1993).
40. P. G. Kwiat et al., Phys. Rev. Lett. 75, 4337 (1995).
41. P. G. Kwiat et al., Phys. Rev. A 60, R773 (1999), quant-ph/9810003.
42. J. G. Rarity and P. R. Tapster, Phys. Rev. A 41, 5139 (1990).
43. P. H. S. Ribeiro, quant-ph/0009112 (unpublished).
44. J. Brendel, N. Gisin, W. Tittel, and H. Zbinden, Phys. Rev. Lett. 82, 2594 (1999).
45. T. Keller, M. Rubin, and Y. Shih, Phys. Lett. A 244, 507 (1998).
46. Y.-H. Kim, M. Chekhova, S. Kulik, and Y. Shih, Phys. Rev. A 54, R37 (1999).
47. J. D. Franson, Phys. Rev. Lett. 62, 2205 (1989).
48. J. Brendel, E. Mohler, and W. Martienssen, Europhys. Lett. 20, 575 (1992).
49. P. G. Kwiat, A. M. Steinberg, and R. Y. Chiao, Phys. Rev. A 47, 2472 (1993).
50. M. Michler, K. Mattle, H. Weinfurter, and A. Zeilinger, Phys. Rev. A 53, R1209 (1996).
51. K. Mattle, H. Weinfurter, P. G. Kwiat, and A. Zeilinger, Phys. Rev. Lett. 76, 4656 (1996).
52. N. Lutkenhaus, J. Calsamiglia, and K.-A. Suominen, Phys. Rev. A 59, 3295 (1999).
53. J. Calsamiglia and N. Lutkenhaus, Appl. Phys. B 72, 67 (2001).
54. P. G. Kwiat and H. Weinfurter, Phys. Rev. A 58, R2623 (1998).
55. Y.-H. Kim, S. P. Kulik, and Y. Shih, Phys. Rev. Lett. 86, 1370 (2001).
56. M. Zukowski, A. Zeilinger, and H. Weinfurter, Annals of the N.Y. Acad. of Sciences 755, 91
(1995).
57. A. G. White, D. F. V. James, P. H. Eberhard, and P. G. Kwiat, Phys. Rev. Lett. 83, 3103
(1999).
58. J. Rehacek, Z. Hradil, and M. Jezek, Phys. Rev. A 63, 040303(R)1 (2001).
59. P. G. Kwiat, S. Barazza-Lopes, A. Stefanov, and N. Gisin, Nature 409, 1014 (2001).
60. D. M. Greenberger, M. Horne, and A. Zeilinger, in Bells Theorem, Quantum Theory, and
Conceptions of the Universe, edited by M. Kafatos (Kluwer Academic, Dordrecht, The
Netherlands, 1989), pp. 6972.
61. M. Zukowski, A. Zeilinger, M. Horne, and H. Weinfurter, Acta Phys. Pol. A. 93, 187 (1998).
62. M. Hillery, V. Buzek, and A. Berthiaume, Phys. Rev. A 59, 1829 (1999).
63. A. Rauschenbeutel et al., Science 288, 2024 (2000).
64. C. A. Sackett et al., Nature 404, 256 (2000).
65. J.-W. Pan and A. Zeilinger, Phys. Rev. A 57, 2208 (1998).
66. W. Tittel, H. Zbinden, and N. Gisin, Phys. Rev. A 63, 042301 (2001).
67. D. Bohm, Phys. Rev. 85, 166 (1952).
68. D. Bohm, Phys. Rev. 85, 180 (1952).
69. J. S. Bell, Speakable and Unspeakable in Quantum Mechanics (Cambridge UP, Cambridge,
1987).
70. D. Bohm, Phys. Rev. 108, 1070 (1957).
71. S. Kochen and E. Specker, J. Math. Mech. 17, 59 (1967).
72. J. S. Bell, Rev. Mod. Phys. 38, 447 (1966).
73. C. Simon, M. Zukowski, H. Weinfurter, and A. Zeilinger, Phys. Rev. Lett. 85, 1783 (2000).
74. J. F. Clauser, Phys. Rev. Lett. 36, 1223 (1976).
75. W. Perrie, A. J. Duncan, H. J. Beyer, and H. Kleinpoppen, Phys. Rev. Lett. 54, 1790 (1985).
76. T. Pittman, Y. Shih, A. Sergienco, and M. Rubin, Phys. Rev. A 51, 3495 (1995).
77. P. Kwiat et al., Phys. Rev. A 60, R773 (1999).
78. P. Tapster, J. Rarity, and P. Owens, Phys. Rev. Lett. 73, 1923 (1994).
79. D. Strekalov et al., Phys. Rev. A 54, R1 (1996).
Wolfgang Tittel and Gregor Weihs . . . 53