Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2018 Oct 2;8:14641. doi: 10.1038/s41598-018-32928-8

Counterfactual Bell-State Analysis

Fakhar Zaman 1, Youngmin Jeong 1,, Hyundong Shin 1,
PMCID: PMC6168595  PMID: 30279547

Abstract

The Bell-state analysis to distinguish between the four maximally entangled Bell states requires the joint measurement on entangled particles. However, spatially separated parties cannot perform the joint measurement. In this paper, we present a counterfactual Bell-state analysis based on the chained quantum Zeno effect. This counterfactual analysis not only enables us to perform a complete Bell-state analysis, but also enables spatially separated parties to distinguish between the four Bell states without transmitting any physical particle over the channel.

Introduction

Entanglement is one of the most fascinating resource for remarkable tasks in quantum information processing including quantum computing, quantum communication, and quantum cryptography13. The power of quantum protocols is enhanced by multiple degrees of freedom—known as hyperentanglement—realized in a multi-particle system46. For a bipartite system, the Bell-state analysis is a crucial step in various quantum communication protocols such as superdense coding7,8, which allows us to transmit two classical bits using a single qubit, and quantum teleportation9,10, which allows us to transmit an unknown qubit via a classical channel. To take full advantage of these protocols, one needs to be able to perform the complete Bell-state analysis. However, it has been proven that the complete Bell-state analysis is impossible using only linear operations1113. The maximum achievable efficiency for the linear Bell-state analyzer is 50%12.

Hyperentanglement can be used for the complete Bell-state analysis1416. Unlike the hyperentanglement assisted Bell-state analysis, a different approach17 has been proposed using the quantum Zeno effect18. The quantum Zeno effect is the inhibition between quantum states by frequent multiple measurements of the state, that is, the quantum state usually collapses back to the initial state if the time between measurements is short enough19,20. If spatially separated parties have an entangled pair and they perform the Bell-state analysis using the quantum Zeno effect, the probability of finding the particle over the quantum channel is one.

To date, all the proposed Bell-state analyzers for spatially separated parties need to send the physical particle over the channel. Here a question arises: “Can spatially separated parties perform the Bell-state analysis without transmitting any physical particle over the channel?” Surprisingly, the answer is Yes.

Counterfactual quantum communication21 is a surprising phenomenon that results from the quantum mechanics, which indicates that communication tasks can be achieved without transmitting any physical particle between two parties. The concept of counterfactuality originated from the interaction-free measurement22. The basic idea was to infer the presence of an absorptive object without interacting with it. The maximum achievable efficiency was limited by the margin of 50%. This efficiency was further improved to 100% by using the quantum Zeno effect18. Later, this idea has been extended to counterfactual quantum cryptography23. Subsequently, counterfactual quantum key distribution schemes and their security have been studied in detail2426.

The protocol for direct counterfactual quantum communication based on the chained quantum Zeno effect (CQZE) has been proposed, which allows classical bits to be transferred between two parties without transmitting any particle between them21 (SLAZ13). Recently, the concept of counterfactual quantum communication is further expanded to the counterfactual entanglement distribution2729 and counterfactual quantum information transfer30,31. In this work, we propose a counterfactual scheme for the complete Bell-state analysis based on the CQZE. We use the counterfactual CNOT gate32 (CCNOT gate) followed by the Hadamard gate to distinguish between the four Bell states. The proposed counterfactual scheme can perform the complete Bell-state analysis, but no physical particle passes over the channel.

The rest of the paper is organized as follows. In the next section, we first explain the operation of the CCNOT gate followed by counterfactual Bell-state analysis. In Sec. Discussion, we discuss our results under the non-asymptotic limits. At the end, we analyze the effect of the channel noise and discuss the experimental feasibility of our scheme.

Results

Counterfactual CNOT Gate

We consider the Michelson version of CQZE24,28 setup as shown in Fig. 1, where H(V) denotes the horizontal (vertical) polarization. Initially, the switchable mirror SM1(2) is switched off to allow Alice’s photon in before being switched on again for M(N) outer (inner) cycles. The switchable polarization rotator SPR1(2)H(V) applies the following rotation on Alice’s photon before it is switched off for the rest of this cycle:

SPR1(2)H{|Hcosθi|H+sinθi|V,|Vcosθi|Vsinθi|H, 1
SPR1(2)V{|Vcosθi|V+sinθi|H,|Hcosθi|Hsinθi|V, 2

where θi=π/(2i) with i=M for outer cycles and i=N for inner cycles, respectively.

