1,475 research outputs found
On local-hidden-variable no-go theorems
The strongest attack against quantum mechanics came in 1935 in the form of a
paper by Einstein, Podolsky and Rosen. It was argued that the theory of quantum
mechanics could not be called a complete theory of Nature, for every element of
reality is not represented in the formalism as such. The authors then put forth
a proposition: we must search for a theory where, upon knowing everything about
the system, including possible hidden variables, one could make precise
predictions concerning elements of reality. This project was ultimatly doomed
in 1964 with the work of Bell Bell, who showed that the most general local
hidden variable theory could not reproduce correlations that arise in quantum
mechanics. There exist mainly three forms of no-go theorems for local hidden
variable theories. Although almost every physicist knows the consequences of
these no-go theorems, not every physicist is aware of the distinctions between
the three or even their exact definitions. Thus we will discuss here the three
principal forms of no-go theorems for local hidden variable theories of Nature.
We will define Bell inequalities, Bell inequalities without inequalities and
pseudo-telepathy. A discussion of the similarities and differences will follow.Comment: 7 pages, no figure, replaced "Bell inequalities" with "Bell theorems"
and updated the reference
Quantum Computation of a Complex System : the Kicked Harper Model
The simulation of complex quantum systems on a quantum computer is studied,
taking the kicked Harper model as an example. This well-studied system has a
rich variety of dynamical behavior depending on parameters, displays
interesting phenomena such as fractal spectra, mixed phase space, dynamical
localization, anomalous diffusion, or partial delocalization, and can describe
electrons in a magnetic field. Three different quantum algorithms are presented
and analyzed, enabling to simulate efficiently the evolution operator of this
system with different precision using different resources. Depending on the
parameters chosen, the system is near-integrable, localized, or partially
delocalized. In each case we identify transport or spectral quantities which
can be obtained more efficiently on a quantum computer than on a classical one.
In most cases, a polynomial gain compared to classical algorithms is obtained,
which can be quadratic or less depending on the parameter regime. We also
present the effects of static imperfections on the quantities selected, and
show that depending on the regime of parameters, very different behaviors are
observed. Some quantities can be obtained reliably with moderate levels of
imperfection, whereas others are exponentially sensitive to imperfection
strength. In particular, the imperfection threshold for delocalization becomes
exponentially small in the partially delocalized regime. Our results show that
interesting behavior can be observed with as little as 7-8 qubits, and can be
reliably measured in presence of moderate levels of internal imperfections
General framework for quantum search algorithms
Grover's quantum search algorithm drives a quantum computer from a prepared
initial state to a desired final state by using selective transformations of
these states. Here, we analyze a framework when one of the selective
trasformations is replaced by a more general unitary transformation. Our
framework encapsulates several previous generalizations of the Grover's
algorithm. We show that the general quantum search algorithm can be improved by
controlling the transformations through an ancilla qubit. As a special case of
this improvement, we get a faster quantum algorithm for the two-dimensional
spatial search.Comment: revised versio
Quantum Bit String Commitment
A bit string commitment protocol securely commits classical bits in such
a way that the recipient can extract only bits of information about the
string. Classical reasoning might suggest that bit string commitment implies
bit commitment and hence, given the Mayers-Lo-Chau theorem, that
non-relativistic quantum bit string commitment is impossible. Not so: there
exist non-relativistic quantum bit string commitment protocols, with security
parameters and , that allow to commit
bits to so that 's probability of successfully cheating when revealing
any bit and 's probability of extracting more than bits of
information about the bit string before revelation are both less than
. With a slightly weakened but still restrictive definition of
security against , can be taken to be for a positive
constant . I briefly discuss possible applications.Comment: Published version. (Refs updated.
Exponential quantum enhancement for distributed addition with local nonlinearity
We consider classical and entanglement-assisted versions of a distributed
computation scheme that computes nonlinear Boolean functions of a set of input
bits supplied by separated parties. Communication between the parties is
restricted to take place through a specific apparatus which enforces the
constraints that all nonlinear, nonlocal classical logic is performed by a
single receiver, and that all communication occurs through a limited number of
one-bit channels. In the entanglement-assisted version, the number of channels
required to compute a Boolean function of fixed nonlinearity can become
exponentially smaller than in the classical version. We demonstrate this
exponential enhancement for the problem of distributed integer addition.Comment: To appear in Quantum Information Processin
Quantum computation and analysis of Wigner and Husimi functions: toward a quantum image treatment
We study the efficiency of quantum algorithms which aim at obtaining phase
space distribution functions of quantum systems. Wigner and Husimi functions
are considered. Different quantum algorithms are envisioned to build these
functions, and compared with the classical computation. Different procedures to
extract more efficiently information from the final wave function of these
algorithms are studied, including coarse-grained measurements, amplitude
amplification and measure of wavelet-transformed wave function. The algorithms
are analyzed and numerically tested on a complex quantum system showing
different behavior depending on parameters, namely the kicked rotator. The
results for the Wigner function show in particular that the use of the quantum
wavelet transform gives a polynomial gain over classical computation. For the
Husimi distribution, the gain is much larger than for the Wigner function, and
is bigger with the help of amplitude amplification and wavelet transforms. We
also apply the same set of techniques to the analysis of real images. The
results show that the use of the quantum wavelet transform allows to lower
dramatically the number of measurements needed, but at the cost of a large loss
of information.Comment: Revtex, 13 pages, 16 figure
Noise Effects in Quantum Magic Squares Game
In the article we analyse how noisiness of quantum channels can influence the
magic squares quantum pseudo-telepathy game. We show that the probability of
success can be used to determine characteristics of quantum channels. Therefore
the game deserves more careful study aiming at its implementation.Comment: 5 figure
Unconditionally Secure Bit Commitment
We describe a new classical bit commitment protocol based on cryptographic
constraints imposed by special relativity. The protocol is unconditionally
secure against classical or quantum attacks. It evades the no-go results of
Mayers, Lo and Chau by requiring from Alice a sequence of communications,
including a post-revelation verification, each of which is guaranteed to be
independent of its predecessor.Comment: Typos corrected. Reference details added. To appear in Phys. Rev.
Let
Fair Loss-Tolerant Quantum Coin Flipping
Coin flipping is a cryptographic primitive in which two spatially separated
players, who in principle do not trust each other, wish to establish a common
random bit. If we limit ourselves to classical communication, this task
requires either assumptions on the computational power of the players or it
requires them to send messages to each other with sufficient simultaneity to
force their complete independence. Without such assumptions, all classical
protocols are so that one dishonest player has complete control over the
outcome. If we use quantum communication, on the other hand, protocols have
been introduced that limit the maximal bias that dishonest players can produce.
However, those protocols would be very difficult to implement in practice
because they are susceptible to realistic losses on the quantum channel between
the players or in their quantum memory and measurement apparatus. In this
paper, we introduce a novel quantum protocol and we prove that it is completely
impervious to loss. The protocol is fair in the sense that either player has
the same probability of success in cheating attempts at biasing the outcome of
the coin flip. We also give explicit and optimal cheating strategies for both
players.Comment: 12 pages, 1 figure; various minor typos corrected in version
- …