ﻻ يوجد ملخص باللغة العربية
We present a quantum repeater protocol using atomic ensembles, linear optics and single-photon sources. Two local polarization entangled states of atomic ensembles $u$ and $d$ are generated by absorbing a single photon emitted by an on-demand single-photon sources, based on which high-fidelity local entanglement between four ensembles can be established efficiently through Bell-state measurement. Entanglement in basic links and entanglement connection between links are carried out by the use of two-photon interference. In addition to being robust against phase fluctuations in the quantum channels, this scheme may speed up quantum communication with higher fidelity by about 2 orders of magnitude for 1280 km compared with the partial read (PR) protocol (Sangouard {it et al.}, Phys. Rev. A {bf77}, 062301 (2008)) which may generate entanglement most quickly among the previous schemes with the same ingredients.
We discuss the application of dipole blockade techniques for the preparation of single atom and single photon sources. A deterministic protocol is given for loading a single atom in an optical trap as well as ejecting a controlled number of atoms in
We illustrate the existence of single-excitation bound states for propagating photons interacting with $N$ two-level atoms. These bound states can be calculated from an effective spin model, and their existence relies on dissipation in the system. Th
We propose and analyze a new method to produce single and entangled photons which does not require cavities. It relies on the collective enhancement of light emission as a consequence of the presence of entanglement in atomic ensembles. Light emissio
Atomic ensembles, comprising clouds of atoms addressed by laser fields, provide an attractive system for both the storage of quantum information, and the coherent conversion of quantum information between atomic and optical degrees of freedom. In a l
Device-independent quantum key distribution protocols allow two honest users to establish a secret key with minimal levels of trust on the provider, as security is proven without any assumption on the inner working of the devices used for the distrib