A Short Tour of the Laws of Entanglement (And How to Evade Them)

Total Page:16

File Type:pdf, Size:1020Kb

A Short Tour of the Laws of Entanglement (And How to Evade Them) A Short Tour of the Laws of Entanglement (And How to Evade Them) Patrick Hayden Stanford University 59 units 60 units Simons Ins<tute UC Berkeley 2014 From the Universal Compendium of Rock Solid Physico-Informa;onal Facts • §1.0.1. – Entanglement cannot be created without interacon – Evasion strategy: embezzlement – Applicaons • §1.0.2. – Entanglement is monogamous – One mathemacal formulaon – No applicaons The Great Laws: Part 1 §1.0.0. Thou shalt not create correla;on without a commensurate investment of interac<on. σAB I(A; B)σ I(A; B)⇢ A B N ⌦ M ⇢AB Embezzlement TheU from a reservoir of wealth sufficiently large that the crime is not no<ced. (Un<l it is.) Embezzling entanglement U U AA0 BB0 The perfect crime: φ AB 00 A B ⌦ φ AB A B | i | i 0 0 ! | i | i 0 0 φ φ A | i B A | i B UAA 0 VBB0 = A’ 00 B’ A’ B’ | i | i Extract the entangled state ψ from the entanglement bank φ without leaving behind a trace in the bank. Trivial solu<on: the infinite reservoir φ =( )⌦1 | iAB | i Drawbacks: * Not even the Federal Reserve has an infinite amount of entanglement * Must keep a separate account for every possible Ψ Embezzling states 1 n 1 φn = j A j B | i pC pj | i | i n j=1 X φn φn A | i B A | i B U AA0 VBB0 A’ 00 B’ A’ B’ | i ' | i Theorem: For every pure state |ψ>A’B’ of Schmidt rank m, there exist unitary transformaons UAA’ and VBB’ such that log m AB φn A B UAA VBB φn AB 00 A B 1 h | 0 0 h | 0 ⌦ 0 | i | i 0 0 ≥ − log n #qubits(φ ) = O( #qubits(ψ)/ε ) for inner product 1-ε n [H-van Dam 2003] Embezzling Bell pairs n 1 1 1 φn = j A j B = ( 00 + 11 ) | i pC pj | i | i | i p2 | i | i n j=1 X Schmidt coefficients: 1 1 1 1 1 φn : | i pCn ⇥ p1 p2 p3 ··· pn 1 1 1 1 1 p1 2 p2 2 p3 2 ··· pn 2 φn : · · · · | i| i pCn ⇥ 1 1 1 1 p1 2 p2 2 p3 2 ··· pn 2 · · · · Embezzling Bell pairs n 1 1 1 φn = j A j B = ( 00 + 11 ) | i pC pj | i | i | i p2 | i | i n j=1 X Schmidt coefficients: 1 1 1 1 1 1 1 φn : | i pC ⇥ p1 p2 p3 p4 ··· pn 1 pn n − 1 1 1 1 1 1 1 φn : | i| i pCn ⇥ p2 p2 p4 p4 ··· pn pn ··· 1 1 1 1 1 1 1 Dot product + + + + + + ≥ C ⇥ 2 2 4 4 ··· n n n ✓ ◆ log(n/2) log 2 =1 ≥ log(n) − log n and much earlier Further developments • [Araki ~1967]: – Exploited (exact) embezzlement in the classificaon of von Neumann algebras • [Leung+Toner+Watrous 2013*]: – Embezzlement for mul<party states • [Dinur+Steurer+Vidick 2013]: – Robust embezzlement • Alice and Bob don’t quite agree on the target state ψ – a.k.a. Quantum correlated sampling lemma – Key step in proving parallel repe<<on for projec<on games • [Leung+Wang 2013]: – Characteris<cs of universal embezzling states • [Haagerup+Scholz+Werner 2014?]: – Universal embezzling algebra • Uniquenessness of universal embezzling “eigenvalue” scaling • Every state in free quantum field theory is embezzling! * Really 2008, but who can be bothered to submit to journals in a <mely fashion these days? Applicaon: Mul<player quantum games j k ⇢ Xj Y k { a} { b } For 2-player games, blow-up in size of shared entangled state is Open queson: polynomial. Best known mul<party universal embezzling states are doubly a b exponen<ally large. Is it possible to do beyer? j k !⇤ =sup sup Ea,b V (j, k a, b)tr[⇢Xa Yb ] dim=:n X,Y,⇢ | ⌦ a,b,j,kX j k =supsup Ea,b V (j, k a, b)tr[⇢nXa Yb ] dim=:n X,Y | ⌦ a,b,j,kX Schmidt rank n embezzling state [Oliveira 2010] Applicaon: Games can require unbounded entanglement 2-player cooperave quantum game DEBBIE LEUNG,BEN TONER, AND JOHN WATROUS Let’s play… φy 1 | i ⇢ RST = ( 0 R 00 ST + 1 R ST ) φ | i p2 | i | i | i | i | ebzi 1 where ST = ( 11 ST + 22 ST ) Alice Bob | i p2 | i | i φ>. Goal: Winning probability approaches 1 as dimension of embezzling state goes to infinity. 