350 research outputs found

    Quantum Key Distribution between N partners: optimal eavesdropping and Bell's inequalities

    Get PDF
    Quantum secret-sharing protocols involving N partners (NQSS) are key distribution protocols in which Alice encodes her key into N1N-1 qubits, in such a way that all the other partners must cooperate in order to retrieve the key. On these protocols, several eavesdropping scenarios are possible: some partners may want to reconstruct the key without the help of the other ones, and consequently collaborate with an Eve that eavesdrops on the other partners' channels. For each of these scenarios, we give the optimal individual attack that the Eve can perform. In case of such an optimal attack, the authorized partners have a higher information on the key than the unauthorized ones if and only if they can violate a Bell's inequality.Comment: 14 pages, 1 figur

    One-and-a-half quantum de Finetti theorems

    Full text link
    We prove a new kind of quantum de Finetti theorem for representations of the unitary group U(d). Consider a pure state that lies in the irreducible representation U_{mu+nu} for Young diagrams mu and nu. U_{mu+nu} is contained in the tensor product of U_mu and U_nu; let xi be the state obtained by tracing out U_nu. We show that xi is close to a convex combination of states Uv, where U is in U(d) and v is the highest weight vector in U_mu. When U_{mu+nu} is the symmetric representation, this yields the conventional quantum de Finetti theorem for symmetric states, and our method of proof gives near-optimal bounds for the approximation of xi by a convex combination of product states. For the class of symmetric Werner states, we give a second de Finetti-style theorem (our 'half' theorem); the de Finetti-approximation in this case takes a particularly simple form, involving only product states with a fixed spectrum. Our proof uses purely group theoretic methods, and makes a link with the shifted Schur functions. It also provides some useful examples, and gives some insight into the structure of the set of convex combinations of product states.Comment: 14 pages, 3 figures, v4: minor additions (including figures), published versio

    Quantum cloning machines for equatorial qubits

    Full text link
    Quantum cloning machines for equatorial qubits are studied. For the case of 1 to 2 phase-covariant quantum cloning machine, we present the networks consisting of quantum gates to realize the quantum cloning transformations. The copied equatorial qubits are shown to be separable by using Peres-Horodecki criterion. The optimal 1 to M phase-covariant quantum cloning transformations are given.Comment: Revtex, 9 page

    Unified criterion for security of secret sharing in terms of violation of Bell inequality

    Get PDF
    In secret sharing protocols, a secret is to be distributed among several partners so that leaving out any number of them, the rest do not have the complete information. Strong multiqubit correlations in the state by which secret sharing is carried out, had been proposed as a criterion for security of such protocols against individual attacks by an eavesdropper. However we show that states with weak multiqubit correlations can also be used for secure secret sharing. That our state has weak multiqubit correlations, is shown from the perspective of violation of local realism, and also by showing that its higher order correlations are described by lower ones. We then present a unified criterion for security of secret sharing in terms of violation of local realism, which works when the secret sharing state is the Greenberger-Horne-Zeilinger state (with strong multiqubit correlations), as well as states of a different class (with weak multiqubit correlations).Comment: 7 pages, no figures, RevTeX

    Order p^6 chiral couplings from the scalar K Pi form factor

    Get PDF
    Employing results from a recent determination of the scalar KPi form factor F_0^KPi within a coupled channel dispersion relation analysis \cite{JOP01}, in this work we calculate the slope and curvature of F_0^KPi(t) at zero momentum transfer. Knowledge of the slope and curvature of the scalar KPi form factor, together with a recently calculated expression for F_0^KPi(t) in chiral perturbation theory at order p^6, enable to estimate the O(p^6) chiral constants C_12^r=(0.3 +- 5.4)10^-7 and (C_12^r+C_34^r)=(3.2 +- 1.5)10^-6. Our findings also allow to estimate the contribution coming from the C_i to the vector form factor F_+^KPi(0) which is crucial for a precise determination of |V_us| from K_l3 decays. Our result F_+^KPi(0)|_C_i^r=-0.018 +- 0.009, though inflicted with large uncertainties, is in perfect agreement with a previous estimate by Leutwyler and Roos already made twenty years ago.Comment: 19 pages, discussion of scale dependence of the chiral couplings added; version to appear in JHE

    Phase-covariant quantum cloning of qudits

    Full text link
    We study the phase-covariant quantum cloning machine for qudits, i.e. the input states in d-level quantum system have complex coefficients with arbitrary phase but constant module. A cloning unitary transformation is proposed. After optimizing the fidelity between input state and single qudit reduced density opertor of output state, we obtain the optimal fidelity for 1 to 2 phase-covariant quantum cloning of qudits and the corresponding cloning transformation.Comment: Revtex, 6 page

    Spin - or, actually: Spin and Quantum Statistics

    Full text link
    The history of the discovery of electron spin and the Pauli principle and the mathematics of spin and quantum statistics are reviewed. Pauli's theory of the spinning electron and some of its many applications in mathematics and physics are considered in more detail. The role of the fact that the tree-level gyromagnetic factor of the electron has the value g = 2 in an analysis of stability (and instability) of matter in arbitrary external magnetic fields is highlighted. Radiative corrections and precision measurements of g are reviewed. The general connection between spin and statistics, the CPT theorem and the theory of braid statistics are described.Comment: 50 pages, no figures, seminar on "spin

    Multipartite entangled coherent states

    Full text link
    We propose a scheme for generating multipartite entangled coherent states via entanglement swapping, with an example of a physical realization in ion traps. Bipartite entanglement of these multipartite states is quantified by the concurrence. We also use the NN--tangle to compute multipartite entanglement for certain systems. Finally we establish that these results for entanglement can be applied to more general multipartite entangled nonorthogonal states.Comment: 7 pages, two figures. We added more detail discussions on the generation of multipartite entangled coherent states and multipartite entangelemen
    corecore