Figure 1.

Figure 1

Michelson H(V)-CQZE setup. PBS stands for a polarizing beam splitter, MR stands for a mirror, OD for an optical delay, and OC for an optical circulator. The switchable mirror SM1(2) is initially turned off to allow passing the photon, and once the photon is passed it will be turned on. After M(N) cycles, SM1(2) is turned off again allowing the photon out. The switchable polarizing rotator SPR1(2) rotates the polarization by small angle θM(N)=π2M(N) once in each cycle (SM1(2)PBS1(2)H(V)). At Bob’s end, Bob either allows the photon to pass or block the channel by introducing an electron as a quantum absorptive object. Full counterfactulity is ensured as any photon found in the transmission channel would either absorbed by the electron or else end up at the detector D. Table 1 shows the operation of the H(V)-CQZE gate.

The Michelson CQZE setup takes H(V) photons as an input, with the polarizing beam splitter PBS1(2)H(V) passing H(V) photons and reflecting V(H) as shown in Fig. 1. There are two possible scenarios,

  1. If Bob allows the photon to pass, the inner cycles act as an obstacle for outer cycles. After M outer cycles, the photon will end up in the state |H(V). If the photon is found in the transmission channel it will end up at the detector D. For large values of M and N, the probability of finding the photon in the transmission channel approaches to zero.

  2. In the case where Bob blocks the channel, the inner cycles act as non-blocking for outer cycles. Unless the photon is absorbed by the absorptive object, the photon will be in the state |V(H) after M outer cycles.

Table 1 shows the overall action of the I-CQZE gate under the asymptotic limits of M and N, where I, I{H,V}.

Table 1.

Operation table for I-CQZE gate under the asymptotic limits of M and N, where I, I{H,V}.

Control State (electron) Target State (photon) Output State (photon)
|passe |Ip |Ip
|Ip
|blocke |Ip |Ip
|Ip |Ip

The basic idea behind the CCNOT gate is direct counterfactual quantum communication21 where the control bit acts as a quantum absorptive object that can be in the superposition of two orthogonal states as shown in Fig. 2. Alice first need to pass her photon through PBS1 in order to separate the H and V components. Then, these components feed into the corresponding CQZE setup. At Bob’s end, Bob can block the transmission channel or allow the photon to pass or in their superposition. Unless the photon is discarded in counterfactual quantum communication, the photon will be in path c or d, or in the superposition of c and d after M outer and N inner cycles depending on the input state of the photon and the control bit. As M, N, the probability that the photon is found in the transmission channel approaches to zero.

Figure 2.

Figure 2

Counterfactual CNOT gate based on H(V)-CQZE setup. Here H is the horizontal polarization and V is the vertical polarization. Alice starts by sending her photon from the left which is first separated into H and V components using PBS1. These components feed into the corresponding CQZE setup. At the output of the counterfactual CNOT gate, the polarization of the existing photon determines the state of the control bit (quantum absorptive object).

Counterfactual Bell-state Analysis

In the conventional Bell-state analysis, Alice uses the CNOT gate followed by the Hadamard gate (Bob’s side) on the entangled particles. Following the same procedure, we use the CCNOT gate32 to make our scheme counterfactual as shown in Fig. 3. The CCNOT gate is based on direct counterfactual quantum communication where quantum absorptive object act as control bit as shown in Fig. 2. In direct counterfactual quantum communication, the probability that the photon is found in the transmission channel for each of the Bob’s choices (allow the photon to pass or block the channel) depends on the number of M outer and N inner cycles of the CQZE. In the case photon is found in the transmission channel, the photon would either be absorbed by the absorptive object or ends up at detector D (see Fig. 1). This probability is asymptotically zero as M and N approach to infinity.

Figure 3.

Figure 3

Counterfactual Bell-state analysis based on the chained quantum Zeno effect. Here BS stands for 50 : 50 beam splitter, the H stands for the Hadamard gate and the CCNOT gate is the counterfactual CNOT gate. By means of the CCNOT gate, Bell states can be analyzed without transmitting any physical particle over the channel where Bob’s entangled particle (electron) acts as a control bit. Initially the electron and photon are in entangled state. Alice starts the protocol by sending her photon towards the CCNOT gate. At t = T1, a polarization of the photon determines either the state: |Φ± or |Ψ±. After the Hadamard gate, Bob needs to transmit classical information (|0eor|1e) counterfactualy. For this, Alice send her photon in the CCNOT gate and the photon will be detected at one of the four detectors (D1, D2, D3, and D4) at t = T2. Each detector corresponds to one of the four Bell states which enables us to distinguish between the Bell states with certainty.

To demonstrate our scheme for counterfactual Bell-state analysis, we consider that Alice and Bob have an entangled pair of photon and electron, where the electron acts as the control bit and the photon acts as the target bit, respectively. Then, the Bell states are given by

|Φ±=12(|passe|Hp±|blocke|Vp), 3
|Ψ±=12(|passe|Vp±|blocke|Hp), 4

where |pass〉e = |0〉e, |block〉e = |1〉e, |H〉p = |0〉p, and |V〉p = |1〉p; and the subscripts e and p denote the electron and photon, respectively.

Alice starts by sending her photon into the CCNOT gate. At t = T1, the photon will be horizontally polarized if the initial state is |Φ±, while it will be vertically polarized if the initial state is |Ψ±. Then, the photon and electron will be in the separable state, and the Bell states in (3) and (4) transform into

|Φ±12(|passe±|blocke)|Hp, 5
|Ψ±12(|passe±|blocke)|Vp. 6

After the Hadamard gate, Alice needs to determine the state of the electron, either present or absent, to distinguish between |Φ+(|Ψ+) and |Φ(|Ψ). To make our scheme fully counterfactual, we use a feedback system to determine the absence or presence of the electron as shown in Fig. 4. At t = T2, the photon is either in path a or b. If the photon is in path a, the initial state is |Φ±, while if the photon is in path b, the initial state is |Ψ±. The polarization of the photon determines either the state x+ or the state x where x{Φ,Ψ}. The photon will be detected by one of the four detectors. Each detector corresponds to one of the four Bell states which enables us to distinguish between the four Bell states with certainty. Table 2 shows the estimated initial state corresponding to each detector.

Figure 4.

Figure 4

Feedback system of counterfactual Bell-state analysis using H(V)-CQZE setup. Alice starts by throwing her photon towards the PBS1 which separates H and V components of the input photon and feed them into corresponding CQZE setup. At t = T1, Alice throws her photon again towards PBS1 and uses the feedback system to determine the state of the electron after the Hadamard gate. Alice will measure the path of the photon at t = T2 to estimate the initial state.

Table 2.

Bell-state analysis under the asymptotic limits of M and N.

t = T2
Photon Path Photon Polarization State Detector Clicks Estimated Initial State
a |V〉 D1
|H〉 D2 +
b |H〉 D3
|V〉 D4 +

From the counterfactual Bell-state analysis in the paper, we conclude the following observations and remarks.

  1. Completeness: The complete Bell-state analysis is itself a challenge. From Table 2, the counterfactual Bell-state analysis in this paper enables us to distinguish between the four Bell states without using the hyperentanglement. It is verified for finite numbers of M outer and N inner cycles for the CQZE (see Sec. Discussion).

  2. Counterfacuality: We challenged the long-lasting assumption that spatially separated parties cannot perform the Bell-state analysis without transmitting any physical particle over the channel. In our scheme, the probability of finding the photon in the transmission channel approaches to zero under the asymptotic limits of M and N. Even for finite values of M and N, if the photon is found in the transmission channel either it will be absorbed by the electron or it will be discarded at detector D (see Fig. 1); and no detector will click. Unless the photon is discarded, one of the four detectors click which enables spatially separated parties to perform the complete Bell-state analysis without transmitting any physical particle over the channel.

  3. Resource Efficiency: Quantum superdense coding is a prime application to utilize shared entanglement between two parties. In general, both of the entangled particles get destroyed at the end of the protocol to decode a two-bit classical message. Counterfactual Bell-state analysis enables spatially separated parties to implement quantum superdense coding without transmitting any physical particle over the channel at the cost of only one particle. As shown in Fig. 3, only the photon is absorbed by the detector to estimate the initial state.

