61 research outputs found

    Evaluation of convex roof entanglement measures

    Get PDF
    We show a powerful method to compute entanglement measures based on convex roof constructions. In particular, our method is applicable to measures that, for pure states, can be written as low order polynomials of operator expectation values. We show how to compute the linear entropy of entanglement, the linear entanglement of assistance, and a bound on the dimension of the entanglement for bipartite systems. We discuss how to obtain the convex roof of the three-tangle for three-qubit states. We also show how to calculate the linear entropy of entanglement and the quantum Fisher information based on partial information or device independent information. We demonstrate the usefulness of our method by concrete examplesComment: 6 pages including 3 figures, 6-page supplement with 2 figures, revtex4; v2: typos corrected, presentation improved, title shortened. For the CoRoNa MATLAB package for convex roof numerical analysis, which has been used for the manuscript, see http://www.mathworks.com/matlabcentral/fileexchange/47823-corona-convex-roof-numerical-analysi

    Bounding temporal quantum correlations

    Full text link
    Sequential measurements on a single particle play an important role in fundamental tests of quantum mechanics. We provide a general method to analyze temporal quantum correlations, which allows us to compute the maximal correlations for sequential measurements in quantum mechanics. As an application, we present the full characterization of temporal correlations in the simplest Leggett-Garg scenario and in the sequential measurement scenario associated with the most fundamental proof of the Kochen-Specker theorem.Comment: 8 pages, 2 figure

    Heralded qubit amplifiers for practical device-independent quantum key distribution

    Full text link
    Device-independent quantum key distribution does not need a precise quantum mechanical model of employed devices to guarantee security. Despite of its beauty, it is still a very challenging experimental task. We compare a recent proposal by Gisin et al. [Phys. Rev. Lett. 105, 070501 (2010)] to close the detection loophole problem with that of a simpler quantum relay based on entanglement swapping with linear optics. Our full-mode analysis for both schemes confirms that, in contrast to recent beliefs, the second scheme can indeed provide a positive key rate which is even considerably higher than that of the first alternative. The resulting key rates and required detection efficiencies of approx. 95% for both schemes, however, strongly depend on the underlying security proof.Comment: 5 pages, 3 figure

    Entanglement verification with realistic measurement devices via squashing operations

    Full text link
    Many protocols and experiments in quantum information science are described in terms of simple measurements on qubits. However, in a real implementation, the exact description is more difficult, and more complicated observables are used. The question arises whether a claim of entanglement in the simplified description still holds, if the difference between the realistic and simplified models is taken into account. We show that a positive entanglement statement remains valid if a certain positive linear map connecting the two descriptions--a so-called squashing operation--exists; then lower bounds on the amount of entanglement are also possible. We apply our results to polarization measurements of photons using only threshold detectors, and derive procedures under which multi-photon events can be neglected.Comment: 12 pages, 2 figure
    corecore