Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Quantum fingerprinting using two-photon interference

Open Access Open Access

Abstract

We present a quantum fingerprinting protocol relying on two-photon interference which does not require a shared phase reference between the parties preparing optical signals carrying data fingerprints. We show that the scaling of the protocol, in terms of transmittable classical information, is analogous to the recently proposed and demonstrated scheme based on coherent pulses and first-order interference, offering comparable advantage over classical fingerprinting protocols without access to shared prior randomness. We analyze the protocol taking into account non-Poissonian photon statistics of optical signals and a variety of imperfections, such as transmission losses, dark counts, and residual distinguishability. The impact of these effects on the protocol performance is quantified with the help of Chernoff information.

© 2017 Optical Society of America

1. Introduction

The use of quantum mechanical superposition states allows one to reduce the communication complexity in certain tasks involving distributed information processing. A seminal example has been provided by Buhrman et al. with the quantum fingerprinting protocol [1], where a Referee is tasked with deciding whether bit strings in possession of two separate parties, Alice and Bob, are identical or different. If Alice and Bob can sent to Referee quantum systems prepared in superposition states rather than orthogonal ones that can carry only classical information, the resource scaling changes to logarithmic from square-root in terms of the number of transmitted qubits. The classical bound is based on an assumption that Alice and Bob have no access to shared prior randomness. Interestingly, the quantum fingerprinting protocol has a feasible optical implementation using coherent states and passive linear optics as recently proposed [2, 3] and experimentally demonstrated over standard telecom fiber links [4, 5]. Comparing bit strings encoded in optical signals is also used as a primitive in other quantum protocols, such as quantum digital signatures [6, 7]. Note that the coherent-state fingerprinting protocol has a quantum mechanical single-particle counterpart with field amplitudes replaced by probability amplitudes [8].

The coherent-state implementation of the quantum fingerprinting protocol relies on phase coherence between Alice and Bob that enables the Referee to obtain the required information using first-order interference between received coherent states. Although substantial effort has been dedicated to develop stable phase-locked light sources for coherent optical communication [9], they may be unavailable or impractical in some specialized scenarios. A possible remedy to this problem is to resort to second-order interference [10], which is insensitive to the global phase between the incoming beams. In this paper we present and discuss theoretically a quantum fingerprinting protocol, which does not require a shared phase reference between the communicating parties. It is based on two-photon interference also known as the Hong-Ou-Mandel effect [11] which can serve as a linear-optics implementation of the swap test [12]. The principle of quantum fingerprinting has been previously demonstrated in experiments with pairs of qubits [13, 14]. Here we analyze a scalable version of the protocol based on mapping the bit strings held by Alice and Bob onto sequences of binary ± phases that are used to modulate single photons prepared as superposition states of multiple time bins. We show that the advantage over classical protocols without shared randomness matches that for the coherent state scenario despite lack of the phase reference.

Further, we analyze the impact of imperfections, such as residual distinguishability between interfering photons, non-unit detection efficiency which can also include losses and probabilistic single-photon generation, as well as the presence of multiphoton components in the radiation employed in the fingerprinting protocol. The last imperfection is characterized with the help of the normalized second-order intensity correlation function g(2) for a zero delay time [10]. This model can describe quantum fingerprinting using either single photons, corresponding to g(2) ≈ 0, or phase-averaged coherent states with Poissonian statistics for which g(2) = 1, in the regime when the probability of detecting a photon in a single experimental run is much less than one. Such a situation can occur for low transmission of optical channels used by Alice and Bob to send optical signals to the Referee. The performance of a realistic implementation of the two-photon quantum fingerprinting protocol is quantified using the concept of Chernoff information [15], which is a convenient information theoretic tool to characterize the attainable error probability in the asymptotic limit of a large number of experimental runs.

This paper is organized as follows. In Sec. 2 we review quantum fingerprinting with coherent states and introduce the two-photon protocol. The construction of the error-correcting code required for the two-photon protocol is presented in Sec. 3. The advantage in terms of transmittable information compared to classical protocols is also discussed there. In Sec. 4 we describe a model that includes common experimental imperfections. The effect of using light sources with different photon statistics is analyzed using Chernoff information in Sec. 5. Finally, Sec. 6 concludes the paper.

2. Fingerprinting using optical interference

The basic idea of quantum optical fingerprinting [2] is to map n-bit strings x and y held by Alice and Bob respectively onto sequences of m optical pulses that are subsequently sent to the Referee for comparison. In the simplest scenario Alice and Bob modulate individual pulses with two opposite phases ± that are chosen according to m-bit long binary error correcting codewords E(x) and E(y for differences) the input strings. The purpose of the error correcting code is to enhance the between input strings when x ≠ y and thus to augment the response obtained at the detection stage. The relevant characteristics of the error correcting code E will be discussed in Sec. 3. If âi and b^i, i = 0, …, m − 1, denote annihilation operators for modes corresponding to individual pulses on Alice’s and Bob’s sides, such modulation corresponds to preparing states of the electromagnetic field over all m time bins in modes âx and b^j that are given by linear combinations:

a^x=1mi=0m1(1)Ei(x)a^i,b^y=1mi=0m1(1)Ei(y)b^i.

In the standard coherent-state protocol [2] the states of optical signals prepared by Alice and Bob can be written as

|αxA=exp(αa^xα*a^x)|0A,|βyB=exp(βb^yβ*b^y)|0B,
where α and β are the complex amplitudes of the sequences prepared by Alice and Bob, and |0〉A and |0〉B denote vacuum states on Alice’s and Bob’s sides respectively. Let the complex amplitudes be equal and have the same phase, α=β=n¯, where n¯ is the mean total photon number in each of the sequences. The signals received from Alice and Bob are interfered by the Referee on a balanced beam splitter as shown in Fig. 1(a). This corresponds to the standard linear transformation of the annihilation operators for individual pulses [16]:
a^i(a^i+b^i)/2,b^i(a^i+b^i)/2.

 figure: Fig. 1

Fig. 1 Quantum fingerprinting protocols using (a) coherent states and (b) photon pairs. Alice and Bob map error correcting codewords onto +/− phase modulation patterns for optical signals sent to the Referee, who combines them on a 50/50 beam splitter. (a) In the case of first order interference, a click on the detector monitoring the output port b of the beam splitter, where field amplitudes are subtracted, implies that the codewords were different. (b) The same conclusion can be drawn in the two-photon protocol when a coincidence between the two detectors is registered.

Download Full Size | PDF

In the case of identical strings, when x = y, completely destructive interference occurs at the beam splitter output port b corresponding to the family b^i of annihilation operators in the representation of output modes. For unequal strings, when x ≠ y, the field amplitude at this port is non-zero. A straightforward calculation presented in Appendix yields the probability of registering at least one count at this port equal to 1exp[n¯(1ReV)], where

V=1mi=0m1(1)Ei(x)+Ei(y)
is the interference visibility. The right hand side of the above expression can be generalized in a straightforward manner to the case when the phases of individual pulses are taken from a constellation larger than the binary set +, −. The protocol gives an erroneous answer when the interference of optical signals encoding different strings does not generate any click at the output port b. The probability of such an event is given by exp[n¯(1ReV)], which exhibits exponential scaling with the mean photon number n¯. In many physical scenarios, sharing a common phase reference between Alice and Bob or maintaining the phase stability during the realization of the protocol may be difficult if not impossible. This requirement could be especially demanding in free-space optical communication used e.g. in earth-satellite links or in signal transmission between moving objects. If the global phase between sequences prepared by Alice and Bob is random, a detection event on a single output port can no longer serve as an unambiguous signature of different strings x ≠ y. However, in this case one can resort to the Hong-Ou-Mandel effect [11] in two-photon interference which is invariant with respect to a global phase shift.

Suppose that Alice and Bob prepare single photons in modes âx and b^y:

|1xA=a^x|0A=1mi=0m1(1)Ei(x)a^i|0A|1yB=b^y|0B=1mi=0m1(1)Ei(y)b^i|0B,
where the strings are encoded into binary ± phases of superposition components. These signals are sent to a balanced beam splitter. The probability of a coincidence count between the detectors monitoring the beam splitter outputs reads [17]
Pc=12(1|V|2),
where V is given by Eq. (4) as before. For completeness the above expression has been derived in Appendix. The coincidence count refers to a pair of clicks on both detectors monitoring the output ports a and b of the beam splitter over the timespan of the entire pulse sequence. A coincidence does not necessarily need to occur within a single time bin. For identical sequences the two photons mode match perfectly and Pc = 0. Therefore an observation of a coincidence event between the two detectors is an unambiguous signature that the input strings were different, i.e. x ≠ y. After N2 pairs have been detected by the Referee, the probability that no such event will occur for different strings is (1Pc)N2=[(1+|V|2)/2]N2. This expression exhibits exponential dependence in N2, which specifies the number of photons received by the Referee from each party. Hence the scaling in the photon number is analogous to the coherent state protocol, which suggests that the advantage compared to the classical scenario will be similar to the case of first-order interference. One distinguishing feature is that because two-photon interference is insensitive to the global phase, suppression of coincidence counts will occur also when V=1. Consequently, too many differences between individual symbols in error correcting codewords E(x) and E(y) will have a detrimental effect on the performance of the two-photon protocol. This issue will be carefully analyzed in the next section.

3. Error correcting code

The error correcting code is used in the quantum fingerprinting protocol to introduce a minimum gap between the perfect 100% visibility corresponding to identical input strings and the non-unit visibility for any pair of different strings. For a given error correcting code E that maps n-bit input strings onto m-bit sequences used to modulate the ± phases of individual optical pulses the visibility defined in Eq. (4) can be written as:

V=1m[m2d(E(x),E(y))]=12δ.
where d (E(x), E(y)) is the Hamming distance between strings E(x) and E(y), i.e. the number of positions at which the two strings differ, and δ = d (E(x), E(x)) / m is the relative Hamming distance. For notational simplicity we will omit the argument of δ. The error correcting code ensures that for any pair of different strings the relative Hamming distance δ is always greater or equal to a certain minimum value δmin, i.e. δδmin. The corresponding change in the sequence length is conventionally characterized by the code rate r = n / m, which for long input strings satisfies the asymptotic Gilbert-Varshamov bound rrGV (δmin) = 1 − H2 (δmin), where H2(x) = −x log2 x − (1 – x) log2 (1 − x) is the binary entropy function [18]. The bound is valid for δmin <1/2.

