296 research outputs found

    Properties of Entanglement Monotones for Three-Qubit Pure States

    Get PDF
    Various parameterizations for the orbits under local unitary transformations of three-qubit pure states are analyzed. The interconvertibility, symmetry properties, parameter ranges, calculability and behavior under measurement are looked at. It is shown that the entanglement monotones of any multipartite pure state uniquely determine the orbit of that state under local unitary transformations. It follows that there must be an entanglement monotone for three-qubit pure states which depends on the Kempe invariant defined in [Phys. Rev. A 60, 910 (1999)]. A form for such an entanglement monotone is proposed. A theorem is proved that significantly reduces the number of entanglement monotones that must be looked at to find the maximal probability of transforming one multipartite state to another.Comment: 14 pages, REVTe

    GHZ extraction yield for multipartite stabilizer states

    Get PDF
    Let Ψ>|\Psi> be an arbitrary stabilizer state distributed between three remote parties, such that each party holds several qubits. Let SS be a stabilizer group of Ψ>|\Psi>. We show that Ψ>|\Psi> can be converted by local unitaries into a collection of singlets, GHZ states, and local one-qubit states. The numbers of singlets and GHZs are determined by dimensions of certain subgroups of SS. For an arbitrary number of parties mm we find a formula for the maximal number of mm-partite GHZ states that can be extracted from Ψ>|\Psi> by local unitaries. A connection with earlier introduced measures of multipartite correlations is made. An example of an undecomposable four-party stabilizer state with more than one qubit per party is given. These results are derived from a general theoretical framework that allows one to study interconversion of multipartite stabilizer states by local Clifford group operators. As a simple application, we study three-party entanglement in two-dimensional lattice models that can be exactly solved by the stabilizer formalism.Comment: 12 pages, 1 figur

    Quantum Key Distribution Using Quantum Faraday Rotators

    Full text link
    We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of the Faraday rotators. The protocol is unconditionally secure against collective attacks for multi-photon source up to two photons on a noisy environment. It is also robust against impersonation attacks. The protocol may be implemented experimentally with the current spintronics technology on semiconductors.Comment: 7 pages, 7 EPS figure

    Bell inequality with an arbitrary number of settings and its applications

    Full text link
    Based on a geometrical argument introduced by Zukowski, a new multisetting Bell inequality is derived, for the scenario in which many parties make measurements on two-level systems. This generalizes and unifies some previous results. Moreover, a necessary and sufficient condition for the violation of this inequality is presented. It turns out that the class of non-separable states which do not admit local realistic description is extended when compared to the two-setting inequalities. However, supporting the conjecture of Peres, quantum states with positive partial transposes with respect to all subsystems do not violate the inequality. Additionally, we follow a general link between Bell inequalities and communication complexity problems, and present a quantum protocol linked with the inequality, which outperforms the best classical protocol.Comment: 8 pages, To appear in Phys. Rev.

    Correlation Decay in Fermionic Lattice Systems with Power-Law Interactions at Nonzero Temperature

    Get PDF
    We study correlations in fermionic lattice systems with long-range interactions in thermal equilibrium. We prove a bound on the correlation decay between anti-commuting operators and generalize a long-range Lieb-Robinson type bound. Our results show that in these systems of spatial dimension DD with, not necessarily translation invariant, two-site interactions decaying algebraically with the distance with an exponent α2D\alpha \geq 2\,D, correlations between such operators decay at least algebraically with an exponent arbitrarily close to α\alpha at any non-zero temperature. Our bound is asymptotically tight, which we demonstrate by a high temperature expansion and by numerically analyzing density-density correlations in the 1D quadratic (free, exactly solvable) Kitaev chain with long-range pairing.Comment: 8 pages, 2 figures, minor improvements and typos correcte

    Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

    Full text link
    Device independent quantum key distribution aims to provide a higher degree of security than traditional QKD schemes by reducing the number of assumptions that need to be made about the physical devices used. The previous proof of security by Pironio et al. applies only to collective attacks where the state is identical and independent and the measurement devices operate identically for each trial in the protocol. We extend this result to a more general class of attacks where the state is arbitrary and the measurement devices have no memory. We accomplish this by a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qubit strategies based on the previous proof by Pironio et al. and techniques adapted from Renner.Comment: 13 pages. Expanded main proofs with more detail, miscellaneous edits for clarit

    Better detection of Multipartite Bound Entanglement with Three-Setting Bell Inequalities

    Full text link
    It was shown in Phys. Rev. Lett., 87, 230402 (2001) that N (N >= 4) qubits described by a certain one parameter family F of bound entangled states violate Mermin-Klyshko inequality for N >= 8. In this paper we prove that the states from the family F violate Bell inequalities derived in Phys. Rev. A, 56, R1682 (1997), in which each observer measures three non-commuting sets of orthogonal projectors, for N >=7. We also derive a simple one parameter family of entanglement witnesses that detect entanglement for all the states belonging to F. It is possible that these new entanglement witnesses could be generated by some Bell inequalities.Comment: Revtex4, 1 figur

    How to hide a secret direction

    Get PDF
    We present a procedure to share a secret spatial direction in the absence of a common reference frame using a multipartite quantum state. The procedure guarantees that the parties can determine the direction if they perform joint measurements on the state, but fail to do so if they restrict themselves to local operations and classical communication (LOCC). We calculate the fidelity for joint measurements, give bounds on the fidelity achievable by LOCC, and prove that there is a non-vanishing gap between the two of them, even in the limit of infinitely many copies. The robustness of the procedure under particle loss is also studied. As a by-product we find bounds on the probability of discriminating by LOCC between the invariant subspaces of total angular momentum N/2 and N/2-1 in a system of N elementary spins.Comment: 4 pages, 1 figur

    Bohr's complementarity relation and the violation of the CP symmetry in high energy physics

    Full text link
    We test Bohr's complementary relation, which captures the most counterintuitive difference of a classical and a quantum world, for single and bipartite neutral kaons. They present a system that is naturally interfering, oscillating and decaying. Moreover, kaons break the CP symmetry (C...charge conjugation, P...parity). In detail we discuss the effect of the CP violation on Bohr's relation, i.e. the effect on the "particle-like" information and the "wave-like" information. Further we show that the quantity that complements the single partite information for bipartite kaons is indeed concurrence, a measure of entanglement, strengthening our concept of entanglement. We find that the defined entanglement measure is independent of CP violation while it has been shown that nonlocality is sensitive to CP violation.Comment: 8 pages, 2 figure
    corecore