Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Ternary logic in the optical controlled-SWAP gate based on Laguerre-Gaussian modes of light

Open Access Open Access

Abstract

The need set by a computational industry to increase processing power, while simultaneously reducing the energy consumption of data centers, became a challenge for modern computational systems. In this work, we propose an optical communication solution, that could serve as a building block for future computing systems, due to its versatility. The solution arises from Landauer’s principle and utilizes reversible logic, manifested as an optical logical gate with structured light, here represented as Laguerre-Gaussian modes. We introduced a phase-shift-based encoding technique and incorporated multi-valued logic in the form of a ternary numeral system to determine the similarity between two images through the free space communication protocol.

Published by Optica Publishing Group under the terms of the Creative Commons Attribution 4.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article's title, journal citation, and DOI.

1. Introduction

The recent COVID-19 pandemic accelerated the digital transformation and instantly digitized multiple life aspects on a massive scale. As has been already seen, post-pandemic life became an online-offline hybrid. Therefore, one crucial challenge for post-pandemics is increasing energy efficiency and promoting energy saving, which aligns with the Sustainable Development Goals defined by the United Nations in 2015 and summed up in 2023 [1].

This issue is tackled from multiple perspectives considering the ongoing technological development in various aspects. These efforts include the need to increase computer processing power [2] and provide alternative, more efficient ways to store digital data as for instance using DNA sequences [3,4]. However, as we continue proposing numerous solutions, we have to pay attention to their complementariness, so that all these efforts converge, to drive progress in a unified direction.

The proposed work focuses on developing new methods for optical communication, driven by the need set by a computational industry to continue increasing the capacity to transmit and process both quantum and classical information. One of the solutions comes up directly from Landauer’s principle [5,6] (experimentally proven in 2012 [7]), which places a minimum amount of energy dissipated for each irreversible operation (i.e., bit erasure) (Fig. 1 after [8]).

 figure: Fig. 1.

Fig. 1. Landauer’s principle, comparing the energy per bit operation for both irreversible and reversible computation.

Download Full Size | PDF

The only way to reach Landauer’s limit is to use reversible computation, where inputs can be reconstructed from their outputs. With computational demand on lowering the amount of energy per bit operation, we have to fundamentally change the principles we use to build computers: not only replace electrons with photons, but also implement reversible logic. As shown in [9], Landauer’s assumption can be broken through optical interference, acting as a reversible element.

The fundamental realization of reversible logic is the controlled-SWAP gate (c-SWAP or Fredkin gate) [10], which consists of two information channels and one control channel that determines if a swap (exchange of information between information channels) occurs or not. The existence of only one control channel leads to numerous potential quantum information protocols including error correction [11], fingerprinting [12,13] or chip processors [14]. On the other hand, one of the most promising optical communication solutions utilizes structured light, where the information is encoded in its Orbital Angular Momentum (OAM) [1517]. Based on these principles, numerous solutions have been proposed that involve not only straightforward modulation [18] but also OAM multiplexing [19,20] and multicasting [21]. In each of these examples, the information has been encoded in the OAM value. Recently, in contrast to these approaches, Urrego et. al. [22] proposed the c-SWAP optical gate that incorporates Laguerre-Gaussian (L-G) modes of light, where instead of the OAM value, the information has been encoded in the phase shift of the L-G mode, bringing the additional security into the communication protocol, where typical decoding methods based on the OAM content do not work [23].

In [24] authors modified the phase-shifting encoding/decoding algorithm and incorporated a faster modulation device. They overcame the necessity of bit-by-bit comparison, therefore determining the similarity of two signals propagating in the free space with kHz frequency. These two concepts successfully implemented another approach to optical communication with structured light, where information is encoded into a phase-shift, instead of the OAM value. However, to level the proposed reversible computation solution up to a reliable communication system, there is still a need to increase its computation capacity.

The promising further development is to implement multilevel logic, which, where optical protocols, in contrast to typical electrical transistors, do not require on/off states and binary data representation [25,26], It has already been shown that multilevel logic can efficiently be applied to various optical computation solutions [2731].

Such an aspect would parallel the fast speed benefits brought by the implementation of photons instead of electrons. Moreover, this could be a direct link to digital storage in DNA sequences, where multilevel logic is utilized to convert data from their digital to nucleotide representation [32].

In this work, we followed the phase-shifting encoding approach presented in [24], but instead of two, we used three distinguished states to encode the signal, therefore successfully equipping the communication protocol with ternary logic. We show that this approach not only increases the computational capacity of the protocol but also makes the whole system more secure - one signal cannot be directly deducted even if the other signal is known.

