Feeds

Quantum boffins send data ACROSS TIME AND SPACE

Destroyed photon communicates with another that didn't exist at the time

Top 5 reasons to deploy VMware with Tegile

Researchers in Israel have pulled a trick that makes quantum physics seem even stranger than an episode of Doctor Who – they've created a pair of photons that was briefly entangled not across space, but across time.

The last time El Reg discussed time-like entanglement it was being proposed as a theoretical construct. The idea put forward then was that by interacting with the quantum vacuum, two photons existing at different points in time could become entangled.

That, however, was just a proposal for one way that a time-like entanglement might exist. Now, in this paper at Arxiv (now published in Physical Review Letters), the University of Jerusalem researchers have demonstrated that it can be done.

The group, led by Hagai Eisenberg, took a different tack to last year's story, using only photon-to-photon entanglements to create a “spooky action at a distance” – between photons that never existed at the same time.

The process is pretty straightforward, as it turns out:

  • First, the researchers used a laser to create entanglement between two photons, P1 and P2, and measured the polarisation of P1 (destroying it);
  • Next, they create a second pair, P3 and P4;
  • P2 and P3 are entangled using a technique known as projective measurement: measuring the two simultaneously created their entanglement.

After this process, the researchers say, polarisation measurement on P4 showed entanglement with P1, even though P1 was destroyed before P4 was created.

Quantum entanglement time-line diagram

Measuring P1 destroys it; even so, it gets its state from P4

Image: Phys. Rev. Lett. 110, 210403 (2013)

DOI: 10.1103/PhysRevLett.110.210403

“In the scenario we present here, measuring the last photon affects the physical description of the first photon in the past, before it has even been measured. Thus, the 'spooky action' is steering the system’s past. Another point of view that one can take is that the measurement of the first photon is immediately steering the future physical description of the last photon. In this case, the action is on the future of a part of the system that has not yet been created”, they write.

“This is a manifestation of the non-locality of quantum mechanics not only in space, but also in time. The inductive nature of the setup that was used suggests that it is possible in principle to use it to observe multiple stage entanglement swapping,” the researchers conclude. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Post-pub nosh neckfiller: The MIGHTY Scotch egg
Off to the boozer? This delicacy might help mitigate the effects
I'M SO SORRY, sobs Rosetta Brit boffin in 'sexist' sexy shirt storm
'He is just being himself' says proud mum of larger-than-life physicist
NASA launches new climate model at SC14
75 days of supercomputing later ...
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.