Experimentally Verified Approach to Nonentanglement-Breaking Channel Certification.

Ensuring the nonentanglement-breaking (non-EB) property of quantum channels is crucial for the effective distribution and storage of quantum states. However, a practical method for direct and accurate certification of the non-EB feature is highly desirable. Here, we propose and verify a realistic source based measurement device independent certification of non-EB channels. Our method is resilient to repercussions on the certification from experimental conditions, such as multiphotons and imperfect state preparation, and can be implemented with an information incomplete set. We achieve good agreement between experimental outcomes and theoretical predictions, which is validated by the expected results of the ideal semiquantum signaling game, and accurately certify the non-EB channels. Furthermore, our approach is highly robust to effects from noise. Therefore, the proposed approach can be expected to play a significant role in the design and evaluation of realistic quantum channels.

[1]  Wenguang,et al.  Electron , 2020, Definitions.

[2]  Massimiliano Proietti,et al.  Measurement-Device-Independent Verification of Quantum Channels. , 2019, Physical review letters.

[3]  Leandro Aolita,et al.  Distributed sampling, quantum communication witnesses, and measurement incompatibility , 2019, Physical Review A.

[4]  Nicolai Friis,et al.  Entanglement certification from theory to experiment , 2018, Nature Reviews Physics.

[5]  Hoi-Kwong Lo,et al.  Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks , 2018, Physical Review X.

[6]  Antonio Acín,et al.  Device-Independent Entanglement Certification of All Entangled States. , 2018, Physical review letters.

[7]  Yeong-Cherng Liang,et al.  A resource theory of quantum memories and their faithful verification with minimal assumptions , 2017, 1710.04710.

[8]  Qiang Zhang,et al.  Integrating quantum key distribution with classical communications in backbone fiber network. , 2017, Optics express.

[9]  Paul Skrzypczyk,et al.  Measurement-device-independent entanglement and randomness estimation in quantum networks , 2017, 1702.04752.

[10]  L. Comandar,et al.  Long-distance quantum key distribution secure against coherent attacks , 2017, 1701.07252.

[11]  Wei Zhang,et al.  Quantum teleportation with independent sources and prior entanglement distribution over a network , 2016, Nature Photonics.

[12]  E. Knill,et al.  A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).

[13]  A. Zeilinger,et al.  Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.

[14]  S. Wehner,et al.  Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres , 2015, Nature.

[15]  H Zbinden,et al.  Resource-Efficient Measurement-Device-Independent Entanglement Witness. , 2015, Physical review letters.

[16]  Mohamed Bourennane,et al.  Experimental Measurement-Device-Independent Entanglement Detection , 2015, Scientific Reports.

[17]  Ping Xu,et al.  Implementation of a measurement-device-independent entanglement witness. , 2014, Physical review letters.

[18]  C. Schwemmer,et al.  Systematic errors in current quantum state tomography tools. , 2013, Physical review letters.

[19]  Feihu Xu,et al.  Practical aspects of measurement-device-independent quantum key distribution , 2013, 1305.6965.

[20]  Nicolas Gisin,et al.  Measurement-device-independent entanglement witnesses for all entangled quantum states. , 2012, Physical review letters.

[21]  Xiongfeng Ma,et al.  Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.

[22]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[23]  Francesco Buscemi,et al.  All entangled quantum states are nonlocal. , 2011, Physical review letters.

[24]  H. Weinfurter,et al.  Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.

[25]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[26]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[27]  Francesco Buscemi,et al.  Comparison of Quantum Statistical Models: Equivalent Conditions for Sufficiency , 2010, Communications in Mathematical Physics.

[28]  G. Tóth,et al.  Entanglement detection , 2008, 0811.2803.

[29]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[30]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[31]  H. Lo,et al.  Practical decoy state for quantum key distribution (15 pages) , 2005, quant-ph/0503005.

[32]  V. Scarani,et al.  Entanglement and non-locality are different resources , 2004, quant-ph/0412109.

[33]  S. Lloyd,et al.  Quantum-Enhanced Measurements: Beating the Standard Quantum Limit , 2004, Science.

[34]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[35]  Xiang‐Bin Wang,et al.  Beating the photon-number-splitting attack in practical quantum cryptography. , 2004, Physical review letters.

[36]  T. Ralph,et al.  Quantum process tomography of a controlled-NOT gate. , 2004, Physical review letters.

[37]  M. Lewenstein,et al.  Entanglement as a precondition for secure quantum key distribution. , 2003, Physical review letters.

[38]  Shengjun Wu,et al.  What is quantum entanglement , 2003 .

[39]  Andrew G. White,et al.  Ancilla-assisted quantum process tomography. , 2003, Physical review letters.

[40]  W. Hwang Quantum key distribution with high loss: toward global secure communication. , 2002, Physical review letters.

[41]  M. Ruskai,et al.  Entanglement Breaking Channels , 2003, quant-ph/0302031.

[42]  R. Jozsa,et al.  On the role of entanglement in quantum-computational speed-up , 2002, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.

[43]  G M D'Ariano,et al.  Quantum tomography for measuring experimentally the matrix elements of an arbitrary quantum operation. , 2001, Physical review letters.

[44]  G. Brassard,et al.  Security aspects of practical quantum cryptography , 1999, Conference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504).

[45]  P. Townsend Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fibre using wavelength-division multiplexing , 1997 .

[46]  P. Zoller,et al.  Complete Characterization of a Quantum Process: The Two-Bit Quantum Gate , 1996, quant-ph/9611013.

[47]  Subhayan Roy Moulick,et al.  Quantum Information Theory , 2013 .