649 research outputs found

    Relations between entanglement, Bell-inequality violation and teleportation fidelity for the two-qubit X states

    Full text link
    Based on the assumption that the receiver Bob can apply any unitary transformation, Horodecki {\it et al.} [Phys. Lett. A {\bf 222}, 21 (1996)] proved that any mixed two spin-1/2 state which violates the Bell-CHSH inequality is useful for teleportation. Here, we further show that any X state which violates the Bell-CHSH inequality can also be used for nonclassical teleportation even if Bob can only perform the identity or the Pauli rotation operations. Moreover, we showed that the maximal difference between the two average fidelities achievable via Bob's arbitrary transformations and via the sole identity or the Pauli rotation is 1/9.Comment: 5 pages, to be published in "Quantum Information Processing

    Signifying quantum benchmarks for qubit teleportation and secure communication using Einstein-Podolsky-Rosen steering inequalities

    Full text link
    The demonstration of quantum teleportation of a photonic qubit from Alice to Bob usually relies on data conditioned on detection at Bob's location. I show that Bohm's Einstein-Podolsky-Rosen (EPR) paradox can be used to verify that the quantum benchmark for qubit teleportation has been reached, without postselection. This is possible for scenarios insensitive to losses at the generation station, and with efficiencies of ηB>1/3\eta_{B}>1/3 for the teleportation process. The benchmark is obtained, if it is shown that Bob can {}"steer" Alice's record of the qubit as stored by Charlie. EPR steering inequalities involving mm measurement settings can also be used to confirm quantum teleportation, for efficiencies ηB>1/m\eta_{B}>1/m, if one assumes trusted detectors for Charlie and Alice. Using proofs of monogamy, I show that two-setting EPR steering inequalities can signify secure teleportation of the qubit state.Comment: 10 pages, 1 Figur

    Quantum information with continuous variables

    Full text link
    Quantum information is a rapidly advancing area of interdisciplinary research. It may lead to real-world applications for communication and computation unavailable without the exploitation of quantum properties such as nonorthogonality or entanglement. We review the progress in quantum information based on continuous quantum variables, with emphasis on quantum optical implementations in terms of the quadrature amplitudes of the electromagnetic field.Comment: accepted for publication in Reviews of Modern Physic

    Quantum entanglement

    Get PDF
    All our former experience with application of quantum theory seems to say: {\it what is predicted by quantum formalism must occur in laboratory}. But the essence of quantum formalism - entanglement, recognized by Einstein, Podolsky, Rosen and Schr\"odinger - waited over 70 years to enter to laboratories as a new resource as real as energy. This holistic property of compound quantum systems, which involves nonclassical correlations between subsystems, is a potential for many quantum processes, including ``canonical'' ones: quantum cryptography, quantum teleportation and dense coding. However, it appeared that this new resource is very complex and difficult to detect. Being usually fragile to environment, it is robust against conceptual and mathematical tools, the task of which is to decipher its rich structure. This article reviews basic aspects of entanglement including its characterization, detection, distillation and quantifying. In particular, the authors discuss various manifestations of entanglement via Bell inequalities, entropic inequalities, entanglement witnesses, quantum cryptography and point out some interrelations. They also discuss a basic role of entanglement in quantum communication within distant labs paradigm and stress some peculiarities such as irreversibility of entanglement manipulations including its extremal form - bound entanglement phenomenon. A basic role of entanglement witnesses in detection of entanglement is emphasized.Comment: 110 pages, 3 figures, ReVTex4, Improved (slightly extended) presentation, updated references, minor changes, submitted to Rev. Mod. Phys

    Quantum Cloning, Bell's Inequality and Teleportation

    Full text link
    We analyze a possibility of using the two qubit output state from Buzek-Hillery quantum copying machine (not necessarily universal quantum cloning machine) as a teleportation channel. We show that there is a range of values of the machine parameter ξ\xi for which the two qubit output state is entangled and violates Bell-CHSH inequality and for a different range it remains entangled but does not violate Bell-CHSH inequality. Further we observe that for certain values of the machine parameter the two-qubit mixed state can be used as a teleportation channel. The use of the output state from the Buzek-Hillery cloning machine as a teleportation channel provides an additional appeal to the cloning machine and motivation of our present work.Comment: 7 pages and no figures, Accepted in Journal of Physics

    Teleportation capability, distillability, and nonlocality on three-qubit states

    Get PDF
    In this paper, we consider teleportation capability, distillability, and nonlocality on three-qubit states. In order to investigate some relations among them, we first find the explicit formulas of the quantities about the maximal teleportation fidelity on three-qubit states. We show that if any three-qubit state is useful for three-qubit teleportation then the three-qubit state is distillable into a Greenberger-Horne-Zeilinger state, and that if any three-qubit state violates a specific form of Mermin inequality then the three-qubit state is useful for three-qubit teleportation.Comment: 5 pages, 2 figures; The old version has been generalized into the results on general 3-qubit state

    On experimental procedures for entanglement verification

    Get PDF
    We give an overview of different types of entanglement that can be generated in experiments, as well as of various protocols that can be used to verify or quantify entanglement. We propose several criteria that, we argue, should be applied to experimental entanglement verification procedures. Explicit examples demonstrate that not following these criteria will tend to result in overestimating the amount of entanglement generated in an experiment or in infering entanglement when there is none. We distinguish protocols meant to refute or eliminate hidden-variable models from those meant to verify entanglement.Comment: 15 page
    corecore