1,475 research outputs found

    On local-hidden-variable no-go theorems

    Full text link
    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimatly doomed in 1964 with the work of Bell Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus we will discuss here the three principal forms of no-go theorems for local hidden variable theories of Nature. We will define Bell inequalities, Bell inequalities without inequalities and pseudo-telepathy. A discussion of the similarities and differences will follow.Comment: 7 pages, no figure, replaced "Bell inequalities" with "Bell theorems" and updated the reference

    Quantum Computation of a Complex System : the Kicked Harper Model

    Full text link
    The simulation of complex quantum systems on a quantum computer is studied, taking the kicked Harper model as an example. This well-studied system has a rich variety of dynamical behavior depending on parameters, displays interesting phenomena such as fractal spectra, mixed phase space, dynamical localization, anomalous diffusion, or partial delocalization, and can describe electrons in a magnetic field. Three different quantum algorithms are presented and analyzed, enabling to simulate efficiently the evolution operator of this system with different precision using different resources. Depending on the parameters chosen, the system is near-integrable, localized, or partially delocalized. In each case we identify transport or spectral quantities which can be obtained more efficiently on a quantum computer than on a classical one. In most cases, a polynomial gain compared to classical algorithms is obtained, which can be quadratic or less depending on the parameter regime. We also present the effects of static imperfections on the quantities selected, and show that depending on the regime of parameters, very different behaviors are observed. Some quantities can be obtained reliably with moderate levels of imperfection, whereas others are exponentially sensitive to imperfection strength. In particular, the imperfection threshold for delocalization becomes exponentially small in the partially delocalized regime. Our results show that interesting behavior can be observed with as little as 7-8 qubits, and can be reliably measured in presence of moderate levels of internal imperfections

    General framework for quantum search algorithms

    Full text link
    Grover's quantum search algorithm drives a quantum computer from a prepared initial state to a desired final state by using selective transformations of these states. Here, we analyze a framework when one of the selective trasformations is replaced by a more general unitary transformation. Our framework encapsulates several previous generalizations of the Grover's algorithm. We show that the general quantum search algorithm can be improved by controlling the transformations through an ancilla qubit. As a special case of this improvement, we get a faster quantum algorithm for the two-dimensional spatial search.Comment: revised versio

    Quantum Bit String Commitment

    Full text link
    A bit string commitment protocol securely commits NN classical bits in such a way that the recipient can extract only M<NM<N bits of information about the string. Classical reasoning might suggest that bit string commitment implies bit commitment and hence, given the Mayers-Lo-Chau theorem, that non-relativistic quantum bit string commitment is impossible. Not so: there exist non-relativistic quantum bit string commitment protocols, with security parameters ϵ\epsilon and MM, that allow AA to commit N=N(M,ϵ)N = N(M, \epsilon) bits to BB so that AA's probability of successfully cheating when revealing any bit and BB's probability of extracting more than N=NMN'=N-M bits of information about the NN bit string before revelation are both less than ϵ\epsilon. With a slightly weakened but still restrictive definition of security against AA, NN can be taken to be O(exp(CN))O(\exp (C N')) for a positive constant CC. I briefly discuss possible applications.Comment: Published version. (Refs updated.

    Exponential quantum enhancement for distributed addition with local nonlinearity

    Full text link
    We consider classical and entanglement-assisted versions of a distributed computation scheme that computes nonlinear Boolean functions of a set of input bits supplied by separated parties. Communication between the parties is restricted to take place through a specific apparatus which enforces the constraints that all nonlinear, nonlocal classical logic is performed by a single receiver, and that all communication occurs through a limited number of one-bit channels. In the entanglement-assisted version, the number of channels required to compute a Boolean function of fixed nonlinearity can become exponentially smaller than in the classical version. We demonstrate this exponential enhancement for the problem of distributed integer addition.Comment: To appear in Quantum Information Processin

    Quantum computation and analysis of Wigner and Husimi functions: toward a quantum image treatment

    Full text link
    We study the efficiency of quantum algorithms which aim at obtaining phase space distribution functions of quantum systems. Wigner and Husimi functions are considered. Different quantum algorithms are envisioned to build these functions, and compared with the classical computation. Different procedures to extract more efficiently information from the final wave function of these algorithms are studied, including coarse-grained measurements, amplitude amplification and measure of wavelet-transformed wave function. The algorithms are analyzed and numerically tested on a complex quantum system showing different behavior depending on parameters, namely the kicked rotator. The results for the Wigner function show in particular that the use of the quantum wavelet transform gives a polynomial gain over classical computation. For the Husimi distribution, the gain is much larger than for the Wigner function, and is bigger with the help of amplitude amplification and wavelet transforms. We also apply the same set of techniques to the analysis of real images. The results show that the use of the quantum wavelet transform allows to lower dramatically the number of measurements needed, but at the cost of a large loss of information.Comment: Revtex, 13 pages, 16 figure

    Noise Effects in Quantum Magic Squares Game

    Full text link
    In the article we analyse how noisiness of quantum channels can influence the magic squares quantum pseudo-telepathy game. We show that the probability of success can be used to determine characteristics of quantum channels. Therefore the game deserves more careful study aiming at its implementation.Comment: 5 figure

    Unconditionally Secure Bit Commitment

    Get PDF
    We describe a new classical bit commitment protocol based on cryptographic constraints imposed by special relativity. The protocol is unconditionally secure against classical or quantum attacks. It evades the no-go results of Mayers, Lo and Chau by requiring from Alice a sequence of communications, including a post-revelation verification, each of which is guaranteed to be independent of its predecessor.Comment: Typos corrected. Reference details added. To appear in Phys. Rev. Let

    Fair Loss-Tolerant Quantum Coin Flipping

    Full text link
    Coin flipping is a cryptographic primitive in which two spatially separated players, who in principle do not trust each other, wish to establish a common random bit. If we limit ourselves to classical communication, this task requires either assumptions on the computational power of the players or it requires them to send messages to each other with sufficient simultaneity to force their complete independence. Without such assumptions, all classical protocols are so that one dishonest player has complete control over the outcome. If we use quantum communication, on the other hand, protocols have been introduced that limit the maximal bias that dishonest players can produce. However, those protocols would be very difficult to implement in practice because they are susceptible to realistic losses on the quantum channel between the players or in their quantum memory and measurement apparatus. In this paper, we introduce a novel quantum protocol and we prove that it is completely impervious to loss. The protocol is fair in the sense that either player has the same probability of success in cheating attempts at biasing the outcome of the coin flip. We also give explicit and optimal cheating strategies for both players.Comment: 12 pages, 1 figure; various minor typos corrected in version
    corecore