4.6 Article

Data transmission by quantum matter wave modulation

Journal

NEW JOURNAL OF PHYSICS
Volume 23, Issue 2, Pages -

Publisher

IOP Publishing Ltd
DOI: 10.1088/1367-2630/abe15f

Keywords

communication; quantum modulation; interferometry; electron; Wien filter; secure data transfer; matter wave

Funding

  1. Vector Stiftung through the initiative 'MINT-Innovationen'
  2. Office of Science, Office of Basic Energy Sciences, of the US Department of Energy [DE-AC02-05CH11231]
  3. Deutsche Forschungsgemeinschaft [STI 615/3-1]

Ask authors/readers for more resources

Classical communication schemes using wave modulation form the foundation of the information era, but quantum information techniques with photons are enabling secure data transfer in the age of decoding quantum computers. This study demonstrates the use of matter waves for secure data transfer by coding information in coherent electrons and analyzing fringe patterns using interferometers and detectors. The method is based on the Aharonov-Bohm effect, does not alter the phase, but is vulnerable to eavesdropping attacks which can disrupt the quantum state and introduce decoherence.
Classical communication schemes exploiting wave modulation are the basis of our information era. Quantum information techniques with photons enable future secure data transfer in the dawn of decoding quantum computers. Here we demonstrate that also matter waves can be applied for secure data transfer. Our technique allows the transmission of a message by a quantum modulation of coherent electrons in a biprism interferometer. The data is encoded in the superposition state by a Wien filter introducing a longitudinal shift between separated matter wave packets. The transmission receiver is a delay line detector performing a dynamic contrast analysis of the fringe pattern. Our method relies on the Aharonov-Bohm effect but does not shift the phase. It is demonstrated that an eavesdropping attack will terminate the data transfer by disturbing the quantum state and introducing decoherence. Furthermore, we discuss the security limitations of the scheme due to the multi-particle aspect and propose the implementation of a key distribution protocol that can prevent active eavesdropping.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available