1,040 research outputs found
Lenses as an Atom-Photon Interface: A Semiclassical Model
Strong interaction between the light field and an atom is often achieved with
cavities. Recent experiments have used a different configuration: a propagating
light field is strongly focused using a system of lenses, the atom being
supposed to sit at the focal position. In reality, this last condition holds
only up to some approximation; in particular, at any finite temperature, the
atom position fluctuates. We present a formalism that describes the focalized
field and the atom sitting at an arbitrary position. As a first application, we
show that thermal fluctuations do account for the extinction data reported in
M. K. Tey et al., Nature Physics 4, 924 (2008)
Superluminal hidden communication as the underlying mechanism for quantum correlations: constraining models
Since Bell's theorem, it is known that quantum correlations cannot be
described by local variables (LV) alone: if one does not want to abandon
classical mechanisms for correlations, a superluminal form of communication
among the particles must be postulated. A natural question is whether such a
postulate would imply the possibility of superluminal signaling. Here we show
that the assumption of finite-speed superluminal communication indeed leads to
signaling when no LV are present, and more generally when only LV derivable
from quantum statistics are allowed. When the most general LV are allowed, we
prove in a specific case that the model can be made again consistent with
relativity, but the question remains open in general.Comment: 5 pages, 1 figure. For the Proceedings of the Conference DICE 2004
(Piombino, 1-4 Sept. 2004
Spectral decomposition of Bell's operators for qubits
The spectral decomposition is given for the N-qubit Bell operators with two
observables per qubit. It is found that the eigenstates (when non-degenerate)
are N-qubit GHZ states even for those operators that do not allow the maximal
violation of the corresponding inequality. We present two applications of this
analysis. In particular, we discuss the existence of pure entangled states that
do not violate any Mermin-Klyshko inequality for .Comment: 12 pages, 1 figure
Security bounds in Quantum Cryptography using d-level systems
We analyze the security of quantum cryptography schemes for -level systems
using 2 or maximally conjugated bases, under individual eavesdropping
attacks based on cloning machines and measurement after the basis
reconciliation. We consider classical advantage distillation protocols, that
allow to extract a key even in situations where the mutual information between
the honest parties is smaller than the eavesdropper's information. In this
scenario, advantage distillation protocols are shown to be as powerful as
quantum distillation: key distillation is possible using classical techniques
if and only if the corresponding state in the entanglement based protocol is
distillable.Comment: 18 pages, 1 figure. Published versio
- …