The key difference between the coherent-state and the two-photon protocol is that in the latter scenario the relative Hamming distance δ approaching one, i.e. when E (x) is a bitwise negation of E(y), generates the same outcome as for δ = 0 when the sequences are identical. This reflects the insensitivity of two-photon interference to the global phase between the interfering fields. A remedy to this issue is to extend a standard error correcting code by an additional sequence of identical bits, as shown in Fig. 2. Specifically, suppose that the initial code of length m is characterized by the minimum relative distance δmin. If we add extra min identical bits to each codeword, the total length of the new code created that way is M = m (1 + δmin), while the relative Hamming distance Δ between any pair of different codewords after extension satisfies Δmin ≤ Δ ≤ 1 − Δmin, where Δmin = δmin / (1 + δmin). The maximum rate of such a modified code implied by the Gilbert-Varshamov bound is n/MrGV δmin) / (1 + δmin). The right hand side expressed in terms of Δmin gives:

nM=RRGV(Δmin)=(1Δmin)rGV(Δmin1Δmin)

 figure: Fig. 2

Fig. 2 Modification of the error correcting code required for the two-photon quantum fingerprinting protocol. (a) A standard error correcting code of length m guarantees that the relative Hamming distance δ between any two different codewords used by Alice A and Bob B is between δmin and 1. Two extreme cases are shown. (b) Extension of the standard code by a fixed number of min ensures that the relative Hamming distance Δ for any two codewords in the modified code is bounded between δmin/(1 + δmin) and 1/(1 + δmin).

Download Full Size | PDF

Note that the condition δmin < 1/2 implies that Δmin < 1 3.

The bound (8) enables one to compare the performance of the coherent state and the two-photon protocols. In the coherent-state scenario, both Alice and Bob send on average n¯ photons. Suppose that the coherent-state protocol utilises a standard error correcting code with a minimum Hamming distance δmincoh which gives maximum visibility Vcoh=12δmincoh. The probability that different input strings will not generate any count in the beam splitter output port b is equal to exp[n¯(1ReVcoh)]=exp(2n¯δmincoh). In the two-photon protocol, Alice and Bob each send N2 photons and need to use a modified error correcting code characterized by a Hamming distance Δmin. The probability that after receiving N2 photon pairs no coincidence event has occurred is equal to [(1+|V|2)/2]N2=exp(N2log[2/(1+|12Δmin|2)]),where we have used the visibility for the modified code V=12Δmin.

In order to make a fair comparison between the coherent-state and the two-photon protocol we will assume that the number of photons sent by both Alice and Bob to the Referee is in each scenario similar, i.e. n¯N2, and that the probability of misidentifying different strings is the same. These requirements give rise to the relation:

Δmin=12[12exp(2δmincoh)1]
between the minimum Hamming distances of codes used in both protocols for which the misidentification probabilities are equal. This relation enables a direct comparison of respective code rates. In Fig. 3(a) we depict the Gilbert-Varshamov bound for the error-correcting code used in the coherent-state protocol rGV(δmincoh) along with the bound for the modified code RGVmin) employed the in two-photon protocol. In order to ensure the same misidentification probability for both protocols, Δmin has been expressed by δmincoh using Eq. (9). This dependence is shown in the inset of Fig. 3(a).

 figure: Fig. 3

Fig. 3 (a) Maximum code rates rGV and RGV given by the Gilbert-Varshamov bound respectively for the coherent-state and the two-photon fingerprinting protocol. The minimum Hamming distances δmincoh and Δmin for the two scenarios are chosen such that the misidentification probability has the same scaling with the number of transmitted photons and their dependence is shown in the inset. (b) The ratio of maximum code rates rGV / RGV which specifies the overhead in the codeword length for the two-photon protocol.

Download Full Size | PDF

In order to quantify the increase of the sequence length M for the two-photon protocol compared to the value m in the coherent-state case, in Fig. 3(b) we present the ratio rGV(δmincoh)/RGV(Δmin). Assuming that error correcting codes approaching the Gilbert-Varshamov bound are available, it is seen that for δmincoh 0.25 the overhead remains approximately below M / m ≲ 5.1. Let us recall that the classical information capacity of the optical system sent to the Referee by either Alice or Bob in the coherent-state protocol scales as n¯ log2 m [2]. The counterpart for the two-photon protocol is N2 log2 M. As long as the minimum Hamming distance remains in the range considered here, these two expressions differ by a term proportional to the number of photons received by the Referee. Consequently, the advantage in the scaling of the quantum protocol based on two-photon interference should be analogous to the coherent-state case.

The above argument can be put on a rigorous footing by calculating the amount of classical information that could be transmitted using physical systems employed in the quantum fingerprinting protocol. This figure needs to be compared with the amount of information that needs to be communicated in classical fingerprinting. The best known bound on the latter quantity expressed in bits is Iclass=(12Perr)n2log21 [5], where Perr is the error probability. Note, however, that it is not known if this bound is saturable and for the best known classical protocol it is necessary to transmit more bits [5]. In the quantum two-photon scenario, the number of bits that can be transmitted using at most N2 photons in MN2 modes is equal to IS=N2+1MN2log2(N2+MN2N2+1) [19]. This expression takes into account also messages composed from fewer than N2 photons, providing a very conservative figure for the comparison. In the case of the quantum fingerprinting protocol with coherent states, we will estimate the amount of transmittable classical information Icoh by the capacity of a bosonic channel with the mean photon number n¯/m per channel use, which gives Icoh=(n¯+m)log2(n¯+m)n¯log2n¯mlog2m for the entire sequence of m time bins.

In Fig. 4 we compare Iclass, IS, and Icoh for the error probability Perr = 10−6, and the minimum relative Hamming distance δmincoh =0.2 for the coherent state protocol, and the corresponding value given by Eq. (9) for the two-photon protocol. The hypotheses of equal and different input strings are taken as equiprobable with the worst-case scenario, i.e. minimum Hamming distance, assumed for the latter. It is seen that the quantum advantage appears for input strings longer than approx. 106 bits and that the performances of the coherent-state and the two-photon protocols are very similar even though the latter does not make use of a phase reference. Remarkably, as illustrated in the inset in Fig. 4, the amount of transmittable classical information for both quantum protocols is nearly the same for large n. It can be shown that in this regime both IS and Icoh scale as O(log2 n), whereas the bound on classical fingerprinting exhibits a different, square-root scaling IclassO(n).

 figure: Fig. 4

Fig. 4 Comparison of the performance of classical and quantum fingerprinting protocols as a function of the input bit string length n. The gray curve represents the best known lower bound on the number of bits required in the classical protocol Iclass. The red and black curves depict the amount of classical information IS and Icoh that could be transmitted in physical systems employed respectively in the two-photon and the coherent state quantum fingerprinting protocol. The error probability is Perr = 10−6 and the minimum relative Hamming distance equals δmincoh=0.2 for the coherent state protocol with the corresponding value for the two-photon protocol given by Eq. (9). The inset depicts the ratio IS/Icoh.

Download Full Size | PDF

4. Realistic two-photon fingerprinting

In realistic implementations of the quantum fingerprinting protocol one needs to take into account a variety of experimental imperfections. We will consider a symmetric scenario, in which Alice’s and Bob’s light sources and optical channels to the Referee have identical properties. The transmission of the channels will be denoted by η. This parameter can also include the non-unit efficiency of detectors used by the Referee. Further, let the detectors have photon number resolution and exhibit dark counts described by Poissonian statistics with the mean pd for each detector. In order to describe imperfections of single photon sources used by Alice and Bob, we will take the probability of generating a single photon to be n¯. Finally, non-ideal indistinguishability between photons arriving from Alice and Bob will be characterized with a parameter W specifying the fraction of events when the photons interfere perfectly with each other, while in the remaining fraction 1 − W of cases the photons behave as distinguishable particles.

Assuming the model described above, the Referee receives from Alice the one-photon state |1xA with probability ηn¯. We will also include the possibility of receving simultaneously two photons in a state |2xA=(a^x)2/2|0A with a probability denoted as (ηn¯)2g(2)/2. The same probabilities are associated with the states |1yB and |2yB=(b^x)2/2|0B received from Bob. We will assume that two-photon states appear much more rarely compared to one-photon states, i.e. ηn¯(2)1. The factor g(2) has the interpretation of the normalized second-order intensity correlation function [10] and it allows us to describe imperfections of the single-photon source when g(2) ≪ 1 as well as include the case of strongly attenuated coherent light sources with a random global phase, when ηn¯1 and g(2) = 1. Additionally, we shall assume that the contribution of dark counts is small compared to genuine photocounts, i.e. pd/(ηn¯)1. The overall probability of a two-click event, including both coincidences between the detectors and double counts on one of the detectors, reads:

P2=(ηn¯)2[1+g(2)+4pdηn¯+2(pdηn¯)2],
where we took into account only the leading terms proportional to (ηn¯)2. A straightforward calculation yields the relative probability of a coincidence event among all two-click events in the form:
Q=PcP2=12(1Veff),Veff=W|V|21+g(2)+4pd/(ηn¯)+2pd2/(ηn¯)2.

The remaining fraction 1 − Q of two-click events corresponds to double counts on one of the detectors placed after the beam splitter.

Deciding whether the received sequences are different or equal can be viewed as a test between two hypotheses [20], which we will denote with respective indices D and E. These two hypotheses define the corresponding fractions of coincidence events QD and QE calculated using Eq. (11) respectively for V=12Δmin and V=1, assuming the worst-case scenario for the hypothesis D. The basis for the decision is the number Nc of coincidence events observed in the overall sample of N2 two-click events. The probability of obtaining a specific Nc is given by a binomial distribution

pν(Nc)=(N2Nc)QνNc(1Qν)N2Nc,ν=D,E

Provided that both hypotheses D and E are equiprobable, the average error probability Perr is minimized by a decision rule assigning to each Nc the hypothesis υ for which pυ (Nc) is larger as shown in Fig. 5(a). This yields

Perr=12Nc=0N2min{pD(Nc),pE(Nc)}.

 figure: Fig. 5

Fig. 5 (a) The decision between hypotheses of different D and equal E inputs is made based on the observed number Nc of coincidence events. The chosen hypothesis corresponds to the higher probability pD(Nc) or pE(Nc). (b) The error probability Perr assuming equiprobable hypotheses for the minimum Hamming distance Δmin = 0.1, dark count contribution pd/(ηn¯)=0.01, and indistinguishability W = 98%. Results for single photons (S, blue lines) corresponding to g(2) = 0 are compared to signals with Poissonian photon number statistics (P, red lines). Solid lines are numerical results and dotted lines are asymptotic expressions based on Chernoff information. The plots are parameterized with the effective number (ηn¯)2N of pairs composed of photons received from both Alice and Bob. Note that the curves depicting numerical results lie below the lines corresponding to the asymptotic exponential expression. This is because of additional sublinear terms in N in the exponent of the exact error probability.

Download Full Size | PDF

In Fig. 5(b) we depict the error probability for Δmin=0.1,pd/(ηn¯)=0.01, and W = 0.98. The single photon case corresponding to g(2) = 0 is compared with strongly attenuated phase-averaged coherent states for which g(2) = 1. The total number of two-click events is taken as the average value N2P2N rounded to the nearest integer, where P2 is given by Eq. (10) and N is the total number of repetitions of the protocol. In such settings, (ηn¯)2N of events has been on average generated by a pair composed of photons received from both Alice and Bob. This figure has been used to parameterize the abscissa of Fig. 5(b), which allows one to compare the performance of different light sources used by Alice and Bob with the same photon flux. It is seen that single photon sources perform substantially better compared to classical Poissonian-statistics signals with the same brightness. Note that assumptions made in the calculations imply that the mean photon number received by the Referee from each party in a single run is ηn¯1.

5. Chernoff information

In order to quantify the benefit of using non-classical single-photon states we will use the Chernoff information C [15], which allows one to write the error probability for a large number N of repetitions in the asymptotic form Perr ∼ exp (−NC). Importantly, Chernoff information gives only the leading order of the exponent in N and the exact exponent may also include terms that are sublinear in N. We will see in numerical examples that the actual error probability is in general below the asymptotic exponential expression, Perr ≤ exp (−NC). If a single experimental run yields the value of a certain variable k governed by one of two probability distributions pD(k) or pE(k), Chernoff information is given explicitly by

C=log[min0α1(k[pD(k)]α[pE(k)]1α)],
where the sum is taken over all possible values of k. We will consider hypothesis testing based on coincidence events and double counts on one detector, whose probabilities are given respectively by QυP2 and (1 − )P2, υ = D, E. If no other events are used for inference, the general expression (14) for Chernoff information can be simplified to
C=log(1P2+P2min0α1[QDαQE1α+(1QD)α(1QE)1α]).

When the overall probability of a two-click event is small, P2 ≪ 1, it is justified to expand the above expression up to the linear term in P2 which gives C(ηn¯)2ζ, where

ζ=[1+g(2)+4pdηn¯+2(pdηn¯)2](1min0α1[QDαQE1α+(1QD)α(1QE)1α]).

This yields the asymptotic expression for the error probability in the form

Perrexp[(ηn¯)2Nζ]
depicted along numerical results in Fig. 5(b). In order to remove the effects of sublinear terms in the exponent of Eq. (17), in the inset of Fig. 5(b) we compare numerically calculated (logPerr)/(ηn¯)2 with ζ, which shows good asymptotic convergence.

As discussed earlier, the factor (ηn¯)2N specifies the effective number of events generated by pairs composed of photons received from both Alice and Bob. Hence ζ is the effective Chernoff information per one such event. In Fig. 6(a,b) we depict the rescaled Chernoff information ζ for light sources with Poissonian statistics characterized by g(2) = 1 and single photon sources for which g(2) = 0. We have taken the indistinguishability parameter W = 0.98 and a rather broad range for the dark count contribution, 0pd/(ηn¯)0.05. Calculations have been performed for the minimum relative Hamming distance Δmin between 0.1 and 0.25. This parameter enters Eq. (11) through V=12Δmin when calculating the fraction QD of coincidence events for the hypothesis D of different input strings. It is seen that generally the rescaled Chernoff information for single photons ζS is higher than for the Poissonian light ζP. The enhancement can be attributed to higher visibility of two-photon interference reaching 100% for general quantum states of light while being limited to 50% for statistical mixtures of coherent states [21]. This limit can be identified in the expression for the effective visibility Veff in Eq. (11) by taking the Poissonian statistics with g(2) = 1. Other imperfections described by the indistinguishability parameter W and dark count contribution pd/(ηn¯) only lower further the effective visibility Veff. In Fig. 6(c) we show the ratio ζs/ζP, which can be assigned a simple operational interpretation. If we require the same average error probability for the Poissonian and single-photon optical signals with the same photon flux ηn¯, the respective total numbers NP and NS of experimental runs satisfy NPζP = NSζS according to Eq. (17). Hence ζS/ζP = NP/NS describes the reduction of the number of experimental runs when single-photons are used in lieu of Poissonian signals with the same brightness. The benefit is most strongly pronounced for lower Δmin when different strings in the worst-case scenario only modestly reduce the visibility V and when other imperfections, such as dark counts, do not significantly affect the observation of two-photon interference.

 figure: Fig. 6

Fig. 6 Rescaled Chernoff information for the fingerprinting protocol based on second-order interference using (a) single photons ζS and (b) optical signals with Poissonian photon number statistics ζP as a function of the dark count contribution pd/(ηn¯) and the minimum Hamming distance Δmin. Note different colour codings of numerical values in the panels. (c) The ratio ζS/ζP which quantifies the benefit of using single photons in the weak signal regime.

Download Full Size | PDF

6. Conclusions

We have presented and discussed theoretically a quantum fingerprinting protocol based on two-photon interference which eliminates the need for sharing a phase reference inherent to the coherent-state [2, 3] and single-particle protocols [8] exploiting standard first-order interference. The two-photon protocol requires a modification of the error correcting code to ensure that different strings can generate coincidence events. We have analyzed the impact of non-Poissonian photon statistics of optical signals and have taken into account a variety of imperfections, such as non-unit channel transmission and detection efficiency, dark counts, and residual distiguishability between interfering photons. The performance of the protocol has been quantified with the help of Chernoff information, which characterizes asymptotic behavior of the error probability. One should note that in the regime of very weak light sources and/or high channel losses the rate of useful two-click events scales quadratically as (ηn¯)2 with the photon flux ηn¯ which reflects the increasingly rare chance that both the photons from Alice and Bob will be received in the same experimental run. This deficiency could be in principle alleviated by the use of multimode quantum memories at Referee’s node [22]. It would be also interesting to investigate the effects of phase diffusion [23], either within the pulse sequences or between the two senders in the case of protocols based on first-order interference.

It is worth pointing out that in the coherent-state quantum fingerprinting protocol detecting clicks with temporal resolution would reveal locations at which individual symbols of the transmitted codewords are effectively compared. A click on a detector monitoring the b port of the beam splitter in a given time bin unambiguously heralds that the respective symbols were different. In the two-photon protocol, a temporally resolved two-click event can be associated with a pair of time bins. The type of the event — a coincidence or a double count on one detector — effectively compares the parity of the codeword elements at these two locations for the signals received from Alice and Bob [24]. An analogous observation can be made in two-photon inferference for the spatial degree of freedom [25]. Finally, let us note that the photons used by Alice and Bob to imprint codewords as phase sequences should not exhibit temporal correlations which are inherent to e.g. photon pair sources based on continuously pumped spontaneous parametric down-conversion. Such correlations could also play the role of shared prior randomness. The photons sent by Alice and Bob should be prepared in the form of narrowband wavepackets that guarantee coherence time over the entire codeword mapped onto the phase pattern. Narrowband photon sources are currently being developed for quantum communication systems that use quantum memories with restricted spectral bandwidth [26, 27].

Appendix

For completeness, we present here detailed derivations of probabilities of events used in Sec. 2 to discuss the performance of the fingerprinting protocols. In the coherent state case, the probability that no count occurs in the output port b is given by the expectation value of a normally ordered exponential expression : exp(N^b):, where N^b is the operator of the total number of photons in the output field b. Using Eq. (3) it can be written in the representation of incoming modes as

N^b=12i=0m1(a^ib^i)(a^ib^i).

The expectation value of : exp (N^b): needs to be evaluated over the input state |αxA|βyB defined in Eq. (2). The expressions exp(αa^xαa^x) and exp(βb^yβb^y) appearing in Eq. (2) can be viewed as multimode displacement operators which transform annihilation operators for individual pulses according to

[exp(αa^xαa^x)]a^iexp(αa^xαa^x)=a^i+(1)Ei(x)αm,[exp(βb^yβb^y)]b^iexp(βb^yβb^y)=b^i+(1)Ei(y)βm.

Using these formulas, the probability of a zero-count event on the port b is given in terms of the incoming field operators by:

Aαx| Bβy|:exp(N^b):|αxA|βyB=exp(12mi=0m1|(1)Ei(x)α(1)Ei(y)β|2)=exp[n¯(1ReV)],
where in the last expression we have used the definition of the interference visibility in Eq. (4) and the assumption that α=β=n¯. Hence the probability that at least one count is registered at the output port b reads 1exp[n¯(1ReV)].

In the two-photon protocol, the probability of a coincidence between the detectors monitoring the output ports of the beam splitter is given by an expectation value of the operator :N^aN^b: assuming that the input state contains at most two photons. Here N^a is the operator of the total number of photons in the output beam a which expressed in terms of the input modes reads

N^a=12j=0m1(a^j+b^j)(a^j+b^j).

It is now sufficient to note that for the input state |1xA|1yB one has a^ia^j|1xA|1yB=0=b^ib^j|1xA|1yB and a^ib^j|1xA|1yB=1m(1)Ei(x)+Ej(y)|0A|0B. This allows us to simplify

 A1x|B1y|:N^aN^b:|1xA|1xB=14m2i,j=0m1|(1)Ei(x)+Ej(y)(1)Ei(x)+Ej(y)|2=12(1|V|2).

The second expression, using the definition of the interference visibility from Eq. (4), yields Eq. (6).

Funding

Foundation for Polish Science.

Acknowledgments

We wish to acknowledge insightful discussions with N. Lüthenhaus, Q. Zhang and W. Wasilewski. This work is part of the project “Quantum Optical Communication Systems” carried out within the TEAM programme of the Foundation for Polish Science co-financed by the European Union under the European Regional Development Fund

References and links

1. H. Buhrman, R. Cleve, J. Watrous, and R. de Wolf, “Quantum Fingerinting,” Phys. Rev. Lett. 87, 167902 (2001). [CrossRef]  

2. J. M. Arrazola and N Lüthenhaus, “Quantum fingerprinting with coherent states and a constant mean number of photons,” Phys. Rev. A 89, 062305 (2014). [CrossRef]  

3. N. Kumar, E. Diamanti, and I. Kerenidis, “Efficient quantum communications with coherent state fingerprints over multiple channels,” Phys. Rev. A 95, 032337 (2017). [CrossRef]  

4. F. Xu, J. M. Arrazola, K. Wei, W. Wang, P. Palacios-Avila, C. Feng, S. Sajeed, N Lüthenhaus, and H-K Lo, “Experimental quantum fingerprinting with weak coherent pulses,” Nat. Commun. 6, 8735 (2015). [CrossRef]  

5. J.-Y. Guan, F. Xu, H.-L. Yin, Y. Li, W.-J. Zhang, S.-J. Chen, X.-Y. Yang, L. Li, L.-X. You, T.-Y. Chen, Z. Wang, Q. Zhang, and J.-W. Pan, “Observation of Quantum Fingerprinting Beating the Classical Limit,” Phys. Rev. Lett. 116, 240502 (2016). [CrossRef]   [PubMed]  

6. P. J. Clarke, R. J. Collins, V. Dunjko, E. Andersson, J. Jeffers, and G. S. Buller, “Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light,” Nat. Commun. 3, 1174 (2012). [CrossRef]   [PubMed]  

7. R. J. Collins, R. J. Donaldson, V. Dunjko, P. Wallden, P. J. Clarke, E. Andersson, J. Jeffers, and G. S. Buller, “Realization of Quantum Digital Signatures without the Requirement of Quantum Memory,” Phys. Rev. Lett. 113, 040502 (2014). [CrossRef]   [PubMed]  

8. S. Massar, “Quantum fingerprinting protocol with a single particle,” Phys. Rev. A 71, 012310 (2005). [CrossRef]  

9. K. Kitayama, Optical Code Division Multiple Access: A Practical Perspective (Cambridge University, 2014), Chap. 4. [CrossRef]  

10. L. Mandel and E. Wolf, Optical Coherence and Quantum Optics (Cambridge University, 1995), Chap. 4.3. [CrossRef]  

11. C. K. Hong, Z. Y. Ou, and L. Mandel, “Measurement of subpicosecond time intervals between two photons by interference,” Phys. Rev. Lett. 59, 2044–2046 (1987). [CrossRef]   [PubMed]  

12. J. C. Garcia-Escartin and P. Chamorro-Posada, “Swap test and Hong-Ou-Mandel effect are equivalent,” Phys. Rev. A 87, 052330 (2013). [CrossRef]  

13. R. T. Horn, S. A. Babichev, K. P. Marzlin, A. I. Lvovsky, and B. C. Sanders, “Single-qubit optical quantum fingerprinting,” Phys. Rev. Lett. , 95, 150502 (2005). [CrossRef]   [PubMed]  

14. J. Du, P. Zou, X. Peng, D. K. Oi, L. Kwek, C. Oh, and A. Ekert, “Experimental quantum multimeter and one-qubit Fingerprinting,” Phys. Rev. A 74042319 (2006). [CrossRef]  

15. T. M. Cover and J. A. Thomas, Elements of Information Theory (2nd edition) (Wiley, 1991), Chap. 12. [CrossRef]  

16. C. Gerry and P. Knight, Introductory Quantum Optics(Cambridge University, 2004), Chap. 6. [CrossRef]  

17. R. Loudon, The Quantum Theory of Light (Oxford University, 2014), Chap. 6.8.

18. J. H. van Lint, Introduction to Coding Theory (3rd edition) (Springer, 1987), Chap. 5.

19. C. M. Caves and P. D. Drummond, “Quantum limits on bosonic communication rates,” Rev. Mod. Phys. 66, 481–537 (1994). [CrossRef]  

20. R. G. Gallager, Stochastic Processes: Theory and Applications (Cambridge University Press, 2014), Chap. 8.

21. C. Su and K. Wódkiewicz, “Quantum versus stochastic or hidden-variable fluctuations in two-photon interference effects,” Phys. Rev. A 44, 6097 (1991). [CrossRef]  

22. R. Chrapkiewicz, M. Dabrowski, and W. Wasilewski, “High-Capacity Angularly Multiplexed Holographic Memory Operating at the Single-Photon Level,” Phys. Rev. Lett. 118, 063603 (2017). [CrossRef]   [PubMed]  

23. S. Olivares, S. Cialdi, F. Castelli, and M. G. A. Paris, “Homodyne detection as a near-optimum receiver for phase-shift-keyed binary communication in the presence of phase diffusion,” Phys. Rev. A 87, 0503032013). [CrossRef]  

24. T. Legero, T. Wilk, A. Kuhn, and G. Rempe, “Time-Resolved Two-Photon Quantum Interference,” Appl. Phys. B 77, 797–802 (2003). [CrossRef]  

25. R. Chrapkiewicz, M. Jachura, K. Banaszek, and W. Wasilewski, “Hologram of a single photon,” Nat. Photon. 10, 576–579 (2016). [CrossRef]  

26. J. Fekete, D. Rielander, M. Cristani, and H. de Riedmatten, “Ultranarrow-Band Photon-Pair Source Compatible with Solid State Quantum Memories and Telecommunication Networks,” Phys. Rev. Lett. 110, 220502 (2013). [CrossRef]   [PubMed]  

27. D. B. Higginbottom, L. Slodička, G. Araneda, L. Lachman, R. Filip, M. Hennrich, and R. Blatt, “Pure single photons from a trapped atom source,” New J. Phys. 18, 093038 (2016). [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (6)

Fig. 1
Fig. 1 Quantum fingerprinting protocols using (a) coherent states and (b) photon pairs. Alice and Bob map error correcting codewords onto +/− phase modulation patterns for optical signals sent to the Referee, who combines them on a 50/50 beam splitter. (a) In the case of first order interference, a click on the detector monitoring the output port b of the beam splitter, where field amplitudes are subtracted, implies that the codewords were different. (b) The same conclusion can be drawn in the two-photon protocol when a coincidence between the two detectors is registered.
Fig. 2
Fig. 2 Modification of the error correcting code required for the two-photon quantum fingerprinting protocol. (a) A standard error correcting code of length m guarantees that the relative Hamming distance δ between any two different codewords used by Alice A and Bob B is between δmin and 1. Two extreme cases are shown. (b) Extension of the standard code by a fixed number of min ensures that the relative Hamming distance Δ for any two codewords in the modified code is bounded between δmin/(1 + δmin) and 1/(1 + δmin).
Fig. 3
Fig. 3 (a) Maximum code rates rGV and RGV given by the Gilbert-Varshamov bound respectively for the coherent-state and the two-photon fingerprinting protocol. The minimum Hamming distances δ min coh and Δmin for the two scenarios are chosen such that the misidentification probability has the same scaling with the number of transmitted photons and their dependence is shown in the inset. (b) The ratio of maximum code rates rGV / RGV which specifies the overhead in the codeword length for the two-photon protocol.
Fig. 4
Fig. 4 Comparison of the performance of classical and quantum fingerprinting protocols as a function of the input bit string length n. The gray curve represents the best known lower bound on the number of bits required in the classical protocol Iclass. The red and black curves depict the amount of classical information IS and Icoh that could be transmitted in physical systems employed respectively in the two-photon and the coherent state quantum fingerprinting protocol. The error probability is Perr = 10−6 and the minimum relative Hamming distance equals δ min coh = 0.2 for the coherent state protocol with the corresponding value for the two-photon protocol given by Eq. (9). The inset depicts the ratio IS/Icoh.
Fig. 5
Fig. 5 (a) The decision between hypotheses of different D and equal E inputs is made based on the observed number Nc of coincidence events. The chosen hypothesis corresponds to the higher probability pD(Nc) or pE(Nc). (b) The error probability Perr assuming equiprobable hypotheses for the minimum Hamming distance Δmin = 0.1, dark count contribution p d / ( η n ¯ ) = 0.01, and indistinguishability W = 98%. Results for single photons (S, blue lines) corresponding to g(2) = 0 are compared to signals with Poissonian photon number statistics (P, red lines). Solid lines are numerical results and dotted lines are asymptotic expressions based on Chernoff information. The plots are parameterized with the effective number ( η n ¯ ) 2 N of pairs composed of photons received from both Alice and Bob. Note that the curves depicting numerical results lie below the lines corresponding to the asymptotic exponential expression. This is because of additional sublinear terms in N in the exponent of the exact error probability.
Fig. 6
Fig. 6 Rescaled Chernoff information for the fingerprinting protocol based on second-order interference using (a) single photons ζS and (b) optical signals with Poissonian photon number statistics ζP as a function of the dark count contribution p d / ( η n ¯ ) and the minimum Hamming distance Δmin. Note different colour codings of numerical values in the panels. (c) The ratio ζS/ζP which quantifies the benefit of using single photons in the weak signal regime.

Equations (22)

Equations on this page are rendered with MathJax. Learn more.

a ^ x = 1 m i = 0 m 1 ( 1 ) E i ( x ) a ^ i , b ^ y = 1 m i = 0 m 1 ( 1 ) E i ( y ) b ^ i .
| α x A = exp ( α a ^ x α * a ^ x ) | 0 A , | β y B = exp ( β b ^ y β * b ^ y ) | 0 B ,
a ^ i ( a ^ i + b ^ i ) / 2 , b ^ i ( a ^ i + b ^ i ) / 2 .
V = 1 m i = 0 m 1 ( 1 ) E i ( x ) + E i ( y )
| 1 x A = a ^ x | 0 A = 1 m i = 0 m 1 ( 1 ) E i ( x ) a ^ i | 0 A | 1 y B = b ^ y | 0 B = 1 m i = 0 m 1 ( 1 ) E i ( y ) b ^ i | 0 B ,
P c = 1 2 ( 1 | V | 2 ) ,
V = 1 m [ m 2 d ( E ( x ) , E ( y ) ) ] = 1 2 δ .
n M = R R GV ( Δ min ) = ( 1 Δ min ) r GV ( Δ min 1 Δ min )
Δ min = 1 2 [ 1 2 exp ( 2 δ min coh ) 1 ]
P 2 = ( η n ¯ ) 2 [ 1 + g ( 2 ) + 4 p d η n ¯ + 2 ( p d η n ¯ ) 2 ] ,
Q = P c P 2 = 1 2 ( 1 V eff ) , V eff = W | V | 2 1 + g ( 2 ) + 4 p d / ( η n ¯ ) + 2 p d 2 / ( η n ¯ ) 2 .
p ν ( N c ) = ( N 2 N c ) Q ν N c ( 1 Q ν ) N 2 N c , ν = D , E
P err = 1 2 N c = 0 N 2 min { p D ( N c ) , p E ( N c ) } .
C = log [ min 0 α 1 ( k [ p D ( k ) ] α [ p E ( k ) ] 1 α ) ] ,
C = log ( 1 P 2 + P 2 min 0 α 1 [ Q D α Q E 1 α + ( 1 Q D ) α ( 1 Q E ) 1 α ] ) .
ζ = [ 1 + g ( 2 ) + 4 p d η n ¯ + 2 ( p d η n ¯ ) 2 ] ( 1 min 0 α 1 [ Q D α Q E 1 α + ( 1 Q D ) α ( 1 Q E ) 1 α ] ) .
P err exp [ ( η n ¯ ) 2 N ζ ]
N ^ b = 1 2 i = 0 m 1 ( a ^ i b ^ i ) ( a ^ i b ^ i ) .
[ exp ( α a ^ x α a ^ x ) ] a ^ i exp ( α a ^ x α a ^ x ) = a ^ i + ( 1 ) E i ( x ) α m , [ exp ( β b ^ y β b ^ y ) ] b ^ i exp ( β b ^ y β b ^ y ) = b ^ i + ( 1 ) E i ( y ) β m .
A α x |   B β y | : exp ( N ^ b ) : | α x A | β y B = exp ( 1 2 m i = 0 m 1 | ( 1 ) E i ( x ) α ( 1 ) E i ( y ) β | 2 ) = exp [ n ¯ ( 1 Re V ) ] ,
N ^ a = 1 2 j = 0 m 1 ( a ^ j + b ^ j ) ( a ^ j + b ^ j ) .
  A 1 x | B 1 y | : N ^ a N ^ b : | 1 x A | 1 x B = 1 4 m 2 i , j = 0 m 1 | ( 1 ) E i ( x ) + E j ( y ) ( 1 ) E i ( x ) + E j ( y ) | 2 = 1 2 ( 1 | V | 2 ) .
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.