351 research outputs found

    Asymmetric quantum cloning machines in any dimension

    Full text link
    A family of asymmetric cloning machines for NN-dimensional quantum states is introduced. These machines produce two imperfect copies of a single state that emerge from two distinct Heisenberg channels. The tradeoff between the quality of these copies is shown to result from a complementarity akin to Heisenberg uncertainty principle. A no-cloning inequality is derived for isotropic cloners: if πa\pi_a and πb\pi_b are the depolarizing fractions associated with the two copies, the domain in (πa,πb)(\sqrt{\pi_a},\sqrt{\pi_b})-space located inside a particular ellipse representing close-to-perfect cloning is forbidden. More generally, a no-cloning uncertainty relation is discussed, quantifying the impossibility of copying imposed by quantum mechanics. Finally, an asymmetric Pauli cloning machine is defined that makes two approximate copies of a quantum bit, while the input-to-output operation underlying each copy is a (distinct) Pauli channel. The class of symmetric Pauli cloning machines is shown to provide an upper bound on the quantum capacity of the Pauli channel of probabilities pxp_x, pyp_y and pzp_z.Comment: 18 pages RevTeX, 3 Postscript figures; new discussion on no-cloning uncertainty relations, several corrections, added reference

    Singlet states and the estimation of eigenstates and eigenvalues of an unknown Controlled-U gate

    Get PDF
    We consider several problems that involve finding the eigenvalues and generating the eigenstates of unknown unitary gates. We first examine Controlled-U gates that act on qubits, and assume that we know the eigenvalues. It is then shown how to use singlet states to produce qubits in the eigenstates of the gate. We then remove the assumption that we know the eigenvalues and show how to both find the eigenvalues and produce qubits in the eigenstates. Finally, we look at the case where the unitary operator acts on qutrits and has eigenvalues of 1 and -1, where the eigenvalue 1 is doubly degenerate. The eigenstates are unknown. We are able to use a singlet state to produce a qutrit in the eigenstate corresponding to the -1 eigenvalue.Comment: Latex, 10 pages, no figure

    Several experimental realizations of symmetric phase-covariant quantum cloner of single-photon qubits

    Full text link
    We compare several optical implementations of phase-covariant cloning machines. The experiments are based on copying of the polarization state of a single photon in bulk optics by special unbalanced beam splitter or by balanced beam splitter accompanied by a state filtering. Also the all-fiber based setup is discussed, where the information is encoded into spatial modes, i.e., the photon can propagate through two optical fibers. Each of the four implementations possesses some advantages and disadvantages that are discussed.Comment: 8 pages, 11 figure

    Understanding entanglement as resource: locally distinguishing unextendible product bases

    Full text link
    It is known that the states in an unextendible product basis (UPB) cannot be distinguished perfectly when the parties are restricted to local operations and classical communication (LOCC). Previous discussions of such bases have left open the following question: What entanglement resources are necessary and/or sufficient for this task to be possible with LOCC? In this paper, I present protocols which use entanglement more efficiently than teleportation to distinguish certain classes of UPB's. The ideas underlying my approach to this problem offer rather general insight into why entanglement is useful for such tasks.Comment: Final, published version. Many revisions following very useful suggestions of the referee have been added. In particular, Appendix A has been completely rewritte

    Detection and prevention of financial abuse against elders

    Get PDF
    This article is made available through the Brunel Open Access Publishing Fund. Copyright @ The Authors. This article is published under the Creative Commons Attribution (CC BY 3.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/ by/3.0/legalcode.Purpose – This paper reports on banking and finance professionals' decision making in the context of elder financial abuse. The aim was to identify the case features that influence when abuse is identified and when action is taken. Design/methodology/approach – Banking and finance professionals (n=70) were shown 35 financial abuse case scenarios and were asked to judge how certain they were that the older person was being abused and the likelihood of taking action. Findings – Three case features significantly influenced certainty of financial abuse: the nature of the financial problem presented, the older person's level of mental capacity and who was in charge of the client's money. In cases where the older person was more confused and forgetful, there was increased suspicion that financial abuse was taking place. Finance professionals were less certain that financial abuse was occurring if the older person was in charge of his or her own finances. Originality/value – The research findings have been used to develop freely available online training resources to promote professionals' decision making capacity (www.elderfinancialabuse.co.uk). The resources have been advocated for use by Building Societies Association as well as CIFAS, the UK's Fraud Prevention Service.The research reported here was funded by the UK cross council New Dynamicsof Ageing Programme, ESRC Reference No. RES-352-25-0026, with Mary L.M. Gilhooly asPrincipal Investigator. Web-based training tools, developed from the research findings, weresubsequently funded by the ESRC follow-on fund ES/J001155/1 with Priscilla A. Harries asPrincipal Investigator

