Optimal entanglement generation for efficient hybrid quantum repeaters

Optimal entanglement generation for efficient hybrid quantum repeaters

Abstract

We propose a realistic protocol to generate entanglement between quantum memories at neighboring nodes in hybrid quantum repeaters. Generated entanglement includes only one type of error, which enables efficient entanglement distillation. In contrast to the known protocols with such a property, our protocol with ideal detectors achieves the theoretical limit of the success probability and the fidelity to a Bell state, promising higher efficiencies in the repeaters. We also show that the advantage of our protocol remains even with realistic threshold detectors.

pacs:
03.67.Hk, 42.50.Pq, 03.67.Mn

If two distant parties hold quantum memories in a maximally entangled state (Bell state), they can freely accomplish applications such as quantum teleportation (1) and quantum key distribution (2). In order to prepare their memories in a Bell state, optical pulses are used as media to exchange quantum information of the memories. However, the real transmission channel for optical pulses suffers from loss that increases with the length of the channel, which renders direct distribution of Bell states over long distances (e.g. km) practically impossible. Instead, in quantum repeaters (3); (4), a number of nodes at moderate intervals (e.g. km) are set between the two parties, and many non-maximally entangled states are shared between neighboring nodes through the lossy channel. From these non-maximally entangled states, neighboring nodes prepare a Bell state by entanglement distillation (5); (6), and then the Bell states connecting nodes are further converted into a Bell state between the two end parties by entanglement swapping (1); (7). In this way, quantum repeaters enable the distribution of Bell states over long distances through a series of ‘entanglement generation,’ ‘entanglement distillation’ and ‘entanglement swapping.’ As the first stage in quantum repeaters, entanglement generation between neighboring nodes plays an important role in improving the efficiency of the whole process. Thus, it is crucial to implement good entanglement generation protocols with efficient production of high quality entanglement to be fed to the entanglement distillation stage.

In general, the feasibility and the efficiency of entanglement generation protocols depend on the available systems for constructing quantum memories. The first realistic entanglement generation protocol proposed by Duan et al. (8) and the subsequent protocols (9); (10); (11) are based on atomic-ensemble quantum memories giving off a single photon depending on the state of the atoms. Although the protocols generate high quality entanglement, they suffer from low success probabilities. This is due to the necessity to suppress the generation of multiple photons. On the other hand, quantum memories used in hybrid quantum repeaters (12); (13); (14); (15) do not have such a restriction, and the repeaters are expected to be more efficient. For example, the memory used in the first proposal of Loock et al. (12) interacts with the optical pulse in coherent state with any amplitude according to , where the parameter depends on the strength of the interaction (e.g. (12)). Such quantum memories can be realized by individual -type atoms, single electrons trapped in quantum dots, and nitrogen-vacancy (NV) centers in a diamond with a nuclear spin degree of freedom (12); (13). Until now, many authors have tried to improve entanglement generation protocols in order to achieve higher efficiencies in the repeaters (12); (13); (14); (15).

In this paper, we provide a definitive step in the search of good entanglement generation methods for hybrid quantum repeaters by proposing a protocol with an optimal performance. Our protocol uses linear optical elements and photon detectors, and if photon number-resolving detectors are available, the protocol promises to achieve the theoretical limit of performance under the requirement that the generated entanglement suffers from only one type of error. This required property makes subsequent entanglement distillation efficient (15). All known protocols (12); (13); (14); (15); (16); (17), including a protocol generating entanglement with two types of errors (12); (13), do not reach the bound, and thus our protocol is the first one achieving the bound. In addition, even if realistic detectors are used, our protocol shows higher performance than known realistic protocols. Hence, it is a promising protocol to achieve more efficient hybrid quantum repeaters.

Our entanglement generation protocol is illustrated in Fig. 1(a). In what follows, we call the sender and the receiver at neighboring nodes as Alice and Bob, respectively, who are connected via an optical fiber with transmittance , where is the distance between the nodes. Alice first prepares a probe pulse in a coherent state with and a quantum memory in state with and , where phase factors and are chosen to offset irrelevant phases appearing later. Alice then makes the probe pulse interact with her memory by , and sends the output probe pulse to Bob through the fiber, together with the local oscillator (LO). Optical loss in the fiber is effectively described by where is an isometry from input mode into output mode and the environment . Then, the state of Alice’s memory , the received probe pulse in mode , and the environment is described by with and .

The above recipe for Alice is also shared by the protocols in Refs. (12); (13); (14), while that for Bob is not. In these protocols, Bob first interacts the probe pulse with his memory, and then he either performs homodyne measurement on the probe pulse (protocol I) (12); (13) or displaces the probe pulse and conducts photon counting (protocol II) (14). As seen below, our protocol differs from these in the sense that it uses two probe pulses. Note that the two-probe approach was also taken in other repeater protocols (8); (9); (10); (11); (17); (16).