1 S T A B win RAB = ( 000 RAB + 111 RAB). Can prove that it is bounded away from 1 for all finite dimensional || i p2 | i | i R Easy if Alice and Bob could apply unitaries r to all of ST since |00> and |ψ> are orthogonal. Figure 1: An illustrationGeneralizes usual model: of a two-player, one-round cooperative quantum game. They can’t because they are separated… quantum messages Definition 3.1 (Two-player, one-round cooperative quantum game). Let R,S,T,A,B be finite-dimensional quantum registers, let r be a quantum state of the registers (R,S,T), and let M be a binary measurementBut since they can coherently embezzle |ψ> from on the registers (R,A,B). Referee performs a projec<on |φebz> they can also coherently unembezzle it! 1. The referee preparesto determine win/loss. (R,S,T) in the state r, and then sends S to Alice and T to Bob. [Leung-Toner-Watrous 2008/13] 2. Alice and Bob transform the registers S and T sent to them however they choose, resulting in registers A and B that are sent back to the referee. 3. The referee applies the binary measurement M on the registers (R,A,B). The outcome 1 means that Alice and Bob win, while the outcome 0 means that they lose. The usual restrictions for provers in a quantum interactive proof system apply to Alice and Bob: they are not permitted to communicate once the game begins, but may agree on a strategy beforehand. Such a strategy may include the sharing of an entangled state y of their own choosing, which they may use | i when transforming the registers sent to them via local quantum operations. Alice’s most general strategy is to apply a quantum channel to S together with her share of the entangled state, outputting A. A general strategy for Bob may be described in a similar way. The complexity of the referee, which corresponds to the verifier in an interactive proof system, is ignored given that we no longer consider an input string. We note that two-player, one-round cooperative quantum games represent a generalization of the non- local games model of [14], where now the referee can send, receive, and process quantum information. CHICAGO JOURNAL OF THEORETICAL COMPUTER SCIENCE 2013, Article 11, pages 1–18 8 Same thing twice, just as nice This idea was originally used as part of the proof of the Quantum Reverse Shannon Theorem: Asympto<cally, every quantum channel can simulate every other using a rate of forward noiseless communicaon given by the rao of their entanglement-assisted capaci<es plus shared entanglement. 26 Embezzlement-assisted QRST in Schur Basis, for general source and channel Purification of a general state input to n instances of quantum channel R E Coherent E Simulation n Trans- A B pE of () form V n acting on to purified Schur input Small Basis Flat sub-channel O(log n) encoding and quantum Alice’s part of pA message Alice’s State Splitting Alice’s Lab part of nQ +o(n) embez- E Random Leftover qubits transfer for state splitting zlement permutation embezzling to symmetrize state Embezzling input. State Variable number of B ebits embezzled. Bob’s part Environment never pB of state learns how many. Bob’s splitting part of embez- Leftover zlement Bob’s Lab embezzling state Fig. 12. QRST on a general input using an entanglement-embezzling state (green). Alice first applies a randomizing permutation ⇡ to the inputs to n instances of her quantum channel, using information shared with Bob (magenta), thereby rendering the overall input approximately permutation-symmetric. * She then uses the ⌧B register to embezzle the correct superposition of (possibly[Benne- very) different amounts of entanglementDevetak needed by her sub-channel-Harrow- encoder, Shor-Winter 2009 ] leaving a negligibly degraded embezzling state behind. At the receiving end (lower right) Bob performs his half of the embezzlement, coherently decodes the sub-channel codes, and undoes the random permutation. The shared randomness needed for the initial randomizing permutation can also be obtained from the embezzling state, and in any case can be made sublinear in n, as shown in Lemma 14. m✏/2 from µ, then with probability 1 D (4/e)− , for any Inefficiencies and errors: Here we briefly tabulate the ≥ − A , various sources of inefficiency and error in our simulation | i m protocols for quantum channels. We will consider allowing 1 2 an inefficiency of O(nδ) in each step of the protocol and will (I U †V˜ †VU) 1 6✏. (87) m |h | ⌦ i i | i| ≥ − i=1 analyze the resulting errors. X Proof: Let ∆ := I V˜ †V . Observe that ∆ 2 and 1) In Lemma 11, an extra communication rate of O(nδ) − k k1 that Eq. (86) implies that ∆ 1 =Tr∆ ✏DA. Define means that the splitting step incurs an error of k k exp( nδ). − Tr ∆ 2) When restricting to typical triples, our definition of ∆0 := EU µ[U∆U †]= I ✏I (88) ⇠ DA T n was chosen so that entropic quantities such as m ,δ 1 HN(Rn)+H(Bn) H(En) would change by nδ + ∆¯ := U ∆U †, (89) − m i i o(n).
Recommended publications
  • A Paradox Regarding Monogamy of Entanglement
    A paradox regarding monogamy of entanglement Anna Karlsson1;2 1Institute for Advanced Study, School of Natural Sciences 1 Einstein Drive, Princeton, NJ 08540, USA 2Division of Theoretical Physics, Department of Physics, Chalmers University of Technology, 412 96 Gothenburg, Sweden Abstract In density matrix theory, entanglement is monogamous. However, we show that qubits can be arbitrarily entangled in a different, recently constructed model of qubit entanglement [1]. We illustrate the differences between these two models, analyse how the density matrix property of monogamy of entanglement originates in assumptions of classical correlations in the construc- tion of that model, and explain the counterexample to monogamy in the alternative model. We conclude that monogamy of entanglement is a theoretical assumption, not necessarily a phys- ical property, and discuss how contemporary theory relies on that assumption. The properties of entanglement entropy are very different in the two models — a priori, the entropy in the alternative model is classical. arXiv:1911.09226v2 [hep-th] 7 Feb 2020 Contents 1 Introduction 1 1.1 Indications of a presence of general entanglement . .2 1.2 Non-signalling and detection of general entanglement . .3 1.3 Summary and overview . .4 2 Analysis of the partial trace 5 3 A counterexample to monogamy of entanglement 5 4 Implications for entangled systems 7 A More details on the different correlation models 9 B Entropy in the orthogonal information model 11 C Correlations vs entanglement: a tolerance for deviations 14 1 Introduction The topic of this article is how to accurately model quantum correlations. In quantum theory, quan- tum systems are currently modelled by density matrices (ρ) and entanglement is recognized to be monogamous [2].
    [Show full text]
  • Do Black Holes Create Polyamory?
    Do black holes create polyamory? Andrzej Grudka1;4, Michael J. W. Hall2, Michał Horodecki3;4, Ryszard Horodecki3;4, Jonathan Oppenheim5, John A. Smolin6 1Faculty of Physics, Adam Mickiewicz University, 61-614 Pozna´n,Poland 2Centre for Quantum Computation and Communication Technology (Australian Research Council), Centre for Quantum Dynamics, Griffith University, Brisbane, QLD 4111, Australia 3Institute of Theoretical Physics and Astrophysics, University of Gda´nsk,Gda´nsk,Poland 4National Quantum Information Center of Gda´nsk,81–824 Sopot, Poland 5University College of London, Department of Physics & Astronomy, London, WC1E 6BT and London Interdisciplinary Network for Quantum Science and 6IBM T. J. Watson Research Center, 1101 Kitchawan Road, Yorktown Heights, NY 10598 Of course not, but if one believes that information cannot be destroyed in a theory of quantum gravity, then we run into apparent contradictions with quantum theory when we consider evaporating black holes. Namely that the no-cloning theorem or the principle of entanglement monogamy is violated. Here, we show that neither violation need hold, since, in arguing that black holes lead to cloning or non-monogamy, one needs to assume a tensor product structure between two points in space-time that could instead be viewed as causally connected. In the latter case, one is violating the semi-classical causal structure of space, which is a strictly weaker implication than cloning or non-monogamy. This is because both cloning and non-monogamy also lead to a breakdown of the semi-classical causal structure. We show that the lack of monogamy that can emerge in evaporating space times is one that is allowed in quantum mechanics, and is very naturally related to a lack of monogamy of correlations of outputs of measurements performed at subsequent instances of time of a single system.
