Hamiltonians for one-way quantum repeaters

Filippo M. Miatto1,2, Michael Epping1, and Norbert Lütkenhaus1

1Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave. W, N2L 3G1 Waterloo, Ontario, Canada
2Télécom ParisTech, LTCI, Université Paris Saclay, 46 Rue Barrault, 75013 Paris, France

Quantum information degrades over distance due to the unavoidable imperfections of the transmission channels, with loss as the leading factor. This simple fact hinders quantum communication, as it relies on propagating quantum systems. A solution to this issue is to introduce quantum repeaters at regular intervals along a lossy channel, to revive the quantum signal. In this work we study unitary one-way quantum repeaters, which do not need to perform measurements and do not require quantum memories, and are therefore considerably simpler than other schemes. We introduce and analyze two methods to construct Hamiltonians that generate a repeater interaction that can beat the fundamental repeaterless key rate bound even in the presence of an additional coupling loss, with signals that contain only a handful of photons. The natural evolution of this work will be to approximate a repeater interaction by combining simple optical elements.

Share
You are reading these words on the screen of your device thanks to a series of contraptions (servers, optical fibres, switches, routers, etc…) that cooperate together to transmit information across the globe unscathed. Among such devices we have repeaters: the light pulses travelling in the optical fibres become exponentially weaker with distance and they need to get beefed up every once in a while. To do so, repeaters measure the feeble signals and re-emit them more strongly.

If instead of classical bits, we wanted to transmit quantum bits of information, we would run into a big problem: we cannot simply measure an unknown quantum system to ''boost it'', because we would inevitably change it and lose the quantum information. To solve this problem, we recall that preserving quantum information is the job of quantum error correcting codes, only here the preservation occurs over space instead of over time. So if we embed our quantum information into bosonic error correcting codes (quantum states of light that slush the quantum information around internally, instead of leaking it), one-way quantum repeaters can fix and re-emit a bosonic code and the quantum information can live on.

In our work, we have linked any bosonic code that we wish to use to the internal Hamiltonian of a quantum repeater, which is the operator that dictates how the device changes the quantum systems that it operates on. In other words, we give a recipe (two recipes actually) to compute the Hamiltonian of a quantum repeater starting from any desired bosonic code. Our hope is one day to find a Hamiltonian that is simple enough to implement using a reasonable number of known quantum optical components.

► BibTeX data

► References

[1] Victor V. Albert, Kyungjoo Noh, Kasper Duivenvoorden, Dylan J. Young, R. T. Brierley, Philip Reinhold, Christophe Vuillot, Linshu Li, Chao Shen, S. M. Girvin, Barbara M. Terhal, and Liang Jiang. Performance and structure of single-mode bosonic codes. Phys. Rev. A, 97:032346, Mar 2018. doi:10.1103/​PhysRevA.97.032346.
https://doi.org/10.1103/PhysRevA.97.032346

[2] C. H. Bennett and G. Brassard. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pages 175-179, New York, 1984. IEEE Press. doi:10.1016/​j.tcs.2014.05.025.
https://doi.org/10.1016/j.tcs.2014.05.025

[3] Charles H Bennett, Gilles Brassard, Seth Breidbart, and Stephen Wiesner. Quantum cryptography, or unforgeable subway tokens. In Advances in Cryptology, pages 267-275. Springer, 1983. doi:10.1007/​978-1-4757-0602-4_26.
https://doi.org/10.1007/978-1-4757-0602-4_26

[4] Cédric Bény and Ognyan Oreshkov. General conditions for approximate quantum error correction and near-optimal recovery channels. Physical review letters, 104(12):120501, 2010. doi:10.1103/​PhysRevLett.104.120501.
https://doi.org/10.1103/PhysRevLett.104.120501

[5] H-J Briegel, Wolfgang Dür, Juan I Cirac, and Peter Zoller. Quantum repeaters: the role of imperfect local operations in quantum communication. Physical Review Letters, 81(26):5932, 1998. doi:10.1103/​PhysRevLett.81.5932.
https://doi.org/10.1103/PhysRevLett.81.5932

[6] Dagmar Bruß. Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett., 81:3018-3021, Oct 1998. doi:10.1103/​PhysRevLett.81.3018.
https://doi.org/10.1103/PhysRevLett.81.3018

