2,534 research outputs found

    Controlling qubit transitions during non-adiabatic rapid passage through quantum interference

    Full text link
    In adiabatic rapid passage, the Bloch vector of a qubit is inverted by slowly inverting an external field to which it is coupled, and along which it is initially aligned. In non-adiabatic twisted rapid passage, the external field is allowed to twist around its initial direction with azimuthal angle \phi(t) at the same time that it is non-adiabatically inverted. For polynomial twist, \phi(t) \sim Bt^{n}. We show that for n \ge 3, multiple qubit resonances can occur during a single inversion of the external field, producing strong interference effects in the qubit transition probability. The character of the interference is controllable through variation of the twist strength B. Constructive and destructive interference are possible, greatly enhancing or suppressing qubit transitions. Experimental confirmation of these controllable interference effects has already occurred. Application of this interference mechanism to the construction of fast fault-tolerant quantum CNOT and NOT gates is discussed.Comment: 8 pages, 7 figures, 2 tables; submitted to J. Mod. Op

    Selective and Efficient Quantum Process Tomography

    Get PDF
    In this paper we describe in detail and generalize a method for quantum process tomography that was presented in [A. Bendersky, F. Pastawski, J. P. Paz, Physical Review Letters 100, 190403 (2008)]. The method enables the efficient estimation of any element of the χ\chi--matrix of a quantum process. Such elements are estimated as averages over experimental outcomes with a precision that is fixed by the number of repetitions of the experiment. Resources required to implement it scale polynomically with the number of qubits of the system. The estimation of all diagonal elements of the χ\chi--matrix can be efficiently done without any ancillary qubits. In turn, the estimation of all the off-diagonal elements requires an extra clean qubit. The key ideas of the method, that is based on efficient estimation by random sampling over a set of states forming a 2--design, are described in detail. Efficient methods for preparing and detecting such states are explicitly shown.Comment: 9 pages, 5 figure

    Photon-Number-Splitting versus Cloning Attacks in Practical Implementations of the Bennett-Brassard 1984 protocol for Quantum Cryptography

    Full text link
    In practical quantum cryptography, the source sometimes produces multi-photon pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Lutkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2->3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2->3 cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2->3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.Comment: 11 pages, 5 figures; "intuitive" formula (31) adde

    Multi-party entanglement in graph states

    Full text link
    Graph states are multi-particle entangled states that correspond to mathematical graphs, where the vertices of the graph take the role of quantum spin systems and edges represent Ising interactions. They are many-body spin states of distributed quantum systems that play a significant role in quantum error correction, multi-party quantum communication, and quantum computation within the framework of the one-way quantum computer. We characterize and quantify the genuine multi-particle entanglement of such graph states in terms of the Schmidt measure, to which we provide upper and lower bounds in graph theoretical terms. Several examples and classes of graphs will be discussed, where these bounds coincide. These examples include trees, cluster states of different dimension, graphs that occur in quantum error correction, such as the concatenated [7,1,3]-CSS code, and a graph associated with the quantum Fourier transform in the one-way computer. We also present general transformation rules for graphs when local Pauli measurements are applied, and give criteria for the equivalence of two graphs up to local unitary transformations, employing the stabilizer formalism. For graphs of up to seven vertices we provide complete characterization modulo local unitary transformations and graph isomorphies.Comment: 22 pages, 15 figures, 2 tables, typos corrected (e.g. in measurement rules), references added/update

    Security of two quantum cryptography protocols using the same four qubit states

    Get PDF
    The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been widely studied in the last years. This protocol uses four states (more precisely, two complementary bases) for the encoding of the classical bit. Recently, it has been noticed that by using the same four states, but a different encoding of information, one can define a new protocol which is more robust in practical implementations, specifically when attenuated laser pulses are used instead of single-photon sources [V. Scarani et al., Phys. Rev. Lett. {\bf 92}, 057901 (2004); referred to as SARG04]. We present a detailed study of SARG04 in two different regimes. In the first part, we consider an implementation with a single-photon source: we derive bounds on the error rate QQ for security against all possible attacks by the eavesdropper. The lower and the upper bound obtained for SARG04 (Q10.95Q\lesssim 10.95% and Q14.9Q\gtrsim 14.9% respectively) are close to those obtained for BB84 (Q12.4Q\lesssim 12.4% and Q14.6Q\gtrsim 14.6% respectively). In the second part, we consider the realistic source consisting of an attenuated laser and improve on previous analysis by allowing Alice to optimize the mean number of photons as a function of the distance. SARG04 is found to perform better than BB84, both in secret key rate and in maximal achievable distance, for a wide class of Eve's attacks.Comment: 19 pages, 7 figures, published versio

    GHZ extraction yield for multipartite stabilizer states

    Get PDF
    Let Ψ>|\Psi> be an arbitrary stabilizer state distributed between three remote parties, such that each party holds several qubits. Let SS be a stabilizer group of Ψ>|\Psi>. We show that Ψ>|\Psi> can be converted by local unitaries into a collection of singlets, GHZ states, and local one-qubit states. The numbers of singlets and GHZs are determined by dimensions of certain subgroups of SS. For an arbitrary number of parties mm we find a formula for the maximal number of mm-partite GHZ states that can be extracted from Ψ>|\Psi> by local unitaries. A connection with earlier introduced measures of multipartite correlations is made. An example of an undecomposable four-party stabilizer state with more than one qubit per party is given. These results are derived from a general theoretical framework that allows one to study interconversion of multipartite stabilizer states by local Clifford group operators. As a simple application, we study three-party entanglement in two-dimensional lattice models that can be exactly solved by the stabilizer formalism.Comment: 12 pages, 1 figur

    Probabilistic instantaneous quantum computation

    Full text link
    The principle of teleportation can be used to perform a quantum computation even before its quantum input is defined. The basic idea is to perform the quantum computation at some earlier time with qubits which are part of an entangled state. At a later time a generalized Bell state measurement is performed jointly on the then defined actual input qubits and the rest of the entangled state. This projects the output state onto the correct one with a certain exponentially small probability. The sufficient conditions are found under which the scheme is of benefit.Comment: 4 pages, 1 figur

    The Impossibility Of Secure Two-Party Classical Computation

    Full text link
    We present attacks that show that unconditionally secure two-party classical computation is impossible for many classes of function. Our analysis applies to both quantum and relativistic protocols. We illustrate our results by showing the impossibility of oblivious transfer.Comment: 10 page

    Comment on "The black hole final state"

    Get PDF
    Horowitz and Maldacena have suggested that the unitarity of the black hole S-matrix can be reconciled with Hawking's semiclassical arguments if a final-state boundary condition is imposed at the spacelike singularity inside the black hole. We point out that, in this scenario, departures from unitarity can arise due to interactions between the collapsing body and the infalling Hawking radiation inside the event horizon. The amount of information lost when a black hole evaporates depends on the extent to which these interactions are entangling.Comment: 4 pages, REVTe

    New Probable Dwarf Galaxies in Northern Groups of the Local Supercluster

    Full text link
    We have searched for nearby dwarf galaxies in 27 northern groups with characteristic distances 8-15 Mpc based on the Second Palomar Sky Survey prints. In a total area of about 2000 square degrees, we have found 90 low-surface-brightness objects, more than 60% of which are absent from known catalogs and lists. We have classified most of these objects (~80%) as irregular dwarf systems. The first 21-cm line observations of the new objects with the 100-m Effelsberg radio telescope showed that the typical linear diameters (1-2 kpc), internal motions (30 km/s), and hydrogen masses (~2*10^7M_sun) galaxies correspond to those expected for the dwarf population of nearby groups.Comment: 8 pages, 1 fugur
    corecore