    [Show full text]
  • Firewalls and the Quantum Properties of Black Holes
    Firewalls and the Quantum Properties of Black Holes A thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science degree in Physics from the College of William and Mary by Dylan Louis Veyrat Advisor: Marc Sher Senior Research Coordinator: Gina Hoatson Date: May 10, 2015 1 Abstract With the proposal of black hole complementarity as a solution to the information paradox resulting from the existence of black holes, a new problem has become apparent. Complementarity requires a vio- lation of monogamy of entanglement that can be avoided in one of two ways: a violation of Einstein’s equivalence principle, or a reworking of Quantum Field Theory [1]. The existence of a barrier of high-energy quanta - or “firewall” - at the event horizon is the first of these two resolutions, and this paper aims to discuss it, for Schwarzschild as well as Kerr and Reissner-Nordstr¨omblack holes, and to compare it to alternate proposals. 1 Introduction, Hawking Radiation While black holes continue to present problems for the physical theories of today, quite a few steps have been made in the direction of understanding the physics describing them, and, consequently, in the direction of a consistent theory of quantum gravity. Two of the most central concepts in the effort to understand black holes are the black hole information paradox and the existence of Hawking radiation [2]. Perhaps the most apparent result of black holes (which are a consequence of general relativity) that disagrees with quantum principles is the possibility of information loss. Since the only possible direction in which to pass through the event horizon is in, toward the singularity, it would seem that information 2 entering a black hole could never be retrieved.
    [Show full text]
  • The QBIT Theory of Consciousness
    Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 26 August 2019 doi:10.20944/preprints201905.0352.v4 The QBIT theory of consciousness Majid Beshkar Tehran University of Medical Sciences [email protected] [email protected] Abstract The QBIT theory is an attempt toward solving the problem of consciousness based on empirical evidence provided by various scientific disciplines including quantum mechanics, biology, information theory, and thermodynamics. This theory formulates the problem of consciousness in the following four questions, and provides preliminary answers for each question: Question 1: What is the nature of qualia? Answer: A quale is a superdense pack of quantum information encoded in maximally entangled pure states. Question 2: How are qualia generated? Answer: When a pack of quantum information is compressed beyond a certain threshold, a quale is generated. Question 3: Why are qualia subjective? Answer: A quale is subjective because a pack of information encoded in maximally entangled pure states are essentially private and unshareable. Question 4: Why does a quale have a particular meaning? Answer: A pack of information within a cognitive system gradually obtains a particular meaning as it undergoes a progressive process of interpretation performed by an internal model installed in the system. This paper introduces the QBIT theory of consciousness, and explains its basic assumptions and conjectures. Keywords: Coherence; Compression; Computation; Consciousness; Entanglement; Free-energy principle; Generative model; Information; Qualia; Quantum; Representation 1 © 2019 by the author(s). Distributed under a Creative Commons CC BY license. Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 26 August 2019 doi:10.20944/preprints201905.0352.v4 Introduction The problem of consciousness is one of the most difficult problems in biology, which has remained unresolved despite several decades of scientific research.
