2,520 research outputs found
Cloning the entanglement of a pair of quantum bits
It is shown that any quantum operation that perfectly clones the entanglement
of all maximally-entangled qubit pairs cannot preserve separability. This
``entanglement no-cloning'' principle naturally suggests that some approximate
cloning of entanglement is nevertheless allowed by quantum mechanics. We
investigate a separability-preserving optimal cloning machine that duplicates
all maximally-entangled states of two qubits, resulting in 0.285 bits of
entanglement per clone, while a local cloning machine only yields 0.060 bits of
entanglement per clone.Comment: 4 pages Revtex, 2 encapsulated Postscript figures, one added autho
Economical quantum cloning in any dimension
The possibility of cloning a d-dimensional quantum system without an ancilla
is explored, extending on the economical phase-covariant cloning machine found
in [Phys. Rev. A {\bf 60}, 2764 (1999)] for qubits. We prove the impossibility
of constructing an economical version of the optimal universal cloning machine
in any dimension. We also show, using an ansatz on the generic form of cloning
machines, that the d-dimensional phase-covariant cloner, which optimally clones
all uniform superpositions, can be realized economically only in dimension d=2.
The used ansatz is supported by numerical evidence up to d=7. An economical
phase-covariant cloner can nevertheless be constructed for d>2, albeit with a
lower fidelity than that of the optimal cloner requiring an ancilla. Finally,
using again an ansatz on cloning machines, we show that an economical version
of the Fourier-covariant cloner, which optimally clones the computational basis
and its Fourier transform, is also possible only in dimension d=2.Comment: 8 pages RevTe
Experimental quantum key distribution over highly noisy channels
Error filtration is a method for encoding the quantum state of a single
particle into a higher dimensional Hilbert space in such a way that it becomes
less sensitive to phase noise. We experimentally demonstrate this method by
distributing a secret key over an optical fiber whose noise level otherwise
precludes secure quantum key distribution. By filtering out the phase noise, a
bit error rate of 15.3% +/- 0.1%, which is beyond the security limit, can be
reduced to 10.6% +/- 0.1%, thereby guaranteeing the cryptographic security.Comment: 4 pages, 2 figure
Provably Secure Experimental Quantum Bit-String Generation
Coin tossing is a cryptographic task in which two parties who do not trust
each other aim to generate a common random bit. Using classical communication
this is impossible, but non trivial coin tossing is possible using quantum
communication. Here we consider the case when the parties do not want to toss a
single coin, but many. This is called bit string generation. We report the
experimental generation of strings of coins which are provably more random than
achievable using classical communication. The experiment is based on the ``plug
and play'' scheme developed for quantum cryptography, and therefore well suited
for long distance quantum communication.Comment: 4 pages, 3 figures. Submitted to Phys. Rev. Lett. A complete security
analysis for the experiment is given in quant-ph/040812
Experimental asymmetric phase-covariant quantum cloning of polarization qubits
We report on two optical realizations of the asymmetric
phase-covariant cloning machines for polarization states of single photons. The
experimental setups combine two-photon interference and tunable polarization
filtering that enables us to control the asymmetry of the cloners. The first
scheme involves a special unbalanced bulk beam splitter exhibiting different
splitting ratios for vertical and horizontal polarizations, respectively. The
second implemented scheme consists of a balanced fiber coupler where photon
bunching occurs, followed by a free-space part with polarization filters. With
this later approach we were able to demonstrate very high cloning fidelities
which are above the universal cloning limit.Comment: 7 pages, 8 figure
Extinction Arouses Attention to the Context in a Behavioral Suppression Method With Humans
One experiment assessed predictions from the attentional theory of context processing (ATCP, J. M. Rosas, J. E. Callejas-Aguilera, M. M. Ramos-Álvarez, & M. J. F. Abad, 2006, Revision of retrieval theory of forgetting: What does make information context-specific? International Journal of Psychology & Psychological Therapy, Vol. 6, pp. 147–166) that extinction arouses attention to contextual stimuli. In a video-game method, participants learned a biconditional discrimination (RG+/BG−/RY−/BY+) either after extinction of another stimulus had occurred, or not. When contextual stimuli were relevant to solving the discrimination (i.e., all RG+/BG− trials occurred in one context and all RY−/BY+ in another), prior extinction of another stimulus facilitated the discrimination, as if extinction enhanced attention to the contexts. Results are discussed briefly in terms of ATCP and the model of N. A. Schmajuk, Y. W. Lam, & J. A. Gray (1996, Latent inhibition: A neural network approach, Journal of Experimental Psychology: Animal Behavior Processes, Vol. 22, pp. 321–349). (APA PsycInfo Database Record (c) 2016 APA, all rights reserved)The research presented here was made possible by Grant No. PSI2011- 24231 from the Spanish Ministry of Science and Innovation and Grant No. IT-276-07 from the Basque Ministry of Science. Participation of Jeffrey A. Lamoureux in the project was supported by funds from the Psychology Department of Boston College. Participation of Samuel P. León was made possible by Grant No. BES-2008-003634 from the Spanish Ministry of Science and Innovation
Reduced randomness in quantum cryptography with sequences of qubits encoded in the same basis
We consider the cloning of sequences of qubits prepared in the states used in
the BB84 or 6-state quantum cryptography protocol, and show that the
single-qubit fidelity is unaffected even if entire sequences of qubits are
prepared in the same basis. This result is of great importance for practical
quantum cryptosystems because it reduces the need for high-speed random number
generation without impairing on the security against finite-size attacks.Comment: 8 pages, submitted to PR
Layer-Resolved Ultrafast XUV Measurement of Hole Transport in a Ni-TiO2-Si Photoanode
Metal-oxide-semiconductor junctions are central to most electronic and
optoelectronic devices. Here, the element-specificity of broadband extreme
ultraviolet (XUV) ultrafast pulses is used to measure the charge transport and
recombination kinetics in each layer of a Ni-TiO2-Si junction. After
photoexcitation of silicon, holes are inferred to transport from Si to Ni
ballistically in ~100 fs, resulting in spectral shifts in the Ni M2,3 XUV edge
that are characteristic of holes and the absence of holes initially in TiO2.
Meanwhile, the electrons are observed to remain on Si. After picoseconds, the
transient hole population on Ni is observed to back-diffuse through the TiO2,
shifting the Ti spectrum to higher oxidation state, followed by electron-hole
recombination at the Si-TiO2 interface and in the Si bulk. Electrical
properties, such as the hole diffusion constant in TiO2 and the initial hole
mobility in Si, are fit from these transient spectra and match well with values
reported previously
Extremal quantum cloning machines
We investigate the problem of cloning a set of states that is invariant under
the action of an irreducible group representation. We then characterize the
cloners that are "extremal" in the convex set of group covariant cloning
machines, among which one can restrict the search for optimal cloners. For a
set of states that is invariant under the discrete Weyl-Heisenberg group, we
show that all extremal cloners can be unitarily realized using the so-called
"double-Bell states", whence providing a general proof of the popular ansatz
used in the literature for finding optimal cloners in a variety of settings.
Our result can also be generalized to continuous-variable optimal cloning in
infinite dimensions, where the covariance group is the customary
Weyl-Heisenberg group of displacements.Comment: revised version accepted for publicatio
- …