† Corresponding author. E-mail:
Project supported by the National Natural Science Foundation of China (Grant No. 61300203).
It is striking that the quantum Zeno effect can be used to launch a direct counterfactual communication between two spatially separated parties, Alice and Bob. So far, existing protocols of this type only provide a deterministic counterfactual communication service. However, this counterfactuality should be payed at a price. Firstly, the transmission time is much longer than a classical transmission costs. Secondly, the chained-cycle structure makes them more sensitive to channel noises. Here, we extend the idea of counterfactual communication, and present a probabilistic-counterfactual quantum communication protocol, which is proved to have advantages over the deterministic ones. Moreover, the presented protocol could evolve to a deterministic one solely by adjusting the parameters of the beam splitters.
Quantum communication is now widely accepted to be one of the most promising candidates in future quantum technology. Using quantum mechanics, several amazing tasks, such as dense coding,[1,2] teleportation[3,4] and counterfactual quantum key distribution,[5,6] are naturally achieved. Since the invention of quantum key distribution (QKD) protocol, i.e., the BB84 protocol,[7] quantum communication has enjoyed great success with both theoretical and commercial aspects. One of the most significant contributions, which is impossible to be achieved by classical means, is counterfactual quantum communication. It enables two remote parties, Alice and Bob, to exchange messages without transmitting any information carriers.
The idea of counterfactual quantum communication was initialized by interaction-free measurement,[8–10] with the impressive phenomenon that an object can be detected without being intuitively measured. The first example, presented by Noh,[5] was realized in a QKD protocol. Later, we announced a variant adapted to the deterministic key distribution scenario.[11] In sharp contrast to conventional QKD schemes, these protocols are counterintuitive that the quantum states, served as the information carriers, never travel through the channel. A translated no-cloning theorem prevents the eavesdroppers from getting any information of the private key. A strict security proof of Noh’s protocol (Noh09 protocol) was presented by Yin et al.[12] We further proved that, although this protocol is secure under a general intercept-resend attack in an ideal mode, the practical security could be compromised due to the dark count rate and low efficiency of the detectors.[13] Surprisingly, we also found that Eve could get full information of the key from a real implementation by launching a counterintuitive trojan horse attack.[14] Since the rate of information photons in the Noh09 protocol, only up to 12.5% in an ideal setting, is not satisfactory, Sun and Wen improved it to reach 50% using an iterative module.[6] Experimental verifications of the Noh09 protocol have also been reported.[15,16]
Most interestingly, the topic of counterfactual quantum communication (CQC), has been repainted by Salih et al., who claimed a new protocol (SLAZ2013 protocol) with a better rate, using the quantum Zeno effect.[17,18] They also announced a tripartite counterfactual quantum key distribution protocol,[19] to improve the counterfactuality and security of a previous scheme by Akshata Shenoy et al.[20] Other interesting applications, such as semi-counterfactual quantum cryptography,[21] counterfactual quantum-information transfer,[22] are also found in recent papers.[19,20]
Although conventional CQC protocols based on the quantum Zeno effect, such as the SLAZ2013 protocol, are supposed to be more efficient than early versions, there are unexpected side-effects directly induced by the chained-cycle structure. Firstly, the transmission time could be multiplied by the number of the cycles, since a photon pulse should travel through all the cycles before it is detected by the legitimate detectors. In other words, the time taken by transferring a single bit might be much longer than a classical transmission may cost, even though Alice and Bob stand close to each other. Secondly, these schemes seem to be more sensitive to channel noises (concerning only those blocking the channel), since the transmission time is systematically multipled. In Ref. [17], it was estimated that an acceptable noise rate only reaches 0.2%.
Motivated by removing the above side effects, we extend the idea of ‘counterfactual’, and consider a new paradigm, namely probabilistic counterfactual quantum communication (PCQC). Here, we use the word 'probabilistic' to define the purity of the counterfactuality. Specifically, a deterministic counterfactual communication scheme is one in which none of the information-carriers travels through the channel. However, in a probabilistic one, there is a non-zero probability for a carrier passing the channel. The idea mostly contributes to bridging the gaps between the classical and deterministic counterfactual communication schemes. In classical communications, all information carriers must pass the channel. In contrast, they are never allowed to do so in a deterministic counterfactual communication scheme. However, in a PCQC protocol, they might travel through the channel with uncertainty. It naturally follows that existing counterfactual quantum communication schemes fall into the paradigm of deterministic ones. For instance, Noh’s protocol[5] is a deterministic one on that no information-carrier goes through the channel, though it produces a probabilistic (or random) key. In this paper, we present a PCQC protocol, in which the chained structure is removed, thus the transmission time is greatly reduced and the sensitivity to channel noises is simultaneously degraded.