    [Show full text]
  • Symmetrized Persistency of Bell Correlations for Dicke States and GHZ-Based Mixtures: Studying the Limits of Monogamy
    Symmetrized persistency of Bell correlations for Dicke states and GHZ-based mixtures: Studying the limits of monogamy Marcin Wieśniak ( [email protected] ) University of Gdańsk Research Article Keywords: quantum correlations, Bell correlations, GHZ mixtures, Dicke states Posted Date: February 26th, 2021 DOI: https://doi.org/10.21203/rs.3.rs-241777/v1 License: This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License Version of Record: A version of this preprint was published at Scientic Reports on July 12th, 2021. See the published version at https://doi.org/10.1038/s41598-021-93786-5. Symmetrized persistency of Bell correlations for Dicke states and GHZ-based mixtures: Studying the limits of monogamy. Marcin Wiesniak´ 1,2,* 1Institute of Theoretical Physics and Astrophysics, Faculty of Mathematics, Physics, and Informatics,, University of Gdansk,´ 80-308 Gdansk,´ Poland 2International Centre for Theory of Quantum Techologies, University of Gdansk,´ 80-308 Gdansk,´ Poland *[email protected] ABSTRACT Quantum correlations, in particular those, which enable to violate a Bell inequality1, open a way to advantage in certain communication tasks. However, the main difficulty in harnessing quantumness is its fragility to, e.g, noise or loss of particles. We study the persistency of Bell correlations of GHZ based mixtures and Dicke states. For the former, we consider quantum communication complexity reduction (QCCR) scheme, and propose new Bell inequalities (BIs), which can be used in that scheme for higher persistency in the limit of large number of particles N. In case of Dicke states, we show that persistency can reach 0.482N, significantly more than reported in previous studies.
    [Show full text]
  • Quantum Entanglement in the 21St Century
    Quantum entanglement in the 21 st century John Preskill The Quantum Century: 100 Years of the Bohr Atom 3 October 2013 My well-worn copy, bought in 1966 when I was 13. George Gamow, recalling Bohr’s Theoretical Physics Institute 1928-31: Bohr’s Institute quickly became the world center of quantum physics, and to paraphrase the old Romans, “all roads led to Blegdamsvej 17” … The popularity of the institute was due both to the genius of its director and his kind, one might say fatherly, heart … Almost every country in the world has physicists who proudly say: “I used to work with Bohr.” Thirty Years That Shook Physics , 1966, p. 51. George Gamow, recalling Bohr’s Theoretical Physics Institute 1928-31: Bohr, Fru Bohr, Casimir, and I were returning home from the farewell dinner for Oscar Klein on the occasion of his election as a university professor in his native Sweden. At that late hour the streets of the city were empty. On the way home we passed a bank building with walls of large cement blocks. At the corner of the building the crevices between the courses of the blocks were deep enough to give a toehold to a good alpinist. Casimir, an expert climber, scrambled up almost to the third floor. When Cas came down, Bohr, inexperienced as he was, went up to match the deed. When he was hanging precariously on the second-floor level, and Fru Bohr, Casimir, and I were anxiously watching his progress, two Copenhagen policeman approached from behind with their hands on their gun holsters.
    [Show full text]
  • Engineering of Entanglement and Spin State Transfer Via Quantum Chains
    www.nature.com/scientificreports OPEN Engineering of entanglement and spin state transfer via quantum chains of atomic spins at large Received: 19 April 2018 Accepted: 29 August 2018 separations Published: xx xx xxxx Dmitry I. Bazhanov1,2,3, Ilia N. Sivkov4 & Valeri S. Stepanyuk1 Several recent experiments have shown that long-range exchange interactions can determine collective magnetic ground states of nanostructures in bulk and on surfaces. The ability to generate and control entanglement in a system with long-range interaction will be of great importance for future quantum technology. An important step forward to reach this goal is the creation of entangled states for spins of distant magnetic atoms. Herein, the generation of long-distance entanglement between remote spins at large separations in bulk and on surface is studied theoretically, based on a quantum spin Hamiltonian and time-dependent Schrödinger equation for experimentally realized conditions. We demonstrate that long-distance entanglement can be generated between remote spins by using an appropriate quantum spin chain (a quantum mediator), composed by sets of antiferromagnetically coupled spin dimers. Ground state properties and quantum spin dynamics of entangled atoms are studied. We demonstrate that one can increase or suppress entanglement by adding a single spin in the mediator. The obtained result is explained by monogamy property of entanglement distribution inside a quantum spin system. We present a novel approach for non-local sensing of remote magnetic adatoms via spin entanglement. In diverse systems, long-range interactions between magnetic adatoms on surfaces were investigated both the- oretically and in experiments1–11. Indirect coupling can be mediated by surface and bulk electrons(RKKY), superexchange or can be of dipole-dipole origin.
    [Show full text]
  • Monogamy of Correlations Versus Monogamy of Entanglement
    Quantum Inf Process (2010) 9:273–294 DOI 10.1007/s11128-009-0161-6 Monogamy of correlations versus monogamy of entanglement M. P. Seevinck Received: 31 July 2009 / Accepted: 21 December 2009 / Published online: 16 January 2010 © The Author(s) 2010. This article is published with open access at Springerlink.com Abstract A fruitful way of studying physical theories is via the question whether the possible physical states and different kinds of correlations in each theory can be shared to different parties. Over the past few years it has become clear that both quan- tum entanglement and non-locality (i.e., correlations that violate Bell-type inequali- ties) have limited shareability properties and can sometimes even be monogamous. We give a self-contained review of these results and present new results on the shareability of different kinds of correlations, including local, quantum and no-signalling corre- lations. This includes an alternative simpler proof of the Toner-Verstraete monogamy inequality for quantum correlations, as well as a strengthening thereof. Further, the relationship between sharing non-local quantum correlations and sharing mixed entan- gled states is investigated, and already for the simplest case of bi-partite correlations and qubits this is shown to be non-trivial. Also, a recently proposed new interpretation of Bell’s theorem by Schumacher in terms of shareability of correlations is critically assessed. Finally, the relevance of monogamy of non-local correlations for secure quantum key distribution is pointed out, and in this regard it is stressed that not all non-local correlations are monogamous. Keywords Quantum mechanics · Entanglement · Non-locality · Monogamy · No-signalling · Shareability · Cryptography M.
    [Show full text]
  • Generalised Monogamy Relation of Convex-Roof Extended Negativity In
    www.nature.com/scientificreports OPEN Generalised monogamy relation of convex-roof extended negativity in multi-level systems Received: 29 June 2016 Tian Tian, Yu Luo & Yongming Li Accepted: 19 October 2016 In this paper, we investigate the generalised monogamy inequalities of convex-roof extended Published: 18 November 2016 negativity (CREN) in multi-level systems. The generalised monogamy inequalities provide the upper and lower bounds of bipartite entanglement, which are obtained by using CREN and the CREN of assistance (CRENOA). Furthermore, we show that the CREN of multi-qubit pure states satisfies some monogamy relations. Additionally, we test the generalised monogamy inequalities for qudits by considering the partially coherent superposition of a generalised W-class state in a vacuum and show that the generalised monogamy inequalities are satisfied in this case as well. Quantum entanglement is one of the most important physical resources in quantum information processing1–4. As distinguished from classical correlations, quantum entanglement cannot be freely shared among many objects. We call this important phenomenon of quantum entanglement monogamy5,6. The property of monogamy may be as fundamental as the no-cloning theorem7, which gives rise to structures of entanglement in multipartite settings8,9. Some monogamy inequalities have been studied to apply entanglement to more useful quantum infor- mation processing. The property of monogamy property has been considered in many areas of physics: it can be used to extract an estimate of the quantity of information about a secret key captured by an eavesdropper in quantum cryptography10,11, as well as the frustration effects observed in condensed matter physics12,13 and even black-hole physics14,15.
    [Show full text]
  • Quantum Cryptography: Key Distribution and Beyond
    Quantum Cryptography: Key Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth Radhakrishna 3 1 Group of Applied Physics, University of Geneva, Switzerland. E-mail: [email protected] 2 Jaypee Institute of Information Technology, Noida, India. E-mail: [email protected] 3 Poornaprajna Institute of Scientific Research, Bangalore, India. E-mail: [email protected] Editors: Subhash Kak, Tabish Qureshi & Danko Georgiev Article history: Submitted on December 21, 2016; Accepted on May 10, 2017; Published on June 18, 2017; Corrected on February 15, 2018. niquely among the sciences, quantum cryptog- in e-commerce today. RSA in today’s world is safe so raphy has driven both foundational research long as a scalable quantum computer remains unfeasible. Uas well as practical real-life applications. We However, ideally, we wish to guarantee cryptographic review the progress of quantum cryptography in the security that follows only from basic physics. This is the last decade, covering quantum key distribution and promise of quantum cryptography. other applications. In particular, note the recent report on a loophole-free Quanta 2017; 6: 1–47. test of Bell’s inequality [2], thereby conclusively veri- fying the existence of quantum nonlocality in Nature, 1 Introduction and also attesting to the advancement of experimental techniques to prepare, transmit, manipulate and measure Cryptography is the technique of concealing confiden- quantum information. Another direction in cryptography tial information using physical or mathematical means. is to provide practicable tools embracing experimental While cryptologists find newer methods to conceal a se- limitations, e.g. quantum key distribution with pulses cret, cryptanalysts devise powerful methods to compro- having mean photon number much larger than one [3].
    [Show full text]
  • Building a Quantum Engineering Undergraduate Program Abraham Asfaw, Alexandre Blais, Kenneth R
    1 Building a Quantum Engineering Undergraduate Program Abraham Asfaw, Alexandre Blais, Kenneth R. Brown, Jonathan Candelaria, Christopher Cantwell, Lincoln D. Carr, Joshua Combes, Dripto M. Debroy, John M. Donohue, Sophia E. Economou, Emily Edwards, Michael F. J. Fox, Steven M. Girvin, Alan Ho, Hilary M. Hurst, Zubin Jacob, Blake R. Johnson, Ezekiel Johnston-Halperin, Robert Joynt, Eliot Kapit, Judith Klein-Seetharaman, Martin Laforest, H. J. Lewandowski, Theresa W. Lynn, Corey Rae H. McRae, Celia Merzbacher, Spyridon Michalakis, Prineha Narang, William D. Oliver, Jens Palsberg, David P. Pappas, Michael G. Raymer, David J. Reilly, Mark Saffman, Thomas A. Searles, Jeffrey H. Shapiro, and Chandralekha Singh (Received, revised, accepted dates of manuscript.) This work was S. E. Economou is with the Department of Physics, Virginia Tech, partially supported by the U.S. National Science Foundation under Blacksburg, Virginia 24061, U.S.A. grant EEC-2110432. S. Girvin, T. A. Searles, and S. E. Economou E. Edwards is with the IQUIST, University of Illinois Urbana- were supported by the U.S. Department of Energy, Office of Science, Champaign, Urbana, IL 61801, U.S.A. National Quantum Information Science Research Centers, Co-design M. F. J. Fox and H. Lewandowski are with JILA, National Institute Center for Quantum Advantage (C2QA) under contract number DE- of Standards and Technology and the University of Colorado, Boulder, SC0012704. M. Raymer acknowledges support from the NSF Engi- CO 80309, U.S.A. and Department of Physics, University of Colorado neering Research Center for Quantum Networks (CQN), led by the Boulder, Boulder, CO 80309, U.S.A. University of Arizona under NSF grant number 1941583.
    [Show full text]
  • Jhep05(2021)062
    Published for SISSA by Springer Received: February 12, 2021 Accepted: April 12, 2021 Published: May 10, 2021 Probing Hawking radiation through capacity of JHEP05(2021)062 entanglement Kohki Kawabata,a Tatsuma Nishioka,b Yoshitaka Okuyamaa and Kento Watanabec aDepartment of Physics, Faculty of Science, The University of Tokyo, Bunkyo-ku, Tokyo 113-0033, Japan bYukawa Institute for Theoretical Physics, Kyoto University, Kitashirakawa Oiwakecho, Sakyo-ku, Kyoto 606-8502, Japan cCenter for Quantum Mathematics and Physics (QMAP), Department of Physics, University of California, Davis, CA 95616, U.S.A. E-mail: [email protected], [email protected], [email protected], [email protected] Abstract: We consider the capacity of entanglement in models related with the gravita- tional phase transitions. The capacity is labeled by the replica parameter which plays a similar role to the inverse temperature in thermodynamics. In the end of the world brane model of a radiating black hole the capacity has a peak around the Page time indicating the phase transition between replica wormhole geometries of different types of topology. Similarly, in a moving mirror model describing Hawking radiation the capacity typically shows a discontinuity when the dominant saddle switches between two phases, which can be seen as a formation of island regions. In either case we find the capacity can be an invaluable diagnostic for a black hole evaporation process. Keywords: 2D Gravity, Black Holes ArXiv ePrint: 2102.02425 Open Access, c The Authors. https://doi.org/10.1007/JHEP05(2021)062 Article funded by SCOAP3.
    [Show full text]