Abstract
In standard communication information is carried by particles or waves. Counterintuitively, in counterfactual communication particles and information can travel in opposite directions. The quantum Zeno effect allows Bob to transmit a message to Alice by encoding information in particles he never interacts with. A first remarkable protocol for counterfactual communication relied on thousands of ideal optical operations for high success rate performance. Experimental realizations of that protocol have thus employed postselection to demonstrate counterfactuality. This postselection, together with arguments concerning a socalled “weak trace” of the particles traveling from Bob to Alice, have led to a discussion regarding the counterfactual nature of the protocol. Here we circumvent these controversies, implementing a new, and fundamentally different, protocol in a programmable nanophotonic processor, based on reconfigurable silicononinsulator waveguides that operate at telecom wavelengths. This, together with our telecom singlephoton source and highly efficient superconducting nanowire singlephoton detectors, provides a versatile and stable platform for a highfidelity implementation of counterfactual communication with single photons, allowing us to actively tune the number of steps in the Zeno measurement, and achieve a bit error probability below 1%, without postselection and with a vanishing weak trace. Our demonstration shows how our programmable nanophotonic processor could be applied to more complex counterfactual tasks and quantum information protocols.
Introduction
Interactionfree measurements allow one to measure whether or not an object is present without ever interacting with it.^{1} This is made clear in Elitzur and Vaidman’s wellknown bombtesting gedanken experiment.^{2} In this experiment, a single photon used in a MachZehnder interferometer (MZI) sometimes reveals whether or not an absorbing object (e.g., a bomb) had been placed in one of the interferometer arms, without any interaction between the photon and the bomb. It was later shown that the quantum Zeno effect, wherein repeated observations prevent the system from evolving,^{3,4} can be used to bring the success probability of this protocol arbitrarily close to unity.^{3,4,5,6} Such protocols are often referred to as “counterfactual”, and have now been applied to quantum computing,^{7} quantum key distribution^{8,9,10} and communication.^{11,12} Here, we experimentally implement a counterfactual communication (CFC) protocol where information can propagate without being carried by physical particles.
The first suggested protocol for CFC was developed by Salih et al., and it is based on a chain of nested MZIs.^{11,13} Following its publication, this fascinating protocol has been subject to both intense criticism and vigorous defense. There are four main points of discussion: (1) Achieving a high success probability (say > 95%) requires thousands of optical elements.^{11,12,14} (2) An analysis of the Fisher information flow indicates that to retain counterfactuality in Salih’s protocol, perfect quantum channels are needed.^{15} (3) If one performs a weak measurement in Bob’s lab, one can detect the presence of photons that are later found in Alice’s laboratory. Some authors have argued that the presence of the “weak trace” renders the counterfactuality of the protocol invalid,^{16,17,18,19} but others have dismissed the weak trace as a consequence of the unwanted weak measurement’s disturbance.^{20,21,22} (4) Unless operated in the theoretical limit of infinite optical operations, this scheme requires postselection to remove the CFC violations.^{13,21,23} It has recently been shown that also a classical communication protocol can be counterfactual if postselection is allowed.^{14}
To circumvent these issues, we implement a novel CFC protocol^{12} that does not need postselection and requires orders of magnitude fewer optical elements than nested MZI protocols. In our scheme single photons travel from Alice to Bob but information from Bob to Alice; this has been dubbed typeII CFC, in contrast to typeI schemes, where the photon should remain with Alice throughout the protocol.^{15} In both types the particles and the information never copropagate, thereby making the communication counterfactual. Note that the very recent proposals^{23,24} discussing means of making the Salih scheme tracefree still require the postselected removal of noncounterfactual events, as well as thousands of ideal optical operations.
Results
We perform our experiment using telecom singlephotons in a stateoftheart programmable nanophotonic processor (PNP),^{25} which is orders of magnitude more precise and stable than previous bulkoptic approaches.^{5,6} Our PNP also provides unprecedented tunability, which we use to investigate the scaling of the protocol by changing the number of chained interferometers. By combining the novel CFC protocol with our advanced photonic technology, we are able to implement counterfactual communication with a bit success probability above 99%, without postselection. As in previous CFC protocols, the interferometer implementing the quantum Zeno effect is shared between Bob’s laboratory and the fully passive transmission channel. In contrast to these protocols, ours protocol allows for Alice’s laboratory to be situated outside the interferometer. As a result, even our proofofprinciple demonstration would allow for counterfactual communication over arbitrary distances, even if the region in which the nonlocal information transfer takes place is bounded by the size of the PNP.
Our protocol uses a series of N beamsplitters with reflectivity R = cos^{2}(π/2N), which, together with mirrors, form a circuit of N − 1 chained MZIs. As shown in Fig. 1, the communication protocol begins with Alice injecting a single photon into her input port. If Bob wants to send a logic 0 he leaves his mirrors in place, causing the photon to self interfere such that it exits in D_{B} with unit probability (Fig. 1a). To send a logic 1 Bob locally modifies the circuit to have the upper paths open (Fig. 1b). In this case the photon will successfully reflect off of all the beamsplitters and exit in D_{A} with probability R^{N}. Removing the mirrors effectively collapses the wavefunction after every beamsplitter, suppressing interference and implementing the Zeno effect. The probability that the photon remains in the lower arm after N beamsplitters can be made arbitrarily high by increasing N (and changing the reflectivities accordingly).
Since any implementation is restricted to a finite number of beamsplitters, there will be a probability for a photon to exit the wrong port when Bob tries to send a logic 1. This error probability is a function that decreases with N as P_{1,err} = 1 − R(N)^{N}. In the nonideal case, optical losses in the system will increase this probability further. The errors associated with Bob’s attempt to transmit a logic 0 are of a different nature. In theory, he can always perfectly transmit a logic 0, independent of N; that is, P_{0,err} = 0. In practice, however, imperfections in the interferometers will lead to cases in which the photon reenters Alice’s laboratory and she incorrectly records a logic 1. This leads to a rare counterfactual violation, as the wavefunction “leaks” from Bob’s to Alice’s laboratory,^{15} leaving a weak trace in Bob’s lab, while the photon is detected in Alice’s laboratory. The highfidelity operations enabled by our PNP allows us to make the probability of such violations vanishingly small. Although they do not contribute to a counterfactual violation, dark counts in Alice’s detector will also increase this error rate.
We can overcome the bit errors by encoding each logical bit into M single photons, at the cost of slightly increasing the CFC violation. If Alice sends M photons into the transmission channel without detecting any at D_{A}, she will record a logic 0. On the other hand, if she detects one or more photons in her laboratory, she will record a logic 1. Assuming messages with a balanced number of 0s and 1s, the average bit error probability is given by:
where the second term is an approximation of \(1  P_0^M\) valid for small values of MP_{0,err}. By increasing M we can thus decrease the contributions of P_{1,err} exponentially while only increasing those of P_{0,err} linearly. The counterfactual violation probability for a random bit is given by
where η is the detector efficiency. We can thus find an M that minimizes the average bit error, while also maintaining a low counterfactual violation probability. In our experiment this expression slightly overestimates the violation probability, as it includes the detector dark counts.
As illustrated in Fig. 2, we implement a series of chained MZIs using a PNP. At the intersections of each of the modes shown in the figure there are smaller MZIs that act as beamsplitters with tunable reflectivities and phases. Since each of the MZIs is completely tunable, we were able to implement our CFC protocol using two to six concatenated beamsplitters on the same photonic chip. Given the layout of our chip, six is the maximum number of beamsplitter that we can concatenate. In addition, the high interferometric visibility of the PNP, which we measure to be 99.94% on average, allows us to keep the rate of counterfactual violations low, without postselection. The single photons are generated in a spontaneous parametric down conversion process and detected using superconducting nanowire singlephoton detectors with detection efficiencies η ~ 90% (see Methods).
Discussion
To study the performance of this CFC protocol we measure the average bit error, as a function of the number of photons in which the bit is encoded, M, for five different values of N number of BSs. For the logic 0, we configure the MZIs in Bob’s laboratory as mirrors (see Fig. 2), while for the logic 1 we let the MZIs in Bob’s laboratory act as SWAP gates, routing the light out of the interferometer chain. Since Alice cannot access detector D_{B}, she assumes that a photon is injected in the transmission channel every time she detects a heralding photon in D_{H}. We thus run the measurement until we have M recorded singlephoton events in D_{H} (typical rates were 1.1 MHz) and look for the coincidences that these events have with D_{A} within a set coincidence window Δτ = 2.5 ns that is shorter than the pulse separation. Our heralding efficiency was ~3% through the PNP.
