11,064 research outputs found
Physical basis of quantum computation and cryptography. Poster
Quantum computing combines two of the main scientific
achievements of the 20th century: Information Theory and
Quantum Mechanics. Its interdisciplinary character is one
of the most stimulating and appealing attributes. The new
Quantum Information Theory augurs powerful machines
that obey the “entangled” logic of the subatomic world. Parallelism,
entanglement, teleportation, no-cloning and quantum
cryptography are typical peculiarities of this novel way
of understanding computation. In this article, we highlight
and explain these fundamental ingredients that make Quantum
Computing potentially powerful
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography is the art and science of exploiting quantum mechanical
effects in order to perform cryptographic tasks. While the most well-known
example of this discipline is quantum key distribution (QKD), there exist many
other applications such as quantum money, randomness generation, secure two-
and multi-party computation and delegated quantum computation. Quantum
cryptography also studies the limitations and challenges resulting from quantum
adversaries---including the impossibility of quantum bit commitment, the
difficulty of quantum rewinding and the definition of quantum security models
for classical primitives. In this review article, aimed primarily at
cryptographers unfamiliar with the quantum world, we survey the area of
theoretical quantum cryptography, with an emphasis on the constructions and
limitations beyond the realm of QKD.Comment: 45 pages, over 245 reference
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Quantum Private Comparison: A Review
As an important branch of quantum secure multiparty computation, quantum
private comparison (QPC) has attracted more and more attention recently. In
this paper, according to the quantum implementation mechanism that these
protocols used, we divide these protocols into three categories: The quantum
cryptography QPC, the superdense coding QPC, and the entanglement swapping QPC.
And then, a more in-depth analysis on the research progress, design idea, and
substantive characteristics of corresponding QPC categories is carried out,
respectively. Finally, the applications of QPC and quantum secure multi-party
computation issues are discussed and, in addition, three possible research
mainstream directions are pointed out
Philosophical Aspects of Quantum Information Theory
Quantum information theory represents a rich subject of discussion for those
interested in the philosphical and foundational issues surrounding quantum
mechanics for a simple reason: one can cast its central concerns in terms of a
long-familiar question: How does the quantum world differ from the classical
one? Moreover, deployment of the concepts of information and computation in
novel contexts hints at new (or better) means of understanding quantum
mechanics, and perhaps even invites re-assessment of traditional material
conceptions of the basic nature of the physical world. In this paper I review
some of these philosophical aspects of quantum information theory, begining
with an elementary survey of the theory, seeking to highlight some of the
principles and heuristics involved. We move on to a discussion of the nature
and definition of quantum information and deploy the findings in discussing the
puzzles surrounding teleportation. The final two sections discuss,
respectively, what one might learn from the development of quantum computation
(both about the nature of quantum systems and about the nature of computation)
and consider the impact of quantum information theory on the traditional
foundational questions of quantum mechanics (treating of the views of
Zeilinger, Bub and Fuchs, amongst others).Comment: LaTeX; 55pp; 3 figs. Forthcoming in Rickles (ed.) The Ashgate
Companion to the New Philosophy of Physic
A pedagogical overview of quantum discord
Recent measures of nonclassical correlations are motivated by different
notions of classicality and operational means. Quantum discord has received a
great deal of attention in studies involving quantum computation, metrology,
dynamics, many-body physics, and thermodynamics. In this article I show how
quantum discord is different from quantum entanglement from a pedagogical point
of view. I begin with a pedagogical introduction to quantum entanglement and
quantum discord, followed by a historical review of quantum discord. Next, I
give a novel definition of quantum discord in terms of any classically
extractable information, a approach that is fitting for the current avenues of
research. Lastly, I put forth several arguments for why discord is an
interesting quantity to study and why it is of interest to so many researchers
in the community.Comment: 17 pages, 6 figures, to appear in special OSID volume of on open
system
Kak's three-stage protocol of secure quantum communication revisited: Hitherto unknown strengths and weaknesses of the protocol
Kak's three-stage protocol for quantum key distribution is revisited with
special focus on its hitherto unknown strengths and weaknesses. It is shown
that this protocol can be used for secure direct quantum communication.
Further, the implementability of this protocol in the realistic situation is
analyzed by considering various Markovian noise models. It is found that the
Kak's protocol and its variants in their original form can be implemented only
in a restricted class of noisy channels, where the protocols can be transformed
to corresponding protocols based on logical qubits in decoherence free
subspace. Specifically, it is observed that Kak's protocol can be implemented
in the presence of collective rotation and collective dephasing noise, but
cannot be implemented in its original form in the presence of other types of
noise, like amplitude damping and phase damping noise. Further, the performance
of the protocol in the noisy environment is quantified by computing average
fidelity under various noise models, and subsequently a set of preferred states
for secure communication in noisy environment have also been identified.Comment: Kak's protocol is not suitable for quantum cryptography in presence
of nois
Teleportation as a quantum computation
An explicit quantum circuit is given to implement quantum teleportation. This
circuit makes teleportation straightforward to anyone who believes that quantum
computation is a reasonable proposition. It could also be genuinely used inside
a quantum computer if teleportation is needed to move quantum information
around. An unusual feature of this circuit is that there are points in the
computation at which the quantum information can be completely disrupted by a
measurement (or some types of interaction with the environment) without ill
effects: the same final result is obtained whether or not these measurements
takes place.Comment: 3 pages, LaTeX2e, PhysComp 96 submissio
The Quantum Frontier
The success of the abstract model of computation, in terms of bits, logical
operations, programming language constructs, and the like, makes it easy to
forget that computation is a physical process. Our cherished notions of
computation and information are grounded in classical mechanics, but the
physics underlying our world is quantum. In the early 80s researchers began to
ask how computation would change if we adopted a quantum mechanical, instead of
a classical mechanical, view of computation. Slowly, a new picture of
computation arose, one that gave rise to a variety of faster algorithms, novel
cryptographic mechanisms, and alternative methods of communication. Small
quantum information processing devices have been built, and efforts are
underway to build larger ones. Even apart from the existence of these devices,
the quantum view on information processing has provided significant insight
into the nature of computation and information, and a deeper understanding of
the physics of our universe and its connections with computation.
We start by describing aspects of quantum mechanics that are at the heart of
a quantum view of information processing. We give our own idiosyncratic view of
a number of these topics in the hopes of correcting common misconceptions and
highlighting aspects that are often overlooked. A number of the phenomena
described were initially viewed as oddities of quantum mechanics. It was
quantum information processing, first quantum cryptography and then, more
dramatically, quantum computing, that turned the tables and showed that these
oddities could be put to practical effect. It is these application we describe
next. We conclude with a section describing some of the many questions left for
future work, especially the mysteries surrounding where the power of quantum
information ultimately comes from.Comment: Invited book chapter for Computation for Humanity - Information
Technology to Advance Society to be published by CRC Press. Concepts
clarified and style made more uniform in version 2. Many thanks to the
referees for their suggestions for improvement
- …