[7] Harry Buhrman, Richard Cleve, John Watrous, and Ronald De Wolf. Quantum fingerprinting. Physical Review Letters, 87(16):167902, 2001. doi:10.1103/​PhysRevLett.87.167902.
https://doi.org/10.1103/PhysRevLett.87.167902

[8] Isaac L Chuang, Debbie W Leung, and Yoshihisa Yamamoto. Bosonic quantum codes for amplitude damping. Physical Review A, 56(2):1114, 1997. doi:10.1103/​PhysRevA.56.1114.
https://doi.org/10.1103/PhysRevA.56.1114

[9] Michael Epping, Filippo Miatto, and Norbert Lütkenhaus. Noise bounds for quantum repeaters. to be submitted, 2018.

[10] Hong-yi Fan and Li-yun Hu. New approach for analyzing time evolution of density operator in a dissipative channel by the entangled state representation. Optics Communications, 281(22):5571-5573, 2008. doi:10.1016/​j.optcom.2008.08.002.
https://doi.org/10.1016/j.optcom.2008.08.002

[11] Nicolas Gisin, Grégoire Ribordy, Wolfgang Tittel, and Hugo Zbinden. Quantum cryptography. Reviews of modern physics, 74(1):145, 2002. doi:10.1103/​RevModPhys.74.145.
https://doi.org/10.1103/RevModPhys.74.145

[12] Daniel Gottesman and Isaac Chuang. Quantum digital signatures. arXiv preprint quant-ph/​0105032, 2001.
arXiv:quant-ph/0105032

[13] H Jeff Kimble. The quantum internet. Nature, 453:1023-1030, 2008. doi:10.1038/​nature07127.
https://doi.org/10.1038/nature07127

[14] Emanuel Knill and Raymond Laflamme. Concatenated quantum codes. arXiv preprint quant-ph/​9608012, 1996.
arXiv:quant-ph/9608012

[15] Emanuel Knill and Raymond Laflamme. Theory of quantum error-correcting codes. Physical Review A, 55(2):900, 1997. doi:10.1103/​PhysRevA.55.900.
https://doi.org/10.1103/PhysRevA.55.900

[16] Linshu Li, Chang-Ling Zou, Victor V Albert, Sreraman Muralidharan, SM Girvin, and Liang Jiang. Cat codes with optimal decoherence suppression for a lossy bosonic channel. Physical Review Letters, 119(3):030502, 2017. doi:10.1103/​PhysRevLett.119.030502.
https://doi.org/10.1103/PhysRevLett.119.030502

[17] Seth Lloyd, Jeffrey H Shapiro, Franco NC Wong, Prem Kumar, Selim M Shahriar, and Horace P Yuen. Infrastructure for the quantum internet. ACM SIGCOMM Computer Communication Review, 34(5):9-20, 2004. doi:10.1145/​1039111.1039118.
https://doi.org/10.1145/1039111.1039118

[18] Hoi-Kwong Lo. Proof of unconditional security of six-state quantum key distribution scheme. arXiv preprint quant-ph/​0102138, 2001.
arXiv:quant-ph/0102138

[19] Hoi-Kwong Lo, Marcos Curty, and Kiyoshi Tamaki. Secure quantum key distribution. Nature Photonics, 8(8):595-604, 2014. doi:10.1038/​nphoton.2014.149.
https://doi.org/10.1038/nphoton.2014.149

[20] Rodney Loudon. The quantum theory of light. OUP Oxford, 2000. doi:10.1119/​1.1987930.
https://doi.org/10.1119/1.1987930

[21] Prabha Mandayam and Hui Khoon Ng. Towards a unified framework for approximate quantum error correction. Phys. Rev. A, 86:012335, Jul 2012. doi:10.1103/​PhysRevA.86.012335.
https://doi.org/10.1103/PhysRevA.86.012335

[22] Marios H Michael, Matti Silveri, RT Brierley, Victor V Albert, Juha Salmilehto, Liang Jiang, and Steven M Girvin. New class of quantum error-correcting codes for a bosonic mode. Physical Review X, 6(3):031006, 2016. doi:10.1103/​PhysRevX.6.031006.
https://doi.org/10.1103/PhysRevX.6.031006

