11,911 research outputs found

    Britain’s supersized cabinets are too expensive.

    Get PDF
    As the search for massive UK public expenditure cuts swings into intensive mode, Joachim Wehner finds a strong link in comparative work between the number of department heads sitting around a country’s cabinet table and the proportion of GDP absorbed in public spending.

    More non-locality with less entanglement

    Get PDF
    We provide an explicit example of a Bell inequality with 3 settings and 2 outcomes per site for which the largest violation is not obtained by the maximally entangled state, even if its dimension is allowed to be arbitrarily large. This complements recent results by Junge and Palazuelos (arXiv:1007.3042) who show, employing tools from operator space theory, that such inequalities do exist. Our elementary example provides arguably the simplest setting in which it can be demonstrated that even an infinite supply of EPR pairs is not the strongest possible nonlocal resource.Comment: 9 pages; Added reference to arXiv:1012.151

    Dependence of a quantum mechanical system on its own initial state and the initial state of the environment it interacts with

    Full text link
    We present a unifying framework to the understanding of when and how quantum mechanical systems become independent of their initial conditions and adapt macroscopic properties (like temperature) of the environment.By viewing this problem from an quantum information theory perspective, we are able to simplify it in a very natural and easy way. We first show that for any interaction between the system and the environment, and almost all initial states of the system, the question of how long the system retains memory of its initial conditions can be answered by studying the temporal evolution of just one special initial state. This special state thereby depends only on our knowledge of macroscopic parameters of the system. We provide a simple entropic inequality for this state that can be used to determine whether mosts states of the system have, or have not become independent of their initial conditions after time tt. We discuss applications of our entropic criterion to thermalization times in systems with an effective light-cone and to quantum memories suffering depolarizing noise. We make a similar statement for almost all initial states of the environment, and finally provide a sufficient condition for which a system never thermalizes, but remains close to its initial state for all times.Comment: 9+4 pages, revtex. v2: minor changes in notation; v4: greatly rewritten, new title, new applications of main results, to appear in PR

    Composable Security in the Bounded-Quantum-Storage Model

    Full text link
    We present a simplified framework for proving sequential composability in the quantum setting. In particular, we give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Damgard et al. (FOCS '05, CRYPTO '07) showed how to securely implement bit commitment and oblivious transfer in the bounded-quantum-storage model, where the adversary is only allowed to store a limited number of qubits. However, their security definitions did only apply to the standalone setting, and it was not clear if their protocols could be composed. Indeed, we first give a simple attack that shows that these protocols are not composable without a small refinement of the model. Finally, we prove the security of their randomized oblivious transfer protocol in our refined model. Secure implementations of oblivious transfer and bit commitment then follow easily by a (classical) reduction to randomized oblivious transfer.Comment: 21 page

    Lowering qubit requirements for quantum simulations of fermionic systems

    Get PDF
    The mapping of fermionic states onto qubit states, as well as the mapping of fermionic Hamiltonian into quantum gates enables us to simulate electronic systems with a quantum computer. Benefiting the understanding of many-body systems in chemistry and physics, quantum simulation is one of the great promises of the coming age of quantum computers. One challenge in realizing simulations on near-term quantum devices is the large number of qubits required by such mappings. In this work, we develop methods that allow us to trade-off qubit requirements against the complexity of the resulting quantum circuit. We first show that any classical code used to map the state of a fermionic Fock space to qubits gives rise to a mapping of fermionic models to quantum gates. As an illustrative example, we present a mapping based on a non-linear classical error correcting code, which leads to significant qubit savings albeit at the expense of additional quantum gates. We proceed to use this framework to present a number of simpler mappings that lead to qubit savings with only a very modest increase in gate difficulty. We discuss the role of symmetries such as particle conservation, and savings that could be obtained if an experimental platform could easily realize multi-controlled gates.Comment: 11+13 pages, 5 figures, 2 tables, see ArXiv files for Mathematica code (text file) and documentation (pdf); fixed typos in this new versio

    Achieving the physical limits of the bounded-storage model

    Get PDF
    Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol. This special case is known as the bounded-storage model, and it has long been an open question whether security can still be achieved if the adversary's storage were any larger. Here, we answer this question positively and demonstrate a two-party protocol which is secure as long as the adversary cannot store even a small fraction of the transmitted pulses. We also show that security can be extended to a larger class of noisy quantum memories.Comment: 10 pages (revtex), 2 figures, v2: published version, minor change
    corecore