3,565 research outputs found

    From quantum-codemaking to quantum code-breaking

    Get PDF
    This is a semi-popular overview of quantum entanglement as an important physical resource in the field of data security and quantum computing. After a brief outline of entanglement's key role in philosophical debates about the meaning of quantum mechanics I describe its current impact on both cryptography and cryptanalysis. The paper is based on the lecture given at the conference "Geometric Issues in the Foundations of Science" (Oxford, June 1996) in honor of Roger Penrose.Comment: 21 pages, LaTeX2e, psfig, multi3.cls, 1 eps figur

    Symmetrizing Evolutions

    Full text link
    We introduce quantum procedures for making G\cal G-invariant the dynamics of an arbitrary quantum system S, where G\cal G is a finite group acting on the space state of S. Several applications of this idea are discussed. In particular when S is a N-qubit quantum computer interacting with its environment and G\cal G the symmetric group of qubit permutations, the resulting effective dynamics admits noiseless subspaces. Moreover it is shown that the recently introduced iterated-pulses schemes for reducing decoherence in quantum computers fit in this general framework. The noise-inducing component of the Hamiltonian is filtered out by the symmetrization procedure just due to its transformation properties.Comment: Presentation improved, to appear in Phys. Lett. A. 5 pages LaTeX, no figure

    Higher dimensional quantum communication in a curved spacetime: an efficient simulation of the propagation of the wavefront of a photon

    Full text link
    A photon with a modulated wavefront can produce a quantum communication channel in a larger Hilbert space. For example, higher dimensional quantum key distribution (HD-QKD) can encode information in the transverse linear momentum (LM) or orbital angular momentum (OAM) modes of a photon. This is markedly different than using the intrinsic polarization of a photon. HD-QKD has advantages for free space QKD since it can increase the communication channel\~Os tolerance to bit error rate (BER) while maintaining or increasing the channels bandwidth. We describe an efficient numerical simulation of the propagation photon with an arbitrary complex wavefront in a material with an isotropic but inhomogeneous index of refraction. We simulate the waveform propagation of an optical vortex in a volume holographic element in the paraxial approximation using an operator splitting method. We use this code to analyze an OAM volume-holographic sorter. Furthermore, there are analogue models of the evolution of a wavefront in the curved spacetime environs of the Earth that can be constructed using an optical medium with a given index of refraction. This can lead to a work-bench realization of a satellite HD-QKD system.Comment: 20 pages, 7 figure

    Quantum cryptography with polarizing interferometers

    Get PDF
    Cryptographic scheme proposed by Bennett, Brassard, and Mermin [Phys. Rev. Lett. {\bf 68}, 557 (1992)] is reformulated in a version involving two polarizing Mach-Zehnder interferometers. Such a form, although physically equivalent to the original one, makes its security explicit, suggestive and easy to explain to non-experts.Comment: revtex, 4 pages, 1 ps figur

    How to Counteract Systematic Errors in Quantum State Transfer

    Full text link
    In the absence of errors, the dynamics of a spin chain, with a suitably engineered local Hamiltonian, allow the perfect, coherent transfer of a quantum state over large distances. Here, we propose encoding and decoding procedures to recover perfectly from low rates of systematic errors. The encoding and decoding regions, located at opposite ends of the chain, are small compared to the length of the chain, growing linearly with the size of the error. We also describe how these errors can be identified, again by only acting on the encoding and decoding regions.Comment: 16 pages, 1 figur

    Unambiguous Discrimination Between Linearly-Independent Quantum States

    Full text link
    The theory of generalised measurements is used to examine the problem of discriminating unambiguously between non-orthogonal pure quantum states. Measurements of this type never give erroneous results, although, in general, there will be a non-zero probability of a result being inconclusive. It is shown that only linearly-independent states can be unambiguously discriminated. In addition to examining the general properties of such measurements, we discuss their application to entanglement concentration

    A Universal Two--Bit Gate for Quantum Computation

    Get PDF
    We prove the existence of a class of two--input, two--output gates any one of which is universal for quantum computation. This is done by explicitly constructing the three--bit gate introduced by Deutsch [Proc.~R.~Soc.~London.~A {\bf 425}, 73 (1989)] as a network consisting of replicas of a single two--bit gate.Comment: 3 pages, RevTeX, two figures in a uuencoded fil

    A Generic Security Proof for Quantum Key Distribution

    Full text link
    Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages which can be monitored but not altered by an eavesdropper, Eve. Quantum key distribution provides perfect security because, unlike its classical counterpart, it relies on the laws of physics rather than on ensuring that successful eavesdropping would require excessive computational effort. However, security proofs of quantum key distribution are not trivial and are usually restricted in their applicability to specific protocols. In contrast, we present a general and conceptually simple proof which can be applied to a number of different protocols. It relies on the fact that a cryptographic procedure called privacy amplification is equally secure when an adversary's memory for data storage is quantum rather than classical.Comment: Analysis of B92 protocol adde

    The scarring effect of unemployment in ten European countries : an analysis based on the ECHP.

    Get PDF
    This paper investigates the effect of unemployment on earnings for ten European countries. Using an harmonised database (ECHP), we estimate the impact of declared unemployment on individuals while taking account of attrition and unobserved individual heterogeneity. We find that the unemployment effect differs by country and gender. The wage penalty is greater for men than for women. It is also higher in the more flexible economies. We suggest that labour market institutions such as unemployment benefits and wage-setting institutions may be avenues of investigation to explain these differences.Unemployment, Unobserved heterogeneity, post unemployment earnings.
    • 

    corecore