5,716 research outputs found

    Geometric control of particle manipulation in a two-dimensional fluid

    Get PDF
    Manipulation of particles suspended in fluids is crucial for many applications, such as precision machining, chemical processes, bio-engineering, and self-feeding of microorganisms. In this paper, we study the problem of particle manipulation by cyclic fluid boundary excitations from a geometric-control viewpoint. We focus on the simplified problem of manipulating a single particle by generating controlled cyclic motion of a circular rigid body in a two-dimensional perfect fluid. We show that the drift in the particle location after one cyclic motion of the body can be interpreted as the geometric phase of a connection induced by the system's hydrodynamics. We then formulate the problem as a control system, and derive a geometric criterion for its nonlinear controllability. Moreover, by exploiting the geometric structure of the system, we explicitly construct a feedback-based gait that results in attraction of the particle towards the rigid body. We argue that our gait is robust and model-independent, and demonstrate it in both perfect fluid and Stokes fluid

    Anonymous quantum communication

    Full text link
    We present the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against an active adversary, without any assumption on the number of corrupt participants. The anonymity of the sender and receiver is perfectly preserved, and the privacy of the quantum state is protected except with exponentially small probability. Even though a single corrupt participant can cause the protocol to abort, the quantum state can only be destroyed with exponentially small probability: if the protocol succeeds, the state is transferred to the receiver and otherwise it remains in the hands of the sender (provided the receiver is honest).Comment: 11 pages, to appear in Proceedings of ASIACRYPT, 200

    Scalable Noise Estimation with Random Unitary Operators

    Full text link
    We describe a scalable stochastic method for the experimental measurement of generalized fidelities characterizing the accuracy of the implementation of a coherent quantum transformation. The method is based on the motion reversal of random unitary operators. In the simplest case our method enables direct estimation of the average gate fidelity. The more general fidelities are characterized by a universal exponential rate of fidelity loss. In all cases the measurable fidelity decrease is directly related to the strength of the noise affecting the implementation -- quantified by the trace of the superoperator describing the non--unitary dynamics. While the scalability of our stochastic protocol makes it most relevant in large Hilbert spaces (when quantum process tomography is infeasible), our method should be immediately useful for evaluating the degree of control that is achievable in any prototype quantum processing device. By varying over different experimental arrangements and error-correction strategies additional information about the noise can be determined.Comment: 8 pages; v2: published version (typos corrected; reference added

    A simple proof of the unconditional security of quantum key distribution

    Get PDF
    Quantum key distribution is the most well-known application of quantum cryptography. Previous proposed proofs of security of quantum key distribution contain various technical subtleties. Here, a conceptually simpler proof of security of quantum key distribution is presented. The new insight is the invariance of the error rate of a teleportation channel: We show that the error rate of a teleportation channel is independent of the signals being transmitted. This is because the non-trivial error patterns are permuted under teleportation. This new insight is combined with the recently proposed quantum to classical reduction theorem. Our result shows that assuming that Alice and Bob have fault-tolerant quantum computers, quantum key distribution can be made unconditionally secure over arbitrarily long distances even against the most general type of eavesdropping attacks and in the presence of all types of noises.Comment: 13 pages, extended abstract. Comments will be appreciate

    Topological fault-tolerance in cluster state quantum computation

    Get PDF
    We describe a fault-tolerant version of the one-way quantum computer using a cluster state in three spatial dimensions. Topologically protected quantum gates are realized by choosing appropriate boundary conditions on the cluster. We provide equivalence transformations for these boundary conditions that can be used to simplify fault-tolerant circuits and to derive circuit identities in a topological manner. The spatial dimensionality of the scheme can be reduced to two by converting one spatial axis of the cluster into time. The error threshold is 0.75% for each source in an error model with preparation, gate, storage and measurement errors. The operational overhead is poly-logarithmic in the circuit size.Comment: 20 pages, 12 figure

    Tricolored Lattice Gauge Theory with Randomness: Fault-Tolerance in Topological Color Codes

    Get PDF
    We compute the error threshold of color codes, a class of topological quantum codes that allow a direct implementation of quantum Clifford gates, when both qubit and measurement errors are present. By mapping the problem onto a statistical-mechanical three-dimensional disordered Ising lattice gauge theory, we estimate via large-scale Monte Carlo simulations that color codes are stable against 4.5(2)% errors. Furthermore, by evaluating the skewness of the Wilson loop distributions, we introduce a very sensitive probe to locate first-order phase transitions in lattice gauge theories.Comment: 12 pages, 5 figures, 1 tabl

    The CARMENES search for exoplanets around M dwarfs: Nine new double-line spectroscopic binary stars

    Full text link
    Context. The CARMENES spectrograph is surveying ~300 M dwarf stars in search for exoplanets. Among the target stars, spectroscopic binary systems have been discovered, which can be used to measure fundamental properties of stars. Aims. Using spectroscopic observations, we determine the orbital and physical properties of nine new double-line spectroscopic binary systems by analysing their radial velocity curves. Methods. We use two-dimensional cross-correlation techniques to derive the radial velocities of the targets, which are then employed to determine the orbital properties. Photometric data from the literature are also analysed to search for possible eclipses and to measure stellar variability, which can yield rotation periods. Results. Out of the 342 stars selected for the CARMENES survey, 9 have been found to be double-line spectroscopic binaries, with periods ranging from 1.13 to ~8000 days and orbits with eccentricities up to 0.54. We provide empirical orbital properties and minimum masses for the sample of spectroscopic binaries. Absolute masses are also estimated from mass-luminosity calibrations, ranging between ~0.1 and ~0.6 Msol . Conclusions. These new binary systems increase the number of double-line M dwarf binary systems with known orbital parameters by 15%, and they have lower mass ratios on average.Comment: Accepted for publication in A&A. 17 pages, 4 figure

    Quantum key distribution with delayed privacy amplification and its application to security proof of a two-way deterministic protocol

    Get PDF
    Privacy amplification (PA) is an essential post-processing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays. To illustrate the power of the delayed PA idea, we use it to prove the security of a qubit-based two-way deterministic QKD protocol which uses four states and four encoding operations.Comment: 11 pages, 3 figure

    Magnetic fields in M dwarfs from the CARMENES survey

    Get PDF
    M dwarfs are known to generate the strongest magnetic fields among main-sequence stars with convective envelopes, but the link between the magnetic fields and underlying dynamo mechanisms, rotation, and activity still lacks a consistent picture. In this work we measure magnetic fields from the high-resolution near-infrared spectra taken with the CARMENES radial-velocity planet survey in a sample of 29 active M dwarfs and compare our results against stellar parameters. We use the state-of-the-art radiative transfer code to measure total magnetic flux densities from the Zeeman broadening of spectral lines and filling factors. We detect strong kG magnetic fields in all our targets. In 16 stars the magnetic fields were measured for the first time. Our measurements are consistent with the magnetic field saturation in stars with rotation periods P<4d. The analysis of the magnetic filling factors reveal two different patterns of either very smooth distribution or a more patchy one, which can be connected to the dynamo state of the stars and/or stellar mass. Our measurements extend the list of M dwarfs with strong surface magnetic fields. They also allow us to better constrain the interplay between the magnetic energy, stellar rotation, and underlying dynamo action. The high spectral resolution and observations at near-infrared wavelengths are the beneficial capabilities of the CARMENES instrument that allow us to address important questions about the stellar magnetism.Comment: 13 pages of main text, 14 pages of online material, 2 table
    corecore