346 research outputs found
Conditional beam splitting attack on quantum key distribution
We present a novel attack on quantum key distribution based on the idea of
adaptive absorption [calsam01]. The conditional beam splitting attack is shown
to be much more efficient than the conventional beam spitting attack, achieving
a performance similar to the, powerful but currently unfeasible, photon number
splitting attack. The implementation of the conditional beam splitting attack,
based solely on linear optical elements, is well within reach of current
technology.Comment: Submitted to Phys. Rev.
Entangling capacity of global phases and implications for Deutsch-Jozsa algorithm
We investigate the creation of entanglement by the application of phases
whose value depends on the state of a collection of qubits. First we give the
necessary and sufficient conditions for a given set of phases to result in the
creation of entanglement in a state comprising of an arbitrary number of
qubits. Then we analyze the creation of entanglement between any two qubits in
three qubit pure and mixed states. We use our result to prove that entanglement
is necessary for Deutsch-Jozsa algorithm to have an exponential advantage over
its classical counterpart.Comment: All 8 figures at the en
Classical and quantum pumping in closed systems
Pumping of charge (Q) in a closed ring geometry is not quantized even in the
strict adiabatic limit. The deviation form exact quantization can be related to
the Thouless conductance. We use Kubo formalism as a starting point for the
calculation of both the dissipative and the adiabatic contributions to Q. As an
application we bring examples for classical dissipative pumping, classical
adiabatic pumping, and in particular we make an explicit calculation for
quantum pumping in case of the simplest pumping device, which is a 3 site
lattice model.Comment: 5 pages, 3 figures. The long published version is cond-mat/0307619.
This is the short unpublished versio
Security of the Bennett 1992 quantum-key distribution against individual attack over a realistic channel
The security of two-state quantum key distribution against individual attack
is estimated when the channel has losses and noises. We assume that Alice and
Bob use two nonorthogonal single-photon polarization states. To make our
analysis simple, we propose a modified B92 protocol in which Alice and Bob make
use of inconclusive results and Bob performs a kind of symmetrization of
received states. Using this protocol, Alice and Bob can estimate Eve's
information gain as a function of a few parameters which reflect the
imperfections of devices or Eve's disturbance. In some parameter regions, Eve's
maximum information gain shows counter-intuitive behavior, namely, it decreases
as the amount of disturbances increases. For a small noise rate Eve can extract
perfect information in the case where the angle between Alice's two states is
small or large, while she cannot extract perfect information for intermediate
angles. We also estimate the secret key gain which is the net growth of the
secret key per one pulse. We show the region where the modified B92 protocol
over a realistic channel is secure against individual attack.Comment: 16 pages, 15 figure
Screening of qubit from zero-temperature reservoir
We suggest an application of dynamical Zeno effect to isolate a qubit in the
quantum memory unit against decoherence caused by coupling with the reservoir
having zero temperature. The method is based on using an auxiliary casing
system that mediate the qubit-reservoir interaction and is simultaneously
frequently erased to ground state. This screening procedure can be implemented
in the cavity QED experiments to store the atomic and photonic qubit states.Comment: 4 pages, 5 figure
Verifying Class Invariants in Concurrent Programs
Class invariants are a highly useful feature for the verification of object-oriented programs, because they can be used to capture all valid object states. In a sequential program setting, the validity of class invariants is typically described in terms of a visible state semantics, i.e., invariants only have to hold whenever a method begins or ends execution, and they may be broken inside a method body. However, in a concurrent setting, this restriction is no longer usable, because due to thread interleavings, any program state is potentially a visible state.
In this paper we present a new approach for reasoning about class invariants in multithreaded programs. We allow a thread to explicitly break an invariant at specific program locations, while ensuring that no other thread can observe the broken invariant. We develop our technique in a permission-based separation logic environment. However, we deviate from separation logic's standard rules and allow a class invariant to express properties over shared memory locations (the invariant footprint), independently of the permissions on these locations. In this way, a thread may break or reestablish an invariant without holding permissions to all locations in its footprint. To enable modular verification, we adopt the restrictions of Muller's ownership-based type system
Field quantization for open optical cavities
We study the quantum properties of the electromagnetic field in optical
cavities coupled to an arbitrary number of escape channels. We consider both
inhomogeneous dielectric resonators with a scalar dielectric constant
and cavities defined by mirrors of arbitrary shape. Using
the Feshbach projector technique we quantize the field in terms of a set of
resonator and bath modes. We rigorously show that the field Hamiltonian reduces
to the system--and--bath Hamiltonian of quantum optics. The field dynamics is
investigated using the input--output theory of Gardiner and Collet. In the case
of strong coupling to the external radiation field we find spectrally
overlapping resonator modes. The mode dynamics is coupled due to the damping
and noise inflicted by the external field. For wave chaotic resonators the mode
dynamics is determined by a non--Hermitean random matrix. Upon including an
amplifying medium, our dynamics of open-resonator modes may serve as a starting
point for a quantum theory of random lasing.Comment: 16 pages, added references, corrected typo
Testing Broken U(1) Symmetry in a Two-Component Atomic Bose-Einstein Condensate
We present a scheme for determining if the quantum state of a small trapped
Bose-Einstein condensate is a state with well defined number of atoms, a Fock
state, or a state with a broken U(1) gauge symmetry, a coherent state. The
proposal is based on the observation of Ramsey fringes. The population
difference observed in a Ramsey fringe experiment will exhibit collapse and
revivals due to the mean-field interactions. The collapse and revival times
depend on the relative strength of the mean-field interactions for the two
components and the initial quantum state of the condensate.Comment: 20 Pages RevTex, 3 Figure
Photon and Z induced heavy charged lepton pair production at a hadron supercollider
We investigate the pair production of charged heavy leptons via
photon-induced processes at the proposed CERN Large Hadron Collider (LHC).
Using effective photon and Z approximations, rates are given for
production due to fusion and fusion for the cases of
inelastic, elastic and semi-elastic collisions. These are compared with
the corresponding rates for production via the gluon fusion and Drell-Yan
mechanisms. Various and differential luminosities
for collisions are also presented.Comment: 22 pages, RevTex 3.0, 6 uuencoded and compressed postscript figures
included. Reference to one paper changed from the original preprint number to
the published version. Everything else unchange
Quantifying Entanglement Production of Quantum Operations
The problem of entanglement produced by an arbitrary operator is formulated
and a related measure of entanglement production is introduced. This measure of
entanglement production satisfies all properties natural for such a
characteristic. A particular case is the entanglement produced by a density
operator or a density matrix. The suggested measure is valid for operations
over pure states as well as over mixed states, for equilibrium as well as
nonequilibrium processes. Systems of arbitrary nature can be treated, described
either by field operators, spin operators, or any other kind of operators,
which is realized by constructing generalized density matrices. The interplay
between entanglement production and phase transitions in statistical systems is
analysed by the examples of Bose-Einstein condensation, superconducting
transition, and magnetic transitions. The relation between the measure of
entanglement production and order indices is analysed.Comment: 20 pages, Revte
- …