29,615 research outputs found

    When only two thirds of the entanglement can be distilled

    Get PDF
    We provide an example of distillable bipartite mixed state such that, even in the asymptotic limit, more pure-state entanglement is required to create it than can be distilled from it. Thus, we show that the irreversibility in the processes of formation and distillation of bipartite states, recently proved in [G. Vidal, J.I. Cirac, Phys. Rev. Lett. 86, (2001) 5803-5806], is not limited to bound-entangled states.Comment: 4 pages, revtex, 1 figur

    Quantum computers can search rapidly by using almost any transformation

    Get PDF
    A quantum computer has a clear advantage over a classical computer for exhaustive search. The quantum mechanical algorithm for exhaustive search was originally derived by using subtle properties of a particular quantum mechanical operation called the Walsh-Hadamard (W-H) transform. This paper shows that this algorithm can be implemented by replacing the W-H transform by almost any quantum mechanical operation. This leads to several new applications where it improves the number of steps by a square-root. It also broadens the scope for implementation since it demonstrates quantum mechanical algorithms that can readily adapt to available technology.Comment: This paper is an adapted version of quant-ph/9711043. It has been modified to make it more readable for physicists. 9 pages, postscrip

    A method of enciphering quantum states

    Get PDF
    In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties. First, even if an eavesdropper (Eve) steals qubits, she can extract information from them with certain probability at most. Second, Alice and Bob can confirm that the qubits are transmitted between them correctly by measuring a signature. If Eve measures m qubits one by one from n enciphered qubits and sends alternative ones (the Intercept/Resend attack), a probability that Alice and Bob do not notice Eve's action is equal to (3/4)^m or less. Passwords for decryption and the signature are given by classical binary strings and they are disclosed through a public channel. Enciphering classical information by this method is equivalent to the one-time pad method with distributing a classical key (random binary string) by the BB84 protocol. If Eve takes away qubits, Alice and Bob lose the original quantum information. If we apply our method to a state in iteration, Eve's success probability decreases exponentially. We cannot examine security against the case that Eve makes an attack with using entanglement. This remains to be solved in the future.Comment: 21 pages, Latex2e, 10 epsf figures. v2: 22 pages, added two references, several clarifying sentences are added in Sec. 5, typos corrected, a new proof is provided in Appendix A and it is shorter than the old one. v3: 23 pages, one section is adde

    Entanglement Patterns in Mutually Unbiased Basis Sets for N Prime-state Particles

    Get PDF
    A few simply-stated rules govern the entanglement patterns that can occur in mutually unbiased basis sets (MUBs), and constrain the combinations of such patterns that can coexist (ie, the stoichiometry) in full complements of p^N+1 MUBs. We consider Hilbert spaces of prime power dimension (as realized by systems of N prime-state particles, or qupits), where full complements are known to exist, and we assume only that MUBs are eigenbases of generalized Pauli operators, without using a particular construction. The general rules include the following: 1) In any MUB, a particular qupit appears either in a pure state, or totally entangled, and 2) in any full MUB complement, each qupit is pure in p+1 bases (not necessarily the same ones), and totally entangled in the remaining p^N-p. It follows that the maximum number of product bases is p+1, and when this number is realized, all remaining p^N-p bases in the complement are characterized by the total entanglement of every qupit. This "standard distribution" is inescapable for two qupits (of any p), where only product and generalized Bell bases are admissible MUB types. This and the following results generalize previous results for qubits and qutrits. With three qupits there are three MUB types, and a number of combinations (p+2) are possible in full complements. With N=4, there are 6 MUB types for p=2, but new MUB types become possible with larger p, and these are essential to the realization of full complements. With this example, we argue that new MUB types, showing new entanglement characteristics, should enter with every step in N, and when N is a prime plus 1, also at critical p values, p=N-1. Such MUBs should play critical roles in filling complements.Comment: 27 pages, one figure, to be submitted to Physical Revie

