27,524 research outputs found
A comparative analysis of the decoupling effects in a magnetic forming beryllium coil assembly
Digital computer for determining currents and forces in magnetic forming beryllium coil assembl
When only two thirds of the entanglement can be distilled
We provide an example of distillable bipartite mixed state such that, even in
the asymptotic limit, more pure-state entanglement is required to create it
than can be distilled from it. Thus, we show that the irreversibility in the
processes of formation and distillation of bipartite states, recently proved in
[G. Vidal, J.I. Cirac, Phys. Rev. Lett. 86, (2001) 5803-5806], is not limited
to bound-entangled states.Comment: 4 pages, revtex, 1 figur
Generalized self-testing and the security of the 6-state protocol
Self-tested quantum information processing provides a means for doing useful
information processing with untrusted quantum apparatus. Previous work was
limited to performing computations and protocols in real Hilbert spaces, which
is not a serious obstacle if one is only interested in final measurement
statistics being correct (for example, getting the correct factors of a large
number after running Shor's factoring algorithm). This limitation was shown by
McKague et al. to be fundamental, since there is no way to experimentally
distinguish any quantum experiment from a special simulation using states and
operators with only real coefficients.
In this paper, we show that one can still do a meaningful self-test of
quantum apparatus with complex amplitudes. In particular, we define a family of
simulations of quantum experiments, based on complex conjugation, with two
interesting properties. First, we are able to define a self-test which may be
passed only by states and operators that are equivalent to simulations within
the family. This extends work of Mayers and Yao and Magniez et al. in
self-testing of quantum apparatus, and includes a complex measurement. Second,
any of the simulations in the family may be used to implement a secure 6-state
QKD protocol, which was previously not known to be implementable in a
self-tested framework.Comment: To appear in proceedings of TQC 201
Activating bound entanglement in multi-particle systems
We analyze the existence of activable bound entangled states in
multi-particle systems. We first give a series of examples which illustrate
some different ways in which bound entangled states can be activated by letting
some of the parties to share maximally entangled states. Then, we derive
necessary conditions for a state to be distillable as well as to be activable.
These conditions turn out to be also sufficient for a certain family of
multi-qubit states. We use these results to explicitely to construct states
displaying novel properties related to bound entanglement and its activation.Comment: 8 pages, 3 figure
On the capacities of bipartite Hamiltonians and unitary gates
We consider interactions as bidirectional channels. We investigate the
capacities for interaction Hamiltonians and nonlocal unitary gates to generate
entanglement and transmit classical information. We give analytic expressions
for the entanglement generating capacity and entanglement-assisted one-way
classical communication capacity of interactions, and show that these
quantities are additive, so that the asymptotic capacities equal the
corresponding 1-shot capacities. We give general bounds on other capacities,
discuss some examples, and conclude with some open questions.Comment: V3: extensively rewritten. V4: a mistaken reference to a conjecture
by Kraus and Cirac [quant-ph/0011050] removed and a mistake in the order of
authors in Ref. [53] correcte
A method of enciphering quantum states
In this paper, we propose a method of enciphering quantum states of two-state
systems (qubits) for sending them in secrecy without entangled qubits shared by
two legitimate users (Alice and Bob). This method has the following two
properties. First, even if an eavesdropper (Eve) steals qubits, she can extract
information from them with certain probability at most. Second, Alice and Bob
can confirm that the qubits are transmitted between them correctly by measuring
a signature. If Eve measures m qubits one by one from n enciphered qubits and
sends alternative ones (the Intercept/Resend attack), a probability that Alice
and Bob do not notice Eve's action is equal to (3/4)^m or less. Passwords for
decryption and the signature are given by classical binary strings and they are
disclosed through a public channel. Enciphering classical information by this
method is equivalent to the one-time pad method with distributing a classical
key (random binary string) by the BB84 protocol. If Eve takes away qubits,
Alice and Bob lose the original quantum information. If we apply our method to
a state in iteration, Eve's success probability decreases exponentially. We
cannot examine security against the case that Eve makes an attack with using
entanglement. This remains to be solved in the future.Comment: 21 pages, Latex2e, 10 epsf figures. v2: 22 pages, added two
references, several clarifying sentences are added in Sec. 5, typos
corrected, a new proof is provided in Appendix A and it is shorter than the
old one. v3: 23 pages, one section is adde
Quantum computers can search arbitrarily large databases by a single query
This paper shows that a quantum mechanical algorithm that can query
information relating to multiple items of the database, can search a database
in a single query (a query is defined as any question to the database to which
the database has to return a (YES/NO) answer). A classical algorithm will be
limited to the information theoretic bound of at least O(log N) queries (which
it would achieve by using a binary search).Comment: Several enhancements to the original pape
Quantum secret sharing
Secret sharing is a procedure for splitting a message into several parts so
that no subset of parts is sufficient to read the message, but the entire set
is. We show how this procedure can be implemented using GHZ states. In the
quantum case the presence of an eavesdropper will introduce errors so that his
presence can be detected. We also show how GHZ states can be used to split
quantum information into two parts so that both parts are necessary to
reconstruct the original qubit.Comment: 6 pages, revtex, revised version, to appear in Phys. Rev.
An exploratory study of finite difference grids for transonic unsteady aerodynamics
Unsteady aerodynamic forces are calculated by the XTRAN2L finite difference program which solves the complete two dimensional unsteady transonic small perturbation equation. The unsteady forces are obtained using a pulse transfer function technique which assumes the flow field behaves in a locally linear fashion about a mean condition. Forces are calculated for a linear flat plate using the default grids from the LTRAN2-NLR, LTRAN2-HI, and XTRAN3S programs. The forces are compared to the exact theoretical values for flat plate, and grid generated boundary and internal numerical reflections are observed to cause significant errors in the unsteady airloads. Grids are presented that alleviate the reflections while reducing computational time up to fifty-three percent and program size up to twenty-eight percent. Forces are presented for a six percent thick parabolic arc airfoil which demonstrate that the transform technique may be successfully applied to nonlinear transonic flows
Quantifying nonorthogonality
An exploratory approach to the possibility of analyzing nonorthogonality as a
quantifiable property is presented. Three different measures for the
nonorthogonality of pure states are introduced, and one of these measures is
extended to single-particle density matrices using methods that are similar to
recently introduced techniques for quantifying entanglement. Several
interesting special cases are considered. It is pointed out that a measure of
nonorthogonality can meaningfully be associated with a single mixed quantum
state. It is then shown how nonorthogonality can be unlocked with classical
information; this analysis reveals interesting inequalities and points to a
number of connections between nonorthogonality and entanglement.Comment: Accepted for publication in Phys. Rev.
- …