16,750 research outputs found
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Quantum e-commerce: A comparative study of possible protocols for online shopping and other tasks related to e-commerce
A set of quantum protocols for online shopping is proposed and analyzed to
establish that it is possible to perform secure online shopping using different
types of quantum resources. Specifically, a single photon based, a Bell state
based and two 3-qubit entangled state based quantum online shopping schemes are
proposed. The Bell state based scheme, being a completely orthogonal state
based protocol, is fundamentally different from the earlier proposed schemes
which were based on conjugate coding. One of the 3-qubit entangled state based
scheme is build on the principle of entanglement swapping which enables us to
accomplish the task without transmission of the message encoded qubits through
the channel. Possible ways of generalizing the entangled state based schemes
proposed here to the schemes which use multiqubit entangled states is also
discussed. Further, all the proposed protocols are shown to be free from the
limitations of the recently proposed protocol of Huang et al. (Quantum Inf.
Process. 14, 2211-2225, 2015) which allows the buyer (Alice) to change her
order at a later time (after initially placing the order and getting it
authenticated by the controller). The proposed schemes are also compared with
the existing schemes using qubit efficiency.Comment: It's shown that quantum e-commerce is not a difficult task, and it
can be done in various way
Entanglement and secret-key-agreement capacities of bipartite quantum interactions and read-only memory devices
A bipartite quantum interaction corresponds to the most general quantum
interaction that can occur between two quantum systems in the presence of a
bath. In this work, we determine bounds on the capacities of bipartite
interactions for entanglement generation and secret key agreement between two
quantum systems. Our upper bound on the entanglement generation capacity of a
bipartite quantum interaction is given by a quantity called the bidirectional
max-Rains information. Our upper bound on the secret-key-agreement capacity of
a bipartite quantum interaction is given by a related quantity called the
bidirectional max-relative entropy of entanglement. We also derive tighter
upper bounds on the capacities of bipartite interactions obeying certain
symmetries. Observing that reading of a memory device is a particular kind of
bipartite quantum interaction, we leverage our bounds from the bidirectional
setting to deliver bounds on the capacity of a task that we introduce, called
private reading of a wiretap memory cell. Given a set of point-to-point quantum
wiretap channels, the goal of private reading is for an encoder to form
codewords from these channels, in order to establish secret key with a party
who controls one input and one output of the channels, while a passive
eavesdropper has access to one output of the channels. We derive both lower and
upper bounds on the private reading capacities of a wiretap memory cell. We
then extend these results to determine achievable rates for the generation of
entanglement between two distant parties who have coherent access to a
controlled point-to-point channel, which is a particular kind of bipartite
interaction.Comment: v3: 34 pages, 3 figures, accepted for publication in Physical Review
Extendibility limits the performance of quantum processors
Resource theories in quantum information science are helpful for the study
and quantification of the performance of information-processing tasks that
involve quantum systems. These resource theories also find applications in
other areas of study; e.g., the resource theories of entanglement and coherence
have found use and implications in the study of quantum thermodynamics and
memory effects in quantum dynamics. In this paper, we introduce the resource
theory of unextendibility, which is associated to the inability of extending
quantum entanglement in a given quantum state to multiple parties. The free
states in this resource theory are the -extendible states, and the free
channels are -extendible channels, which preserve the class of
-extendible states. We make use of this resource theory to derive
non-asymptotic, upper bounds on the rate at which quantum communication or
entanglement preservation is possible by utilizing an arbitrary quantum channel
a finite number of times, along with the assistance of -extendible channels
at no cost. We then show that the bounds we obtain are significantly tighter
than previously known bounds for both the depolarizing and erasure channels.Comment: 39 pages, 6 figures, v2 includes pretty strong converse bounds for
antidegradable channels, as well as other improvement
Quantum reading capacity: General definition and bounds
Quantum reading refers to the task of reading out classical information
stored in a read-only memory device. In any such protocol, the transmitter and
receiver are in the same physical location, and the goal of such a protocol is
to use these devices (modeled by independent quantum channels), coupled with a
quantum strategy, to read out as much information as possible from a memory
device, such as a CD or DVD. As a consequence of the physical setup of quantum
reading, the most natural and general definition for quantum reading capacity
should allow for an adaptive operation after each call to the channel, and this
is how we define quantum reading capacity in this paper. We also establish
several bounds on quantum reading capacity, and we introduce an
environment-parametrized memory cell with associated environment states,
delivering second-order and strong converse bounds for its quantum reading
capacity. We calculate the quantum reading capacities for some exemplary memory
cells, including a thermal memory cell, a qudit erasure memory cell, and a
qudit depolarizing memory cell. We finally provide an explicit example to
illustrate the advantage of using an adaptive strategy in the context of
zero-error quantum reading capacity.Comment: v3: 17 pages, 2 figures, final version published in IEEE Transactions
on Information Theor
Quantum Cloning Machines and the Applications
No-cloning theorem is fundamental for quantum mechanics and for quantum
information science that states an unknown quantum state cannot be cloned
perfectly. However, we can try to clone a quantum state approximately with the
optimal fidelity, or instead, we can try to clone it perfectly with the largest
probability. Thus various quantum cloning machines have been designed for
different quantum information protocols. Specifically, quantum cloning machines
can be designed to analyze the security of quantum key distribution protocols
such as BB84 protocol, six-state protocol, B92 protocol and their
generalizations. Some well-known quantum cloning machines include universal
quantum cloning machine, phase-covariant cloning machine, the asymmetric
quantum cloning machine and the probabilistic quantum cloning machine etc. In
the past years, much progress has been made in studying quantum cloning
machines and their applications and implementations, both theoretically and
experimentally. In this review, we will give a complete description of those
important developments about quantum cloning and some related topics. On the
other hand, this review is self-consistent, and in particular, we try to
present some detailed formulations so that further study can be taken based on
those results.Comment: 98 pages, 12 figures, 400+ references. Physics Reports (published
online
- …