Highlight

Quantum register based on coupled electron spins in a room-temperature solid

Devices that harness the laws of quantum physics hold the promise for information processing that outperforms their classical counterparts, and for unconditionally secure communication. However, in particular, implementations based on condensed-matter systems face the challenge of short coherence times. Carbon materials, particularly diamond however, are suitable for hosting robust solid-state quantum registers, owing to their spin-free lattice and weak spin–orbit coupling. In this paper J.

Perfect Microwave Photodetection in Circuit QED

In this work, the SOLID researchers G. Johannsson, C. M. Wilson and E. Solano propose a microwave photon detector that successfully reaches 100% efficiency with only one absorber. Their design consists of a metastable quantum circuit coupled to a semi-infinite transmission line that performs highly efficient photodetection in a simplified manner as compared to previous proposals.

General framework for estimating the ultimate precision limit in noisy quantum-enhanced metrology

Date: 
2011-03-26
Author(s): 

B. M. Escher, R. L. de Matos Filho & L. Davidovich

Reference: 

Nature Physics 7, 406–411 (2011), doi:10.1038/nphys1958

The estimation of parameters characterizing dynamical processes is central to science and technology. The estimation error changes with the number N of resources employed in the experiment (which could quantify, for instance, the number of probes or the probing energy). Typically, it scales as . Quantum strategies may improve the precision, for noiseless processes, by an extra factor . For noisy processes, it is not known in general if and when this improvement can be achieved.

Secure device-independent quantum key distribution with causally independent measurement devices

Date: 
2011-03-15
Author(s): 

Lluís Masanes, Stefano Pironio & Antonio Acín

Reference: 

Nature Communications 2, Article number: 238, doi:10.1038/ncomms1244

Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the security of which is based on the laws of quantum physics, but which does not require any assumptions about the internal working of the devices used in the protocol. This strong form of security is possible only when using correlations that violate a Bell inequality. Here, we provide a general security proof for a large class of protocols in a model in which the raw key is generated by independent measurements.

Quantum Metropolis sampling

Date: 
2011-03-02
Author(s): 

K. Temme, T. J. Osborne, K. G. Vollbrecht, D. Poulin & F. Verstraete

Reference: 

Nature 471, 87–90 (03 March 2011), doi:10.1038/nature09770

Metropolis algorithm is the standard method for the simulation of interacting particles on classical computers. In this work, the authors demonstrate how to implement a quantum version of the Metropolis algorithm on a quantum computer. This algorithm permits to sample directly from the eigenstates of the Hamiltonian and thus evades the sign problem present in classical simulations. A small scale implementation of this algorithm can already be achieved with today's technology.

Permutationally Invariant Quantum Tomography

Date: 
2010-12-16
Reference: 

G. Tóth, W. Wieczorek, D. Gross, R. Krischek, C. Schwemmer, and H. Weinfurter
Phys. Rev. Lett. 105, 250403 (2010)
http://link.aps.org/doi/10.1103/PhysRevLett.105.250403

We present a scalable method for the tomography of large multiqubit quantum registers. It acquires information about the permutationally invariant part of the density operator, which is a good approximation to the true state in many relevant cases. Our method gives the best measurement strategy to minimize the experimental effort as well as the uncertainties of the reconstructed density matrix. We apply our method to the experimental tomography of a photonic four-qubit symmetric Dicke state.

 

Quantum memory for entangled continuous-variable states

Date: 
2010-11-07
Reference: 

K. Jensen, W. Wasilewski, H. Krauter, T. Fernholz, B. M. Nielsen, M. Owari, M. B. Plenio, A. Serafini, M. M. Wolf and E. S. Polzik
Nature Physics Vol. 7, 13–16 (2011)
doi:10.1038/nphys1819

Direct generation of photon triplets using cascaded photon-pair sources

Date: 
2010-07-29
Reference: 

Hannes Hübel, Deny R. Hamel, Alessandro Fedrizzi, Sven Ramelow, Kevin J. Resch and Thomas Jennewein
Nature Vol. 466, 601–603 (2010)
doi:10.1038/nature09175

Experimental Extraction of Secure Correlations from a Noisy Private State

Date: 
2011-01-18
Reference: 

K. Dobek, M. Karpiński, R. Demkowicz-Dobrzański, K. Banaszek, and P. Horodecki
Phys. Rev. Lett. 106, 030501 (2011)
http://link.aps.org/doi/10.1103/PhysRevLett.106.030501

We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies to extract the key is exposed by an implementation of an entanglement distillation protocol for the produced state.

Efficient quantum state tomography

Date: 
2010-12-21
Author(s): 

Marcus Cramer, Martin B. Plenio, Steven T. Flammia, Rolando Somma, David Gross, Stephen D. Bartlett, Olivier Landon-Cardinal, David Poulin and Yi-Kai Liu

Reference: 

Nat. Commun. 1, 149 (2010)
doi:10.1038/ncomms1147

Quantum state tomography—deducing quantum states from measured data—is the gold standard for verification and benchmarking of quantum devices. It has been realized in systems with few components, but for larger systems it becomes unfeasible because the number of measurements and the amount of computation required to process them grows exponentially in the system size. Here, we present two tomography schemes that scale much more favourably than direct tomography with system size.

Syndicate content