Implementation Scheme of Two-Photon Post-Quantum Correlations

被引:0
|
作者
潘国柱 [1 ,2 ]
储文静 [1 ]
杨名 [1 ]
杨青 [1 ]
张刚 [2 ]
曹卓良 [1 ,3 ]
机构
[1] School of Physics and Material Science, Anhui University
[2] School of Electrical and Photoelectric Engineering, West Anhui university
[3] School of Electronic and Information Engineering, Hefei Normal University
基金
中国国家自然科学基金;
关键词
post-quantum correlation; two-state vector formalism; fair-sampling loophole; linear optics;
D O I
暂无
中图分类号
O431.2 [量子光学];
学科分类号
摘要
The pre-and post-selection processes of the "two-state vector formalism" lead to a fair sampling loophole in Bell test, so it can be used to simulate post-quantum correlations. In this paper, we propose a physical implementation of such a correlation with the help of quantum non-demolition measurement, which is realized via the cross-Kerr nonlinear interaction between the signal photon and a probe coherent beam. The indirect measurement on the polarization state of photon is realized by the direct measurement on the phase shift of the probe coherent beam, which enhances the detection efficiency greatly and leaves the signal photon unabsorbed. The maximal violation of the CHSH inequality 4 can be achieved by pre-and post-selecting maximally entangled states. The reason why we can get the post-quantum correlation is that the selection of the results after measurement opens fair-sampling loophole. The fair-sampling loophole opened here is different from the one usually used in the currently existing simulation schemes for post-quantum correlations,which are simulated by selecting the states to be measured or enlarging the Hilbert space. So, our results present an alternative way to mimic post-quantum correlations.
引用
收藏
页码:687 / 693
页数:7
相关论文
共 50 条
  • [31] Efficient Implementation of a Post-Quantum Anonymous Credential Protocol
    Blazy, Olivier
    Chevalier, Celine
    Renaut, Guillaume
    Ricosset, Thomas
    Sageloli, Eric
    Senet, Hugo
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [32] Post-quantum signature schemes for efficient hardware implementation
    Moldovyan, Dmitriy N.
    Moldovyan, Alexandr A.
    Moldovyan, Nikolay A.
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 80
  • [33] An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme
    Ghosh, Sagarika
    Zaman, Marzia
    Sakauye, Gary
    Sampalli, Srinivas
    APPLIED SCIENCES-BASEL, 2021, 11 (05): : 1 - 32
  • [34] Hardware Design and Implementation of Post-Quantum Cryptography Kyber
    Zeng, Qingru
    Li, Quanxin
    Zhao, Baoze
    Jiao, Han
    Huang, Yihua
    2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
  • [35] On the equivalence of two post-quantum cryptographic families
    Meneghetti, Alessio
    Pellegrini, Alex
    Sala, Massimiliano
    ANNALI DI MATEMATICA PURA ED APPLICATA, 2023, 202 (02) : 967 - 991
  • [36] Order-Invariant Two-Photon Quantum Correlations in PT-Symmetric Interferometers
    Wolterink, Tom A. W.
    Heinrich, Matthias
    Scheel, Stefan
    Szameit, Alexander
    ACS PHOTONICS, 2023, 10 (10) : 3451 - 3457
  • [37] Two-Photon Fluorescence Microscopy at Extremely Low Excitation Intensity: The Power of Quantum Correlations
    Varnavski, Oleg
    Goodson, Theodore, III
    JOURNAL OF THE AMERICAN CHEMICAL SOCIETY, 2020, 142 (30) : 12966 - 12975
  • [38] Two-Photon Fluorescence Microscopy at Extremely Low Excitation Intensity: The Power of Quantum Correlations
    Varnavski, Oleg
    Goodson, Theodore
    Journal of the American Chemical Society, 2020, 142 (30): : 12966 - 12975
  • [39] Role of the spectral shape of quantum correlations in two-photon virtual-state spectroscopy
    Leon-Montiel, R. de J.
    Svozilik, J.
    Salazar-Serrano, L. J.
    Torres, Juan P.
    NEW JOURNAL OF PHYSICS, 2013, 15
  • [40] On the equivalence of two post-quantum cryptographic families
    Alessio Meneghetti
    Alex Pellegrini
    Massimiliano Sala
    Annali di Matematica Pura ed Applicata (1923 -), 2023, 202 : 967 - 991