Spelling suggestions: "subject:"[een] QUANTUM OPTICS"" "subject:"[enn] QUANTUM OPTICS""
61 |
Photonic microcells for quantum optics applicationsLight, Philip Stephen January 2008 (has links)
This thesis presents the development of photonic microcells for use as the host for coherent optics phenomena and related applications. A photonic microcell consists of a length of hollow-core photonic crystal fibre (HC-PCF) with a gas-filled core that is spliced to conventional optical fibre at either end to seal the gas within the fibre. Towards the goal of demonstrating and assessing the coherence properties of quantum optical effects in photonic microcells, the fabrication of two types of HC-PCF is presented. The established photonic bandgap HC-PCF offers extremely low transmission loss of ~10 dB/km over kilometre distances. However, the fibre has a limited transmission bandwidth of ~50 THz and exhibits modal coupling unfavourable for many applications. Work is presented on the tailoring of this fibre by control and shaping of the core-surround in order to improve its modal properties. A second type of HC-PCF is based on a large-pitch lattice, whose guidance relies on a new mechanism. This fibre exhibits a much improved bandwidth (>1000 THz) and has a relatively higher but still practical loss of ~1 dB/m. The development of photonic microcells at microbar pressure level and with low optical insertion loss is shown, an important step in the improvement of the technology for coherent optics applications which will take advantage of the extreme gas-laser interaction efficiency achieved in HC-PCF. Finally, quantum optical effects are demonstrated in HC-PCF and photonic microcells loaded with both the molecular gas acetylene and atomic vapour rubidium. The observation of electromagnetically induced transparency (EIT) in acetylene-filled HC-PCF represents the first such observation in a molecular gas, while the use of a photonic microcell allows a comparison of many experimental configurations to explore the coherence properties of coherent optical systems in the core of a HC-PCF. Furthermore, EIT is observed unambiguously in a rubidium loaded HC-PCF for the first time, and the anti-relaxation effects of a polymer coating demonstrated in this configuration.
|
62 |
Engineering photonic entanglement and its practical applicationsFraine, Andrew 08 April 2016 (has links)
The quantum description of light offers a unique set of optical effects that has led to promising applications beyond those described by classical physics. Although well-defined quantum states of light do not persist in typical classical environments, phenomena such as entanglement often enhance optical approaches to communication, measurement, and sensing. With the emergence of new tasks in classical and quantum optical technology, new tools are required that must be specifically engineered including the generation of quantum states. This thesis is concerned with three principle tasks in engineering and implementing entangled photonic states. First, the use of frequency anti-correlated and polarization entangled two-photon states generated during spontaneous parametric down conversion (SPDC) to precisely evaluate optical delays with quantum interferometry is demonstrated in a realistic commercially available optical telecommunication device. Second, the study of correlated orbital angular momentum (OAM) states for efficient object identification is presented. Finally, experimental efforts towards the development of sources for entangled weak coherent states are discussed.
The generation of broadband entangled states leading to well-defined second order interference patterns is a necessary step for the application of low coherence quantum interferometry as a metrological device. The flexibility of non-uniformly chirped periodically poled nonlinear crystals offers a rich set of tools for precise state engineering. The experimental evaluation of a broadband source of polarization entanglement is presented. In addition, design considerations for applications that require optimized quantum interference features are discussed along with a numerical investigation of the limits of quantum interferometry with even order dispersion cancellation.
We present an experimental demonstration of correlated OAM sensing exploiting the two-dimensional and correlated nature of states produced during SPDC projected onto the OAM basis. Efficient object recognition through the identification of azimuthal symmetries of arbitrary objects is achieved by observing the full two-photon joint OAM spectrum and focusing on non-conserved OAM components not found in the natural OAM spectrum of SPDC.
Finally, quantum key distribution (QKD) is currently the most successful quantum optical application; however, a limiting trade off between the achievable rates and distances confines the approach to niche applications. The generation of entangled coherent states has been proposed to transition QKD into a new regime that would set aside single photons and two-photon entangled states for higher intensity coherent pulses. The key technical limitation that has prohibited the demonstration of such states is a reliable source of single-photon cross phase modulation. The plausibility and experimental efforts towards creating such an environment in a solid state device is presented.
