322 research outputs found

    Energy-time entangled qutrits: Bell tests and quantum communication

    Full text link
    We have developed a scheme to generate, control, transmit and measure entangled photonic qutrits (two photons each of dimension d = 3). A Bell test of this source has previously been reported elsewhere [1], therefore, here we focus on how the control of the system is realized. Motivated by these results, we outline how the scheme can be used for two specific quantum protocols, namely key distribution and coin tossing and discuss some of their advantages and disadvantages.Comment: For the conference proceedings of QCMC 200

    A paradox in bosonic energy computations via semidefinite programming relaxations

    Full text link
    We show that the recent hierarchy of semidefinite programming relaxations based on non-commutative polynomial optimization and reduced density matrix variational methods exhibits an interesting paradox when applied to the bosonic case: even though it can be rigorously proven that the hierarchy collapses after the first step, numerical implementations of higher order steps generate a sequence of improving lower bounds that converges to the optimal solution. We analyze this effect and compare it with similar behavior observed in implementations of semidefinite programming relaxations for commutative polynomial minimization. We conclude that the method converges due to the rounding errors occurring during the execution of the numerical program, and show that convergence is lost as soon as computer precision is incremented. We support this conclusion by proving that for any element p of a Weyl algebra which is non-negative in the Schrodinger representation there exists another element p' arbitrarily close to p that admits a sum of squares decomposition.Comment: 22 pages, 4 figure

    Properties of Entanglement Monotones for Three-Qubit Pure States

    Get PDF
    Various parameterizations for the orbits under local unitary transformations of three-qubit pure states are analyzed. The interconvertibility, symmetry properties, parameter ranges, calculability and behavior under measurement are looked at. It is shown that the entanglement monotones of any multipartite pure state uniquely determine the orbit of that state under local unitary transformations. It follows that there must be an entanglement monotone for three-qubit pure states which depends on the Kempe invariant defined in [Phys. Rev. A 60, 910 (1999)]. A form for such an entanglement monotone is proposed. A theorem is proved that significantly reduces the number of entanglement monotones that must be looked at to find the maximal probability of transforming one multipartite state to another.Comment: 14 pages, REVTe

    General properties of Nonsignaling Theories

    Full text link
    This article identifies a series of properties common to all theories that do not allow for superluminal signaling and predict the violation of Bell inequalities. Intrinsic randomness, uncertainty due to the incompatibility of two observables, monogamy of correlations, impossibility of perfect cloning, privacy of correlations, bounds in the shareability of some states; all these phenomena are solely a consequence of the no-signaling principle and nonlocality. In particular, it is shown that for any distribution, the properties of (i) nonlocal, (ii) no arbitrarily shareable and (iii) positive secrecy content are equivalent.Comment: 10 page

    Correlation Decay in Fermionic Lattice Systems with Power-Law Interactions at Nonzero Temperature

    Get PDF
    We study correlations in fermionic lattice systems with long-range interactions in thermal equilibrium. We prove a bound on the correlation decay between anti-commuting operators and generalize a long-range Lieb-Robinson type bound. Our results show that in these systems of spatial dimension DD with, not necessarily translation invariant, two-site interactions decaying algebraically with the distance with an exponent α≥2 D\alpha \geq 2\,D, correlations between such operators decay at least algebraically with an exponent arbitrarily close to α\alpha at any non-zero temperature. Our bound is asymptotically tight, which we demonstrate by a high temperature expansion and by numerically analyzing density-density correlations in the 1D quadratic (free, exactly solvable) Kitaev chain with long-range pairing.Comment: 8 pages, 2 figures, minor improvements and typos correcte

    Bell inequality with an arbitrary number of settings and its applications

    Full text link
    Based on a geometrical argument introduced by Zukowski, a new multisetting Bell inequality is derived, for the scenario in which many parties make measurements on two-level systems. This generalizes and unifies some previous results. Moreover, a necessary and sufficient condition for the violation of this inequality is presented. It turns out that the class of non-separable states which do not admit local realistic description is extended when compared to the two-setting inequalities. However, supporting the conjecture of Peres, quantum states with positive partial transposes with respect to all subsystems do not violate the inequality. Additionally, we follow a general link between Bell inequalities and communication complexity problems, and present a quantum protocol linked with the inequality, which outperforms the best classical protocol.Comment: 8 pages, To appear in Phys. Rev.

    Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

    Full text link
    Device independent quantum key distribution aims to provide a higher degree of security than traditional QKD schemes by reducing the number of assumptions that need to be made about the physical devices used. The previous proof of security by Pironio et al. applies only to collective attacks where the state is identical and independent and the measurement devices operate identically for each trial in the protocol. We extend this result to a more general class of attacks where the state is arbitrary and the measurement devices have no memory. We accomplish this by a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qubit strategies based on the previous proof by Pironio et al. and techniques adapted from Renner.Comment: 13 pages. Expanded main proofs with more detail, miscellaneous edits for clarit

    Non-realism : deep thought or a soft option ?

    Full text link
    The claim that the observation of a violation of a Bell inequality leads to an alleged alternative between nonlocality and non-realism is annoying because of the vagueness of the second term.Comment: 5 page
    • …
    corecore