348 research outputs found
Lectures on conformal field theory and Kac-Moody algebras
This is an introduction to the basic ideas and to a few further selected
topics in conformal quantum field theory and in the theory of Kac-Moody
algebras.Comment: 59 pages, LaTeX2e, extended version of lectures given at the Graduate
Course on Conformal Field Theory and Integrable Models (Budapest, August
1996), to appear in Springer Lecture Notes in Physic
Quantum Key Distribution between N partners: optimal eavesdropping and Bell's inequalities
Quantum secret-sharing protocols involving N partners (NQSS) are key
distribution protocols in which Alice encodes her key into qubits, in
such a way that all the other partners must cooperate in order to retrieve the
key. On these protocols, several eavesdropping scenarios are possible: some
partners may want to reconstruct the key without the help of the other ones,
and consequently collaborate with an Eve that eavesdrops on the other partners'
channels. For each of these scenarios, we give the optimal individual attack
that the Eve can perform. In case of such an optimal attack, the authorized
partners have a higher information on the key than the unauthorized ones if and
only if they can violate a Bell's inequality.Comment: 14 pages, 1 figur
One-and-a-half quantum de Finetti theorems
We prove a new kind of quantum de Finetti theorem for representations of the
unitary group U(d). Consider a pure state that lies in the irreducible
representation U_{mu+nu} for Young diagrams mu and nu. U_{mu+nu} is contained
in the tensor product of U_mu and U_nu; let xi be the state obtained by tracing
out U_nu. We show that xi is close to a convex combination of states Uv, where
U is in U(d) and v is the highest weight vector in U_mu. When U_{mu+nu} is the
symmetric representation, this yields the conventional quantum de Finetti
theorem for symmetric states, and our method of proof gives near-optimal bounds
for the approximation of xi by a convex combination of product states. For the
class of symmetric Werner states, we give a second de Finetti-style theorem
(our 'half' theorem); the de Finetti-approximation in this case takes a
particularly simple form, involving only product states with a fixed spectrum.
Our proof uses purely group theoretic methods, and makes a link with the
shifted Schur functions. It also provides some useful examples, and gives some
insight into the structure of the set of convex combinations of product states.Comment: 14 pages, 3 figures, v4: minor additions (including figures),
published versio
Quantum cloning machines for equatorial qubits
Quantum cloning machines for equatorial qubits are studied. For the case of 1
to 2 phase-covariant quantum cloning machine, we present the networks
consisting of quantum gates to realize the quantum cloning transformations. The
copied equatorial qubits are shown to be separable by using Peres-Horodecki
criterion. The optimal 1 to M phase-covariant quantum cloning transformations
are given.Comment: Revtex, 9 page
Unified criterion for security of secret sharing in terms of violation of Bell inequality
In secret sharing protocols, a secret is to be distributed among several
partners so that leaving out any number of them, the rest do not have the
complete information. Strong multiqubit correlations in the state by which
secret sharing is carried out, had been proposed as a criterion for security of
such protocols against individual attacks by an eavesdropper. However we show
that states with weak multiqubit correlations can also be used for secure
secret sharing. That our state has weak multiqubit correlations, is shown from
the perspective of violation of local realism, and also by showing that its
higher order correlations are described by lower ones. We then present a
unified criterion for security of secret sharing in terms of violation of local
realism, which works when the secret sharing state is the
Greenberger-Horne-Zeilinger state (with strong multiqubit correlations), as
well as states of a different class (with weak multiqubit correlations).Comment: 7 pages, no figures, RevTeX
Order p^6 chiral couplings from the scalar K Pi form factor
Employing results from a recent determination of the scalar KPi form factor
F_0^KPi within a coupled channel dispersion relation analysis \cite{JOP01}, in
this work we calculate the slope and curvature of F_0^KPi(t) at zero momentum
transfer. Knowledge of the slope and curvature of the scalar KPi form factor,
together with a recently calculated expression for F_0^KPi(t) in chiral
perturbation theory at order p^6, enable to estimate the O(p^6) chiral
constants C_12^r=(0.3 +- 5.4)10^-7 and (C_12^r+C_34^r)=(3.2 +- 1.5)10^-6. Our
findings also allow to estimate the contribution coming from the C_i to the
vector form factor F_+^KPi(0) which is crucial for a precise determination of
|V_us| from K_l3 decays. Our result F_+^KPi(0)|_C_i^r=-0.018 +- 0.009, though
inflicted with large uncertainties, is in perfect agreement with a previous
estimate by Leutwyler and Roos already made twenty years ago.Comment: 19 pages, discussion of scale dependence of the chiral couplings
added; version to appear in JHE
Phase-covariant quantum cloning of qudits
We study the phase-covariant quantum cloning machine for qudits, i.e. the
input states in d-level quantum system have complex coefficients with arbitrary
phase but constant module. A cloning unitary transformation is proposed. After
optimizing the fidelity between input state and single qudit reduced density
opertor of output state, we obtain the optimal fidelity for 1 to 2
phase-covariant quantum cloning of qudits and the corresponding cloning
transformation.Comment: Revtex, 6 page
Spin - or, actually: Spin and Quantum Statistics
The history of the discovery of electron spin and the Pauli principle and the
mathematics of spin and quantum statistics are reviewed. Pauli's theory of the
spinning electron and some of its many applications in mathematics and physics
are considered in more detail. The role of the fact that the tree-level
gyromagnetic factor of the electron has the value g = 2 in an analysis of
stability (and instability) of matter in arbitrary external magnetic fields is
highlighted. Radiative corrections and precision measurements of g are
reviewed. The general connection between spin and statistics, the CPT theorem
and the theory of braid statistics are described.Comment: 50 pages, no figures, seminar on "spin
Multipartite entangled coherent states
We propose a scheme for generating multipartite entangled coherent states via
entanglement swapping, with an example of a physical realization in ion traps.
Bipartite entanglement of these multipartite states is quantified by the
concurrence. We also use the --tangle to compute multipartite entanglement
for certain systems. Finally we establish that these results for entanglement
can be applied to more general multipartite entangled nonorthogonal states.Comment: 7 pages, two figures. We added more detail discussions on the
generation of multipartite entangled coherent states and multipartite
entangelemen
Separability and entanglement in 2x3xN composite quantum systems
The separability and entanglement of quantum mixed states in \Cb^2 \otimes
\Cb^3 \otimes \Cb^N composite quantum systems are investigated. It is shown
that all quantum states with positive partial transposes and rank
are separable.Comment: Latex, 15 page
- …