Figure 3a shows the experimental average error probability of our CFC protocol as a function of M for different N. We also include a theoretical calculation of the expected error probabilities, which considers the heralding efficiency of the single photons and the success probability of the interferometer that is in good agreement with the experimental data. Note that these are not fits to the data, but rather models with no free parameters. As theoretically predicted, the error rate of the logic 1 decreases exponentially with increasing M and the error rate of the logic 0 increases linearly with M. We observe that higher N requires smaller M, and also results in lower bit error probabilities.
The success probability of this CFC scheme is highly sensitive to the fidelity of the interferometers and the overall heralding efficiency, which depends on the singlephoton source and the coupling efficiency throughout the system. Hence, we optimized the setup for the N = 6 case. Figure 3b shows the corresponding error probability of the logic 1 and the logic 0. The inset in Fig. 3b shows the average error probability, where we find a minimum of 1.5% for M = 320, while the average counterfactual violation is kept at 2.4%. Owing to backscattering in Bob’s laboratory (i.e., imperfect SWAP operations) small “amounts” of wavefunction amplitude leak back into the transmission line in the 1 bit process. Although these do not all lead to detection events in Alice’s laboratory, the sum of their squares provides an upper bound on the probability of a counterfactual violation. We estimate that the probability for a photon to reflect off of a SWAP operation is at most 1%. Hence, in our experiment (Fig. 4) with M = 320 and N = 6, the weak trace is vanishingly small and the contribution from the logic 1 to a CFC violation is less than 1.1%. Note that this violation probability decreases with N, even if the errors remain the same.
To demonstrate the performance of the communication protocol we proceed to analyze the quality of a message in the form of a black and white image, sent from Bob to Alice, for N = 6 and M = {10, 50, 320, 500}. We arbitrarily define the white and black pixels of the image as logic 1 and logic 0, respectively.
Figure 4 shows the message transmitted from Bob to Alice for different numbers of encoding photons. We define the image fidelity as
where B_{i} is the bit that Bob intended to send, A_{i} is the bit that Alice recorded, and T is the total number of bits in the image. In this case we define the CFC violation probability as the number of incorrectly transmitted logic 0 s (black pixels) over T. The encoding using M = 10 is clearly not enough to overcome the losses of the system, with a very low image fidelity of 31.77%. As we increase M, the success probability and legibility of the message increases (the individual fidelities are listed below each panel). The image fidelity reaches 99.09% at M = 320, at which point the CFC violation probability from 0 bit errors remains as low as 0.6%. For M = 500 the image fidelity does not noticeably change; however, the CFC violation increases slightly. If the CFC violation of the 1 bit (caused by onchip beamsplitter imperfections) is accounted for, the CFC violation at M = 320 increases to 2.3%. Note that these values are lower than the value in Fig. 3b due to the unbalanced distribution of black and white pixels in the image.
Our highfidelity implementation of a counterfactual communication protocol without postselection was enabled by a programmable nanophotonic processor. The high (99.94%) average visibility of the individual integrated interferometers allowed bit error probabilities as low as 1.5%, while, at the same time, keeping the probability for the transmission of a single bit to result in a counterfactual violation below 2.4%. By combining our stateoftheart photonic technology with a novel theoretical proposal we contradicted a crucial premise of communication theory:^{26} that a message is carried by physical particles or waves. In fact, our work shows that “interactionfree nonlocality”, first described by Elitzur and Vaidman,^{2} can be utilized to send information that is not necessarily bound to the trajectory of a wavefunction or to a physical particle. In addition to enabling further highfidelity demonstrations of counterfactual protocols, our work highlights the important role that technological advancements can play in experimental investigations of fundamentals of quantum mechanics and information theory. We thus anticipate nanophotonic processors, such as ours, to be central to future photonic quantum information experiments all the way from the foundational level to commercialized products.
Methods
Telecom photon source
We use a pulsed Ti:Sapphire laser with a repetition rate of 76 MHz, an average power of 0.2 W, a central wavelength of 782.2 nm, and a pulse duration of 2.1 ps. The repetition rate is doubled via a passive temporal multiplexing stage.^{27,28} This beam pumps a periodically poled KTP crystal phase matched for collinear typeII spontaneous parametric down conversion, generating frequency nondegenerate photon pairs at λ_{H} = 1563 nm, λ_{T} = 1565.8 nm. Registering the shorter wavelength photon at the detector D_{H} heralds the presence of the longer wavelength one, which is sent to the waveguide.
