Breaking the Unbreakable: Exploiting Loopholes in Bell's Theorem To

Total Page:16

File Type:pdf, Size:1020Kb

Breaking the Unbreakable: Exploiting Loopholes in Bell's Theorem To Linköping Studies in Science and Technology Dissertation No. 1875 Breaking the Unbreakable: Jonathan Jogenfors Breaking Unbreakable the Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography Jonathan Jogenfors 2017 Linköping Studies in Science and Technology Dissertations, No. 1875 Breaking the Unbreakable Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography Jonathan Jogenfors Akademisk avhandling som för avläggande av doktorsexamen vid Linköpings Universitet kommer att offentligt försvaras i sal Ada Lovelace, hus B, universitetsområde Valla, freda- gen den 17 november 2017 kl. 13:00. Fakultetsopponent är Professor Marek Zukowski,˙ Instytut Fizyki Teoretycznej i Astrofizyki, Uniwersytet Gdanski.´ Abstract In this thesis we study device-independent quantum key distribution based on energy-time entanglement. This is a method for cryptography that promises not only perfect secrecy, but also to be a practical method for quantum key dis- tribution thanks to the reduced complexity when compared to other quantum key distribution protocols. However, there still exist a number of loopholes that must be understood and eliminated in order to rule out eavesdroppers. We study several relevant loopholes and show how they can be used to break the se- curity of energy-time entangled systems. Attack strategies are reviewed as well as their countermeasures, and we show how full security can be re-established. Quantum key distribution is in part based on the profound no-cloning theorem, which prevents physical states to be copied at a microscopic level. This important property of quantum mechanics can be seen as Nature’s own copy-protection, and can also be used to create a currency based on quantum mechanics, i.e., quantum money. Here, the traditional copy-protection mech- anisms of traditional coins and banknotes can be abandoned in favor of the laws of quantum physics. Previously, quantum money assumes a traditional hierarchy where a central, trusted bank controls the economy. We show how quantum money together with a blockchain allows for Quantum Bitcoin, a novel hybrid currency that promises fast transactions, extensive scalability, and full anonymity. URL: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-140912 ISBN 978-91-7685-460-0 ISSN 0345-7524 Linköping Studies in Science and Technology Dissertations, No. 1875 Breaking the Unbreakable Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography Jonathan Jogenfors Information Coding Group Department of Electrical Engineering Linköping University SE-581 83 Linköping, Sweden Linköping 2017 Breaking the Unbreakable: Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography Jonathan Jogenfors Author e-mail: [email protected] Cover image Layout of the Franson interferometer, a scheme used for testing the Bell inequality using energy-time entanglement. Edition 1:1 Copyright © 2017 Jonathan Jogenfors unless otherwise stated. All product names, logos, and brands are property of their respective owners. ISBN 978-91-7685-460-0 ISSN 0345-7524 URL http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-140912 Typeset using LuaLATEX Printed by LiU-Tryck, Linköping, Sweden 2017 iii <3To Anna<3 Abstract In this thesis we study device-independent quantum key distri- bution based on energy-time entanglement. This is a method for cryptography that promises not only perfect secrecy, but also to be a practical method for quantum key distribution thanks to the reduced complexity when compared to other quantum key distri- bution protocols. However, there still exist a number of loopholes that must be understood and eliminated in order to rule out eaves- droppers. We study several relevant loopholes and show how they can be used to break the security of energy-time entangled systems. Attack strategies