410 research outputs found
The fundamental limit on the rate of quantum dynamics: the unified bound is tight
The question of how fast a quantum state can evolve has attracted a
considerable attention in connection with quantum measurement, metrology, and
information processing. Since only orthogonal states can be unambiguously
distinguished, a transition from a state to an orthogonal one can be taken as
the elementary step of a computational process. Therefore, such a transition
can be interpreted as the operation of "flipping a qubit", and the number of
orthogonal states visited by the system per unit time can be viewed as the
maximum rate of operation.
A lower bound on the orthogonalization time, based on the energy spread
DeltaE, was found by Mandelstam and Tamm. Another bound, based on the average
energy E, was established by Margolus and Levitin. The bounds coincide, and can
be exactly attained by certain initial states if DeltaE=E; however, the problem
remained open of what the situation is otherwise.
Here we consider the unified bound that takes into account both DeltaE and E.
We prove that there exist no initial states that saturate the bound if DeltaE
is not equal to E. However, the bound remains tight: for any given values of
DeltaE and E, there exists a one-parameter family of initial states that can
approach the bound arbitrarily close when the parameter approaches its limit
value. The relation between the largest energy level, the average energy, and
the orthogonalization time is also discussed. These results establish the
fundamental quantum limit on the rate of operation of any
information-processing system.Comment: 4 pages 1 PS figure Late
Thermodynamic cost of reversible computing
Since reversible computing requires preservation of all information
throughout the entire computational process, this implies that all errors that
appear as a result of the interaction of the information-carrying system with
uncontrolled degrees of freedom must be corrected. But this can only be done at
the expense of an increase in the entropy of the environment corresponding to
the dissipation, in the form of heat, of the ``noisy'' part of the system's
energy.
This paper gives an expression of that energy in terms of the effective noise
temperature, and analyzes the relationship between the energy dissipation rate
and the rate of computation. Finally, a generalized Clausius principle based on
the concept of effective temperature is presented.Comment: 5 pages; added two paragraphs and fixed a number of typo
Distributed super dense coding over noisy channels
We study multipartite super dense coding in the presence of a covariant noisy
channel. We investigate the case of many senders and one receiver, considering
both unitary and non-unitary encoding. We study the scenarios where the senders
apply local encoding or global encoding. We show that, up to some
pre-processing on the original state, the senders cannot do better encoding
than local, unitary encoding. We then introduce general Pauli channels as a
significant example of covariant maps. Considering Pauli channels, we provide
examples for which the super dense coding capacity is explicitly determined
Distillation protocols: Output entanglement and local mutual information
A complementary behavior between local mutual information and average output
entanglement is derived for arbitrary bipartite ensembles. This leads to bounds
on the yield of entanglement in distillation protocols that involve
disinguishing. This bound is saturated in the hashing protocol for
distillation, for Bell-diagonal states.Comment: 4 pages, RevTeX, no figures; v2: presentation improved, results
unchanged; v3: published versio
On 1-qubit channels
The entropy H_T(rho) of a state rho with respect to a channel T and the
Holevo capacity of the channel require the solution of difficult variational
problems. For a class of 1-qubit channels, which contains all the extremal
ones, the problem can be significantly simplified by associating an Hermitian
antilinear operator theta to every channel of the considered class. The
concurrence of the channel can be expressed by theta and turns out to be a flat
roof. This allows to write down an explicit expression for H_T. Its maximum
would give the Holevo (1-shot) capacity.Comment: 12 pages, several printing or latex errors correcte
Nonorthogonal Quantum States Maximize Classical Information Capacity
I demonstrate that, rather unexpectedly, there exist noisy quantum channels
for which the optimal classical information transmission rate is achieved only
by signaling alphabets consisting of nonorthogonal quantum states.Comment: 5 pages, REVTeX, mild extension of results, much improved
presentation, to appear in Physical Review Letter
Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors
Quantum Key Distribution with the BB84 protocol has been shown to be
unconditionally secure even using weak coherent pulses instead of single-photon
signals. The distances that can be covered by these methods are limited due to
the loss in the quantum channel (e.g. loss in the optical fiber) and in the
single-photon counters of the receivers. One can argue that the loss in the
detectors cannot be changed by an eavesdropper in order to increase the covered
distance. Here we show that the security analysis of this scenario is not as
easy as is commonly assumed, since already two-photon processes allow
eavesdropping strategies that outperform the known photon-number splitting
attack. For this reason there is, so far, no satisfactory security analysis
available in the framework of individual attacks.Comment: 11 pages, 6 figures; Abstract and introduction extended, Appendix
added, references update
Experimental Demonstration of Post-Selection based Continuous Variable Quantum Key Distribution in the Presence of Gaussian Noise
In realistic continuous variable quantum key distribution protocols, an
eavesdropper may exploit the additional Gaussian noise generated during
transmission to mask her presence. We present a theoretical framework for a
post-selection based protocol which explicitly takes into account excess
Gaussian noise. We derive a quantitative expression of the secret key rates
based on the Levitin and Holevo bounds. We experimentally demonstrate that the
post-selection based scheme is still secure against both individual and
collective Gaussian attacks in the presence of this excess noise.Comment: 4 pages, 4 figure
- …