22,971 research outputs found

    Semantic categories underlying the meaning of ‘place’

    Get PDF
    This paper analyses the semantics of natural language expressions that are associated with the intuitive notion of ‘place’. We note that the nature of such terms is highly contested, and suggest that this arises from two main considerations: 1) there are a number of logically distinct categories of place expression, which are not always clearly distinguished in discourse about ‘place’; 2) the many non-substantive place count nouns (such as ‘place’, ‘region’, ‘area’, etc.) employed in natural language are highly ambiguous. With respect to consideration 1), we propose that place-related expressions should be classified into the following distinct logical types: a) ‘place-like’ count nouns (further subdivided into abstract, spatial and substantive varieties), b) proper names of ‘place-like’ objects, c) locative property phrases, and d) definite descriptions of ‘place-like’ objects. We outline possible formal representations for each of these. To address consideration 2), we examine meanings, connotations and ambiguities of the English vocabulary of abstract and generic place count nouns, and identify underlying elements of meaning, which explain both similarities and differences in the sense and usage of the various terms

    From Classical State-Swapping to Quantum Teleportation

    Full text link
    The quantum teleportation protocol is extracted directly out of a standard classical circuit that exchanges the states of two qubits using only controlled-NOT gates. This construction of teleportation from a classically transparent circuit generalizes straightforwardly to d-state systems.Comment: Missing daggers added to Figures 13, 14, and 15. Otherwise this is the version that appeared in Physical Revie

    Negative entropy and information in quantum mechanics

    Get PDF
    A framework for a quantum mechanical information theory is introduced that is based entirely on density operators, and gives rise to a unified description of classical correlation and quantum entanglement. Unlike in classical (Shannon) information theory, quantum (von Neumann) conditional entropies can be negative when considering quantum entangled systems, a fact related to quantum non-separability. The possibility that negative (virtual) information can be carried by entangled particles suggests a consistent interpretation of quantum informational processes.Comment: 4 pages RevTeX, 2 figures. Expanded discussion of quantum teleportation and superdense coding, and minor corrections. To appear in Phys. Rev. Let

    On the origin of noisy states whose teleportation fidelity can be enhanced through dissipation

    Full text link
    Recently Badziag \emph{et al.} \cite{badziag} obtained a class of noisy states whose teleportation fidelity can be enhanced by subjecting one of the qubits to dissipative interaction with the environment via amplitude damping channel (ADC). We show that such noisy states result while sharing the states (| \Phi ^{\pm}> =\frac{1}{\sqrt{2}}(| 00> \pm | 11>)) across ADC. We also show that under similar dissipative interactions different Bell states give rise to noisy entangled states that are qualitatively very different from each other in the sense, only the noisy entangled states constructed from the Bell states (| \Phi ^{\pm}>) can \emph{}be made better sometimes by subjecting the unaffected qubit to a dissipative interaction with the environment. Importantly if the noisy state is non teleporting then it can always be made teleporting with this prescription. We derive the most general restrictions on improvement of such noisy states assuming that the damping parameters being different for both the qubits. However this curious prescription does not work for the noisy entangled states generated from (| \Psi ^{\pm}> =\frac{1}{\sqrt{2}}(| 01> \pm | 10>)). This shows that an apriori knowledge of the noisy channel might be helpful to decide which Bell state needs to be shared between Alice and Bob. \emph{}Comment: Latex, 18 pages: Revised version with a new result. Submitted to PR

    Quantum Communication Protocol Employing Weak Measurements

    Get PDF
    We propose a communication protocol exploiting correlations between two events with a definite time-ordering: a) the outcome of a {\em weak measurement} on a spin, and b) the outcome of a subsequent ordinary measurement on the spin. In our protocol, Alice, first generates a "code" by performing weak measurements on a sample of N spins. The sample is sent to Bob, who later performs a post-selection by measuring the spin along either of two certain directions. The results of the post-selection define the "key', which he then broadcasts publicly. Using both her previously generated code and this key, Alice is able to infer the {\em direction} chosen by Bob in the post-selection. Alternatively, if Alice broadcasts publicly her code, Bob is able to infer from the code and the key the direction chosen by Alice for her weak measurement. Two possible experimental realizations of the protocols are briefly mentioned.Comment: 5 pages, Revtex, 1 figure. A second protocol is added, where by a similar set of weak measurement Alice can send, instead of receiving, a message to Bob. The security question for the latter protocol is discusse

    Optimal dimensionality for quantum cryptography

    Get PDF
    We perform a comparison of two protocols for generating a cryptographic key composed from d-valued symbols: one exploiting a string of independent qubits and another one utilizing d-level systems prepared in states belonging to d+1 mutually unbiased bases. We show that the protocol based on qubits is optimal for quantum cryptography, since it provides higher security and higher key generation rate.Comment: Revtex, 4 pages, 1 eps figur

    Security of the Bennett 1992 quantum-key distribution against individual attack over a realistic channel

    Full text link
    The security of two-state quantum key distribution against individual attack is estimated when the channel has losses and noises. We assume that Alice and Bob use two nonorthogonal single-photon polarization states. To make our analysis simple, we propose a modified B92 protocol in which Alice and Bob make use of inconclusive results and Bob performs a kind of symmetrization of received states. Using this protocol, Alice and Bob can estimate Eve's information gain as a function of a few parameters which reflect the imperfections of devices or Eve's disturbance. In some parameter regions, Eve's maximum information gain shows counter-intuitive behavior, namely, it decreases as the amount of disturbances increases. For a small noise rate Eve can extract perfect information in the case where the angle between Alice's two states is small or large, while she cannot extract perfect information for intermediate angles. We also estimate the secret key gain which is the net growth of the secret key per one pulse. We show the region where the modified B92 protocol over a realistic channel is secure against individual attack.Comment: 16 pages, 15 figure

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    Complete physical simulation of the entangling-probe attack on the BB84 protocol

    Get PDF
    We have used deterministic single-photon two qubit (SPTQ) quantum logic to implement the most powerful individual-photon attack against the Bennett-Brassard 1984 (BB84) quantum key distribution protocol. Our measurement results, including physical source and gate errors, are in good agreement with theoretical predictions for the Renyi information obtained by Eve as a function of the errors she imparts to Alice and Bob's sifted key bits. The current experiment is a physical simulation of a true attack, because Eve has access to Bob's physical receiver module. This experiment illustrates the utility of an efficient deterministic quantum logic for performing realistic physical simulations of quantum information processing functions.Comment: 4 pages, 5 figure

    Nonlinear quantum state transformation of spin-1/2

    Get PDF
    A non-linear quantum state transformation is presented. The transformation, which operates on pairs of spin-1/2, can be used to distinguish optimally between two non-orthogonal states. Similar transformations applied locally on each component of an entangled pair of spin-1/2 can be used to transform a mixed nonlocal state into a quasi-pure maximally entangled singlet state. In both cases the transformation makes use of the basic building block of the quantum computer, namely the quantum-XOR gate.Comment: 12 pages, LaTeX, amssym, epsfig (2 figures included
    • …
    corecore