are reviewed as well as their countermeasures, and we show how full security can be re-established. Quantum key distribution is in part based on the profound no-cloning theorem, which prevents physical states to be copied at a microscopic level. This important property of quantum me- chanics can be seen as Nature’s own copy-protection, and can also be used to create a currency based on quantum mechanics, i.e., quantum money. Here, the traditional copy-protection mecha- nisms of traditional coins and banknotes can be abandoned in favor of the laws of quantum physics. Previously, quantum money assumes a traditional hierarchy where a central, trusted bank controls the economy. We show how quantum money together with a blockchain allows for Quantum Bitcoin, a novel hybrid currency that promises fast transactions, extensive scalability, and full anonymity. vii Populärvetenskaplig sammanfattning En viktig konsekvens av kvantmekaniken är att okända kvanttill- stånd inte kan klonas. Denna insikt har gett upphov till kvant- kryptering, en metod för två parter att med perfekt säkerhet kom- municera hemligheter. Ett komplett bevis för denna säkerhet har dock låtit vänta på sig eftersom en attackerare i hemlighet kan manipulera utrustningen så att den läcker information. Som ett svar på detta utvecklades apparatsoberoende kvantkryptering som i teorin är immun mot sådana attacker. Apparatsoberoende kvantkryptering har en mycket högre grad av säkerhet än vanlig kvantkryptering, men det finns fortfarande ett par luckor som en attackerare kan utnyttja. Dessa kryphål har tidigare inte tagits på allvar, men denna avhandling visar hur även små svagheter i säkerhetsmodellen läcker information till en attackerare. Vi demonstrerar en praktisk attack där attackeraren aldrig upptäcks trots att denne helt kontrollerar systemet. Vi visar också hur kryphålen kan förhindras med starkare säkerhetsbevis. En annan tillämpning av kvantmekanikens förbud mot klo- ning är pengar som använder detta naturens egna kopieringsskydd. Dessa kvantpengar har helt andra egenskaper än vanliga mynt, sedlar eller digitala banköverföringar. Vi visar hur man kan kombi- nera kvantpengar med en blockkedja, och man får då man en slags “kvant-Bitcoin”. Detta nya betalningsmedel har fördelar över alla andra betalsystem, men nackdelen är att det krävs en kvantdator. ix Acknowledgments I would like to express gratitude to my advisor, Jan-Åke Lars- son, for his support, patience and encouragement throughout my graduate studies. His guidance has helped me tremendously, and thanks to him I was able to overcome the many hurdles I encountered in the process of performing this research. My thanks also go to my co-supervisor, Associate Professor Fredrik Karlsson for his guidance. I could not have done this without my awesome wife Anna. Writing this thesis has required long days and late nights, and she has supported me all this time. Thank you, Anna, for your love and understanding. I am so fortunate to have you by my side. My colleagues at the Information Coding Group and the De- partment of Electrical Engineering made me feel welcome from the first day. Special thanks to Niklas Johansson and Vahid Kesh- miri, who have endured sharing an office with me all these years. I am indebted to all those who have supported me, including Monica, Jan-Erik, and Andreas. Last but not least I would thank my parents, Eva and Stefan, and my sisters, Susanna and Elisabeth, for their continued support and love. Jonathan Jönköping, October 2017 xi Contents Abstract vii Acknowledgments xi Contents xiii List of Figures xvii List of Tables xxi List of Theorems xxiii List of Acronyms xxvii List of Symbols xxxi Preface xxxix 1 Introduction 1 1.1 History of Cryptography ............... 1 1.2 Fundamental Principles of Cryptography . 3 1.3 Public-Key Cryptography ............... 6 1.4 Cryptography and the Quantum World . 8 1.5 Outline ......................... 11 1.6 Included Publications . 13 2 Basic Concepts 19 2.1 Linear Algebra ..................... 19 xiii 2.2 Probability Theory ................... 20 2.3 Fundamental Quantum Mechanics . 21 3 Quantum Key Distribution 29 3.1 The BB84 Protocol . 31 3.2 Security Analysis of BB84 . 34 4 Bell’s Theorem 37 4.1 EPR and Hidden Variables . 37 4.2 Intuitive Explanation . 41 4.3 The Black Box Model . 44 4.4 Ekert’s QKD Protocol . 49 4.5 Device-Independent QKD . 51 5 Loopholes in Bell Experiments 57 5.1 The Detection Loophole . 59 5.2 The Coincidence-Time Loophole . 63 5.3 Experimental Bell testing . 67 5.4 Conclusions ...................... 70 6 Energy-Time Entanglement 71 6.1 The Franson Interferometer . 72 6.2 The Postselection Loophole . 76 7 Quantum Hacking 81 7.1 The LHV Attack .................... 82 7.2 The Blinding Attack . 84 7.3 Optical Considerations . 86 7.4 Experimental Demonstration . 91 8 Countermeasures to Quantum Hacking 95 8.1 Chaining the Bell Inequality . 98 8.2 Interferometric Visibility . 105 8.3 Modified Franson Setups . 110 8.4 Conclusions . 115 9 Quantum Bitcoin 117 xiv 9.1 Hashcash . 118 9.2 Bitcoin . 121 9.3 Further Blockchain Developments . 124 9.4 Quantum Money . 125 10 Conclusions 131 10.1 Future Work . 134 Index 137 Bibliography 143 Publications 171 A Energy-Time Entanglement, Elements of Reality, and Local Realism 171 B Hacking the Bell Test Using Classical Light in Energy-Time Entanglement–Based Quantum Key Distribution 189 C Tight Bounds for the Pearle-Braunstein-Caves Chained Inequality Without the Fair-Coincidence Assumption 199 D High-Visibility Time-Bin Entanglement for Testing Chained Bell Inequalities 207 E Quantum Bitcoin: An Anonymous and Distributed Currency Secured by the No-Cloning Theorem of Quantum Mechanics 217 F Comment on “Franson Interference Generated by a Two-Level System” 237 xv List of Figures 1.1 Basic communication scheme for cryptography, adapted from Trappe and Washington [11, p. 3]. Alice and Bob use cryptography to communicate securely in the presence of an eavesdropper, Eve. The message is encrypted using an encryption key, turning the plaintext into a ciphertext before it is broadcast over a public channel. Bob then uses the decryption key to recover the message. ................ 5 3.1 The BB84 QKD protocol. This is a prepare-and- measure QKD protocol, where Alice encodes informa- tion using photons polarized in non-orthogonal bases.
Recommended publications
  • Security of Quantum Key Distribution with Entangled Qutrits
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CERN Document Server Security of Quantum Key Distribution with Entangled Qutrits. Thomas Durt,1 Nicolas J. Cerf,2 Nicolas Gisin,3 and Marek Zukowski˙ 4 1 Toegepaste Natuurkunde en Fotonica, Theoeretische Natuurkunde, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium 2 Ecole Polytechnique, CP 165, Universit´e Libre de Bruxelles, 1050 Brussels, Belgium 3 Group of Applied Physics - Optique, Universit´e de Gen`eve, 20 rue de l’Ecole de M´edecine, Gen`eve 4, Switzerland, 4Instytut Fizyki Teoretycznej i Astrofizyki Uniwersytet, Gda´nski, PL-80-952 Gda´nsk, Poland July 2002 Abstract The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a general- isation of Ekert's cryptographic protocol[20] where qubits are replaced by qutrits. The security of this protocol is related to non-locality, in analogy with Ekert's protocol. In order to study its robustness against the optimal individual attacks, we derive the infor- mation gained by a potential eavesdropper applying a cloning-based attack. Introduction Quantum cryptography aims at transmitting a random key in such a way that the presence of an eavesdropper that monitors the communication is revealed by disturbances in the transmission of the key (for a review, see e.g. [21]). Practically, it is enough in order to realize a crypto- graphic protocol that the key signal is encoded into quantum states that belong to incompatible bases, as in the original protocol of Bennett and Brassard[4].