Discussion

In the previous section, we discussed the counterfactual Bell-state analysis under the ideal scenario. In this section, we show that counterfactual Bell-state analysis can be true: i) for finite values of M and N, and ii) in the presence of channel noise. Then, we further discuss the experimental feasibility for our counterfactual Bell-state analysis.

Finite Values of M and N

We first show that all results are also true for finite values of M and N. For the finite values of M and N, the counterfactuality of the SLAZ13 has been analyzed33,34. It was shown that the protocol can be counterfactual only for one value of the transmitted bit (|1e).

Recently, experimental realization35 of SLAZ1321 has been presented to preserve the counterfactual property for both values of the transmitted bit via the CQZE setup using the single-photon source. In the case of multi-photon source or coherent state light, the counterfactuality is not ensured if Bob allows the photon to pass (|0e). In the presence of the absorptive object, the amplitude of the coherent state which is found in the transmission channel will be absorbed by the absorptive object and no detector clicks. In the absence of the absorptive object, the amplitude of the coherent state found in the transmission channel is nonzero even when the detector D does not click (see Fig. 1) which violates the counterfactuality of the protocol. To ensure the couterfactuality for both values of the transmitted bit for finite values of M and N, they used the single-photon source. The overall action of the modified SLAZ13 scheme is same as shown in Table 1. The only difference is that there exists a success probability corresponding to each Bob’s choice, either block the transmission channel or allow the photon to pass. These probabilities are given by21

Ppass=cos(2M)θM, 7
Pblock=|y{M,0}|2, 8

where θj=π/(2j) for j{M,N}; Ppass is the success probability when Bob allows the photon to pass while Pblock is the success probability where Bob blocks the photon path; and y{M,0} can be obtained from the recursion relations:

y{m+1,0}=bMxm+aMy{m,N}, 9
xm+1=aMxmbMy{m,N}, 10
y{m,n}=aNy{m,n1}, 11

where x1=aM, y{1,0}=bM, aj=cosθj, and bj=sinθj for j{M,N}.

Similarly, the required condition to preserve the counterfactual property of our scheme for the finite values of M and N is that the single-photon source must be used at the time of entanglement distribution between Alice and Bob. To explain the transformation of (3) and (4), let |m,n| denote the state transformation after m (<M) outer and n (<N) inner cycles. Then, we have

|passe|IpSPR11,0|passe(cosθM|Ip+sinθM|Ip)SPR21,1|passe(cosθM|Ip+sinθM(cosθN|IpsinθN|Ip))PBS11,N|passe(cosθM|Ip)SPR12,0|passecosθM(cosθM|Ip+sinθM|Ip)SPR1m,0|passecosm1θM(cosθM|Ip+sinθM|Ip), 12
|blocke|IpPBS11,N|blocke(cosθM|Ip+sinθM|Ip)SPR12,0|blocke(cos2θM|Ip+sin2θM|Ip)SPR1m,0|blocke(cosmθM|Ip+sinmθM|Ip), 13

for I, I{H,V} and N is assumed to be large such that cosNθN1. After M outer and N inner cycles, the photon and electron will be in the separable state, which is given by

|Φ±SM1M,N12(Ppass|passe±Pblock|blocke)|Hp, 14
|Ψ±SM1M,N12(Ppass|passe±Pblock|blocke)|Vp. 15

Note that (14) and (15) are not orthonormal because the probability that the photon is discarded in the counterfactual quantum communication is nonzero for the finite values of M and N.

From (12) and (13), the probability that the photon is not discarded, denoted by Ps, till t = T1 for any input Bell state is given by32

Ps=(112sin2θM)Mm=1M(112sin2mθMsin2θN)N. 16

Unless the photon is discarded, the photon will be detected at one of the four detectors at t = T2, and we can estimate the initial state with the probability one. The success probabilities PD1, PD2, PD3, and PD4 for the corresponding initial Bell states |Φ, |Φ+, |Ψ, and |Ψ+ are respectively given by

PD1=PD3=Psm=1M(1sin2mθMsin2θN)N, 17
PD2=PD4=Ps(1sin2θM)M. 18

We plot the success probabilities against the different values of M and N in Fig. 5 under the ideal channel conditions. The state transition matrix for each Bell state and the detectors is given by

T=D1D2D3D4(PD10000PD20000PD30000PD4)|Φ|Φ+|Ψ|Ψ+. 19

Figure 5.

Figure 5

Success probabilities PD1, PD2, PD3, and PD4 as a function of (M, N) under the ideal channel conditions.

From (19), we conclude that even for finite values of M and N, we can distinguish between the four Bell states with the probability one unless the photon is discarded in counterfactual quantum communication.

Effect of Channel Noise

We now analyze the effect of channel noise under the asymptotic limits of M and N. Let p be the blocking probability caused by the noise in the quantum channel between Alice and Bob at the CCNOT gate. In the protocol, the blocking event does not change the output at Alice’s side if Bob blocks the photon path. However, it causes the problem if Bob allows the photon to pass but the blocking event is occurred due to the channel noise. To explain this effect of the channel noise, we first consider the states |Φ± given in (3). The state transformations of the electron and the photon can be modified as

|Φ±Gate1CCNOT12{|passe(1p|Hp+p|Vp)+|blocke|Hp} 20
BSq2{|passe(1p|Hp+p|Vp)+|blocke|Hp} 21
Hq2{((1p±1)|passe+(1p1)|blocke)|Hp+p(|passe+|blocke)|Vp}, 22

where q=(1+1p)2+p4 is the probability that the photon is not discarded at the detector D0. Similarly, after the Hadamard gate, the initial Bell states |Ψ± given in (4) are transformed into

|Ψ±q2{((1p±1)|passe+(1p1)|blocke)|Vp+p(|passe+|blocke)|Hp}. 23

At t = T2, the state transformation matrix T˜ for each Bell state and the detectors is given by

T˜=116(A++p)D1D2D3D4(pA+A+A(1p)p+p2pp2pA++AA+(1p)p+p2pp2p+p2pp2pA+A+A(1p)p+p2pp2pA++AA+(1p))|Φ|Φ+|Ψ|Ψ+, 24

where A±=(1p±1)2. In Fig. 6, we plot the probabilities PD1(3), PD2(4), PD3(1), and PD4(2) as a function of p for the corresponding input Bell states (a) |Φ(|Ψ) and (b) |Φ+(|Ψ+) under the asymptotic limits of M and N.

Figure 6.

Figure 6

Probabilities PD1(3), PD2(4), PD3(1), and PD4(2) as a function of p for the corresponding input Bell states (a) |Φ〉 (|Ψ〉) and (b) |Φ+〉 (|Ψ+〉) under the asymptotic limits of M and N.

Experimental Feasibility

For an experimental realization of counterfactual Bell-state analysis, there are two major problems to be concerned. The first one is to guarantee the phase stability of the CQZE gate which is the building block of our scheme as shown in Fig. 4. The practical realization of quantum counterfactual-like communication has been recently demonstrated based on the single-photon source35 and the weak coherent light36.

Another problem in the experimental realization is to generate a superposition state of the absorptive object. In our scheme, we used the electron as the quantum absorptive object which can take the superposition of two paths. To overcome the problem of superposition of presence and absence, we introduce a mirror between two paths as shown in Fig. 7. If the electron is in the path A, it shows the absence of the absorptive object. In case the electron is in the path B, the absorptive object is blocking the transmission channel.

Figure 7.

Figure 7

Bob’s device for experiment design. AO stands for an absorptive object (electron). A and B are upper and lower paths, respectively. If the electron in the path A, it does not interact with the photon, which shows the absence of the absorptive object and the photon will be reflected by the mirror MR. In case the electron is in the path B, it will absorb the photon if it is found in the transmission channel.

Acknowledgements

This work has supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2016R1A2B2014462), and by the Basic Science Research Program through the NRF funded by the Ministry of Education (No. 2018R1D1A1B07050584), and ICT R&D program of MSIP/IITP [R0190-15-2030, Reliable crypto-system standards and core technology development for secure quantum key distribution network].

Author Contributions

F.Z. contributed the idea. F.Z. and Y.J. developed the theory. H.S. improved the manuscript and supervised the research. All the authors contributed in analyzing and discussing the results and improving the manuscript.

Competing Interests

The authors declare no competing interests.

Footnotes

Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Contributor Information

Youngmin Jeong, Email: yjeong@khu.ac.kr.

Hyundong Shin, Email: hshin@khu.ac.kr.