|
63 |
New wave functional materials: gradons and their implication in nano-optics. / 新型调波功能材料: 梯度子及其在纳米光学中的应用 / CUHK electronic theses & dissertations collection / New wave functional materials: gradons and their implication in nano-optics. / Xin xing diao bo gong neng cai liao: Ti du zi ji qi zai na mi guang xue zhong de ying yongJanuary 2006 (has links)
In this thesis, we will discuss the possibility of wave manipulation by graded materials and/or systems. In contrast to the traditional inhomogeneous media, i.e. periodically modulated system and randomly disordered system, graded system demonstrates a unique way to control wave, resulting in a new type of localization-delocalization transition, which can confine the primary excitations (e.g., photons, phonons, and surface plasmons) and redistribute them spatially. This is not only of fundamental significance, but will also pave new avenue for various applications, for example, in surface elastic waves, nanooptics, and plasmonics. It also has implications with practical problems in industry such as oil probing and earthquake study. / Manipulating waves (e.g., elastic or electromagnetic) inside nanostructures has attracted ever increasing interest over the past decades due to the rapid advancement of nanofabrication techniques. Particularly, interactions of light with structures modulated at the wavelength or subwavelength scale offer an opportunity to achieve novel properties and designated functionalities in nanophotonics. Notable examples include photonic crystals, various metamaterials, and plasmonic devices. / Moreover, we consider to combine the novel properties of gradons and surface plasmons (SPs), in an attempt to explore new mechanisms to manipulate SP. Firstly, we study an incrementally-spaced nanoparticle chain waveguide, in which coupled plasmon waves show a localization-delocalization transition, in analogy to the elastic gradons. Secondly, we propose waveguides using periodic plasmonic chains immersed in a graded host which can sustain "light", "heavy", and "light-heavy" plasmonic gradons. Existence of tunable passband is demonstrated in these systems. / Thus, in view of the success, we discuss many potential applications in plasmonics, such as junctions, transistors, and even on-chip integrated plasmonic-dielectric devices. In this regard, we further study the most commonly used coplanar photonic elements, i.e., ring resonators and their integrated devices. To explore the interactions between various gradons and typical excitations would be very interesting and rewarding. Our findings have important ramifications for understanding excitations with transition spectra in many condensed matter systems, ranging from ultrasonic waves, seismic waves to light waves, microwaves, as well as quantum waves. / We started with one-dimensional graded networks of coupled harmonic oscillators. By examining the vibrational mode characteristics, we have identified a new kind of vibrational excitations, which are named "gradons". The features of elastic gradon are elab orated. Gradon localization is also different from well-known mechanisms of localization transition, such as defect(s) and Anderson-type localization. Gradons in higher dimensional graded elastic networks show more intriguing behaviors; we proved the existence of "soft", "hard", and "soft-hard" gradons in two dimensional cases. / Xiao Junjun = 新型调波功能材料 : 梯度子及其在纳米光学中的应用 / 肖君军. / "May 2006." / Adviser: Kin Wah Yu. / Source: Dissertation Abstracts International, Volume: 68-03, Section: B, page: 1694. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (p. 108-118). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307. / Xiao Junjun = Xin xing diao bo gong neng cai liao : ti du zi ji qi zai na mi guang xue zhong de ying yong / Xiao Junjun.
|
64 |
Fast Classical Simulation of Linear Quantum Optics Applied to Topics in Quantum Communication and ComputationJanuary 2018 (has links)
acase@tulane.edu / In this dissertation we test our ability to implement linear entangling operations between small numbers of photons for application in quantum communication and computation. We begin by presenting a fast and highly parallelizable numerical algorithm for simulating linear optical circuits on classical hardware. Then, we apply this algorithm to three independent topics in quantum information:
First, in Chapter 2, we determine the information capacity of an optical quantum channel and show that a linear encoding is generally sufficient to achieve this capacity.
In Chapter 3 we introduce a computational encoding basis wherein qubits are stored in single-photon blocks and then test our ability to apply entangling operations between blocks.
Finally, in Chapter 4, we use our algorithm to make progress in the long-standing problem of designing a near-perfect optical Bell state analyzer. We find a clear trend in state distinguishability as we incorporate unentangled pairs of ancilla photons. We also prove that if a measurement outcome in which all photons are bunched into only two output modes is possible, then perfect state discrimination is impossible. We then present a set of conditions that prevent this outcome. / 1 / Jake A Smith
|
65 |
Quantum Cryptography in Rreal-life Applications: Assumptions and SecurityZhao, Yi 03 March 2010 (has links)
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure communication. The security is in principle based on the fundamental laws of physics. Security proofs show that if quantum cryptography is appropriately implemented, even the most
powerful eavesdropper cannot decrypt the message from a cipher.
The implementations of quantum crypto-systems in real life may not fully comply with the assumptions made in the security proofs. Such discrepancy between the experiment and the theory can be fatal to the
security of a QKD system. In this thesis we address a number of these discrepancies.
A perfect single-photon source is often assumed in many security proofs. However, a weak coherent source is widely used in a real-life QKD implementation. Decoy state protocols have been proposed as a novel
approach to dramatically improve the performance of a weak coherent source based QKD implementation without jeopardizing its security. Here, we present the first experimental demonstrations of decoy state
protocols. Our experimental scheme was later adopted by most decoy state QKD implementations.
