4,420 research outputs found

    Classical communication and non-classical fidelity of quantum teleportation

    Full text link
    In quantum teleportation, the role of entanglement has been much discussed. It is known that entanglement is necessary for achieving non-classical teleportation fidelity. Here we focus on the amount of classical communication that is necessary to obtain non-classical fidelity in teleportation. We quantify the amount of classical communication that is sufficient for achieving non-classical fidelity for two independent 1-bit and single 2-bits noisy classical channels. It is shown that on average 0.208 bits of classical communication is sufficient to get non-classical fidelity. We also find the necessary amount of classical communication in case of isotropic transformation. Finally we study how the amount of sufficient classical communication increases with weakening of entanglement used in the teleportation process.Comment: Accepted in Quantum Info. Proces

    Quantum Candies and Quantum Cryptography

    Full text link
    The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and much expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some basic concepts in quantum information, including quantum bits, complementarity, the no-cloning principle, and entanglement. Following Jacob's quantum candies description of the well known quantum key distribution protocol BB84, we explicitly demonstrate various additional quantum cryptography protocols using quantum candies in an approachable manner. The model we investigate can be a valuable tool for science and engineering educators who would like to help the general public to gain more insights about quantum science and technology: most parts of this paper, including many protocols for quantum cryptography, are expected to be easily understandable by a layperson without any previous knowledge of mathematics, physics, or cryptography.Comment: To be presented at the 9th International Conference on the Theory and Practice of Natural Computing (TPNC 2020; postponed and merged with TPNC 2021). The final authenticated publication is available online at https://doi.org/10.1007/978-3-030-63000-3_

    Tight Finite-Key Analysis for Quantum Cryptography

    Get PDF
    Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final key is highly dependent on the number, M, of signals exchanged between the legitimate parties. While, in any practical implementation, M is limited by the available resources, existing security proofs are often only valid asymptotically for unrealistically large values of M. Here, we demonstrate that this gap between theory and practice can be overcome using a recently developed proof technique based on the uncertainty relation for smooth entropies. Specifically, we consider a family of Bennett-Brassard 1984 quantum key distribution protocols and show that security against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure

    Symmetry implies independence

    Get PDF
    Given a quantum system consisting of many parts, we show that symmetry of the system's state, i.e., invariance under swappings of the subsystems, implies that almost all of its parts are virtually identical and independent of each other. This result generalises de Finetti's classical representation theorem for infinitely exchangeable sequences of random variables as well as its quantum-mechanical analogue. It has applications in various areas of physics as well as information theory and cryptography. For example, in experimental physics, one typically collects data by running a certain experiment many times, assuming that the individual runs are mutually independent. Our result can be used to justify this assumption.Comment: LaTeX, contains 4 figure

    Flipping quantum coins

    Get PDF
    Coin flipping is a cryptographic primitive in which two distrustful parties wish to generate a random bit in order to choose between two alternatives. This task is impossible to realize when it relies solely on the asynchronous exchange of classical bits: one dishonest player has complete control over the final outcome. It is only when coin flipping is supplemented with quantum communication that this problem can be alleviated, although partial bias remains. Unfortunately, practical systems are subject to loss of quantum data, which restores complete or nearly complete bias in previous protocols. We report herein on the first implementation of a quantum coin-flipping protocol that is impervious to loss. Moreover, in the presence of unavoidable experimental noise, we propose to use this protocol sequentially to implement many coin flips, which guarantees that a cheater unwillingly reveals asymptotically, through an increased error rate, how many outcomes have been fixed. Hence, we demonstrate for the first time the possibility of flipping coins in a realistic setting. Flipping quantum coins thereby joins quantum key distribution as one of the few currently practical applications of quantum communication. We anticipate our findings to be useful for various cryptographic protocols and other applications, such as an online casino, in which a possibly unlimited number of coin flips has to be performed and where each player is free to decide at any time whether to continue playing or not.Comment: 17 pages, 3 figure

    Overview on the phenomenon of two-qubit entanglement revivals in classical environments

    Full text link
    The occurrence of revivals of quantum entanglement between separated open quantum systems has been shown not only for dissipative non-Markovian quantum environments but also for classical environments in absence of back-action. While the phenomenon is well understood in the first case, the possibility to retrieve entanglement when the composite quantum system is subject to local classical noise has generated a debate regarding its interpretation. This dynamical property of open quantum systems assumes an important role in quantum information theory from both fundamental and practical perspectives. Hybrid quantum-classical systems are in fact promising candidates to investigate the interplay among quantum and classical features and to look for possible control strategies of a quantum system by means of a classical device. Here we present an overview on this topic, reporting the most recent theoretical and experimental results about the revivals of entanglement between two qubits locally interacting with classical environments. We also review and discuss the interpretations provided so far to explain this phenomenon, suggesting that they can be cast under a unified viewpoint.Comment: 16 pages, 9 figures. Chapter written for the upcoming book "Lectures on general quantum correlations and their applications

    Fractal Profit Landscape of the Stock Market

    Get PDF
    We investigate the structure of the profit landscape obtained from the most basic, fluctuation based, trading strategy applied for the daily stock price data. The strategy is parameterized by only two variables, p and q. Stocks are sold and bought if the log return is bigger than p and less than -q, respectively. Repetition of this simple strategy for a long time gives the profit defined in the underlying two-dimensional parameter space of p and q. It is revealed that the local maxima in the profit landscape are spread in the form of a fractal structure. The fractal structure implies that successful strategies are not localized to any region of the profit landscape and are neither spaced evenly throughout the profit landscape, which makes the optimization notoriously hard and hypersensitive for partial or limited information. The concrete implication of this property is demonstrated by showing that optimization of one stock for future values or other stocks renders worse profit than a strategy that ignores fluctuations, i.e., a long-term buy-and-hold strategy.Comment: 12 pages, 4 figure

    The Uncertainty Principle in the Presence of Quantum Memory

    Full text link
    The uncertainty principle, originally formulated by Heisenberg, dramatically illustrates the difference between classical and quantum mechanics. The principle bounds the uncertainties about the outcomes of two incompatible measurements, such as position and momentum, on a particle. It implies that one cannot predict the outcomes for both possible choices of measurement to arbitrary precision, even if information about the preparation of the particle is available in a classical memory. However, if the particle is prepared entangled with a quantum memory, a device which is likely to soon be available, it is possible to predict the outcomes for both measurement choices precisely. In this work we strengthen the uncertainty principle to incorporate this case, providing a lower bound on the uncertainties which depends on the amount of entanglement between the particle and the quantum memory. We detail the application of our result to witnessing entanglement and to quantum key distribution.Comment: 5 pages plus 12 of supplementary information. Updated to match the journal versio

    Interpreting ambiguous ‘trace’ results in Schistosoma mansoni CCA Tests: Estimating sensitivity and specificity of ambiguous results with no gold standard

    Get PDF
    Background The development of new diagnostics is an important tool in the fight against disease. Latent Class Analysis (LCA) is used to estimate the sensitivity and specificity of tests in the absence of a gold standard. The main field diagnostic for Schistosoma mansoni infection, Kato-Katz (KK), is not very sensitive at low infection intensities. A point-of-care circulating cathodic antigen (CCA) test has been shown to be more sensitive than KK. However, CCA can return an ambiguous ‘trace’ result between ‘positive’ and ‘negative’, and much debate has focused on interpretation of traces results. Methodology/Principle findings We show how LCA can be extended to include ambiguous trace results and analyse S. mansoni studies from both Côte d’Ivoire (CdI) and Uganda. We compare the diagnostic performance of KK and CCA and the observed results by each test to the estimated infection prevalence in the population. Prevalence by KK was higher in CdI (13.4%) than in Uganda (6.1%), but prevalence by CCA was similar between countries, both when trace was assumed to be negative (CCAtn: 11.7% in CdI and 9.7% in Uganda) and positive (CCAtp: 20.1% in CdI and 22.5% in Uganda). The estimated sensitivity of CCA was more consistent between countries than the estimated sensitivity of KK, and estimated infection prevalence did not significantly differ between CdI (20.5%) and Uganda (19.1%). The prevalence by CCA with trace as positive did not differ significantly from estimates of infection prevalence in either country, whereas both KK and CCA with trace as negative significantly underestimated infection prevalence in both countries. Conclusions Incorporation of ambiguous results into an LCA enables the effect of different treatment thresholds to be directly assessed and is applicable in many fields. Our results showed that CCA with trace as positive most accurately estimated infection prevalence

    First Dark Matter Limits from a Large-Mass, Low-Background Superheated Droplet Detector

    Get PDF
    We report on the fabrication aspects and calibration of the first large active mass (15\sim15 g) modules of SIMPLE, a search for particle dark matter using Superheated Droplet Detectors (SDDs). While still limited by the statistical uncertainty of the small data sample on hand, the first weeks of operation in the new underground laboratory of Rustrel-Pays d'Apt already provide a sensitivity to axially-coupled Weakly Interacting Massive Particles (WIMPs) competitive with leading experiments, confirming SDDs as a convenient, low-cost alternative for WIMP detection.Comment: Final version, Phys. Rev. Lett. (in press
    corecore