49 research outputs found

    Quantum Key Distribution between N partners: optimal eavesdropping and Bell's inequalities

    Get PDF
    Quantum secret-sharing protocols involving N partners (NQSS) are key distribution protocols in which Alice encodes her key into N−1N-1 qubits, in such a way that all the other partners must cooperate in order to retrieve the key. On these protocols, several eavesdropping scenarios are possible: some partners may want to reconstruct the key without the help of the other ones, and consequently collaborate with an Eve that eavesdrops on the other partners' channels. For each of these scenarios, we give the optimal individual attack that the Eve can perform. In case of such an optimal attack, the authorized partners have a higher information on the key than the unauthorized ones if and only if they can violate a Bell's inequality.Comment: 14 pages, 1 figur

    Functional Bell inequalities can serve as a stronger entanglement witness

    Get PDF
    We consider a Bell inequality for a continuous range of settings of the apparatus at each site. This "functional" Bell inequality gives a better range of violation for generalized GHZ states. Also a family of N-qubit bound entangled states violate this inequality for N>5.Comment: 4 pages, REVTeX

    Locality and Causality in Hidden Variables Models of Quantum Theory

    Get PDF
    Motivated by Popescu's example of hidden nonlocality, we elaborate on the conjecture that quantum states that are intuitively nonlocal, i.e., entangled, do not admit a local causal hidden variables model. We exhibit quantum states which either (i) are nontrivial counterexamples to this conjecture or (ii) possess a new kind of more deeply hidden irreducible nonlocality. Moreover, we propose a nonlocality complexity classification scheme suggested by the latter possibility. Furthermore, we show that Werner's (and similar) hidden variables models can be extended to an important class of generalized observables. Finally a result of Fine on the equivalence of stochastic and deterministic hidden variables is generalized to causal models.Comment: revised version, 21 pages, submitted to Physical Review

    Relations between entanglement, Bell-inequality violation and teleportation fidelity for the two-qubit X states

    Full text link
    Based on the assumption that the receiver Bob can apply any unitary transformation, Horodecki {\it et al.} [Phys. Lett. A {\bf 222}, 21 (1996)] proved that any mixed two spin-1/2 state which violates the Bell-CHSH inequality is useful for teleportation. Here, we further show that any X state which violates the Bell-CHSH inequality can also be used for nonclassical teleportation even if Bob can only perform the identity or the Pauli rotation operations. Moreover, we showed that the maximal difference between the two average fidelities achievable via Bob's arbitrary transformations and via the sole identity or the Pauli rotation is 1/9.Comment: 5 pages, to be published in "Quantum Information Processing

    Cloning a real d-dimensional quantum state on the edge of the no-signaling condition

    Get PDF
    We investigate a new class of quantum cloning machines that equally duplicate all real states in a Hilbert space of arbitrary dimension. By using the no-signaling condition, namely that cloning cannot make superluminal communication possible, we derive an upper bound on the fidelity of this class of quantum cloning machines. Then, for each dimension d, we construct an optimal symmetric cloner whose fidelity saturates this bound. Similar calculations can also be performed in order to recover the fidelity of the optimal universal cloner in d dimensions.Comment: 6 pages RevTex, 1 encapuslated Postscript figur

    Quantum cloning machines for equatorial qubits

    Full text link
    Quantum cloning machines for equatorial qubits are studied. For the case of 1 to 2 phase-covariant quantum cloning machine, we present the networks consisting of quantum gates to realize the quantum cloning transformations. The copied equatorial qubits are shown to be separable by using Peres-Horodecki criterion. The optimal 1 to M phase-covariant quantum cloning transformations are given.Comment: Revtex, 9 page

    General impossible operations in quantum information

    Full text link
    We prove a general limitation in quantum information that unifies the impossibility principles such as no-cloning and no-anticloning. Further, we show that for an unknown qubit one cannot design a universal Hadamard gate for creating equal superposition of the original and its complement state. Surprisingly, we find that Hadamard transformations exist for an unknown qubit chosen either from the polar or equatorial great circles. Also, we show that for an unknown qubit one cannot design a universal unitary gate for creating unequal superpositions of the original and its complement state. We discuss why it is impossible to design a controlled-NOT gate for two unknown qubits and discuss the implications of these limitations.Comment: 15 pages, no figures, Discussion about personal quantum computer remove

    Optimal phase covariant cloning for qubits and qutrits

    Full text link
    We consider cloning transformations of equatorial qubits and qutrits, with the transformation covariant for rotation of the phases. The optimal cloning maps are derived without simplifying assumptions from first principles, for any number of input and output qubits, and for a single input qutrit and any number of output qutrits. We also compare the cloning maps for global and single particle fidelities, and we show that the two criteria lead to different optimal maps.Comment: 8 page

    On quantum estimation, quantum cloning and finite quantum de Finetti theorems

    Full text link
    This paper presents a series of results on the interplay between quantum estimation, cloning and finite de Finetti theorems. First, we consider the measure-and-prepare channel that uses optimal estimation to convert M copies into k approximate copies of an unknown pure state and we show that this channel is equal to a random loss of all but s particles followed by cloning from s to k copies. When the number k of output copies is large with respect to the number M of input copies the measure-and-prepare channel converges in diamond norm to the optimal universal cloning. In the opposite case, when M is large compared to k, the estimation becomes almost perfect and the measure-and-prepare channel converges in diamond norm to the partial trace over all but k systems. This result is then used to derive de Finetti-type results for quantum states and for symmetric broadcast channels, that is, channels that distribute quantum information to many receivers in a permutationally invariant fashion. Applications of the finite de Finetti theorem for symmetric broadcast channels include the derivation of diamond-norm bounds on the asymptotic convergence of quantum cloning to state estimation and the derivation of bounds on the amount of quantum information that can be jointly decoded by a group of k receivers at the output of a symmetric broadcast channel.Comment: 19 pages, no figures, a new result added, published version to appear in Proceedings of TQC 201

    Cloning of spin-coherent states

    Full text link
    We consider optimal cloning of the spin coherent states in Hilbert spaces of different dimensionality d. We give explicit form of optimal cloning transformation for spin coherent states in the three-dimensional space, analytical results for the fidelity of the optimal cloning in d=3 and d=4 as well as numerical results for higher dimensions. In the low-dimensional case we construct the corresponding completely positive maps and exhibit their structure with the help of Jamiolkowski isomorphism. This allows us to formulate some conjectures about the form of optimal coherent cloning CP maps in arbitrary dimension.Comment: LateX, 9 pages, 1 figur
    corecore