-
Quantum mechanics based on real numbers: A consistent description
Authors:
Pedro Barrios Hita,
Anton Trushechkin,
Hermann Kampermann,
Michael Epping,
Dagmar Bruß
Abstract:
Complex numbers play a crucial role in quantum mechanics. However, their necessity remains debated: whether they are fundamental or merely convenient. Recently, it was claimed that quantum mechanics based on real numbers can be experimentally falsified in the sense that any real-number formulation of quantum mechanics either becomes inconsistent with multipartite experiments or violates certain po…
▽ More
Complex numbers play a crucial role in quantum mechanics. However, their necessity remains debated: whether they are fundamental or merely convenient. Recently, it was claimed that quantum mechanics based on real numbers can be experimentally falsified in the sense that any real-number formulation of quantum mechanics either becomes inconsistent with multipartite experiments or violates certain postulates. In this article we show that a physically motivated postulate about composite quantum systems allows to construct quantum mechanics based on real numbers that reproduces predictions for all multipartite quantum experiments. Thus, we argue that real-valued quantum mechanics cannot be falsified, and therefore the use of complex numbers is a matter of convenience.
△ Less
Submitted 21 March, 2025;
originally announced March 2025.
-
A practical transmitter device for passive state BB84 quantum key distribution
Authors:
Yury Kurochkin,
Marios Papadovasilakis,
Anton Trushechkin,
Rodrigo Piera,
James A. Grieve
Abstract:
In prepare-and-measure quantum key distribution systems, careful preparation of quantum states within the transmitter device is a significant driver of both complexity and cost. Moreover, the security guarantees of such systems rest on the correct operation of high speed quantum random number generators (QRNGs) and the high-fidelity modulation of weak optical signals by high-speed optoelectronic d…
▽ More
In prepare-and-measure quantum key distribution systems, careful preparation of quantum states within the transmitter device is a significant driver of both complexity and cost. Moreover, the security guarantees of such systems rest on the correct operation of high speed quantum random number generators (QRNGs) and the high-fidelity modulation of weak optical signals by high-speed optoelectronic devices, all of which must be hardened against a variety of known side-channel attacks.
A fully passive state preparation approach elegantly resolves these problems by combining state preparation and QRNG stages into a single optical instrument. By using pairs of optical pulses from a gain-switched laser diode as ready-to-use qubits, the QKD transmitter can be radically simplified, eventually comprising a single laser and local phase tomography stage. We demonstrate our simplified transmitter by establishing a QKD link over a 10 km fiber, generating a secret key rate 110 bits/s, sufficient for practical deployment in "last mile" urban quantum networks. Our results show promise in making QKD simpler and more accessible, closing a critical technology gap in building a secure quantum communication infrastructure.
△ Less
Submitted 14 May, 2024;
originally announced May 2024.
-
Long-term behaviour in an exactly solvable model of pure decoherence and the problem of Markovian embedding
Authors:
Anton Trushechkin
Abstract:
We consider a well-known exactly solvable model of an open quantum system with pure decoherence. The aim of this paper is twofold. Firstly, decoherence is a property of open quantum systems important for both quantum technologies and the fundamental question of quantum-classical transition. It is worthwhile to study how the long-term rate of decoherence depends on the spectral density characterizi…
▽ More
We consider a well-known exactly solvable model of an open quantum system with pure decoherence. The aim of this paper is twofold. Firstly, decoherence is a property of open quantum systems important for both quantum technologies and the fundamental question of quantum-classical transition. It is worthwhile to study how the long-term rate of decoherence depends on the spectral density characterizing the system-bath interaction in this exactly solvable model. Secondly, we address a more general problem of the Markovian embedding of a non-Markovian open system dynamics. It is often assumed that a non-Markovian open quantum system can be embedded into a larger Markovian system. However, we show that such embedding is possible only for the Ohmic spectral densities (for the case of a positive bath temperature) and is impossible for both the sub- and super-Ohmic spectral densities. From the other side, for the Ohmic spectral densities, an asymptotic large-time Markovianity (in terms of the quantum regression formula) takes place.
△ Less
Submitted 27 November, 2023;
originally announced November 2023.
