4,847 research outputs found

    Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes

    Full text link
    It is a standard result in the theory of quantum error-correcting codes that no code of length n can fix more than n/4 arbitrary errors, regardless of the dimension of the coding and encoded Hilbert spaces. However, this bound only applies to codes which recover the message exactly. Naively, one might expect that correcting errors to very high fidelity would only allow small violations of this bound. This intuition is incorrect: in this paper we describe quantum error-correcting codes capable of correcting up to (n-1)/2 arbitrary errors with fidelity exponentially close to 1, at the price of increasing the size of the registers (i.e., the coding alphabet). This demonstrates a sharp distinction between exact and approximate quantum error correction. The codes have the property that any tt components reveal no information about the message, and so they can also be viewed as error-tolerant secret sharing schemes. The construction has several interesting implications for cryptography and quantum information theory. First, it suggests that secret sharing is a better classical analogue to quantum error correction than is classical error correction. Second, it highlights an error in a purported proof that verifiable quantum secret sharing (VQSS) is impossible when the number of cheaters t is n/4. More generally, the construction illustrates a difference between exact and approximate requirements in quantum cryptography and (yet again) the delicacy of security proofs and impossibility results in the quantum model.Comment: 14 pages, no figure

    Authentication of Quantum Messages

    Full text link
    Authentication is a well-studied area of classical cryptography: a sender S and a receiver R sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified by any third party with control of the communication line. In this paper we define and investigate the authentication of messages composed of quantum states. Assuming S and R have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that enables S both to encrypt and to authenticate (with unconditional security) an m qubit message by encoding it into m+s qubits, where the failure probability decreases exponentially in the security parameter s. The classical private key is 2m+O(s) bits. To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. We also show that any scheme to authenticate quantum messages must also encrypt them. (In contrast, one can authenticate a classical message while leaving it publicly readable.) This has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.Comment: 22 pages, LaTeX, uses amssymb, latexsym, time

    Three-jet production in electron-positron collisions using the CoLoRFulNNLO method

    Full text link
    We introduce a subtraction method for jet cross sections at next-to-next-to-leading order (NNLO) accuracy in the strong coupling and use it to compute event shapes in three-jet production in electron-positron collisions. We validate our method on two event shapes, thrust and C-parameter, which are already known in the literature at NNLO accuracy and compute for the first time oblateness and the energy-energy correlation at the same accuracy.Comment: 5 pages, 6 figure

    New developments in FeynRules

    Full text link
    The program FeynRules is a Mathematica package developed to facilitate the implementation of new physics theories into high-energy physics tools. Starting from a minimal set of information such as the model gauge symmetries, its particle content, parameters and Lagrangian, FeynRules provides all necessary routines to extract automatically from the Lagrangian (that can also be computed semi-automatically for supersymmetric theories) the associated Feynman rules. These can be further exported to several Monte Carlo event generators through dedicated interfaces, as well as translated into a Python library, under the so-called UFO model format, agnostic of the model complexity, especially in terms of Lorentz and/or color structures appearing in the vertices or of number of external legs. In this work, we briefly report on the most recent new features that have been added to FeynRules, including full support for spin-3/2 fermions, a new module allowing for the automated diagonalization of the particle spectrum and a new set of routines dedicated to decay width calculations.Comment: 6 pages. Contribution to the 15th International Workshop on advanced computing and analysis techniques (ACAT 2013), 16-21 May, Beijing, Chin

    Dynamics of the mean-field interacting quantum kicked rotor

    Full text link
    We study the dynamics of the many-body atomic kicked rotor with interactions at the mean-field level, governed by the Gross-Pitaevskii equation. We show that dynamical localization is destroyed by the interaction, and replaced by a subdiffusive behavior. In contrast to results previously obtained from a simplified version of the Gross-Pitaevskii equation, the subdiffusive exponent does not appear to be universal. By studying the phase of the mean-field wave function, we propose a new approximation that describes correctly the dynamics at experimentally relevant times close to the start of subdiffusion, while preserving the reduced computational cost of the former approximation.Comment: v1) 5 pages, 4 figures; v2) 7 pages, 4 figure

    Jet production in the CoLoRFulNNLO method: event shapes in electron-positron collisions

    Full text link
    We present the CoLoRFulNNLO method to compute higher order radiative corrections to jet cross sections in perturbative QCD. We apply our method to the computation of event shape observables in electron-positron collisions at NNLO accuracy and validate our code by comparing our predictions to previous results in the literature. We also calculate for the first time jet cone energy fraction at NNLO.Comment: 45 pages and 6 figures, note adde

    Experimental realization of an ideal Floquet disordered system

    Full text link
    The atomic Quantum Kicked Rotor is an outstanding "quantum simulator" for the exploration of transport in disordered quantum systems. Here we study experimentally the phase-shifted quantum kicked rotor, which we show to display properties close to an ideal disordered quantum system, opening new windows into the study of Anderson physics.Comment: 10 pages, 7 figures, submitted to New Journal of Physics focus issue on Quantum Transport with Ultracold Atom

    Chemical Identification of Ions in Doped NaCl by Scanning Force Microscopy

    Get PDF
    A quantitative comparison between experiment and theory is presented, which shows that all ions of the Suzuki structure on (001) surfaces of Mg2+ or Cd2+ doped NaCl crystals can be identified despite the tip-surface distance, differences in impurity chemistry, and surface termination. The identification can be used to calibrate the potential of the tip's last atom, and it is proposed to use these surfaces for better characterization of deposited nano-objects.Peer reviewe
    • …
    corecore