In the security proof of decoy state protocols as well as many other QKD protocols, it is widely assumed that a sender generates a phase-randomized coherent state. This assumption has been enforced in few implementations. We close this gap in two steps: First, we implement and verify the phase randomization experimentally;
second, we prove the security of a QKD implementation without the coherent state assumption.
In many security proofs of QKD, it is assumed that all the detectors on the receiver's side have identical detection efficiencies. We show experimentally that this assumption may be violated in a
commercial QKD implementation due to an eavesdropper's malicious manipulation. Moreover, we show that the eavesdropper can learn part of the final key shared by the legitimate users as a consequence of this violation of the assumptions.
|
66 |
Quantum Cryptography in Rreal-life Applications: Assumptions and SecurityZhao, Yi 03 March 2010 (has links)
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure communication. The security is in principle based on the fundamental laws of physics. Security proofs show that if quantum cryptography is appropriately implemented, even the most
powerful eavesdropper cannot decrypt the message from a cipher.
The implementations of quantum crypto-systems in real life may not fully comply with the assumptions made in the security proofs. Such discrepancy between the experiment and the theory can be fatal to the
security of a QKD system. In this thesis we address a number of these discrepancies.
A perfect single-photon source is often assumed in many security proofs. However, a weak coherent source is widely used in a real-life QKD implementation. Decoy state protocols have been proposed as a novel
approach to dramatically improve the performance of a weak coherent source based QKD implementation without jeopardizing its security. Here, we present the first experimental demonstrations of decoy state
protocols. Our experimental scheme was later adopted by most decoy state QKD implementations.
In the security proof of decoy state protocols as well as many other QKD protocols, it is widely assumed that a sender generates a phase-randomized coherent state. This assumption has been enforced in few implementations. We close this gap in two steps: First, we implement and verify the phase randomization experimentally;
second, we prove the security of a QKD implementation without the coherent state assumption.
In many security proofs of QKD, it is assumed that all the detectors on the receiver's side have identical detection efficiencies. We show experimentally that this assumption may be violated in a
commercial QKD implementation due to an eavesdropper's malicious manipulation. Moreover, we show that the eavesdropper can learn part of the final key shared by the legitimate users as a consequence of this violation of the assumptions.
|
67 |
On Free Space Quantum Key Distribution and its Implementation with a Polarization-Entangled Parametric Down Conversion SourceErven, Chris 25 April 2007 (has links)
This thesis describes the deployment of a free-space quantum key
distribution system across the University of Waterloo campus. The
quantum key distribution system has the ability to provide
unconditionally secure communication between two parties: Alice and
Bob. The system exploits the quantum mechanical property of
entanglement in order to generate a key. Security is then guaranteed
by the No-Cloning theorem and the laws of quantum mechanics which
prevent a quantum system from being measured without disturbing it.
Polarization-entangled photon pairs are created using the non-linear
optical process of type-II spontaneous parametric down-conversion. A
free-space link of approximately $\mathrm{580~m}$ is used to
distribute one-half of the pairs to Alice at a distant location,
while the other half of the pairs are locally detected by Bob. The
details of the detection apparatus necessary to measure the
polarization of the photons and the software used to process the
measurement data according to the BBM92 protocol are described. An
experimental violation of the CHSH inequality (a derivative of the
original Bell inequality) is demonstrated to show that
polarization-entangled photon pairs are in fact being distributed to
the two parties. Finally, the full BBM92 protocol is performed using
the entangled photon pairs to generate a secure key and transmit an
encrypted message between Alice and Bob. Currently, the system can
only be operated at night because background light saturates the
detectors during the day; however, future work will focus on making
daylight operation feasible.
|
68 |
Experiments with Generalized Quantum Measurements and Entangled Photon PairsBiggerstaff, Devon January 2009 (has links)
This thesis describes a linear-optical device for performing generalized quantum measurements
on quantum bits (qubits) encoded in photon polarization, the implementation
of said device, and its use in two diff erent but related experiments. The device works by
coupling the polarization degree of freedom of a single photon to a `mode' or `path' degree
of freedom, and performing a projective measurement in this enlarged state space in order
to implement a tunable four-outcome positive operator-valued measure (POVM) on the
initial quantum bit. In both experiments, this POVM is performed on one photon from a
two-photon entangled state created through spontaneous parametric down-conversion.
In the fi rst experiment, this entangled state is viewed as a two-qubit photonic cluster
state, and the POVM as a means of increasing the computational power of a given resource
state in the cluster-state model of quantum computing. This model traditionally
achieves deterministic outputs to quantum computations via successive projective measurements,
along with classical feedforward to choose measurement bases, on qubits in a highly entangled
resource called a cluster state; we show that `virtual qubits' can be appended to a
given cluster by replacing some projective measurements with POVMs. Our experimental
demonstration fully realizes an arbitrary three-qubit cluster computation by implementing
the POVM, as well as fast active feed-forward, on our two-qubit photonic cluster state.
