1,040 research outputs found

    Lenses as an Atom-Photon Interface: A Semiclassical Model

    Full text link
    Strong interaction between the light field and an atom is often achieved with cavities. Recent experiments have used a different configuration: a propagating light field is strongly focused using a system of lenses, the atom being supposed to sit at the focal position. In reality, this last condition holds only up to some approximation; in particular, at any finite temperature, the atom position fluctuates. We present a formalism that describes the focalized field and the atom sitting at an arbitrary position. As a first application, we show that thermal fluctuations do account for the extinction data reported in M. K. Tey et al., Nature Physics 4, 924 (2008)

    Superluminal hidden communication as the underlying mechanism for quantum correlations: constraining models

    Full text link
    Since Bell's theorem, it is known that quantum correlations cannot be described by local variables (LV) alone: if one does not want to abandon classical mechanisms for correlations, a superluminal form of communication among the particles must be postulated. A natural question is whether such a postulate would imply the possibility of superluminal signaling. Here we show that the assumption of finite-speed superluminal communication indeed leads to signaling when no LV are present, and more generally when only LV derivable from quantum statistics are allowed. When the most general LV are allowed, we prove in a specific case that the model can be made again consistent with relativity, but the question remains open in general.Comment: 5 pages, 1 figure. For the Proceedings of the Conference DICE 2004 (Piombino, 1-4 Sept. 2004

    Spectral decomposition of Bell's operators for qubits

    Get PDF
    The spectral decomposition is given for the N-qubit Bell operators with two observables per qubit. It is found that the eigenstates (when non-degenerate) are N-qubit GHZ states even for those operators that do not allow the maximal violation of the corresponding inequality. We present two applications of this analysis. In particular, we discuss the existence of pure entangled states that do not violate any Mermin-Klyshko inequality for N3N\geq 3.Comment: 12 pages, 1 figure

    Security bounds in Quantum Cryptography using d-level systems

    Get PDF
    We analyze the security of quantum cryptography schemes for dd-level systems using 2 or d+1d+1 maximally conjugated bases, under individual eavesdropping attacks based on cloning machines and measurement after the basis reconciliation. We consider classical advantage distillation protocols, that allow to extract a key even in situations where the mutual information between the honest parties is smaller than the eavesdropper's information. In this scenario, advantage distillation protocols are shown to be as powerful as quantum distillation: key distillation is possible using classical techniques if and only if the corresponding state in the entanglement based protocol is distillable.Comment: 18 pages, 1 figure. Published versio
    corecore