Information Theory and Quantum Physics

Author(s):  
Herbert S. Green
2018 ◽  
Vol 2018 ◽  
pp. 1-5 ◽  
Author(s):  
Jean-Pierre Magnot

We describe a mathematical link between aspects of information theory, called pairwise comparisons, and discretized gauge theories. The link is made by the notion of holonomy along the edges of a simplex. This correspondence leads to open questions in both fields.


2021 ◽  
Vol 26 (3) ◽  
pp. 327-332
Author(s):  
Phil Stone

Claude Shannon’s 1948 paper ‘A Mathematical Theory of Communication’ provided the essential foundation for the digital/information revolution that enables these very pixels to glow in meaningful patterns and permeates nearly every aspect of modern life. Information Theory, born fully grown from this paper, has been applied and mis-applied to a multitude of disciplines in the last 70-odd years, from quantum physics to psychology. Shannon himself famously decried those jumping on the ‘scientific bandwagon’ of Information Theory without sufficient mathematical rigour. Nevertheless, having a brief personal connection to Dr Shannon (and being extremely grateful for it), I will take the liberty of colouring some of my experience with computer network music with less-than-rigorous insights gained from his work.


Author(s):  
P. K. Paul ◽  
D. Chatterjee ◽  
A. Bhuimali

Quantum information science (QIS) is a combination of quantum science (which combines radio physics, condensed physics, and electronics) and information science (which combines computer science, information technology, mathematics, information studies, and documentation studies). Quantum information science (QIS) is actually an extension of quantum computing. Quantum information science (QIS) is mistakenly taken as quantum information theory, but it has several differences with this. Quantum information science (QIS) is mainly responsible for improved and faster acquisition, transmission, and processing of information. The 20th century is marked by three monumental achievements, namely, computer science, quantum physics, and information theory, which have not only stunned the civilized world but also ushered into a new world – a new paradigm of science and technology.


2018 ◽  
pp. 813-845
Author(s):  
Ahmed Mahmoud Abbas

Quantum cryptography is known the most up-to-date in domain of realistic cryptography notably the menace of quantum cryptanalysis which threatens security firmness of public key cryptography. Quantum cryptography has a famous scheme known as Quantum Key Exchange (QKE), that administrates generation and distribution of a secured random key between legitimate channel users depicted as sender and receiver. Consequently, such key could be used as a key for one-time pad hybrid cryptosystems to encrypt and authenticate messages over a quantum channel. (QKE) is based on unifying quantum physics concepts and information theory with conventional cryptographic schemes that target to produce a short secret session key between any two legitimate parties. An important phase in key creation of BB84 protocol is Privacy Amplification phase where two interconnecting parties distill highly secret shared key from a larger body of shared key, which is only partially secret. The two legitimate parties publicly exchange information to create a compressed key free from biased bits known by an eavesdropper.


1980 ◽  
Vol 10 (11-12) ◽  
pp. 875-885
Author(s):  
C. D'Antonl ◽  
P. Scanzano

Author(s):  
Ahmed Mahmoud Abbas

Quantum cryptography is known the most up-to-date in domain of realistic cryptography notably the menace of quantum cryptanalysis which threatens security firmness of public key cryptography. Quantum cryptography has a famous scheme known as Quantum Key Exchange (QKE), that administrates generation and distribution of a secured random key between legitimate channel users depicted as sender and receiver. Consequently, such key could be used as a key for one-time pad hybrid cryptosystems to encrypt and authenticate messages over a quantum channel. (QKE) is based on unifying quantum physics concepts and information theory with conventional cryptographic schemes that target to produce a short secret session key between any two legitimate parties. An important phase in key creation of BB84 protocol is Privacy Amplification phase where two interconnecting parties distill highly secret shared key from a larger body of shared key, which is only partially secret. The two legitimate parties publicly exchange information to create a compressed key free from biased bits known by an eavesdropper.


2019 ◽  
Vol 52 (32) ◽  
pp. 320201 ◽  
Author(s):  
Gerardo Adesso ◽  
Nilanjana Datta ◽  
Michael J W Hall ◽  
Takahiro Sagawa

Symmetry ◽  
2020 ◽  
Vol 12 (7) ◽  
pp. 1135
Author(s):  
Stefan Heusler ◽  
Paul Schlummer ◽  
Malte S. Ubben

We argue that the usual Bloch sphere is insufficient in various aspects for the representation of qubits in quantum information theory. For example, spin flip operations with the quaternions I J K = e 2 π i 2 = − 1 and J I K = + 1 cannot be distinguished on the Bloch sphere. We show that a simple knot theoretic extension of the Bloch sphere representation is sufficient to track all unitary operations for single qubits. Next, we extend the Bloch sphere representation to entangled states using knot theory. As applications, we first discuss contextuality in quantum physics—in particular the Kochen-Specker theorem. Finally, we discuss some arguments against many-worlds theories within our knot theoretic model of entanglement. The key ingredients of our approach are symmetries and geometric properties of the unitary group.


2019 ◽  
Vol 52 (47) ◽  
pp. 479501
Author(s):  
Gerardo Adesso ◽  
Nilanjana Datta ◽  
Michael J W Hall ◽  
Takahiro Sagawa

Entropy ◽  
2019 ◽  
Vol 21 (9) ◽  
pp. 854 ◽  
Author(s):  
Mohammad H. Ansari ◽  
Alwin van Steensel ◽  
Yuli V. Nazarov

Currently, ‘time’ does not play any essential role in quantum information theory. In this sense, quantum information theory is underdeveloped similarly to how quantum physics was underdeveloped before Erwin Schrödinger introduced his famous equation for the evolution of a quantum wave function. In this review article, we cope with the problem of time for one of the central quantities in quantum information theory: entropy. Recently, a replica trick formalism, the so-called ‘multiple parallel world’ formalism, has been proposed that revolutionizes entropy evaluation for quantum systems. This formalism is one of the first attempts to introduce ‘time’ in quantum information theory. With the total entropy being conserved in a closed system, entropy can flow internally between subsystems; however, we show that this flow is not limited only to physical correlations as the literature suggest. The nonlinear dependence of entropy on the density matrix introduces new types of correlations with no analogue in physical quantities. Evolving a number of replicas simultaneously makes it possible for them to exchange particles between different replicas. We will summarize some of the recent news about entropy in some example quantum devices. Moreover, we take a quick look at a new correspondence that was recently proposed that provides an interesting link between quantum information theory and quantum physics. The mere existence of such a correspondence allows for exploring new physical phenomena as the result of controlling entanglement in a quantum device.


Sign in / Sign up

Export Citation Format

Share Document