Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas Symul is active.

Publication


Featured researches published by Thomas Symul.


Physical Review Letters | 2004

Tripartite quantum state sharing

Andrew M. Lance; Thomas Symul; Warwick P. Bowen; Barry C. Sanders; Ping Koy Lam

We demonstrate a multipartite protocol to securely distribute and reconstruct a quantum state. A secret quantum state is encoded into a tripartite entangled state and distributed to three players. By collaborating, any two of the three players can reconstruct the state, while individual players obtain nothing. We characterize this (2,3) threshold quantum state sharing scheme in terms of fidelity, signal transfer, and reconstruction noise. We demonstrate a fidelity averaged over all reconstruction permutations of 0.73+/-0.04, a level achievable only using quantum resources.


Physical Review A | 2003

Experimental investigation of continuous-variable quantum teleportation

Warwick P. Bowen; Nicolas Treps; Ben C. Buchler; Roman Schnabel; Timothy C. Ralph; Hans Bachor; Thomas Symul; Ping Koy Lam

We report the experimental demonstration of quantum teleportation of the quadrature amplitudes of a light field. Our experiment was stably locked for long periods, and was analyzed in terms of fidelity F and with signal transfer T-q=T++T- and noise correlation V-q=Vinparallel to out+Vinparallel to out-. We observed an optimum fidelity of 0.64+/-0.02, T-q=1.06+/-0.02, and V-q=0.96+/-0.10. We discuss the significance of both T-q>1 and V-q<1 and their relation to the teleportation no-cloning limit.


Physical Review Letters | 2004

Quantum cryptography without switching

Christian Weedbrook; Andrew M. Lance; Warwick P. Bowen; Thomas Symul; Timothy C. Ralph; Ping Koy Lam

We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements. It also offers the further advantage of simplicity compared to all previous protocols which, to date, have relied on switching.


Applied Physics Letters | 2011

Real time demonstration of high bitrate quantum random number generation with coherent laser light

Thomas Symul; Syed M. Assad; Ping Koy Lam

We present a random number generation scheme that uses broadband measurements of the vacuum field contained in the radio-frequency sidebands of a single-mode laser. Even though the measurements may contain technical noise, we show that suitable algorithms can transform the digitized photocurrents into a string of random numbers that can be made arbitrarily correlated with a subset of the quantum fluctuations (high quantum correlation regime) or arbitrarily immune to environmental fluctuations (high environmental immunity). We demonstrate up to 2 Gbps of real time random number generation that were verified using standard randomness tests.


Physical Review A | 2005

Continuous-variable quantum-state sharing via quantum disentanglement

Andrew M. Lance; Thomas Symul; Warwick P. Bowen; Barry C. Sanders; Tomáš Tyc; Timothy C. Ralph; Ping Koy Lam

Quantum-state sharing is a protocol where perfect reconstruction of quantum states is achieved with incomplete or partial information in a multipartite quantum network. Quantum-state sharing allows for secure communication in a quantum network where partial information is lost or acquired by malicious parties. This protocol utilizes entanglement for the secret-state distribution and a class of quantum disentangling protocols for the state reconstruction. We demonstrate a quantum-state sharing protocol in which a tripartite entangled state is used to encode and distribute a secret state to three players. Any two of these players can collaborate to reconstruct the secret state, while individual players obtain no information. We investigate a number of quantum disentangling processes and experimentally demonstrate quantum-state reconstruction using two of these protocols. We experimentally measure a fidelity, averaged over all reconstruction permutations, of F=0.73 +/- 0.02. A result achievable only by using quantum resources.


Physical Review Letters | 2008

Observation of Entanglement between Two Light Beams Spanning an Octave in Optical Frequency

Nicolai B. Grosse; Syed M. Assad; M. Mehmet; Roman Schnabel; Thomas Symul; Ping Koy Lam

We have experimentally demonstrated how two beams of light separated by an octave in frequency can become entangled after their interaction in a chi;{(2)} nonlinear medium. The entangler was a nonlinear optical resonator that was strongly driven by coherent light at the fundamental and second-harmonic wavelengths. An interconversion between the fields created quantum correlations in the amplitude and phase quadratures, which were measured by two independent homodyne detectors. Analysis of the resulting correlation matrix revealed a wave function inseparability of 0.74(1)<1, thereby satisfying the criterion of entanglement.


Physical Review A | 2006

Coherent-state quantum key distribution without random basis switching

Christian Weedbrook; Andrew M. Lance; Warwick P. Bowen; Thomas Symul; Timothy C. Ralph; Ping Koy Lam

The random switching of measurement bases is commonly assumed to be a necessary step of quantum key distribution protocols. In this paper we present a no-switching protocol and show that switching is not required for coherent-state continuous-variable quantum key distribution. Further, this protocol achieves higher information rates and a simpler experimental setup compared to previous protocols that rely on switching. We propose an optimal eavesdropping attack against this protocol, assuming individual Gaussian attacks. Finally, we investigate and compare the no-switching protocol applied to the original Bennett-Brassard 1984 scheme.


Physical Review A | 2013

Security of continuous-variable quantum cryptography with Gaussian postselection

Nathan Walk; Timothy C. Ralph; Thomas Symul; Ping Koy Lam

We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdropping attacks by employing the concept of an equivalent protocol where the post-selection is implemented as a series of quantum operations including a virtual distillation. We introduce a particular ‘Gaussian’ post selection and demonstrate that the security can be calculated using only experimentally accessible quantities. Finally we explicitly evaluate the performance for the case of a noisy Gaussian channel in the limit of unbounded key length and find improvements over all pre-existing continuous variable protocols in realistic regimes.


Physical Review Letters | 2007

Measuring Photon Antibunching from Continuous Variable Sideband Squeezing

Nicolai B. Grosse; Thomas Symul; Magdalena Stobińska; Timothy C. Ralph; Ping Koy Lam

We present a technique for measuring the second-order coherence function g(2)(tau) of light using a Hanbury Brown-Twiss intensity interferometer modified for homodyne detection. The experiment was performed entirely in the continuous-variable regime at the sideband frequency of a bright carrier field. We used the setup to characterize g(2)(tau) for thermal and coherent states and investigated its immunity to optical loss. We measured g(2)(tau) of a displaced-squeezed state and found a best antibunching statistic of g(2)(0)=0.11+/-0.18.


Physical Review A | 2007

Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise

Thomas Symul; Daniel J. Alton; Syed M. Assad; Andrew M. Lance; Christian Weedbrook; Timothy C. Ralph; Ping Koy Lam

In realistic continuous-variable quantum key distribution protocols, an eavesdropper may exploit the additional Gaussian noise generated during transmission to mask her presence. We present a theoretical framework for a post-selection-based protocol which explicitly takes into account excess Gaussian noise. We derive a quantitative expression of the secret key rates based on the Levitin and Holevo bounds. We experimentally demonstrate that the post-selection-based scheme is still secure against both individual and collective Gaussian attacks in the presence of this excess noise.

Collaboration


Dive into the Thomas Symul's collaboration.

Top Co-Authors

Avatar

Ping Koy Lam

Australian National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andrew M. Lance

Australian National University

View shared research outputs
Top Co-Authors

Avatar

Syed M. Assad

Australian National University

View shared research outputs
Top Co-Authors

Avatar

Helen Chrzanowski

Australian National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jiri Janousek

Australian National University

View shared research outputs
Top Co-Authors

Avatar

Nicolai B. Grosse

Australian National University

View shared research outputs
Top Co-Authors

Avatar

Mile Gu

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge