## Abstract

In standard communication information is carried by particles or waves. Counterintuitively, in counterfactual communication particles and information can travel in opposite directions. The quantum Zeno effect allows Bob to transmit a message to Alice by encoding information in particles he never interacts with. A first remarkable protocol for counterfactual communication relied on thousands of ideal optical operations for high success rate performance. Experimental realizations of that protocol have thus employed post-selection to demonstrate counterfactuality. This post-selection, together with arguments concerning a so-called “weak trace” of the particles traveling from Bob to Alice, have led to a discussion regarding the counterfactual nature of the protocol. Here we circumvent these controversies, implementing a new, and fundamentally different, protocol in a programmable nanophotonic processor, based on reconfigurable silicon-on-insulator waveguides that operate at telecom wavelengths. This, together with our telecom single-photon source and highly efficient superconducting nanowire single-photon detectors, provides a versatile and stable platform for a high-fidelity implementation of counterfactual communication with single photons, allowing us to actively tune the number of steps in the Zeno measurement, and achieve a bit error probability below 1%, without post-selection and with a vanishing weak trace. Our demonstration shows how our programmable nanophotonic processor could be applied to more complex counterfactual tasks and quantum information protocols.

## Introduction

Interaction-free measurements allow one to measure whether or not an object is present without ever interacting with it.^{1} This is made clear in Elitzur and Vaidman’s well-known bomb-testing gedanken experiment.^{2} In this experiment, a single photon used in a Mach-Zehnder interferometer (MZI) sometimes reveals whether or not an absorbing object (e.g., a bomb) had been placed in one of the interferometer arms, without any interaction between the photon and the bomb. It was later shown that the quantum Zeno effect, wherein repeated observations prevent the system from evolving,^{3,4} can be used to bring the success probability of this protocol arbitrarily close to unity.^{3,4,5,6} Such protocols are often referred to as “counterfactual”, and have now been applied to quantum computing,^{7} quantum key distribution^{8,9,10} and communication.^{11,12} Here, we experimentally implement a counterfactual communication (CFC) protocol where information can propagate without being carried by physical particles.

The first suggested protocol for CFC was developed by Salih et al., and it is based on a chain of nested MZIs.^{11,13} Following its publication, this fascinating protocol has been subject to both intense criticism and vigorous defense. There are four main points of discussion: (1) Achieving a high success probability (say > 95%) requires thousands of optical elements.^{11,12,14} (2) An analysis of the Fisher information flow indicates that to retain counterfactuality in Salih’s protocol, perfect quantum channels are needed.^{15} (3) If one performs a weak measurement in Bob’s lab, one can detect the presence of photons that are later found in Alice’s laboratory. Some authors have argued that the presence of the “weak trace” renders the counterfactuality of the protocol invalid,^{16,17,18,19} but others have dismissed the weak trace as a consequence of the unwanted weak measurement’s disturbance.^{20,21,22} (4) Unless operated in the theoretical limit of infinite optical operations, this scheme requires post-selection to remove the CFC violations.^{13,21,23} It has recently been shown that also a classical communication protocol can be counterfactual if post-selection is allowed.^{14}

To circumvent these issues, we implement a novel CFC protocol^{12} that does not need post-selection and requires orders of magnitude fewer optical elements than nested MZI protocols. In our scheme single photons travel from Alice to Bob but information from Bob to Alice; this has been dubbed type-II CFC, in contrast to type-I schemes, where the photon should remain with Alice throughout the protocol.^{15} In both types the particles and the information never co-propagate, thereby making the communication counterfactual. Note that the very recent proposals^{23,24} discussing means of making the Salih scheme trace-free still require the post-selected removal of non-counterfactual events, as well as thousands of ideal optical operations.

## Results

We perform our experiment using telecom single-photons in a state-of-the-art programmable nanophotonic processor (PNP),^{25} which is orders of magnitude more precise and stable than previous bulk-optic approaches.^{5,6} Our PNP also provides unprecedented tunability, which we use to investigate the scaling of the protocol by changing the number of chained interferometers. By combining the novel CFC protocol with our advanced photonic technology, we are able to implement counterfactual communication with a bit success probability above 99%, without post-selection. As in previous CFC protocols, the interferometer implementing the quantum Zeno effect is shared between Bob’s laboratory and the fully passive transmission channel. In contrast to these protocols, ours protocol allows for Alice’s laboratory to be situated outside the interferometer. As a result, even our proof-of-principle demonstration would allow for counterfactual communication over arbitrary distances, even if the region in which the non-local information transfer takes place is bounded by the size of the PNP.

Our protocol uses a series of *N* beamsplitters with reflectivity *R* = cos^{2}(*π*/2*N*), which, together with mirrors, form a circuit of *N* − 1 chained MZIs. As shown in Fig. 1, the communication protocol begins with Alice injecting a single photon into her input port. If Bob wants to send a logic 0 he leaves his mirrors in place, causing the photon to self interfere such that it exits in *D*_{B} with unit probability (Fig. 1a). To send a logic 1 Bob *locally* modifies the circuit to have the upper paths open (Fig. 1b). In this case the photon will successfully reflect off of all the beamsplitters and exit in *D*_{A} with probability *R*^{N}. Removing the mirrors effectively collapses the wavefunction after every beamsplitter, suppressing interference and implementing the Zeno effect. The probability that the photon remains in the lower arm after *N* beamsplitters can be made arbitrarily high by increasing *N* (and changing the reflectivities accordingly).

Since any implementation is restricted to a finite number of beamsplitters, there will be a probability for a photon to exit the wrong port when Bob tries to send a logic 1. This error probability is a function that decreases with *N* as *P*_{1,err} = 1 − *R*(*N*)^{N}. In the non-ideal case, optical losses in the system will increase this probability further. The errors associated with Bob’s attempt to transmit a logic 0 are of a different nature. In theory, he can always perfectly transmit a logic 0, independent of *N*; that is, *P*_{0,err} = 0. In practice, however, imperfections in the interferometers will lead to cases in which the photon re-enters Alice’s laboratory and she incorrectly records a logic 1. This leads to a rare counterfactual violation, as the wavefunction “leaks” from Bob’s to Alice’s laboratory,^{15} leaving a weak trace in Bob’s lab, while the photon is detected in Alice’s laboratory. The high-fidelity operations enabled by our PNP allows us to make the probability of such violations vanishingly small. Although they do not contribute to a counterfactual violation, dark counts in Alice’s detector will also increase this error rate.

We can overcome the bit errors by encoding each logical bit into *M* single photons, at the cost of slightly increasing the CFC violation. If Alice sends *M* photons into the transmission channel without detecting any at *D*_{A}, she will record a logic 0. On the other hand, if she detects one or more photons in her laboratory, she will record a logic 1. Assuming messages with a balanced number of 0s and 1s, the average bit error probability is given by:

where the second term is an approximation of \(1 - P_0^M\) valid for small values of *MP*_{0,err}. By increasing *M* we can thus decrease the contributions of *P*_{1,err} exponentially while only increasing those of *P*_{0,err} linearly. The counterfactual violation probability for a random bit is given by

where *η* is the detector efficiency. We can thus find an *M* that minimizes the average bit error, while also maintaining a low counterfactual violation probability. In our experiment this expression slightly overestimates the violation probability, as it includes the detector dark counts.

As illustrated in Fig. 2, we implement a series of chained MZIs using a PNP. At the intersections of each of the modes shown in the figure there are smaller MZIs that act as beamsplitters with tunable reflectivities and phases. Since each of the MZIs is completely tunable, we were able to implement our CFC protocol using two to six concatenated beamsplitters on the same photonic chip. Given the layout of our chip, six is the maximum number of beamsplitter that we can concatenate. In addition, the high interferometric visibility of the PNP, which we measure to be 99.94% on average, allows us to keep the rate of counterfactual violations low, without post-selection. The single photons are generated in a spontaneous parametric down conversion process and detected using superconducting nanowire single-photon detectors with detection efficiencies *η* ~ 90% (see Methods).

## Discussion

To study the performance of this CFC protocol we measure the average bit error, as a function of the number of photons in which the bit is encoded, *M*, for five different values of *N* number of BSs. For the logic 0, we configure the MZIs in Bob’s laboratory as mirrors (see Fig. 2), while for the logic 1 we let the MZIs in Bob’s laboratory act as SWAP gates, routing the light out of the interferometer chain. Since Alice cannot access detector *D*_{B}, she assumes that a photon is injected in the transmission channel every time she detects a heralding photon in *D*_{H}. We thus run the measurement until we have *M* recorded single-photon events in *D*_{H} (typical rates were 1.1 MHz) and look for the coincidences that these events have with *D*_{A} within a set coincidence window Δ*τ* = 2.5 ns that is shorter than the pulse separation. Our heralding efficiency was ~3% through the PNP.

Figure 3a shows the experimental average error probability of our CFC protocol as a function of *M* for different *N*. We also include a theoretical calculation of the expected error probabilities, which considers the heralding efficiency of the single photons and the success probability of the interferometer that is in good agreement with the experimental data. Note that these are not fits to the data, but rather models with no free parameters. As theoretically predicted, the error rate of the logic 1 decreases exponentially with increasing *M* and the error rate of the logic 0 increases linearly with *M*. We observe that higher *N* requires smaller *M*, and also results in lower bit error probabilities.

The success probability of this CFC scheme is highly sensitive to the fidelity of the interferometers and the overall heralding efficiency, which depends on the single-photon source and the coupling efficiency throughout the system. Hence, we optimized the setup for the *N* = 6 case. Figure 3b shows the corresponding error probability of the logic 1 and the logic 0. The inset in Fig. 3b shows the average error probability, where we find a minimum of 1.5% for *M* = 320, while the average counterfactual violation is kept at 2.4%. Owing to backscattering in Bob’s laboratory (i.e., imperfect SWAP operations) small “amounts” of wavefunction amplitude leak back into the transmission line in the 1 bit process. Although these do not all lead to detection events in Alice’s laboratory, the sum of their squares provides an upper bound on the probability of a counterfactual violation. We estimate that the probability for a photon to reflect off of a SWAP operation is at most 1%. Hence, in our experiment (Fig. 4) with *M* = 320 and *N* = 6, the weak trace is vanishingly small and the contribution from the logic 1 to a CFC violation is less than 1.1%. Note that this violation probability decreases with *N*, even if the errors remain the same.

To demonstrate the performance of the communication protocol we proceed to analyze the quality of a message in the form of a black and white image, sent from Bob to Alice, for *N* = 6 and *M* = {10, 50, 320, 500}. We arbitrarily define the white and black pixels of the image as logic 1 and logic 0, respectively.

Figure 4 shows the message transmitted from Bob to Alice for different numbers of encoding photons. We define the image fidelity as

where *B*_{i} is the bit that Bob intended to send, *A*_{i} is the bit that Alice recorded, and *T* is the total number of bits in the image. In this case we define the CFC violation probability as the number of incorrectly transmitted logic 0 s (black pixels) over T. The encoding using *M* = 10 is clearly not enough to overcome the losses of the system, with a very low image fidelity of 31.77%. As we increase *M*, the success probability and legibility of the message increases (the individual fidelities are listed below each panel). The image fidelity reaches 99.09% at *M* = 320, at which point the CFC violation probability from 0 bit errors remains as low as 0.6%. For *M* = 500 the image fidelity does not noticeably change; however, the CFC violation increases slightly. If the CFC violation of the 1 bit (caused by on-chip beamsplitter imperfections) is accounted for, the CFC violation at *M* = 320 increases to 2.3%. Note that these values are lower than the value in Fig. 3b due to the unbalanced distribution of black and white pixels in the image.

Our high-fidelity implementation of a counterfactual communication protocol without post-selection was enabled by a programmable nano-photonic processor. The high (99.94%) average visibility of the individual integrated interferometers allowed bit error probabilities as low as 1.5%, while, at the same time, keeping the probability for the transmission of a single bit to result in a counterfactual violation below 2.4%. By combining our state-of-the-art photonic technology with a novel theoretical proposal we contradicted a crucial premise of communication theory:^{26} that a message is carried by physical particles or waves. In fact, our work shows that “interaction-free non-locality”, first described by Elitzur and Vaidman,^{2} can be utilized to send information that is not necessarily bound to the trajectory of a wavefunction or to a physical particle. In addition to enabling further high-fidelity demonstrations of counterfactual protocols, our work highlights the important role that technological advancements can play in experimental investigations of fundamentals of quantum mechanics and information theory. We thus anticipate nanophotonic processors, such as ours, to be central to future photonic quantum information experiments all the way from the foundational level to commercialized products.

## Methods

### Telecom photon source

We use a pulsed Ti:Sapphire laser with a repetition rate of 76 MHz, an average power of 0.2 W, a central wavelength of 782.2 nm, and a pulse duration of 2.1 ps. The repetition rate is doubled via a passive temporal multiplexing stage.^{27,28} This beam pumps a periodically poled KTP crystal phase matched for collinear type-II spontaneous parametric down conversion, generating frequency non-degenerate photon pairs at *λ*_{H} = 1563 nm, *λ*_{T} = 1565.8 nm. Registering the shorter wavelength photon at the detector *D*_{H} heralds the presence of the longer wavelength one, which is sent to the waveguide.

