-
A warm Rydberg atom-based quadrature amplitude-modulated receiver
Authors:
Jan Nowosielski,
Marcin Jastrzębski,
Pavel Halavach,
Karol Łukanowski,
Marcin Jarzyna,
Mateusz Mazelanik,
Wojciech Wasilewski,
Michał Parniak
Abstract:
Rydberg atoms exhibit remarkable sensitivity to electromagnetic fields, making them promising candidates for revolutionizing field sensors. Unlike conventional antennas, they neither disturb the measured field nor necessitate intricate calibration procedures. In this study, we propose a protocol for signal reception near the 2.4 GHz Wi-Fi frequency band, harnessing the capabilities of warm Rydberg…
▽ More
Rydberg atoms exhibit remarkable sensitivity to electromagnetic fields, making them promising candidates for revolutionizing field sensors. Unlike conventional antennas, they neither disturb the measured field nor necessitate intricate calibration procedures. In this study, we propose a protocol for signal reception near the 2.4 GHz Wi-Fi frequency band, harnessing the capabilities of warm Rydberg atoms. Our focus lies on exploring various quadrature amplitude modulations and transmission frequencies through heterodyne detection. We offer a comprehensive characterization of our setup, encompassing the atomic response frequency range and attainable electric field amplitudes. Additionally, we delve into analyzing communication errors using Voronoi diagrams, along with evaluating the communication channel capacity across different modulation schemes. Our findings not only lay the groundwork for future wireless communication applications, but also present opportunities to refine protocols in classical communication and field sensing domains.
△ Less
Submitted 30 July, 2024; v1 submitted 5 May, 2024;
originally announced May 2024.
-
Greedy receiver for photon-efficient optical communication
Authors:
Karol Łukanowski
Abstract:
In optical communication the transmitter encodes information into a set of light states defined by the modulation format, selected to accommodate specific channel conditions and to remain sufficiently distinguishable at the output. Various receiver architectures have been designed to improve the demodulation performance, ultimately limited by quantum theory. In this work I introduce a new receiver…
▽ More
In optical communication the transmitter encodes information into a set of light states defined by the modulation format, selected to accommodate specific channel conditions and to remain sufficiently distinguishable at the output. Various receiver architectures have been designed to improve the demodulation performance, ultimately limited by quantum theory. In this work I introduce a new receiver based on a locally optimal greedy algorithm and apply it to pulse position modulation. The receiver reduces the error probabilities of previously proposed strategies in all signal strength regimes and achieves results comparable with those obtained by numerical optimization of the detection process. In contrast, however, it is conceptually simple and therefore can be scaled to arbitrarily high modulation orders for which numerical methods become intractable. In the photon-starved regime characteristic of deep space optical communication, the greedy receiver approaches the quantum-optimal Helstrom bound on state discrimination error probability. In the regime of few-photon pulses, the error reduction offered over the other methods grows up to an order of magnitude.
△ Less
Submitted 18 October, 2024; v1 submitted 4 March, 2024;
originally announced March 2024.
-
Quantum Limits on the Capacity of Multispan Links with Phase-sensitive Amplification
Authors:
Karol Łukanowski,
Konrad Banaszek,
Marcin Jarzyna
Abstract:
Long-distance fiber communication stands as a cornerstone of modern technology. One of the underlying principles, preventing signal levels from diminishing below the detectability threshold, is optical amplification. In particular, phase-sensitive amplifiers offer a promising solution as ideally they do not introduce any excess additive noise. Since such devices in principle operate at the quantum…
▽ More
Long-distance fiber communication stands as a cornerstone of modern technology. One of the underlying principles, preventing signal levels from diminishing below the detectability threshold, is optical amplification. In particular, phase-sensitive amplifiers offer a promising solution as ideally they do not introduce any excess additive noise. Since such devices in principle operate at the quantum noise level, a natural question is whether one can further improve the capacity of amplified links using principles of quantum mechanics as it offers a much broader scope of signal modulations and detection schemes. We derive ultimate limits determined by the laws of quantum mechanics on the capacity of multispan links with phase sensitive amplification. We show that the quantum advantage over the standard approach based on optical quadrature detection is small and vanishes for long links.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
Quantum Limits on the Capacity of Multispan Links with Phase-Sensitive Amplification
Authors:
Karol Łukanowski,
Marcin Jarzyna,
Konrad Banaszek
Abstract:
The capacity of a linear attenuating optical channel with the signal regenerated using quantum-limited phase-sensitive amplifiers is analyzed for conventional and generalized detection scenarios. The continuous model of distributed amplification determines the attainable capacity for long-haul links under the total power constraint.
The capacity of a linear attenuating optical channel with the signal regenerated using quantum-limited phase-sensitive amplifiers is analyzed for conventional and generalized detection scenarios. The continuous model of distributed amplification determines the attainable capacity for long-haul links under the total power constraint.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks
Authors:
Karol Łukanowski,
Maria Balanzó-Juandó,
Máté Farkas,
Antonio Acín,
Jan Kołodyński
Abstract:
The device-independent framework constitutes the most pragmatic approach to quantum protocols that does not put any trust in their implementations. It requires all claims, about e.g. security, to be made at the level of the final classical data in hands of the end-users. This imposes a great challenge for determining attainable key rates in device-independent quantum key distribution (DIQKD), but…
▽ More
The device-independent framework constitutes the most pragmatic approach to quantum protocols that does not put any trust in their implementations. It requires all claims, about e.g. security, to be made at the level of the final classical data in hands of the end-users. This imposes a great challenge for determining attainable key rates in device-independent quantum key distribution (DIQKD), but also opens the door for consideration of eavesdropping attacks that stem from the possibility of a given data being just generated by a malicious third-party. In this work, we explore this path and present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates. It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols, whether involving one-way or two-way communication. In particular, we demonstrate with its help that the currently predicted constraints on the robustness of DIQKD protocols to experimental imperfections, such as the finite visibility or detection efficiency, are already very close to the ultimate tolerable thresholds.
