8 research outputs found

    Maximally entangled fermions

    Full text link
    Fermions play an essential role in many areas of quantum physics and it is desirable to understand the nature of entanglement within systems that consists of fermions. Whereas the issue of separability for bipartite fermions has extensively been studied in the present literature, this paper is concerned with maximally entangled fermions. A complete characterization of maximally entangled quasifree (gaussian) fermion states is given in terms of the covariance matrix. This result can be seen as a step towards distillation protocols for maximally entangled fermions.Comment: 13 pages, 1 figure, RevTex, minor errors are corrected, section "Conclusions" is adde

    On the structure of Clifford quantum cellular automata

    Full text link
    We study reversible quantum cellular automata with the restriction that these are also Clifford operations. This means that tensor products of Pauli operators (or discrete Weyl operators) are mapped to tensor products of Pauli operators. Therefore Clifford quantum cellular automata are induced by symplectic cellular automata in phase space. We characterize these symplectic cellular automata and find that all possible local rules must be, up to some global shift, reflection invariant with respect to the origin. In the one dimensional case we also find that every uniquely determined and translationally invariant stabilizer state can be prepared from a product state by a single Clifford cellular automaton timestep, thereby characterizing these class of stabilizer states, and we show that all 1D Clifford quantum cellular automata are generated by a few elementary operations. We also show that the correspondence between translationally invariant stabilizer states and translationally invariant Clifford operations holds for periodic boundary conditions.Comment: 28 pages, 2 figures, LaTe

    The algebra of Grassmann canonical anti-commutation relations (GAR) and its applications to fermionic systems

    Full text link
    We present an approach to a non-commutative-like phase space which allows to analyze quasi-free states on the CAR algebra in analogy to quasi-free states on the CCR algebra. The used mathematical tools are based on a new algebraic structure the "Grassmann algebra of canonical anti-commutation relations" (GAR algebra) which is given by the twisted tensor product of a Grassmann and a CAR algebra. As a new application, the corresponding theory provides an elegant tool for calculating the fidelity of two quasi-free fermionic states which is needed for the study of entanglement distillation within fermionic systems.Comment: 25 page

    Barycentric decomposition of quantum measurements in finite dimensions

    Full text link
    We analyze the convex structure of the set of positive operator valued measures (POVMs) representing quantum measurements on a given finite dimensional quantum system, with outcomes in a given locally compact Hausdorff space. The extreme points of the convex set are operator valued measures concentrated on a finite set of k \le d^2 points of the outcome space, d< \infty being the dimension of the Hilbert space. We prove that for second countable outcome spaces any POVM admits a Choquet representation as the barycenter of the set of extreme points with respect to a suitable probability measure. In the general case, Krein-Milman theorem is invoked to represent POVMs as barycenters of a certain set of POVMs concentrated on k \le d^2 points of the outcome space.Comment: !5 pages, no figure

    Reexamination of Quantum Bit Commitment: the Possible and the Impossible

    Full text link
    Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. In this paper we give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed "honest" strategy, so that "anonymous state protocols", which were recently suggested as a possible way to beat the known no-go results are also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two party protocols, which is applicable to more general situations, and a new estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology, and thus may allow secure bit commitment. We present a new such protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's lab.Comment: v1: 26 pages, 4 eps figures. v2: 31 pages, 5 eps figures; replaced with published version; title changed to comply with puzzling Phys. Rev. regulations; impossibility proof extended to protocols with infinitely many rounds or a continuous communication tree; security proof of decoherence monster protocol expanded; presentation clarifie
    corecore