In the experimental validation, preceded by an analytical study on the possible multilevel solutions, we compare the performance of the ternary protocol with its binary version, showing that the protocol capacity has been significantly increased.

While the proposed solution utilizes classical light, due to its experimental fidelity, it can be straightforwardly extended to the quantum regime, inspiring quantum applications in future scenarios and transforming modern data processing.

2. Ternary message-passing protocol

In the proposed message-passing protocol, the Laguerre-Gaussian (LG) modes will act as message carriers. In the cylindrical coordinate system $(r,\phi,z)$ the complex amplitude of the $LG$ mode of topological charge $m$ can be expressed as (assuming $z=0$):

$$\mathrm{LG}_m (r,\phi) = C_m \left(\frac{r}{w_0}\right)^{|m|} \exp\left( -\frac{r^2}{w_0^2} \right)\exp(i m \phi),$$
where $w_0$ denotes the beam waist and $C_m$ is the normalizing constant.

Following the analytical expressions presented in [22] and [24], two messages are encoded in the phase shift $\alpha$ and $\beta$: $U_\alpha =A exp(i\alpha )$ and $U_\beta =B exp(i\beta )$ with amplitudes $A$ and $B$, acting on the LG modes having the same topological charge, but opposite handedness: $m_1=1$ and $m_2=-1$, respectively. Therefore, the field that enters the C-SWAP circuit having the horizontal polarization $\hat {x}$ can be expressed as:

$$\mathbf{E}(r,\phi)=\left[U_\alpha LG_1(r,\phi)+U_\beta LG_{{-}1}(r,\phi)\right]\mathbf{\hat{x}}.$$

Simplified as:

$$\mathbf{E}= \left[U_\alpha LG_1+U_\beta LG_{{-}1}\right]\mathbf{\hat{x}}.$$

The incoming field passes through the Hadamard gate, realized through the halfwave plate that sets the diagonal polarization acting as a control input (determines if the swap operation is performed):

$$\mathbf{E}= \left[U_\alpha LG_1+U_\beta LG_{{-}1}\right]\frac{\mathbf{\hat{x}}+\mathbf{\hat{y}}}{\sqrt{2}}$$
where $\hat {y}$ denotes the vertical polarization.

Further, the field enters the c-SWAP gate, performed by an unbalanced polarization Mach-Zehnder interferometer that splits it into separate polarization components and reverses the sign of L-G modes in one of them, therefore directly implementing the swap operation:

$$\mathbf{E}= \left[U_\alpha LG_1+U_\beta LG_{{-}1}\right]\frac{\mathbf{\hat{x}}}{\sqrt{2}} +[U_\alpha LG_{{-}1}+U_\beta LG_1]\frac{\mathbf{\hat{y}}}{\sqrt{2}}$$

Which is followed by the second Hadamard gate:

$$\mathbf{E}= (U_\alpha+U_\beta)(LG_1+LG_{{-}1})\frac{\mathbf{\hat{x}}}{2} +(U_\alpha-U_\beta)(LG_1-LG_{{-}1})\frac{\mathbf{\hat{y}}}{2}$$

Each polarization component can be separately detected through two power meters $P_x$ and $P_y$, where the output power:

$$\begin{aligned} P_x &\propto |U_\alpha+U_\beta |^{2},\\ P_y &\propto |U_\alpha-U_\beta|^{2}. \end{aligned}$$

If both encoded signals are equal, so that $\alpha =\beta$, then $U_\alpha =U_\beta$ and $P_y=0$, while $P_x=P_{\mathrm {in}}$. Where $P_{\mathrm {in}}$ represents the input power and any power losses due to propagation are omitted.

The concept of multilevel logic relies on the possibility of encoding the signal in either $\alpha$ or $\beta$ with the chosen phase value on the complex plane. This choice determines the smallest phase difference between subsequent elements in the preferred numeral system and it depends on the no. of values one can encode the signal through. Figure 2 presents three examples of such numeral systems, however, denser systems can be chosen, where the increment between subsequent logical states in the phase term is expressed as $\Delta \phi _{inc}=2\pi /n$, where $n$ denotes no. of logical states in the particular numeral system ($n=2$ determines binary, $n=3$ ternary and so on).

 figure: Fig. 2.

Fig. 2. The concept of multilevel phase encoding, where (a) presents the conventional binary encoding with [0, $\pi$] as bits [0, 1], (b) ternary encoding, where [0, $2\pi /3$, $4\pi /3$] stand for trits [0, 1, 2] and (c) quaternary, where [0, $\pi /2$, $\pi$, $3\pi /2$] represent quads [0, 1, 2, 3]. The blue circles indicate the chosen phase values, while the orange solid line shows the distance between all possible signal pairs.

