82 research outputs found
Quantum optical coherence can survive photon losses: a continuous-variable quantum erasure correcting code
A fundamental requirement for enabling fault-tolerant quantum information
processing is an efficient quantum error-correcting code (QECC) that robustly
protects the involved fragile quantum states from their environment. Just as
classical error-correcting codes are indispensible in today's information
technologies, it is believed that QECC will play a similarly crucial role in
tomorrow's quantum information systems. Here, we report on the first
experimental demonstration of a quantum erasure-correcting code that overcomes
the devastating effect of photon losses. Whereas {\it errors} translate, in an
information theoretic language, the noise affecting a transmission line, {\it
erasures} correspond to the in-line probabilistic loss of photons. Our quantum
code protects a four-mode entangled mesoscopic state of light against erasures,
and its associated encoding and decoding operations only require linear optics
and Gaussian resources. Since in-line attenuation is generally the strongest
limitation to quantum communication, much more than noise, such an
erasure-correcting code provides a new tool for establishing quantum optical
coherence over longer distances. We investigate two approaches for
circumventing in-line losses using this code, and demonstrate that both
approaches exhibit transmission fidelities beyond what is possible by classical
means.Comment: 5 pages, 4 figure
Many-body localization in a quantum simulator with programmable random disorder
When a system thermalizes it loses all local memory of its initial
conditions. This is a general feature of open systems and is well described by
equilibrium statistical mechanics. Even within a closed (or reversible) quantum
system, where unitary time evolution retains all information about its initial
state, subsystems can still thermalize using the rest of the system as an
effective heat bath. Exceptions to quantum thermalization have been predicted
and observed, but typically require inherent symmetries or noninteracting
particles in the presence of static disorder. The prediction of many-body
localization (MBL), in which disordered quantum systems can fail to thermalize
in spite of strong interactions and high excitation energy, was therefore
surprising and has attracted considerable theoretical attention. Here we
experimentally generate MBL states by applying an Ising Hamiltonian with
long-range interactions and programmably random disorder to ten spins
initialized far from equilibrium. We observe the essential signatures of MBL:
memory retention of the initial state, a Poissonian distribution of energy
level spacings, and entanglement growth in the system at long times. Our
platform can be scaled to higher numbers of spins, where detailed modeling of
MBL becomes impossible due to the complexity of representing such entangled
quantum states. Moreover, the high degree of control in our experiment may
guide the use of MBL states as potential quantum memories in naturally
disordered quantum systems.Comment: 9 pages, 9 figure
Operational Significance of Discord Consumption: Theory and Experiment
Coherent interactions that generate negligible entanglement can still exhibit
unique quantum behaviour. This observation has motivated a search beyond
entanglement for a complete description of all quantum correlations. Quantum
discord is a promising candidate. Here, we demonstrate that under certain
measurement constraints, discord between bipartite systems can be consumed to
encode information that can only be accessed by coherent quantum interactions.
The inability to access this information by any other means allows us to use
discord to directly quantify this `quantum advantage'. We experimentally encode
information within the discordant correlations of two separable Gaussian
states. The amount of extra information recovered by coherent interaction is
quantified and directly linked with the discord consumed during encoding. No
entanglement exists at any point of this experiment. Thus we introduce and
demonstrate an operational method to use discord as a physical resource.Comment: 10 pages, 3 figures, updated with Nature Physics Reference,
simplified proof in Appendi
Quantum Communication
Quantum communication, and indeed quantum information in general, has changed
the way we think about quantum physics. In 1984 and 1991, the first protocol
for quantum cryptography and the first application of quantum non-locality,
respectively, attracted a diverse field of researchers in theoretical and
experimental physics, mathematics and computer science. Since then we have seen
a fundamental shift in how we understand information when it is encoded in
quantum systems. We review the current state of research and future directions
in this new field of science with special emphasis on quantum key distribution
and quantum networks.Comment: Submitted version, 8 pg (2 cols) 5 fig
Quantum Computing
Quantum mechanics---the theory describing the fundamental workings of
nature---is famously counterintuitive: it predicts that a particle can be in
two places at the same time, and that two remote particles can be inextricably
and instantaneously linked. These predictions have been the topic of intense
metaphysical debate ever since the theory's inception early last century.
However, supreme predictive power combined with direct experimental observation
of some of these unusual phenomena leave little doubt as to its fundamental
correctness. In fact, without quantum mechanics we could not explain the
workings of a laser, nor indeed how a fridge magnet operates. Over the last
several decades quantum information science has emerged to seek answers to the
question: can we gain some advantage by storing, transmitting and processing
information encoded in systems that exhibit these unique quantum properties?
Today it is understood that the answer is yes. Many research groups around the
world are working towards one of the most ambitious goals humankind has ever
embarked upon: a quantum computer that promises to exponentially improve
computational power for particular tasks. A number of physical systems,
spanning much of modern physics, are being developed for this task---ranging
from single particles of light to superconducting circuits---and it is not yet
clear which, if any, will ultimately prove successful. Here we describe the
latest developments for each of the leading approaches and explain what the
major challenges are for the future.Comment: 26 pages, 7 figures, 291 references. Early draft of Nature 464, 45-53
(4 March 2010). Published version is more up-to-date and has several
corrections, but is half the length with far fewer reference
General immunity and superadditivity of two-way Gaussian quantum cryptography
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks
Activation of Host Translational Control Pathways by a Viral Developmental Switch
In response to numerous signals, latent herpesvirus genomes abruptly switch their developmental program, aborting stable host–cell colonization in favor of productive viral replication that ultimately destroys the cell. To achieve a rapid gene expression transition, newly minted capped, polyadenylated viral mRNAs must engage and reprogram the cellular translational apparatus. While transcriptional responses of viral genomes undergoing lytic reactivation have been amply documented, roles for cellular translational control pathways in enabling the latent-lytic switch have not been described. Using PEL-derived B-cells naturally infected with KSHV as a model, we define efficient reactivation conditions and demonstrate that reactivation substantially changes the protein synthesis profile. New polypeptide synthesis correlates with 4E-BP1 translational repressor inactivation, nuclear PABP accumulation, eIF4F assembly, and phosphorylation of the cap-binding protein eIF4E by Mnk1. Significantly, inhibiting Mnk1 reduces accumulation of the critical viral transactivator RTA through a post-transcriptional mechanism, limiting downstream lytic protein production, and impairs reactivation efficiency. Thus, herpesvirus reactivation from latency activates the host cap-dependent translation machinery, illustrating the importance of translational regulation in implementing new developmental instructions that drastically alter cell fate
Link-Prediction to Tackle the Boundary Specification Problem in Social Network Surveys
Diffusion processes in social networks often cause the emergence of global phenomena from individual behavior within a society. The study of those global phenomena and the simulation of those diffusion processes frequently require a good model of the global network. However, survey data and data from online sources are often restricted to single social groups or features, such as age groups, single schools, companies, or interest groups. Hence, a modeling approach is required that extrapolates the locally restricted data to a global network model. We tackle this Missing Data Problem using Link-Prediction techniques from social network research, network generation techniques from the area of Social Simulation, as well as a combination of both. We found that techniques employing less information may be more adequate to solve this problem, especially when data granularity is an issue. We validated the network models created with our techniques on a number of real-world networks, investigating degree distributions as well as the likelihood of links given the geographical distance between two nodes
- …