ﻻ يوجد ملخص باللغة العربية
Quantum phenomena such as entanglement can improve fundamental limits on the sensitivity of a measurement probe. In optical interferometry, a probe consisting of $N$ entangled photons provides up to a $sqrt{N}$ enhancement in phase sensitivity compared to a classical probe of the same energy. Here, we employ high-gain parametric down-conversion sources and photon-number-resolving detectors to perform interferometry with heralded quantum probes of sizes up to $N=8$ (i.e. measuring up to 16-photon coincidences). Our probes are created by injecting heralded photon-number states into an interferometer, and in principle provide quantum-enhanced phase sensitivity even in the presence of significant optical loss. Our work paves the way towards quantum-enhanced interferometry using large entangled photonic states.
Beyond the use of genuine monolithic integrated optical platforms, we report here a hybrid strategy enabling on-chip generation of configurable heralded two-photon states. More specifically, we combine two different fabrication techniques, textit{i.e
We develop general tools to characterise and efficiently compute relevant observables of multimode $N$-photon states generated in non-linear decays in one-dimensional waveguides. We then consider optical interferometry in a Mach-Zender interferometer
Blind quantum computation is a scheme that adds unconditional security to cloud quantum computation. In the protocol proposed by Broadbent, Fitzsimons, and Kashefi, the ability to prepare and transmit a single qubit is required for a user (client) wh
In this paper, we investigate the phase sensitivities in two-path optical interferometry with asymmetric beam splitters. Here, we present the optimal conditions for the transmission ratio and the phase of the beam splitter to gain the highest sensiti
We develop an improvement to the weak laser pulse BB84 scheme for quantum key distribution, which utilizes entanglement to improve the security of the scheme and enhance its resilience to the photon-number-splitting attack. This protocol relies on th