296 research outputs found

    Does Clauser-Horne-Shimony-Holt Correlation or Freedman-Clauser Correlation lead to the largest violation of Bell's Inequality?

    Get PDF
    An inequality is deduced from Einstein's locality and a supplementary assumption. This inequality defines an experiment which can actually be performed with present technology to test local realism. Quantum mechanics violate this inequality a factor of 1.5. In contrast, quantum mechanics violates previous inequalities (for example, Clauser-Horne-Shimony-Holt inequality of 1969, Freedman-Clauser inequality of 1972, Clauser-Horne inequality of 1974) by a factor of 2\sqrt 2. Thus the magnitude of violation of the inequality derived in this paper is approximately 20.720.7% larger than the magnitude of violation of previous inequalities. This result can be particularly important for the experimental test of locality.Comment: 15 pages, LaTeX file, no figure

    Bell's inequality for n spin-s particles

    Get PDF
    The Mermin-Klyshko inequality for n spin-1/2 particles and two dichotomic observables is generalized to n spin-s particles and two maximal observables. It is shown that some multiparty multilevel Greenberger-Horne-Zeilinger states [A. Cabello, Phys. Rev. A 63, 022104 (2001)] maximally violate this inequality for any s. For a fixed n, the magnitude of the violation is constant for any s, which provides a simple demonstration and generalizes the conclusion reached by Gisin and Peres for two spin-s particles in the singlet state [Phys. Lett. A 162, 15 (1992)]. For a fixed s, the violation grows exponentially with n, which provides a generalization to any s of Mermin's conclusion for n spin-1/2 particles [Phys. Rev. Lett. 65, 1838 (1990)].Comment: REVTeX4, 4 page

    Optimal eavesdropping in quantum cryptography with six states

    Get PDF
    A generalization of the quantum cryptographic protocol by Bennett and Brassard is discussed, using three conjugate bases, i.e. six states. By calculating the optimal mutual information between sender and eavesdropper it is shown that this scheme is safer against eavesdropping on single qubits than the one based on two conjugate bases. We also address the question for a connection between the maximal classical correlation in a generalized Bell inequality and the intersection of mutual informations between sender/receiver and sender/eavesdropper.Comment: 4 pages, 1 figur

    Quantum Bit Commitment with a Composite Evidence

    Full text link
    Entanglement-based attacks, which are subtle and powerful, are usually believed to render quantum bit commitment insecure. We point out that the no-go argument leading to this view implicitly assumes the evidence-of-commitment to be a monolithic quantum system. We argue that more general evidence structures, allowing for a composite, hybrid (classical-quantum) evidence, conduce to improved security. In particular, we present and prove the security of the following protocol: Bob sends Alice an anonymous state. She inscribes her commitment bb by measuring part of it in the + (for b=0b = 0) or ×\times (for b=1b=1) basis. She then communicates to him the (classical) measurement outcome RxR_x and the part-measured anonymous state interpolated into other, randomly prepared qubits as her evidence-of-commitment.Comment: 6 pages, minor changes, journal reference adde

    Bell's inequalities for states with positive partial transpose

    Get PDF
    We study violations of n particle Bell inequalities (as developed by Mermin and Klyshko) under the assumption that suitable partial transposes of the density operator are positive. If all transposes with respect to a partition of the system into p subsystems are positive, the best upper bound on the violation is 2^((n-p)/2). In particular, if the partial transposes with respect to all subsystems are positive, the inequalities are satisfied. This is supporting evidence for a recent conjecture by Peres that positivity of partial transposes could be equivalent to existence of local classical models.Comment: 4 pages, REVTe

    Bell's theorem for general N-qubit states

    Get PDF
    We derive a single general Bell inequality which is a necessary and sufficient condition for the correlation function for N particles to be describable in a local and realistic picture, for the case in which measurements on each particle can be chosen between two arbitrary dichotomic observables. We also derive a necessary and sufficient condition for an arbitrary N-qubit mixed state to violate this inequality. This condition is a generalization and reformulation of the Horodeccy family condition for two qubits.Comment: 4 pages, journal versio

    Do all pure entangled states violate Bell's inequalities for correlation functions?

    Full text link
    Any pure entangled state of two particles violates a Bell inequality for two-particle correlation functions (Gisin's theorem). We show that there exist pure entangled N>2 qubit states that do not violate any Bell inequality for N particle correlation functions for experiments involving two dichotomic observables per local measuring station. We also find that Mermin-Ardehali-Belinskii-Klyshko inequalities may not always be optimal for refutation of local realistic description.Comment: 4 pages, journal versio

    All multipartite Bell correlation inequalities for two dichotomic observables per site

    Get PDF
    We construct a set of 2^(2^n) independent Bell correlation inequalities for n-partite systems with two dichotomic observables each, which is complete in the sense that the inequalities are satisfied if and only if the correlations considered allow a local classical model. All these inequalities can be summarized in a single, albeit non-linear inequality. We show that quantum correlations satisfy this condition provided the state has positive partial transpose with respect to any grouping of the n systems into two subsystems. We also provide an efficient algorithm for finding the maximal quantum mechanical violation of each inequality, and show that the maximum is always attained for the generalized GHZ state.Comment: 11 pages, REVTe

    Constraints on chiral operators in N=2 SCFTs

    Get PDF
    Open Access, © The Authors. Article funded by SCOAP3. This article is distributed under the terms of the Creative Commons Attribution License ( CC-BY 4.0 ), which permits any use, distribution and reproduction in any medium, provided the original author(s) and source are credited

    Light-Sheet Imaging to Elucidate Cardiovascular Injury and Repair

    Get PDF
    Purpose of Review: Real-time 3-dimensional (3-D) imaging of cardiovascular injury and regeneration remains challenging. We introduced a multi-scale imaging strategy that uses light-sheet illumination to enable applications of cardiovascular injury and repair in models ranging from zebrafish to rodent hearts. Recent Findings: Light-sheet imaging enables rapid data acquisition with high spatiotemporal resolution and with minimal photo-bleaching or photo-toxicity. We demonstrated the capacity of this novel light-sheet approach for scanning a region of interest with specific fluorescence contrast, thereby providing axial and temporal resolution at the cellular level without stitching image columns or pivoting illumination beams during one-time imaging. This cutting-edge imaging technique allows for elucidating the differentiation of stem cells in cardiac regeneration, providing an entry point to discover novel micro-circulation phenomenon with clinical significance for injury and repair. Summary: These findings demonstrate the multi-scale applications of this novel light-sheet imaging strategy to advance research in cardiovascular development and regeneration
    corecore