47 research outputs found

    Device independent state estimation based on Bell's inequalities

    Full text link
    The only information available about an alleged source of entangled quantum states is the amount SS by which the Clauser-Horne-Shimony-Holt (CHSH) inequality is violated: nothing is known about the nature of the system or the measurements that are performed. We discuss how the quality of the source can be assessed in this black-box scenario, as compared to an ideal source that would produce maximally entangled states (more precisely, any state for which S=22S=2\sqrt{2}). To this end, we introduce several inequivalent notions of fidelity, each one related to the use one can make of the source after having assessed it; and we derive quantitative bounds for each of them in terms of the violation SS. We also derive a lower bound on the entanglement of the source as a function of SS only.Comment: 8 pages, 2 figures. Added appendices containing proof

    Determinism and Computational Power of Real Measurement-based Quantum Computation

    Get PDF
    International audienceMeasurement-based quantum computing (MBQC) is a universal model for quantum computation. The combinatorial characterisation of determinism in this model, powered by measurements, and hence, fundamentally probabilistic, is the cornerstone of most of the breakthrough results in this field. The most general known sufficient condition for a deterministic MBQC to be driven is that the underlying graph of the computation has a particular kind of flow called Pauli flow. The necessity of the Pauli flow was an open question. We show that the Pauli flow is necessary for real-MBQC, and not in general providing counterexamples for (complex) MBQC. We explore the consequences of this result for real MBQC and its applications. Real MBQC and more generally real quantum computing is known to be universal for quantum computing. Real MBQC has been used for interactive proofs by McKague. The two-prover case corresponds to real-MBQC on bipartite graphs. While (complex) MBQC on bipartite graphs are universal, the universality of real MBQC on bipartite graphs was an open question. We show that real bipartite MBQC is not universal proving that all measurements of real bipartite MBQC can be parallelised leading to constant depth computations. As a consequence, McKague techniques cannot lead to two-prover interactive proofs

    Self-testing through EPR-steering

    Get PDF
    The verification of quantum devices is an important aspect of quantum information, especially with the emergence of more advanced experimental implementations of quantum computation and secure communication. Within this, the theory of device-independent robust self-testing via Bell tests has reached a level of maturity now that many quantum states and measurements can be verified without direct access to the quantum systems: interaction with the devices is solely classical. However, the requirements for this robust level of verification are daunting and require high levels of experimental accuracy. In this paper we discuss the possibility of self-testing where we only have direct access to one part of the quantum device. This motivates the study of self-testing via EPR-steering, an intermediate form of entanglement verification between full state tomography and Bell tests. Quantum non-locality implies EPR-steering so results in the former can apply in the latter, but we ask what advantages may be gleaned from the latter over the former given that one can do partial state tomography? We show that in the case of self-testing a maximally entangled two-qubit state, or ebit, EPR-steering allows for simpler analysis and better error tolerance than in the case of full device-independence. On the other hand, this improvement is only a constant improvement and (up to constants) is the best one can hope for. Finally, we indicate that the main advantage in self-testing based on EPR-steering could be in the case of self-testing multi-partite quantum states and measurements. For example, it may be easier to establish a tensor product structure for a particular party’s Hilbert space even if we do not have access to their part of the global quantum system

    Exploring concepts of health with male prisoners in three category-C English prisons

    Get PDF
    Lay understandings of health and illness have a well established track record and a plethora of research now exists which has examined these issues. However, there is a dearth of research which has examined the perspectives of those who are imprisoned. This paper attempts to address this research gap. The paper is timely given that calls have been made to examine lay perspectives in different geographical locations and a need to re-examine health promotion approaches in prison settings. Qualitative data from thirty-six male sentenced prisoners from three prisons in England were collected. The data was analysed in accordance with Attride-Stirling's (2001) thematic network approach. Although the men's perceptions of health were broadly similar to the general population, some interesting findings emerged which were directly related to prison life and its associated structures. These included access to the outdoors and time out of their prison cell, as well as maintaining relationships with family members through visits. The paper proposes that prisoners' lay views should be given higher priority given that prison health has traditionally been associated with medical treatment and the bio-medical paradigm more generally. It also suggests that in order to fulfil the World Health Organization's (WHO) vision of viewing prisons as health promoting settings, lay views should be recognised to shape future health promotion policy and practice

    Can multinational companies foster institutional change and sustainable development in emerging countries? A case study.

    Get PDF
    Emerging countries present institutional necessities that hinder their sustainable development. In the face of this challenge, companies, and in particular multinational companies (MNCs), can foster sustainable development through their corporate social responsibility (CSR) initiatives. This study focuses on the role of institutional change in transforming CSR into sustainable development in emerging countries. To this end, we propose a view of CSR focused on its institutional determinants and outcomes from a social and developmental perspective. By using quantitative and qualitative data, we analyse the case of three MNCs from different industries based in Europe and operating in Mexico. The case study shows how firms can stimulate institutional change in developing economies and contribute to their sustainable development as measured by the sustainable development goals. Various mechanisms about how this process is made are devised: institutional entrepreneurship, multistakeholder initiatives, interconnection of different institutional dimensions, and subsidiary entrepreneurship. The case study highlights the interaction among MNCs, developing countries, and institutions and how firms' sustainable actions scale up to the macro level.post-print399 K

    What does security culture look like for small organizations?

    No full text
    The human component is a significant factor in information security, with a large numbers of breaches occurring due to unintentional user error. Technical solutions can only protect information so far and thus the human aspect of security has become a major focus for discussion. Therefore, it is important for organisations to create a security conscious culture. However, currently there is no established representation of security culture from which to assess how it can be manoeuvred to improve the overall information security of an organization. This is of particular importance for small organizations who lack the resources in information security and for whom the culture of the organization exerts a strong influence. A review of multiple definitions and descriptions of security culture was made to assess and analyse the drivers and influences that exist for security culture in small organizations. An initial representation of the factors that should drive security culture, together with those that should only influence it, was constructed. At a fundamental level these drivers are related to a formulated response to security issues rather than a reaction to it, and should reflect the responsibility allocated in a secure environment. In contrast, the influences on security culture can be grouped by communities of practice, individual awareness and organizational management. The encapsulation of potential driving and influencing factors couched in information security terms rather than behavioural science terms, will allow security researchers to investigate how a security culture can be fostered to improve information security in small organizations

    Robustness and device independence of verifiable blind quantum computing

    Get PDF
    Recent advances in theoretical and experimental quantum computing bring us closer to scalable quantum computing devices. This makes the need for protocols that verify the correct functionality of quantum operations timely and has led to the field of quantum verification. In this paper we address key challenges to make quantum verification protocols applicable to experimental implementations. We prove the robustness of the single server verifiable universal blind quantum computing protocol of Fitzsimons and Kashefi (2012) in the most general scenario. This includes the case where the purification of the deviated input state is in the hands of an adversarial server. The proved robustness property allows the composition of this protocol with a device-independent state tomography protocol that we give, which is based on the rigidity of CHSH games as proposed by Reichardt, Unger and Vazirani (2013). The resulting composite protocol has lower round complexity for the verification of entangled quantum servers with a classical verifier and, as we show, can be made fault tolerant.Comment: Shortly before uploading the first version on the arxiv, the authors became aware of parallel and independent research by Hajdusek, Perez-Delgado and Fitzsimons, which also addresses device-independent verifiable blind quantum computing and appeared the same day on the arxi

    Robust self-testing of the singlet

    No full text
    10.1088/1751-8113/45/45/455304Journal of Physics A: Mathematical and Theoretical4545
    corecore