    [Show full text]
  • Progress in Satellite Quantum Key Distribution
    www.nature.com/npjqi REVIEW ARTICLE OPEN Progress in satellite quantum key distribution Robert Bedington 1, Juan Miguel Arrazola1 and Alexander Ling1,2 Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world. npj Quantum Information (2017) 3:30 ; doi:10.1038/s41534-017-0031-5 INTRODUCTION losses that increase exponentially with distance, greatly limiting Quantum key distribution (QKD) is a relatively new cryptographic the secure key rates that can be achieved over long ranges. primitive for establishing a private encryption key between two For any pure-loss channel with transmittance η, it has been parties. The concept has rapidly matured into a commercial shown that the secure key rate per mode of any QKD protocol 5, 6, 7 technology since the first proposal emerged in 1984,1 largely scales linearly with η for small η. This places a fundamental because of a very attractive proposition: the security of QKD is not limit to the maximum distance attainable by QKD protocols based on the computational hardness of solving mathematical relying on direct transmission.
    [Show full text]
  • Testing the Quantum-Classical Boundary and Dimensionality of Quantum Systems
    Testing the Quantum-Classical Boundary and Dimensionality of Quantum Systems Poh Hou Shun Centre for Quantum Technologies National University of Singapore This dissertation is submitted for the degree of Doctor of Philosophy September 2015 Acknowledgements No journey of scientific discovery is ever truly taken alone. Every step along the way, we encounter people who are a great source of encouragement, guidance, inspiration, joy, and support to us. The journey I have embarked upon during the course of this project is no exception. I would like to extend my gratitude to my project partner on many occasion during the past 5 years, Ng Tien Tjeun. His humorous take on various matters ensures that there is never a dull moment in any late night lab work. A resounding shout-out to the ‘elite’ mem- bers of 0205 (our office), Tan Peng Kian, Shi Yicheng, and Victor Javier Huarcaya Azanon for their numerous discourses into everything under the sun, some which are possibly work related. Thank for tolerating my borderline hoarding behavior and the frequently malfunc- tioning door? I would like to thank Alessandro Ceré for his invaluable inputs on the many pesky problems that I had with data processing. Thanks for introducing me to world of Python programming. Now there is something better than Matlab? A big thanks also goes out to all of my other fellow researchers and colleagues both in the Quantum Optics group and in CQT. They are a source of great inspiration, support, and joy during my time in the group. Special thanks to my supervisor, Christian Kurtsiefer for his constant guidance on and off the project over the years.
    [Show full text]
  • Practical Quantum Key Distribution Based on the BB84 Protocol
    Practical Quantum Key Distribution based on the BB84 protocol A. Ruiz-Alba, D. Calvo, V. Garcia-Muñoz, A. Martinez, W. Amaya, J.G. Rozo, J. Mora, J. Capmany Instituto de Telecomunicaciones y Aplicaciones Multimedia, Universitat Politècnica de València, 8G Building-access D-Camino de Vera s/n-46022 Valencia (Spain) Corresponding author: [email protected] Abstract relies on photon sources and the so-called pho- ton guns are far from ready. An alternative and This paper provides a review of the most impor- also a complementary approach to increase the tant and widely used Quantum Key Distribution bit rate is to make QKD systems work in paral- systems and then describes our recently pro- lel. This simple engineering approach becomes a posed scheme based on Subcarrier Multiplexing challenge when working with quantum systems: that opens the possibility of parallel Quantum The system should work in parallel but still rely Key Distribution. We report the first-ever ex- on just one source and its security should still be perimental implementation of parallel quantum guaranteed by the principles of quantum me- key distribution using this technique showing a chanics both when Alice prepares the photons maximum multiplexing gain. and when Bob “measures” the incoming states. At the same time the multiplexing technique Keywords: Optical fiber communications, quan- should be safe to Eve gaining any information. tum information, quantum key distribution, sub- carrier multiplexing. In this context, recent progress in the literature [4] remarks that photonics is a key enabling technology for implementing commercial QKD 1. Introduction systems to become a competitive technology in Information Security.
    [Show full text]
  • Quantum Key Distribution Protocols and Applications
    Quantum Key Distribution Protocols and Applications Sheila Cobourne Technical Report RHUL{MA{2011{05 8th March 2011 Department of Mathematics Royal Holloway, University of London Egham, Surrey TW20 0EX, England http://www.rhul.ac.uk/mathematics/techreports Title: Quantum Key Distribution – Protocols and Applications Name: Sheila Cobourne Student Number: 100627811 Supervisor: Carlos Cid Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from the published or unpublished works of other people. I declare that I have also read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences and in accordance with it I submit this project report as my own work. Signature: Date: Acknowledgements I would like to thank Carlos Cid for his helpful suggestions and guidance during this project. Also, I would like to express my appreciation to the lecturers at Royal Holloway who have increased my understanding of Information Security immensely over the course of the MSc, without which this project would not have been possible. Contents Table of Figures ................................................................................................... 6 Executive Summary ............................................................................................. 7 Chapter 1 Introduction ...................................................................................
    [Show full text]
  • Report to Industry Canada
    Report to Industry Canada 2013/14 Annual Report and Final Report for 2008-2014 Granting Period Institute for Quantum Computing University of Waterloo June 2014 1 CONTENTS From the Executive Director 3 Executive Summary 5 The Institute for Quantum Computing 8 Strategic Objectives 9 2008-2014 Overview 10 2013/14 Annual Report Highlights 23 Conducting Research in Quantum Information 23 Recruiting New Researchers 32 Collaborating with Other Researchers 35 Building, Facilities & Laboratory Support 43 Become a Magnet for Highly Qualified Personnel in the Field of Quantum Information 48 Establishing IQC as the Authoritative Source of Insight, Analysis and Commentary on Quantum Information 58 Communications and Outreach 62 Administrative and Technical Support 69 Risk Assessment & Mitigation Strategies 70 Appendix 73 2 From the Executive Director The next great technological revolution – the quantum age “There is a second quantum revolution coming – which will be responsible for most of the key physical technological advances for the 21st Century.” Gerard J. Milburn, Director, Centre for Engineered Quantum Systems, University of Queensland - 2002 There is no doubt now that the next great era in humanity’s history will be the quantum age. IQC was created in 2002 to seize the potential of quantum information science for Canada. IQC’s vision was bold, positioning Canada as a leader in research and providing the necessary infrastructure for Canada to emerge as a quantum industry powerhouse. Today, IQC stands among the top quantum information research institutes in the world. Leaders in all fields of quantum information science come to IQC to participate in our research, share their knowledge and encourage the next generation of scientists to continue on this incredible journey.
    [Show full text]
  • Quantum Theory Needs No 'Interpretation'
    Quantum Theory Needs No ‘Interpretation’ But ‘Theoretical Formal-Conceptual Unity’ (Or: Escaping Adán Cabello’s “Map of Madness” With the Help of David Deutsch’s Explanations) Christian de Ronde∗ Philosophy Institute Dr. A. Korn, Buenos Aires University - CONICET Engineering Institute - National University Arturo Jauretche, Argentina Federal University of Santa Catarina, Brazil. Center Leo Apostel fot Interdisciplinary Studies, Brussels Free University, Belgium Abstract In the year 2000, in a paper titled Quantum Theory Needs No ‘Interpretation’, Chris Fuchs and Asher Peres presented a series of instrumentalist arguments against the role played by ‘interpretations’ in QM. Since then —quite regardless of the publication of this paper— the number of interpretations has experienced a continuous growth constituting what Adán Cabello has characterized as a “map of madness”. In this work, we discuss the reasons behind this dangerous fragmentation in understanding and provide new arguments against the need of interpretations in QM which —opposite to those of Fuchs and Peres— are derived from a representational realist understanding of theories —grounded in the writings of Einstein, Heisenberg and Pauli. Furthermore, we will argue that there are reasons to believe that the creation of ‘interpretations’ for the theory of quanta has functioned as a trap designed by anti-realists in order to imprison realists in a labyrinth with no exit. Taking as a standpoint the critical analysis by David Deutsch to the anti-realist understanding of physics, we attempt to address the references and roles played by ‘theory’ and ‘observation’. In this respect, we will argue that the key to escape the anti-realist trap of interpretation is to recognize that —as Einstein told Heisenberg almost one century ago— it is only the theory which can tell you what can be observed.
    [Show full text]
  • America's Decision to Drop the Atomic Bomb on Japan Joseph H
    Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2007 America's decision to drop the atomic bomb on Japan Joseph H. Paulin Louisiana State University and Agricultural and Mechanical College Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_theses Part of the Arts and Humanities Commons Recommended Citation Paulin, Joseph H., "America's decision to drop the atomic bomb on Japan" (2007). LSU Master's Theses. 3079. https://digitalcommons.lsu.edu/gradschool_theses/3079 This Thesis is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Master's Theses by an authorized graduate school editor of LSU Digital Commons. For more information, please contact [email protected]. AMERICA’S DECISION TO DROP THE ATOMIC BOMB ON JAPAN A Thesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College In partial fulfillment of the Requirements for the degree of Master of Arts in Liberal Arts in The Inter-Departmental Program in Liberal Arts By Joseph H. Paulin B.A., Kent State University, 1994 May 2007 TABLE OF CONTENTS ABSTRACT……………………………………………………...………………...…….iii CHAPTER 1. INTRODUCTION……………………………………...………………….1 CHAPTER 2. JAPANESE RESISTANCE………………………………..…………...…5 CHAPTER 3. AMERICA’S OPTIONS IN DEFEATING THE JAPANESE EMPIRE...18 CHAPTER 4. THE DEBATE……………………………………………………………38 CHAPTER 5. THE DECISION………………………………………………………….49 CHAPTER 6. CONCLUSION…………………………………………………………..64 REFERENCES.………………………………………………………………………….68 VITA……………………………………………………………………………………..70 ii ABSTRACT During the time President Truman authorized the use of the atomic bomb against Japan, the United States was preparing to invade the Japanese homeland. The brutality and the suicidal defenses of the Japanese military had shown American planners that there was plenty of fight left in a supposedly defeated enemy.
    [Show full text]
  • Black Holes and Qubits
    Subnuclear Physics: Past, Present and Future Pontifical Academy of Sciences, Scripta Varia 119, Vatican City 2014 www.pas.va/content/dam/accademia/pdf/sv119/sv119-duff.pdf Black Holes and Qubits MICHAEL J. D UFF Blackett Labo ratory, Imperial C ollege London Abstract Quantum entanglement lies at the heart of quantum information theory, with applications to quantum computing, teleportation, cryptography and communication. In the apparently separate world of quantum gravity, the Hawking effect of radiating black holes has also occupied centre stage. Despite their apparent differences, it turns out that there is a correspondence between the two. Introduction Whenever two very different areas of theoretical physics are found to share the same mathematics, it frequently leads to new insights on both sides. Here we describe how knowledge of string theory and M-theory leads to new discoveries about Quantum Information Theory (QIT) and vice-versa (Duff 2007; Kallosh and Linde 2006; Levay 2006). Bekenstein-Hawking entropy Every object, such as a star, has a critical size determined by its mass, which is called the Schwarzschild radius. A black hole is any object smaller than this. Once something falls inside the Schwarzschild radius, it can never escape. This boundary in spacetime is called the event horizon. So the classical picture of a black hole is that of a compact object whose gravitational field is so strong that nothing, not even light, can escape. Yet in 1974 Stephen Hawking showed that quantum black holes are not entirely black but may radiate energy, due to quantum mechanical effects in curved spacetime. In that case, they must possess the thermodynamic quantity called entropy.
