4,620 research outputs found

    Area laws for the entanglement entropy - a review

    Full text link
    Physical interactions in quantum many-body systems are typically local: Individual constituents interact mainly with their few nearest neighbors. This locality of interactions is inherited by a decay of correlation functions, but also reflected by scaling laws of a quite profound quantity: The entanglement entropy of ground states. This entropy of the reduced state of a subregion often merely grows like the boundary area of the subregion, and not like its volume, in sharp contrast with an expected extensive behavior. Such "area laws" for the entanglement entropy and related quantities have received considerable attention in recent years. They emerge in several seemingly unrelated fields, in the context of black hole physics, quantum information science, and quantum many-body physics where they have important implications on the numerical simulation of lattice models. In this Colloquium we review the current status of area laws in these fields. Center stage is taken by rigorous results on lattice models in one and higher spatial dimensions. The differences and similarities between bosonic and fermionic models are stressed, area laws are related to the velocity of information propagation, and disordered systems, non-equilibrium situations, classical correlation concepts, and topological entanglement entropies are discussed. A significant proportion of the article is devoted to the quantitative connection between the entanglement content of states and the possibility of their efficient numerical simulation. We discuss matrix-product states, higher-dimensional analogues, and states from entanglement renormalization and conclude by highlighting the implications of area laws on quantifying the effective degrees of freedom that need to be considered in simulations.Comment: 28 pages, 2 figures, final versio

    Public-Key Encryption Schemes with Auxiliary Inputs

    Get PDF
    7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. ProceedingsWe construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) problems. As an independent technical contribution, we extend the Goldreich-Levin theorem to provide a hard-core (pseudorandom) value over large fields.National Science Foundation (U.S.) (Grant CCF-0514167)National Science Foundation (U.S.) (Grant CCF-0635297)National Science Foundation (U.S.) (Grant NSF-0729011)Israel Science Foundation (700/08)Chais Family Fellows Progra

    Entanglement between particle partitions in itinerant many-particle states

    Full text link
    We review `particle partitioning entanglement' for itinerant many-particle systems. This is defined as the entanglement between two subsets of particles making up the system. We identify generic features and mechanisms of particle entanglement that are valid over whole classes of itinerant quantum systems. We formulate the general structure of particle entanglement in many-fermion ground states, analogous to the `area law' for the more usually studied entanglement between spatial regions. Basic properties of particle entanglement are first elucidated by considering relatively simple itinerant models. We then review particle-partitioning entanglement in quantum states with more intricate physics, such as anyonic models and quantum Hall states.Comment: review, about 20 pages. Version 2 has minor revisions

    Mental disorders as networks of problems:A review of recent insights

    Get PDF
    Purpose: The network perspective on psychopathology understands mental disorders as complex networks of interacting symptoms. Despite its recent debut, with conceptual foundations in 2008 and empirical foundations in 2010, the framework has received considerable attention and recognition in the last years. Methods: This paper provides a review of all empirical network studies published between 2010 and 2016 and discusses them according to three main themes: comorbidity, prediction, and clinical intervention. Results: Pertaining to comorbidity, the network approach provides a powerful new framework to explain why certain disorders may co-occur more often than others. For prediction, studies have consistently found that symptom networks of people with mental disorders show different characteristics than that of healthy individuals, and preliminary evidence suggests that networks of healthy people show early warning signals before shifting into disordered states. For intervention, centrality—a metric that measures how connected and clinically relevant a symptom is in a network—is the most commonly studied topic, and numerous studies have suggested that targeting the most central symptoms may offer novel therapeutic strategies. Conclusions: We sketch future directions for the network approach pertaining to both clinical and methodological research, and conclude that network analysis has yielded important insights and may provide an important inroad towards personalized medicine by investigating the network structures of individual patients

    Quantum harmonic oscillator systems with disorder

    Full text link
    We study many-body properties of quantum harmonic oscillator lattices with disorder. A sufficient condition for dynamical localization, expressed as a zero-velocity Lieb-Robinson bound, is formulated in terms of the decay of the eigenfunction correlators for an effective one-particle Hamiltonian. We show how state-of-the-art techniques for proving Anderson localization can be used to prove that these properties hold in a number of standard models. We also derive bounds on the static and dynamic correlation functions at both zero and positive temperature in terms of one-particle eigenfunction correlators. In particular, we show that static correlations decay exponentially fast if the corresponding effective one-particle Hamiltonian exhibits localization at low energies, regardless of whether there is a gap in the spectrum above the ground state or not. Our results apply to finite as well as to infinite oscillator systems. The eigenfunction correlators that appear are more general than those previously studied in the literature. In particular, we must allow for functions of the Hamiltonian that have a singularity at the bottom of the spectrum. We prove exponential bounds for such correlators for some of the standard models

    Persistent spins in the linear diffusion approximation of phase ordering and zeros of stationary gaussian processes

    Full text link
    The fraction r(t) of spins which have never flipped up to time t is studied within a linear diffusion approximation to phase ordering. Numerical simulations show that, even in this simple context, r(t) decays with time like a power-law with a non-trival exponent θ\theta which depends on the space dimension. The local dynamics at a given point is a special case of a stationary gaussian process of known correlation function and the exponent θ\theta is shown to be determined by the asymptotic behavior of the probability distribution of intervals between consecutive zero-crossings of this process. An approximate way of computing this distribution is proposed, by taking the lengths of the intervals between successive zero-crossings as independent random variables. The approximation gives values of the exponent θ\theta in close agreement with the results of simulations.Comment: 10 pages, 2 postscript files. Submitted to PRL. Reference screwup correcte

    Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer

    Get PDF
    open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n)O(n) complexity instead of O(2n)O(2^n), where nn is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes Verifiable Oblivious Transfer which does not require the commitments to outputs which improves its efficiency significantly

    On the Quantum Complexity of the Continuous Hidden Subgroup Problem

    Get PDF
    The Hidden Subgroup Problem (HSP) aims at capturing all problems that are susceptible to be solvable in quantum polynomial time following the blueprints of Shor's celebrated algorithm. Successful solutions to this problems over various commutative groups allow to efficiently perform number-theoretic tasks such as factoring or finding discrete logarithms. The latest successful generalization (Eisentrager et al. STOC 2014) considers the problem of finding a full-rank lattice as the hidden subgroup of the continuous vector space Rm , even for large dimensions m . It unlocked new cryptanalytic algorithms (Biasse-Song SODA 2016, Cramer et al. EUROCRYPT 2016 and 2017), in particular to find mildly short vectors in ideal lattices. The cryptanalytic relevance of such a problem raises the question of a more refined and quantitative complexity analysis. In the light of the increasing physical difficulty of maintaining a large entanglement of qubits, the degree of concern may be different whether the above algorithm requires only linearly many qubits or a much larger polynomial amount of qubits. This is the question we start addressing with this work. We propose a detailed analysis of (a variation of) the aforementioned HSP algorithm, and conclude on its complexity as a function of all the relevant parameters. Incidentally, our work clarifies certain claims from the extended abstract of Eisentrager et al
    corecore