Over 206 diff erent computations, the average output delity is 0.9832 +/- 0.0002; furthermore
the error contribution from our POVM device and feedforward is only of order 10^-3, less
than some recent thresholds for fault-tolerant cluster computing.
In the second experiment, the POVM device is used to implement a deterministic
protocol for remote state preparation (RSP) of arbitrary photon polarization qubits. RSP
is the act of preparing a quantum state at a remote location without actually transmitting
the state itself. We are able to remotely prepare 178 diff erent pure and mixed qubit
states with an average delity of 0.995. Furthermore, we study the the fidelity achievable
by RSP protocols permitting only classical communication, without shared entanglement,
and compare the resulting benchmarks for average fidelity against our experimental results.
Our experimentally-achieved average fi delities surpass the classical thresholds whenever
classical communication alone does not trivially allow for perfect RSP.
|
69 |
On Free Space Quantum Key Distribution and its Implementation with a Polarization-Entangled Parametric Down Conversion SourceErven, Chris 25 April 2007 (has links)
This thesis describes the deployment of a free-space quantum key
distribution system across the University of Waterloo campus. The
quantum key distribution system has the ability to provide
unconditionally secure communication between two parties: Alice and
Bob. The system exploits the quantum mechanical property of
entanglement in order to generate a key. Security is then guaranteed
by the No-Cloning theorem and the laws of quantum mechanics which
prevent a quantum system from being measured without disturbing it.
Polarization-entangled photon pairs are created using the non-linear
optical process of type-II spontaneous parametric down-conversion. A
free-space link of approximately $\mathrm{580~m}$ is used to
distribute one-half of the pairs to Alice at a distant location,
while the other half of the pairs are locally detected by Bob. The
details of the detection apparatus necessary to measure the
polarization of the photons and the software used to process the
measurement data according to the BBM92 protocol are described. An
experimental violation of the CHSH inequality (a derivative of the
original Bell inequality) is demonstrated to show that
polarization-entangled photon pairs are in fact being distributed to
the two parties. Finally, the full BBM92 protocol is performed using
the entangled photon pairs to generate a secure key and transmit an
encrypted message between Alice and Bob. Currently, the system can
only be operated at night because background light saturates the
detectors during the day; however, future work will focus on making
daylight operation feasible.
|
70 |
Experiments with Generalized Quantum Measurements and Entangled Photon PairsBiggerstaff, Devon January 2009 (has links)
This thesis describes a linear-optical device for performing generalized quantum measurements
on quantum bits (qubits) encoded in photon polarization, the implementation
of said device, and its use in two diff erent but related experiments. The device works by
coupling the polarization degree of freedom of a single photon to a `mode' or `path' degree
of freedom, and performing a projective measurement in this enlarged state space in order
to implement a tunable four-outcome positive operator-valued measure (POVM) on the
initial quantum bit. In both experiments, this POVM is performed on one photon from a
two-photon entangled state created through spontaneous parametric down-conversion.
In the fi rst experiment, this entangled state is viewed as a two-qubit photonic cluster
state, and the POVM as a means of increasing the computational power of a given resource
state in the cluster-state model of quantum computing. This model traditionally
achieves deterministic outputs to quantum computations via successive projective measurements,
along with classical feedforward to choose measurement bases, on qubits in a highly entangled
resource called a cluster state; we show that `virtual qubits' can be appended to a
given cluster by replacing some projective measurements with POVMs. Our experimental
demonstration fully realizes an arbitrary three-qubit cluster computation by implementing
the POVM, as well as fast active feed-forward, on our two-qubit photonic cluster state.
Over 206 diff erent computations, the average output delity is 0.9832 +/- 0.0002; furthermore
the error contribution from our POVM device and feedforward is only of order 10^-3, less
than some recent thresholds for fault-tolerant cluster computing.
In the second experiment, the POVM device is used to implement a deterministic
protocol for remote state preparation (RSP) of arbitrary photon polarization qubits. RSP
is the act of preparing a quantum state at a remote location without actually transmitting
the state itself. We are able to remotely prepare 178 diff erent pure and mixed qubit
states with an average delity of 0.995. Furthermore, we study the the fidelity achievable
by RSP protocols permitting only classical communication, without shared entanglement,
and compare the resulting benchmarks for average fidelity against our experimental results.
Our experimentally-achieved average fi delities surpass the classical thresholds whenever
classical communication alone does not trivially allow for perfect RSP.
|
Page generated in 0.037 seconds