4,847 research outputs found
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
It is a standard result in the theory of quantum error-correcting codes that
no code of length n can fix more than n/4 arbitrary errors, regardless of the
dimension of the coding and encoded Hilbert spaces. However, this bound only
applies to codes which recover the message exactly. Naively, one might expect
that correcting errors to very high fidelity would only allow small violations
of this bound. This intuition is incorrect: in this paper we describe quantum
error-correcting codes capable of correcting up to (n-1)/2 arbitrary errors
with fidelity exponentially close to 1, at the price of increasing the size of
the registers (i.e., the coding alphabet). This demonstrates a sharp
distinction between exact and approximate quantum error correction. The codes
have the property that any components reveal no information about the
message, and so they can also be viewed as error-tolerant secret sharing
schemes.
The construction has several interesting implications for cryptography and
quantum information theory. First, it suggests that secret sharing is a better
classical analogue to quantum error correction than is classical error
correction. Second, it highlights an error in a purported proof that verifiable
quantum secret sharing (VQSS) is impossible when the number of cheaters t is
n/4. More generally, the construction illustrates a difference between exact
and approximate requirements in quantum cryptography and (yet again) the
delicacy of security proofs and impossibility results in the quantum model.Comment: 14 pages, no figure
Authentication of Quantum Messages
Authentication is a well-studied area of classical cryptography: a sender S
and a receiver R sharing a classical private key want to exchange a classical
message with the guarantee that the message has not been modified by any third
party with control of the communication line. In this paper we define and
investigate the authentication of messages composed of quantum states. Assuming
S and R have access to an insecure quantum channel and share a private,
classical random key, we provide a non-interactive scheme that enables S both
to encrypt and to authenticate (with unconditional security) an m qubit message
by encoding it into m+s qubits, where the failure probability decreases
exponentially in the security parameter s. The classical private key is 2m+O(s)
bits. To achieve this, we give a highly efficient protocol for testing the
purity of shared EPR pairs. We also show that any scheme to authenticate
quantum messages must also encrypt them. (In contrast, one can authenticate a
classical message while leaving it publicly readable.) This has two important
consequences: On one hand, it allows us to give a lower bound of 2m key bits
for authenticating m qubits, which makes our protocol asymptotically optimal.
On the other hand, we use it to show that digitally signing quantum states is
impossible, even with only computational security.Comment: 22 pages, LaTeX, uses amssymb, latexsym, time
Three-jet production in electron-positron collisions using the CoLoRFulNNLO method
We introduce a subtraction method for jet cross sections at
next-to-next-to-leading order (NNLO) accuracy in the strong coupling and use it
to compute event shapes in three-jet production in electron-positron
collisions. We validate our method on two event shapes, thrust and C-parameter,
which are already known in the literature at NNLO accuracy and compute for the
first time oblateness and the energy-energy correlation at the same accuracy.Comment: 5 pages, 6 figure
New developments in FeynRules
The program FeynRules is a Mathematica package developed to facilitate the
implementation of new physics theories into high-energy physics tools. Starting
from a minimal set of information such as the model gauge symmetries, its
particle content, parameters and Lagrangian, FeynRules provides all necessary
routines to extract automatically from the Lagrangian (that can also be
computed semi-automatically for supersymmetric theories) the associated Feynman
rules. These can be further exported to several Monte Carlo event generators
through dedicated interfaces, as well as translated into a Python library,
under the so-called UFO model format, agnostic of the model complexity,
especially in terms of Lorentz and/or color structures appearing in the
vertices or of number of external legs. In this work, we briefly report on the
most recent new features that have been added to FeynRules, including full
support for spin-3/2 fermions, a new module allowing for the automated
diagonalization of the particle spectrum and a new set of routines dedicated to
decay width calculations.Comment: 6 pages. Contribution to the 15th International Workshop on advanced
computing and analysis techniques (ACAT 2013), 16-21 May, Beijing, Chin
Dynamics of the mean-field interacting quantum kicked rotor
We study the dynamics of the many-body atomic kicked rotor with interactions
at the mean-field level, governed by the Gross-Pitaevskii equation. We show
that dynamical localization is destroyed by the interaction, and replaced by a
subdiffusive behavior. In contrast to results previously obtained from a
simplified version of the Gross-Pitaevskii equation, the subdiffusive exponent
does not appear to be universal. By studying the phase of the mean-field wave
function, we propose a new approximation that describes correctly the dynamics
at experimentally relevant times close to the start of subdiffusion, while
preserving the reduced computational cost of the former approximation.Comment: v1) 5 pages, 4 figures; v2) 7 pages, 4 figure
Jet production in the CoLoRFulNNLO method: event shapes in electron-positron collisions
We present the CoLoRFulNNLO method to compute higher order radiative
corrections to jet cross sections in perturbative QCD. We apply our method to
the computation of event shape observables in electron-positron collisions at
NNLO accuracy and validate our code by comparing our predictions to previous
results in the literature. We also calculate for the first time jet cone energy
fraction at NNLO.Comment: 45 pages and 6 figures, note adde
Experimental realization of an ideal Floquet disordered system
The atomic Quantum Kicked Rotor is an outstanding "quantum simulator" for the
exploration of transport in disordered quantum systems. Here we study
experimentally the phase-shifted quantum kicked rotor, which we show to display
properties close to an ideal disordered quantum system, opening new windows
into the study of Anderson physics.Comment: 10 pages, 7 figures, submitted to New Journal of Physics focus issue
on Quantum Transport with Ultracold Atom
Chemical Identification of Ions in Doped NaCl by Scanning Force Microscopy
A quantitative comparison between experiment and theory is presented, which shows that all ions of the Suzuki structure on (001) surfaces of Mg2+ or Cd2+ doped NaCl crystals can be identified despite the tip-surface distance, differences in impurity chemistry, and surface termination. The identification can be used to calibrate the potential of the tip's last atom, and it is proposed to use these surfaces for better characterization of deposited nano-objects.Peer reviewe
- …