The rest of the paper is organized as follows. In Section
Before the protocol is introduced, it is necessary to define the probabilistic counterfactual communications. Figure
We should note that the information carriers in counterfactual and probabilistic counterfactual communications are supposed to be quantum photons, which are well known for their wave-particle duality.[23] We argue that the counterfactuality should only be referred to the particle-property of the quantum photons. Otherwise, it is difficult to determine whether a protocol is counterfactual or not. There have been controversies around the topic of ‘counterfactual’ in recent papers.[24–27] For example, the SLAZ2013 protocol seems to be not counterfactual for some results, i.e., logic 0, according to the trace definition proposed by Vaidman.[27] Also, one may argue that Noh’s protocol[5] is not counterfactual based on the following fact. As demonstrated by a quantum delayed choice experiment,[28] it is Bob’s operation choice (blocking or passing) that determines the path where the photon finally travels. Before he made his choice, the photon, if observed as a wave, would exist in all paths of the interferometer, otherwise, quantum interference would never take place. Therefore, things become more complex than we ever expected, if counterfactuality and wave function are both concerned. Here, in Table
In previous schemes,[5,6,17] it is known that projective measurement is important to perform deterministic counterfactual computations and communications, since the information that whether the photon passes the channel can be obtained from the detection results. Figure
First, we give a brief introduction of the SLAZ2013 protocol. To achieve the goal of counterfactuality, a chained quantum Zeno effect, acting as the core principle, is introduced by employing a series of beam splitters and mirrors. Correspondingly, the optical circuit is divided into two types of cycles, i.e., the outer cycle and inner cycle shown in Ref. [17]. At the very beginning, a photon, which has nothing to do with the information bit, is injected by the source, and enters the input port of the outer cycle. The other thing Alice has to do is to observe which of her detectors, D1 and D2, clicks. At Bob’s end, he just chooses to block (pass) the photon, if logic “1” (“0”) is selected to be transmitted. Let us see how Alice knows the transmitted bit. When “0” is selected, two events, denoted by E1 and E2 can be observed by Alice:
(E1) The photon has been caught in detector D1. (E2) The photon has been caught in detector D3.
Note that E2 implies that the photon must have gone through the channel. Therefore, E2 should be discarded. Similarly, when “1” is selected, events E3 and E4 can be observed:
(E3) The photon has been caught in detector D2. (E4) The photon has been caught in detector D4.
Again, E4, which goes against the counterfactuality, is discarded. Indeed, the quantum Zeno effect has an important role in both events E1 and E3, however, one should note that the chained-cycle structure ievitably increases the time of transmitting a single bit.
The experimental setup shown in Fig.
(1) |
In Alice’s station, a horizontally polarized (H) photon is emitted by the source, and it certainly arrives at SM, which is switched off initially to allow the photon to be transmitted but it then remains on for M cycles, and is turned off again after M cycles are completed. Due to the polarization rotation by SPR, the photon will either be reflected or transmitted by PBS1. If the photon is not blocked by the SW at Bob’s end, it will return to the SM and repeat the travel in a new cycle. Otherwise, the protocol will be restarted. The iterative module and Bob’s station comprise a Michelson-type interferometer, in which quantum interference can be observed. Here, the combination of PBS1 and the SPR cooperate with each other as a beam splitter. Therefore, the presented setup can be translated to a Mach–Zehnder type interferometer shown in Fig.
Now, we explain why this router works and show the principle of the presented protocol in detail. When Bob passes the photon, representing the fact that Bob chooses logic 0, quantum interference immediately takes place in the presented interferometer. Explicitly, in each cycle, if the photon leaving SPR is reflected by PBS1, it enters the iterative module and returns to PBS1 with certainty owing to the interference (the phase difference is π radians between the two output paths of each BS). In other words, the photon will neither be detected by Bob nor by the detectors in the iterative module. In this sense, the Michelson-type interferometer is equivalent to the router FR with all its SWs on. From Fig.
When Bob blocks the photon, the interference in the iterative module is destroyed. Therefore, it is most probably that a photon exiting PBS1 is detected by Bob’s detector D4 or one of the detectors in the iterative module (D3(1), D3(2), …, D3(N)). In my previous work,[14] it is shown that the conditional occurrence rate of this event is obtained by
(2) |
(3) |
Here, we define that t0≡ 1. Obviously, the Pab approaches 1 asymptotically with N→ ∞. Correspondingly, in Fig.
