ترغب بنشر مسار تعليمي؟ اضغط هنا

A three-slit ghost interference experiment with entangled photons is theoretically analyzed using wave-packet dynamics. A non-local duality relation is derived which connects the path distinguishability of one photon to the interference visibility of the other.
We propose and analyze a modified ghost-interference experiment, and show that revealing the particle-nature of a particle passing through a double-slit hides the wave-nature of a spatially separated particle which it is entangled with. We derive a n onlocal duality relation, ${mathcal D}_1^2 + {mathcal V}_2^2 le 1$, which connects the path distinguishability of one particle to the interference visibility of the other. It extends Bohrs principle of complementarity to a nonlocal scenario. We also propose a ghost quantum eraser in which, erasing the which-path information of one particle brings back the interference fringes of the other.
The issue of interference and which-way information is addressed in the context of 3-slit interference experiments. A new path distinguishability ${mathcal D_Q}$ is introduced, based on Unambiguous Quantum State Discrimination (UQSD). An inequality c onnecting the interference visibility and path distinguishability, ${mathcal V} + {2{mathcal D_Q}over 3- {mathcal D_Q}} le 1$, is derived which puts a bound on how much fringe visibility and which-way information can be simultaneously obtained. It is argued that this bound is tight. For 2-slit interference, we derive a new duality relation which reduces to Englerts duality relation and Greenberger-Yasins duality relation, in different limits.
We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decid es which qubit to use for which key. The auxiliary key has to be added to Bobs secure key in order to match Alices secure key. This scheme provides an additional layer of security over the standard BB84 protocol.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا