734 research outputs found
Topological Subsystem Codes
We introduce a family of 2D topological subsystem quantum error-correcting
codes. The gauge group is generated by 2-local Pauli operators, so that 2-local
measurements are enough to recover the error syndrome. We study the
computational power of code deformation in these codes, and show that
boundaries cannot be introduced in the usual way. In addition, we give a
general mapping connecting suitable classical statistical mechanical models to
optimal error correction in subsystem stabilizer codes that suffer from
depolarizing noise.Comment: 16 pages, 11 figures, explanations added, typos correcte
Non-abelian vortices and non-abelian statistics
We study the interactions of non-abelian vortices in two spatial dimensions. These interactions have novel features, because the Aharonov-Bohm effect enables a pair of vortices to exchange quantum numbers. The cross section for vortex-vortex scattering is typically a multi-valued function of the scattering angle. There can be an exchange contribution to the vortex-vortex scattering amplitude that adds coherently with the direct amplitude, even if the two vortices have distinct quantum numbers. Thus two vortices can be ``indistinguishable'' even though they are not the same
Black holes as mirrors: quantum information in random subsystems
We study information retrieval from evaporating black holes, assuming that
the internal dynamics of a black hole is unitary and rapidly mixing, and
assuming that the retriever has unlimited control over the emitted Hawking
radiation. If the evaporation of the black hole has already proceeded past the
"half-way" point, where half of the initial entropy has been radiated away,
then additional quantum information deposited in the black hole is revealed in
the Hawking radiation very rapidly. Information deposited prior to the half-way
point remains concealed until the half-way point, and then emerges quickly.
These conclusions hold because typical local quantum circuits are efficient
encoders for quantum error-correcting codes that nearly achieve the capacity of
the quantum erasure channel. Our estimate of a black hole's information
retention time, based on speculative dynamical assumptions, is just barely
compatible with the black hole complementarity hypothesis.Comment: 18 pages, 2 figures. (v2): discussion of decoding complexity
clarifie
Inverting quantum decoherence by classical feedback from the environment
We show that for qubits and qutrits it is always possible to perfectly
recover quantum coherence by performing a measurement only on the environment,
whereas for dimension d>3 there are situations where recovery is impossible,
even with complete access to the environment. For qubits, the minimal amount of
classical information to be extracted from the environment equals the entropy
exchange.Comment: Phys. Rev. Lett. 95, 090501 (2005). Published versio
Multiparticle Entanglement in the Lipkin-Meshkov-Glick Model
The multiparticle entanglement in the Lipkin-Meshkov-Glick model has been
discussed extensively in this paper. Measured by the global entanglement and
its generalization, our calculation shows that the multiparticle entanglement
can faithfully detect quantum phase transitions. For an antiferromagnetic case
the multiparticle entanglement reaches the maximum at the transition point,
whereas for ferromagnetic coupling, two different behaviors of multiparticle
entanglement can be identified, dependent on the anisotropic parameter in the
coupling.Comment: 7 pages and 5 figure
Secure quantum key distribution with an uncharacterized source
We prove the security of the Bennett-Brassard (BB84) quantum key distribution
protocol for an arbitrary source whose averaged states are basis-independent, a
condition that is automatically satisfied if the source is suitably designed.
The proof is based on the observation that, to an adversary, the key extraction
process is equivalent to a measurement in the sigma_x-basis performed on a pure
sigma_z-basis eigenstate. The dependence of the achievable key length on the
bit error rate is the same as that established by Shor and Preskill for a
perfect source, indicating that the defects in the source are efficiently
detected by the protocol.Comment: 4 pages, 1 figure, REVTeX, minor revision
Simple Proof of Security of the BB84 Quantum Key Distribution Protocol
We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for
quantum key distribution. We first give a key distribution protocol based on
entanglement purification, which can be proven secure using methods from Lo and
Chau's proof of security for a similar protocol. We then show that the security
of this protocol implies the security of BB84. The entanglement-purification
based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these
codes are used to remove the use of quantum computation from the Lo-Chau
protocol.Comment: 5 pages, Latex, minor changes to improve clarity and fix typo
Approximate quantum error correction, random codes, and quantum channel capacity
We work out a theory of approximate quantum error correction that allows us
to derive a general lower bound for the entanglement fidelity of a quantum
code. The lower bound is given in terms of Kraus operators of the quantum
noise. This result is then used to analyze the average error correcting
performance of codes that are randomly drawn from unitarily invariant code
ensembles. Our results confirm that random codes of sufficiently large block
size are highly suitable for quantum error correction. Moreover, employing a
lemma of Bennett, Shor, Smolin, and Thapliyal, we prove that random coding
attains information rates of the regularized coherent information.Comment: 29 pages, final version to appear in Phys. Rev. A, improved lower
bound for code entanglement fidelity, simplified proo
Coulomb Blockade Doppelgangers in Quantum Hall States
In this paper, we ask the question: How well can Coulomb blockade experiments
correctly identify and distinguish between different topological orders in
quantum Hall states? We definitively find the answer to be: Quite poorly. In
particular, we write the general expression for the spacing of resonance peaks
in a simple form that explicitly displays its dependence on the conformal
scaling dimensions of the systems' edge modes. This form makes transparent the
general argument that the Coulomb blockade peak spacings do not provide a
strongly indicative signature of the topological order of the system, since it
is only weakly related to the braiding statistics. We bolster this general
argument with examples for all the most physically relevant non-Abelian
candidate states, demonstrating that they have Coulomb blockade doppelgangers
-- candidate states at the same filling fraction with identical Coulomb
blockade signatures, but dramatically different topological orders and braiding
statistics.Comment: 12 pages, 1 figure; portions of this paper were formerly included in
Appendix C of arXiv:0903.3108; v2: examples added, minor corrections made;
v3: discussions of non-uniform filling and of hierarchical counterparts of
multi-component states added, minor corrections mad
- …