    A Topological Study of Contextuality and Modality in Quantum Mechanics

    Get PDF
    Kochen-Specker theorem rules out the non-contextual assignment of values to physical magnitudes. Here we enrich the usual orthomodular structure of quantum mechanical propositions with modal operators. This enlargement allows to refer consistently to actual and possible properties of the system. By means of a topological argument, more precisely in terms of the existence of sections of sheaves, we give an extended version of Kochen-Specker theorem over this new structure. This allows us to prove that contextuality remains a central feature even in the enriched propositional system.Comment: 10 pages, no figures, submitted to I. J. Th. Phy

    Experimental Realization of 121 \to 2 Asymmetric Phase-Covariant Quantum Cloning

    Get PDF
    While exact cloning of an unknown quantum state is prohibited by the linearity of quantum mechanics, approximate cloning is possible and has been used, e.g., to derive limits on the security of quantum communication protocols. In the case of asymmetric cloning, the information from the input state is distributed asymmetrically between the different output states. Here, we consider asymmetric phase-covariant cloning, where the goal is to optimally transfer the phase information from a single input qubit to different output qubits. We construct an optimal quantum cloning machine for two qubits that does not require ancilla qubits and implement it on an NMR quantum information processor.Comment: 6 pages, 5 figure

    Optimal Conclusive Discrimination of Two Non-orthogonal Pure Product Multipartite States Locally

    Full text link
    We consider one copy of a quantum system prepared in one of two non-orthogonal pure product states of multipartite distributed among separated parties. We show that there exist protocols which obtain optimal probability in the sense of conclusive discrimination by means of local operations and classical communications(LOCC) as good as by global operations. Also, we show a protocol which minimezes the average number of local operations. Our result implies that two product pure multipartite states might not have the non-local property though more than two can have.Comment: revtex, 3 pages, no figur

    Emergence in holographic scenarios for gravity

    Get PDF
    'Holographic' relations between theories have become an important theme in quantum gravity research. These relations entail that a theory without gravity is equivalent to a gravitational theory with an extra spatial dimension. The idea of holography was first proposed in 1993 by Gerard 't Hooft on the basis of his studies of evaporating black holes. Soon afterwards the holographic 'AdS/CFT' duality was introduced, which since has been intensively studied in the string theory community and beyond. Recently, Erik Verlinde has proposed that even Newton's law of gravitation can be related holographically to the `thermodynamics of information' on screens. We discuss these scenarios, with special attention to the status of the holographic relation in them and to the question of whether they make gravity and spacetime emergent. We conclude that only Verlinde's scheme straightfowardly instantiates emergence. However, assuming a non-standard interpretation of AdS/CFT may create room for the emergence of spacetime and gravity there as well

    Cloning quantum entanglement in arbitrary dimensions

    Full text link
    We have found a quantum cloning machine that optimally duplicates the entanglement of a pair of dd-dimensional quantum systems. It maximizes the entanglement of formation contained in the two copies of any maximally-entangled input state, while preserving the separability of unentangled input states. Moreover, it cannot increase the entanglement of formation of all isotropic states. For large dd, the entanglement of formation of each clone tends to one half the entanglement of the input state, which corresponds to a classical behavior. Finally, we investigate a local entanglement cloner, which yields entangled clones with one fourth the input entanglement in the large-dd limit.Comment: 6 pages, 3 figure
    corecore