(4) |
Since the equivalent optical distance between Alice and Bob, Deq, is only M*L, where L denotes the practical distance, (that is D eq = M*N*L for SLAZ2013) the transmission time, i.e., t = Deq/c, has been reduced by a factor of N, which is a great step forward to implementing direct quantum counterfactual communication in real-life channels. Here, c denotes the light speed. Intuitively, the sensitivity to channel noises is degraded, since the equivalent communication distance is greatly shortened. Analysis of the robustness against channel noises will be presented in this section. Another advantage is that the counterfactuality rate of the procotol is improved, in contrast with the SLAZ2013 protocol.
Here, the counterfactuality rate, denoted by C, is defined by the probability of a successful communication featured with no transmission of information carriers. In a deterministic scheme, it is usually given by a tuple C = (C0, C1). Here, C0 and C1 represent the counterfactuality rates for the signals 0 and 1, respectively. Obviously, Ci (i = 0,1) varies from 0 to 1, and perfect counterfactual communication is available if and only if Ci = 1 (i = 0,1). For the SLAZ2013 protocol, C0(1) equals to the detection rate P1(2), which is given by |x(y)M|2 (see Ref. [17] for more details). Also, this protocol achieves perfect counterfactuality when N and M approach infinity, leading to C1→(1, 1), i.e., P1→ 1 and P2→ 1. However, in the presented protocol, the counterfactual rate C0 could not be given by the detection rate, due to the absence of projective measurement. Fortunately, it can be estimated from its quantum description, which is a superposition of all possible paths.
Now, we begin to calculate the counterfactuality rates of the presented protocol. When Bob blocks the channel (logic ‘1’), deterministic counterfactual communication takes place. Therefore, C1 is directly given by the detection rate of detector D2, i.e.,
(5) |
Obviously, perfect counterfactuality is achievable for signal “1”, when M approaches infinity.
In the case of Bob passing the photon (logic ‘0’), it is impossible to determine C0 from the detection rate of detector D1, since there are probabilistic counterfactual events here. Therefore, C0 should be estimated from the superposition state of each cycle. In Fig.
(6) |
Obviously, equations (
We have loosely plotted the counterfactuality rate C0, illustrating how it varies as a function of M. In Fig.
At last, we concluded the detector rates, Prob{D1 clicks} and Prob{D2 clicks}, which are given by
(7) |
(8) |
The difference between Eq. (
Here, the robustness of the presented protocol is only investigated in a most representative scenario that the channel noise acts as an obstacle which definitely registers an event of “Block”. Errors only occur in the case of Bob choosing to pass the photon, where interference is destroyed by noises. Remarkably, for the presented protocol, the presence of noises definitely induces errors as well as an increase of the probability that detector D3(j), (j = 1, 2, …, N) clicks, which independently discounts the performance of the protocol.
When Bob passes the photon, it will produce a click of detector D2 with certainty owing to quantum interference, if the channel is noiseless. Let us see what happens when a “block” in one cycle is triggered by the noise other than Bob. Without loss of generality, we assume that the channel of the i-th cycle is blocked due to the noise. Given that the state of the i-th cycle is |φ〉i = xi|10〉 + yi|01〉, the quantum state after the (i + 1)-th BS is written as
(9) |
Next, it is necessary to fix the rate “c” with given parameters of the module. Suppose that a photon is reflected by PBS1 in the i-th cycle, it is easy to conclude the probability that it is reflected back to PBS1 by one of the mirrors in the module as
(10) |
(11) |
(12) |
Although the side-effect of the chained quantum Zeno effect is greatly reduced by the iterative module, another arises from this component. When Bob chooses to block the photon, it is likely in a single cycle that he cannot capture it, even if it enters the module, since the photon could be reflected by one of the mirrors in the module, i.e., MR1, MR2,…, MRN, and returns back to PBS1 (the conditional probability told by Eq.
It is impossible to directly apply this protocol or SLAZ2013-like ones to secure communications, such as quantum key distribution. The central problem is that a no-cloning theorem is not included in principle. In these protocols, only orthogonal states, say, |φ0〉 and |φ1〉, are employed. Fortunately, it is not difficult to make them secure. All one should do is to change the pure states into nonorthogonal mixed states, i.e., Tr[ρ0 ρ1] ≠ 0. For example, the Noh09 protocol is of this kind. Here, we also highlight an open question that whether it is possible to explore unconditional security directly from the quantum Zeno effect, thus leading to a new paradigm outperforming existing quantum key distribution schemes.
In summary, we have opened the door of probabilistic counterfactual quantum communication. Generally, a high counterfactuality rate can be achieved with less resources, in contrast with previous schemes based on the chained quantum Zeno effect. Also, we should point out that this protocol is not symmetrical, since probabilistic counterfactual communication only occurs when the quantum interference remains. It is a challenge whether this symmetry could help to further reduce the transmission time.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] |