Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Carlo Ottaviani is active.

Publication


Featured researches published by Carlo Ottaviani.


Physical Review Letters | 2003

Polarization qubit phase gate in driven atomic media.

Carlo Ottaviani; David Vitali; M. Artoni; F. S. Cataliotti; Paolo Tombesi

We present here an all-optical scheme for the experimental realization of a quantum phase gate. It is based on the polarization degree of freedom of two traveling single-photon wave packets and exploits giant Kerr nonlinearities that can be attained in coherently driven ultracold atomic media.


Nature Communications | 2017

Fundamental limits of repeaterless quantum communications

Stefano Pirandola; Riccardo Laurenza; Carlo Ottaviani; Leonardo Banchi

Using a technique based on quantum teleportation, we simplify the most general adaptive protocols for key distribution, entanglement distillation and quantum communication over a wide class of quantum channels in arbitrary dimension. Thanks to this method, we bound the ultimate rates for secret key generation and quantum communication through single-mode Gaussian channels and several discrete-variable channels. In particular, we derive exact formulas for the two-way assisted capacities of the bosonic quantum-limited amplifier and the dephasing channel in arbitrary dimension, as well as the secret key capacity of the qubit erasure channel. Our results establish the limits of quantum communication with arbitrary systems and set the most general and precise benchmarks for testing quantum repeaters in both discreteand continuous-variable settings.


Physical Review A | 2004

Polarization phase gate with a tripod atomic system

Stojan Rebic; David Vitali; Carlo Ottaviani; Paolo Tombesi; M. Artoni; F. S. Cataliotti; R. Corbalán

We analyze the nonlinear optical response of a four-level atomic system driven into a tripod configuration. The large cross-Kerr nonlinearities that occur in such a system are shown to produce nonlinear phase shifts of order


Nature Photonics | 2015

High-rate measurement-device-independent quantum cryptography

Stefano Pirandola; Carlo Ottaviani; Gaetana Spedalieri; Christian Weedbrook; Samuel L. Braunstein; Seth Lloyd; Tobias Gehring; Christian S. Jacobsen; Ulrik L. Andersen

\ensuremath{\pi}


European Physical Journal D | 2006

Cross phase modulation in a five–level atomic medium: semiclassical theory

Carlo Ottaviani; Stojan Rebic; David Vitali; Paolo Tombesi

. Such a substantial shift may be observed in a cold atomic gas in a magneto-optical trap where it could be feasibly exploited towards the realization of a polarization quantum phase gate. The experimental feasibility of such a gate is here examined in detail.


Physical Review A | 2014

Two-way quantum cryptography at different wavelengths

Christian Weedbrook; Carlo Ottaviani; Stefano Pirandola

Stefano Pirandola, Carlo Ottaviani, Gaetana Spedalieri, Christian Weedbrook, Samuel L. Braunstein, Seth Lloyd, Tobias Gehring, Christian S. Jacobsen, and Ulrik L. Andersen Department of Computer Science, University of York, York YO10 5GH, United Kingdom Department of Physics, University of Toronto, Toronto M5S 3G4, Canada and QKD Corp., 112 College St., Toronto M5G 1L6, Canada MIT – Department of Mechanical Engineering and Research Laboratory of Electronics, Cambridge MA 02139, USA Department of Physics, Technical University of Denmark, Fysikvej, 2800 Kongens Lyngby, Denmark


quantum electronics and laser science conference | 2006

Quantum phase gate operation based on nonlinear optics: Full quantum analysis

Carlo Ottaviani; Stojan Rebic; David Vitali; Paolo Tombesi

Abstract. The interaction of a five-level atomic system involving electromagnetically induced transparency with four light fields is investigated. Two different light-atom configurations are considered, and their efficiency in generating large nonlinear cross-phase shifts compared. The dispersive properties of those schemes are analyzed in detail, and the conditions leading to group velocity matching for two of the light fields are identified. An analytical treatment based on amplitude equations is used in order to obtain approximate solutions for the susceptibilities, which are shown to fit well with the numerical solution of the full Bloch equations in a large parameter region.


Physical Review A | 2015

Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration

Carlo Ottaviani; Gaetana Spedalieri; Samuel L. Braunstein; Stefano Pirandola

We study the security of two-way quantum cryptography at different wavelengths of the electromagnetic spectrum, from the optical range down to the microwave range. In particular, we consider a two-way quantum communication protocol where Gaussian-modulated thermal states are subject to random Gaussian displacements and finally homodyned. We show how its security threshold (in reverse reconciliation) is extremely robust with respect to the preparation noise and able to outperform the security thresholds of one-way protocols at any wavelength. As a result, improved security distances are now accessible for implementing quantum key distribution at the very challenging regime of infrared frequencies.


Physical Review A | 2017

Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables

Panagiotis Papanastasiou; Carlo Ottaviani; Stefano Pirandola

Full quantum theory of the optical two-qubit quantum phase gate for single photons is formulated. Trade-off between the conditional phase shift and gate fidelity is found, but could be compensated in transient regime.


Nature Photonics | 2015

Reply to 'Discrete and continuous variables for measurement-device-independent quantum cryptography'

Stefano Pirandola; Carlo Ottaviani; Gaetana Spedalieri; Christian Weedbrook; Samuel L. Braunstein; Seth Lloyd; Tobias Gehring; Christian S. Jacobsen; Ulrik L. Andersen

We consider the continuous-variable protocol of Pirandola et al. [Nature Photonics 9, 397-402 (2015), see also arXiv.1312.4104] where the secret-key is established by the measurement of an untrusted relay. In this network protocol, two authorized parties are connected to an untrusted relay by insecure quantum links. Secret correlations are generated by a continuous-variable Bell detection performed on incoming coherent states. In the present work we provide a detailed study of the symmetric configuration, where the relay is midway between the parties. We analyze symmetric eavesdropping strategies against the quantum links explicitly showing that, at fixed transmissivity and thermal noise, two-mode coherent attacks are optimal, manifestly outperforming one-mode collective attacks based on independent entangling cloners. Such an advantage is shown both in terms of security threshold and secret-key rate.

Collaboration


Dive into the Carlo Ottaviani's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Vitali

Technische Universität München

View shared research outputs
Top Co-Authors

Avatar

Paolo Tombesi

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar

Riccardo Laurenza

Centre for Quantum Technologies

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Cosmo Lupo

Istituto Nazionale di Fisica Nucleare

View shared research outputs
Top Co-Authors

Avatar

Panagiotis Papanastasiou

Centre for Quantum Technologies

View shared research outputs
Top Co-Authors

Avatar

Leonardo Banchi

University College London

View shared research outputs
Researchain Logo
Decentralizing Knowledge