Download Full Size | PDF

The denser the system, the more possible power outcomes. It strictly depends on the values of both signals that are about to be compared. In the proposed protocol, this is represented as the distance between the chosen phase states on the complex plane. As shown in Fig. 2 out of these examples, only the binary and ternary systems provide an equal distance between any possible pair. The no. of possible power levels increases with the $n$ showing an important feature of the phase encoding approach. One can switch between boolean and fuzzy logic depending on the chosen numeral system. The latter exists for the numeral system denser than ternary. However, to reduce the logic to boolean, one has to determine the threshold, below which the pair of signals will be considered as unequal.

To derive the expression for the threshold value we will consider only the detector $P_x$, as only one detector is required to determine the similarity of two signals [24]. The numerical simulations of the output field at the detector $P_x$ are presented in Fig. 3(a)-(c), where all possible combinations of $\alpha$ and $\beta$ are considered, for the chosen $n \in (2:4)$. Figure 3(d) presents the possible threshold level, determined by the increment $\Delta \phi _{inc}$, which sets the minimal distance between the neighboring logical states. The threshold value increases, as the $\phi$ gets smaller, and approaching maximum for $\phi _{inc}=0$ when both signals are equal ($\alpha =\beta$).

 figure: Fig. 3.

Fig. 3. The comparison of all available outputs of the field at the detector $P_x$ for (a) binary, (b) ternary, and (c) quaternary numeral system. (d) presents the possible threshold values, separating the unequal signals, when moving from fuzzy to boolean logic. All of the intensities are globally normalized.

Download Full Size | PDF

If we consider the Eq. (7) it is visible that the power value at $P_x$ depends on the interference of two plane waves $U_\alpha$ and $U_\beta$, having the same linear polarization and perfect coherence, propagating coaxially. Thus, it is proportional to:

$$\mathbf{E_{s}}=U_\alpha+U_\beta$$

The intensity $I=\langle \mathbf {E_{s}}\rangle {_t}$:

$$I= I_1 + I_2 +2 \sqrt{I_1 I_2}cos(\Delta \Phi)$$
where $I_1=\langle U_\alpha \rangle {_t}$, $I_2=\langle U_\beta \rangle {_t}$ and $\Delta \Phi =\alpha -\beta$. Assuming that the time-averaged intensities are equal $I_1=I_2=I_0$ and that the $I_0$ is the income intensity we get:
$$I= 2I_0 +2I_0cos(\Delta \Phi)$$

Thus, the output power $P_x\propto I$ relies on the phase term $\cos (\Delta \Phi )$. The boolean threshold can be determined as the $I$ value retrieved for the $\Delta \phi _{inc}$:

$$I(n)= 2I_0 +2I_0cos(\Delta \phi_{inc}(n))=2I_0+2I_0cos\left(\frac{2\pi}{n}\right)$$

Out of this, one can plot the dependence of the threshold for the subsequent numeral systems, which is shown in Fig. 4. This proves, that the protocol can operate with higher capacity, achieved by the higher density of values in subsequent numeral systems, as long as close power values are still distinguishable by the potential detector.

 figure: Fig. 4.

Fig. 4. The value of the boolean threshold for the chosen no. of logical states, determined by the particular numeral system.

Download Full Size | PDF

The main purpose of the presented protocol is to assess the similarity between two signals without disclosing their actual content. The security level escalates with the number of logical states. In systems denser than binary, deducing one signal from the other becomes nontrivial even if the latter is known and a third party has information about the similarity of individual elements in both signals. However, denser numeral systems provide additional experimental challenges related to the possibility of differentiating between subsequent power levels, assuming that the boolean logic is considered and the threshold has to be set. To challenge the current approach to data computing, the following paragraphs present experimental results concerning the implementation of optical ternary reversible logic for comparing sets of signals with structured light. Additionally, the truth tables for the controlled-SWAP gate for both binary and the ternary systems are presented in Supplement 1.

3. Image comparison and signal encoding

To present protocol capabilities, we determine the similarity of images and calculate the Hamming distance. This parameter measures the minimum number of substitutions required to make one signal equal to the other. In the following experiment, it directly corresponds to the number of dissimilar elements in compared signals.

This, however, serves only as an exemplary scenario. The presented protocol is capable of comparing any set of signals, not limited to image comparison. As a source of signals, we chose a set of images consisting of the Cameraman’s original image and its modified (distorted) versions.