-
Eurasian-Scale Experimental Satellite-based Quantum Key Distribution with Detector Efficiency Mismatch Analysis
Authors:
Aleksandr V. Khmelev,
Alexey V. Duplinsky,
Ruslan M. Bakhshaliev,
Egor I. Ivchenko,
Liubov V. Pismeniuk,
Vladimir F. Mayboroda,
Ivan S. Nesterov,
Arkadiy N. Chernov,
Anton S. Trushechkin,
Evgeniy O. Kiktenko,
Vladimir L. Kurochkin,
Aleksey K. Fedorov
Abstract:
The Micius satellite is the pioneering initiative to demonstrate quantum teleportation, entanglement distribution, quantum key distribution (QKD), and quantum-secured communications experiments at the global scale. In this work, we report on the results of the 600-mm-aperture ground station design which has enabled the establishment of a quantum-secured link between the Zvenigorod and Nanshan grou…
▽ More
The Micius satellite is the pioneering initiative to demonstrate quantum teleportation, entanglement distribution, quantum key distribution (QKD), and quantum-secured communications experiments at the global scale. In this work, we report on the results of the 600-mm-aperture ground station design which has enabled the establishment of a quantum-secured link between the Zvenigorod and Nanshan ground stations using the Micius satellite. As a result of a quantum communications session, an overall sifted key of 2.5 Mbits and a total final key length of 310 kbits have been obtained. We present an extension of the security analysis of the realization of satellite-based QKD decoy-state protocol by taking into account the effect of the detection-efficiency mismatch for four detectors. We also simulate the QKD protocol for the satellite passage and by that validate our semi-empirical model for a realistic receiver, which is in good agreement with the experimental data. Our results pave the way to the considerations of realistic imperfection of the QKD systems, which are important in the context of their practical security.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
Hamiltonian of mean force in the weak-coupling and high-temperature approximations and refined quantum master equations
Authors:
Grigorii Timofeev,
Anton Trushechkin
Abstract:
The Hamiltonian of mean force is a widely used concept to describe the modification of the usual canonical Gibbs state for a quantum system whose coupling strength with the thermal bath is non-negligible. Here we perturbatively derive general approximate expressions for the Hamiltonians of mean force in the weak-coupling approximation and in the high-temperature one. We numerically analyse the acc…
▽ More
The Hamiltonian of mean force is a widely used concept to describe the modification of the usual canonical Gibbs state for a quantum system whose coupling strength with the thermal bath is non-negligible. Here we perturbatively derive general approximate expressions for the Hamiltonians of mean force in the weak-coupling approximation and in the high-temperature one. We numerically analyse the accuracy of the corresponding expressions and show that the precision of the Bloch-Redfield equantum master equation can be improved if we replace the original system Hamiltonian by the Hamiltonian of mean force.
△ Less
Submitted 1 April, 2022;
originally announced April 2022.
-
Open quantum system dynamics and the mean force Gibbs state
Authors:
A. S. Trushechkin,
M. Merkli,
J. D. Cresser,
J. Anders
Abstract:
The dynamical convergence of a system to the thermal distribution, or Gibbs state, is a standard assumption across all of the physical sciences. The Gibbs state is determined just by temperature and the system's energies alone. But at decreasing system sizes, i.e. for nanoscale and quantum systems, the interaction with their environments is not negligible. The question then arises: Is the system's…
▽ More
The dynamical convergence of a system to the thermal distribution, or Gibbs state, is a standard assumption across all of the physical sciences. The Gibbs state is determined just by temperature and the system's energies alone. But at decreasing system sizes, i.e. for nanoscale and quantum systems, the interaction with their environments is not negligible. The question then arises: Is the system's steady state still the Gibbs state? And if not, how may the steady state depend on the interaction details? Here we provide an overview of recent progress on answering these questions. We expand on the state-of-the-art along two general avenues: First we take the static point-of-view which postulates the so-called mean force Gibbs state. This view is commonly adopted in the field of strong coupling thermodynamics, where modified laws of thermodynamics and non-equilibrium fluctuation relations are established on the basis of this modified state. Second, we take the dynamical point-of-view, originating from the field of open quantum systems, which examines the time-asymptotic steady state within two paradigms. We describe the mathematical paradigm which proves return to equilibrium, i.e. convergence to the mean force Gibbs state, and then discuss a number of microscopic physical methods, particularly master equations. We conclude with a summary of established links between statics and equilibration dynamics, and provide an extensive list of open problems. This comprehensive overview will be of interest to researchers in the wider fields of quantum thermodynamics, open quantum systems, mesoscopic physics, statistical physics and quantum optics, and will find applications whenever energy is exchanged on the nanoscale, from quantum chemistry and biology, to magnetism and nanoscale heat management.
△ Less
Submitted 19 January, 2022; v1 submitted 4 October, 2021;
originally announced October 2021.
-
Quantum master equations and steady states for the ultrastrong-coupling limit and the strong-decoherence limit
Authors:
Anton Trushechkin
Abstract:
In the framework of theory of open quantum systems, we derive quantum master equations for the ultrastrong system-bath coupling regime and, more generally, the strong-decoherence regime. In this regime, the strong decoherence is complemented by slow relaxation processes. We use a generalization of the Foerster and modified Redfield peturbation theories known in theory of excitation energy transfer…
▽ More
In the framework of theory of open quantum systems, we derive quantum master equations for the ultrastrong system-bath coupling regime and, more generally, the strong-decoherence regime. In this regime, the strong decoherence is complemented by slow relaxation processes. We use a generalization of the Foerster and modified Redfield peturbation theories known in theory of excitation energy transfer. Also, we show that the mean force Gibbs state in the corresponding limits are stationary for the derived master equations.
△ Less
Submitted 4 September, 2021;
originally announced September 2021.
-
Derivation of the Redfield quantum master equation and corrections to it by the Bogoliubov method
Authors:
Anton Trushechkin
Abstract:
Following the ideas N. N. Bogoliubov used to derive the classical and quantum nonlinear kinetic equations, we give an alternative derivation of the Redfield quantum linear master equation, which is widely used in the theory of open quantum systems, as well as higher-order corrections to it. This derivation naturally considers initially correlated system-reservoir states arising from the previous s…
▽ More
Following the ideas N. N. Bogoliubov used to derive the classical and quantum nonlinear kinetic equations, we give an alternative derivation of the Redfield quantum linear master equation, which is widely used in the theory of open quantum systems, as well as higher-order corrections to it. This derivation naturally considers initially correlated system-reservoir states arising from the previous system-reservoir dynamics. It turns out that the Redfield equation does not require any modifications in this case. The expressions of higher-order corrections are simpler than those obtained by other methods.
△ Less
Submitted 6 August, 2021;
originally announced August 2021.
-
Unified Gorini-Kossakowski-Lindblad-Sudarshan quantum master equation beyond the secular approximation
Authors:
Anton Trushechkin
Abstract:
Derivation of a quantum master equation for a system weakly coupled to a bath which takes into account nonsecular effects, but nevertheless has the mathematically correct Gorini-Kossakowski-Lindblad-Sudarshan form (in particular, it preserves positivity of the density operator) and also satisfies the standard thermodynamic properties is a known long-standing problem in theory of open quantum syste…
▽ More
Derivation of a quantum master equation for a system weakly coupled to a bath which takes into account nonsecular effects, but nevertheless has the mathematically correct Gorini-Kossakowski-Lindblad-Sudarshan form (in particular, it preserves positivity of the density operator) and also satisfies the standard thermodynamic properties is a known long-standing problem in theory of open quantum systems. The nonsecular terms are important when some energy levels of the system or their differences (Bohr frequencies) are nearly degenerate. We provide a fully rigorous derivation of such equation based on a formalization of the weak-coupling limit for the general case.
△ Less
Submitted 25 July, 2021; v1 submitted 22 March, 2021;
originally announced March 2021.
-
Security of the decoy state method for quantum key distribution
Authors:
A. S. Trushechkin,
E. O. Kiktenko,
D. A. Kronberg,
A. K. Fedorov
Abstract:
Quantum cryptography or, more precisely, quantum key distribution (QKD), is one of the advanced areas in the field of quantum technologies. The confidentiality of keys distributed with the use of QKD protocols is guaranteed by the fundamental laws of quantum mechanics. This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of…
▽ More
Quantum cryptography or, more precisely, quantum key distribution (QKD), is one of the advanced areas in the field of quantum technologies. The confidentiality of keys distributed with the use of QKD protocols is guaranteed by the fundamental laws of quantum mechanics. This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states. We give a formal security proof of the decoy state method against all possible attacks. We compare two widely known attacks on multiphoton pulses: photon-number splitting and beam splitting. Finally, we discuss the equivalence of polarization and phase coding.
△ Less
Submitted 27 March, 2021; v1 submitted 25 January, 2021;
originally announced January 2021.
-
Security of quantum key distribution with detection-efficiency mismatch in the multiphoton case
Authors:
Anton Trushechkin
Abstract:
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) systems. Current security proofs of QKD with detection-efficiency mismatch rely either on the assumption of the single-photon light source on the sender side or on the assumption of the single-photon input of the receiver side. These assumptions impose restrictions on the class of possible eavesdropping s…
▽ More
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) systems. Current security proofs of QKD with detection-efficiency mismatch rely either on the assumption of the single-photon light source on the sender side or on the assumption of the single-photon input of the receiver side. These assumptions impose restrictions on the class of possible eavesdropping strategies. Here we present a rigorous security proof without these assumptions and, thus, solve this important problem and prove the security of QKD with detection-efficiency mismatch against general attacks (in the asymptotic regime). In particular, we adapt the decoy state method to the case of detection-efficiency mismatch.
△ Less
Submitted 18 July, 2022; v1 submitted 16 April, 2020;
originally announced April 2020.
-
Higher-order corrections to the Redfield equation with respect to the system-bath coupling based on the hierarchical equations of motion
Authors:
Anton Trushechkin
Abstract:
The Redfield equation describes the dynamics of a quantum system weakly coupled to one or more reservoirs and is widely used in theory of open quantum system. However, the assumption of weak system-reservoir coupling is often not fully adequate and higher-order corrections to the Redfield equation with respect to the system-bath coupling is required. Here we propose a general method of derivation…
▽ More
The Redfield equation describes the dynamics of a quantum system weakly coupled to one or more reservoirs and is widely used in theory of open quantum system. However, the assumption of weak system-reservoir coupling is often not fully adequate and higher-order corrections to the Redfield equation with respect to the system-bath coupling is required. Here we propose a general method of derivation of higher-order corrections to the Redfield quantum master equation based on the hierarchical equations of motion (HEOM). Also we derive conditions of validity of the Redfield equation as well as the additional secular approximation for it.
△ Less
Submitted 13 May, 2019;
originally announced May 2019.
-
Calculation of coherences in Foerster and modified Redfield theories of excitation energy transfer
Authors:
Anton Trushechkin
Abstract:
Foerster and modified Redfield theories play one of the central roles in the description of excitation energy transfer in molecular systems. However, in the present state, these theories describe only the dynamics of populations of local electronic excitations or delocalized exciton eigenstates, respectively, i.e., the diagonal elements of the density matrix in the corresponding representation. Th…
▽ More
Foerster and modified Redfield theories play one of the central roles in the description of excitation energy transfer in molecular systems. However, in the present state, these theories describe only the dynamics of populations of local electronic excitations or delocalized exciton eigenstates, respectively, i.e., the diagonal elements of the density matrix in the corresponding representation. They do not give prescription for propagating the off-diagonal elements of the density matrix (coherences). This is commonly accepted as a limitation of these theories. Here we derive formulas for the dynamics of the coherences in the framework of Foerster and modified Redfield theories and, thus, remove this limitation. These formulas provide excellent correspondence with numerically exact calculations according to the hierarchical equations of motion. Also we show that, even within the range of applicability of the standard Redfield theory, the formulas for coherences derived in the framework of the modified Redfield theory provide, in some cases, more precise results.
△ Less
Submitted 1 February, 2019;
originally announced February 2019.
-
Security of quantum key distribution with detection-efficiency mismatch in the single-photon case: Tight bounds
Authors:
M. K. Bochkov,
A. S. Trushechkin
Abstract:
One of the challenges in practical quantum key distribution is dealing with efficiency mismatch between different threshold single-photon detectors. There are known bounds for the secret key rate for the BB84 protocol with detection-efficiency mismatch provided that the eavesdropper sends no more than one photon to the legitimate receiver. Here we improve these bounds and give tight bounds for the…
▽ More
One of the challenges in practical quantum key distribution is dealing with efficiency mismatch between different threshold single-photon detectors. There are known bounds for the secret key rate for the BB84 protocol with detection-efficiency mismatch provided that the eavesdropper sends no more than one photon to the legitimate receiver. Here we improve these bounds and give tight bounds for the secret key rate with a constant detection-efficiency mismatch under the same single-photon assumption. We propose a method based on the analytical minimization of the relative entropy of coherence, which can be used in other problems in quantum key distribution. Also we propose an adaptation of the decoy state method to proof the security in the case of weak coherent pulses on the source side.
△ Less
Submitted 5 March, 2019; v1 submitted 10 October, 2018;
originally announced October 2018.
-
Quantum key distribution protocol with pseudorandom bases
Authors:
A. S. Trushechkin,
P. A. Tregubov,
E. O. Kiktenko,
Y. V. Kurochkin,
A. K. Fedorov
Abstract:
Quantum key distribution (QKD) offers a way for establishing information-theoretically secure communications. An important part of QKD technology is a high-quality random number generator (RNG) for quantum states preparation and for post-processing procedures. In the present work, we consider a novel class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparati…
▽ More
Quantum key distribution (QKD) offers a way for establishing information-theoretically secure communications. An important part of QKD technology is a high-quality random number generator (RNG) for quantum states preparation and for post-processing procedures. In the present work, we consider a novel class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocol. However, the protocol strongly requires single-photon sources.
△ Less
Submitted 2 June, 2017;
originally announced June 2017.
-
Quantum-secured blockchain
Authors:
E. O. Kiktenko,
N. O. Pozhar,
M. N. Anufriev,
A. S. Trushechkin,
R. R. Yunusov,
Y. V. Kurochkin,
A. I. Lvovsky,
A. K. Fedorov
Abstract:
Blockchain is a distributed database which is cryptographically protected against malicious modifications. While promising for a wide range of applications, current blockchain platforms rely on digital signatures, which are vulnerable to attacks by means of quantum computers. The same, albeit to a lesser extent, applies to cryptographic hash functions that are used in preparing new blocks, so part…
▽ More
Blockchain is a distributed database which is cryptographically protected against malicious modifications. While promising for a wide range of applications, current blockchain platforms rely on digital signatures, which are vulnerable to attacks by means of quantum computers. The same, albeit to a lesser extent, applies to cryptographic hash functions that are used in preparing new blocks, so parties with access to quantum computation would have unfair advantage in procuring mining rewards. Here we propose a possible solution to the quantum era blockchain challenge and report an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information-theoretically secure authentication. These results address important questions about realizability and scalability of quantum-safe blockchains for commercial and governmental applications.
△ Less
Submitted 3 June, 2018; v1 submitted 25 May, 2017;
originally announced May 2017.
-
Demonstration of a quantum key distribution network in urban fibre-optic communication lines
Authors:
E. O. Kiktenko,
N. O. Pozhar,
A. V. Duplinskiy,
A. A. Kanapin,
A. S. Sokolov,
S. S. Vorobey,
A. V. Miller,
V. E. Ustimchik,
M. N. Anufriev,
A. S. Trushechkin,
R. R. Yunusov,
V. L. Kurochkin,
Y. V. Kurochkin,
A. K. Fedorov
Abstract:
We report the results of the implementation of a quantum key distribution (QKD) network using standard fibre communication lines in Moscow. The developed QKD network is based on the paradigm of trusted repeaters and allows a common secret key to be generated between users via an intermediate trusted node. The main feature of the network is the integration of the setups using two types of encoding,…
▽ More
We report the results of the implementation of a quantum key distribution (QKD) network using standard fibre communication lines in Moscow. The developed QKD network is based on the paradigm of trusted repeaters and allows a common secret key to be generated between users via an intermediate trusted node. The main feature of the network is the integration of the setups using two types of encoding, i.e. polarisation encoding and phase encoding. One of the possible applications of the developed QKD network is the continuous key renewal in existing symmetric encryption devices with a key refresh time of up to 14 s.
△ Less
Submitted 2 October, 2017; v1 submitted 19 May, 2017;
originally announced May 2017.
-
Symmetric blind information reconciliation and hash-function-based verification for quantum key distribution
Authors:
A. K. Fedorov,
E. O. Kiktenko,
A. S. Trushechkin
Abstract:
We consider an information reconciliation protocol for quantum key distribution (QKD). In order to correct down the error rate, we suggest a method, which is based on symmetric blind information reconciliation for the low-density parity-check (LDPC) codes. We develop a subsequent verification protocol with the use of $ε$-universal hash functions, which allows verifying the identity between the key…
▽ More
We consider an information reconciliation protocol for quantum key distribution (QKD). In order to correct down the error rate, we suggest a method, which is based on symmetric blind information reconciliation for the low-density parity-check (LDPC) codes. We develop a subsequent verification protocol with the use of $ε$-universal hash functions, which allows verifying the identity between the keys with a certain probability.
△ Less
Submitted 23 September, 2018; v1 submitted 18 May, 2017;
originally announced May 2017.
-
Practical issues in decoy-state quantum key distribution based on the central limit theorem
Authors:
A. S. Trushechkin,
E. O. Kiktenko,
A. K. Fedorov
Abstract:
Decoy-state quantum key distribution is a standard tool for long-distance quantum communications. An important issue in this field is processing the decoy-state statistics taking into account statistical fluctuations (or "finite-key effects"). In this work, we propose and analyze an option for decoy statistics processing, which is based on the central limit theorem. We discuss such practical issue…
▽ More
Decoy-state quantum key distribution is a standard tool for long-distance quantum communications. An important issue in this field is processing the decoy-state statistics taking into account statistical fluctuations (or "finite-key effects"). In this work, we propose and analyze an option for decoy statistics processing, which is based on the central limit theorem. We discuss such practical issues as an inclusion of the failure probability of the decoy-states statistical estimates in the total failure probability of a QKD protocol and also taking into account the deviations of the binomially distributed random variables used in the estimations from the Gaussian distribution. The results of numerical simulations show that the obtained estimations are quite tight. The proposed technique can be used as a part of post-processing procedures for industrial quantum key distribution systems.
△ Less
Submitted 13 September, 2017; v1 submitted 27 February, 2017;
originally announced February 2017.
-
Modular quantum key distribution setup for research and development applications
Authors:
V. E. Rodimin,
E. O. Kiktenko,
V. V. Usova,
M. Yu. Ponomarev,
T. V. Kazieva,
A. V. Miller,
A. S. Sokolov,
A. A. Kanapin,
A. V. Losev,
A. S. Trushechkin,
M. N. Anufriev,
N. O. Pozhar,
V. L. Kurochkin,
Y. V. Kurochkin,
A. K. Fedorov
Abstract:
Quantum key distribution (QKD), ensuring the unconditional security of information, attracts a significant deal of interest. An important task is to design QKD systems as a platform for education as well as for research and development applications and fast prototyping new QKD protocols. Here we present a modular QKD setup driven by National Instruments (NI) cards with open source LabView code, op…
▽ More
Quantum key distribution (QKD), ensuring the unconditional security of information, attracts a significant deal of interest. An important task is to design QKD systems as a platform for education as well as for research and development applications and fast prototyping new QKD protocols. Here we present a modular QKD setup driven by National Instruments (NI) cards with open source LabView code, open source Python code for post-processing procedures, and open source protocol for external applications. An important feature of the developed apparatus is its flexibility offering possibilities to modify optical schemes and verify novel QKD protocols. Another distinctive feature of the developed setup is the implementation of the decoy-state protocol, which is a standard tool for secure long-distance quantum communications. By testing the plug-and-play scheme realizing BB84 and decoy-state BB84 QKD protocols, we demonstrate that developed QKD setup shows a high degree of robustness beyond laboratory conditions. We demonstrate the results of the use of the developed modular setup for urban QKD experiments.
△ Less
Submitted 17 August, 2019; v1 submitted 13 December, 2016;
originally announced December 2016.
-
Symmetric blind information reconciliation for quantum key distribution
Authors:
E. O. Kiktenko,
A. S. Trushechkin,
C. C. W. Lim,
Y. V. Kurochkin,
A. K. Fedorov
Abstract:
Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind reconciliation technique, based on low-density parity-check (LDPC) codes, offers remarkable prospectives for effic…
▽ More
Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind reconciliation technique, based on low-density parity-check (LDPC) codes, offers remarkable prospectives for efficient information reconciliation without an a priori error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. The proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.
△ Less
Submitted 25 February, 2019; v1 submitted 12 December, 2016;
originally announced December 2016.
-
Semiclassical evolution of quantum wave packets on the torus beyond the Ehrenfest time in terms of Husimi distributions
Authors:
A. S. Trushechkin
Abstract:
The semiclassical long-time limit of free evolution of quantum wave packets on the torus is under consideration. Despite of simplicity of this system, there are still open questions concerning the detailed description of the evolution on time scales beyond the Ehrenfest time. One of the approaches is based on the limiting Wigner or Husimi distributions of time-evolved wave packets as the Planck co…
▽ More
The semiclassical long-time limit of free evolution of quantum wave packets on the torus is under consideration. Despite of simplicity of this system, there are still open questions concerning the detailed description of the evolution on time scales beyond the Ehrenfest time. One of the approaches is based on the limiting Wigner or Husimi distributions of time-evolved wave packets as the Planck constant tends to zero and time tends to infinity. We derive explicit expressions for semiclassical measures corresponding to all time scales and the corresponding stages of evolution: classical-like motion, spreading of the wave packet, and its revivals. Also we discuss limitations of the approach based on semiclassical measures and suggest its generalization.
△ Less
Submitted 26 July, 2016;
originally announced July 2016.
-
Post-processing procedure for industrial quantum key distribution systems
Authors:
E. O. Kiktenko,
A. S. Trushechkin,
Y. V. Kurochkin,
A. K. Fedorov
Abstract:
We present algorithmic solutions aimed on post-processing for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of a classical public communication channel is also considered.
We present algorithmic solutions aimed on post-processing for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of a classical public communication channel is also considered.
△ Less
Submitted 23 September, 2016; v1 submitted 28 March, 2016;
originally announced March 2016.
-
Perturbative treatment of inter-site couplings in the local description of open quantum networks
Authors:
A. S. Trushechkin,
I. V. Volovich
Abstract:
The problem of construction of a quantum master equation for a system of sites weakly coupled to each other and to one or more reservoirs (open quantum network) is considered. Microscopic derivation of a quantum master equation requires a diagonalization of the Hamiltonian of the network, which can be a difficult task. When the inter-site couplings are weak, the local approach, which neglects the…
▽ More
The problem of construction of a quantum master equation for a system of sites weakly coupled to each other and to one or more reservoirs (open quantum network) is considered. Microscopic derivation of a quantum master equation requires a diagonalization of the Hamiltonian of the network, which can be a difficult task. When the inter-site couplings are weak, the local approach, which neglects the influence of the inter-site couplings on the system-reservoir couplings, is often used. Recently, some doubts were cast to the consistency of the local approach. We develop a systematic perturbation expansion to derive corrections to the local approach and establish its range of validity. Using this extension of the local approach, we derive an expression for the heat flux for a particular model and show that it does not violate the second law of thermodynamics.
△ Less
Submitted 18 September, 2015;
originally announced September 2015.
-
Measurement-assisted Landau-Zener transitions
Authors:
A. N. Pechen,
A. S. Trushechkin
Abstract:
Nonselective quantum measurements, i.e., measurements without reading the results, are often considered as a resource for manipulating quantum systems. In this work, we investigate optimal acceleration of the Landau-Zener (LZ) transitions by non-selective quantum measurements. We use the measurements of a population of a diabatic state of the LZ system at certain time instants as control and find…
▽ More
Nonselective quantum measurements, i.e., measurements without reading the results, are often considered as a resource for manipulating quantum systems. In this work, we investigate optimal acceleration of the Landau-Zener (LZ) transitions by non-selective quantum measurements. We use the measurements of a population of a diabatic state of the LZ system at certain time instants as control and find the optimal time instants which maximize the LZ transition. We find surprising nonmonotonic behavior of the maximal transition probability with increase of the coupling parameter when the number of measurements is large. This transition probability gives an optimal approximation to the fundamental quantum Zeno effect (which corresponds to continuous measurements) by a fixed number of discrete measurements. The difficulty for the analysis is that the transition probability as a function of time instants has a huge number of local maxima. We resolve this problem both analytically by asymptotic analysis and numerically by the development of efficient algorithms mainly based on the dynamic programming. The proposed numerical methods can be applied, besides this problem, to a wide class of measurement-based optimal control problems.
△ Less
Submitted 27 June, 2015;
originally announced June 2015.
-
Localization properties of squeezed quantum states in nanoscale space domains
Authors:
A. S. Trushechkin,
I. V. Volovich
Abstract:
We construct families of squeezed quantum states on an interval (depending on boundary conditions, we interpret the interval as a circle or as the infinite square potential well) and obtain estimates of position and momentum dispersions for these states. A particular attention is paid to the possibility of proper localization of a particle in nanoscale space domains. One of the constructed family…
▽ More
We construct families of squeezed quantum states on an interval (depending on boundary conditions, we interpret the interval as a circle or as the infinite square potential well) and obtain estimates of position and momentum dispersions for these states. A particular attention is paid to the possibility of proper localization of a particle in nanoscale space domains. One of the constructed family of squeezed states is based on the theta function. It is a generalization of the known coherent and squeezed states on the circle. Also we construct a family of squeezed states based on truncated Gaussian functions and a family of wave packets based on the discretization of an arbitrary continuous momentum probability distribution.
The problem of finiteness of the energy dispersion for the squeezed states in the infinite well is discussed. Finally, we perform the limit of large interval length and the semiclassical limit.
As a supplementary general result, we show that an arbitrary physical quantity has a finite dispersion if and only if the wave function of a quantum system belongs to the domain of the corresponding self-adjoint operator. This can be regarded as a physical meaning of the domain of a self-adjoint operator.
△ Less
Submitted 23 April, 2013;
originally announced April 2013.
-
Semiclassical description of collapses and revivals of quantum wave packets in bounded domains
Authors:
A. S. Trushechkin,
I. V. Volovich
Abstract:
We study a special kind of semiclassical limit of quantum dynamics on a circle and in a box (infinite potential well with hard walls) as the Planck constant tends to zero and time tends to infinity. The results give detailed information about all stages of evolution of quantum wave packets: semiclassical motion, collapses, revivals, as well as intermediate stages. In particular, we rigorously just…
▽ More
We study a special kind of semiclassical limit of quantum dynamics on a circle and in a box (infinite potential well with hard walls) as the Planck constant tends to zero and time tends to infinity. The results give detailed information about all stages of evolution of quantum wave packets: semiclassical motion, collapses, revivals, as well as intermediate stages. In particular, we rigorously justify the fact that the spatial distribution of a wave packet is most of the time close to uniform. This fact was previously known only from numerical calculations.
We apply the obtained results to a problem of classical mechanics: deciding whether recently suggested functional classical mechanics is preferable to traditional Newtonian one from the quantum-mechanical point of view. To do this, we study the semiclassical limit of the Husimi functions of quantum states. We show that functional mechanics remains valid at larger time scales than Newtonian one and, therefore, is preferable.
Finally, we analyse the quantum dynamics in a box in case when the size of the box is known with a random error. We show that, in this case, the probability distribution of the position of a quantum particle is not almost periodic, but tends to a limit distribution as time indefinitely increases.
△ Less
Submitted 8 April, 2013;
originally announced April 2013.
-
On Standards and Specifications in Quantum Cryptography
Authors:
A. S. Trushechkin,
I. V. Volovich
Abstract:
Quantum cryptography is going to find practically useful applications. Recently some first quantum cryptographic solutions became available on the market. For clients it is important to be able to compare the quality and properties of the proposed products. To this end one needs to elaborate on specifications and standards of solutions in quantum cryptography. We propose and discuss a list of ch…
▽ More
Quantum cryptography is going to find practically useful applications. Recently some first quantum cryptographic solutions became available on the market. For clients it is important to be able to compare the quality and properties of the proposed products. To this end one needs to elaborate on specifications and standards of solutions in quantum cryptography. We propose and discuss a list of characteristics for the specification, which includes numerical evaluations of the security of solution and can be considered as a standard for quantum key distribution solutions. The list is based on the average time of key generation depending on some parameters. In the simplest case for the user the list includes three characteristics: the security degree, the length of keys and the key refresh rate.
△ Less
Submitted 4 July, 2006; v1 submitted 3 August, 2005;
originally announced August 2005.
-
General model of quantum key distribution
Authors:
A. S. Trushechkin,
I. V. Volovich
Abstract:
A general mathematical framework for quantum key distribution based on the concepts of quantum channel and Turing machine is suggested. The security for its special case is proved. The assumption is that the adversary can perform only individual (in essence, classical) attacks. For this case an advantage of quantum key distribution over classical one is shown.
A general mathematical framework for quantum key distribution based on the concepts of quantum channel and Turing machine is suggested. The security for its special case is proved. The assumption is that the adversary can perform only individual (in essence, classical) attacks. For this case an advantage of quantum key distribution over classical one is shown.
△ Less
Submitted 20 April, 2005; v1 submitted 20 April, 2005;
originally announced April 2005.