3,118 research outputs found

    Duality of privacy amplification against quantum adversaries and data compression with quantum side information

    Full text link
    We show that the tasks of privacy amplification against quantum adversaries and data compression with quantum side information are dual in the sense that the ability to perform one implies the ability to perform the other. These are two of the most important primitives in classical information theory, and are shown to be connected by complementarity and the uncertainty principle in the quantum setting. Applications include a new uncertainty principle formulated in terms of smooth min- and max-entropies, as well as new conditions for approximate quantum error correction.Comment: v2: Includes a derivation of an entropic uncertainty principle for smooth min- and max-entropies. Discussion of the Holevo-Schumacher-Westmoreland theorem remove

    The joys of permutation symmetry: direct measurements of entanglement

    Get PDF
    So-called direct measurements of entanglement are collective measurements on multiple copies of a (bipartite or multipartite) quantum system that directly provide one a value for some entanglement measure, such as the concurrence for bipartite states. Multiple copies are needed since the entanglement of a mixed state is not a linear function of the density matrix. Unfortunately, so far all experimental implementations of direct measurements made unverified assumptions about the form of the states, and, therefore, do not qualify as entanglement verification tests. I discuss how a direct measurement can be turned into a quantitative entanglement verification test by exploiting a recent theorem by Renner (R. Renner, Nature Physics 3, 645 (2007)).Comment: 4 pages, 3 figure

    Heavy-duty staple remover operated by hand

    Get PDF
    To remove staples from thick reports, a rooter, bending hook and post are incorporated into a heavy duty hand tool. This makes possible one-step extraction of long staples

    Quantum Key Distribution Using Quantum Faraday Rotators

    Full text link
    We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of the Faraday rotators. The protocol is unconditionally secure against collective attacks for multi-photon source up to two photons on a noisy environment. It is also robust against impersonation attacks. The protocol may be implemented experimentally with the current spintronics technology on semiconductors.Comment: 7 pages, 7 EPS figure

    Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

    Full text link
    Device independent quantum key distribution aims to provide a higher degree of security than traditional QKD schemes by reducing the number of assumptions that need to be made about the physical devices used. The previous proof of security by Pironio et al. applies only to collective attacks where the state is identical and independent and the measurement devices operate identically for each trial in the protocol. We extend this result to a more general class of attacks where the state is arbitrary and the measurement devices have no memory. We accomplish this by a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qubit strategies based on the previous proof by Pironio et al. and techniques adapted from Renner.Comment: 13 pages. Expanded main proofs with more detail, miscellaneous edits for clarit
    • …
    corecore