09QIP4
09QIP4
Dieter Jaksch
TT 2009
Clarendon Laboratory
University of Oxford
Contents
1 Introduction 1
3 Photon techniques 14
3.1 Polarization and spatial mode encoding . . . . . . . . . . . . . . . . . . . . . . . 14
3.1.1 Spatial encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.1.2 Polarization encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.1.3 Parametric down conversion . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.1.4 Single photon sources and single photon detectors . . . . . . . . . . . . . 17
3.1.5 Quantum dense coding: Experimental setup . . . . . . . . . . . . . . . . . 17
4 Testing EPR 18
4.1 Bell inequalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.1.1 The CHSH inequality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.1.2 The Aspect experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.1.3 Loopholes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.2 GHZ states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.2.1 Violations of local realism . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.2.2 Experimental realization . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5 Quantum communication 22
5.1 Quantum teleportation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.2 Entanglement swapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6 Quantum cryptography 24
6.1 One time pads and the Vernam cipher . . . . . . . . . . . . . . . . . . . . . . . . 25
6.2 The BB84 protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6.2.1 Intercept - resend strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.3 Quantum key distribution using EPR pairs . . . . . . . . . . . . . . . . . . . . . 27
6.4 Experimental setups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
6.4.1 Phase encoded fibre systems . . . . . . . . . . . . . . . . . . . . . . . . . . 28
6.5 More about communication schemes . . . . . . . . . . . . . . . . . . . . . . . . . 29
6.5.1 The quantum telephone exchange . . . . . . . . . . . . . . . . . . . . . . . 29
6.5.2 Speeding up distribution of entanglement . . . . . . . . . . . . . . . . . . 30
I
6.5.3 Privacy amplification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
7 Further reading 31
II
1 Introduction
Scientific progress in physics and mathematics has led to the development of efficient technology
for communicating and distributing information in the 20th century. This technology forms one
of the cornerstones of the information society and our global economy which are highly reliant
on secure methods to transfer and distribute information quickly. To satisfy ever increasing
demands for speed and security encryption and communication methods are constantly improved
and there is an ongoing effort to develop corresponding technology further.
Classical information theory is not usually part of a physics undergraduate degree. It as-
sumes simple classical properties of physical systems and based on those a largely mathematical
theory of information is established. The obtained results are mostly independent of the chosen
implementation and its physical details. However, one still has to acknowledge that information
is physical, i.e. information carriers, senders, and receivers obey the laws of physics. The notion
of quantum information comes about since it turns out that the rules of quantum mechanics
violate some of the basic physical assumptions of classical information theory. The consequences
of this are many, ranging from improved channel capacities, the possibility of physically secure
communication protocols to invalidating some assumptions about the security of classical com-
munication protocols. The field of quantum information processing is still at its infancy and
is currently closely linked with physics. However, one can expect that quantum information
theory will develop into a field of its own if simple quantum physical properties determining the
behaviour of quantum information can be identified.
This lecture course starts by introducing the basics of classical information theory and some
of the most important quantum counterparts. This is followed by a discussion of photon tech-
nologies for realizing quantum communication. The violation of basic classical assumptions by
quantum systems is then exemplified by showing how entangled states violate Bell’s inequalities
and local realism. Finally, schemes for efficient quantum communication based on entangled
states and physically secure cryptographic communication methods are introduced.
Examples:
E1. How many data CD’s (the resources storing the information) are needed to store a map
of the UK (the task) which specifies the position of each address (success)?
E2. Which physical resources are required to transmit a state |Ψi from sender Alice to receiver
Bob with entanglement fidelity F = 0.999?
As can already be seen from these simple examples numerous different types of resources
exist and success can be defined in a number of different ways. It is thus desirable to quantify
information in terms which are to a large extent independent of the physical realization.
1
2.1 Quantifying Classical Information
2.1.1 The setup
We consider the situation where a sender (Alice) communicates with a receiver (Bob) over
a communication channel. We do not wish to make assumptions on how the messages are
embodied. We assume the following general setup.
– She can send one out of N messages x1 · · · xN per use of the channel.
– The probability that Alice chooses message xj is known and given by pj . We do not
know the physical laws which allow to calculate the message chosen by Alice.
To quantify the amount of information transmitted between sender and receiver in this
scenario we describe Alice’s messages by a random variable X which can take the values x1 · · · xN .
X takes on the value xj with probability pj and the probabilities sum to one
X
pj = 1.
j
The amount of information contained in a message (or in X) is defined as the number of bits
which are at least required to store an outcome of a measurement of X. It tells us how much we
learn from a perfect measurement of (reading) X. When measuring X the uncertainty about
its content is reduced. The information gained about the message is therefore defined as the
reduction in information content induced by the measurement. After a perfect measurement of
X we know for sure which message was sent and subsequent measurements on this message will
not tell us anything new. This process thus reduces the information content to zero and the
gained information equals the original information content. For the general case of imperfect
measurements the original information content and the gained information do not agree and
some residual uncertainty about the message is left. In the following sections we discuss the
properties of the sender, receiver and communication channel, respectively.
2
1
2.
0.8
0.6
H(p) 0.4
0.2
1. 3.
0
0 0.2 0.4 0.6 0.8 1
p
Figure 1: Shannon entropy H(p) as a function of probability p. Message 0 is sent with probability
p and message 1 with probability 1 − p. A maximum is reached for p = 1/2 at point 2. The
information content goes to zero if only one message is ever sent at points 1 and 3.
Monday, 29 January 2007 10
The Shannon entropy H(X) does not depend on the values xj of X but just on the probabilities
pj . It is thus applicable to any kind of message if the probability distribution of messages is
known. A message which occurs with probability zero does not add to H(X) since 0 log2 (0) = 0.
We cannot gain any information from messages which are never sent. If only one message
appears with certainty it does also not contain any information since 1 log2 1 = 0. Nothing can
be learnt from measuring one message only since the outcome can be predicted with certainty.
The Shannon entropy is bounded by 0 ≤ H(X) ≤ log2 (N ) with H(X) = log2 (N ) if and only if
(iff) pj = 1/N ∀ j.
Example:
E3. Alice can send two messages 0 and 1. She chooses 0 with probability p and 1 with
probability 1 − p. How much information does one of her messages contain?
Using the above expression for H we find
which yields pmax = 1/2 and minima are obtained for pmin,1 = 0 and for pmin,2 = 1 since
the possible range of values of p is bounded by 0 ≤ p ≤ 1. At pmax each message contains
one bit of information while at pmin the information content is zero as expected. The
shape of H(p) is shown in Fig. 1.