Programmable nanophotonic processor
Our chained MachZehnder interferometers (MZIs) are implemented in a silicononinsulator (SOI) programmable waveguide, developed by the Quantum Photonics Laboratory at the Massachusetts Institute of Technology.^{25} The device consists of 88 MZIs, each accompanied by a pair of thermooptic phase shifters that facilitate full control over the internal and external phases of the MZIs. The phase shifters are controlled by a 240channel, 16bit precision voltage supply, allowing for a phase precision higher than 250 μrad. The switching frequency of these phase shifters is 130 kHz. The coupling of the single photons in/out of the chip is performed using two Si_{3}N_{4}–SiO_{2} waveguides manufactured by Lionix International, that adiabatically taper the 10 × 10 μm mode from the single mode fiber down to 2 × 2 μm, matching the mode field diameter of the programmable waveguide at the input facet. The total insertion loss per facet was measured as low as 3 dB.
Superconducting nanowire singlephoton detectors
The photons are detected using superconducting nanowire singlephoton detectors.^{29,30} These detectors are produced by photonSpot and are optimized to reach detection efficiencies ~90% at telecom wavelengths.
Data availability
The datasets generated and analyzed during the current study are available from the corresponding author if you ask nicely.
References
 1.
Dicke, R. H. Interactionfree quantum measurements: a paradox? Am. J. Phys. 49, 925–930 (1981).
 2.
Elitzur, A. C. & Vaidman, L. Quantum mechanical interactionfree measurements. Found. Phys. 23, 987–997 (1993).
 3.
Degasperis, A., Fonda, L. & Ghirardi, G. C. Does the lifetime of an unstable system depend on the measuring apparatus? Il Nuovo Cim. A (1965–1970) 21, 471–484 (1974).
 4.
Misra, B. & Sudarshan, E. C. G. The zeno’s paradox in quantum theory. J. Math. Phys. 18, 756–763 (1977).
 5.
Kwiat, P., Weinfurter, H., Herzog, T., Zeilinger, A. & Kasevich, M. A. Interactionfree measurement. Phys. Rev. Lett. 74, 4763–4766 (1995).
 6.
Kwiat, P. G. et al. Highefficiency quantum interrogation measurements via the quantum zeno effect. Phys. Rev. Lett. 83, 4725–4728 (1999).
 7.
Hosten, O., Rakher, M. T., Barreiro, J. T., Peters, N. A. & Kwiat, P. G. Counterfactual quantum computation through quantum interrogation. Nature 439, 949–952 (2006).
 8.
Noh, T.G. Counterfactual quantum cryptography. Phys. Rev. Lett. 103, 230501 (2009).
 9.
Yin, Z.Q., Li, H.W., Chen, W., Han, Z.F. & Guo, G.C. Security of counterfactual quantum cryptography. Phys. Rev. A 82, 042335 (2010).
 10.
Liu, X. et al. Eavesdropping on counterfactual quantum key distribution with finite resources. Phys. Rev. A 90, 022318 (2014).
 11.
Salih, H., Li, Z.H., AlAmri, M. & Zubairy, M. S. Protocol for direct counterfactual quantum communication. Phys. Rev. Lett. 110, 170502 (2013).
 12.
ArvidssonShukur, D. R. M. & Barnes, C. H. W. Quantum counterfactual communication without a weak trace. Phys. Rev. A 94, 062303 (2016).
 13.
Cao, Y. et al. Direct counterfactual communication via quantum zeno effect. Proc. Natl Acad. Sci. 114, 4920–4924 (2017).
 14.
ArvidssonShukur, D. R. & Barnes, C. H. Postselection and counterfactual communication. Phys. Rev. A 99, 060102 (2019).
 15.
ArvidssonShukur, D. R. M., Gottfries, A. N. O. & Barnes, C. H. W. Evaluation of counterfactuality in counterfactual communication protocols. Phys. Rev. A 96, 062316 (2017).
 16.
Danan, A., Farfurnik, D., BarAd, S. & Vaidman, L. Asking photons where they have been. Phys. Rev. Lett. 111, 240402 (2013).
