734 research outputs found

    Topological Subsystem Codes

    Full text link
    We introduce a family of 2D topological subsystem quantum error-correcting codes. The gauge group is generated by 2-local Pauli operators, so that 2-local measurements are enough to recover the error syndrome. We study the computational power of code deformation in these codes, and show that boundaries cannot be introduced in the usual way. In addition, we give a general mapping connecting suitable classical statistical mechanical models to optimal error correction in subsystem stabilizer codes that suffer from depolarizing noise.Comment: 16 pages, 11 figures, explanations added, typos correcte

    Non-abelian vortices and non-abelian statistics

    Get PDF
    We study the interactions of non-abelian vortices in two spatial dimensions. These interactions have novel features, because the Aharonov-Bohm effect enables a pair of vortices to exchange quantum numbers. The cross section for vortex-vortex scattering is typically a multi-valued function of the scattering angle. There can be an exchange contribution to the vortex-vortex scattering amplitude that adds coherently with the direct amplitude, even if the two vortices have distinct quantum numbers. Thus two vortices can be ``indistinguishable'' even though they are not the same

    Black holes as mirrors: quantum information in random subsystems

    Get PDF
    We study information retrieval from evaporating black holes, assuming that the internal dynamics of a black hole is unitary and rapidly mixing, and assuming that the retriever has unlimited control over the emitted Hawking radiation. If the evaporation of the black hole has already proceeded past the "half-way" point, where half of the initial entropy has been radiated away, then additional quantum information deposited in the black hole is revealed in the Hawking radiation very rapidly. Information deposited prior to the half-way point remains concealed until the half-way point, and then emerges quickly. These conclusions hold because typical local quantum circuits are efficient encoders for quantum error-correcting codes that nearly achieve the capacity of the quantum erasure channel. Our estimate of a black hole's information retention time, based on speculative dynamical assumptions, is just barely compatible with the black hole complementarity hypothesis.Comment: 18 pages, 2 figures. (v2): discussion of decoding complexity clarifie

    Inverting quantum decoherence by classical feedback from the environment

    Full text link
    We show that for qubits and qutrits it is always possible to perfectly recover quantum coherence by performing a measurement only on the environment, whereas for dimension d>3 there are situations where recovery is impossible, even with complete access to the environment. For qubits, the minimal amount of classical information to be extracted from the environment equals the entropy exchange.Comment: Phys. Rev. Lett. 95, 090501 (2005). Published versio

    Multiparticle Entanglement in the Lipkin-Meshkov-Glick Model

    Full text link
    The multiparticle entanglement in the Lipkin-Meshkov-Glick model has been discussed extensively in this paper. Measured by the global entanglement and its generalization, our calculation shows that the multiparticle entanglement can faithfully detect quantum phase transitions. For an antiferromagnetic case the multiparticle entanglement reaches the maximum at the transition point, whereas for ferromagnetic coupling, two different behaviors of multiparticle entanglement can be identified, dependent on the anisotropic parameter in the coupling.Comment: 7 pages and 5 figure

    Secure quantum key distribution with an uncharacterized source

    Get PDF
    We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitrary source whose averaged states are basis-independent, a condition that is automatically satisfied if the source is suitably designed. The proof is based on the observation that, to an adversary, the key extraction process is equivalent to a measurement in the sigma_x-basis performed on a pure sigma_z-basis eigenstate. The dependence of the achievable key length on the bit error rate is the same as that established by Shor and Preskill for a perfect source, indicating that the defects in the source are efficiently detected by the protocol.Comment: 4 pages, 1 figure, REVTeX, minor revision

    Simple Proof of Security of the BB84 Quantum Key Distribution Protocol

    Get PDF
    We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement-purification based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.Comment: 5 pages, Latex, minor changes to improve clarity and fix typo

    Approximate quantum error correction, random codes, and quantum channel capacity

    Get PDF
    We work out a theory of approximate quantum error correction that allows us to derive a general lower bound for the entanglement fidelity of a quantum code. The lower bound is given in terms of Kraus operators of the quantum noise. This result is then used to analyze the average error correcting performance of codes that are randomly drawn from unitarily invariant code ensembles. Our results confirm that random codes of sufficiently large block size are highly suitable for quantum error correction. Moreover, employing a lemma of Bennett, Shor, Smolin, and Thapliyal, we prove that random coding attains information rates of the regularized coherent information.Comment: 29 pages, final version to appear in Phys. Rev. A, improved lower bound for code entanglement fidelity, simplified proo

    Coulomb Blockade Doppelgangers in Quantum Hall States

    Get PDF
    In this paper, we ask the question: How well can Coulomb blockade experiments correctly identify and distinguish between different topological orders in quantum Hall states? We definitively find the answer to be: Quite poorly. In particular, we write the general expression for the spacing of resonance peaks in a simple form that explicitly displays its dependence on the conformal scaling dimensions of the systems' edge modes. This form makes transparent the general argument that the Coulomb blockade peak spacings do not provide a strongly indicative signature of the topological order of the system, since it is only weakly related to the braiding statistics. We bolster this general argument with examples for all the most physically relevant non-Abelian candidate states, demonstrating that they have Coulomb blockade doppelgangers -- candidate states at the same filling fraction with identical Coulomb blockade signatures, but dramatically different topological orders and braiding statistics.Comment: 12 pages, 1 figure; portions of this paper were formerly included in Appendix C of arXiv:0903.3108; v2: examples added, minor corrections made; v3: discussions of non-uniform filling and of hierarchical counterparts of multi-component states added, minor corrections mad
    • …
    corecore