    [Show full text]
  • Many-Body Entanglement in Classical & Quantum Simulators
    Many-Body Entanglement in Classical & Quantum Simulators Johnnie Gray A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy of University College London. Department of Physics & Astronomy University College London January 15, 2019 2 3 I, Johnnie Gray, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the work. Abstract Entanglement is not only the key resource for many quantum technologies, but es- sential in understanding the structure of many-body quantum matter. At the interface of these two crucial areas are simulators, controlled systems capable of mimick- ing physical models that might escape analytical tractability. Traditionally, these simulations have been performed classically, where recent advancements such as tensor-networks have made explicit the limitation entanglement places on scalability. Increasingly however, analog quantum simulators are expected to yield deep insight into complex systems. This thesis advances the field in across various interconnected fronts. Firstly, we introduce schemes for verifying and distributing entanglement in a quantum dot simulator, tailored to specific experimental constraints. We then confirm that quantum dot simulators would be natural candidates for simulating many-body localization (MBL) - a recently emerged phenomenon that seems to evade traditional statistical mechanics. Following on from that, we investigate MBL from an entanglement perspective, shedding new light on the nature of the transi- tion to it from a ergodic regime. As part of that investigation we make use of the logarithmic negativity, an entanglement measure applicable to many-body mixed states.
    [Show full text]
  • Sacrifice, Curse, and the Covenant in Paul's Soteriology
    SACRIFICE, CURSE, AND THE COVENANT IN PAUL'S SOTERIOLOGY Norio Yamaguchi A Thesis Submitted for the Degree of PhD at the University of St Andrews 2015 Full metadata for this item is available in St Andrews Research Repository at: http://research-repository.st-andrews.ac.uk/ Please use this identifier to cite or link to this item: http://hdl.handle.net/10023/7419 This item is protected by original copyright Sacrifice, Curse, and the Covenant in Paul’s Soteriology Norio Yamaguchi This thesis is submitted for the degree of PhD at the University of St Andrews 2015 Sacrifice, Curse, and the Covenant in Paul’s Soteriology Presented by Norio Yamaguchi For the Degree of Doctor of Philosophy April 2015 St Mary’s College University of St Andrews - i - 1. Candidate’s declarations: I, Norio Yamaguchi, hereby certify that this thesis, which is approximately 80,000 words in length, has been written by me, and that it is the record of work carried out by me, or principally by myself in collaboration with others as acknowledged, and that it has not been submitted in any previous application for a higher degree. I was admitted as a research student in September 2011 and as a candidate for the degree of Ph D in July 2012; the higher study for which this is a record was carried out in the University of St Andrews between 2011 and 2015. I, Norio Yamaguchi, received assistance in the writing of this thesis in respect of language, which was provided by Sandra Peniston-Bird. Date Feb.12 2015 sig nature of candidate 2.
    [Show full text]
  • Ccjun12-Cover Vb.Indd
    CERN Courier June 2012 Faces & Places I NDUSTRY CERN supports new centre for business incubation in the UK To bridge the gap between basic science and industry, CERN and the Science and Technology Facilities Council (STFC) have launched a new business-incubation centre in the UK. The centre will support businesses and entrepreneurs to take innovative technologies related to high-energy physics from technical concept to market reality. The centre, at STFC’s Daresbury Science and Innovation Campus, follows the success of a business-incubation centre at the STFC’s Harwell campus, which has run for 10 years with the support of the European Space Agency (ESA). The ESA Business Incubation Centre (ESA BIC) supports entrepreneurs and hi-tech start-up companies to translate space technologies, applications and services into viable nonspace-related business ideas. The CERN-STFC BIC will nurture innovative ideas based on technologies developed at CERN, with a direct contribution from CERN in terms of expertise. The centre is managed by STFC Innovations Limited, the technology-transfer office of STFC, which will provide John Womersley, CEO of STFC, left, and Steve Myers, CERN’s director of accelerators and successful applicants with entrepreneurial technology, at the launch of the CERN-STFC Business Incubation Centre on the Daresbury support, including a dedicated business Science and Innovation Campus. (Image credit: STFC.) champion to help with business planning, accompanied technical visits to CERN as business expertise from STFC and CERN. total funding of up to £40,000 per company, well as access to scientific, technical and The selected projects will also receive a provided by STFC.
    [Show full text]