Long-distance quantum communication through any number of entanglement-swapping operations

@article{Khalique2014LongdistanceQC,
  title={Long-distance quantum communication through any number of entanglement-swapping operations},
  author={Aeysha Khalique and Barry C. Sanders},
  journal={Physical Review A},
  year={2014},
  volume={90},
  pages={032304}
}
(Dated: September 8, 2014)We develop a theory and accompanying mathematical model for quantum communication viaany number of intermediate entanglement swapping operations and solve numerically for up tothree intermediate entanglement swapping operations. Our model yields two-photon interferencevisibilities post-selected on photon counts at the intermediate entanglement-swapping stations. Re-alistic experimental conditions are accommodated through the parametric down-conversion rate,photon… 

Figures from this paper

Long-distance quantum-key-distribution using concatenated entanglement swapping with practical resources
TLDR
Through this approach, a trade-off is needed between experimental run-time, pair-production rate and detector efficiency, which enables huge distances for quantum key-distribution but at the expense of low key generation rate.
Practical long-distance quantum key distribution through concatenated entanglement swapping with parametric down-conversion sources
TLDR
The analysis demonstrates the need for new technology, such as quantum memory, to synchronize photons; the methods should serve as a valuable component for accurately modeling quantum-memory-based long-distance quantum key distribution.
Long-distance quantum key distribution using concatenated entanglement swapping with practical resources
Abstract. We explain how to share photons between two distant parties using concatenated entanglement swapping and assess performance according to the two-photon visibility as the figure of merit.
Highly efficient entanglement swapping and teleportation at telecom wavelength
TLDR
A drastic improvement of the efficiency at telecom wavelength is demonstrated by using two ultra-bright entangled photon sources and four highly efficient superconducting nanowire single photon detectors to open the way to practical implementation of device-independent quantum key distribution and its distance extension by the entanglement swapping as well as multi-photon entangled state generation in telecom band infrastructures with both space and fiber links.
Enhancing quantum correlation in open-system dynamics by reliable quantum operations
TLDR
A series of feasible schemes to enhance quantum discord by means of reliable quantum operations are proposed and one can note that the generated quantum discord can be greatly enhanced.
Hybrid Photonic Loss Resilient Entanglement Swapping
TLDR
It can be shown that there is an optimal amplitude value ($alpha$) of the coherent state when allowing for such loss, and it is demonstrated that a small amount of loss mismatch does not destroy the overall entanglement.
Survey of emerging information teleportation networks and protocols
TLDR
This paper presents a review of this emerging field of quantum teleportation, summarizing key protocols as well as some representative quantum teleportation experiments conducted both in the laboratory and in the field.
Quantum entanglement swapping of two arbitrary biqubit pure states
In this paper, the issue of swapping quantum entanglements in two arbitrary biqubit pure states via a local bipartite entangledstate projective measure in the middle node is studied in depth,
Verification of the Violation of WWZB Inequality Using Werner States
The generation and manipulation of entangled particles presents itself as one of the most important results in quantum mechanics. With the work from Bell, it was possible to prove the nonlocal nature
Quantum correlation swapping in parallel and antiparallel two-qubit mixed states
TLDR
Although QCs in the two parallel initial states are different from those in theTwo antiparallel initial states, the differences are eliminated after the QC swapping, and a profound difference between their QCs quantified by more probing measures is revealed.
...
...

References

SHOWING 1-10 OF 14 REFERENCES
Phys
  • Rev. A 80, 062310
  • 2009
Phys
  • Rev. A 88, 022336
  • 2013
in Information Theoretic Security: Third International Conference
  • ICITS 20 Lecture Notes in Computer Science 5155
  • 2008
Phys
  • Rev. Lett. 80, 3891
  • 1998
and A
  • Zeilinger, arXiv:1403.0009v3
  • 2014
Nat
  • Photonics 3, 706
  • 2009
H
  • de Riedmatten, W. Tittel, D. Collins, H. Zbinden, and N. Gisin, J. Mod. Opt. 51, 1011
  • 2004
10 Phys
  • Rev. A 87, 063801
  • 2013
and H
  • de Riedmatten, J. Mod. Opt. 52, 735
  • 2005
Phys
  • Rev. A 65, 042304
  • 2002
...
...