If both messages are sent with equal probability in the above example one bit is necessary
to store which message was sent. If Alice always sends the same message nothing needs to be
3
stored to know which message was sent. For all other values of p the information content has
to be interpreted as the average number of bits required to store a message if a large number of
messages (strictly speaking infinitely many) are sent. That this is indeed the case is the content
of Shannon’s noiseless coding theorem which we state here without proof: A message xj can on
average be compressed to H(X) bits using an optimal code for message compression.
Example:
E4. Alice can send messages X with values a,b,c. The probability for a is pa = 1/2 while b, c
have a probability of pb = pc = 1/4. How much information is contained in one message?
1 3
H(X) = −pa log2 pa − pb log2 pb − pc log2 pc = (log2 2 + log2 4) = .
2 2
By encoding a using the bit string 0, b as 10 and c as 11 the average length L of a bit
string representing a value of X will be
1 1
L=1× × 1 + 2 × × 2 = 3/2 = H(X) .
2 4
This code is optimal, the messages cannot be be compressed further without losing in-
formation about the original messages. Note that the bit string of optimally encoded
messages contains a 0 or a 1 at each position with the same probability 1/2.
Finding the optimal encoding for given message probabilities is a non-trivial task (c.f. the
varying performance of data compression software). The following example illustrates the per-
formance of a very simple data compression procedure.
Example:
E5. Alice sends message a with probability p and message b with probability 1 − p. Assuming
p > 1/2 we choose to encode aa as 0, ab as 10 and b as 11. The message string aa occurs
with probability p2 , ab with p(1 − p) and b with (1 − p). The average number of bits
required to store a message L is given by
1
L= × p2 + 1 × p(1 − p) + 2 × (1 − p) .
2
The comparison of the average length L with the Shannon entropy H(p) shown in Fig. 2
reveals that this encoding is never optimal and gets best for p ≈ √
0.774. This encoding is
only better than simply identifying a with 0 and b with 1 if p > 3 − 1.
The noiseless coding theorem quantifies the amount of information contained in the messages
sent out by Alice. It is thus also often called Shannon’s source coding theorem. When the
messages Y are received by Bob they will most often have been subject to noise and thus not
be identical to X. Therefore the question arises what Bob learns about the messages X when
reading the received messages Y .
4
Hp, Lp
2
L(p)
H(p)
p
0.5 1
Figure 2: Shannon entropy H(p) and average bit string length L(p) as a function of probability
p. The vertical dashed line indicates the value of p where the bit string length is closest to the
entropy H(p).
amount of information gained about the original messages X by reading Y we first introduce
the joint entropy of the variables X and Y as
X
H(X, Y ) = − p(xj , yn ) log2 (p(xj , yn )) ,
j,n
where p(xj , yn ) is the probability that X takes the value xj and Y takes the value yn . This
joint entropy is the total information content of variables X and Y . Furthermore we define the
entropy of X conditional on knowing Y by
H(X|Y ) tells us how uncertain we are about the value of X after measuring Y .
If X and Y are uncorrelated, i.e. the probability qn of Y taking on the value yn is independent
of the value of X, then Bob does not learn anything about X from measuring Y . In this case
p(xj , yn ) = pj qn
and we have
H(X, Y ) = H(X) + H(Y ) ,
(see class problems for a proof). Thus the information content of X is not decreased by measuring
Y . In other words, Bob’s uncertainty on the value of X does not decrease when measuring Y ,
i.e. H(X|Y ) = H(X). However, if the value of X is fixed by measuring Y , i.e.1
qn for j = n
p(xj , yn ) = ,
0 otherwise
we find that H(X, Y ) = H(Y ). When Bob measures yn he knows that X certainly has the
value xn . In this case he learns all he can about X, i.e. H(X|Y ) = 0. X and Y are perfectly
correlated. The measurement reduced the information content H(X, Y ) = H(Y ) by H(Y ) to
zero and thus no uncertainty about either X or Y is left after measuring Y .
1
Here we assume for simplicity that M = N and that the ordering of messages is preserved in the transmission
5
Based on these two observations we introduce the mutual information content of X and Y
as
H(X : Y ) = H(X) + H(Y ) − H(X, Y ) .
This can also be written as H(X : Y ) = H(X) − H(X|Y ). We find that no mutual information
is contained in X and Y if they are uncorrelated since then H(X, Y ) = H(X) + H(Y ). In this
case no information is transmitted over the channel. If X and Y are perfectly correlated we
have H(X, Y ) = H(Y ) and the mutual information between X and Y takes its maximal value
H(X : Y ) = H(X). The information sent by Alice can be completely restored at the receiver
side in this case.
where the maximum is taken over all possible input probability distributions pj of X. We do
not give a proof of this theorem.
Remark: Sometimes channel capacity is given in bits/sec which is C(N ) times the number
of possible channel uses per second (e.g. for internet connections).
6
2.2.1 Quantum Mechanics
The trace of an operator In linear algebra the trace of a matrix M is defined as the sum
over all diagonal elements X
Tr {M } = Mnn .
n
This definition extends to operators in a linear Hilbert space as follows. Given an operator
M̂ and an orthonormal basis |φn i the operator can be rewritten as a matrix M with matrix
elements
Mnm = hφn | M̂ |φm i .
P
This matrix represents the operator M̂ in basis |φn i and we can write M̂ = nm |φn i Mnm hφm |.
The trace of an operator is defined as the sum over all diagonal elements of M
n o X X
Tr M̂ = Mnn = hφn | M̂ |φn i .
n n
Since the trace does not change under cyclic permutation and U is unitary we have
n o n o
Tr M̂ = Tr M U U † = Tr {M } ,
Example:
E6. We calculate the logarithm of the operator σx +3I = 4 |+i h+|+2 |−i h−| with eigenvalues
2 and 4. We find log2 (σx + 3I) = log2 (4) |+i h+| + log2 (2) |−i h−| = 2 |+i h+| + |−i h−|
The partial trace of an operator The partial trace of an operator is defined as the trace
over a subspace of the total Hilbert space. In working it out an operator acting on the total
Hilbert space is mapped into one acting on a subspace of the Hilbert space only. In our case we
will e.g. be interested in tracing over the part of the Hilbert space pertaining to the sender and
will be left with an operator that only acts on the degrees of freedom accessible to the receiver.
The total Hilbert space is broken up into two parts H = HA ⊗ HB . The basis of H can be
written as |nmi = |niA ⊗ |miB where |niA describes degrees of freedom of the sender HA and
|miB those of of the receiver HB . The partial trace of an operator M̂ over subspace HA is given
by n o X X
TrA M̂ = A hn| M̂ |niA = |miB (Mnm,no ) B ho| .
n n
7
Here we have used the notation Mnm,lo = hnm| M̂ |loi and used the rule2 A hn| loi = δnl |oiB .
