11,911 research outputs found
Britain’s supersized cabinets are too expensive.
As the search for massive UK public expenditure cuts swings into intensive mode, Joachim Wehner finds a strong link in comparative work between the number of department heads sitting around a country’s cabinet table and the proportion of GDP absorbed in public spending.
More non-locality with less entanglement
We provide an explicit example of a Bell inequality with 3 settings and 2
outcomes per site for which the largest violation is not obtained by the
maximally entangled state, even if its dimension is allowed to be arbitrarily
large. This complements recent results by Junge and Palazuelos
(arXiv:1007.3042) who show, employing tools from operator space theory, that
such inequalities do exist. Our elementary example provides arguably the
simplest setting in which it can be demonstrated that even an infinite supply
of EPR pairs is not the strongest possible nonlocal resource.Comment: 9 pages; Added reference to arXiv:1012.151
Dependence of a quantum mechanical system on its own initial state and the initial state of the environment it interacts with
We present a unifying framework to the understanding of when and how quantum
mechanical systems become independent of their initial conditions and adapt
macroscopic properties (like temperature) of the environment.By viewing this
problem from an quantum information theory perspective, we are able to simplify
it in a very natural and easy way. We first show that for any interaction
between the system and the environment, and almost all initial states of the
system, the question of how long the system retains memory of its initial
conditions can be answered by studying the temporal evolution of just one
special initial state. This special state thereby depends only on our knowledge
of macroscopic parameters of the system. We provide a simple entropic
inequality for this state that can be used to determine whether mosts states of
the system have, or have not become independent of their initial conditions
after time . We discuss applications of our entropic criterion to
thermalization times in systems with an effective light-cone and to quantum
memories suffering depolarizing noise. We make a similar statement for almost
all initial states of the environment, and finally provide a sufficient
condition for which a system never thermalizes, but remains close to its
initial state for all times.Comment: 9+4 pages, revtex. v2: minor changes in notation; v4: greatly
  rewritten, new title, new applications of main results, to appear in PR
Composable Security in the Bounded-Quantum-Storage Model
We present a simplified framework for proving sequential composability in the
quantum setting. In particular, we give a new, simulation-based, definition for
security in the bounded-quantum-storage model, and show that this definition
allows for sequential composition of protocols. Damgard et al. (FOCS '05,
CRYPTO '07) showed how to securely implement bit commitment and oblivious
transfer in the bounded-quantum-storage model, where the adversary is only
allowed to store a limited number of qubits. However, their security
definitions did only apply to the standalone setting, and it was not clear if
their protocols could be composed. Indeed, we first give a simple attack that
shows that these protocols are not composable without a small refinement of the
model. Finally, we prove the security of their randomized oblivious transfer
protocol in our refined model. Secure implementations of oblivious transfer and
bit commitment then follow easily by a (classical) reduction to randomized
oblivious transfer.Comment: 21 page
Lowering qubit requirements for quantum simulations of fermionic systems
The mapping of fermionic states onto qubit states, as well as the mapping of
fermionic Hamiltonian into quantum gates enables us to simulate electronic
systems with a quantum computer. Benefiting the understanding of many-body
systems in chemistry and physics, quantum simulation is one of the great
promises of the coming age of quantum computers. One challenge in realizing
simulations on near-term quantum devices is the large number of qubits required
by such mappings. In this work, we develop methods that allow us to trade-off
qubit requirements against the complexity of the resulting quantum circuit. We
first show that any classical code used to map the state of a fermionic Fock
space to qubits gives rise to a mapping of fermionic models to quantum gates.
As an illustrative example, we present a mapping based on a non-linear
classical error correcting code, which leads to significant qubit savings
albeit at the expense of additional quantum gates. We proceed to use this
framework to present a number of simpler mappings that lead to qubit savings
with only a very modest increase in gate difficulty. We discuss the role of
symmetries such as particle conservation, and savings that could be obtained if
an experimental platform could easily realize multi-controlled gates.Comment: 11+13 pages, 5 figures, 2 tables, see ArXiv files for Mathematica
  code (text file) and documentation (pdf); fixed typos in this new versio
Achieving the physical limits of the bounded-storage model
Secure two-party cryptography is possible if the adversary's quantum storage
device suffers imperfections. For example, security can be achieved if the
adversary can store strictly less then half of the qubits transmitted during
the protocol. This special case is known as the bounded-storage model, and it
has long been an open question whether security can still be achieved if the
adversary's storage were any larger. Here, we answer this question positively
and demonstrate a two-party protocol which is secure as long as the adversary
cannot store even a small fraction of the transmitted pulses. We also show that
security can be extended to a larger class of noisy quantum memories.Comment: 10 pages (revtex), 2 figures, v2: published version, minor change
- …