The efficient way of comparing sets of images requires the application of a fingerprinting algorithm, which instead of comparing large datasets will reduce the task to fingerprint comparison. For that purpose, we implemented the hash algorithm, where each image was converted into its hash representation using the open-source perceptual hash algorithm based on 2-D discrete cosine transform [33]. The perceptual hashing algorithm can be reduced to just a few major steps. Firstly, the 2-D discrete cosine transform (D) of the input image $Img$ was calculated:

$$D = dct2(Img)$$

Then, the size of the DCT was reduced, so only the low-frequency content was preserved.

$$D = D(1:q,1:q),$$
where $q$ determines the size of a hash, for the input $Img$ of 256x256 px, the $q=8$ This was followed by the computation of the global mean D value:
$$Av_{D} = \frac{1}{q^2} \sum_{i=1}^{q} \sum_{j=1}^{q} D(i, j)$$
where $i$ and $j$ denote indices of the matrix. Finally, the binary hash $H$ was constructed:
$$H(i, j) = \begin{cases} 1 & \text{if } D(i, j) > Av_D \\ 0 & \text{otherwise} \end{cases}$$

The ternary hash $V$ can be deducted from its binary representation following the convention binary -> decimal -> ternary or by exchanging the last step of the algorithm to:

$$V(i, j) = \begin{cases} 2 & \text{if } D(i, j) > Av_D \\ 1 & \text{if } D(i, j) = Av_D \\ 0 & \text{if } D(i, j) < Av_D \end{cases}$$

Figure 5 presents both the exemplary images and their hashes. To prepare the sequence that could be sent with the protocol, the hash matrix was transformed into a vector (signal), by row sectioning. We remind, that while we use numbers to represent logical values, they correspond to phase shift values, as shown in Fig. 2.

 figure: Fig. 5.

Fig. 5. The process of image hashing. (a) Original image, (b) its binary hash, (c) image hash in a ternary basis. Blue and orange stripes were used as indicators of binary (blue) and ternary (orange) domains.

Download Full Size | PDF

In the subsequent step, each element of the created signal is encoded in the proper L-G mode and then two opposite L-G modes are superposed to make the final hologram. Therefore, the number of holograms corresponds to the no. of elements N in a particular hash sequence. While in this experiment we overlapped two L-G modes numerically, the same can be achieved through beam separation, where each L-G mode will be encoded separately to be later superposed, as in [24]. These two approaches share the same concept.

While we decided to use the protocol to compare two images, the range of applications is much broader. The next paragraph discusses the general message-passing protocol procedure, which can compare any signals, as long as they are represented in either binary or ternary logic.

4. Experiment

The experimental setup, shown in Fig. 6(a), realizes the controlled-SWAP through the modified polarization Mach-Zehnder interferometer, with uneven no. of reflections in both arms (2 for the top and 5 for the bottom arm). However, the swap operation can also be achieved with other methods, including a tilted lens [34] or diffraction grating [35].

 figure: Fig. 6.

Fig. 6. (a) The experimental setup. (b) The raw signal registered by the oscilloscope for a single detected packet (black), moving average calculated over the raw signal (blue), the detected peak values of the moving average (light blue).

Download Full Size | PDF

The expanded laser beam with horizontal polarization illuminates the Digital Micromirror Device (DMD), which encodes the beam by displaying the superposition of two opposite L-G modes. Each possesses the signal encoded as their phase shift. The complex DMD phase-amplitude modulation has been achieved with the Lee method [36,37] and the final hologram has been displayed on the DMD. The reflected 1st order of diffraction was further propagated towards the interferometer. The half-wave plate (HWP1) acts as a first Hadamard gate and sets the diagonal polarization which is further split into horizontal and vertical counterparts by the polarization beam splitter (PBS1). The bottom arm of the interferometer, containing the vertical polarization component has an additional phase delay consisting of M1 and M2 mirrors mounted on the motorized stage, that controls the interference contrast at the detector. The bottom beam further propagates to the M3 mirror and reaches the second polarization beam splitter (PBS2). The upper beam experiences two reflections from M4 and M5 mirrors until it meets the bottom beam in the PBS2. After the PBS2 beams reach second Hadamard gates, realized through half-wave plates HWP2 and HWP3, respectively. At the last stage, orthogonally sets polarizers P1 and P2 implement vertical and horizontal polarization, respectively. The output signal is collected by the photodiode power sensor PM1 and PM2 which together with the sensor’s console transmits the analog signal to the oscilloscope. The example dataset registered by the Oscilloscope for PM1 is presented in Fig. 6(b). By incorporating local reference signals, we achieved the local normalization of the protocol response, which overcomes the air fluctuations affecting the measurement. Depending on the phase delay introduced by M1 and M2 mirrors, one can choose either PM1 or PM2 will perform the overlap analysis. As has been shown in [24], both detectors are complementary, but one is enough to provide a sufficient analysis. The detailed alignment as well as the protocol procedure can be found in Supplement 1.