### Programmable nanophotonic processor

Our chained Mach-Zehnder interferometers (MZIs) are implemented in a silicon-on-insulator (SOI) programmable waveguide, developed by the Quantum Photonics Laboratory at the Massachusetts Institute of Technology.^{25} The device consists of 88 MZIs, each accompanied by a pair of thermo-optic phase shifters that facilitate full control over the internal and external phases of the MZIs. The phase shifters are controlled by a 240-channel, 16-bit precision voltage supply, allowing for a phase precision higher than 250 μrad. The switching frequency of these phase shifters is 130 kHz. The coupling of the single photons in/out of the chip is performed using two Si_{3}N_{4}–SiO_{2} waveguides manufactured by Lionix International, that adiabatically taper the 10 × 10 μm mode from the single mode fiber down to 2 × 2 μm, matching the mode field diameter of the programmable waveguide at the input facet. The total insertion loss per facet was measured as low as 3 dB.

### Superconducting nanowire single-photon detectors

The photons are detected using superconducting nanowire single-photon detectors.^{29,30} These detectors are produced by photonSpot and are optimized to reach detection efficiencies ~90% at telecom wavelengths.

## Data availability

The datasets generated and analyzed during the current study are available from the corresponding author if you ask nicely.

## References

- 1.
Dicke, R. H. Interaction-free quantum measurements: a paradox?

*Am. J. Phys.***49**, 925–930 (1981). - 2.
Elitzur, A. C. & Vaidman, L. Quantum mechanical interaction-free measurements.

*Found. Phys.***23**, 987–997 (1993). - 3.
Degasperis, A., Fonda, L. & Ghirardi, G. C. Does the lifetime of an unstable system depend on the measuring apparatus?

*Il Nuovo Cim. A (1965–1970)***21**, 471–484 (1974). - 4.
Misra, B. & Sudarshan, E. C. G. The zeno’s paradox in quantum theory.

*J. Math. Phys.***18**, 756–763 (1977). - 5.
Kwiat, P., Weinfurter, H., Herzog, T., Zeilinger, A. & Kasevich, M. A. Interaction-free measurement.

*Phys. Rev. Lett.***74**, 4763–4766 (1995). - 6.
Kwiat, P. G. et al. High-efficiency quantum interrogation measurements via the quantum zeno effect.

*Phys. Rev. Lett.***83**, 4725–4728 (1999). - 7.
Hosten, O., Rakher, M. T., Barreiro, J. T., Peters, N. A. & Kwiat, P. G. Counterfactual quantum computation through quantum interrogation.

*Nature***439**, 949–952 (2006). - 8.
Noh, T.-G. Counterfactual quantum cryptography.

*Phys. Rev. Lett.***103**, 230501 (2009). - 9.
Yin, Z.-Q., Li, H.-W., Chen, W., Han, Z.-F. & Guo, G.-C. Security of counterfactual quantum cryptography.

*Phys. Rev. A***82**, 042335 (2010). - 10.
Liu, X. et al. Eavesdropping on counterfactual quantum key distribution with finite resources.

*Phys. Rev. A***90**, 022318 (2014). - 11.
Salih, H., Li, Z.-H., Al-Amri, M. & Zubairy, M. S. Protocol for direct counterfactual quantum communication.

*Phys. Rev. Lett.***110**, 170502 (2013). - 12.
Arvidsson-Shukur, D. R. M. & Barnes, C. H. W. Quantum counterfactual communication without a weak trace.

*Phys. Rev. A***94**, 062303 (2016). - 13.
Cao, Y. et al. Direct counterfactual communication via quantum zeno effect.

*Proc. Natl Acad. Sci.***114**, 4920–4924 (2017). - 14.
Arvidsson-Shukur, D. R. & Barnes, C. H. Postselection and counterfactual communication.

*Phys. Rev. A***99**, 060102 (2019). - 15.
Arvidsson-Shukur, D. R. M., Gottfries, A. N. O. & Barnes, C. H. W. Evaluation of counterfactuality in counterfactual communication protocols.

*Phys. Rev. A***96**, 062316 (2017). - 16.
Danan, A., Farfurnik, D., Bar-Ad, S. & Vaidman, L. Asking photons where they have been.

*Phys. Rev. Lett.***111**, 240402 (2013). - 17.
Vaidman, L. Past of a quantum particle.

*Phys. Rev. A***87**, 052104 (2013). - 18.
Vaidman, L. Reply to comment on ‘past of a quantum particle’.

*Phys. Rev. A***88**, 046103 (2013). - 19.
Vaidman, L. Comment on protocol for direct counterfactual quantum communication.

*Phys. Rev. Lett.***112**, 208901 (2014). - 20.
Li, Z.-H., Al-Amri, M. & Zubairy, M. S. Comment on past of a quantum particle.

*Phys. Rev. A***88**, 046102 (2013). - 21.
Salih, H., Li, Z.-H., Al-Amri, M. & Zubairy, M. S. Salih et al. reply.

*Phys. Rev. Lett.***112**, 208902 (2014). - 22.
Li, Z.-H., Al-Amri, M. & Zubairy, M. S. Direct counterfactual transmission of a quantum state.

*Phys. Rev. A***92**, 052315 (2015). - 23.
Aharonov, Y. & Vaidman, L. Modification of counterfactual communication protocols that eliminates weak particle traces.

*Phys. Rev. A***99**, 010103 (2019). - 24.
Salih, H., McCutcheon, W. & Rarity, J. Do the laws of physics prohibit counterfactual communication? Preprint at arXiv: 1806.01257 (2018).

- 25.
Harris, N. C. et al. Quantum transport simulations in a programmable nanophotonic processor.

*Nat. Photonics***11**, 447 (2017). - 26.
Shannon, C. A mathematical theory of communication.

*Bell Syst. Tech. J.***27**, 379–423 (1948). - 27.
Greganti, C. et al. Tuning single-photon sources for telecom multi-photon experiments.

*Opt. Express***26**, 3286–3302 (2018). - 28.
Broome, M. A., Almeida, M. P., Fedrizzi, A. & White, A. G. Reducing multi-photon rates in pulsed down-conversion by temporal multiplexing.

*Opt. Express***19**, 22698–22708 (2011). - 29.
Natarajan, C. M., Tanner, M. G. & Hadfield, R. H. Superconducting nanowire single-photon detectors: physics and applications.

*IOPscience***25**, 063001 (2012). - 30.
Marsili, F. et al. Detecting single infrared photons with 93% system efficiency.

*Nat. Photon.***7**, 210–214 (2013).

## Acknowledgements

I.A.C. and T.S. acknowledge support from the University of Vienna via the Vienna Doctoral School. L.A.R. acknowledges support from the Templeton World Charity Foundation (fellowship no. TWCF0194). P.W. acknowledges support from the European Commission through ErBeSta (No. 800942), the Austrian Research Promotion Agency (FFG) through the QuantERA ERA-NET Cofund project HiPhoP, from the Austrian Science Fund (FWF) through CoQuS (W1210-N25), BeyondC (F7113-N38) and NaMuG (P30067-N36), the U.S. Air Force Office of Scientific Research (FA2386-233 17-1-4011), and Red Bull GmbH. D.R.M.A.S. acknowledges support from the EPSRC, Hitachi Cambridge, Lars Hierta’s Memorial Foundation and the Sweden-America Foundation. N.H. was supported in part by the Air Force Research Laboratory RITA program (FA8750-14-2-0120); Research program FA9550-16-1-0391, supervised by Gernot Pomrenke; and D.E. acknowledges partial support from the Office of Naval Research CONQUEST program. The authors would like to express their gratitude towards J. Zeuner for helpful discussions and T. Rögelsperger for the artistic input. They furthermore thank LioniX International BV for the manufacturing of the interposer waveguides used in the experiment.

## Author information

### Author notes

### Affiliations

### Contributions

I.A.C., T.S., D.R.M.A.-S., L.A.R. and P.W. designed the experiment, analyzed the results, and wrote the paper. I.A.C., T.S., and L.A.R. performed the measurements. D.R.M.A.-S. and C.H.W.B. provided theoretical support. V.S. and C.G. built the telecom photon pair source. N.C.H., J.C., M.H, T.B.-J., and D.E. fabricated and characterized the nanophotonic processor. All authors read and commented on the paper.

### Corresponding authors

Correspondence to I. Alonso Calafell or T. Strömberg.

## Ethics declarations

### Competing interests

The authors declare no competing interests.

## Additional information

**Publisher’s note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

## Rights and permissions

**Open Access** This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.

## About this article

#### Received

#### Accepted

#### Published

#### DOI