Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Masato Koashi is active.

Publication


Featured researches published by Masato Koashi.


Nature | 2003

Experimental extraction of an entangled photon pair from two identically decohered pairs

Takashi Yamamoto; Masato Koashi; Scedil; ahin Kaya Özdemir; Nobuyuki Imoto

Entanglement is considered to be one of the most important resources in quantum information processing schemes, including teleportation, dense coding and entanglement-based quantum key distribution. Because entanglement cannot be generated by classical communication between distant parties, distribution of entangled particles between them is necessary. During the distribution process, entanglement between the particles is degraded by the decoherence and dissipation processes that result from unavoidable coupling with the environment. Entanglement distillation and concentration schemes are therefore needed to extract pairs with a higher degree of entanglement from these less-entangled pairs; this is accomplished using local operations and classical communication. Here we report an experimental demonstration of extraction of a polarization-entangled photon pair from two decohered photon pairs. Two polarization-entangled photon pairs are generated by spontaneous parametric down-conversion and then distributed through a channel that induces identical phase fluctuations to both pairs; this ensures that no entanglement is available as long as each pair is manipulated individually. Then, through collective local operations and classical communication we extract from the two decohered pairs a photon pair that is observed to be polarization-entangled.


New Journal of Physics | 2009

Direct observation of Hardy's paradox by joint weak measurement with an entangled photon pair

Kazuhiro Yokota; Takashi Yamamoto; Masato Koashi; Nobuyuki Imoto

We implemented a joint weak measurement of the trajectories of two photons in a photonic version of Hardys experiment. The joint weak measurement has been performed via an entangled meter state in polarization degrees of freedom of the two photons. Unlike Hardys original argument in which the contradiction is inferred by retrodiction, our experiment reveals its paradoxical nature as preposterous values actually read out from the meter. Such a direct observation of a paradox gives us new insights into the spooky action of quantum mechanics.


conference on lasers and electro optics | 2001

A concentration/purification scheme for two partially entangled photon pairs

Takashi Yamamoto; Masato Koashi; Nobuyuki Imoto

An experimental scheme for concentrating entanglement in partially entangled photon pairs is proposed. A practical realization of the proposed scheme is discussed, which uses imperfect photon detectors and spontaneous parametric down-conversion as a photon source. This scheme also works for purifying a class of mixed states.


Nature | 2014

Practical quantum key distribution protocol without monitoring signal disturbance

Toshihiko Sasaki; Yoshihisa Yamamoto; Masato Koashi

Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper’s intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.


Nature Communications | 2011

Wide-band quantum interface for visible-to-telecommunication wavelength conversion

Rikizo Ikuta; Yoshiaki Kusaka; Tsuyoshi Kitano; Hiroshi Kato; Takashi Yamamoto; Masato Koashi; Nobuyuki Imoto

Although near-infrared photons in telecommunication bands are required for long-distance quantum communication, various quantum information tasks have been performed by using visible photons for the past two decades. Recently, such visible photons from diverse media including atomic quantum memories have also been studied. Optical frequency down-conversion from visible to telecommunication bands while keeping the quantum states is thus required for bridging such wavelength gaps. Here we report demonstration of a quantum interface of frequency down-conversion from visible to telecommunication bands by using a nonlinear crystal, which has a potential to work over wide bandwidths, leading to a high-speed interface of frequency conversion. We achieved the conversion of a picosecond visible photon at 780  nm to a 1,522-nm photon, and observed that the conversion process retained entanglement between the down-converted photon and another photon.


Physical Review Letters | 2007

Simple and efficient quantum key distribution with parametric down-conversion.

Yoritoshi Adachi; Takashi Yamamoto; Masato Koashi; Nobuyuki Imoto

We propose an efficient quantum key distribution protocol based on the photon-pair generation from parametric down-conversion (PDC). It uses the same experimental setup as the conventional protocol, but a refined data analysis enables detection of photon-number splitting attacks by utilizing information from a built-in decoy state. Assuming the use of practical detectors, we analyze the unconditional security of the new scheme and show that it improves the secure key generation rate by several orders of magnitude at long distances, using a high intensity PDC source.


Physical Review Letters | 2003

Unconditionally secure key distribution based on two nonorthogonal states

Kiyoshi Tamaki; Masato Koashi; Nobuyuki Imoto

We prove the unconditional security of the Bennett 1992 protocol, by using a reduction to an entanglement distillation protocol initiated by a local filtering process. The bit errors and the phase errors are correlated after the filtering, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the two states shows a trade-off between accuracy of the estimation and robustness to noises.


Physical Review Letters | 2003

Secure quantum key distribution with an uncharacterized source

Masato Koashi; John Preskill

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitrary source whose averaged states are basis independent, a condition that is automatically satisfied if the source is suitably designed. The proof is based on the observation that, to an adversary, the key extraction process is equivalent to a measurement in the sigma(x) basis performed on a pure sigma(z)-basis eigenstate. The dependence of the achievable key length on the bit error rate is the same as that established by Shor and Preskill [Phys. Rev. Lett. 85, 441 (2000)]] for a perfect source, indicating that the defects in the source are efficiently detected by the protocol.


Physical Review Letters | 2005

Faithful Qubit Distribution Assisted by One Additional Qubit against Collective Noise

Takashi Yamamoto; Junichi Shimamura; Sahin Kaya Ozdemir; Masato Koashi; Nobuyuki Imoto

We propose a distribution scheme of polarization states of a single photon over a collective-noise channel. By adding one extra photon with a fixed polarization, we can protect the state against collective noise via a parity-check measurement and postselection. While the scheme succeeds only probabilistically, it is simpler and more flexible than the schemes utilizing decoherence-free subspace. An application to the Bennett-Brassard 1984 protocol through a collective-noise channel, which is robust to the Trojan horse attack, is also given.


Physical Review Letters | 2000

Exact eigenstates and magnetic response of spin-1 and spin-2 bose-einstein condensates

Masato Koashi; Masahito Ueda

The exact eigenspectra and eigenstates of spin-1 and spin-2 Bose-Einstein condensates (BECs) are found, and their response to a weak magnetic field is studied and compared with their mean-field counterparts. Whereas mean-field theory predicts the vanishing population of the zero magnetic-quantum-number component of a spin-1 antiferromagnetic BEC, the component is found to become populated as the magnetic field decreases. The spin-2 BEC exhibits an even richer magnetic response due to quantum correlations among three bosons.

Collaboration


Dive into the Masato Koashi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sahin Kaya Ozdemir

Washington University in St. Louis

View shared research outputs
Top Co-Authors

Avatar

Adam Miranowicz

Adam Mickiewicz University in Poznań

View shared research outputs
Top Co-Authors

Avatar

Hirotaka Terai

National Institute of Information and Communications Technology

View shared research outputs
Top Co-Authors

Avatar

Shigehito Miki

National Institute of Information and Communications Technology

View shared research outputs
Top Co-Authors

Avatar

Taro Yamashita

National Institute of Information and Communications Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge