29,615 research outputs found
When only two thirds of the entanglement can be distilled
We provide an example of distillable bipartite mixed state such that, even in
the asymptotic limit, more pure-state entanglement is required to create it
than can be distilled from it. Thus, we show that the irreversibility in the
processes of formation and distillation of bipartite states, recently proved in
[G. Vidal, J.I. Cirac, Phys. Rev. Lett. 86, (2001) 5803-5806], is not limited
to bound-entangled states.Comment: 4 pages, revtex, 1 figur
Quantum computers can search rapidly by using almost any transformation
A quantum computer has a clear advantage over a classical computer for
exhaustive search. The quantum mechanical algorithm for exhaustive search was
originally derived by using subtle properties of a particular quantum
mechanical operation called the Walsh-Hadamard (W-H) transform. This paper
shows that this algorithm can be implemented by replacing the W-H transform by
almost any quantum mechanical operation. This leads to several new applications
where it improves the number of steps by a square-root. It also broadens the
scope for implementation since it demonstrates quantum mechanical algorithms
that can readily adapt to available technology.Comment: This paper is an adapted version of quant-ph/9711043. It has been
modified to make it more readable for physicists. 9 pages, postscrip
A method of enciphering quantum states
In this paper, we propose a method of enciphering quantum states of two-state
systems (qubits) for sending them in secrecy without entangled qubits shared by
two legitimate users (Alice and Bob). This method has the following two
properties. First, even if an eavesdropper (Eve) steals qubits, she can extract
information from them with certain probability at most. Second, Alice and Bob
can confirm that the qubits are transmitted between them correctly by measuring
a signature. If Eve measures m qubits one by one from n enciphered qubits and
sends alternative ones (the Intercept/Resend attack), a probability that Alice
and Bob do not notice Eve's action is equal to (3/4)^m or less. Passwords for
decryption and the signature are given by classical binary strings and they are
disclosed through a public channel. Enciphering classical information by this
method is equivalent to the one-time pad method with distributing a classical
key (random binary string) by the BB84 protocol. If Eve takes away qubits,
Alice and Bob lose the original quantum information. If we apply our method to
a state in iteration, Eve's success probability decreases exponentially. We
cannot examine security against the case that Eve makes an attack with using
entanglement. This remains to be solved in the future.Comment: 21 pages, Latex2e, 10 epsf figures. v2: 22 pages, added two
references, several clarifying sentences are added in Sec. 5, typos
corrected, a new proof is provided in Appendix A and it is shorter than the
old one. v3: 23 pages, one section is adde
Entanglement Patterns in Mutually Unbiased Basis Sets for N Prime-state Particles
A few simply-stated rules govern the entanglement patterns that can occur in
mutually unbiased basis sets (MUBs), and constrain the combinations of such
patterns that can coexist (ie, the stoichiometry) in full complements of p^N+1
MUBs. We consider Hilbert spaces of prime power dimension (as realized by
systems of N prime-state particles, or qupits), where full complements are
known to exist, and we assume only that MUBs are eigenbases of generalized
Pauli operators, without using a particular construction. The general rules
include the following: 1) In any MUB, a particular qupit appears either in a
pure state, or totally entangled, and 2) in any full MUB complement, each qupit
is pure in p+1 bases (not necessarily the same ones), and totally entangled in
the remaining p^N-p. It follows that the maximum number of product bases is
p+1, and when this number is realized, all remaining p^N-p bases in the
complement are characterized by the total entanglement of every qupit. This
"standard distribution" is inescapable for two qupits (of any p), where only
product and generalized Bell bases are admissible MUB types. This and the
following results generalize previous results for qubits and qutrits. With
three qupits there are three MUB types, and a number of combinations (p+2) are
possible in full complements. With N=4, there are 6 MUB types for p=2, but new
MUB types become possible with larger p, and these are essential to the
realization of full complements. With this example, we argue that new MUB
types, showing new entanglement characteristics, should enter with every step
in N, and when N is a prime plus 1, also at critical p values, p=N-1. Such MUBs
should play critical roles in filling complements.Comment: 27 pages, one figure, to be submitted to Physical Revie
Remote State Preparation
Quantum teleportation uses prior entanglement and forward classical
communication to transmit one instance of an unknown quantum state. Remote
state preparation (RSP) has the same goal, but the sender knows classically
what state is to be transmitted. We show that the asymptotic classical
communication cost of RSP is one bit per qubit - half that of teleportation -
and becomes even less when transmitting part of a known entangled state. We
explore the tradeoff between entanglement and classical communication required
for RSP, and discuss RSP capacities of general quantum channels.Comment: 4 pages including 1 epsf figure; v3 has an additional author and
discusses relation to work of Devetak and Berger (quant-ph/0102123); v4
improves low-entanglement protocols without back communication to perform as
well as low-entanglement protocols with back communication; v5 (journal
version) has a few small change
Quantifying nonorthogonality
An exploratory approach to the possibility of analyzing nonorthogonality as a
quantifiable property is presented. Three different measures for the
nonorthogonality of pure states are introduced, and one of these measures is
extended to single-particle density matrices using methods that are similar to
recently introduced techniques for quantifying entanglement. Several
interesting special cases are considered. It is pointed out that a measure of
nonorthogonality can meaningfully be associated with a single mixed quantum
state. It is then shown how nonorthogonality can be unlocked with classical
information; this analysis reveals interesting inequalities and points to a
number of connections between nonorthogonality and entanglement.Comment: Accepted for publication in Phys. Rev.
Calcium-sensing receptor activation increases cell-cell adhesion and ß-cell function
Background/Aims: The extracellular calcium-sensing receptor (CaR) is expressed in pancreatic β-cells where it is thought to facilitate cell-to-cell communication and augment insulin secretion. However, it is unknown how CaR activation improves β-cell function. Methods: Immunocytochemistry and western blotting confirmed the expression of CaR in MIN6 β-cell line. The calcimimetic R568 (1µM) was used to increase the affinity of the CaR and specifically activate the receptor at a physiologically appropriate extracellular calcium concentration. Incorporation of 5-bromo-2’-deoxyuridine (BrdU) was used to measure cell proliferation, whilst changes in non-nutrient-evoked cytosolic calcium were assessed using fura-2-microfluorimetry. AFM-single-cell-force spectroscopy related CaR-evoked changes in epithelial (E)-cadherin expression to improved functional tethering between coupled cells. Results: Activation of the CaR over 48hr doubled the expression of E-cadherin (206±41%) and increased L-type voltage-dependent calcium channel expression by 70% compared to control. These changes produced a 30% increase in cell-cell tethering and elevated the basal-to-peak amplitude of ATP (50µM) and tolbutamide (100µM)-evoked changes in cytosolic calcium. Activation of the receptor also increased PD98059 (1-100µM) and SU1498 (1-100µM)-dependent β-cell proliferation. Conclusion: Our data suggest that activation of the CaR increases E-cadherin mediated functional tethering between β-cells and increases expression of L-type VDCC and secretagogue-evoked changes in [Ca2+]i. These findings could explain how local changes in calcium, co-released with insulin, activate the CaR on neighbouring cells to help ensure efficient and appropriate secretory function
Nurse stress in hospital and satellite haemodialysis units
Focus groups of nurses from both in-centre and satellite dialysis units were undertaken followed by questionnaires. The In-centre nursing staff rated the busy-ness of the unit as the maximum stress. The mostly notable stressor for the staff at the satellite unit related to patient behaviour and the perceived unrealistic expectations of the patient followed by patients arriving unwell at the unit.Nurses suffer stress on a daily basis in both in-centre and satellite dialysis units. The major stressors differ from in-centre to satellite dialysis units.<br /
Quantum Cryptography with Coherent States
The safety of a quantum key distribution system relies on the fact that any
eavesdropping attempt on the quantum channel creates errors in the
transmission. For a given error rate, the amount of information that may have
leaked to the eavesdropper depends on both the particular system and the
eavesdropping strategy. In this work, we discuss quantum cryptographic
protocols based on the transmission of weak coherent states and present a new
system, based on a symbiosis of two existing ones, and for which the
information available to the eavesdropper is significantly reduced. This system
is therefore safer than the two previous ones. We also suggest a possible
experimental implementation.Comment: 20 pp. Revtex, Figures available from the authors upon request, To be
published in PRA (March 95
- …