Vol.7
No.1&2
January 1, 2007
Review:
An introduction to
entanglement measures (pp001-051) PDF
M.B. Plenio
and S. Virmani
We review the theory of entanglement measures,
concentrating mostly on the finite dimensional two-party case. Topics
covered include: single-copy and asymptotic entanglement manipulation;
the entanglement of formation; the entanglement cost; the distillable
entanglement; the relative entropic measures; the squashed entanglement;
log-negativity; the robustness monotones; the greatest cross-norm;
uniqueness and extremality theorems. Infinite dimensional systems and
multi-party settings will be discussed briefly.
Research Articles:
Modeling ion trap
thermal noise decoherence (pp052-072) PDF
D.
Leibrandt, B. Yurke, and R. Slusher
We present a detailed analysis of ion heating caused by
thermal fluctuation noise in ion traps. The results of the analysis are
used to estimate thermal noise ion heating rates for a variety of trap
electrode configurations and materials, including recent scalable
multiplexed planar ion trap proposals based on silicon VLSI technology.
We find that minimizing thermal noise ion heating places severe
constraints on the design and materials used for ion traps.
Time-shift attack in
practical quantum cryptosystems (pp073-082) PDF
B. Qi,
C.-H.
F.
Fung, H.-K. Lo,
and F.-X. Ma
Recently, a new type of attack, which exploits the
efficiency mismatch of two single photon detectors (SPD) in a quantum
key distribution (QKD) system, has been proposed. In this paper, we
propose another ``time-shift'' attack that exploits the same
imperfection. In our attack, Eve shifts the arrival time of either the
signal pulse or the synchronization pulse or both between Alice and Bob.
In particular, in a QKD system where Bob employs time-multiplexing
technique to detect both bit "0'' and bit "1'' with the same SPD, Eve,
in some circumstances, could acquire full information on the final key
without introducing any error. In addition, we prove that if Alice and
Bob are unaware of our attack, the final key they share is insecure. We
emphasize that our attack is simple and feasible with current
technology. Finally, we discuss some counter measures against our and
earlier attacks.
Hidden symmetry
detection on a quantum computer (pp083-092) PDF
R.
Schutzhold and W.G. Unruh
The fastest quantum algorithms (for the solution of
classical computational tasks) known so far are basically variations of
the hidden subgroup problem with {$f(U[x])=f(x)$}. Following a
discussion regarding which tasks might be solved efficiently by quantum
computers, it will be demonstrated by means of a simple example, that
the detection of more general hidden (two-point) symmetries {$V\{f(x),f(U[x])\}=0$}
by a quantum algorithm can also admit an exponential speed-up. E.g., one
member of this class of symmetries {$V\{f(x),f(U[x])\}=0$} is discrete
self-similarity (or discrete scale invariance).
Quantum walks on
directed graphs (pp093-102) PDF
A. Montanaro
We consider the definition of quantum walks on directed
graphs. Call a directed graph reversible if, for each pair of
vertices $(v_i, v_j)$, if $v_i$ is connected to $v_j$ then there is a
path from $v_j$ to $v_i$. We show that reversibility is a necessary and
sufficient condition for a directed graph to allow the notion of a
discrete-time quantum walk, and discuss some implications of this
condition. We present a method for defining a "partially quantum'' walk
on directed graphs that are not reversible.
Invertible quantum
operations and perfect encryption of quantum states (pp103-110) PDF
A. Nayak and P. Sen
In this note, we characterize the form of an invertible
quantum operation, i.e., a completely positive trace preserving linear
transformation (a CPTP map) whose inverse is also a CPTP map. The
precise form of such maps becomes important in contexts such as
self-testing and encryption. We show that these maps correspond to
applying a unitary transformation to the state along with an ancilla
initialized to a fixed state, which may be mixed. The characterization
of invertible quantum operations implies that one-way schemes for
encrypting quantum states using a classical key may be slightly more
general than the "private quantum channels'' studied by Ambainis, Mosca,
Tapp and de Wolf {AmbainisMTW00}. Nonetheless, we show that their
results, most notably a lower bound of 2n bits of key to encrypt
n quantum bits, extend in a straightforward manner to the general
case.
Multiplayer quantum
minority game with decoherence (pp111-126) PDF
A.P. Flitney and
L.L.C. Hollenberg
A quantum version of the Minority game for an arbitrary
number of agents is considered. It is known that when the number of
agents is odd, quantizing the game produces no advantage to the players,
but for an even number of agents new Nash equilibria appear that have no
classical analogue and have improved payoffs. We study the effect on the
Nash equilibrium payoff of various forms of decoherence. As the number
of players increases the multipartite GHZ state becomes increasingly
fragile, as indicated by the smaller error probability required to
reduce the Nash equilibrium payoff to the classical level.
Feedback control for
communication with non-orthogonal states (pp127-138)
PDF
K. Jacobs
Communicating classical information with a quantum system
involves the receiver making a measurement on the system so as to
distinguish as well as possible the alphabet of states used by the
sender. We consider the situation in which this measurement takes an
appreciable time. In this case the measurement must be described by a
continuous measurement process. We consider a continuous implementation
of the optimal measurement for distinguishing between two non-orthogonal
states, and show that feedback control can be used during this
measurement to increase the rate at which the information regarding the
initial preparation is obtained. We show that while the maximum
obtainable increase is modest, the effect is purely quantum mechanical
in the sense that the enhancement is only possible when the initial
states are non-orthogonal. We find further that the enhancement in the
rate of information gain is achieved at the expense of reducing the
total information which the measurement can extract in the long-time
limit.
Fault-tolerant quantum
computation for local leakage faults (pp139-156) PDF
P. Aliferis and B.M.
Terhal
We provide a rigorous analysis of fault-tolerant quantum
computation in the presence of local leakage faults. We show that one
can systematically deal with leakage by using appropriate
leakage-reduction units such as quantum teleportation. The leakage noise
is described microscopically, by Hamiltonian couplings, and the noise is
treated coherently, similar to general non-Markovian noise analyzed in
Refs. \cite{Terhal04} and \cite{Aliferis05b}. We describe ways to limit
the use of leakage-reduction units while keeping the quantum circuits
fault-tolerant and we also discuss how leakage reduction by
teleportation is naturally achieved in measurement-based computation.
An anomaly of
non-locality (pp157-170) PDF
A.A. Methot and V. Scarani
Ever since the work of Bell, it has been known that
entangled quantum states can produce non-local correlations between the
outcomes of separate measurements. However, for almost forty years, it
has been assumed that the most non-local states would be the maximally
entangled ones. Surprisingly it is not the case: non-maximally entangled
states are generally more non-local than maximally entangled states for
all the measures of non-locality proposed to date: Bell inequalities,
the Kullback-Leibler distance, entanglement simulation with
communication or with non-local boxes, the detection loophole and
efficiency of cryptography. In fact, one can even find simple examples
in low dimensions, confirming that it is not an artefact of a
specifically constructed Hilbert space or topology. This anomaly shows
that entanglement and non-locality are not only different concepts, but
also truly different resources. We review the present knowledge on this
anomaly, point out that Hardy's theorem has the same feature, and
discuss the perspectives opened by these discoveries.
back to QIC online Front page
|