References

  • 1.Einstein A, Podolsky B, Rosen N. Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 1935;47:777–780. doi: 10.1103/PhysRev.47.777. [DOI] [Google Scholar]
  • 2.Horodecki R, Horodecki P, Horodecki M, Horodecki K. Quantum entanglement. Rev. Mod. Phys. 2009;81:865–942. doi: 10.1103/RevModPhys.81.865. [DOI] [Google Scholar]
  • 3.Nielsen MA, Chuang IL. Quantum Computation and Quantum Information. 10th anniversary edn. New York: Cambridge University Press; 2010. [Google Scholar]
  • 4.Kwiat PG. Hyper-entangled states. J. Mod. Opt. 1997;44:2173–2184. doi: 10.1080/09500349708231877. [DOI] [Google Scholar]
  • 5.Barreiro JT, Langford NK, Peters NA, Kwiat PG. Generation of hyperentangled photon pairs. Phys. Rev. Lett. 2005;95:260501. doi: 10.1103/PhysRevLett.95.260501. [DOI] [PubMed] [Google Scholar]
  • 6.Barbieri M, Cinelli C, Mataloni P, Martini FD. Polarization-momentum hyperentangled states: Realization and characterization. Phys. Rev. A. 2005;72:052110. doi: 10.1103/PhysRevA.72.052110. [DOI] [Google Scholar]
  • 7.Bennett CH, Wiesner SJ. Communication via one-and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 1992;69:2881. doi: 10.1103/PhysRevLett.69.2881. [DOI] [PubMed] [Google Scholar]
  • 8.Mattle K, Weinfurter H, Kwiat PG, Zeilinger A. Dense coding in experimental quantum communication. Phys. Rev. Lett. 1996;76:4656. doi: 10.1103/PhysRevLett.76.4656. [DOI] [PubMed] [Google Scholar]
  • 9.Bennett CH, et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993;70:1895. doi: 10.1103/PhysRevLett.70.1895. [DOI] [PubMed] [Google Scholar]
  • 10.Boschi D, Branca S, Martini FD, Hardy L, Popescu S. Experimental realization of teleporting an unknown pure quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1998;80:1121. doi: 10.1103/PhysRevLett.80.1121. [DOI] [Google Scholar]
  • 11.Vaidman L, Yoran N. Methods for reliable teleportation. Phys. Rev. A. 1999;59:116. doi: 10.1103/PhysRevA.59.116. [DOI] [Google Scholar]
  • 12.Calsamiglia J, Lütkenhaus N. Maximum efficiency of a linear-optical Bell-state analyzer. Appl. Phys. B: Lasers Opt. 2001;72:67–71. doi: 10.1007/s003400000484. [DOI] [Google Scholar]
  • 13.Ghosh S, et al. Distinguishability of Bell states. Phys. Rev. Lett. 2001;87:277902. doi: 10.1103/PhysRevLett.87.277902. [DOI] [PubMed] [Google Scholar]
  • 14.Kwiat PG, Weinfurter H. Embedded Bell-state analysis. Phys. Rev. A. 1998;58:R2623. doi: 10.1103/PhysRevA.58.R2623. [DOI] [Google Scholar]
  • 15.Walborn SP, Pádua S, Monken CH. Hyperentanglement-assisted Bell-state analysis. Phys. Rev. A. 2003;68:042313. doi: 10.1103/PhysRevA.68.042313. [DOI] [Google Scholar]
  • 16.Schuck C, Huber G, Kurtsiefer C, Weinfurter H. Complete deterministic linear optics Bell state analysis. Phys. Rev. Lett. 2006;96:190501. doi: 10.1103/PhysRevLett.96.190501. [DOI] [PubMed] [Google Scholar]
  • 17.Azuma H. Interaction-free quantum computation. Phys. Rev. A. 2004;70:012318. doi: 10.1103/PhysRevA.70.012318. [DOI] [Google Scholar]
  • 18.Kwiat P, Weinfurter H, Herzog T, Zeilinger A, Kasevich MA. Interaction-free measurement. Phys. Rev. Lett. 1995;74:4763. doi: 10.1103/PhysRevLett.74.4763. [DOI] [PubMed] [Google Scholar]
  • 19.Itano WM, Heinzen DJ, Bollinger J, Wineland D. Quantum Zeno effect. Phys. Rev. A. 1990;41:2295. doi: 10.1103/PhysRevA.41.2295. [DOI] [PubMed] [Google Scholar]
  • 20.Petrosky T, Tasaki S, Prigogine I. Quantum Zeno effect. Phys. Rev. A. 1990;151:109–113. [Google Scholar]
  • 21.Salih H, Li Z-H, Al-Amri M, Zubairy MS. Protocol for direct counterfactual quantum communication. Phys. Rev. Lett. 2013;110:170502. doi: 10.1103/PhysRevLett.110.170502. [DOI] [PubMed] [Google Scholar]
  • 22.Elitzur A, Vaidman L. Quantum mechanical interaction-free measurement. Found. Phys. 1993;23:987–997. doi: 10.1007/BF00736012. [DOI] [Google Scholar]
  • 23.Noh T-G. Counterfactual quantum cryptography. Phys. Rev. Lett. 2009;103:230501. doi: 10.1103/PhysRevLett.103.230501. [DOI] [PubMed] [Google Scholar]
  • 24.Salih H. Tripartite counterfactual quantum cryptography. Phys. Rev. A. 2014;90:012333. doi: 10.1103/PhysRevA.90.012333. [DOI] [Google Scholar]
  • 25.Yin Z-Q, Li H-W, Chen W, Han Z-F, Guo G-C. Security of counterfactual quantum cryptography. Phys. Rev. A. 2010;82:042335. doi: 10.1103/PhysRevA.82.042335. [DOI] [Google Scholar]
  • 26.Yin Z-Q, et al. Counterfactual quantum cryptography based on weak coherent states. Phys. Rev. A. 2012;86:022313. doi: 10.1103/PhysRevA.86.022313. [DOI] [Google Scholar]
  • 27.Guo Q, Cheng L-Y, Chen L, Wang H-F, Zhang S. Counterfactual entanglement distribution without transmitting any particles. Opt. Express. 2014;22:8970–8984. doi: 10.1364/OE.22.008970. [DOI] [PubMed] [Google Scholar]
  • 28.Chen Y, Gu X, Jiang D, Xie L, Chen L. Tripartite counterfactual entanglement distribution. Opt. Express. 2015;23:21193–21203. doi: 10.1364/OE.23.021193. [DOI] [PubMed] [Google Scholar]
  • 29.Chen Y, Jian D, Gu X, Xie L, Chen L. Counterfactual entanglement distribution using quantum dot spins. JOSA B. 2016;33:663–669. doi: 10.1364/JOSAB.33.000663. [DOI] [Google Scholar]
  • 30.Guo Q, Cheng L-Y, Chen L, Wang H-F, Zhang S. Counterfactual quantum-information transfer without transmitting any physical particles. Sci. Rep. 2015;5:8416. doi: 10.1038/srep08416. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 31.Li Z-H, Al-Amri M, Zubairy MS. Direct counterfactual transmission of a quantum state. Phys. Rev. A. 2015;92:052315. doi: 10.1103/PhysRevA.92.052315. [DOI] [Google Scholar]
  • 32.Salih H. Protocol for counterfactually transporting an unknown qubit. Front. Phys. 2016;3:94. doi: 10.3389/fphy.2015.00094. [DOI] [Google Scholar]
  • 33.Vaidman L. Counterfactuality of ‘counterfactual’ communication. J. Phys. A. 2015;48:465303. doi: 10.1088/1751-8113/48/46/465303. [DOI] [Google Scholar]
  • 34.Griffiths RB. Particle path through a nested Mach-Zehnder interferometer. Phys. Rev. A. 2016;94:032115. doi: 10.1103/PhysRevA.94.032115. [DOI] [Google Scholar]
  • 35.Cao Y, et al. Direct counterfactual communication via quantum Zeno effect. Proc Natl Acad Sci USA. 2017;114:4920–4924. doi: 10.1073/pnas.1614560114. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 36.Liu C, Liu J, Zhang J, Zhu S. The experimental demonstration of high efficiency interaction-free measurement for quantum counterfactual-like communication. Sci. Rep. 2017;7:10875. doi: 10.1038/s41598-017-11305-x. [DOI] [PMC free article] [PubMed] [Google Scholar]

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES