• ### Sine wave gating Silicon single-photon detectors for multiphoton entanglement experiments(1707.07179)

Silicon single-photon detectors (SPDs) are the key devices for detecting single photons in the visible wavelength range. Here we present high detection efficiency silicon SPDs dedicated to the generation of multiphoton entanglement based on the technique of high-frequency sine wave gating. The silicon single-photon avalanche diodes (SPADs) components are acquired by disassembling 6 commercial single-photon counting modules (SPCMs). Using the new quenching electronics, the average detection efficiency of SPDs is increased from 68.6% to 73.1% at a wavelength of 785 nm. These sine wave gating SPDs are then applied in a four-photon entanglement experiment, and the four-fold coincidence count rate is increased by 30% without degrading its visibility compared with the original SPCMs.
• ### On Seymour's Second Neighborhood Conjecture of m-free Digraphs(1701.00328)

Jan. 2, 2017 math.CO
This paper gives an approximate result related to Seymour's Second Neighborhood conjecture, that is, for any $m$-free digraph $G$, there exists a vertex $v\in V(G)$ and a real number $\lambda_m$ such that $d^{++}(v)\geq \lambda_m d^+(v)$, and $\lambda_m \rightarrow 1$ while $m \rightarrow +\infty$. This result generalizes and improves some known results in a sense.
• ### PandaX-III: Searching for Neutrinoless Double Beta Decay with High Pressure $^{136}$Xe Gas Time Projection Chambers(1610.08883)

Oct. 28, 2016 hep-ex, nucl-ex, physics.ins-det
Searching for the Neutrinoless Double Beta Decay (NLDBD) is now regarded as the topmost promising technique to explore the nature of neutrinos after the discovery of neutrino masses in oscillation experiments. PandaX-III (Particle And Astrophysical Xenon Experiment III) will search for the NLDBD of $^{136}$Xe at the China Jin Ping underground Laboratory (CJPL). In the first phase of the experiment, a high pressure gas Time Projection Chamber (TPC) will contain 200 kg, 90% $^{136}$Xe enriched gas operated at 10 bar. Fine pitch micro-pattern gas detector (Microbulk Micromegas) will be used at both ends of the TPC for the charge readout with a cathode in the middle. Charge signals can be used to reconstruct tracks of NLDBD events and provide good energy and spatial resolution. The detector will be immersed in a large water tank to ensure $\sim$5 m of water shielding in all directions. The second phase, a ton-scale experiment, will consist of five TPCs in the same water tank, with improved energy resolution and better control over backgrounds.
• ### Dark Matter Results from First 98.7-day Data of PandaX-II Experiment(1607.07400)

Aug. 23, 2016 hep-ex, physics.ins-det
We report the WIMP dark matter search results using the first physics-run data of the PandaX-II 500 kg liquid xenon dual-phase time-projection chamber, operating at the China JinPing Underground Laboratory. No dark matter candidate is identified above background. In combination with the data set during the commissioning run, with a total exposure of 3.3$\times10^4$ kg-day,the most stringent limit to the spin-independent interaction between the ordinary and WIMP dark matter is set for a range of dark matter mass between 3.5 and 1000 GeV/c$^2$. The best upper limit on the scattering cross section is found $2.5\times 10^{-46}$ cm$^2$ for the WIMP mass 40 GeV/c$^2$ at 90% confidence level.
• ### Fully integrated 3.2 Gbps quantum random number generator with real-time extraction(1606.09344)

June 30, 2016 quant-ph, cs.CR
We present a real-time and fully integrated quantum random number generator (QRNG) by measuring laser phase fluctuations. The QRNG scheme based on laser phase fluctuations is featured for its capability of generating ultra high-speed random numbers. However, the speed bottleneck of a practical QRNG lies on the limited speed of randomness extraction. To close the gap between the fast randomness generation and the slow post-processing, we propose a pipeline extraction algorithm based on Toeplitz matrix hashing and implement it in a high-speed field-programmable gate array. Further, all the QRNG components are integrated into a module, including a compact and actively stabilized interferometer, high-speed data acquisition, and real-time data post-processing and transmission. The final generation rate of the QRNG module with real-time extraction can reach 3.2 Gbps.
• ### Dark Matter Search Results from the Commissioning Run of PandaX-II(1602.06563)

June 5, 2016 hep-ex, physics.ins-det
We present the results of a search for WIMPs from the commissioning run of the PandaX-II experiment located at the China Jinping underground Laboratory. A WIMP search data set with an exposure of 306$\times$19.1 kg-day was taken, while its dominant $^{85}$Kr background was used as the electron recoil calibration. No WIMP candidates are identified, and a 90\% upper limit is set on the spin-independent elastic WIMP-nucleon cross section with a lowest excluded cross section of 2.97$\times$10$^{-45}$~cm$^2$ at a WIMP mass of 44.7~GeV/c$^2$.
• The Jiangmen Underground Neutrino Observatory (JUNO), a 20 kton multi-purpose underground liquid scintillator detector, was proposed with the determination of the neutrino mass hierarchy as a primary physics goal. It is also capable of observing neutrinos from terrestrial and extra-terrestrial sources, including supernova burst neutrinos, diffuse supernova neutrino background, geoneutrinos, atmospheric neutrinos, solar neutrinos, as well as exotic searches such as nucleon decays, dark matter, sterile neutrinos, etc. We present the physics motivations and the anticipated performance of the JUNO detector for various proposed measurements. By detecting reactor antineutrinos from two power plants at 53-km distance, JUNO will determine the neutrino mass hierarchy at a 3-4 sigma significance with six years of running. The measurement of antineutrino spectrum will also lead to the precise determination of three out of the six oscillation parameters to an accuracy of better than 1\%. Neutrino burst from a typical core-collapse supernova at 10 kpc would lead to ~5000 inverse-beta-decay events and ~2000 all-flavor neutrino-proton elastic scattering events in JUNO. Detection of DSNB would provide valuable information on the cosmic star-formation rate and the average core-collapsed neutrino energy spectrum. Geo-neutrinos can be detected in JUNO with a rate of ~400 events per year, significantly improving the statistics of existing geoneutrino samples. The JUNO detector is sensitive to several exotic searches, e.g. proton decay via the $p\to K^++\bar\nu$ decay channel. The JUNO detector will provide a unique facility to address many outstanding crucial questions in particle and astrophysics. It holds the great potential for further advancing our quest to understanding the fundamental properties of neutrinos, one of the building blocks of our Universe.
• ### Field Test of Measurement-Device-Independent Quantum Key Distribution(1408.2330)

Aug. 11, 2014 quant-ph
A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.
• ### Measurement-device-independent quantum key distribution over 200 km(1407.8012)

July 30, 2014 quant-ph
Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1 bps. Here, by developing a 75 MHz clock rate fully-automatic and highly-stable system, and superconducting nanowire single photon detectors with detection efficiencies more than 40%, we extend the secure transmission distance of MDIQKD to 200 km and achieve a secure key rate of three orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.
• ### Equations in nilpotent groups(1401.2471)

Jan. 10, 2014 math.GR
We show that there exists an algorithm to decide any single equation in the Heisenberg group in finite time. The method works for all two-step nilpotent groups with rank-one commutator, which includes the higher Heisenberg groups. We also prove that the decision problem for systems of equations is unsolvable in all non-abelian free nilpotent groups.
• ### Entanglement-based quantum key distribution with biased basis choice via free space(1304.6462)

Nov. 2, 2013 quant-ph
We report a free-space entanglement-based quantum key distribution experiment, implementing the biased basis protocol between two sites which are 15.3 km apart. Photon pairs from a polarization-entangled source are distributed through two 7.8-km free-space optical links. An optimal bias 20:80 between the X and Z basis is used. A post-processing scheme with finite-key analysis is applied to extract the final secure key. After three-hour continuous operation at night, a 4293-bit secure key is obtained, with a final key rate of 0.124 bit per raw key bit which increases the final key rate by 14.8% comparing to the standard BB84 case. Our results experimentally demonstrate that the efficient BB84 protocol, which increases key generation efficiency by biasing Alice and Bob's basis choices, is potentially useful for the ground-satellite quantum communication.
• ### Equation Problem over central extensions of hyperbolic groups(1307.5889)

July 22, 2013 math.GR
The Equation Problem in finitely presented groups asks if there exists an algorithm which determines in finite amount of time whether any given equation system has a solution or not. We show that the Equation Problem in central extensions of hyperbolic groups is solvable.
• ### Bounding the speed of spooky action at a distance'(1303.0614)

June 18, 2013 quant-ph
In the well-known EPR paper, Einstein et al. called the nonlocal correlation in quantum entanglement as spooky action at a distance'. If the spooky action does exist, what is its speed? All previous experiments along this direction have locality loopholes and thus can be explained without having to invoke any spooky action' at all. Here, we strictly closed the locality loopholes by observing a 12-hour continuous violation of Bell inequality and concluded that the lower bound speed of spooky action' was four orders of magnitude of the speed of light if the Earth's speed in any inertial reference frame was less than 10^(-3) times of the speed of light.
• ### Direct and full-scale experimental verifications towards ground-satellite quantum key distribution(1210.7556)

March 11, 2013 quant-ph
Quantum key distribution (QKD), provides the only intrinsically unconditional secure method for communication based on principle of quantum mechanics. Compared with fiber-based demonstrations-, free-space links could provide the most appealing solution for much larger distance. Despite of significant efforts, so far all realizations rely on stationary sites. Justifications are therefore extremely crucial for applications via a typical Low Earth Orbit Satellite (LEOS). To achieve direct and full-scale verifications, we demonstrate here three independent experiments with a decoy-state QKD system overcoming all the demanding conditions. The system is operated in a moving platform through a turntable, a floating platform through a hot-air balloon, and a huge loss channel, respectively, for substantiating performances under rapid motion, attitude change, vibration, random movement of satellites and in high-loss regime. The experiments cover expanded ranges for all the leading parameters of LEOS. Our results pave the way towards ground-satellite QKD and global quantum communication network.
• ### A real-time QKD system based on FPGA(1301.2383)

Jan. 11, 2013 quant-ph, cs.CR
A real-time Quantum Key Distribution System is developed in this paper. In the system, based on the feature of Field Programmable Gate Array (FPGA), secure key extraction control and algorithm have been optimally designed to perform sifting, error correction and privacy amplification altogether in real-time. In the QKD experiment information synchronization mechanism and high-speed classic data channel are designed to ensure the steady operation of the system. Decoy state and synchronous laser light source are used in the system, while the length of optical fiber between Alice and Bob is 20 km. With photons repetition frequency of 20 MHz, the final key rate could reach 17 kbps. Smooth and robust operation is verified with 6-hour continuous test and associated with encrypted voice communication test.
• ### Experimental measurement-device-independent quantum key distribution(1209.6178)

Sept. 27, 2012 quant-ph
Throughout history, every advance in encryption has been defeated by advances in hacking with severe consequences. Quantum cryptography holds the promise to end this battle by offering unconditional security when ideal single-photon sources and detectors are employed. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we build up a measurement-device-independent quantum key distribution (MDI-QKD) system, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defeat attacks on non-ideal source. By closing the loopholes in both source and detection, our practical system, which generates more than 25 kbit secure key over a 50-km fiber link, provides an ultimate solution for communication security.
• ### A note on directed 4-cycles in digraphs(1204.4515)

April 20, 2012 math.CO
Using some combinatorial techniques, in this note, it is proved that if $\alpha\geq 0.28866$, then any digraph on $n$ vertices with minimum outdegree at least $\alpha n$ contains a directed cycle of length at most 4.
• ### On the minimal feedback arc set of m-free Digraphs(1204.4516)

April 20, 2012 math.CO
For a simple digraph $G$, let $\beta(G)$ be the size of the smallest subset $X\subseteq E(G)$ such that $G-X$ has no directed cycles, and let $\gamma(G)$ be the number of unordered pairs of nonadjacent vertices in $G$. A digraph $G$ is called $m$-free if $G$ has no directed cycles of length at most $m$. This paper proves that $\beta(G)\leq \frac{1}{m-2}\gamma(G)$ for any $m$-free digraph $G$, which generalized some known results.
• ### Centralizers of Finite Subgroups of the Mapping Class Group(1202.5714)

Feb. 26, 2012 math.GR
In this paper, we study the action of finite subgroups of the mapping class group of a surface on the curve complex. We prove that if the diameter of the almost fixed point set of a finite subgroup H is big enough, then the centralizer of H is infinite.
• ### Metropolitan all-pass and inter-city quantum communication network(1008.1508)

Aug. 11, 2010 quant-ph
We have demonstrated a metropolitan all-pass quantum communication network in field fiber for four nodes. Any two nodes of them can be connected in the network to perform quantum key distribution (QKD). An optical switching module is presented that enables arbitrary 2-connectivity among output ports. Integrated QKD terminals are worked out, which can operate either as a transmitter, a receiver, or even both at the same time. Furthermore, an additional link in another city of 60 km fiber (up to 130 km) is seamless integrated into this network based on a trusted relay architecture. On all the links, we have implemented protocol of decoy state scheme. All of necessary electrical hardware, synchronization, feedback control, network software, execution of QKD protocols are made by tailored designing, which allow a completely automatical and stable running. Our system has been put into operation in Hefei in August 2009, and publicly demonstrated during an evaluation conference on quantum network organized by the Chinese Academy of Sciences on August 29, 2009. Real-time voice telephone with one-time pad encoding between any two of the five nodes (four all-pass nodes plus one additional node through relay) is successfully established in the network within 60km.
• ### 200km Decoy-state quantum key distribution with photon polarization(0908.4063)

Aug. 27, 2009 quant-ph
We demonstrate the decoy-state quantum key distribution over 200 km with photon polarization through optical fiber, by using super-conducting single photon detector with a repetition rate of 320 Mega Hz and a dark count rate of lower than 1 Hz. Since we have used the polarization coding, the synchronization pulses can be run in a low frequency. The final key rate is 14.1 Hz. The experiment lasts for 3089 seconds with 43555 total final bits.
• ### Field test of a practical secure communication network with decoy-state quantum cryptography(0810.1264)

April 26, 2009 quant-ph
We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.