2,520 research outputs found

    Cloning the entanglement of a pair of quantum bits

    Full text link
    It is shown that any quantum operation that perfectly clones the entanglement of all maximally-entangled qubit pairs cannot preserve separability. This ``entanglement no-cloning'' principle naturally suggests that some approximate cloning of entanglement is nevertheless allowed by quantum mechanics. We investigate a separability-preserving optimal cloning machine that duplicates all maximally-entangled states of two qubits, resulting in 0.285 bits of entanglement per clone, while a local cloning machine only yields 0.060 bits of entanglement per clone.Comment: 4 pages Revtex, 2 encapsulated Postscript figures, one added autho

    Economical quantum cloning in any dimension

    Full text link
    The possibility of cloning a d-dimensional quantum system without an ancilla is explored, extending on the economical phase-covariant cloning machine found in [Phys. Rev. A {\bf 60}, 2764 (1999)] for qubits. We prove the impossibility of constructing an economical version of the optimal universal cloning machine in any dimension. We also show, using an ansatz on the generic form of cloning machines, that the d-dimensional phase-covariant cloner, which optimally clones all uniform superpositions, can be realized economically only in dimension d=2. The used ansatz is supported by numerical evidence up to d=7. An economical phase-covariant cloner can nevertheless be constructed for d>2, albeit with a lower fidelity than that of the optimal cloner requiring an ancilla. Finally, using again an ansatz on cloning machines, we show that an economical version of the Fourier-covariant cloner, which optimally clones the computational basis and its Fourier transform, is also possible only in dimension d=2.Comment: 8 pages RevTe

    Experimental quantum key distribution over highly noisy channels

    Full text link
    Error filtration is a method for encoding the quantum state of a single particle into a higher dimensional Hilbert space in such a way that it becomes less sensitive to phase noise. We experimentally demonstrate this method by distributing a secret key over an optical fiber whose noise level otherwise precludes secure quantum key distribution. By filtering out the phase noise, a bit error rate of 15.3% +/- 0.1%, which is beyond the security limit, can be reduced to 10.6% +/- 0.1%, thereby guaranteeing the cryptographic security.Comment: 4 pages, 2 figure

    Provably Secure Experimental Quantum Bit-String Generation

    Full text link
    Coin tossing is a cryptographic task in which two parties who do not trust each other aim to generate a common random bit. Using classical communication this is impossible, but non trivial coin tossing is possible using quantum communication. Here we consider the case when the parties do not want to toss a single coin, but many. This is called bit string generation. We report the experimental generation of strings of coins which are provably more random than achievable using classical communication. The experiment is based on the ``plug and play'' scheme developed for quantum cryptography, and therefore well suited for long distance quantum communication.Comment: 4 pages, 3 figures. Submitted to Phys. Rev. Lett. A complete security analysis for the experiment is given in quant-ph/040812

    Experimental asymmetric phase-covariant quantum cloning of polarization qubits

    Full text link
    We report on two optical realizations of the 121 \to 2 asymmetric phase-covariant cloning machines for polarization states of single photons. The experimental setups combine two-photon interference and tunable polarization filtering that enables us to control the asymmetry of the cloners. The first scheme involves a special unbalanced bulk beam splitter exhibiting different splitting ratios for vertical and horizontal polarizations, respectively. The second implemented scheme consists of a balanced fiber coupler where photon bunching occurs, followed by a free-space part with polarization filters. With this later approach we were able to demonstrate very high cloning fidelities which are above the universal cloning limit.Comment: 7 pages, 8 figure

    Extinction Arouses Attention to the Context in a Behavioral Suppression Method With Humans

    Get PDF
    One experiment assessed predictions from the attentional theory of context processing (ATCP, J. M. Rosas, J. E. Callejas-Aguilera, M. M. Ramos-Álvarez, & M. J. F. Abad, 2006, Revision of retrieval theory of forgetting: What does make information context-specific? International Journal of Psychology & Psychological Therapy, Vol. 6, pp. 147–166) that extinction arouses attention to contextual stimuli. In a video-game method, participants learned a biconditional discrimination (RG+/BG−/RY−/BY+) either after extinction of another stimulus had occurred, or not. When contextual stimuli were relevant to solving the discrimination (i.e., all RG+/BG− trials occurred in one context and all RY−/BY+ in another), prior extinction of another stimulus facilitated the discrimination, as if extinction enhanced attention to the contexts. Results are discussed briefly in terms of ATCP and the model of N. A. Schmajuk, Y. W. Lam, & J. A. Gray (1996, Latent inhibition: A neural network approach, Journal of Experimental Psychology: Animal Behavior Processes, Vol. 22, pp. 321–349). (APA PsycInfo Database Record (c) 2016 APA, all rights reserved)The research presented here was made possible by Grant No. PSI2011- 24231 from the Spanish Ministry of Science and Innovation and Grant No. IT-276-07 from the Basque Ministry of Science. Participation of Jeffrey A. Lamoureux in the project was supported by funds from the Psychology Department of Boston College. Participation of Samuel P. León was made possible by Grant No. BES-2008-003634 from the Spanish Ministry of Science and Innovation

    Reduced randomness in quantum cryptography with sequences of qubits encoded in the same basis

    Full text link
    We consider the cloning of sequences of qubits prepared in the states used in the BB84 or 6-state quantum cryptography protocol, and show that the single-qubit fidelity is unaffected even if entire sequences of qubits are prepared in the same basis. This result is of great importance for practical quantum cryptosystems because it reduces the need for high-speed random number generation without impairing on the security against finite-size attacks.Comment: 8 pages, submitted to PR

    Layer-Resolved Ultrafast XUV Measurement of Hole Transport in a Ni-TiO2-Si Photoanode

    Get PDF
    Metal-oxide-semiconductor junctions are central to most electronic and optoelectronic devices. Here, the element-specificity of broadband extreme ultraviolet (XUV) ultrafast pulses is used to measure the charge transport and recombination kinetics in each layer of a Ni-TiO2-Si junction. After photoexcitation of silicon, holes are inferred to transport from Si to Ni ballistically in ~100 fs, resulting in spectral shifts in the Ni M2,3 XUV edge that are characteristic of holes and the absence of holes initially in TiO2. Meanwhile, the electrons are observed to remain on Si. After picoseconds, the transient hole population on Ni is observed to back-diffuse through the TiO2, shifting the Ti spectrum to higher oxidation state, followed by electron-hole recombination at the Si-TiO2 interface and in the Si bulk. Electrical properties, such as the hole diffusion constant in TiO2 and the initial hole mobility in Si, are fit from these transient spectra and match well with values reported previously

    Extremal quantum cloning machines

    Full text link
    We investigate the problem of cloning a set of states that is invariant under the action of an irreducible group representation. We then characterize the cloners that are "extremal" in the convex set of group covariant cloning machines, among which one can restrict the search for optimal cloners. For a set of states that is invariant under the discrete Weyl-Heisenberg group, we show that all extremal cloners can be unitarily realized using the so-called "double-Bell states", whence providing a general proof of the popular ansatz used in the literature for finding optimal cloners in a variety of settings. Our result can also be generalized to continuous-variable optimal cloning in infinite dimensions, where the covariance group is the customary Weyl-Heisenberg group of displacements.Comment: revised version accepted for publicatio
    corecore