239 research outputs found

    Study of the Distillability of Werner States Using Entanglement Witnesses and Robust Semidefinite Programs

    Get PDF
    We use Robust Semidefinite Programs and Entanglement Witnesses to study the distillability of Werner states. We perform exact numerical calculations which show 2-undistillability in a region of the state space which was previously conjectured to be undistillable. We also introduce bases which yield interesting expressions for the {\em distillability witnesses} and for a tensor product of Werner states with arbitrary number of copies.Comment: 16 pages, 2 figure

    Device-independent bounds for Hardy's experiment

    Full text link
    In this Letter we compute an analogue of Tsirelson's bound for Hardy's test of nonlocality, that is, the maximum violation of locality constraints allowed by the quantum formalism, irrespective of the dimension of the system. The value is found to be the same as the one achievable already with two-qubit systems, and we show that only a very specific class of states can lead to such maximal value, thus highlighting Hardy's test as a device-independent self-test protocol for such states. By considering realistic constraints in Hardy's test, we also compute device-independent upper bounds on this violation and show that these bounds are saturated by two-qubit systems, thus showing that there is no advantage in using higher-dimensional systems in experimental implementations of such test.Comment: 4 pages, 2 figure

    Entanglement verification for quantum key distribution systems with an underlying bipartite qubit-mode structure

    Full text link
    We consider entanglement detection for quantum key distribution systems that use two signal states and continuous variable measurements. This problem can be formulated as a separability problem in a qubit-mode system. To verify entanglement, we introduce an object that combines the covariance matrix of the mode with the density matrix of the qubit. We derive necessary separability criteria for this scenario. These criteria can be readily evaluated using semidefinite programming and we apply them to the specific quantum key distribution protocol.Comment: 6 pages, 2 figures, v2: final versio

    Bell inequalities for three systems and arbitrarily many measurement outcomes

    Full text link
    We present a family of Bell inequalities for three parties and arbitrarily many outcomes, which can be seen as a natural generalization of the Mermin Bell inequality. For a small number of outcomes, we verify that our inequalities define facets of the polytope of local correlations. We investigate the quantum violations of these inequalities, in particular with respect to the Hilbert space dimension. We provide strong evidence that the maximal quantum violation can only be reached using systems with local Hilbert space dimension exceeding the number of measurement outcomes. This suggests that our inequalities can be used as multipartite dimension witnesses.Comment: v1 6 pages, 4 tables; v2 Published version with minor typos correcte

    Chaotic Observer-based Synchronization Under Information Constraints

    Full text link
    Limit possibilities of observer-based synchronization systems under information constraints (limited information capacity of the coupling channel) are evaluated. We give theoretical analysis for multi-dimensional drive-response systems represented in the Lurie form (linear part plus nonlinearity depending only on measurable outputs). It is shown that the upper bound of the limit synchronization error (LSE) is proportional to the upper bound of the transmission error. As a consequence, the upper and lower bounds of LSE are proportional to the maximum rate of the coupling signal and inversely proportional to the information transmission rate (channel capacity). Optimality of the binary coding for coders with one-step memory is established. The results are applied to synchronization of two chaotic Chua systems coupled via a channel with limited capacity.Comment: 7 pages, 6 figures, 27 reference

    Optimal entanglement witnesses for continuous-variable systems

    Full text link
    This paper is concerned with all tests for continuous-variable entanglement that arise from linear combinations of second moments or variances of canonical coordinates, as they are commonly used in experiments to detect entanglement. All such tests for bi-partite and multi-partite entanglement correspond to hyperplanes in the set of second moments. It is shown that all optimal tests, those that are most robust against imperfections with respect to some figure of merit for a given state, can be constructed from solutions to semi-definite optimization problems. Moreover, we show that for each such test, referred to as entanglement witness based on second moments, there is a one-to-one correspondence between the witness and a stronger product criterion, which amounts to a non-linear witness, based on the same measurements. This generalizes the known product criteria. The presented tests are all applicable also to non-Gaussian states. To provide a service to the community, we present the documentation of two numerical routines, FULLYWIT and MULTIWIT, which have been made publicly available.Comment: 14 pages LaTeX, 1 figure, presentation improved, references update

    A reduced complexity numerical method for optimal gate synthesis

    Full text link
    Although quantum computers have the potential to efficiently solve certain problems considered difficult by known classical approaches, the design of a quantum circuit remains computationally difficult. It is known that the optimal gate design problem is equivalent to the solution of an associated optimal control problem, the solution to which is also computationally intensive. Hence, in this article, we introduce the application of a class of numerical methods (termed the max-plus curse of dimensionality free techniques) that determine the optimal control thereby synthesizing the desired unitary gate. The application of this technique to quantum systems has a growth in complexity that depends on the cardinality of the control set approximation rather than the much larger growth with respect to spatial dimensions in approaches based on gridding of the space, used in previous literature. This technique is demonstrated by obtaining an approximate solution for the gate synthesis on SU(4)SU(4)- a problem that is computationally intractable by grid based approaches.Comment: 8 pages, 4 figure

    Quantum benchmarking with realistic states of light

    Full text link
    The goal of quantum benchmarking is to certify that imperfect quantum communication devices (e.g., quantum channels, quantum memories, quantum key distribution systems) can still be used for meaningful quantum communication. However, the test states used in quantum benchmarking experiments may be imperfect as well. Many quantum benchmarks are only valid for states which match some ideal form, such as pure states or Gaussian states. We outline how to perform quantum benchmarking using arbitrary states of light. We demonstrate these results using real data taken from a continuous-variable quantum memory.Comment: 14 pages, 3 figures. Updated to more closely match the published versio

    Event-based security control for discrete-time stochastic systems

    Get PDF
    This study is concerned with the event-based security control problem for a class of discrete-time stochastic systems with multiplicative noises subject to both randomly occurring denial-of-service (DoS) attacks and randomly occurring deception attacks. An event-triggered mechanism is adopted with hope to reduce the communication burden, where the measurement signal is transmitted only when a certain triggering condition is violated. A novel attack model is proposed to reflect the randomly occurring behaviours of the DoS attacks as well as the deception attacks within a unified framework via two sets of Bernoulli distributed white sequences with known conditional probabilities. A new concept of mean-square security domain is put forward to quantify the security degree. The authors aim to design an output feedback controller such that the closed-loop system achieves the desired security. By using the stochastic analysis techniques, some sufficient conditions are established to guarantee the desired security requirement and the control gain is obtained by solving some linear matrix inequalities with nonlinear constraints. A simulation example is utilised to illustrate the usefulness of the proposed controller design scheme.This work was supported in part by Royal Society of the UK, the National Natural Science Foundation of China under Grants 61329301, 61573246 and 61374039, the Shanghai Rising-Star Programme of China under Grant 16QA1403000, the Program for Capability Construction of Shanghai Provincial Universities under Grant 15550502500 and the Alexander von Humboldt Foundation of Germany

    Exploring Modes of Innovation in Services

    Get PDF
    Abstract Manufacturing companies differentiating their offerings with new services need to combine both product and service innovation. We study how service development is influenced by (a) the choice of separation or integration of service development and (b) the modes of innovation. Our results show that service development often is more structured if services are developed separately. Furthermore, service innovations often follow a sequence of innovation modes different from those of product innovations. Since different innovation modes benefit from varying degree of structure in the development process, many companies find it hard to develop products and services within the same development project
    corecore