 17.
Vaidman, L. Past of a quantum particle. Phys. Rev. A 87, 052104 (2013).
 18.
Vaidman, L. Reply to comment on ‘past of a quantum particle’. Phys. Rev. A 88, 046103 (2013).
 19.
Vaidman, L. Comment on protocol for direct counterfactual quantum communication. Phys. Rev. Lett. 112, 208901 (2014).
 20.
Li, Z.H., AlAmri, M. & Zubairy, M. S. Comment on past of a quantum particle. Phys. Rev. A 88, 046102 (2013).
 21.
Salih, H., Li, Z.H., AlAmri, M. & Zubairy, M. S. Salih et al. reply. Phys. Rev. Lett. 112, 208902 (2014).
 22.
Li, Z.H., AlAmri, M. & Zubairy, M. S. Direct counterfactual transmission of a quantum state. Phys. Rev. A 92, 052315 (2015).
 23.
Aharonov, Y. & Vaidman, L. Modification of counterfactual communication protocols that eliminates weak particle traces. Phys. Rev. A 99, 010103 (2019).
 24.
Salih, H., McCutcheon, W. & Rarity, J. Do the laws of physics prohibit counterfactual communication? Preprint at arXiv: 1806.01257 (2018).
 25.
Harris, N. C. et al. Quantum transport simulations in a programmable nanophotonic processor. Nat. Photonics 11, 447 (2017).
 26.
Shannon, C. A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948).
 27.
Greganti, C. et al. Tuning singlephoton sources for telecom multiphoton experiments. Opt. Express 26, 3286–3302 (2018).
 28.
Broome, M. A., Almeida, M. P., Fedrizzi, A. & White, A. G. Reducing multiphoton rates in pulsed downconversion by temporal multiplexing. Opt. Express 19, 22698–22708 (2011).
 29.
Natarajan, C. M., Tanner, M. G. & Hadfield, R. H. Superconducting nanowire singlephoton detectors: physics and applications. IOPscience 25, 063001 (2012).
 30.
Marsili, F. et al. Detecting single infrared photons with 93% system efficiency. Nat. Photon. 7, 210–214 (2013).
Acknowledgements
I.A.C. and T.S. acknowledge support from the University of Vienna via the Vienna Doctoral School. L.A.R. acknowledges support from the Templeton World Charity Foundation (fellowship no. TWCF0194). P.W. acknowledges support from the European Commission through ErBeSta (No. 800942), the Austrian Research Promotion Agency (FFG) through the QuantERA ERANET Cofund project HiPhoP, from the Austrian Science Fund (FWF) through CoQuS (W1210N25), BeyondC (F7113N38) and NaMuG (P30067N36), the U.S. Air Force Office of Scientific Research (FA2386233 1714011), and Red Bull GmbH. D.R.M.A.S. acknowledges support from the EPSRC, Hitachi Cambridge, Lars Hierta’s Memorial Foundation and the SwedenAmerica Foundation. N.H. was supported in part by the Air Force Research Laboratory RITA program (FA87501420120); Research program FA95501610391, supervised by Gernot Pomrenke; and D.E. acknowledges partial support from the Office of Naval Research CONQUEST program. The authors would like to express their gratitude towards J. Zeuner for helpful discussions and T. Rögelsperger for the artistic input. They furthermore thank LioniX International BV for the manufacturing of the interposer waveguides used in the experiment.
Author information
Affiliations
Contributions
I.A.C., T.S., D.R.M.A.S., L.A.R. and P.W. designed the experiment, analyzed the results, and wrote the paper. I.A.C., T.S., and L.A.R. performed the measurements. D.R.M.A.S. and C.H.W.B. provided theoretical support. V.S. and C.G. built the telecom photon pair source. N.C.H., J.C., M.H, T.B.J., and D.E. fabricated and characterized the nanophotonic processor. All authors read and commented on the paper.
Corresponding authors
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Alonso Calafell, I., Strömberg, T., ArvidssonShukur, D.R.M. et al. Tracefree counterfactual communication with a nanophotonic processor. npj Quantum Inf 5, 61 (2019). https://doi.org/10.1038/s4153401901792
Received:
Accepted:
Published:
Further reading

Counterfactual logic gates
Physical Review A (2020)

Universal programmable photonic architecture for quantum information processing
Physical Review A (2020)