ترغب بنشر مسار تعليمي؟ اضغط هنا

The time distribution of quantum events

55   0   0.0 ( 0 )
 نشر من قبل Hrvoje Nikolic
 تاريخ النشر 2020
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

We develop a general theory of the time distribution of quantum events, applicable to a large class of problems such as arrival time, dwell time and tunneling time. A stopwatch ticks until an awaited event is detected, at which time the stopwatch stops. The awaited event is represented by a projection operator $pi$, while the ideal stopwatch is modeled as a series of projective measurements at which the quantum state gets projected with either $bar{pi}=1-pi$ (when the awaited event does not happen) or $pi$ (when the awaited event eventually happens). In the approximation in which the time $delta t$ between the subsequent measurements is sufficiently small (but not zero!), we find a fairly simple general formula for the time distribution ${cal P}(t)$, representing the probability density that the awaited event will be detected at time $t$.



قيم البحث

اقرأ أيضاً

The phase space of a relativistic system can be identified with the future tube of complexified Minkowski space. As well as a complex structure and a symplectic structure, the future tube, seen as an eight-dimensional real manifold, is endowed with a natural positive-definite Riemannian metric that accommodates the underlying geometry of the indefinite Minkowski space metric, together with its symmetry group. A unitary representation of the 15-parameter group of conformal transformations can then be constructed that acts upon the Hilbert space of square-integrable holomorphic functions on the future tube. These structures are enough to allow one to put forward a quantum theory of phase-space events. In particular, a theory of quantum measurement can be formulated in a relativistic setting, based on the use of positive operator valued measures, for the detection of phase-space events, hence allowing one to assign probabilities to the outcomes of joint space-time and four-momentum measurements in a manifestly covariant framework. This leads to a localization theorem for phase-space events in relativistic quantum theory, determined by the associated Compton wavelength.
We apply the recently developed general theory of quantum time distributions arXiv:2010.07575 to find the distribution of arrival times at the detector. Even though the Hamiltonian in the absence of detector is hermitian, the time evolution of the sy stem before detection involves dealing with a non-hermitian operator obtained from the projection of the hermitian Hamiltonian onto the region in front of the detector. Such a formalism eventually gives rise to a simple and physically sensible analytical expression for the arrival time distribution, for arbitrary wave packet moving in one spatial dimension with negligible distortion.
We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. When using low-noise superconducting single photon detectors, secure distances over 200 km can be foreseen. Finally, we analyse the consequences of photon-number splitting attacks when faint pulses are used instead of single photon pulses. A decoy states technique can be used to prevent such attacks.
We have implemented an experimental set-up in order to demonstrate the feasibility of time-coding protocols for quantum key distribution. Alice produces coherent 20 ns faint pulses of light at 853 nm. They are sent to Bob with delay 0 ns (encoding bi t 0) or 10 ns (encoding bit 1). Bob directs at random the received pulses to two different arms. In the first one, a 300 ps resolution Si photon-counter allows Bob to precisely measure the detection times of each photon in order to establish the key. Comparing them with the emission times of the pulses sent by Alice allows to evaluate the quantum bit error rate (QBER). The minimum obtained QBER is 1.62 %. The possible loss of coherence in the set-up can be exploited by Eve to eavesdrop the line. Therefore, the second arm of Bob set-up is a Mach-Zender interferometer with a 10 ns propagation delay between the two path. Contrast measurement of the output beams allows to measure the autocorrelation function of the received pulses that characterizes their average coherence. In the case of an ideal set-up, the value expected with the pulses sent by Alice is 0.576. The experimental value of the pulses autocorrelation function is found to be 0.541. Knowing the resulting loss of coherence and the measured QBER, one can evaluate the mutual information between Alice and Eve and the mutual information between Alice and Bob, in the case of intercept-resend attacks and in the case of attacks with intrication. With our values, Bob has an advantage on Eve of 0.43 bit per pulse. The maximum possible QBER corresponding to equal informations for Bob and Eve is 5.8 %. With the usual attenuation of fibres at 850 nm, it shows that secure key distribution is possible up to a distance of 2.75 km, which is sufficient for local links.
Time coding quantum key distribution with coherent faint pulses is experimentally demonstrated. A measured 3.3 % quantum bit error rate and a relative contrast loss of 8.4 % allow a 0.49 bit/pulse advantage to Bob.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا