49 research outputs found
Quantum Key Distribution between N partners: optimal eavesdropping and Bell's inequalities
Quantum secret-sharing protocols involving N partners (NQSS) are key
distribution protocols in which Alice encodes her key into qubits, in
such a way that all the other partners must cooperate in order to retrieve the
key. On these protocols, several eavesdropping scenarios are possible: some
partners may want to reconstruct the key without the help of the other ones,
and consequently collaborate with an Eve that eavesdrops on the other partners'
channels. For each of these scenarios, we give the optimal individual attack
that the Eve can perform. In case of such an optimal attack, the authorized
partners have a higher information on the key than the unauthorized ones if and
only if they can violate a Bell's inequality.Comment: 14 pages, 1 figur
Functional Bell inequalities can serve as a stronger entanglement witness
We consider a Bell inequality for a continuous range of settings of the
apparatus at each site. This "functional" Bell inequality gives a better range
of violation for generalized GHZ states. Also a family of N-qubit bound
entangled states violate this inequality for N>5.Comment: 4 pages, REVTeX
Locality and Causality in Hidden Variables Models of Quantum Theory
Motivated by Popescu's example of hidden nonlocality, we elaborate on the
conjecture that quantum states that are intuitively nonlocal, i.e., entangled,
do not admit a local causal hidden variables model. We exhibit quantum states
which either (i) are nontrivial counterexamples to this conjecture or (ii)
possess a new kind of more deeply hidden irreducible nonlocality. Moreover, we
propose a nonlocality complexity classification scheme suggested by the latter
possibility. Furthermore, we show that Werner's (and similar) hidden variables
models can be extended to an important class of generalized observables.
Finally a result of Fine on the equivalence of stochastic and deterministic
hidden variables is generalized to causal models.Comment: revised version, 21 pages, submitted to Physical Review
Relations between entanglement, Bell-inequality violation and teleportation fidelity for the two-qubit X states
Based on the assumption that the receiver Bob can apply any unitary
transformation, Horodecki {\it et al.} [Phys. Lett. A {\bf 222}, 21 (1996)]
proved that any mixed two spin-1/2 state which violates the Bell-CHSH
inequality is useful for teleportation. Here, we further show that any X state
which violates the Bell-CHSH inequality can also be used for nonclassical
teleportation even if Bob can only perform the identity or the Pauli rotation
operations. Moreover, we showed that the maximal difference between the two
average fidelities achievable via Bob's arbitrary transformations and via the
sole identity or the Pauli rotation is 1/9.Comment: 5 pages, to be published in "Quantum Information Processing
Cloning a real d-dimensional quantum state on the edge of the no-signaling condition
We investigate a new class of quantum cloning machines that equally duplicate
all real states in a Hilbert space of arbitrary dimension. By using the
no-signaling condition, namely that cloning cannot make superluminal
communication possible, we derive an upper bound on the fidelity of this class
of quantum cloning machines. Then, for each dimension d, we construct an
optimal symmetric cloner whose fidelity saturates this bound. Similar
calculations can also be performed in order to recover the fidelity of the
optimal universal cloner in d dimensions.Comment: 6 pages RevTex, 1 encapuslated Postscript figur
Quantum cloning machines for equatorial qubits
Quantum cloning machines for equatorial qubits are studied. For the case of 1
to 2 phase-covariant quantum cloning machine, we present the networks
consisting of quantum gates to realize the quantum cloning transformations. The
copied equatorial qubits are shown to be separable by using Peres-Horodecki
criterion. The optimal 1 to M phase-covariant quantum cloning transformations
are given.Comment: Revtex, 9 page
General impossible operations in quantum information
We prove a general limitation in quantum information that unifies the
impossibility principles such as no-cloning and no-anticloning. Further, we
show that for an unknown qubit one cannot design a universal Hadamard gate for
creating equal superposition of the original and its complement state.
Surprisingly, we find that Hadamard transformations exist for an unknown qubit
chosen either from the polar or equatorial great circles. Also, we show that
for an unknown qubit one cannot design a universal unitary gate for creating
unequal superpositions of the original and its complement state. We discuss why
it is impossible to design a controlled-NOT gate for two unknown qubits and
discuss the implications of these limitations.Comment: 15 pages, no figures, Discussion about personal quantum computer
remove
Optimal phase covariant cloning for qubits and qutrits
We consider cloning transformations of equatorial qubits and qutrits, with
the transformation covariant for rotation of the phases. The optimal cloning
maps are derived without simplifying assumptions from first principles, for any
number of input and output qubits, and for a single input qutrit and any number
of output qutrits. We also compare the cloning maps for global and single
particle fidelities, and we show that the two criteria lead to different
optimal maps.Comment: 8 page
On quantum estimation, quantum cloning and finite quantum de Finetti theorems
This paper presents a series of results on the interplay between quantum
estimation, cloning and finite de Finetti theorems. First, we consider the
measure-and-prepare channel that uses optimal estimation to convert M copies
into k approximate copies of an unknown pure state and we show that this
channel is equal to a random loss of all but s particles followed by cloning
from s to k copies. When the number k of output copies is large with respect to
the number M of input copies the measure-and-prepare channel converges in
diamond norm to the optimal universal cloning. In the opposite case, when M is
large compared to k, the estimation becomes almost perfect and the
measure-and-prepare channel converges in diamond norm to the partial trace over
all but k systems. This result is then used to derive de Finetti-type results
for quantum states and for symmetric broadcast channels, that is, channels that
distribute quantum information to many receivers in a permutationally invariant
fashion. Applications of the finite de Finetti theorem for symmetric broadcast
channels include the derivation of diamond-norm bounds on the asymptotic
convergence of quantum cloning to state estimation and the derivation of bounds
on the amount of quantum information that can be jointly decoded by a group of
k receivers at the output of a symmetric broadcast channel.Comment: 19 pages, no figures, a new result added, published version to appear
in Proceedings of TQC 201
Cloning of spin-coherent states
We consider optimal cloning of the spin coherent states in Hilbert spaces of
different dimensionality d. We give explicit form of optimal cloning
transformation for spin coherent states in the three-dimensional space,
analytical results for the fidelity of the optimal cloning in d=3 and d=4 as
well as numerical results for higher dimensions. In the low-dimensional case we
construct the corresponding completely positive maps and exhibit their
structure with the help of Jamiolkowski isomorphism. This allows us to
formulate some conjectures about the form of optimal coherent cloning CP maps
in arbitrary dimension.Comment: LateX, 9 pages, 1 figur