3,491 research outputs found
Quantum Lower Bounds for Tripartite Versions of the Hidden Shift and the Set Equality Problems
In this paper, we study quantum query complexity of the following rather natural tripartite generalisations (in the spirit of the 3-sum problem) of the hidden shift and the set equality problems, which we call the 3-shift-sum and the 3-matching-sum problems.
The 3-shift-sum problem is as follows: given a table of 3 x n elements, is it possible to circularly shift its rows so that the sum of the elements in each column becomes zero? It is promised that, if this is not the case, then no 3 elements in the table sum up to zero. The 3-matching-sum problem is defined similarly, but it is allowed to arbitrarily permute elements within each row. For these problems, we prove lower bounds of Omega(n^{1/3}) and Omega(sqrt n), respectively. The second lower bound is tight.
The lower bounds are proven by a novel application of the dual learning graph framework and by using representation-theoretic tools from [Belovs, 2018]
The impossibility of non-signaling privacy amplification
Barrett, Hardy, and Kent have shown in 2005 that protocols for quantum key
agreement exist the security of which can be proven under the assumption that
quantum or relativity theory is correct. More precisely, this is based on the
non-local behavior of certain quantum systems, combined with the non-signaling
postulate from relativity. An advantage is that the resulting security is
independent of what (quantum) systems the legitimate parties' devices operate
on: they do not have to be trusted. Unfortunately, the protocol proposed by
Barrett et al. cannot tolerate any errors caused by noise in the quantum
channel. Furthermore, even in the error-free case it is inefficient: its
communication complexity is Theta(1/epsilon) when forcing the attacker's
information below epsilon, even if only a single key bit is generated.
Potentially, the problem can be solved by privacy amplification of relativistic
- or non-signaling - secrecy. We show, however, that such privacy amplification
is impossible with respect to the most important form of non-local behavior,
and application of arbitrary hash functions.Comment: 24 pages, 2 figure
Quantum entanglement
All our former experience with application of quantum theory seems to say:
{\it what is predicted by quantum formalism must occur in laboratory}. But the
essence of quantum formalism - entanglement, recognized by Einstein, Podolsky,
Rosen and Schr\"odinger - waited over 70 years to enter to laboratories as a
new resource as real as energy.
This holistic property of compound quantum systems, which involves
nonclassical correlations between subsystems, is a potential for many quantum
processes, including ``canonical'' ones: quantum cryptography, quantum
teleportation and dense coding. However, it appeared that this new resource is
very complex and difficult to detect. Being usually fragile to environment, it
is robust against conceptual and mathematical tools, the task of which is to
decipher its rich structure.
This article reviews basic aspects of entanglement including its
characterization, detection, distillation and quantifying. In particular, the
authors discuss various manifestations of entanglement via Bell inequalities,
entropic inequalities, entanglement witnesses, quantum cryptography and point
out some interrelations. They also discuss a basic role of entanglement in
quantum communication within distant labs paradigm and stress some
peculiarities such as irreversibility of entanglement manipulations including
its extremal form - bound entanglement phenomenon. A basic role of entanglement
witnesses in detection of entanglement is emphasized.Comment: 110 pages, 3 figures, ReVTex4, Improved (slightly extended)
presentation, updated references, minor changes, submitted to Rev. Mod. Phys
De Sitter Space Without Dynamical Quantum Fluctuations
We argue that, under certain plausible assumptions, de Sitter space settles
into a quiescent vacuum in which there are no dynamical quantum fluctuations.
Such fluctuations require either an evolving microstate, or time-dependent
histories of out-of-equilibrium recording devices, which we argue are absent in
stationary states. For a massive scalar field in a fixed de Sitter background,
the cosmic no-hair theorem implies that the state of the patch approaches the
vacuum, where there are no fluctuations. We argue that an analogous conclusion
holds whenever a patch of de Sitter is embedded in a larger theory with an
infinite-dimensional Hilbert space, including semiclassical quantum gravity
with false vacua or complementarity in theories with at least one Minkowski
vacuum. This reasoning provides an escape from the Boltzmann brain problem in
such theories. It also implies that vacuum states do not uptunnel to
higher-energy vacua and that perturbations do not decohere while slow-roll
inflation occurs, suggesting that eternal inflation is much less common than
often supposed. On the other hand, if a de Sitter patch is a closed system with
a finite-dimensional Hilbert space, there will be Poincare recurrences and
dynamical Boltzmann fluctuations into lower-entropy states. Our analysis does
not alter the conventional understanding of the origin of density fluctuations
from primordial inflation, since reheating naturally generates a high-entropy
environment and leads to decoherence, nor does it affect the existence of
non-dynamical vacuum fluctuations such as those that give rise to the Casimir
effect.Comment: version accepted for publication in Foundations of Physic
Quantum Cryptography Based Solely on Bell's Theorem
Information-theoretic key agreement is impossible to achieve from scratch and
must be based on some - ultimately physical - premise. In 2005, Barrett, Hardy,
and Kent showed that unconditional security can be obtained in principle based
on the impossibility of faster-than-light signaling; however, their protocol is
inefficient and cannot tolerate any noise. While their key-distribution scheme
uses quantum entanglement, its security only relies on the impossibility of
superluminal signaling, rather than the correctness and completeness of quantum
theory. In particular, the resulting security is device independent. Here we
introduce a new protocol which is efficient in terms of both classical and
quantum communication, and that can tolerate noise in the quantum channel. We
prove that it offers device-independent security under the sole assumption that
certain non-signaling conditions are satisfied. Our main insight is that the
XOR of a number of bits that are partially secret according to the
non-signaling conditions turns out to be highly secret. Note that similar
statements have been well-known in classical contexts. Earlier results had
indicated that amplification of such non-signaling-based privacy is impossible
to achieve if the non-signaling condition only holds between events on Alice's
and Bob's sides. Here, we show that the situation changes completely if such a
separation is given within each of the laboratories.Comment: 32 pages, v2: changed introduction, added reference
Quantum information with continuous variables
Quantum information is a rapidly advancing area of interdisciplinary
research. It may lead to real-world applications for communication and
computation unavailable without the exploitation of quantum properties such as
nonorthogonality or entanglement. We review the progress in quantum information
based on continuous quantum variables, with emphasis on quantum optical
implementations in terms of the quadrature amplitudes of the electromagnetic
field.Comment: accepted for publication in Reviews of Modern Physic
- …