649 research outputs found
Relations between entanglement, Bell-inequality violation and teleportation fidelity for the two-qubit X states
Based on the assumption that the receiver Bob can apply any unitary
transformation, Horodecki {\it et al.} [Phys. Lett. A {\bf 222}, 21 (1996)]
proved that any mixed two spin-1/2 state which violates the Bell-CHSH
inequality is useful for teleportation. Here, we further show that any X state
which violates the Bell-CHSH inequality can also be used for nonclassical
teleportation even if Bob can only perform the identity or the Pauli rotation
operations. Moreover, we showed that the maximal difference between the two
average fidelities achievable via Bob's arbitrary transformations and via the
sole identity or the Pauli rotation is 1/9.Comment: 5 pages, to be published in "Quantum Information Processing
Signifying quantum benchmarks for qubit teleportation and secure communication using Einstein-Podolsky-Rosen steering inequalities
The demonstration of quantum teleportation of a photonic qubit from Alice to
Bob usually relies on data conditioned on detection at Bob's location. I show
that Bohm's Einstein-Podolsky-Rosen (EPR) paradox can be used to verify that
the quantum benchmark for qubit teleportation has been reached, without
postselection. This is possible for scenarios insensitive to losses at the
generation station, and with efficiencies of for the
teleportation process. The benchmark is obtained, if it is shown that Bob can
{}"steer" Alice's record of the qubit as stored by Charlie. EPR steering
inequalities involving measurement settings can also be used to confirm
quantum teleportation, for efficiencies , if one assumes trusted
detectors for Charlie and Alice. Using proofs of monogamy, I show that
two-setting EPR steering inequalities can signify secure teleportation of the
qubit state.Comment: 10 pages, 1 Figur
Quantum information with continuous variables
Quantum information is a rapidly advancing area of interdisciplinary
research. It may lead to real-world applications for communication and
computation unavailable without the exploitation of quantum properties such as
nonorthogonality or entanglement. We review the progress in quantum information
based on continuous quantum variables, with emphasis on quantum optical
implementations in terms of the quadrature amplitudes of the electromagnetic
field.Comment: accepted for publication in Reviews of Modern Physic
Quantum entanglement
All our former experience with application of quantum theory seems to say:
{\it what is predicted by quantum formalism must occur in laboratory}. But the
essence of quantum formalism - entanglement, recognized by Einstein, Podolsky,
Rosen and Schr\"odinger - waited over 70 years to enter to laboratories as a
new resource as real as energy.
This holistic property of compound quantum systems, which involves
nonclassical correlations between subsystems, is a potential for many quantum
processes, including ``canonical'' ones: quantum cryptography, quantum
teleportation and dense coding. However, it appeared that this new resource is
very complex and difficult to detect. Being usually fragile to environment, it
is robust against conceptual and mathematical tools, the task of which is to
decipher its rich structure.
This article reviews basic aspects of entanglement including its
characterization, detection, distillation and quantifying. In particular, the
authors discuss various manifestations of entanglement via Bell inequalities,
entropic inequalities, entanglement witnesses, quantum cryptography and point
out some interrelations. They also discuss a basic role of entanglement in
quantum communication within distant labs paradigm and stress some
peculiarities such as irreversibility of entanglement manipulations including
its extremal form - bound entanglement phenomenon. A basic role of entanglement
witnesses in detection of entanglement is emphasized.Comment: 110 pages, 3 figures, ReVTex4, Improved (slightly extended)
presentation, updated references, minor changes, submitted to Rev. Mod. Phys
Quantum Cloning, Bell's Inequality and Teleportation
We analyze a possibility of using the two qubit output state from
Buzek-Hillery quantum copying machine (not necessarily universal quantum
cloning machine) as a teleportation channel. We show that there is a range of
values of the machine parameter for which the two qubit output state is
entangled and violates Bell-CHSH inequality and for a different range it
remains entangled but does not violate Bell-CHSH inequality. Further we observe
that for certain values of the machine parameter the two-qubit mixed state can
be used as a teleportation channel. The use of the output state from the
Buzek-Hillery cloning machine as a teleportation channel provides an additional
appeal to the cloning machine and motivation of our present work.Comment: 7 pages and no figures, Accepted in Journal of Physics
Teleportation capability, distillability, and nonlocality on three-qubit states
In this paper, we consider teleportation capability, distillability, and
nonlocality on three-qubit states. In order to investigate some relations among
them, we first find the explicit formulas of the quantities about the maximal
teleportation fidelity on three-qubit states. We show that if any three-qubit
state is useful for three-qubit teleportation then the three-qubit state is
distillable into a Greenberger-Horne-Zeilinger state, and that if any
three-qubit state violates a specific form of Mermin inequality then the
three-qubit state is useful for three-qubit teleportation.Comment: 5 pages, 2 figures; The old version has been generalized into the
results on general 3-qubit state
On experimental procedures for entanglement verification
We give an overview of different types of entanglement that can be generated
in experiments, as well as of various protocols that can be used to verify or
quantify entanglement. We propose several criteria that, we argue, should be
applied to experimental entanglement verification procedures. Explicit examples
demonstrate that not following these criteria will tend to result in
overestimating the amount of entanglement generated in an experiment or in
infering entanglement when there is none. We distinguish protocols meant to
refute or eliminate hidden-variable models from those meant to verify
entanglement.Comment: 15 page
- …