[23] WJ Munro, AM Stephens, SJ Devitt, KA Harrison, and Kae Nemoto. Quantum communication without the necessity of quantum memories. Nature Photonics, 6(11):777-781, 2012. doi:10.1038/​nphoton.2012.243.
https://doi.org/10.1038/nphoton.2012.243

[24] Sreraman Muralidharan, Jungsang Kim, Norbert Lütkenhaus, Mikhail D Lukin, and Liang Jiang. Ultrafast and fault-tolerant quantum communication across long distances. Physical review letters, 112(25):250501, 2014. doi:10.1103/​PhysRevLett.112.250501.
https://doi.org/10.1103/PhysRevLett.112.250501

[25] Sreraman Muralidharan, Linshu Li, Jungsang Kim, Norbert Lütkenhaus, Mikhail D Lukin, and Liang Jiang. Optimal architectures for long distance quantum communication. Scientific reports, 6:20463, 2016. doi:10.1038/​srep20463.
https://doi.org/10.1038/srep20463

[26] Ryo Namiki, Liang Jiang, Jungsang Kim, and Norbert Lütkenhaus. Role of syndrome information on a one-way quantum repeater using teleportation-based error correction. Physical Review A, 94(5):052304, 2016. doi:10.1103/​PhysRevA.94.052304.
https://doi.org/10.1103/PhysRevA.94.052304

[27] Hui Khoon Ng and Prabha Mandayam. Simple approach to approximate quantum error correction based on the transpose channel. Physical Review A, 81(6):062342, 2010. doi:10.1103/​PhysRevA.81.062342.
https://doi.org/10.1103/PhysRevA.81.062342

[28] Michael A Nielsen and Isaac Chuang. Quantum computation and quantum information. AAPT, 2002. doi:10.1119/​1.1463744.
https://doi.org/10.1119/1.1463744

[29] Stefano Pirandola, Riccardo Laurenza, Carlo Ottaviani, and Leonardo Banchi. Fundamental limits of repeaterless quantum communications. Nature Communications, 8:15043, 2017. doi:10.1038/​ncomms15043.
https://doi.org/10.1038/ncomms15043

[30] Nicolas Sangouard, Christoph Simon, Hugues De Riedmatten, and Nicolas Gisin. Quantum repeaters based on atomic ensembles and linear optics. Reviews of Modern Physics, 83(1):33, 2011. doi:10.1103/​RevModPhys.83.33.
https://doi.org/10.1103/RevModPhys.83.33

[31] Valerio Scarani, Helle Bechmann-Pasquinucci, Nicolas J Cerf, Miloslav Dušek, Norbert Lütkenhaus, and Momtchil Peev. The security of practical quantum key distribution. Reviews of modern physics, 81(3):1301, 2009. doi:10.1103/​RevModPhys.81.1301.
https://doi.org/10.1103/RevModPhys.81.1301

[32] Peter W Shor. Scheme for reducing decoherence in quantum computer memory. Physical review A, 52(4):R2493, 1995. doi:10.1103/​PhysRevA.52.R2493.
https://doi.org/10.1103/PhysRevA.52.R2493

[33] Masahiro Takeoka, Saikat Guha, and Mark M Wilde. Fundamental rate-loss tradeoff for optical quantum key distribution. Nature Communications, 5:6235, 2015. doi:10.1038/​ncomms6235.
https://doi.org/10.1038/ncomms6235

[34] Jon Tyson. Two-sided bounds on minimum-error quantum measurement, on the reversibility of quantum dynamics, and on maximum overlap using directional iterates. Journal of mathematical physics, 51(9):092204, 2010. doi:10.1063/​1.3463451.
https://doi.org/10.1063/1.3463451

[35] Wojciech Wasilewski and Konrad Banaszek. Protecting an optical qubit against photon loss. Physical Review A, 75(4):042316, 2007. doi:10.1103/​PhysRevA.75.042316.
https://doi.org/10.1103/PhysRevA.75.042316

[36] Mark M Wilde, Marco Tomamichel, and Mario Berta. Converse bounds for private communication over quantum channels. IEEE Transactions on Information Theory, 63(3):1792-1817, 2017. doi:10.1109/​TIT.2017.2648825.
https://doi.org/10.1109/TIT.2017.2648825

► Cited by (beta)

Crossref's cited-by service has no data on citing works. Unfortunately not all publishers provide suitable citation data.