scholarly journals JOINT PROBABILITIES REPRODUCING THREE EPR EXPERIMENTS ON TWO QUBITS

2007 ◽  
Vol 22 (23) ◽  
pp. 1717-1726 ◽  
Author(s):  
S. M. ROY ◽  
D. ATKINSON ◽  
G. AUBERSON ◽  
G. MAHOUX ◽  
V. SINGH

An eight-parameter family of the most general non-negative quadruple probabilities is constructed for EPR–Bohm–Aharonov experiments when only three pairs of analyser settings are used. It is a simultaneous representation of three different Bohr-incompatible experimental configurations involving mutually noncommuting observables valid for arbitrary quantum states.

Science ◽  
2019 ◽  
Vol 364 (6437) ◽  
pp. 260-263 ◽  
Author(s):  
Tiff Brydges ◽  
Andreas Elben ◽  
Petar Jurcevic ◽  
Benoît Vermersch ◽  
Christine Maier ◽  
...  

Entanglement is a key feature of many-body quantum systems. Measuring the entropy of different partitions of a quantum system provides a way to probe its entanglement structure. Here, we present and experimentally demonstrate a protocol for measuring the second-order Rényi entropy based on statistical correlations between randomized measurements. Our experiments, carried out with a trapped-ion quantum simulator with partition sizes of up to 10 qubits, prove the overall coherent character of the system dynamics and reveal the growth of entanglement between its parts, in both the absence and presence of disorder. Our protocol represents a universal tool for probing and characterizing engineered quantum systems in the laboratory, which is applicable to arbitrary quantum states of up to several tens of qubits.


2012 ◽  
Vol 99 (4) ◽  
pp. 40004 ◽  
Author(s):  
J. H. Shim ◽  
I. Niemeyer ◽  
J. Zhang ◽  
D. Suter

2021 ◽  
Author(s):  
Gopalan Raghavan

There is a looming threat over current methods of data encryption through advances in quantum computation. Interestingly, this potential threat can be countered through the use of quantum resources such as coherent superposition, entanglement and inherent randomness. These, together with non-clonability of arbitrary quantum states, offer provably secure means of sharing encryption keys between two parties. This physically assured privacy is however provably secure only in theory but not in practice. Device independent approaches seek to provide physically assured privacy of devices of untrusted origin. The quest towards realization of such devices is predicated on conducting loop-hole-free Bell tests which require the use of certified quantum random number generators. The experimental apparatuses for conducting such tests themselves use non-ideal sources, detectors and optical components making such certification extremely difficult. This expository chapter presents a brief overview (not a review) of Device Independence and the conceptual and practical difficulties it entails.


2021 ◽  
Vol 3 (3) ◽  
pp. 444-457
Author(s):  
Carlo Cafaro ◽  
Paul M. Alsing

We present a simple proof of the fact that the minimum time TAB for quantum evolution between two arbitrary states A and B equals TAB=ℏcos−1A|B/ΔE with ΔE being the constant energy uncertainty of the system. This proof is performed in the absence of any geometrical arguments. Then, being in the geometric framework of quantum evolutions based upon the geometry of the projective Hilbert space, we discuss the roles played by either minimum-time or maximum-energy uncertainty concepts in defining a geometric efficiency measure ε of quantum evolutions between two arbitrary quantum states. Finally, we provide a quantitative justification of the validity of the inequality ε≤1 even when the system only passes through nonorthogonal quantum states.


Quantum ◽  
2019 ◽  
Vol 3 ◽  
pp. 118
Author(s):  
Andrea López-Incera ◽  
Pavel Sekatski ◽  
Wolfgang Dür

We study the effect of local decoherence on arbitrary quantum states. Adapting techniques developed in quantum metrology, we show that the action of generic local noise processes --though arbitrarily small-- always yields a state whose Quantum Fisher Information (QFI) with respect to local observables is linear in system size N, independent of the initial state. This implies that all macroscopic quantum states, which are characterized by a QFI that is quadratic in N, are fragile under decoherence, and cannot be maintained if the system is not perfectly isolated. We also provide analytical bounds on the effective system size, and show that the effective system size scales as the inverse of the noise parameter p for small p for all the noise channels considered, making it increasingly difficult to generate macroscopic or even mesoscopic quantum states. In turn, we also show that the preparation of a macroscopic quantum state, with respect to a conserved quantity, requires a device whose QFI is already at least as large as the one of the desired state. Given that the preparation device itself is classical and not a perfectly isolated macroscopic quantum state, the preparation device needs to be quadratically bigger than the macroscopic target state.


2015 ◽  
Vol 13 (02) ◽  
pp. 1550012
Author(s):  
H. Eftekhari ◽  
E. Faizi

So far, one-way information deficit (OWID) has been calculated explicitly only for Bell-diagonal states and the four-parameter family of X-states with additional assumptions and expressions for more general quantum states are not known. In this paper, we derive explicit expressions for OWID for a larger class of two-qubit states, namely, a five-parameter family of two-qubit states. The dynamic behavior of the OWID under decoherence channel is investigated and it is shown that the OWID is more robust against the decoherence than the entanglement.


2021 ◽  
Vol 36 (37) ◽  
Author(s):  
Xi Huang ◽  
Shibin Zhang ◽  
Yan Chang ◽  
Fan Yang ◽  
Min Hou ◽  
...  

As one of the most important branches of quantum cryptography, quantum secure direct communication (QSDC) is used to transmit the secret message directly rather than distribute a random key. Quantum homomorphic encryption (QHE) enables arbitrary quantum transformation on encrypted data without decrypting the data. To date, the previously proposed QSDC schemes are mainly based on different quantum states. The research of the QSDC scheme based on QHE is still blank. In this paper, a QSDC scheme by taking advantage of the properties of QHE is proposed. The proposed protocol has applied QHE and decoy photons to prevent various types of attacks. The proposed scheme only utilizes the rotation operation to encode the secret message which is easy to implement with the current technologies. Moreover, the communication efficiency and the qubit-utilization ratio are analyzed in this paper, which shows that this protocol has good performance in the qubit-utilization ratio, and the qubit efficiency of the QSDC scheme has improved.


Nature ◽  
2009 ◽  
Vol 459 (7246) ◽  
pp. 546-549 ◽  
Author(s):  
Max Hofheinz ◽  
H. Wang ◽  
M. Ansmann ◽  
Radoslaw C. Bialczak ◽  
Erik Lucero ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document