Figure 6(b) shows the raw experimental signal, together with the moving average values on the top of it. The length of the moving average window is determined as the half-width of the reference signal. To further determine the overlap OP between two sent messages, we detected the moving average peak values, here representing the mean power detected by the oscilloscope in each packet (Fig. 6)b. In such a scenario, the overlap $OP$ of two signals can be calculated based on the mean signal value $P_{sig}$ in reference to $0{\%}$ and $100{\%}$ power values, $P_{0}$ and $P_{100}$, respectively:

$$OP=\frac{P_{sig}}{|P_{100}-P_{0}|} *100{\%}$$

This straightforwardly leads to the Hamming distance $HD$, which can be determined as:

$$HD=(100{\%}-OP)*N$$
where N denotes the no. of elements in the hash sequence.

5. Results

To examine the protocol performance we compared a series of images consisting of an original Cameraman image and its distorted versions. Each time, the original image (Fig. 7(a)) was compared with its distorted counterpart (Fig. 7(b)-(d)), both represented as hash fingerprints in either binary (blue stripe) or ternary (orange strap) basis. Figure 7 presents both images, their hashes in each basis, as well as experimental results given by the Hamming distance (HD).

 figure: Fig. 7.

Fig. 7. Comparison of various images with their original counterpart. Bottom subfigures present a cluster, where each distorted image is followed by its hashes in binary (blue stripe) and ternary (orange stripe) basis. Each cluster presents the theoretical $HD_T$ and experimental $HD_E$ Hamming distance, for both binary (blue stripe) and ternary (orange stripe) signal comparison. (a) The original, (b) distorted through the motion filter, (c) disk filter, and (d) disk filter and translation.

Download Full Size | PDF

The distortion was caused by the numerical image filtering and geometrical transforms. In particular, we applied the motion filter (Fig. 7(b), disk filter (Fig. 7(c)), and disk filter followed by image translation (Fig. 7(d)) [38].

The theoretical HD $HD_T$ was calculated numerically summing up no. of dissimilar elements in compared signals:

$$HD_T = \sum_{i=1}^{N} \begin{cases} 0 & \text{if } S_1[i] = S_2[i] \\ 1 & \text{if } S_1[i] \neq S_2[i] \end{cases}$$
where $N$ denotes length of the signal and $S_1$ and $S_2$ represent two signals that are being compared.

The experimental HD $HD_E$ is calculated based on the Eq. (18) using the measured experimental signal. The length of signals was equal to N=64 for binary hash and N=40 for ternary hash. Each element of the signal has been displayed for 200 $\mu$s, corresponding to a 5kHz modulation frequency. This sets the value of the averaging filter, which was adjusted to match the length of a signal and started from the first non-0 element of Ref 0${\%}$. In each case, the retrieved HD matched its expected value, when rounded to the closest integer. Because HD cannot be fractional, each time the experimentally retrieved $HD_E$ matches its theoretical value $HD_T$.

Each of the free space communication systems, especially if based on interferometry, is sensitive to the environmental conditions that may affect its stability. In particular, mechanical vibrations and air fluctuations may cause power variation at the detector. In the proposed solution, we overcome this issue by providing local references. Thus, in the given example, for a ternary basis, the similarity of two images is determined in less than 0.04s, without further post-processing.

We performed the stability test, where reference signals Ref 0${\%}$ and Ref $100{\%}$ were displayed one after another for the 120s and the beam propagation distance across the setup did not exceed 3 meters. The standard deviation of the power difference between detected power values was less than 3${\%}$, which in this example indicates that the system was stable for the period 3 000 times longer than required for the discussed series of measurements. The provided local reference algorithm made the protocol much less sensitive to environmental challenges, thus the maximum overlap error we registered was less than $2{\%}$. Estimated as the difference between obtained and expected value.

Based on the above parameters, 5kHz modulation frequency leads to 0.63 KB/s transmission capacity (excluding reference signals). If the given binary signal is represented in a ternary basis and the same modulation frequency is used this capacity increases to 0.97 KB/s, giving an approximate 1.5x speedup factor. This does not require any setup adjustment. The factor arises directly from the $\log _2 k$ calculation, where $k$ denotes the numeral system. In the given scenario, $k=3$. Therefore, the capacity here is mainly limited by the choice of the encoder, here the DMD. It is expected, that the following technique can be combined with the faster modulators, leading to a capacity in the range of Gbps.

6. Conclusion

Implementation of reversible logic in the computational industry is considered one of the most promising solutions to reduce the energy consumption per logical operation. In this work, we demonstrated that reversible logic can be successfully implemented with structured light, proposing a novel communication protocol based on ternary phase-shifting encoding, where information remains inaccessible at any point. Through the experimental example, we determined the Hamming Distance between pairs of images, represented by their hash fingerprints in both binary and ternary logic.

This study has the potential to inspire quantum solutions with analogous architecture and can be practically applied in photonic circuits [39]. The versatility of reversible logic in optical computing systems is highlighted by its ability to construct various logical gates using combinations of C-SWAP or CNOT gates, owing to their universality [40]. Integrating ternary logic into these systems positions them as excellent candidates to complement DNA data storage, as digital data-to-DNA conversion algorithms often require ternary approaches [3].

The encoding procedure can be realized externally through acousto- or electro-optic modulators, shifting the phase and thus encoding the information with higher frequency. Another approach could combine phase-shifting encoding with OAM [41]. Additionally, if the free space operating regime is maintained, it is possible to spatially stack the protocol and simultaneously compare various sets of signals within a single optical system.

Funding

Narodowe Centrum Nauki (2022/45/B/ST7/01234).

Disclosures

The authors declare no conflicts of interest.

Author contributions. D.L.M. proposed the idea, M.S. and J.M. designed the experiment. K.M. developed the data analysis code, P.L. and J.W. built the experimental setup and analyzed the data, P.L. prepared the experimental setup figure. D.L.P and J.M. consulted the results and revised the manuscript, M.S. supervised the project, and prepared the manuscript. All authors discussed the results and the final version of the manuscript.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Supplemental document

See Supplement 1 for supporting content.

References

1. E. Birney, “United Nations Department of Economic and Social Affairs,” The Sustainable Development Goals Report 2023: Special Edition (United Nations, 2023).

2. P. Jiang, Y. V. Fan, and J. J. Klemeš, “Impacts of COVID-19 on energy demand and consumption: Challenges, lessons and emerging opportunities,” Appl. Energy 285, 116441 (2021). [CrossRef]  

3. N. Goldman, P. Bertone, S. Chen, et al., “Towards practical, high-capacity, low-maintenance information storage in synthesized DNA,” Nature 494(7435), 77–80 (2013). [CrossRef]  

4. K. Matange, J. M. Tuck, and A. J. Keung, “DNA stability: a central design consideration for DNA data storage systems,” Nat. Commun. 12(1), 1358 (2021). [CrossRef]  

5. R. Landauer, “Irreversibility and Heat Generation in the Computing Process,” IBM J. Res. Dev. 5(3), 183–191 (1961). [CrossRef]  

6. R. Landauer, “Dissipation and noise immunity in computation and communication,” Nature 335(6193), 779–784 (1988). [CrossRef]  

7. A. Bérut, A. Arakelyan, A. Petrosyan, et al., “Experimental verification of Landauer’s principle linking information and thermodynamics,” Nature 483(7388), 187–189 (2012). [CrossRef]  

8. S. Kurinec and S. Walia, Energy Efficient Computing & Electronics (CRC Press, 2019).

9. R. Hamerly, L. Bernstein, A. Sludds, et al., “Large-Scale Optical Neural Networks Based on Photoelectric Multiplication,” Phys. Rev. X 9(2), 021032 (2019). [CrossRef]  

10. E. Fredkin and T. Toffoli, “Conservative logic,” Int. J. Theor. Phys. 21(3-4), 219–253 (1982). [CrossRef]  

11. D. G. Cory, M. D. Price, W. Maas, et al., “Experimental quantum error correction,” Phys. Rev. Lett. 81(10), 2152–2155 (1998). [CrossRef]  

12. H. Buhrman, R. Cleve, J. Watrous, et al., “Quantum fingerprinting,” Phys. Rev. Lett. 87(16), 167902 (2001). [CrossRef]  

13. B. Wang and L.-M. Duan, “Implementation scheme of controlled swap gates for quantum fingerprinting and photonic quantum computation,” Phys. Rev. A 75(5), 050304 (2007). [CrossRef]  

14. Y. Li, L. Wan, H. Zhang, et al., “Quantum Fredkin and Toffoli gates on a versatile programmable silicon photonic chip,” npj Quantum Inf. 8(1), 112 (2022). [CrossRef]  

15. A. E. Willner, H. Huang, Y. Yan, et al., “Optical communications using orbital angular momentum beams,” Adv. Opt. Photonics 7(1), 66 (2015). [CrossRef]  

16. N. K. Fontaine, R. Ryf, H. Chen, et al., “Laguerre-Gaussian mode sorter,” Nat. Commun. 10(1), 1865 (2019). [CrossRef]  

17. J. Wang, J. Liu, S. Li, et al., “Orbital angular momentum and beyond in free-space optical communications,” Nanophotonics 11(4), 645–680 (2022). [CrossRef]  

18. F. Zhu, S. Huang, W. Shao, et al., “Free-space optical communication link using perfect vortex beams carrying orbital angular momentum (OAM),” Opt. Commun. 396, 50–57 (2017). [CrossRef]  

19. L. Gong, Q. Zhao, H. Zhang, et al., “Optical orbital-angular-momentum-multiplexed data transmission under high scattering,” Light: Sci. Appl. 8(1), 27 (2019). [CrossRef]  

20. Z. Wan, Y. Shen, Z. Wang, et al., “Divergence-degenerate spatial multiplexing towards future ultrahigh capacity, low error-rate optical communications,” Light: Sci. Appl. 11(1), 144 (2022). [CrossRef]  

21. S. Fu, Y. Zhai, H. Zhou, et al., “Demonstration of free-space one-to-many multicasting link from orbital angular momentum encoding,” Opt. Lett. 44(19), 4753 (2019). [CrossRef]  

22. D. F. Urrego, D. Lopez-Mago, V. Vicuña-Hernández, et al., “A quantum-inspired Fredkin gate based on spatial modes of light,” Opt. Express 28(9), 12661–12674 (2020). [CrossRef]  

23. C. Kai, Z. Feng, M. I. Dedo, et al., “The performances of different OAM encoding systems,” Opt. Commun. 430, 151–157 (2019). [CrossRef]  

24. M. Szatkowski, J. Koechlin, and D. Lopez-Mago, “Implementation of a simultaneous message-passing protocol using optical vortices,” Opt. Laser Technol. 133, 106516 (2021). [CrossRef]  

25. R. Athale and D. Psaltis, “Optical Computing: Past and Future,” Opt. Photonics News 27(6), 32–39 (2016). [CrossRef]  

26. V. Sasikala and K. Chitra, “All optical switching and associated technologies: a review,” J. Opt. 47(3), 307–317 (2018). [CrossRef]  

27. Y. Imai and Y. Ohtsuka, “Optical multiple-output and multiple-valued logic operation based on fringe shifting techniques using a spatial light modulator,” Appl. Opt. 26(2), 274 (1987). [CrossRef]  

28. Y. Jin, H. He, and Y. Lü, “Ternary optical computer architecture,” Phys. Scripta T 2005, 98–101 (2005). [CrossRef]  

29. X. Sun, S. Park, D. S. Shin, et al., “Multi-level recording of photochromic indolylfulgide,” Opt. Mater. 30(4), 652–656 (2007). [CrossRef]  

30. X. Zhou and J. Yu, “Multi-Level, Multi-Dimensional Coding for High-Speed and High-Spectral-Efficiency Optical Transmission,” J. Lightwave Technol. 27(16), 3641–3653 (2009). [CrossRef]  

31. G. Mourgias-Alexandris, C. Vagionas, A. Tsakyridis, et al., “All-optical 10Gb/s ternary-CAM cell for routing look-up table applications,” Opt. Express 26(6), 7555 (2018). [CrossRef]  

32. H. H. Lee, R. Kalhor, N. Goela, et al., “Terminator-free template-independent enzymatic dna synthesis for digital information storage,” Nat. Commun. 10(1), 1 (2019). [CrossRef]  

33. E. Klinger and D. Starkweather, “The open source perceptual hash library,” https://www.phash.org. Accesss: 2023-01-16.

34. M. Luo, Z. Zhang, D. Shen, et al., “Orbital angular momentum of the vortex beams through a tilted lens,” Opt. Commun. 396, 206–209 (2017). [CrossRef]  

35. M. Mohagheghian and S. Ghavami Sabouri, “Switching the sign of the topological charge of vortex beams via changing the fork grating resolution,” Opt. Laser Technol. 157, 108641 (2023). [CrossRef]  

36. W.-h. Lee, “Binary computer-generated. holograms,” Appl. Opt. 18(21), 3661–3669 (1979). [CrossRef]  

37. D. B. Conkey, A. M. Caravaca-Aguirre, and R. Piestun, “High-speed scattering medium characterization with application to focusing light through turbid media,” Opt. Express 20(2), 1733 (2012). [CrossRef]  

38. T. Acharya and A. K. Ray, Image Processing (John Wiley & Sons, 2005).

39. T. Ono, R. Okamoto, M. Tanida, et al., “Implementation of a quantum controlled-SWAP gate with photonic circuits,” Sci. Rep. 7(1), 45353 (2017). [CrossRef]  

40. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, 2000).

41. N. Zhao, X. Li, G. Li, et al., “Capacity limits of spatially multiplexed free-space communication,” Nat. Photonics 9(12), 822–826 (2015). [CrossRef]  

Supplementary Material (1)

NameDescription
Supplement 1       Supplement 1

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (7)

Fig. 1.
Fig. 1. Landauer’s principle, comparing the energy per bit operation for both irreversible and reversible computation.
Fig. 2.
Fig. 2. The concept of multilevel phase encoding, where (a) presents the conventional binary encoding with [0, $\pi$] as bits [0, 1], (b) ternary encoding, where [0, $2\pi /3$, $4\pi /3$] stand for trits [0, 1, 2] and (c) quaternary, where [0, $\pi /2$, $\pi$, $3\pi /2$] represent quads [0, 1, 2, 3]. The blue circles indicate the chosen phase values, while the orange solid line shows the distance between all possible signal pairs.
Fig. 3.
Fig. 3. The comparison of all available outputs of the field at the detector $P_x$ for (a) binary, (b) ternary, and (c) quaternary numeral system. (d) presents the possible threshold values, separating the unequal signals, when moving from fuzzy to boolean logic. All of the intensities are globally normalized.
Fig. 4.
Fig. 4. The value of the boolean threshold for the chosen no. of logical states, determined by the particular numeral system.
Fig. 5.
Fig. 5. The process of image hashing. (a) Original image, (b) its binary hash, (c) image hash in a ternary basis. Blue and orange stripes were used as indicators of binary (blue) and ternary (orange) domains.
Fig. 6.
Fig. 6. (a) The experimental setup. (b) The raw signal registered by the oscilloscope for a single detected packet (black), moving average calculated over the raw signal (blue), the detected peak values of the moving average (light blue).
Fig. 7.
Fig. 7. Comparison of various images with their original counterpart. Bottom subfigures present a cluster, where each distorted image is followed by its hashes in binary (blue stripe) and ternary (orange stripe) basis. Each cluster presents the theoretical $HD_T$ and experimental $HD_E$ Hamming distance, for both binary (blue stripe) and ternary (orange stripe) signal comparison. (a) The original, (b) distorted through the motion filter, (c) disk filter, and (d) disk filter and translation.

Equations (19)

Equations on this page are rendered with MathJax. Learn more.

L G m ( r , ϕ ) = C m ( r w 0 ) | m | exp ( r 2 w 0 2 ) exp ( i m ϕ ) ,
E ( r , ϕ ) = [ U α L G 1 ( r , ϕ ) + U β L G 1 ( r , ϕ ) ] x ^ .
E = [ U α L G 1 + U β L G 1 ] x ^ .
E = [ U α L G 1 + U β L G 1 ] x ^ + y ^ 2
E = [ U α L G 1 + U β L G 1 ] x ^ 2 + [ U α L G 1 + U β L G 1 ] y ^ 2
E = ( U α + U β ) ( L G 1 + L G 1 ) x ^ 2 + ( U α U β ) ( L G 1 L G 1 ) y ^ 2
P x | U α + U β | 2 , P y | U α U β | 2 .
E s = U α + U β
I = I 1 + I 2 + 2 I 1 I 2 c o s ( Δ Φ )
I = 2 I 0 + 2 I 0 c o s ( Δ Φ )
I ( n ) = 2 I 0 + 2 I 0 c o s ( Δ ϕ i n c ( n ) ) = 2 I 0 + 2 I 0 c o s ( 2 π n )
D = d c t 2 ( I m g )
D = D ( 1 : q , 1 : q ) ,
A v D = 1 q 2 i = 1 q j = 1 q D ( i , j )
H ( i , j ) = { 1 if  D ( i , j ) > A v D 0 otherwise
V ( i , j ) = { 2 if  D ( i , j ) > A v D 1 if  D ( i , j ) = A v D 0 if  D ( i , j ) < A v D
O P = P s i g | P 100 P 0 | 100 %
H D = ( 100 % O P ) N
H D T = i = 1 N { 0 if  S 1 [ i ] = S 2 [ i ] 1 if  S 1 [ i ] S 2 [ i ]
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.