Quantum communication and quantum computation are novel methods of information transfer and infor... more Quantum communication and quantum computation are novel methods of information transfer and information processing, all fundamentally based on the principles of quantum physics. The performances outdo their classical counterparts in many aspects [1,2]. In almost all quantum communication and quantum computation schemes, quantum entanglement [3] plays a decisive role. In essence, an entangled system can carry all information (e.g., on their polarization properties) only in their correlations, while no individual subsystem carries any information. This leads to correlations that are much stronger than classically allowed [89, 100], which is a powerful resource for information processing. It is therefore important to be able to generate, manipulate, and distribute entanglement as accurately and as efficiently as possible.
We have applied an entanglement purification protocol to produce a single entangled pair of photo... more We have applied an entanglement purification protocol to produce a single entangled pair of photons capable of violating a Clauser-Horne-Shimony-Holt Bell inequality from two pairs that individually could not. The initial poorly entangled photons were created by a controllable decoherence that introduced complex errors. All of the states were reconstructed using quantum state tomography which allowed for a quantitative description of the improvement of the state after purification.
In this Letter, we present a cosmic Bell experiment with polarization-entangled photons, in which... more In this Letter, we present a cosmic Bell experiment with polarization-entangled photons, in which measurement settings were determined based on real-time measurements of the wavelength of photons from high-redshift quasars, whose light was emitted billions of years ago; the experiment simultaneously ensures locality. Assuming fair sampling for all detected photons and that the wavelength of the quasar photons had not been selectively altered or previewed between emission and detection, we observe statistically significant violation of Bell's inequality by 9.3 standard deviations, corresponding to an estimated p value of ≲7.4×10^{-21}. This experiment pushes back to at least ∼7.8 Gyr ago the most recent time by which any local-realist influences could have exploited the "freedom-of-choice" loophole to engineer the observed Bell violation, excluding any such mechanism from 96% of the space-time volume of the past light cone of our experiment, extending from the big bang...
Proceedings of the National Academy of Sciences of the United States of America, Feb 6, 2018
How useful can machine learning be in a quantum laboratory? Here we raise the question of the pot... more How useful can machine learning be in a quantum laboratory? Here we raise the question of the potential of intelligent machines in the context of scientific research. A major motivation for the present work is the unknown reachability of various entanglement classes in quantum experiments. We investigate this question by using the projective simulation model, a physics-oriented approach to artificial intelligence. In our approach, the projective simulation system is challenged to design complex photonic quantum experiments that produce high-dimensional entangled multiphoton states, which are of high interest in modern quantum experiments. The artificial intelligence system learns to create a variety of entangled states and improves the efficiency of their realization. In the process, the system autonomously (re)discovers experimental techniques which are only now becoming standard in modern quantum optical experiments-a trait which was not explicitly demanded from the system but eme...
We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ... more We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ∼kHz rate per passage of the satellite Micius over a ground station. The satellite thus establishes a secure key between itself and, say, Xinglong, and another key between itself and, say, Graz. Then, upon request from the ground command, Micius acts as a trusted relay. It performs bitwise exclusive or operations between the two keys and relays the result to one of the ground stations. That way, a secret key is created between China and Europe at locations separated by 7600 km on Earth. These keys are then used for intercontinental quantum-secured communication. This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China. Also, a video conference was performed between the Austrian Academy of Sciences ...
We report a measurement of the transverse momentum correlation between two photons by detecting o... more We report a measurement of the transverse momentum correlation between two photons by detecting only one of them. Our method uses two identical sources in an arrangement in which the phenomenon of induced coherence without induced emission is observed. In this way, we produce an interference pattern in the superposition of one beam from each source. We quantify the transverse momentum correlation by analyzing the visibility of this pattern. Our approach might be useful for the characterization of correlated photon pair sources and may lead to an experimental measure of continuous variable entanglement, which relies on the detection of only one of two entangled particles.
Quantum communication and quantum computation are novel methods of information transfer and infor... more Quantum communication and quantum computation are novel methods of information transfer and information processing, all fundamentally based on the principles of quantum physics. The performances outdo their classical counterparts in many aspects [1,2]. In almost all quantum communication and quantum computation schemes, quantum entanglement [3] plays a decisive role. In essence, an entangled system can carry all information (e.g., on their polarization properties) only in their correlations, while no individual subsystem carries any information. This leads to correlations that are much stronger than classically allowed [89, 100], which is a powerful resource for information processing. It is therefore important to be able to generate, manipulate, and distribute entanglement as accurately and as efficiently as possible.
We have applied an entanglement purification protocol to produce a single entangled pair of photo... more We have applied an entanglement purification protocol to produce a single entangled pair of photons capable of violating a Clauser-Horne-Shimony-Holt Bell inequality from two pairs that individually could not. The initial poorly entangled photons were created by a controllable decoherence that introduced complex errors. All of the states were reconstructed using quantum state tomography which allowed for a quantitative description of the improvement of the state after purification.
In this Letter, we present a cosmic Bell experiment with polarization-entangled photons, in which... more In this Letter, we present a cosmic Bell experiment with polarization-entangled photons, in which measurement settings were determined based on real-time measurements of the wavelength of photons from high-redshift quasars, whose light was emitted billions of years ago; the experiment simultaneously ensures locality. Assuming fair sampling for all detected photons and that the wavelength of the quasar photons had not been selectively altered or previewed between emission and detection, we observe statistically significant violation of Bell's inequality by 9.3 standard deviations, corresponding to an estimated p value of ≲7.4×10^{-21}. This experiment pushes back to at least ∼7.8 Gyr ago the most recent time by which any local-realist influences could have exploited the "freedom-of-choice" loophole to engineer the observed Bell violation, excluding any such mechanism from 96% of the space-time volume of the past light cone of our experiment, extending from the big bang...
Proceedings of the National Academy of Sciences of the United States of America, Feb 6, 2018
How useful can machine learning be in a quantum laboratory? Here we raise the question of the pot... more How useful can machine learning be in a quantum laboratory? Here we raise the question of the potential of intelligent machines in the context of scientific research. A major motivation for the present work is the unknown reachability of various entanglement classes in quantum experiments. We investigate this question by using the projective simulation model, a physics-oriented approach to artificial intelligence. In our approach, the projective simulation system is challenged to design complex photonic quantum experiments that produce high-dimensional entangled multiphoton states, which are of high interest in modern quantum experiments. The artificial intelligence system learns to create a variety of entangled states and improves the efficiency of their realization. In the process, the system autonomously (re)discovers experimental techniques which are only now becoming standard in modern quantum optical experiments-a trait which was not explicitly demanded from the system but eme...
We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ... more We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ∼kHz rate per passage of the satellite Micius over a ground station. The satellite thus establishes a secure key between itself and, say, Xinglong, and another key between itself and, say, Graz. Then, upon request from the ground command, Micius acts as a trusted relay. It performs bitwise exclusive or operations between the two keys and relays the result to one of the ground stations. That way, a secret key is created between China and Europe at locations separated by 7600 km on Earth. These keys are then used for intercontinental quantum-secured communication. This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China. Also, a video conference was performed between the Austrian Academy of Sciences ...
We report a measurement of the transverse momentum correlation between two photons by detecting o... more We report a measurement of the transverse momentum correlation between two photons by detecting only one of them. Our method uses two identical sources in an arrangement in which the phenomenon of induced coherence without induced emission is observed. In this way, we produce an interference pattern in the superposition of one beam from each source. We quantify the transverse momentum correlation by analyzing the visibility of this pattern. Our approach might be useful for the characterization of correlated photon pair sources and may lead to an experimental measure of continuous variable entanglement, which relies on the detection of only one of two entangled particles.
Uploads