    Remote State Preparation

    Full text link
    Quantum teleportation uses prior entanglement and forward classical communication to transmit one instance of an unknown quantum state. Remote state preparation (RSP) has the same goal, but the sender knows classically what state is to be transmitted. We show that the asymptotic classical communication cost of RSP is one bit per qubit - half that of teleportation - and becomes even less when transmitting part of a known entangled state. We explore the tradeoff between entanglement and classical communication required for RSP, and discuss RSP capacities of general quantum channels.Comment: 4 pages including 1 epsf figure; v3 has an additional author and discusses relation to work of Devetak and Berger (quant-ph/0102123); v4 improves low-entanglement protocols without back communication to perform as well as low-entanglement protocols with back communication; v5 (journal version) has a few small change

    Quantifying nonorthogonality

    Get PDF
    An exploratory approach to the possibility of analyzing nonorthogonality as a quantifiable property is presented. Three different measures for the nonorthogonality of pure states are introduced, and one of these measures is extended to single-particle density matrices using methods that are similar to recently introduced techniques for quantifying entanglement. Several interesting special cases are considered. It is pointed out that a measure of nonorthogonality can meaningfully be associated with a single mixed quantum state. It is then shown how nonorthogonality can be unlocked with classical information; this analysis reveals interesting inequalities and points to a number of connections between nonorthogonality and entanglement.Comment: Accepted for publication in Phys. Rev.

    Calcium-sensing receptor activation increases cell-cell adhesion and ß-cell function

    Get PDF
    Background/Aims: The extracellular calcium-sensing receptor (CaR) is expressed in pancreatic β-cells where it is thought to facilitate cell-to-cell communication and augment insulin secretion. However, it is unknown how CaR activation improves β-cell function. Methods: Immunocytochemistry and western blotting confirmed the expression of CaR in MIN6 β-cell line. The calcimimetic R568 (1µM) was used to increase the affinity of the CaR and specifically activate the receptor at a physiologically appropriate extracellular calcium concentration. Incorporation of 5-bromo-2’-deoxyuridine (BrdU) was used to measure cell proliferation, whilst changes in non-nutrient-evoked cytosolic calcium were assessed using fura-2-microfluorimetry. AFM-single-cell-force spectroscopy related CaR-evoked changes in epithelial (E)-cadherin expression to improved functional tethering between coupled cells. Results: Activation of the CaR over 48hr doubled the expression of E-cadherin (206±41%) and increased L-type voltage-dependent calcium channel expression by 70% compared to control. These changes produced a 30% increase in cell-cell tethering and elevated the basal-to-peak amplitude of ATP (50µM) and tolbutamide (100µM)-evoked changes in cytosolic calcium. Activation of the receptor also increased PD98059 (1-100µM) and SU1498 (1-100µM)-dependent β-cell proliferation. Conclusion: Our data suggest that activation of the CaR increases E-cadherin mediated functional tethering between β-cells and increases expression of L-type VDCC and secretagogue-evoked changes in [Ca2+]i. These findings could explain how local changes in calcium, co-released with insulin, activate the CaR on neighbouring cells to help ensure efficient and appropriate secretory function

    Nurse stress in hospital and satellite haemodialysis units

    Full text link
    Focus groups of nurses from both in-centre and satellite dialysis units were undertaken followed by questionnaires. The In-centre nursing staff rated the busy-ness of the unit as the maximum stress. The mostly notable stressor for the staff at the satellite unit related to patient behaviour and the perceived unrealistic expectations of the patient followed by patients arriving unwell at the unit.Nurses suffer stress on a daily basis in both in-centre and satellite dialysis units. The major stressors differ from in-centre to satellite dialysis units.<br /

    Quantum Cryptography with Coherent States

    Get PDF
    The safety of a quantum key distribution system relies on the fact that any eavesdropping attempt on the quantum channel creates errors in the transmission. For a given error rate, the amount of information that may have leaked to the eavesdropper depends on both the particular system and the eavesdropping strategy. In this work, we discuss quantum cryptographic protocols based on the transmission of weak coherent states and present a new system, based on a symbiosis of two existing ones, and for which the information available to the eavesdropper is significantly reduced. This system is therefore safer than the two previous ones. We also suggest a possible experimental implementation.Comment: 20 pp. Revtex, Figures available from the authors upon request, To be published in PRA (March 95
    corecore