Teleporting light

When I was still a boy, maybe 7 or 8 years old, I looked in the mirror and pondered on what seems obvious at first: the reflection I saw changed as I moved around. I asked myself: how can the mirror deal with all these different reflections? Does it reflect one, then the other, or is it reflecting all of them simultaneously?

As far as I can remember, that is probably the very first physics question I asked myself. Not knowing what light and mirrors really are, I could not find the answer, and nobody in my entourage could either … but I did not forget about it.

I think that understanding what light is, and what we can do with it, has always been part of my motivation to follow one research direction or another. Light pervades us, it puts everything in touch, close or remote. It allows me to see my kids grow into little persons. It allows us to observe the universe as it was more than four billion years ago. I find this fascinating: light is a universal messenger.

A messenger of speakable messages

Light delivers messages. In particular, it runs through the fibre optics mesh installed around the globe, relentlessly carrying the least and the most important messages that we want to share with each other. In a modern version of the smoke signals our ancestors used to communicate over long distances, billions and billions of “light particles’’ code binary signals.

At this level, light seems like a common object, one that we can see with bare eyes and manipulate. Light can speak for us when sounds cannot be transmitting directly, and nowadays this can feel almost natural to a lot of people.

Pervading all these communications is the fundamental concept of the information unit, the bit. In practice, bits can be a sequence of zeros and ones, coded into optical pulses. For reasons that will be more obvious below, I will dub this kind of information as “speakable” [1], meaning that a person (or a machine) can literally speak it out loud, and it will make sense to any person (or processor) receiving it.

At the level of this speakable information, light is like a ripple at the surface of a pond. It is a wave that spreads around a point of origin, and can be registered in a continuous fashion. Waves also superimpose on each other and go unperturbed as they cross, as if they actually never did.

Seeing light in this way, mirrors are merely changing the course of a wavefront, and indeed all reflections happen simultaneously.

A messenger of unspeakable messages and correlations

Light differs in a strange and unexpected way when one considers its intimate details. In 1905, Albert Einstein proposed that it actually comes in discrete energy packets that we now call photons [2]. This observation was instrumental in the development of quantum mechanics, the theory describing the microscopic behaviour of light and matter. Quantum mechanics has profound consequences.

If light comes as discrete photons, how can it look like it is a wave when billions of photons strike the mirror? The answer is confounding: photons travel as waves, but only until they are detected. Said differently: a photon can travel two paths at the same time… until one tries to look at which path it took! A mirror reflecting a photon travelling two paths at once is indeed reflecting two “images” at the same time… but only until something comes in its way (e.g. the eye of an observer) that forces it to randomly show up in one path or the other (but not both). This effectively means that the mirror reflected only one “image” at the time!

It is only very late in my academic training that I realized that my question about the mirror was ultimately linked to the very nature of light. This is in fact very satisfying.  But at the same time, the wave-like or particle-like nature of photons leads to an even more puzzling scenario. Light can carry “unspeakable” messages.

Let me be more precise. A speakable message is something like this: the photon took this path or this one. This is essentially a bit of information. Now, the quantum nature of light means that a photon can simultaneously travel the two paths, and the information remains “unspeakable” (that is undetermined) until it is detected in one path or the other. This is what we now call a “quantum bit”.

Taking the concept further, it turns out that two photons can be created in a way that they carry very unique correlations that we call “entanglement’’. The effect of entanglement is this: the result of a measurement performed on one photon of an entangled pair will yield a purely random result, but then a properly executed measurement performed on the other photon will a result that is strongly correlated with the other photon’s result. And the word “strongly’’ might too weak to really explain what happens, as first realized by John Stewart Bell in his seminal work in 1964 (the initiated reader will have already noticed that I am borrowing the Bell’s terminology of the unspeakable correlations [1]).

The correlations that emerge from entangled photons cannot be interpreted as correlated speakable messages [1], as it was initially suggested by A. Einstein, B. Podolsky and N. Rosen in 1935 [3]. These unspeakable correlations somewhat seem to protrude from space and time. We do not have a simple and fully satisfying explanation for their existence. They do not reconcile with our seemingly speakable, macroscopic existence.

As fascinating as this can be, it also leads to a feat. Unspeakable correlations are a resource we can use, and this lead to the emergence of a new chapter in photon-based communication: Quantum teleportation, or the art of teleporting unspeakable messages using unspeakable correlations!

