296 research outputs found
Properties of Entanglement Monotones for Three-Qubit Pure States
Various parameterizations for the orbits under local unitary transformations
of three-qubit pure states are analyzed. The interconvertibility, symmetry
properties, parameter ranges, calculability and behavior under measurement are
looked at. It is shown that the entanglement monotones of any multipartite pure
state uniquely determine the orbit of that state under local unitary
transformations. It follows that there must be an entanglement monotone for
three-qubit pure states which depends on the Kempe invariant defined in [Phys.
Rev. A 60, 910 (1999)]. A form for such an entanglement monotone is proposed. A
theorem is proved that significantly reduces the number of entanglement
monotones that must be looked at to find the maximal probability of
transforming one multipartite state to another.Comment: 14 pages, REVTe
GHZ extraction yield for multipartite stabilizer states
Let be an arbitrary stabilizer state distributed between three
remote parties, such that each party holds several qubits. Let be a
stabilizer group of . We show that can be converted by local
unitaries into a collection of singlets, GHZ states, and local one-qubit
states. The numbers of singlets and GHZs are determined by dimensions of
certain subgroups of . For an arbitrary number of parties we find a
formula for the maximal number of -partite GHZ states that can be extracted
from by local unitaries. A connection with earlier introduced measures
of multipartite correlations is made. An example of an undecomposable
four-party stabilizer state with more than one qubit per party is given. These
results are derived from a general theoretical framework that allows one to
study interconversion of multipartite stabilizer states by local Clifford group
operators. As a simple application, we study three-party entanglement in
two-dimensional lattice models that can be exactly solved by the stabilizer
formalism.Comment: 12 pages, 1 figur
Quantum Key Distribution Using Quantum Faraday Rotators
We propose a new quantum key distribution (QKD) protocol based on the fully
quantum mechanical states of the Faraday rotators. The protocol is
unconditionally secure against collective attacks for multi-photon source up to
two photons on a noisy environment. It is also robust against impersonation
attacks. The protocol may be implemented experimentally with the current
spintronics technology on semiconductors.Comment: 7 pages, 7 EPS figure
Bell inequality with an arbitrary number of settings and its applications
Based on a geometrical argument introduced by Zukowski, a new multisetting
Bell inequality is derived, for the scenario in which many parties make
measurements on two-level systems. This generalizes and unifies some previous
results. Moreover, a necessary and sufficient condition for the violation of
this inequality is presented. It turns out that the class of non-separable
states which do not admit local realistic description is extended when compared
to the two-setting inequalities. However, supporting the conjecture of Peres,
quantum states with positive partial transposes with respect to all subsystems
do not violate the inequality. Additionally, we follow a general link between
Bell inequalities and communication complexity problems, and present a quantum
protocol linked with the inequality, which outperforms the best classical
protocol.Comment: 8 pages, To appear in Phys. Rev.
Correlation Decay in Fermionic Lattice Systems with Power-Law Interactions at Nonzero Temperature
We study correlations in fermionic lattice systems with long-range
interactions in thermal equilibrium. We prove a bound on the correlation decay
between anti-commuting operators and generalize a long-range Lieb-Robinson type
bound. Our results show that in these systems of spatial dimension with,
not necessarily translation invariant, two-site interactions decaying
algebraically with the distance with an exponent ,
correlations between such operators decay at least algebraically with an
exponent arbitrarily close to at any non-zero temperature. Our bound
is asymptotically tight, which we demonstrate by a high temperature expansion
and by numerically analyzing density-density correlations in the 1D quadratic
(free, exactly solvable) Kitaev chain with long-range pairing.Comment: 8 pages, 2 figures, minor improvements and typos correcte
Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
Device independent quantum key distribution aims to provide a higher degree
of security than traditional QKD schemes by reducing the number of assumptions
that need to be made about the physical devices used. The previous proof of
security by Pironio et al. applies only to collective attacks where the state
is identical and independent and the measurement devices operate identically
for each trial in the protocol. We extend this result to a more general class
of attacks where the state is arbitrary and the measurement devices have no
memory. We accomplish this by a reduction of arbitrary adversary strategies to
qubit strategies and a proof of security for qubit strategies based on the
previous proof by Pironio et al. and techniques adapted from Renner.Comment: 13 pages. Expanded main proofs with more detail, miscellaneous edits
for clarit
Better detection of Multipartite Bound Entanglement with Three-Setting Bell Inequalities
It was shown in Phys. Rev. Lett., 87, 230402 (2001) that N (N >= 4) qubits
described by a certain one parameter family F of bound entangled states violate
Mermin-Klyshko inequality for N >= 8. In this paper we prove that the states
from the family F violate Bell inequalities derived in Phys. Rev. A, 56, R1682
(1997), in which each observer measures three non-commuting sets of orthogonal
projectors, for N >=7. We also derive a simple one parameter family of
entanglement witnesses that detect entanglement for all the states belonging to
F. It is possible that these new entanglement witnesses could be generated by
some Bell inequalities.Comment: Revtex4, 1 figur
How to hide a secret direction
We present a procedure to share a secret spatial direction in the absence of
a common reference frame using a multipartite quantum state. The procedure
guarantees that the parties can determine the direction if they perform joint
measurements on the state, but fail to do so if they restrict themselves to
local operations and classical communication (LOCC). We calculate the fidelity
for joint measurements, give bounds on the fidelity achievable by LOCC, and
prove that there is a non-vanishing gap between the two of them, even in the
limit of infinitely many copies. The robustness of the procedure under particle
loss is also studied. As a by-product we find bounds on the probability of
discriminating by LOCC between the invariant subspaces of total angular
momentum N/2 and N/2-1 in a system of N elementary spins.Comment: 4 pages, 1 figur
Bohr's complementarity relation and the violation of the CP symmetry in high energy physics
We test Bohr's complementary relation, which captures the most
counterintuitive difference of a classical and a quantum world, for single and
bipartite neutral kaons. They present a system that is naturally interfering,
oscillating and decaying. Moreover, kaons break the CP symmetry (C...charge
conjugation, P...parity). In detail we discuss the effect of the CP violation
on Bohr's relation, i.e. the effect on the "particle-like" information and the
"wave-like" information. Further we show that the quantity that complements the
single partite information for bipartite kaons is indeed concurrence, a measure
of entanglement, strengthening our concept of entanglement. We find that the
defined entanglement measure is independent of CP violation while it has been
shown that nonlocality is sensitive to CP violation.Comment: 8 pages, 2 figure
- …