117 research outputs found

    Exotic Ground States and Dynamics in Constrained Systems

    Get PDF
    The overarching theme of this thesis is the question of how constraints influence collective behavior. Constraints are crucial in shaping both static and dynamic properties of systems across diverse areas within condensed matter physics and beyond. For example, the simple geometric constraint that hard particles cannot overlap at high density leads to slow dynamics and jamming in glass formers. Constraints also arise effectively at low temperature as a consequence of strong competing interactions in magnetic materials, where they give rise to emergent gauge theories and unconventional magnetic order. Enforcing constraints artificially in turn can be used to protect otherwise fragile quantum information from external noise. This thesis in particular contains progress on the realization of different unconventional phases of matter in constrained systems. The presentation of individual results is organized by the stage of realization of the respective phase. Novel physical phenomena after conceptualization are often exemplified in simple, heuristic models bearing little resemblance of actual matter, but which are interesting enough to motivate efforts with the final goal of realizing them in some way in the lab. One form of progress is then to devise refined models, which retain a degree of simplification while still realizing the same physics and improving the degree of realism in some direction. Finally, direct efforts in realizing either the original models or some refined version in experiment today are mostly two-fold. One route, having grown in importance rapidly during the last two decades, is via the engineering of artificial systems realizing suitable models. The other, more conventional way is to search for realizations of novel phases in materials. The thesis is divided into three parts, where Part I is devoted to the study of two simple models, while artificial systems and real materials are the subject of Part II and Part III respectively. Below, the content of each part is summarized in more detail. After a general introduction to entropic ordering and slow dynamics we present a family of models devised as a lattice analog of hard spheres. These are often studied to explore whether low-dimensional analogues of mean-field glass- and jamming transitions exist, but also serve as the canonical model systems for slow dynamics in granular materials more generally. Arguably the models in this family do not offer a close resemblance of actual granular materials. However, by studying their behavior far from equilibrium, we observe the onset of slow dynamics and a kinetic arrest for which, importantly, we obtain an essentially complete analytical and numerical understanding. Particularly interesting is the fact that this understanding hinges on the (in-)ability to anneal topological defects in the presence of a hardcore constraints, which resonates with some previous proposals for an understanding of the glass transition. As another example of anomalous dynamics arising in a magnetic system, we also present a detailed study of a two-dimensional fracton spin liquid. The model is an Ising system with an energy function designed to give rise to an emergent higher-rank gauge theory at low energy. We show explicitly that the number of zero-energy states in the model scales exponentially with the system size, establishing a finite residual entropy. A purpose-built cluster Monte-Carlo algorithm makes it possible to study the behavior of the model as a function of temperature. We show evidence for a first order transition from a high-temperature paramagnet to a low-temperature phase where correlations match predictions of a higher-rank coulomb phase. Turning away from heuristic models, the second part of the thesis begins with an introduction to quantum error correction, a scheme where constraints are artificially imposed in a quantum system through measurement and feedback. This is done in order to preserve quantum information in the presence of external noise, and is widely believed to be necessary in order to one day harness the full power of quantum computers. Given a certain error-correcting code as well as a noise model, a particularly interesting quantity is the threshold of the code, that is the critical amount of external noise below which quantum error correction becomes possible. For the toric code under independent bit- and phase-flip noise for example, the threshold is well known to map to the paramagnet to ferromagnet transition of the two-dimensional random-bond Ising model along the Nishimori line. Here, we present the first generalization of this mapping to a family of codes with finite rate, that is a family where the number of encoded logical qubits grows linearly with the number of physical qubits. In particular, we show that the threshold of hyperbolic surface codes maps to a paramagnet to ferromagnet transition in what we call the 'dual'' random-bond Ising model on regular tessellations of compact hyperbolic manifolds. This model is related to the usual random-bond Ising model by the Kramers-Wannier duality but distinct from it even on self-dual tessellations. As a corollary, we clarify long-standing issues regarding self-duality of the Ising model in hyperbolic space. The final part of the thesis is devoted to the study of material candidates of quantum spin ice, a three-dimensional quantum spin liquid. The work presented here was done in close collaboration with experiment and focuses on a particular family of materials called dipolar-octupolar pyrochlores. This family of materials is particularly interesting because they might realize novel exotic quantum states such as octupolar spin liquids, while at the same time being described by a relatively simple model Hamiltonian. This thesis contains a detailed study of ground state selection in dipolar-octupolar pyrochlore magnets and its signatures as observable in neutron scattering. First, we present evidence that the two compounds Ce2Zr2O7 and Ce2Sn2O7 despite their similar chemical composition realize an exotic quantum spin liquid state and an ordered state respectively. Then, we also study the ground-state selection in dipolar-octupolar pyrochlores in a magnetic field. Most importantly, we show that the well-known effective one-dimensional physics -- arising when the field is applied along a certain crystallographic axis -- is expected to be stable at experimentally relevant temperatures. Finally, we make predictions for neutron scattering in the large-field phase and compare these to measurements on Ce2Zr2O7

    Naor-Yung paradigm with shared randomness and applications

    Get PDF
    The Naor-Yung paradigm (Naor and Yung, STOC’90) allows to generically boost security under chosen-plaintext attacks (CPA) to security against chosen-ciphertext attacks (CCA) for public-key encryption (PKE) schemes. The main idea is to encrypt the plaintext twice (under independent public keys), and to append a non-interactive zero-knowledge (NIZK) proof that the two ciphertexts indeed encrypt the same message. Later work by Camenisch, Chandran, and Shoup (Eurocrypt’09) and Naor and Segev (Crypto’09 and SIAM J. Comput.’12) established that the very same techniques can also be used in the settings of key-dependent message (KDM) and key-leakage attacks (respectively). In this paper we study the conditions under which the two ciphertexts in the Naor-Yung construction can share the same random coins. We find that this is possible, provided that the underlying PKE scheme meets an additional simple property. The motivation for re-using the same random coins is that this allows to design much more efficient NIZK proofs. We showcase such an improvement in the random oracle model, under standard complexity assumptions including Decisional Diffie-Hellman, Quadratic Residuosity, and Subset Sum. The length of the resulting ciphertexts is reduced by 50%, yielding truly efficient PKE schemes achieving CCA security under KDM and key-leakage attacks. As an additional contribution, we design the first PKE scheme whose CPA security under KDM attacks can be directly reduced to (low-density instances of) the Subset Sum assumption. The scheme supports keydependent messages computed via any affine function of the secret ke

    Classical secure delegation of quantum computations

    Get PDF
    The rapid evolution of quantum technologies is likely to cause major shifts in the mainstream computing landscape. In order to fully reach their potential in a wide base accessible to any user, remote access of quantum computers and manipulation of data with strong privacy and integrity guarantees are essential. Consider a setting where a client having a fully classical computer wants to determine the result of some quantum computation, but lacks the necessary resources to perform the computation herself. She has access to a more powerful server which has quantum resources and can solve the problem and send the outcome back to the client. However, the client does not trust the powerful server, so she needs to find a way to hide her data. Therefore, the main question that arises is how can we guarantee the client’s privacy of the input and even the computation itself against the server possessing quantum computational capabilities. In the present thesis, we study this problem, denoted here as classical secure delegation of quantum computations (CSDQC) between a fully classical honest client and a quantum untrusted server. We focus on different models of security, analyzing the limitations and potential of each of the settings. Concretely, we first study the CSDQC problem under information-theoretic security. We analyse two categories of quantum computations, decision and sampling problems and in both cases we provide evidence indicating the impossibility of achieving information-theoretic security. Subsequently, we consider relaxing the security framework and specifically, we will analyze this task in the computational security setting (against quantum polynomial-time adversaries). As a result, in the second part of the thesis we put forward the remote state preparation as a key component that would allow us to achieve classical secure delegation of universal quantum computations. We present two protocols realizing the remote state preparation primitive assuming only a classical channel between client and server. The first candidate is shown to be secure in the honest-but-curious model, while the second candidate is proven secure against the server in the malicious setting. The security of both constructions relies on the hardness of the learning with errors problem. Finally, given the important role the remote state preparation plays not only in CSDQC, but also in other quantum communication protocols, we analyze its composable security to determine the privacy loss as a result of using remote state preparation as a sub-module in different protocols
    • …
    corecore