The Experimental Demonstration of High Efficiency Interaction-free Measurement for Quantum Counterfactual-like Communication

  title={The Experimental Demonstration of High Efficiency Interaction-free Measurement for Quantum Counterfactual-like Communication},
  author={Chao Liu and Jinhong Liu and Junxiang Zhang and Shi-Yao Zhu},
  journal={Scientific Reports},
We present an interaction-free measurement with quantum Zeno effect and a high efficiency η = 74.6% ± 0.15%. As a proof-of-principle demonstration, this measurement can be used to implement a quantum counterfactual-like communication protocol. Instead of a single photon state, we use a coherent light as the input source and show that the output agrees with the proposed quantum counterfactual communication protocol according to Salih et al. Although the counterfactuality is not achieved due to… 
Exchange unknown quantum states with almost invisible photons.
We propose a quasi-counterfactual quantum swap gate for exchanging Alice's unknown photon state and Bob's unknown atomic state under the condition that only Alice's photon may appear in the
Modification of "Counterfactual communication protocols" which makes them truly counterfactual
A simple modification of these recent protocols eliminates the trace in the transmission channel and makes all these protocols truly counterfactual.
Improvement of reliability in multi-interferometer-based counterfactual deterministic communication with dissipation compensation.
This work simulates and test this counterfactual deterministic communication protocol with a finite number of interferometers, and demonstrates the improvement of the reliability using dissipation compensation in interferometer.
The laws of physics do not prohibit counterfactual communication
It has been conjectured that counterfactual communication is impossible, even for post-selected quantum particles. We strongly challenge this by proposing precisely such a counterfactual scheme
Information carrier and resource optimization of counterfactual quantum communication
This paper optimization the resource efficiency of the counterfactual quantum communication in terms of the number of channels used, time consumed to transmit 1-bit classical information between two remote parties, and the numberof qubits required to accomplish the counter Factual quantum Communication.
Do the laws of physics prohibit counterfactual communication?
This paper proposes exactly such a counterfactual scheme where, unambiguously, none of Alice's photons that make it has been to Bob, and demonstrates counterfactuality experimentally by means of weak measurements, as well as conceptually using consistent histories.
Counterfactual Bell-State Analysis
This counterfactual analysis not only enables us to perform a complete Bell-state analysis, but also enables spatially separated parties to distinguish between the four Bell states without transmitting any physical particle over the channel.
Analysis of counterfactuality of counterfactual communication protocols
This protocol and its modification are used as a test bed for analysis of meaning ofcounterfactuality to clarify the counterfactuality status of various counterfactual proposals.
Quantum Secure Group Communication
We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is
Counterfactual communication
Counterfactual communication, transferring bits and even qubits without particle travelling in the transmission channel is a bizarre quantum effect. It is also a very controversial topic. Here I will


High-efficiency Quantum Interrogation Measurements via the Quantum Zeno Effect
The phenomenon of quantum interrogation allows one to optically detect the presence of an absorbing object, without the measuring light interacting with it. In an application of the quantum Zeno
Experimental demonstration of counterfactual quantum communication.
This work experimentally demonstrated, for the first time, a faithful implementation for a striking scheme called "counterfactual quantum cryptography" with an on-table realization operating at telecom wavelengths, and reported an illustration on a 1 km fiber.
Long-distance quantum communication with atomic ensembles and linear optics
It is shown that the communication efficiency scales polynomially with the channel length, and hence the scheme should be operable over very long distances.
On-chip interaction-free measurements via the quantum Zeno effect
Although interference is a classical-wave phenomenon, the superposition principle, which underlies interference of individual particles, is at the heart of quantum physics. An interaction-free
Protocol for direct counterfactual quantum communication.
Using the "chained" quantum Zeno effect, this work shows how, in the ideal asymptotic limit, information can be transferred between Alice and Bob without any physical particles traveling between them.
Asking photons where they have been.
From the analysis, it is concluded that the past of the photons is not represented by continuous trajectories, although a "common sense" analysis adopted in various welcher weg measurements, delayed-choice which-path experiments, and counterfactual communication demonstrations yields a single trajectory.
Quantum cryptography with coherent states
  • B. Huttner, N. Imoto
  • Computer Science, Physics
    Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics
  • 1995
This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Physics
    Physical review letters
  • 2003
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).
Counterfactual quantum cryptography.
  • T. Noh
  • Computer Science, Physics
    Physical review letters
  • 2009
This Letter shows that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel, and proposes protocols to implement this task.
Quantum cryptography using any two nonorthogonal states.
  • Bennett
  • Physics
    Physical review letters
  • 1992
It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.