Event-by-event simulation of a quantum delayed-choice experiment
نویسندگان
چکیده
منابع مشابه
Event-by-event simulation of Wheeler’s delayed-choice experiment
We present a computer simulation model of Wheeler’s delayed choice experiment. The model is solely based on experimental facts and does not rely on concepts of quantum theory or probability theory. We demonstrate that it is possible to give a particle-only description of Wheeler’s delayed choice experiment which reproduces the averages calculated from quantum theory and which does not defy comm...
متن کاملEvent-by-Event Simulation of a Quantum Eraser Experiment
Event-by-Event Simulation of a Quantum Eraser Experiment F. Jin1, S. Zhao1, S. Yuan2, H. De Raedt1 ∗, and K. Michielsen3 1Department of Applied Physics, Zernike Institute for Advanced Materials, University of Groningen, Nijenborgh 4, NL-9747 AG Groningen, The Netherlands 2Institute of Molecules and Materials, Radboud University of Nijmegen, NL-6525ED Nijmegen, The Netherlands 3Institute for Adv...
متن کاملEvent-by-Event Simulation of Quantum Phenomena
Recent advances in nanotechnology are paving the way to attain control over individual microscopic objects. The ability to prepare, manipulate, couple and measure single microscopic systems facilitate the study of single quantum systems at the level of individual events. Such experiments address the most fundamental aspects of quantum theory. Indeed, quantum theory gives us only a recipe to com...
متن کاملA quantum delayed-choice experiment.
Quantum systems exhibit particle- or wavelike behavior depending on the experimental apparatus they are confronted by. This wave-particle duality is at the heart of quantum mechanics. Its paradoxical nature is best captured in the delayed-choice thought experiment, in which a photon is forced to choose a behavior before the observer decides what to measure. Here, we report on a quantum delayed-...
متن کاملEvent-by-event Simulation of Quantum Cryptography Protocols∗
Cryptography is an artifice of exchanging information between two parties such that an unauthorized person cannot retrieve this information. To this end, the sender usually employs some key to encrypt the information to be transmitted, and the receiver applies a decryption algorithm to recover the original information. If the cryptographic system is secure, an eavesdropper can decipher the encr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Physics Communications
سال: 2014
ISSN: 0010-4655
DOI: 10.1016/j.cpc.2014.08.001