The resulting operator contains only basis elements corresponding to degrees of freedom of the
receiver. We have thus traced out the sender. Note that subsequently tracing over both Hilbert
spaces yields the trace of the operator.
The density operator All quantum mechanical expectation values for a system in the pure
state |ψi can be rewritten in terms of a trace
n o
hM̂ i = hψ| M̂ |ψi = Tr |ψi hψ| M̂ .
We can thus define the operator ρ = |ψi hψ| and use it replace the state vector |ψi. This operator
is called the density operator or state of the system. All observable quantities can be worked
out from the density operator3 .
Sometimes the state vector of a system is not known but it is known that the system will be
in state |ψn i with probability pn . This can e.g. happen if the system preparation is imperfect,
after a measurement if the outcome is not revealed, in decoherence processes, when a system is
in a thermal state, or when it produces quantum messages |ψn i with probability pn . Then the
expectation value of an operator has to be worked out for each possible state and to be weighted
with the corresponding probability4 . This yields
X n o
hM̂ i = pn Tr |ψn (t)i hψn (t)| M̂ .
n
The trace is linear and therefore we can define the (mixed) density operator
X
ρ= pn |ψn (t)i hψn (t)| ,
n
n o
and in general write hM̂ i = Tr M̂ ρ . Using a density operator to describe a system thus
allows a compact and efficient way to include classical uncertainty about its wave function into
quantum mechanical calculations.
8
In most cases we will not be concerned with the eigenvalues an obtained in a measurement
of an operator M̂ . We instead specify a measurement via a set of orthnormal states |φn i and ask
about the probability pn of projecting the system into state |φn i. The corresponding eigenvalues
are assumed to be non-degenerate so that these state are distinguishable for the observer. The
operator M̂ and its eigenvalues an are not required to calculatePthe probabilities pn . However,
a corresponding observable M̂ could be constructed as M̂ = n an |φn i hφn | with arbitrarily
chosen real an 6= al for n 6= l.
Local observables and measurement A local observable of the receiver can be written as
M̂ = IA ⊗ M̂B since the receiver cannot directly measure degrees of freedom located at the
sender. We work out the expectation value of M̂ by first tracing over the sender and find
D E n n oo n o n o
M̂ = TrB TrA M̂ ρ = TrB M̂B TrA {IA ρ} = TrB M̂B ρB
where ρB = TrA {ρ} is the reduced density operator of the receiver. Thus all information
about observables which can be measured locally by the receiver is contained in the reduced
density operator ρB . The same argument holds for the sender with reduced density operator
ρA = TrB {ρ}.
The measurement of a local observable M̂ = IA ⊗ M̂B can be described as above by specifying
the eigenstates of MB written as |φm iB and using the reduced density operator ρB . The mea-
surement collapses the state of the receiver into |φm iB and the total system into ρA ⊗|φm iB hφm |
with probability pm = B hφm | ρB |φm iB . The operator M̂ has degenerate eigenvalues5 since the
receiver cannot
P measure degrees of freedom of the sender. Alternatively, we can write the oper-
ator as M̂ = n,m |niA hn| ⊗ am |φm iB hφm | with am the (assumed) non-degenerate eigenvalues
of MB and n labeling the degeneracy6 . Using the above definitions for measuring a global de-
generate observable M̂ we again find that the system is projected into state ρA ⊗ |φm iB hφm |
with probability pm . Both approaches are equivalent.
Example:
E7. Alice and Bob share a Bell state |ψ − i. What is the reduced density operator for each of
them? What are the probabilities for a local measurement at Alice’s site to project the
system into the orthogonal states |φ1 iA and |φ2 iA ? In this case the Hilbert space is split
into H = C2 ⊗ C2 and basis states |nmi = |niA ⊗ |miB with n, m = 0, 1. The reduced
density operator of the receiver Bob is
1 IB
ρB = A h0| ψ − ψ − 0iA + A h1| ψ − ψ − 1iA = (|0iB h0| + |1iB h1|) = .
2 2
This is the maximally mixed state of a qubit. By symmetry we obtain ρA = |0iA h0| +
|1iA h1| = IA /2. The probability to project into either of two states in a local measurement
is 1/2.
9
ry system is and can thus be viewed as being represented by S(ρ) qubits.
• Like in classical compression this only works on average, i.e. if the source
produces a large number m of quantum messages.
en questions • Reliably in this case means that the entanglement fidelity of the original
state ρ⊗m after compression Cm and decompression Dm tends to 1 for large
on tasks? m. The entanglement fidelity tells us how well the state ρ⊗m preserves its
entanglement with an environment during compression and decompression.
We do not define the entanglement fidelity here (see NC page 420).
sing quantum
Cm Dm
ρ ρ‘ ρ”
dim(HA ) = 2S(ρ) ,
and can thus be viewed as being represented by S(ρ) qubits. Like in classical compression this
only works on average, i.e. if the source produces a large number m of quantum messages. The
procedure is schematically shown in Fig. 3. Reliably in this case means that the entanglement
fidelity of the original state ρ⊗m after compression Cm and decompression Dm tends to 1 for
large m. The entanglement fidelity tells us how well the state ρ⊗m preserves its entanglement
with an environment during compression and decompression8 .
10
The reduced density operators ρA for Alice and ρB for Bob yield the corresponding information
contents S(ρA ) and S(ρB ). From those the conditional entropy and mutual information follow
as in the classical case
S(ρA |ρB ) = S(ρAB ) − S(ρB ) ,
S(ρA : ρB ) = S(ρA ) + S(ρB ) − S(ρAB ) .
These quantities replace those introduced in classical information theory. Note that they do,
however, not have the classically expected properties. For instance, the conditional entropy can
become negative as we will explicitly work out later for the case of two entangled qubits.
In contrast to the classical case Bob cannot read his messages without affecting the quantum
state. The process of measuring the received messages can thus influence the entropy of the
state. We study different possibilities by considering measurement on one qubit.
Example:
√
E8. A qubit is prepared in the pure state |+i = (|0i+|1i)/ 2. It is measured in the computa-
tional basis and we consider two different scenarios: (i) the outcome of the measurement
is |0i and (ii) the outcome of the measurement is not revealed. Case (ii) can e.g. happen
in a decoherence process where the measurement is performed by the environment and
the outcome is not accessible. How does the information content of the qubit change?
(i) The initial state is ρi = |+i h+|. This is a pure state (state |+i is prepared with
certainty) and thus has entropy S(ρi ) = 0. After the measurement the state is ρf = |0i h0|
which is again pure and thus S(ρf ) = 0. While the quantum state changes in this process
the qubit remains in a pure quantum state and does not contain information. Still, each
of the two possible measurement outcomes occurs with probability 1/2.
(ii) The possible states after the measurement are |0i and |1i each with probability of
p0 = p1 = 1/2. Not knowing the actual outcome we thus have to write
1 1
ρf = |0i h0| + |1i h1| .
2 2
This state has entropy S(ρf ) = 1. Lacking the knowledge of the measurement outcome
turns the initial pure state into a mixed state. Its information content (uncertainty about
the qubit state) increases.
Finally we consider what happens if a measurement in the computational basis is per-
formed on the state ρf and the outcome is |0i. In this process the entropy is reduced
from 1 to 0. The mixed state is turned into a pure state by the measurement and one bit
of information about the original state is gained. This type of measurement is consistent
with measuring in a classical system.
11
P †
Here Fj are the so-called Kraus operators which fulfill j Ej Ej < I. The channel capacity
quantifies the number of qubits which can be faithfully transmitted. For an ideal channel we
have T = I, the identity operation. The channel capacities of quantum channels are fully
understood only for special cases. For instance the Holevo-Schumacher-Westmoreland (HSW)
theorem gives the channel capacity if only product input states are used10 . A detailed discussion
of channel capacity is beyond the scope of this lecture course. Instead we consider two simple
examples of how noise and decoherence affect the information content of quantum systems.
Examples:
E9. A classical bit is stored in two atomic states |0i and |1i. The state |0i is stable while
the state |1i is metastable and spontaneously emits photons at a rate γ. How does the
mutual information between the state of the atom and the initial bit change with time?
The original bit is in a maximally mixed state ρA = (|1i h1| + |0i h0|)/2 and contains
S(A) = 1 bit of information. The joint bit-atom system is initially prepared in state
ρAB = (|11i h11| + |00i h00|)/2. If the atom is initially in state |1i the probability p1 of
finding it in state |1i at a later time is determined by the equation ṗ1 = −γp1 and thus
we find
e−γt 1 − e−γt 1
ρAB = |11i h11| + |10i h10| + |00i h00| .
2 2 2
This state has entropy
We find the entropy of the atomic state by tracing out the initial bit obtaining the reduced
density operator
e−γt 2 − e−γt
ρB = |1i h1| + |0i h0| .
2 2
This state has entropy
Both entropies are shown in Fig. 4. Initially the entropy solely arises from the unknown
state of the bit. The uncertainty of the atomic state due to spontaneous emission then
increases the overall entropy for short times t ≤ 1/γ. For times t 1/γ the atom
will be in the pure state |0i and the entropy of the system is again solely due to the
state of the initial bit. However, in this process the correlation between the state of
the atom and the bit is lost as becomes evident by looking at the mutual information
S(A : B) = S(A) + S(B) − S(AB) also shown in Fig. 4. Note: This example can equally
well be described using classical information theory.
E10. A photonic channel is used to transmit two messages |0i ≡ no photon present and
|1i ≡ one photon present. 20% of the photons are lost in the channel. We investigate
the following classical and quantum scenarios for using this channel to establish mutual
information between sender Alice an receiver Bob.
10
See Nielsen and Chuang page 555.
12
SHABL SHBL SHA:BL
1.5 1 1
1.4 0.8 0.8
1.3 0.6 0.6
1.2 0.4 0.4
1.1 0.2 0.2
Γ t Γ t Γ t
1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
Figure 4: Entropies of an atom B storing a classical bit A. The atom undergoes spontaneous
emission.
(i) Classical messages X with values |0i and |1i are sent with probabilities p0 = p1 = 1/2
and received as messages Y as |0i and |1i. How much mutual information is created in
one use of the channel?
We find H(X) = 1. The joint entropy can be worked out from the probabilities p(0, 0) =
1/2, p(0, 1) = 0, p(1, 1) = 4/10 and p(1, 0) = 1/10. It is given by H(X, Y ) = 1.361. The
probabilities on the receiver side are q0 = 6/10 and q1 = 4/10 and thus H(Y ) = 0.971. We
therefore find H(X|Y ) = H(X, Y ) − H(Y ) = 0.39 and H(X : Y ) = H(X) − H(X|Y ) =
0.61. The noise in the channel (photon loss) significantly reduces the maximally achiev-
able mutual information from 1 bit to 0.61 bits per use of the channel. Note: phase noise
leading to |1i → − |1i does not influence this scheme (it only leads to timing errors and
may slightly reduce the maximum possible number of uses of the channel per second).
(ii) Alice creates an entangled state |Ψ− i and sends one qubit to Bob. The resulting
quantum state is
9 1
ρ= Ψ− Ψ− + |00i h00| .
10 10
Since the states |Ψ− i and |00i are orthogonal this density operator has eigenvalues 9/10,
1/10, 0 and 0 giving an entropy of S(ρ) = 0.469. The reduced density operator on Alice’s
side is ρA = (11 |0i h0|+9 |1i h1|)/20 with entropy S(ρA ) = 0.9928. By symmetry S(ρB ) =
0.9928. We thus find for the conditional entropy S(ρA |ρB ) = −0.524 and a mutual
information of S(ρA : ρB ) = 1.517. If no noise were present the mutual information
would increase to 2 bits. Note: This scheme is not resistant against phase noise. It is
crucial to keep coherence in the transmission process in order to achieve the increased
mutual information compared to the classical case.
As we see from the last example the mutual information established via distributing an
entangled state can be larger than in the classical case and negative conditional entropies, which
are not possible in classical schemes, may arise. However, there is no (known) scheme on how to
solely use this kind of mutual information to transmit messages from Alice to Bob. Alice initially
prepares a pure state which does not contain information. Entanglement alone is thus not
sufficient for communication (and faster than light communication is not possible). However, by
combining entanglement and classical communication improvements over conventional classical
communication schemes can be achieved e.g. in quantum dense coding.
13
starts with the state |Ψ− i shared between Alice and Bob. Alice then sends one of four possible
messages 00, 01, 10, 11 by applying a local quantum operation on her qubit of the entangled
pair. In detail she applies 00: I, 01: σz , 10: σx and 11: σx σz . This operation turns the initial
Bell state into the orthogonal Bell states 00: |Ψ− i, 01: |Ψ+ i, 10: |Φ− i and 11: |Φ+ i. She then
sends her qubit to Bob via the quantum channel and Bob measures both bits in the Bell basis.
A Bell state analyzer for photon states will be discussed in detail in Sec. 3.1.5. Since the Bell
states are orthogonal they can be distinguished having only one copy of the state.
Note: At some point before the communication takes place Alice and Bob need to share the
entangled pair. This requires Alice sending a qubit to Bob or sending qubits to Alice and Bob
from a source of entangled qubits. The entangled state is independent of the message to be sent
in both cases and the distribution can thus be done before Alice decides on which message to
send. The initial entangled pair thus acts as a resource for communication between Alice and
Bob.
3 Photon techniques
Here we discuss methods for realizing quantum communication and computation with photons.
The experimental setups discussed in this section are shown in the appendix.
eiφ sin(ξ)
cos(ξ)
BS(ξ, φ) =
e−iφ sin(ξ) − cos(ξ)
where cos2 (ξ) and sin2 (ξ) are the reflectivity and transmitivity of the beam splitter, respectively.
The simple 50/50 BS corresponds to BS(π/4, 0) = H. The value of φ is the phase shift experienced
in a transmission through the BS similar to the phase gate discussed next.
A single qubit phase gate Φ is implemented by putting a slab of transparent medium with
refractive index n and length L into the path of one spatial mode. This causes a phase shift
φ = (n − n0 )Lω/c0 with respect to the second arm, which we assume to be in air. Here n0 and
14
c0 are refractive index and speed of light in air, respectively. This maps the qubit wave function
according to the truth table |0iout → |0iin and |1iout → eiφ |1iin .
These two linear optical elements allow the realization of all necessary single qubit operations.
Kerr nonlinearities χ are necessary to create a two qubit phase gate where a phase shift is induced
if two photons are traveling a distance L in the Kerr medium (see nonlinear optics part of this
course). Since this phase is conditional on both photons being present it is an entanglement
phase given by ϕ = χL and can be used to realize a controlled two qubit phase gate
|00iin → |00iout
|01iin → eiφ |01iout
|10iin → eiφ |10iout
|11iin → ei(ϕ+2φ) |11iout ,
where the phase φ is caused by the linear refractive index of the Kerr medium. Together these
gates form a universal set of gates for quantum computing.
Example:
E11. We can now interpret the familiar setup of a Mach-Zehnder interferometer in terms of
single qubit gates. The setup consists of a 50/50 BS followed by a phase shifter Φ in
one arm and then a second 50/50 BS. This maps the input state |Ψiin according to
|Ψiout = HΦH|Ψiin which in matrix form is given by
1 1 1 1 0 1 1 α
|Ψiout =
2 1 −1 0 eiφ 1 −1 β
and gives
cos(φ/2)α − i sin(φ/2)β
|Ψiout = eiφ/2 .
−i sin(φ/2)α + cos(φ/2)β
Note that the phase shifter can be written as Φ = eiφ/2 (cos(φ/2)I − i sin(φ/2)σz ) and thus
HΦH= eiφ/2 (cos(φ/2)I − i sin(φ/2)σx ), using Hσz H= σx .
Example:
E12. A quarter-wave plate with its fast axis at an angle of π/4 to the vertical and horizontal
directions of polarization is placed into the path of a polarization encoded photon. Which
gate does this wave plate implement? What happens for a half-wave plate placed at an
angle of φ to the vertical axis?
√ √
The fast axes is (|V i + |Hi)/ 2 and the slow axis is (|V i − |Hi)/ 2. The fast axis
will pick up a phase of e−iπ/2 relative to the slow axis. An initially vertically polarized
15
√
photon will end up in state |V i → √ (|V i − i |Hi)/ 2 while a horizontally polarized photon
is turned into |Hi → (|V i+i |Hi)/ 2 (up to global phases). For a half-wave plate a phase
of eiπ = −1 is picked up. Up to global phases this leads to a rotation of the polarization
angle by 2φ, i.e. |V i → cos(2φ) |V i + sin(2φ) |Hi and |Hi → − cos(2φ) |Hi + sin(2φ) |V i.
This is a σx or NOT gate for φ = π/4 and a Hadamard gate for φ = π/8.
Time entanglement This only relies on the fact that the two photons in a pair are created
simultaneously and satisfy energy conservation laws. The time entangled states can be measured
in a Franson type interferometer with two short |Si1,2 and two long arms |Li1,2 . The created
state is given by
1h i
|ψi = |Si1 |Si2 + ei(φ1 +φ2 ) |Li1 |Li2 + eiφ2 |Si1 |Li2 + eiφ1 |Li1 |Si2 .
2
Here φ1,2 is a phase introduced in the long arms of the interferometer. The path difference
between the L and the S arms is much longer than the coherence length of the photons and
thus no interference fringes are observed inside the two interferometers. While the overall state
is a product state appropriate time gating can be used to detect only the first two terms of
the state and discard the SL and LS terms. The LL and SS terms are truly coincident and
indistinguishable because the time of creation of the photon pair is not known. These two parts
of the wavefunction will thus interfere and show fringes as a function of the phase φ1 + φ2 . This
interference indicates time entanglement and can be observed by measuring coincidences in the
outputs of the two interferometers.
16
PBS D3
D4
|Ψi23 BS
PBS
D2 D1
Figure 5: A partial Bell state analyzer identifying the polarization encoded Bell states |Ψ+ i and
|Ψ− i.
By attenuating this beam the laser intensity and thus the parameter |α|2 goes down. Then the
dominant contributions to the state of the laser are vacuum |0i and the single photon
√ state |1i
while all higher order terms decrease with higher powers of α. For instance for α = 0.1 if light
ever makes it through the attenuator it is a single photon with 95% probability. The drawback
of this simple method is that the source does not indicate whether a photon is present or not.
Instead, in parametric down conversion measuring one photon indicates the presence of the other.
More sophisticated schemes are currently developed which allow the on demand generation of
a photon with well defined polarization, wave length and direction. Such single photon sources
are important for improved implementations of quantum communication schemes.
Single photon detectors required in quantum communication should posses a high quantum
efficiency, detect photons over a broad frequency range (100nm to 2000nm), have low dark count
rates (NO false counts, NO afterpulsing). They should recover quickly after detecting a photon
and have fast rise/pulse pair resolution. Single photon detectors are further separated into
photon number resolving and photon counting devices.
17
the sender before being submitted to the receiver: A λ/4 and λ/2 plate are used to realize σx
and σz operations on this qubit. When both qubits have arrived at the receiver side a Bell state
measurement needs to be carried out.
A setup for partially achieving a Bell state measurement is shown in Fig. 5. Two polar-
ization entangled photons are incident onto the BS. The overall wave function of the two pho-
tons (polarization + spatial wave function) has to be symmetric since the photons are bosons.
Therefore, if the polarization part of the state is (anti)symmetric the spatial part also has to
be (anti)symmetric. For Bell state |Ψ− i with antisymmetric polarization part one photon has
to follow the upper arm and the other photon the lower arm after the BS. Thus a coincidence
between D3 and D2 or D4 and D1 is registered. For |Ψ+ i both photons follow the same arm
and thus a coincidence between D1 and D2 or between D3 and D4 is registered. In the other
two cases |Φ+ i , |Φ− i two photons are detected in the same detector and they cannot be dis-
tinguished. This analyzer therefore identifies two of the four Bell states and distinguishes them
from the other two Bell states. It does not allow to identify all four of them. Once can show
that using only linear optics it is not possible to distinguish all four Bell states.
Example:
E13. Two identical photons impinge on a 50/50 BS one arriving at the upper arm |ui and the
other at the lower arm |li. The photons have a symmetric polarization wave function.
Which path will the photons take after the BS?
√
The initial symmetric wave function is (|uli + |lui)/ 2. Each photon undergoes a
Hadamard gate. This turns the wave function into
4 Testing EPR
We discuss violations of local realistic assumptions by quantum mechanics as first predicted
by Einstein Podolsky and Rosen (EPR). We consider the two most prominent examples of
violating Bell inequalities and measurements on Greenberger-Horne-Zeilinger (GHZ) states. The
experimental setups discussed in this section are shown in the appendix.
18
Q=±1 S=±1
A C B
R=±1 T=±1
Alice Charlie Bob
• Charlie prepares two systems (possibly correlated) and sends one to Alice and the other
one to Bob.
• After receiving their respective particles Alice and Bob both randomly choose to measure
one of two properties of their particle. Then they simultaneously perform their measure-
ment.
• They repeat this experiment many times and record their outcomes
• Alice and Bob meet and investigate the correlations between their experimental results.
What can they expect to obtain? For simplicity we assume that each measurement can only yield
a value of ±1. We describe the possible measurements of Alice by random variables Q and R and
those of Bob by random variables S and T . By common sense we assume that the measurement
values of Q, R, S, and T exist independent of observation. This is the assumption of realism.
Furthermore, Alice’s measurement does not influence the outcome of Bob’s measurement. They
are performed in a causally disconnected manner, so it is reasonable to assume this. This is the
assumption of locality. We investigate the expression
QS + RS + RT − QT = (Q + R)S + (R − Q)T = ±2 ,
since either Q + R or Q − R is zero. We assume that the probability for measurement values
Q = q, R = r, S = s, T = t before the measurement is p(q, r, s, t) and using this probability
distribution we find the expectation value
X X
E(QS + RS + RT − QT ) = p(q, r, s, t)(QS + RS + RT − QT ) ≤ 2 p(q, r, s, t) = 2 .
q,r,s,t q,r,s,t
This yields the CHSH inequality obeyed if the assumptions of local realism hold for the mea-
surements carried out by Alice and Bob
We now analyze the same experiment using quantum mechanics for the case where Charlie
generates an entangled Bell state |Ψ− i. He sends one qubit to Alice and the other to Bob. Alice
chooses between measuring the operators
√ Q = σz and R = √ σx on her qubit. Bob measures one
of the operators S = −(σz + σx√ )/ 2 and T = (σ √z − σ x )/ 2. We√find the quantum mechanical
√
expectation values hQSi = 1/ 2, hRSi = 1/ 2, hRT i = 1/ 2, and hQT i = −1/ 2 and
therefore √
E(QS) + E(RS) + E(RT ) − E(QT ) = 2 2 > 2 .
The experiment violates the CHSH inequality and the assumptions of local realism. Entangle-
ment between Alice’s and Bob’s states yields correlations stronger than allowed by local realism.
19
α β
D1 D3
Here N (1α , 1β ) is the probability for Alice to obtain a click in D1 when setting her PBS at angle
α and Bob to obtain a click in D3 when setting his PBS at angle β. This inequality is violated if
the two photons are prepared in the entangled state |Φ+ i when setting α − β = β − γ = 30◦ since
N (1α , 1β ) ∝ cos2 (α − β). By correlating different measurement results the Aspect experiments
managed to violate the above Bell inequality.
4.1.3 Loopholes
The results of the Aspect experiments (and several experiments which followed them) can be
viewed as evidence for the violation of local realism but this is not the only explanation. Var-
ious experiments had several loopholes: a) fair sampling assumption which presumes that the
measured values are a fair reflection of all possible outcomes; b) rather small efficiency of photo
detectors; c) accidental coincidences were removed in the experiment; d) polarizers were set up
(not randomly) before the photons were created; e) strict Einstein locality of the measurements
was not obeyed; f) the quantum system was not truly a bipartite system since it e.g. consisted
of an atom and two photons. Addressing these loopholes requires a)b) 100% detection efficiency
(e.g. achieved in ion trap experiments but only at 3µm distance); c)keeping the accidental co-
incidences in the data; d)e) adjusting the polarizers randomly after the photons are created.
A random quantum process can be used to set up the measurement. Measurements can be
performed in strict Einstein locality and in different moving frames; f) measuring additional
particles in the system and showing that they are not correlated with the two photons.
20
violated on average and not in any single run of an experiment. In contrast quantum mechanics
predicts the violation of local realism with certainty for some entangled states of three particles,
e.g. GHZ states. In these experiments measurement outcomes which are not allowed according
to local realism will be found with certainty using quantum theory. Since we can make definite
predictions rather than statistical ones no inequalities are needed in this setup.
Local realistic analysis From a local realistic point of view these perfect correlations can
only be explained by assuming that each photon carries elements of reality which determine
the outcome for all measurements considered. Let us investigate a measurement in the XXX
basis. Which outcomes are possible if these elements of reality exist? The permutations of
|GHZi imply that if H 0 (V 0 ) is obtained for one photon the other two have to have opposite
(identical) circular polarizations. Imagine we find V 0 and V 0 for photons 2 and 3. Since 3 is V 0 ,
1 and 2 have to have identical circular polarization. Also, since 2 is V 0 , 1 and 3 have to have
identical circular polarization. All of these polarizations are elements of reality so all photons
have identical circular polarization. Thus photon 1 needs to carry polarization V 0 . We conclude
that |V 0 V 0 V 0 i is a possible outcome. Using similar arguments one can verify that the only four
possible outcomes are
V 0V 0V 0 H 0H 0V 0 H 0V 0H 0 V 0H 0H 0 .
Quantum theoretical analysis In the XXX basis the state |GHZi reads
1
H 0H 0H 0 + H 0V 0V 0 + V 0H 0V 0 + V 0V 0H 0
|GHZi = .
2
Local realism and quantum theory predict opposite results in all cases!
21
Alice classical channel |Ψi3
BSM U
|Ψ−i23 Bob
|Ψi1
EPR source
5 Quantum communication
We have already discussed quantum dense coding and seen that entanglement can serve as a re-
source for communication between Alice and Bob when combined with classical communication.
In quantum dense coding two bits of information are transmitted via a shared pair of qubits and
transmission of one qubit between sender and receiver. We will now consider more sophisticated
quantum communication schemes. The experimental setups discussed in this section are shown
in the appendix.
22
part of an entangled Bell state |Ψ− i23 with qubit 3. The state of the three qubits is |Ψi123 =
[α(|001i − |010i) + β(|101i − |110i)]. Alice performs a Bell state measurement (BSM) on her
two qubits and tells Bob the result. The measurement projects qubits 1 and 2 onto one of the
four Bell states. The quantum state is projected according to the measurement outcome:
Note that qubit 3 is never entangled with qubits 1 and 2 after the measurement.
Bob receives qubit 3 and the measurement result from Alice. He applies a unitary U to
particle 3 conditional on the measurement result as follows.
For any measurement outcome the operation U turns the state of qubit 3 into the original state
of qubit 1 yielding |Ψi3 = α |0i + β |1i up to a irrelevant global phase.
We remark that the quantum state of all three qubits before Alice’s measurement can be
written as
1
|Ψi123 = Ψ− 12 (α |0i + β |1i)3 + Ψ+ 12
(α |0i − β |1i)3 + Φ− 12
(α |1i + β |0i)3
2
+ Φ+ 12 (α |1i − β |0i)3 .
Thus each of the four Bell states will be found with probability 1/4 in Alice’s measurement. If
the outcome is not revealed the measurement turns the state into a mixed state given by
23
|Ψ−14
classical channel
4 1 BSM 2 3 U
state of negative conditional entropy S(ρA |ρB ) = −1 which is independent of the qubit state
to be sent. The transmission of 2 bits of classical information from Alice to Bob via a classical
channel is required to complete the protocol. Classical communication and entanglement are
both essential resources for teleportation but none of them is sufficient on its own to teleport
|Ψi1 from Alice to Bob.
6 Quantum cryptography
Cryptographic protocols can be classified by the type of security against eavesdropping. There
exist mathematically secure schemes (like public key RSA encryption) whose security relies
on assumptions12 about the mathematical complexity of decrypting the cipher text without
possessing the correct key. The majority of nowadays secure public internet connections relies
on such schemes. Alternatively a cryptographic setup may provide a physically secure method
for communicating. In such setups the security is provided by the physical laws13 governing
the communication protocol. Here we first discuss a provably secure classical communication
protocol and then quantum methods for distributing the necessary keys. The experimental
setups discussed in this section are shown in the appendix.
12
These assumptions are sometimes unproven.
13
Physical laws are not provably correct.
24
6.1 One time pads and the Vernam cipher
The Vernam cipher is a cryptographic protocol which allows the encryption and decryption
protocol to be publicly known. The security of the protocol relies entirely on the key which is
private and not publicly known. Alice and Bob share identical n-bit secret key strings (the one
time pad). Alice encodes her message by adding message and key using a classical XOR gate
on each pair of bits. Bob decodes by subtracting the key again, i.e. by applying another XOR
operation with his key bit. As long as the key is of the same length as the message and can be
securely distributed to Alice and Bob the Vernam cipher is provably secure and Eve’s mutual
information with the sent message can be made arbitrarily small. This means that one needs a
secure method for distributing a large number of key bits. Key bits must be delivered in advance
of the message. Otherwise one could deliver the message itself by secure means. Furthermore
the key bits must be guarded until they are used and the key must be destroyed after the bits
were used. These difficulties in key distribution make the Vernam cipher impractical for general
use. However, it is used e.g. in military applications.
We note as an aside that the problem of key distribution is circumvented in public key
cryptography. The public key can easily be used to encrypt a message (like a box can be
locked using a padlock without possessing the key). To decrypt the message a private key
(corresponding to the key for the padlock) needs to be used. In public key cryptography Alice
sends out public keys to everyone and whoever wants to securely communicate with Alice may
use her key. The security of this protocol relies on the assumption that decrypting the message
without possessing the private key is difficult.
where ak is the k th bit of A and bk is the k th bit of B. Each qubit is in one of the four states
|ψ00 i = |0i
|ψ10 i = |1i
|ψ01 i = |+i
|ψ11 i = |−i
The bits in A are encoded in the basis X or Z as determined by B. These four states are not
mutually orthogonal and cannot be distinguished with certainty. Bob receives E(|ψi hψ|), where
E describes the action of the channel and an eventual eavesdropper. He publicly announces
the fact that he has received the state. At this point Alice, Bob and a possibly present Eve
have their own states each with separate density matrices. Note that Alice has not revealed
B thus Eve has no knowledge on which basis she should have used when trying to eavesdrop
the communication by measuring qubits. At best she can guess and if her guess is wrong she
will disturb the states received by Bob. Note that noise in the channel also contributes to E.
Bob now measures each qubit in basis X or Z depending on a random (4 + δ)n bit string B 0
25
which he creates on his own. We call Bob’s measurement results A0 . After this Alice announces
B over a public channel and Bob and Alice discard all bits in {A, A0 } except for those where
the bits in B and B 0 are equal. We assume that δ is sufficiently big so that they can keep 2n
bits. It is important that Alice does not publish B before Bob has received the message to
ensure security of the scheme! To check for noise and eavesdropping Alice now selects n bits
and publicly announces the selection. Alice and Bob publicly compare these n bits and if more
than t bits disagree they abort and retry the protocol. t is selected so that they can apply
information reconciliation and privacy amplification (see Sec. 6.5.3) to obtain m < n acceptably
secret shared key bits. This protocol can be generalized to other states and bases. For instance
the B92 protocol only uses two non-orthogonal states |0i and |+i for the communication.
For the BB84 protocol qubits need to be sent via a quantum channel and also classical
bits are transmitted from Alice to Bob. However, it does not require any entanglement. The
protocol relies on the fact that non-orthogonal quantum states cannot be perfectly distinguished
by an eavesdropper whose actions will necessarily affect some of the states received by Bob. This
reduces the mutual information between Alice and Bob for those cases where they have measured
in the same basis. By detecting this reduction in mutual information they can identify Eve as
we will now investigate for a simple eavesdropping strategy.
The cases where Alice sends 1X, 0Z, or 1Z can be worked out in the same way. Eve guesses the
correct value of the bit with 75% probability. If Alice and Bob measure in the same basis then
their results will disagree with a probability of 1/4. For a perfect noiseless channel the mutual
information between Alice’s and Bob’s messages obtained when measuring in the same basis has
thus been reduced from H(X : Y ) = 1 to H(X : Y ) = 0.456 by Eve. The probability for Alice
26
and Bob to find disagreement and thus identifying Eve when comparing n of their key bits is
given by n
3
Pd = 1 − .
4
Thus the number of bits n that need to be compared for detecting an eavesdropper with a
probability Pd is
log2 (1 − Pd )
n= .
log2 (3/4)
By sacrificing n bits from their key Alice and Bob detect Eve with probability Pd .
27
a)
Laser PM D0
PM D1
Alice Bob
b)
Laser PM D0
PM D1
Alice Bob
Figure 10: BB84 using phase encoding in optical fibres setups. a) Extended Mach-Zehnder
setup. b) Collapsed Mach-Zehnder setup. The circles denote delay loops of ∆.
Example:
E14. We analyze the setup shown in Fig. 10a). Alice produces the state |0i, which is turned
into |+i by the BS and the PM √ induces a relative phase φA so that the state which leaves
iφ
the sender is (|0i + e |1i)/ 2. In the ideal case the delay ∆ accumulated between Alice
A
and Bob acts equally on both arms and gives |0i → |0, ∆i, and |1i → |1, ∆i. Since both
arms are equally affected we leave ∆ out in the following. Bob’s PM √ introduces another
relative phase φB so that the state turns into (e iφB iφ
|0i + e |1i)/ 2. The BS turns this
A
state into [(eiφB + eiφA ) |0i + (eiφB − eiφA ) |1i]/2. If Alice chooses φA = 0 (φA = π) and
28
7 D C 6
8 5
A, B, C and D are the O is the central
users of the network O telephone exchange
2 3
1 A B 4
Bob chooses φB = 0 he will get a click in D0 (D1 ) with certainty. If he chooses φB = π/2
a click in each detector is equally likely. If Alice chooses phases φA = π/2 (φA = 3π/2)
and Bob selects φB = π/2 D0 (D1 ) will click with certainty. Otherwise he will get equal
probability for a click in one of the detectors. Thus Alice encodes 0 and 1 in the two
bases by choosing phases 0 and π or π/2 and 3π/2 to use this setup for realizing the
BB84 protocol.
A more practical scheme is realized by collapsing the interferometer as shown in Fig. 10b).
Two pulses are propagating down the single fibre. They are denoted by S (short path, no delay
at the sender side) and L (long path, delay ∆ at the sender side). The delay ∆ is assumed to be
much longer than the duration of the photon wave packet. After traveling through Bob’s part
of the Mach-Zehnder they create three different outputs: SS (which only experiences the delay
between sender and receiver station) and LL (going through the delay lines at sender and receiver
side in addition to the delay of the connecting fibre) are not relevant as they show no interference
effects. SL and LS (going through exactly one of the delay lines at sender and receiver in addition
to the delay of the fibre) are indistinguishable and thus interfere. Experimentally they can be
selected by time gating. The choice of phase shifts by Alice and Bob gives the encoding-decoding
in the SL and LS components exactly as in the previous scheme. This setup is much more stable
since the pulses follow the same path for most of the setup. Any phase fluctuations which
happen on time scales much longer than the delay ∆ will only affect the global phase of the
wave function which is irrelevant. The major drawback of the scheme is that half of the signal
is lost in the SS and LL path. The analysis of this scheme is similar to the analysis presented
for the above setup and left as an exercise. Note that the delay loops ∆ at sender and receiver
are present in one arm only. Their action can thus not be ignored in the analysis.
29
a)
A O B
b)
A C O D B
Figure 12: Speeding up entanglement distribution. a) Entanglement distribution without en-
tanglement swapping. b) Entanglement distribution using an entanglement swapping station.
state by doing a measurement will immediately project their partner particles at the users site
into the same type of entangled state.
Example:
E15. Imagine that all the Bell states
√ are of the type |Φ+ i. A, B and C would like to share
a |GHZi = (|000i + |111i)/ 2 for further quantum communication. If the exchange O
projects the particles 2, 3 and 5 into the GHZ state then we find
+ + +
√
235 hGHZ| ( Φ 12
Φ 34
Φ 56
) = (|000i146 + |111i146 )/ 2.
In this process the quantum telephone exchange provides the communicating parties with
an entangled state and becomes disentangled from all of them. The advantages of this scheme
are that pure Bell states between the users and O can be created by state purification protocols
i.e. using a large number of not maximally entangled state to distil fewer better entangled states.
The preparation of the shared Bell pairs between users and O is independent of the states to be
shared later between the users. The telephone exchange becomes disentangled from the users
and cannot eavesdrop in later communication. The drawback is that the operations to be carried
out by the telephone exchange are difficult to realize.
30
6.5.3 Privacy amplification
Privacy amplification is a purely classical technique to reduce the amount of mutual information
an eavesdropper can gain when distributing an encryption key. It also reduces the number of
message which Alice and Bob can send. The amplification process starts once Alice and Bob
share with high probability an identical reconciled key of length n and know the error rate of
the transmission. They assume that all the errors are due to an eavesdropper Eve. Then they
deduce t, the number of bits by which the key has to be shortened for privacy. Alice picks a
random (n − t) × n binary matrix K and publicly transmits K to Bob. Using K Alice and Bob
obtain the final private key as
kfinal = K · kreconciled
.
While implementing privacy amplification is simple, finding t and proving security is very
difficult. In general one distinguishes between different types of eavesdropping attacks:
• Incoherent attacks: Eve entangles quantum probes with one photon at a time. She then
stores (quantum memory) and measures her probes after Alice and Bob have made their
public announcements.
• Collective attacks: Eve only entangles her probes with one photon but has a quantum
computer to further process her states after the public communication.
• Coherent attacks: Eve can entangle her probe with any dimension of the whole state in
the transmission. She has a quantum computer to process the resulting states at any time
she wishes to do so.
Answers have been provided for more and more powerful attacks but there are still open questions
about the security of quantum communication.
7 Further reading
A comprehensive introduction to quantum computing can be found in 14 . For further details on
quantum communication schemes and Bell inequalities discussed in this manuscript see 15 .
14
Michael A. Nielsen and Isaac L. Chuang, Quantum Computation and Quantum Information, Cambridge
University Press (2000)
15
D. Bouwmeester, A. Ekert, A. Zeilinger, The Physics of Quantum Information, Springer (Berlin) (2000); R.A.
Bertlmann and A. Zeilinger, Quantum [Un]speakables, Springer (Berlin) (2002).
31
Appendix
Schematics and
Experimental setups
• The resulting quantum gate is a phase gate with the truth table
• Kerr nonlinearities χ allow to create a two qubit phase gate where a phase
shift is induced if two photons are travelling a distance L in the Kerr
medium. The resulting entanglement phase is
Qubit 1:
Qubit 2:
eiφ
H φ H
• Measure a qubit
α β
1 2
D1a D2a
EPR source
D1b D2b
• The pairs are emitted in either modes a1, b2 or in modes a2, b1.
• Before the beam splitters we thus have the entangled state
coincidence detection
at DA and DB
• Experimental setup
• Atomic cascade
0.25 0.25
3fold coinc. prob.
a) b)
0 0
0 0
Thursday, 30 April 2009 delay delay 22
5.1 Quantum teleportation: Experimental results
• Experimental results for a 45◦ and 90◦ photon state
Alice:
Bob: