Tag Archives: Jian-Wei Pan

2022 Nobel Prize for Physics winners proved the existence of quantum entanglement

In early October 2022, Alain Aspect, John Clauser and Anton Zeilinger were jointly awarded the 2022 Nobel Prize in Physics for work each scientist performed independently of the others.

Here’s more about the scientists and their works from an October 4, 2022 Nobel Prize press release,

The Royal Swedish Academy of Sciences has decided to award the Nobel Prize in Physics 2022 to

Alain Aspect
Institut d’Optique Graduate School – Université Paris-
Saclay and École Polytechnique, Palaiseau, France

John F. Clauser
J.F. Clauser & Assoc., Walnut Creek, CA, USA

Anton Zeilinger
University of Vienna, Austria

“for experiments with entangled photons, establishing the violation of Bell inequalities and pioneering quantum information science”

Entangled states – from theory to technology

Alain Aspect, John Clauser and Anton Zeilinger have each conducted groundbreaking experiments using entangled quantum states, where two particles behave like a single unit even when they are separated. Their results have cleared the way for new technology based upon quantum information.

The ineffable effects of quantum mechanics are starting to find applications. There is now a large field of research that includes quantum computers, quantum networks and secure quantum encrypted communication.

One key factor in this development is how quantum mechanics allows two or more particles to exist in what is called an entangled state. What happens to one of the particles in an entangled pair determines what happens to the other particle, even if they are far apart.

For a long time, the question was whether the correlation was because the particles in an entangled pair contained hidden variables, instructions that tell them which result they should give in an experiment. In the 1960s, John Stewart Bell developed the mathematical inequality that is named after him. This states that if there are hidden variables, the correlation between the results of a large number of measurements will never exceed a certain value. However, quantum mechanics predicts that a certain type of experiment will violate Bell’s inequality, thus resulting in a stronger correlation than would otherwise be possible.

John Clauser developed John Bell’s ideas, leading to a practical experiment. When he took the measurements, they supported quantum mechanics by clearly violating a Bell inequality. This means that quantum mechanics cannot be replaced by a theory that uses hidden variables.

Some loopholes remained after John Clauser’s experiment. Alain Aspect developed the setup, using it in a way that closed an important loophole. He was able to switch the measurement settings after an entangled pair had left its source, so the setting that existed when they were emitted could not affect the result.

Using refined tools and long series of experiments, Anton Zeilinger started to use entangled quantum states. Among other things, his research group has demonstrated a phenomenon called quantum teleportation, which makes it possible to move a quantum state from one particle to one at a distance.

“It has become increasingly clear that a new kind of quantum technology is emerging. We can see that the laureates’ work with entangled states is of great importance, even beyond the fundamental questions about the interpretation of quantum mechanics,”says Anders Irbäck, Chair of the Nobel Committee for Physics.

There are some practical applications for their work on establishing quantum entanglement as Dr. Nicholas Peters, University of Tennessee and Oak Ridge National Laboratory (ORNL), explains in his October 7, 2022 essay for The Conversation,

Unhackable communications devices, high-precision GPS and high-resolution medical imaging all have something in common. These technologies—some under development and some already on the market all rely on the non-intuitive quantum phenomenon of entanglement.

Two quantum particles, like pairs of atoms or photons, can become entangled. That means a property of one particle is linked to a property of the other, and a change to one particle instantly affects the other particle, regardless of how far apart they are. This correlation is a key resource in quantum information technologies.

For the most part, quantum entanglement is still a subject of physics research, but it’s also a component of commercially available technologies, and it plays a starring role in the emerging quantum information processing industry.

Quantum entanglement is a critical element of quantum information processing, and photonic entanglement of the type pioneered by the Nobel laureates is crucial for transmitting quantum information. Quantum entanglement can be used to build large-scale quantum communications networks.

On a path toward long-distance quantum networks, Jian-Wei Pan, one of Zeilinger’s former students, and colleagues demonstrated entanglement distribution to two locations separated by 764 miles (1,203 km) on Earth via satellite transmission. However, direct transmission rates of quantum information are limited due to loss, meaning too many photons get absorbed by matter in transit so not enough reach the destination.

Entanglement is critical for solving this roadblock, through the nascent technology of quantum repeaters. An important milestone for early quantum repeaters, called entanglement swapping, was demonstrated by Zeilinger and colleagues in 1998. Entanglement swapping links one each of two pairs of entangled photons, thereby entangling the two initially independent photons, which can be far apart from each other.

Perhaps the most well known quantum communications application is Quantum Key Distribution (QKD), which allows someone to securely distribute encryption keys. If those keys are stored properly, they will be secure, even from future powerful, code-breaking quantum computers.

I don’t usually embed videos that are longer than 5 mins. but this one has a good explanation of cryptography (both classical and quantum),

The video host, Physics Girl (website), is also known as Dianna Cowern.

If you have the time, do read Peters’s October 7, 2022 essay, which can also be found as an October 10, 2022 news item on phys.org.

I wonder if there’s going to be a rush to fund and commercialize more quantum physics projects. There’s certainly an upsurge in activity locally and in Canada (I assume the same is true elsewhere) as my July 26, 2022 posting “Quantum Mechanics & Gravity conference (August 15 – 19, 2022) launches Vancouver (Canada)-based Quantum Gravity Institute and more” makes clear.

Unbreakable encrypted message with key that’s shorter than the message

A Sept. 5, 2016 University of Rochester (NY state, US) news release (also on EurekAlert), makes an intriguing announcement,

Researchers at the University of Rochester have moved beyond the theoretical in demonstrating that an unbreakable encrypted message can be sent with a key that’s far shorter than the message—the first time that has ever been done.