Teleporting unspeakable messages using unspeakable correlations

Entanglement yields correlations: photons from an entangled pair are intimately linked to each other, and this can be exploited. Let us imagine two persons, Alice and Bob, where Alice wants to sends a quantum bit of information to Bob. If her quantum bit is encoded in a photon, Alice could directly send the photon to Bob… but she could also be more playful and use entanglement instead.

So let us imagine that Alice and Bob each have one half of an entangled pair of photons. Thanks to quantum mechanics and entanglement,  Alice can perform a special kind of measurement (that we can call a joint measurement) on both the photon carrying the quantum bit she wants to send, and her half of the entangled photon pair.

As I said earlier, measuring a photon encoding an unspeakable message will perturb its state, and therefore the joint measurement destroys the state of the quantum bit but reveals no information about it. The unspeakable message might seem lost, but this is not so. Indeed, because the joint measurement included one half of the entangled pair, the correlations are such that the quantum bit now exists in the state of Bob’s photon. There is a condition though: Alice must first inform Bob of her measurement result (she must transmit a speakable message). Even though this result contain no information whatsoever about her quantum bit, Bob can nevertheless use it to recover Alice’s unspeakable message (her quantum bit) in his photon.

One crucial fact should be noted: this happens even if Bob’s photon never encountered Alice’s photon! Entanglement can carry an unspeakable message from one photon to another, without the need of speaking it out loud! This is fundamentally different from the common experience we have when light is used as a as a carrier of speakable messages…

… and this is one of the marvellous things that we can do with quantum mechanics.

Teleporting light, and using it for cryptography

After the discovery of the theoretical possibility quantum teleportation in 1993 [4], it became crucial to show that it was feasible to realize in practice. This happened for the first time in 1997 using photons [5], it was later extended to several other kinds of systems such as nuclear spins, atoms and solid-state devices [6].

The inventors of quantum teleportation. Top row: Richard Jozsa, William K. Wootters, Charles H. Bennett. Bottom row: Gilles Brassard, Claude Crépeau, Asher Peres. Credit: Claude Crépeau.

The inventors of quantum teleportation. Top row: Richard Jozsa, William K. Wootters, Charles H. Bennett. Bottom row: Gilles Brassard, Claude Crépeau, Asher Peres. Credit: Claude Crépeau.

The possibility of quantum teleportation is now an established fact, and the community is focussing on ways to exploit teleportation for applications. Two fundamental applications are in computing and cryptography [6]. My expertise is in the latter, and I will now try to give you a glimpse of why this is fundamental.

Cryptography is the art of writing or solving codes, and is best know as a method to implement confidential communication (of speakable messages). The history of cryptography is a eventful one, and dates back to at least 1900 BC. One crucial observation must be made: the principles behind all forms encryption based on scrambling speakable messages using an algorithmic procedure have been either defeated or otherwise not proven secure against all-powerful eavesdropper. Even to this day, the most widely used encryption methods over the Internet are not known to be secure.

Should we panic? It is a good question. We should certainly think about the future of cryptography, especially since we actually know that a full-fledge quantum computer could in fact break one the most heavily used cryptographic methods based on the hardness of factoring large number into its prime factors [7-8].

A solution to the quantum computer threat is quantum cryptography [9-11]. It consist in sending single photons encoding unspeakable messages one by one from Alice to Bob. A careful choice of randomly chosen unspeakable messages (quantum bits) then allows Alice and Bob to generate a provably-secure cryptographic key. The key can then be used to perform unbreakable encryption.

This elegant idea has now spun into commercial products [12-14]. The most important limitation of this method is however the maximum distance over which it can be implemented, which is at most a few hundred kilometres when using optical fibre for the transmission of the single photons. Interestingly, one solution to extend the range beyond is to use quantum teleportation of light in a cascaded fashion between Alice and Bob [15].

Recently, my research team and I realized an important step in that direction [16]. We were able to perform a quantum teleportation over 25 km of optical fibre. Importantly, one end of the link had a quantum memory, in our case a crystal capable of storing the quantum state of an entangled photon for some time, and release it for the purpose of synchronizing quantum messages [17]. The teleportation happens from a photon to another one that is stored in the memory, hence we realize a light-to-matter teleportation. Our contribution raises the hope that quantum cryptography over longer distances might be feasible in the near future.

Crystals used as quantum memories in a long distance light-to-matter quantum teleportation experiment [16]. Credit: Christoph Clausen and the University of Geneva.

Crystals used as quantum memories in a long distance light-to-matter quantum teleportation experiment [16]. Credit: Christoph Clausen and the University of Geneva.

This seems futuristic enough, and one may wonder if it can be used to teleport humans. This would necessitate two identical copies of the same human body, and we would teleport the quantum state of the atoms of the 1st body to the 2nd one. Needless to say, this is an inconceivable task… and I do not know if anyone would be willing to try that in the first place! But it is certainly entertaining to consider the possibility.

From light to quantum feats

Quantum teleportation is one of many fascinating and useful feats that quantum mechanics allows us realize or envision for the future of cryptography and computing [18]. Understanding this started with the photon, the simplest, yet perhaps the most fundamental “particle” that led to the development of quantum mechanics.

Light is indeed a universal messenger of speakable and unspeakable messages and correlations, and it will most likely continue to play the role of a work horse leading us towards fundamental discoveries, applications and scientific and social enlightenment in a broad sense.

More Information

[1] John S. Bell, “Speakable and Unspeakable in Quantum Mechanics”, Cambridge University Press (1987).
[2] https://en.wikipedia.org/wiki/Photoelectric_effect
[3] A. Einstein and B. Podolsky and N. Rosen, “Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?”, Physical Review 47, 777 (1935). http://dx.doi.org/10.1103/PhysRev.47.777
[4] C.H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres and W.K. Wootters, “Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels”, Physical Review Letters 70, 1895 (1993). http://dx.doi.org/10.1103/PhysRevLett.70.1895
[5] D. Bouwmeester, J.-W. Pan, K. Mattle, M. Eibl, H. Weinfurter and A. Zeilinger, “Experimental quantum teleportation”, Nature 390, 575 (1997). http://dx.doi.org/10.1038/37539
[6] S. Pirandola, J. Eisert, C. Weedbrook, A. Furusawa, S.L. Braunstein, “Advances in Quantum Teleportation”, http://arxiv.org/abs/1505.07831
[7] P.W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer”, SIAM Journal on Computing 26,  1484 (1997). http://dx.doi.org/10.1137/S0097539795293172
[8] http://www.nature.com/news/online-security-braces-for-quantum-revolution-1.18332
[9] C.H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing”, Proc. of the Int. conf. on Computers, Systems \& Signal Processing, Bangalore, India, 175 (1984). http://dx.doi.org/10.1016/j.tcs.2014.05.025
[10] Artur K. Ekert, “Quantum Cryptography Based on Bell’s Theorem”, Physical Review Letters 67, 661 (1991). http://dx.doi.org/10.1103/PhysRevLett.67.661
[11] N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, “Quantum Cryptography”, Reviews of Modern Physics 74, 145 (2002). http://dx.doi.org/10.1103/RevModPhys.74.145
[12] http://www.idquantique.com
[13] http://www.sequrenet.com
[14] http://www.quintessencelabs.com
[15] H.-J. Briegel, W. Dür, J. I. Cirac and P. Zoller, “Quantum Repeaters: the Role of Imperfect Local Operations in Quantum Communication”, Physical Review Letters 81, 5932 (1998). http://dx.doi.org/10.1103/PhysRevLett.81.5932
[16] F. Bussières, C. Clausen, A. Tiranov, B. Korzh, V.B. Verma, S.W. Nam, F. Marsili, A. Ferrier, P. Goldner, H. Herrmann, C. Silberhorn, W. Sohler, Wolfgang, M. Afzelius and N. Gisin, “Quantum teleportation from a telecom-wavelength photon to a solid-state quantum memory”, Nature Photonics 8, 775 (2014). http://dx.doi.org/10.1038/nphoton.2014.215
[17] F. Bussières, N. Sangouard, M. Afzelius, H. de Riedmatten, C. Simon and W. Tittel, “Prospective applications of optical quantum memories”, Journal of Modern Optics 60, 1519 (2013). http://dx.doi.org/10.1080/09500340.2013.856482
[18] Nicolas Gisin, “Quantum Chance —Nonlocality, Teleportation and Other Quantum Marvels”, Copernicus (2014). http://dx.doi.org/10.1007/978-3-319-05473-5


FBussieresFélix Bussières is a senior researcher in the Group of Applied Physics at the University of Geneva since 2010, where he is leading the research activities on Macroscopic entanglement and on Superconducting Single-Photon detectors. Prior to this position, he obtained his PhD from the École Polytechnique de Montréal in 2010. The work of Dr Bussières showed how solid-state quantum memories can be interfaced with photonic entanglement sources. This culminated in the demonstration of several fundamental building blocks of quantum networks using optical fibres, thereby contributing to closing in the gap between academic research and real-world applications.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s