In our protocol, upon receiving the probe pulse and the LO pulse, Bob first generates a second probe pulse in state from the LO with a beamsplitter (BS2), and then makes it interact with his memory initialized in state . Then, his memory and the second probe pulse are in state . Bob further applies a 50/50 BS (BS3) described by to the pulses in modes and , which is followed by a phase-space displacement (18) to the pulse in mode . These operations correspond to the following isometry: where . Then, the state of the total system is described by The pulses in and go to photon detectors D1 and D2, respectively, and Bob announces the success of the protocol when either photon detector D1 or D2, but not both, reports the arrival of nonzero photons.

Figure 1: (a) Schematic diagram of our protocol. (b) The performance of protocols with ideal detectors: fidelity of the obtained entanglement to a Bell state as a function of the success probability when km (corresponding to dB/km attenuation) and , for (i) protocol I (12); (13), (ii) protocol II (14), and (iii) our protocol.

Let us consider the case where D1 and D2 are ideal photon number-resolving detectors. Since the detectors have no dark counts, the output state never provokes an event where both detectors receive photons. Hence our protocol fails only when the pulses in modes and are in the vacuum state , which leads to the success probability of

The type of the generated entanglement in qubits depends on which detector informs how many photons have arrived. If detector D1 announces that the number of arriving photons is odd (even but nonzero), the generated entangled state has fidelity to the nearest Bell state (), and it is diagonalized by Bell states . Similarly, detector D2 informs whether the nearest Bell state to the obtained entanglement is or . These facts can be confirmed by simple calculations, e.g., for the number state (), , and . Then, using a local unitary operation depending on the outcome of the detectors, Alice and Bob can transform the generated entangled state into the standard state, . Since the standard state includes only one type of error, they can use efficient entanglement distillation at a later stage (15). This property is also shared by protocol II (14) and by another protocol (15).

In order to evaluate the potential of our protocol, we compare its performance with protocols I and II in Fig. 1(b), assuming ideal photon number-resolving detectors and ideal homodyne detectors. The figure suggests that our protocol has the best performance among the protocols. In addition, the figure shows that, in the vicinity of zero success probability, protocol II and our protocol achieve a fidelity close to unity, while protocol I does not unless (). This difference comes from the choice of different types of detectors, and it is further amplified with the increase of distance : In fact, for km, protocol I can generate almost separable states at best (14), but our protocol and protocol II can generate acceptable entanglement. The better performance of our protocol was also supported by numerical simulations for various values of .

Actually, such a high potential of this protocol is not accidental, because it can be shown to have the maximal performance among a wide range of protocols, which generate entangled states with only one type of error. That is to say, our protocol achieves the optimality of entanglement generation in qubits among all the protocols that satisfy the following conditions: (i) Alice prepares qubit and pulse in a state with being arbitrary coherent states, and sends the pulse to Bob; (ii) Upon receiving the pulse (in mode ), Bob may perform arbitrary operations and measurements on , the LO, and his memory qubit , but whenever he declares success, Alice and Bob can apply a local unitary operation such that the final state of is represented only by (contained in the subspace spanned by ). Condition (i) is satisfied by protocol I, II and the others (12); (13); (14); (15); (17); (16). Condition (ii) is favorable since it allows the use of efficient entanglement distillation (15).

From condition (i), we see that the state of the system when the pulse arrives at Bob is written by

(1)

with

(2)

where is the transmittance of the fiber. Since the cases with are trivial, we assume in what follows, and we use condition (ii) and Eq. (1) to derive bounds on the success probability and the fidelity in terms of and . Then we use Eq. (2) to determine the achievable region of for given .

Let us define a phase flip channel on qubit by with and . From Eq. (1), we have , where with . The effect of the lossy channel is thus equivalently described as preparation of followed by . Since any operation of Bob commutes with , the protocol is equivalent to the following sequence: (a) System is prepared in ; (b) Bob does his operations and measurements, and leaves system in a state ; (c) is applied on qubit . Now condition (ii) requires that, whenever Bob declares success, there exists a unitary such that with . Since is positive and , we have and for both . Adding and subtracting these equations, we obtain

(3)

for , where and . Since , the set must be linearly dependent, which only happens when is an eigenbasis of .

Without loss of generality, the fidelity of the final state is given by , where . Since is an eigenbasis of , we have . Hence , leading to

(4)

In order to find a bound on , imagine a situation where, after the steps (a)–(c) above, Alice and Bob proceeds as follows: (d) Bob measures qubit on basis ; (e) Alice measures qubit on basis . Whenever Bob has declared success, we see from Eq. (3) that the state of qubit after step (d) should be , which is an eigenvector of . Hence Bob can certainly predict Alice’s outcome in step (e). Now if we look at the whole sequence (a)–(e), we notice that Alice’s measurement (e) can be equivalently done just after (a), and (c) becomes redundant. Then, when Alice finishes steps (a) and (e), Bob is provided with with equal a priori probabilities, from which he proceeds with steps (b) and (d). At this point, he can determine the value of precisely whenever he declares success. Thus, the total success probability is no larger than that of the unambiguous state discrimination (USD), which is known (19); (20); (21) to be . Hence we have

(5)

Combining Eqs. (2), (4), and (5), we conclude that, for given , the performance of any protocol satisfying conditions (i) and (ii) must lie within the boundary . Conversely, this boundary is always achievable by our protocol with the choice of amplitude satisfying .

Figure 2: The performance of protocols with realistic detectors: (i) protocol I with an ideal homodyne detector, (ii) protocol II with a TD1 , (ii’) protocol II with a TD2 , (iii) our protocol with TD1s, (iii’) our protocol with TD2s.

Finally, we show that our protocol shows high performance even if we replace the photon number-resolving detectors with threshold detectors (TDs) that just report the arrival of photons and do not tell how many of them have arrived. We represent quantum efficiency and mean dark count of the detector as and , respectively. The function of a TD is (22) represented by the following POVM elements: , where () corresponds to an event reporting the arrival (non-arrival) of photons. When the used TDs are ideal (, ), the generated state has only one type of error and has fidelity to the nearest Bell state. The success probability is the same as that with ideal photon number-resolving detectors. For the realistic values of , we numerically calculated the performance of our protocol, which is shown in Fig. 2. Note that the chosen values are typical for currently available detectors, e.g., TES (superconducting transition-edge sensors) (23) and APD (avalanche photodiode) (24). The dark counts of such detectors increase the types of errors occurring in generated entanglement. However, such additional errors occur with a small probability , and hence can be neglected. To evaluate the performance of our protocol, we also plotted the performance of protocol I with an ideal homodyne detector, and that of protocol II with its photon number-resolving detector replaced by TD1 and TD2. The figure shows that our protocol has higher efficiency than protocol II. We see that there is a region where the performance of protocol I exceeds that of ours, but this region decreases with the increase of distance . Hence, we can safely say that our protocol outperforms the other protocols in the cases where long-distance and/or high quality entanglement generation is required. It is also worth to mention that entanglement generated by protocol I always includes two types of non-negligible errors, which will affect its performance in the entanglement distillation stage.

In conclusion, we have proposed a realistic entanglement generation scheme for hybrid quantum repeaters, which outperforms the generation schemes proposed so far. More importantly, we have shown that our protocol achieves the optimal performance among all the schemes satisfying a couple of plausible conditions [(i) and (ii) above]. Due to these conditions, our argument does not exclude the possibility of a better protocol starting with an asymmetric state of the sender’s quantum memory, or one resulting in multiple types of errors possibly combined with a novel realistic distillation protocol that has yet to be discovered. Although such a protocol, if any, may be quite interesting, we believe it is unlikely and our protocol is indeed the best scheme for hybrid quantum repeaters. The performance of our scheme will also serve as a benchmark when one compares other types of quantum repeaters to hybrid quantum repeaters.

We would like to thank Kae Nemoto for communicating a detail of the paper (15). This work was supported by JSPS Grant-in-Aid for Scientific Research (C) 20540389 and by MEXT Grant-in-Aid for the Global COE Program and Young scientists (B) 20740232. K.A. and R.N. are supported by JSPS Research Fellowships for Young Scientists.

References

  1. C. H. Bennett et al., Phys. Rev. Lett. 70, 1895 (1993).
  2. A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
  3. H.-J. Briegel et al., Phys. Rev. Lett. 81,5932 (1998).
  4. W. Dür et al., Phys. Rev. A 59, 169 (1999).
  5. C. H. Bennett et al., Phys. Rev. Lett. 76, 722 (1996).
  6. D. Deutsch et al., Phys. Rev. Lett. 77, 2818 (1996).
  7. M. Zukowski et al., Phys. Rev. Lett. 71, 4287 (1993).
  8. L. M. Duan et al., Nature 414, 413 (2001).
  9. B. Zhao et al., Phys. Rev. Lett. 98, 240502 (2007).
  10. Z.-B. Chen et al., Phys. Rev. A 76, 022329 (2007).
  11. L. Jiang, J. M. Taylor, and M. D. Lukin, Phys. Rev. A 76, 012301 (2007).
  12. P. van Loock et al., Phys. Rev. Lett. 96, 240501 (2006).
  13. T. P. Spiller et al., New J. Phys. 8, 30 (2006).
  14. P. van Loock et al., quant-ph/0806.1153.
  15. W. J. Munro et al., Phys. Rev. Lett. 101, 040502 (2008).
  16. L. Childress et al., Phys. Rev. Lett. 96, 070504 (2006).
  17. L. Childress et al., Phys. Rev. A 72, 052330 (2005).
  18. This displacement is unnecessary if the controlled displacement, , between the memory and the optical mode is available to Alice and to Bob (15).
  19. D. Dieks, Phys. Lett. A 126, 303 (1988).
  20. I. D. Ivanovic, Phys. Lett. A 123, 257 (1987).
  21. A. Peres, Phys. Lett. A 128, 19 (1988).
  22. Ş. K. Özdemir et al., Phys. Rev. A 64, 063818 (2001).
  23. A. Divochiy et al., Nature Photonics 2, 302 (2008).
  24. C. Gobby, Z. L. Yuan, and A. J. Shields, Appl. Phys. Lett. 84, 3762 (2004).
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
""
The feedback must be of minumum 40 characters
Add comment
Cancel
Loading ...
107165
This is a comment super asjknd jkasnjk adsnkj
Upvote
Downvote
""
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters
Submit
Cancel

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test
Test description