Until now, unbreakable encrypted messages were transmitted via a system envisioned by American mathematician Claude Shannon, considered the “father of information theory.” Shannon combined his knowledge of algebra and electrical circuitry to come up with a binary system of transmitting messages that are secure, under three conditions: the key is random, used only once, and is at least as long as the message itself.

The findings by Daniel Lum, a graduate student in physics, and John Howell, a professor of physics, have been published in the journal Physical Review A.

“Daniel’s research amounts to an important step forward, not just for encryption, but for the field of quantum data locking,” said Howell.

Quantum data locking is a method of encryption advanced by Seth Lloyd, a professor of quantum information at Massachusetts Institute of Technology, that uses photons—the smallest particles associated with light—to carry a message. Quantum data locking was thought to have limitations for securely encrypting messages, but Lloyd figured out how to make additional assumptions—namely those involving the boundary between light and matter—to make it a more secure method of sending data.  While a binary system allows for only an on or off position with each bit of information, photon waves can be altered in many more ways: the angle of tilt can be changed, the wavelength can be made longer or shorter, and the size of the amplitude can be modified. Since a photon has more variables—and there are fundamental uncertainties when it comes to quantum measurements—the quantum key for encrypting and deciphering a message can be shorter that the message itself.

Lloyd’s system remained theoretical until this year, when Lum and his team developed a device—a quantum enigma machine—that would put the theory into practice. The device takes its name from the encryption machine used by Germany during World War II, which employed a coding method that the British and Polish intelligence agencies were secretly able to crack.

Let’s assume that Alice wants to send an encrypted message to Bob. She uses the machine to generate photons that travel through free space and into a spatial light modulator (SLM) that alters the properties of the individual photons (e.g. amplitude, tilt) to properly encode the message into flat but tilted wavefronts that can be focused to unique points dictated by the tilt. But the SLM does one more thing: it distorts the shapes of the photons into random patterns, such that the wavefront is no longer flat which means it no longer has a well-defined focus. Alice and Bob both know the keys which identify the implemented scrambling operations, so Bob is able to use his own SLM to flatten the wavefront, re-focus the photons, and translate the altered properties into the distinct elements of the message.

Along with modifying the shape of the photons, Lum and the team made use of the uncertainty principle, which states that the more we know about one property of a particle, the less we know about another of its properties. Because of that, the researchers were able to securely lock in six bits of classical information using only one bit of an encryption key—an operation called data locking.

“While our device is not 100 percent secure, due to photon loss,” said Lum, “it does show that data locking in message encryption is far more than a theory.”

The ultimate goal of the quantum enigma machine is to prevent a third party—for example, someone named Eve—from intercepting and deciphering the message. A crucial principle of quantum theory is that the mere act of measuring a quantum system changes the system. As a result, Eve has only one shot at obtaining and translating the encrypted message—something that is virtually impossible, given the nearly limitless number of patterns that exist for each photon.

The paper by Lum and Howell was one of two papers published simultaneously on the same topic. The other paper, “Quantum data locking,” was from a team led by Chinese physicist Jian-Wei Pan.

“It’s highly unlikely that our free-space implementation will be useful through atmospheric conditions,” said Lum. “Instead, we have identified the use of optic fiber as a more practical route for data locking, a path Pan’s group actually started with. Regardless, the field is still in its infancy with a great deal more research needed.”

Here’s a link to and a citation for the paper,

Quantum enigma machine: Experimentally demonstrating quantum data locking by Daniel J. Lum, John C. Howell, M. S. Allman, Thomas Gerrits, Varun B. Verma, Sae Woo Nam, Cosmo Lupo, and Seth Lloyd. Phys. Rev. A, Vol. 94, Iss. 2 — August 2016 DOI: http://dx.doi.org/10.1103/PhysRevA.94.022315

©2016 American Physical Society

This paper is behind a paywall.

There is an earlier open access version of the paper by the Chinese researchers on arXiv.org,

Experimental quantum data locking by Yang Liu, Zhu Cao, Cheng Wu, Daiji Fukuda, Lixing You, Jiaqiang Zhong, Takayuki Numata, Sijing Chen, Weijun Zhang, Sheng-Cai Shi, Chao-Yang Lu, Zhen Wang, Xiongfeng Ma, Jingyun Fan, Qiang Zhang, Jian-Wei Pan. arXiv.org > quant-ph > arXiv:1605.04030

The Chinese team’s later version of the paper is available here,

Experimental quantum data locking by Yang Liu, Zhu Cao, Cheng Wu, Daiji Fukuda, Lixing You, Jiaqiang Zhong, Takayuki Numata, Sijing Chen, Weijun Zhang, Sheng-Cai Shi, Chao-Yang Lu, Zhen Wang, Xiongfeng Ma, Jingyun Fan, Qiang Zhang, and Jian-Wei Pan. Phys. Rev. A, Vol. 94, Iss. 2 — August 2016 DOI: http://dx.doi.org/10.1103/PhysRevA.94.020301

©2016 American Physical Society

This version is behind a paywall.

Getting back to the folks at the University of Rochester, they have provided this image to illustrate their work,

The quantum enigma machine developed by researchers at the University of Rochester, MIT, and the National Institute of Standards and Technology. (Image by Daniel Lum/University of Rochester)

The quantum enigma machine developed by researchers at the University of Rochester, MIT, and the National Institute of Standards and Technology. (Image by Daniel Lum/University of Rochester)