△ Less
Submitted 29 November, 2023; v1 submitted 13 June, 2022;
originally announced June 2022.
-
Sub-Rayleigh characterization of a binary source by spatially demultiplexed coherent detection
Authors:
Chandan Datta,
Yink Loong Len,
Karol Łukanowski,
Konrad Banaszek,
Marcin Jarzyna
Abstract:
We investigate theoretically coherent detection implemented simultaneously on a set of mutually orthogonal spatial modes in the image plane as a method to characterize properties of a composite thermal source below the Rayleigh limit. A general relation between the intensity distribution in the source plane and the covariance matrix for the complex field amplitudes measured in the image plane is d…
▽ More
We investigate theoretically coherent detection implemented simultaneously on a set of mutually orthogonal spatial modes in the image plane as a method to characterize properties of a composite thermal source below the Rayleigh limit. A general relation between the intensity distribution in the source plane and the covariance matrix for the complex field amplitudes measured in the image plane is derived. An algorithm to estimate parameters of a two-dimensional symmetric binary source is devised and verified using Monte Carlo simulations to provide super-resolving capability for high ratio of signal to detection noise (SNR). Specifically, the separation between two point sources can be meaningfully determined down to $\textrm{SNR}^{-1/2}$ in the units determined by the spatial spread of the transfer function of the imaging system. The presented algorithm is shown to make a nearly optimal use of the measured data in the sub-Rayleigh region.
△ Less
Submitted 6 October, 2021; v1 submitted 15 June, 2021;
originally announced June 2021.
-
Bell nonlocality is not sufficient for the security of standard device-independent quantum key distribution protocols
Authors:
Máté Farkas,
Maria Balanzó-Juandó,
Karol Łukanowski,
Jan Kołodyński,
Antonio Acín
Abstract:
Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key, while putting minimal trust in their devices. Most of the existing protocols have the following structure: first, a bipartite nonlocal quantum state is distributed between the honest users, who perform local measurements to establish nonlocal correlations.…
▽ More
Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key, while putting minimal trust in their devices. Most of the existing protocols have the following structure: first, a bipartite nonlocal quantum state is distributed between the honest users, who perform local measurements to establish nonlocal correlations. Then, they announce the implemented measurements and extract a secure key by post-processing their measurement outcomes. We show that no protocol of this form allows for establishing a secret key when implemented on any correlation obtained by measuring local projective measurements on certain entangled nonlocal states, namely on a range of entangled two-qubit Werner states. To prove this result, we introduce a technique for upper-bounding the asymptotic key rate of device-independent quantum key distribution protocols, based on a simple eavesdropping attack. Our results imply that either different reconciliation techniques are needed for device-independent quantum key distribution in the large-noise regime, or Bell nonlocality is not sufficient for this task.
△ Less
Submitted 2 August, 2021; v1 submitted 3 March, 2021;
originally announced March 2021.
-
Capacity of a lossy photon channel with direct detection
Authors:
Karol Łukanowski,
Marcin Jarzyna
Abstract:
We calculate numerically the capacity of a lossy photon channel assuming photon number resolving detection at the output. We consider scenarios of input Fock and coherent states ensembles and show that the latter always exhibits worse performance than the former. We obtain capacity of a discrete-time Poisson channel as a limiting behavior of the Fock states ensemble capacity. We show also that in…
▽ More
We calculate numerically the capacity of a lossy photon channel assuming photon number resolving detection at the output. We consider scenarios of input Fock and coherent states ensembles and show that the latter always exhibits worse performance than the former. We obtain capacity of a discrete-time Poisson channel as a limiting behavior of the Fock states ensemble capacity. We show also that in the regime of a moderate number of photons and low losses the Fock states ensemble with direct detection is beneficial with respect to capacity limits achievable with quadrature detection.
△ Less
Submitted 27 August, 2021; v1 submitted 4 December, 2020;
originally announced December 2020.
-
Sub-Rayleigh resolution of two incoherent sources by array homodyning
Authors:
Chandan Datta,
Marcin Jarzyna,
Yink Loong Len,
Karol Łukanowski,
Jan Kołodyński,
Konrad Banaszek
Abstract:
Conventional incoherent imaging based on measuring the spatial intensity distribution in the image plane faces the resolution hurdle described by the Rayleigh diffraction criterion. Here, we demonstrate theoretically using the concept of the Fisher information that quadrature statistics measured by means of array homodyne detection enables estimation of the distance between two incoherent point so…
▽ More
Conventional incoherent imaging based on measuring the spatial intensity distribution in the image plane faces the resolution hurdle described by the Rayleigh diffraction criterion. Here, we demonstrate theoretically using the concept of the Fisher information that quadrature statistics measured by means of array homodyne detection enables estimation of the distance between two incoherent point sources well below the Rayleigh limit for sufficiently high signal-to-noise ratio. This capability is attributed to the availability of spatial coherence information between individual detector pixels acquired using the coherent detection technique. A simple analytical approximation for the precision attainable in the sub-Rayleigh region is presented. Furthermore, an estimation algorithm is proposed and applied to Monte Carlo simulated data.
△ Less
Submitted 27 November, 2020; v1 submitted 18 May, 2020;
originally announced May 2020.